Chapter 5
55
The graphical user interface
The logic access level for a protected page is displayed at the top left of the page in
a light-gray font.
How to remove the page protection from a logic page:
In the logic editor open the page on which you want to remove the protection.
Using the right mouse button, click the page and, on the context menu, select on
the
Set up access protection for Logic page
submenu the
Remove access
protection for Logic pages
command.
If you are not logged in, you will now also be prompted to enter the password for
the required logic access level. Enter the password and click on
Log in
.
5.6.3
Validation of the configuration
The Setting and Monitoring Tool performs an automatical check of the logic program.
If an error is detected, the configuration is marked as invalid and a warning icon
appears in the upper right corner of the screen. Additionally, a warning icon marks the
erroneous page of the logic program and the function block that is not connected
correctly (e.g. one or more inputs are not connected) is displayed orange.
As long as the configuration is invalid, it is not possible to start the simulation mode or
to transfer the configuration to the MELSEC-WS safety controller.
How to correct an invalid configuration:
Connect all unconnected function block inputs. As soon as all function blocks are
connected correctly, they will be displayed yellow and the invalid warnings will
disappear.
Check your application thoroughly for correctness!
The Setting and Monitoring Tool checks only for connection errors in your logic
program. You are responsible to check whether your application conforms to your risk
analysis and avoidance strategy and also fulfils all applicable standards and
regulations. Otherwise the operator of the machine will be in danger.
Figure 27:
Invalid configuration
warnings
ATTENTION
Summary of Contents for SW1DNN-WS0ADR-B
Page 2: ......
Page 288: ...Chapter 15 285 Annex ...
Page 289: ...Chapter 15 286 Annex ...
Page 290: ...Chapter 15 287 Annex ...
Page 291: ...Chapter 15 288 Annex ...
Page 292: ...Chapter 15 289 Annex ...
Page 293: ...Chapter 15 290 Annex ...
Page 294: ...Chapter 15 291 Annex ...
Page 295: ...Chapter 15 292 Annex ...
Page 296: ...Chapter 15 293 Annex ...
Page 297: ...Chapter 15 294 Annex ...
Page 298: ...Chapter 15 295 Annex 15 1 2 Example application Wood scanner ...
Page 299: ...Chapter 15 296 Annex ...
Page 300: ...Chapter 15 297 Annex ...
Page 301: ...Chapter 15 298 Annex ...
Page 302: ...Chapter 15 299 Annex ...
Page 303: ...Chapter 15 300 Annex ...
Page 304: ...Chapter 15 301 Annex ...
Page 305: ...Chapter 15 302 Annex ...
Page 306: ...Chapter 15 303 Annex ...
Page 307: ...Chapter 15 304 Annex 15 1 3 Example application Ramp down detection ...
Page 308: ...Chapter 15 305 Annex ...
Page 309: ...Chapter 15 306 Annex ...
Page 310: ...Chapter 15 307 Annex ...
Page 311: ...Chapter 15 308 Annex ...
Page 312: ...Chapter 15 309 Annex ...
Page 313: ...Chapter 15 310 Annex ...
Page 314: ...Chapter 15 311 Annex ...
Page 321: ......