
i
Table of Contents
1. Security Function ................................................................1-1
1.1 Overview of Security Function ................................................................ 1-2
1.1.1 Precautions on Using Security Function .................................................1-2
1.1.2 Type of Security Functions......................................................................1-2
1.1.3 Target Items of Security Functions .........................................................1-5
1.2 Password Protection Function................................................................ 1-6
1.2.1 How to Set Password (1) Administrative Previleges...............................1-6
1.2.2 How to Set Password (2) User Privileges ...............................................1-8
1.2.3 Reading Project that Password Has Been Set (1) Administrative
Previleges..............................................................................................1-10
1.2.4 Reading Project that Password Has Been Set (2) User privileges .......1-11
1.2.5 Cancelling Password.............................................................................1-12
1.2.6 Limited Distribution Password...............................................................1-13
1.3 Upload Protection Setting..................................................................... 1-14
1.3.1 Operation When Upload Protection Has Been Set...............................1-14
1.3.2 Setting Method ......................................................................................1-14
1.3.3 Cancelling Upload Protection Setting ...................................................1-15
1.4 Encryption Setting................................................................................. 1-16
1.4.1 Feature of Encryption Setting Function.................................................1-16
1.4.2 Encryption Setting for Program Blocks (PB) .........................................1-16
1.4.3 Confirming Encrypted State (Decryption) .............................................1-18
1.4.4 Changing or Deleting Encryption Key ...................................................1-19
1.4.5 How to Set Encryption Keyword for PLC (1).........................................1-20
1.4.6 How to Set Encryption Keyword for PLC (2).........................................1-21
1.5 Cancelling Security Setting................................................................... 1-22
1.5.1 Setting Method ......................................................................................1-22
1.6 Restrictions on SD Memory Card Operation and Copy Operation ....... 1-23