Rockwell Automation 1785-Lx6B,D17856.5.13 MNL. PLC-5 PROTECTED PROCESSOR User Manual

Page 5

Advertising
background image

PLC-5 Protected Processor
Supplement

Table of Contents

i

Table of Contents

Chapter 1

Introduction

1–1

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Features

1–1

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Requirements

1–2

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Implementation Guidelines

1–2

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Chapter 2

Using This Chapter

2–1

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Guidelines for Assigning Passwords and Privileges

2–2

. . . . . . . . . . . . . . .

Assigning Passwords and Privileges to Classes

2–3

. . . . . . . . . . . . . . . . . . .

Assigning Default Privilege Classes to Communication Channels

and Offline Files

2–6

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Assigning Read and Write Privileges for Communication Channels

2–7

. .

Assigning Privileges for Specific Stations/Nodes

2–8

. . . . . . . . . . . . . . . . .

Assigning Read and Write Privileges for a Program File

2–9

. . . . . . . . . . .

Assigning Privileges for a Data-Table File

2–10

. . . . . . . . . . . . . . . . . . . . . .

Restoring Default Privilege Classes

2–11

. . . . . . . . . . . . . . . . . . . . . . . . . . . .

Changing to a Different Class

2–11

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Chapter 3

Using This Chapter

3–1

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Creating a Protection File

3–1

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Initiating the Protection Mechanism

3–2

. . . . . . . . . . . . . . . . . . . . . . . . . . .

Entering Data-Table Ranges into the Protection File

3–3

. . . . . . . . . . . . . . .

Screening Commands

3–5

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Protecting from Offline Changes

3–5

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Understanding Restrictions Placed on the System

3–6

. . . . . . . . . . . . . . . . .

Testing the Protection File

3–8

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Planning for a
Protected System

Configuring Passwords
and Privileges

Configuring and Using
Data-Table Element
Protection

Advertising