Manual

Supplement
PLC-5 Protected Processor
Index
I–1
A
areas to protect, 1-4
attempts to bypass security mechanisms,
monitoring, 1-5
audience for this supplement, i
C
classes
assigning privileges to, 2-2
changing, 2-11
definition, i
commands
screened, i, 1-3
screened by protection mechanism,
3-5
communication channel
assigning default privilege class to,
2-6
limiting access to, 1-1
protecting, 1-3
control structures, protecting, 1-4
coprocessor port, 3-7
critical data tables, protecting, 1-4
D
data files
limiting access to, 1-1
protecting, 1-3
data-table element protection. See
DTEP
data-table write, preventing, 1-2
default privilege classes
assigning to all channels, 2-6
restoring, 2-11
download, aborted due to DTEP
violation, 3-6
downloading, protection during, 1-4
downloading files containing critical
logic, requirements before, 2-9
DTEP
definition, i
implementing, 3-1
testing, 1-2
using, 1-3
DTEP file
automatic protection, 3-2
clearing number from status file, 3-2
creating, 3-1
determining number of protection
ranges, 3-3
determining size, 3-1, 3-3
entering data-table ranges, 3-1
entering data-table ranges in,
guidelines, 3-3
entering data-table ranges in octal,
procedure, 3-4
entering number in status file, 3-1,
3-2
validation, 3-2
entering ranges to protect, 3-3
example, 3-4
example, 3-4
going into, 3-3
maximum number of protection
ranges, 3-3
setting up, 3-2
testing, 3-8
unused protection ranges, indicating,
3-3
verification, 3-4
DTEP mechanism
and offline programming, 3-5
downloaded files, 3-5
initiating, 3-2
offline protection, 1-4
restrictions
coprocessor port, 3-7
indexed addressing, 3-7
screened commands, 3-5
screening operation, 3-5
testing, 3-8
E
end user
, definition, i
enhanced processors, protection
method, 1-1