Manual

Supplement
PLC-5 Protected Processor
Index
I–2
F
files, downloaded, 3-5
flexibility, maintaining for end users,
1-4
I
I/O force operations, protection from
during download, 3-5
I/O forcing
preventing, 1-1, 1-2, 1-3
protection from during downloading,
1-4
indexed addressing, 3-7
indirect addressing, 3-6
instructions screened during
downloading, 3-5
integer storage registers, protecting, 1-4
J
jumps to subroutines (JSRs), using to
maintain flexibility for end users,
1-4
M
modification of your logic, protecting
against, 1-3
N
nodes attached to DH+ link, limiting
access to, 1-1
O
offline changes, protecting against, 1-4
offline file, assigning default privilege
class to, 2-6
P
password
assigning to a class, 2-3
class 1, importance of remembering,
2-3
system administrator
’s, importance of
remembering, 2-3
passwords and privileges
classes, setting up, 1-3
setting up, 1-3
using, 1-3
privilege classes
assigning to channels, 2-6
assigning to nodes, 2-8
assigning to of
fline files, 2-6
changing, 2-11
defining, 2-2
guidelines for assigning, 2-2
restoring default, 2-11
privileges
assigning to classes, 2-3
assigning to node, 2-8
assigning to programming terminal,
2-8
assigning to station, 2-8
class 1, defining, 2-3, 2-4
class 2, defining, 2-3, 2-4
class 3, defining, 2-3, 2-4
class 4, defining, 2-3, 2-4
Clear Memory, 2-4, 2-5
Create/Delete Data File, 2-5
Create/Delete Data Files, 2-4
Create/Delete Program File, 2-5
Create/Delete Program Files, 2-4
definition, i
disabling for classes, 2-4
Edit On-line, 2-4, 2-5
enabling for classes, 2-4
I/O Force, 2-4, 2-5
Logical Read, 2-4, 2-5
Logical Write, 2-4, 2-5
Mode Change, 2-4, 2-5
Modify Privileges, 2-4, 2-5, 3-2
Physical Read, 2-4, 2-5
Physical W
rite, 2-4, 2-5
Restore Memory
, 2-4, 2-5
SFC Force, 2-4, 2-5
program files
limiting access to, 1-1
protecting, 1-3
protection of, 1-3