Manual

1
Chapter
1-1
Planning for a Protected System
The PLC-5 protected processors security features are designed to limit
access to critical areas of your program:
providing for more consistent operation of your machine/process
helping you reduce the risks associated with unauthorized
program modification
The protected processor is designed to improve security by helping
you prevent:
I/O forcing of specific module groups
unauthorized manipulation of specific segments of data-table
words through
- write commands
- output instructions
If you want to read about: Go to page:
Features of a protected processor
1-1
Requirements for a protected processor 1-2
Guidelines for implementing a protected system 1-2
ATTENTION: Protected processors alone cannot ensure PLC
system security. System security comes from a combination of
the protected processor, the software, and application expertise.
All enhanced PLC-5 processors (PLC-5/11, -5/20, –5/20E, -5/26, -5/30,
-5/V30, -5/40, -5/40E, -5/40L, -5/V40, -5/V40L, -5/46, -5/60, -5/60L, -5/80,
-5/80E, and -5/86) allow a system administrator to set from one to four
password-protected privilege classes and to define each class by providing
it with access to a unique combination of software operations. As system
administrator, you can also set read and write privileges limiting access to:
communications channels
program files
data files
nodes attached to the Data Highway Plus (DH+) link
Important: You must enable the passwords-and-privileges function when
you first install your 6200 Series Programming Software if you want to use
the protection features of your processor.
Introduction
Features