![GE Intelligent Platforms, Inc. PAC8000 Getting Started Manual Download Page 23](http://html.mh-extra.com/html/ge-intelligent-platforms-inc/pac8000/pac8000_getting-started-manual_571899023.webp)
PAC8000 Workbench Getting Started Guide
23
Security Features
Since the PAC8000 system is used to monitor and control potentially dangerous
processes, it is important to prevent unauthorized changes to the data and programs
running in the controller. The PAC8000 Workbench provides the following security
features:
Security Privileges
- Each Workbench user has a user id and password with which to
logon. This logon indicates the types of changes that are permitted, as well as which
data can be accessed and modified.
Trusted Hosts Table
- The Trusted Hosts Table prevents unauthorized devices
(computers, COM ports, etc.) from making changes to data in the controller. Each
device that is permitted to make data changes must have its MAC address listed in
the controller’s Trusted Hosts Table. This feature is only available for a controller with
Version 2 Firmware.
Keyswitch
- The keyswitch is a digital input that can be used to “lock” the controller.
When the controller is “locked” no writes, configuration changes, strategy changes,
etc., can be made to the controller. When “unlocked,” data can be changed as long
as the correct privileges have been assigned in the Trusted Hosts Table. This feature
is only available for a controller with Version 2 Firmware.
Controller Password
-
For additional security, the controller can be given a password,
which must be entered before the Trusted Hosts Table can be downloaded or the
Mode can be changed. This feature is only available for a controller with Version 2
Firmware.
Configuration Mode and Protected Mode -
In Configuration Mode, changes can be
made to the data in the controller as long you are authorized to make the change
(based on the security level of the login and the access granted to the computer by
the Trusted Hosts Table) and the keyswitch is unlocked. In Protected mode, changes
are only permitted to the mode, i.e. changes from Protected mode back to
configuration mode, and to the Trusted Hosts Table, as allowed by the keyswitch
setting. This feature is only available for a controller with Version 2 Firmware.
Change Log
- Change tracking can be enabled for a controller. You can then run a
report to view the changes that have been made. Each change gives a description of
the change made, the logon id of the user making the change, and the date and time
the change was made.
Difference Tools
- When a strategy is downloaded to the controller, a backup of the
project is automatically made if this option is selected. The Workbench provides a
File Differences Utility
that allows you to see the changes made between versions.
GE Intelligent Platforms, Inc.
September 2010