Rockwell Automation 1785-Lx6B,D17856.5.13 MNL. PLC-5 PROTECTED PROCESSOR User Manual
Page 10
Chapter 1
Planning for a Protected System
1-5
As a means of monitoring end-user attempts to bypass security mechanisms,
you can monitor the status-file minor-fault bit (S:17/11). This bit indicates a
protection-violation attempt. It can be used to count intrusion attempts if you
add a rung of ladder logic that increments a counter and clears the minor-
fault bit on each attempt.
Program-File Conversion Rules
Follow the rules outlined below when sharing program files among
standard enhanced PLC-5 processors and PLC-5 protected processors.
Protected (PLC-5/x6) Processor
Standard (PLC-5/x0) Processor
PLC-5/x0
Offline File
X
Can restore standard-processor
files to protected processor
Cannot restore protected-processor
files to standard processor
X
Can convert standard-processor
files to protected-processor files
Cannot convert protected-processor
files to standard-processor files
Can save/restore protected-processor
files to protected processor
Can convert protected-processor files
to files for different protected processor
ASCII
File
X
Cannot export/import ASCII files
to/from a protected processor
PLC-5/x0
Offline File
PLC-5/x0
Offline File
PLC-5/x6
Offline File
PLC-5/x6
Offline File
PLC-5/x6
Offline File
PLC-5/x6
Processor
PLC-5/x0
Processor
CU
CTU
COUNT UP
Counter
Preset
Accum
C5:0
10
0
DN
S:17
11
S:17
11
U