User Manual
  IO-Link 
  10.2 Design of a command point with ID key-operated switch 
SIRIUS ACT 3SU1 pushbuttons and signaling devices 
System Manual, 02/2015, A5E03457306020A/RS-AB/002 
221 
10.2.3.8
"Restore factory setting" parameter 
"Restore factory setting" parameter  
In some situations, the electronic module for ID key-operated switches for IO-Link has to be 
changed to the standard state quickly and simply. For this purpose, the standardized system 
command "Restore factory setting" (value 0x82 in the data set (Index) 2 - system commands 
or the button in the Port Configuration Tool 
S7-PCT
) is used. 
This command triggers the following: 
●  Standard settings for parameters - data set (index) 131 
●  Deleting the list of keys 
●  Data set (index) 24 (Application Specific Name) is deleted 
Settings 
Description 
130 
Restore factory setting 
Standard values for parameters - data set (index) 131 
Parameters 
Setting 
Incremental mode 
Disabled 
Switch position memory 
Disabled 
Key memory 
Disabled 
Individual keys only 
Disabled 
Switch position delay 
20 (2 seconds) 
Select memory range 
1 (individually encodable key 1 ... 10) 
10.2.3.9
Manage authorization level (individually encodable ID keys) 
"Add new individual ID key" parameter 
The electronic module can store up to 50 individually encodable ID keys in its permanent 
memory, and it can assign each of these individually encodable ID keys to group 1 ... 4 
respectively. When an individually encodable ID key from the list is used, it behaves like an 
ID key from the relevant authorization level.  
A list of the individually encodable ID keys can be displayed in the 
Port Configuration Tool 
S7-PCT 
. 
If an individually encodable ID key is used in the ID key-operated switch, the electronic 
module detects that it belongs to the group of individually encodable ID keys. 
A check is then made to see whether this key is included in the individual key list stored in 
the electronics module. If the identification number of the key used is in the list, the 
corresponding authorization level is determined using this list and assigned to the key used. 
This key behaves like a key belonging to the relevant authorization level. 










