Manual

PLC-5 Protected Processor
Supplement
T
able of Contents
i
Table of Contents
Chapter 1
Introduction 1–1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Features 1–1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Requirements 1–2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Implementation Guidelines 1–2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 2
Using This Chapter 2–1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Guidelines for Assigning Passwords and Privileges 2–2. . . . . . . . . . . . . . .
Assigning Passwords and Privileges to Classes 2–3. . . . . . . . . . . . . . . . . . .
Assigning Default Privilege Classes to Communication Channels
and Offline Files 2–6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Assigning Read and Write Privileges for Communication Channels 2–7. .
Assigning Privileges for Specific Stations/Nodes 2–8. . . . . . . . . . . . . . . . .
Assigning Read and Write Privileges for a Program File 2–9. . . . . . . . . . .
Assigning Privileges for a Data-Table File 2–10. . . . . . . . . . . . . . . . . . . . . .
Restoring Default Privilege Classes 2–11. . . . . . . . . . . . . . . . . . . . . . . . . . . .
Changing to a Different Class 2–11. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Chapter 3
Using This Chapter 3–1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Creating a Protection File 3–1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Initiating the Protection Mechanism 3–2. . . . . . . . . . . . . . . . . . . . . . . . . . .
Entering Data-Table Ranges into the Protection File 3–3. . . . . . . . . . . . . . .
Screening Commands 3–5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Protecting from Offline Changes 3–5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Understanding Restrictions Placed on the System 3–6. . . . . . . . . . . . . . . . .
Testing the Protection File 3–8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Planning for a
Protected System
Configuring Passwords
and Privileges
Configuring and Using
Data-Table Element
Protection