Manual
Table Of Contents
- ENGLISH
- FRANCAIS
- 1 Mise en oeuvre matérielle
- 2 Mise en oeuvre logicielle
- 3 Protocoles Modbus et Ethernet TCP/IP Modbus
- 3.1 Généralités
- 3.2 Exemples d’application
- 3.2.1 Montage
- 3.2.2 Configuration matérielle de l’automate avec PL7 PRO (V4.3 ou supérieure)
- 3.2.3 Exemple de programmation d’une requête pour la station @ 2
- 3.2.4 Configuration de l’automate avec Unity PRO XL V1.0.1
- 3.2.5 Lecture de 5 mots dans l’étiquette à partir de mot %MW 0 de l’étiquette dans la station @ 2
- 4 Diagnostic
- 5 Glossaire
English
About the Book
8
W916556680111
Consult the Schneider Electric Cybersecurity Best Practices (https://
www.se.com/ww/en/download/document/CS-Best-Practices-2019-340/) for
additional information.
WARNING
UNAUTHORIZED ACCESS TO THE MACHINE VIA SOFTWARE AND
NETWORKS
• In your hazard and risk analysis, consider all hazards that result from access
to and operation on the network/fieldbus and develop an appropriate
cybersecurity concept.
• Verify that the hardware infrastructure and the software infrastructure into
which the machine is integrated as well as all organizational measures and
rules covering access to this infrastructure consider the results of the hazard
and risk analysis and are implemented according to best practices and
standards covering IT security and cybersecurity (such as ISO/IEC 27000
series, ISO/ IEC 15408, IEC 62351, ISA/IEC 62443, Common Criteria for
Information Technology Security Evaluation, NIST Cybersecurity Framework,
Information Security Forum - Standard of Good Practice for Information
Security).
• Verify the effectiveness of your IT security and cyber security systems using
appropriate, proven methods.
Failure to follow these instructions can result in death, serious injury, or
equipment damage.










