
3.2 Function Modules
3.2.8 Security
3-94
Precautions
•
Logging Overruns
FTP transfers are performed as part of the logging function. Logging data is not possible
during FTP transfers. Adjust the amount of data to log and the timing so that logging over-
runs do not occur.
•
Watchdog Timeout Errors for Large Data Transfers
If you transfer a large quantity of data with an FTP transfer when there is little idle time in the
high-speed or low-speed scan, a scan exceeded error may occur. If you frequently transfer
large amounts of data, provide sufficient idle time in scan processing.
•
Online Parameter Changes for FTP Client Settings
If you change the FTP client settings when an FTP transfer is not in progress, the changes are
made online. If an FTP transfer is in progress, the changes will not be applied and the opera-
tion will continue with the original settings. If the
Keep login
Option is selected, the system
assumes that an FTP transfer is in progress as long as the FTP client is logged in. Therefore,
the changes will not be applied and the operation will continue with the original settings.
Changes that were not applied will be applied after restarting after data is saved to flash
memory.
3.2.8
Security
Security can be used to perform the following tasks.
•
Set project passwords.
•
Set program passwords.
•
Set online passwords.
Refer to the following manual for operating details.
MP2000/MP3000 Series Machine Controller System Setup Manual (Manual No.: SIEP C880725 00)
3.2.9
Calendar
The calendar is used to manage dates and times in the CPU Module. If the calendar has been
set, the date and time will be automatically recorded when an alarm occurs.
The calendar is powered by the Battery. This allows it to maintain the correct time even if the
power to the CPU Module is turned OFF. The calendar has an error of 1 minute a month.
The date and time information can be set, changed, and accessed through the system regis-
ters. Refer to the following sections for details.