User Manual
IO-Link
10.2 Design of a command point with ID key-operated switch
SIRIUS ACT 3SU1 pushbuttons and signaling devices
System Manual, 02/2015, A5E03457306020A/RS-AB/002
221
10.2.3.8
"Restore factory setting" parameter
"Restore factory setting" parameter
In some situations, the electronic module for ID key-operated switches for IO-Link has to be
changed to the standard state quickly and simply. For this purpose, the standardized system
command "Restore factory setting" (value 0x82 in the data set (Index) 2 - system commands
or the button in the Port Configuration Tool
S7-PCT
) is used.
This command triggers the following:
● Standard settings for parameters - data set (index) 131
● Deleting the list of keys
● Data set (index) 24 (Application Specific Name) is deleted
Settings
Description
130
Restore factory setting
Standard values for parameters - data set (index) 131
Parameters
Setting
Incremental mode
Disabled
Switch position memory
Disabled
Key memory
Disabled
Individual keys only
Disabled
Switch position delay
20 (2 seconds)
Select memory range
1 (individually encodable key 1 ... 10)
10.2.3.9
Manage authorization level (individually encodable ID keys)
"Add new individual ID key" parameter
The electronic module can store up to 50 individually encodable ID keys in its permanent
memory, and it can assign each of these individually encodable ID keys to group 1 ... 4
respectively. When an individually encodable ID key from the list is used, it behaves like an
ID key from the relevant authorization level.
A list of the individually encodable ID keys can be displayed in the
Port Configuration Tool
S7-PCT
.
If an individually encodable ID key is used in the ID key-operated switch, the electronic
module detects that it belongs to the group of individually encodable ID keys.
A check is then made to see whether this key is included in the individual key list stored in
the electronics module. If the identification number of the key used is in the list, the
corresponding authorization level is determined using this list and assigned to the key used.
This key behaves like a key belonging to the relevant authorization level.