11.07.2015 Views

1756-RM001B-EN-P, Using ControlLogix in SIL2 ... - Tuv-fs.com

1756-RM001B-EN-P, Using ControlLogix in SIL2 ... - Tuv-fs.com

1756-RM001B-EN-P, Using ControlLogix in SIL2 ... - Tuv-fs.com

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8-4 General Requirements for Application SoftwareForc<strong>in</strong>gForc<strong>in</strong>g must be disabled after system test and validation.SecurityThe user must def<strong>in</strong>e what measures are to be applied for theprotection aga<strong>in</strong>st manipulation.In the <strong>ControlLogix</strong> system and <strong>in</strong> RSLogix 5000, protectionmechanisms are available that prevent un<strong>in</strong>tentional or unauthorizedmodifications to the safety system:• The follow<strong>in</strong>g tools may be employed for security reasons <strong>in</strong> a<strong>SIL2</strong>-certified <strong>ControlLogix</strong> application:– Logix CPU Security Tool– Source Protection Tool– RSI Security ServerEach of these tools offers different security features, <strong>in</strong>clud<strong>in</strong>gpassword protection, at vary<strong>in</strong>g levels of granularity throughoutthe application. The description of these tools is too large <strong>in</strong>scope to list here. Users can contact their local RockwellAutomation representative for more <strong>in</strong>formation.• The controller keyswitch should be <strong>in</strong> the RUN position and thekey removed dur<strong>in</strong>g normal operat<strong>in</strong>g conditions.• Operator options are set up per user log<strong>in</strong> <strong>in</strong> the <strong>ControlLogix</strong>system.• The l<strong>in</strong>k between RSLogix 5000 and the <strong>ControlLogix</strong> system isnot permitted dur<strong>in</strong>g normal <strong>SIL2</strong> RUN operation.The requirements of the safety and application standards regard<strong>in</strong>gthe protection aga<strong>in</strong>st manipulations must be observed. Theauthorization of employees and the necessary protection measures arethe responsibility of the <strong>in</strong>dividuals start<strong>in</strong>g the system.Publication <strong>1756</strong>-<strong>RM001B</strong>-<strong>EN</strong>-P - October 2003

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!