Rockwell Automation 1785-Lx6B,D17856.5.13 MNL. PLC-5 PROTECTED PROCESSOR User Manual
Page 5

PLC-5 Protected Processor
Supplement
Table of Contents
i
Table of Contents
Chapter 1
Introduction
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Features
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Requirements
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Implementation Guidelines
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 2
Using This Chapter
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Guidelines for Assigning Passwords and Privileges
. . . . . . . . . . . . . . .
Assigning Passwords and Privileges to Classes
. . . . . . . . . . . . . . . . . . .
Assigning Default Privilege Classes to Communication Channels
and Offline Files
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Assigning Read and Write Privileges for Communication Channels
. .
Assigning Privileges for Specific Stations/Nodes
. . . . . . . . . . . . . . . . .
Assigning Read and Write Privileges for a Program File
. . . . . . . . . . .
Assigning Privileges for a Data-Table File
. . . . . . . . . . . . . . . . . . . . . .
Restoring Default Privilege Classes
. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing to a Different Class
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 3
Using This Chapter
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating a Protection File
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Initiating the Protection Mechanism
. . . . . . . . . . . . . . . . . . . . . . . . . . .
Entering Data-Table Ranges into the Protection File
. . . . . . . . . . . . . . .
Screening Commands
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Protecting from Offline Changes
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding Restrictions Placed on the System
. . . . . . . . . . . . . . . . .
Testing the Protection File
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Planning for a
Protected System
Configuring Passwords
and Privileges
Configuring and Using
Data-Table Element
Protection