1 - planning for a protected system, Introduction, Features – Rockwell Automation 1785-Lx6B,D17856.5.13 MNL. PLC-5 PROTECTED PROCESSOR User Manual

Page 6: Planning for a protected system

Advertising
background image

1

Chapter

1-1

Planning for a Protected System

The PLC-5 protected processor’s security features are designed to limit
access to critical areas of your program:

providing for more consistent operation of your machine/process

helping you reduce the risks associated with unauthorized
program modification

The protected processor is designed to improve security by helping
you prevent:

I/O forcing of specific module groups

unauthorized manipulation of specific segments of data-table
words through

-

write commands

-

output instructions

If you want to read about:

Go to page:

Features of a protected processor

1-1

Requirements for a protected processor

1-2

Guidelines for implementing a protected system

1-2

ATTENTION: Protected processors alone cannot ensure PLC
system security. System security comes from a combination of
the protected processor, the software, and application expertise.

All enhanced PLC-5 processors (PLC-5/11, -5/20, –5/20E, -5/26, -5/30,
-5/V30, -5/40, -5/40E, -5/40L, -5/V40, -5/V40L, -5/46, -5/60, -5/60L, -5/80,
-5/80E, and -5/86) allow a system administrator to set from one to four
password-protected privilege classes and to define each class by providing
it with access to a unique combination of software operations. As system
administrator, you can also set read and write privileges limiting access to:

communications channels

program files

data files

nodes attached to the Data Highway Plus

t (DH+t) link

Important: You must enable the passwords-and-privileges function when
you first install your 6200 Series Programming Software if you want to use
the protection features of your processor.

Introduction

Features

Advertising