1 - planning for a protected system, Introduction, Features – Rockwell Automation 1785-Lx6B,D17856.5.13 MNL. PLC-5 PROTECTED PROCESSOR User Manual
Page 6: Planning for a protected system

1
Chapter
1-1
Planning for a Protected System
The PLC-5 protected processor’s security features are designed to limit
access to critical areas of your program:
•
providing for more consistent operation of your machine/process
•
helping you reduce the risks associated with unauthorized
program modification
The protected processor is designed to improve security by helping
you prevent:
•
I/O forcing of specific module groups
•
unauthorized manipulation of specific segments of data-table
words through
-
write commands
-
output instructions
If you want to read about:
Go to page:
Features of a protected processor
Requirements for a protected processor
Guidelines for implementing a protected system
ATTENTION: Protected processors alone cannot ensure PLC
system security. System security comes from a combination of
the protected processor, the software, and application expertise.
All enhanced PLC-5 processors (PLC-5/11, -5/20, –5/20E, -5/26, -5/30,
-5/V30, -5/40, -5/40E, -5/40L, -5/V40, -5/V40L, -5/46, -5/60, -5/60L, -5/80,
-5/80E, and -5/86) allow a system administrator to set from one to four
password-protected privilege classes and to define each class by providing
it with access to a unique combination of software operations. As system
administrator, you can also set read and write privileges limiting access to:
•
communications channels
•
program files
•
data files
•
nodes attached to the Data Highway Plus
t (DH+t) link
Important: You must enable the passwords-and-privileges function when
you first install your 6200 Series Programming Software if you want to use
the protection features of your processor.
Introduction
Features