Rockwell Automation 8520-GUM 9/Series CNC Grinder Operation and Programming Manual Documentation Set User Manual
Page 162

Editing Programs On Line
Chapter 5
5-42
4.
Key in a comma followed by a new program name for the duplicate
program.
COPY: FROM_NAME,TO_NAME
5.
Press the
{MEM TO MEM}
softkey.
MEM TO
PORT A
PORT A
TO MEM
MEM TO
PORT B
PORT B
TO MEM
MEM TO
MEM
(softkey level 3)
The following message appears:
“FROM: (source program name)
“TO:
(new programs name)
Important: The control displays the active communication parameters if
one of the communication ports has been chosen. If the communication
port parameters do not match that of the peripheral device, they must be
altered for a successful copy to take place. For details on setting
communication port parameters, see page 9-1.
6.
Select the
{COPY YES}
or
{COPY NO}
softkey.
{COPY YES}
copies the
part program, while
{COPY NO}
aborts the copy operation.
COPY
YES
COPY
NO
(softkey level 4)
7.
If you want to verify that the copied program identically matches the
original, use the
{VERIFY PRGRAM}
feature covered in chapter 9.
This section contains information on how to select the protectable part
program directory. Use this directory to store part programs that you wish
to control access to. When part programs that have previously been
protected through encryption are downloaded to the control from ODS or
the Mini-DNC package, they are automatically stored in the protectable
part program directory.
Important: The
{CHANGE DIR}
softkey controls access to the protectable
part program directory. This softkey is password protected. You must
have the proper password to access this softkey.
5.10
Selecting the Protectable
Part Program Directory