PACSystems™ RX3i and RSTi-EP CPU Reference Manual Section 4
GFK-2222AK October 2019
CPU Operation 100
timeout. (See below for distinctions between CPU and CPE behavior.) The PACS
Analyzer software is a tool that is embedded in PME. It can also be downloaded from
Emerson’s support website.
▪ During startup following hardware watchdog reset, the CPU/CPE logs an
informational fault with Error Code 446, which indicates a watchdog auto-reset
occurred.
The following responses to a hardware watchdog timeout are different between RX3i CPU
and RX3i CPE models:
▪ RX3i CPU310, CPU315, and CPU320 retain Controller and I/O Fault tables after a
hardware watchdog timeout.
▪ RX3i CPE302, CPE305, CPE310, CPE330, CPE400, CPL410 and RSTi-EP
CPE100/CPE115 do not retain Controller and I/O Fault tables following a hardware
watchdog timeout.
Note: PACSystems does not support Fatal Fault Retries.
4.9 System Security
PACSystems CPUs support two types of system security:
▪ Passwords/privilege levels
▪ OEM protection
CPU versions 7.80 and later support Enhanced Security (including merged password
tables). This provides a more secure mechanism for setting and authenticating passwords
and OEM keys versus the Legacy Security Mode. Refer to the Important Product
Information document for the CPU model and firmware version that you are using for any
additional information.
For Enhanced Security operation, see Section 1.1, . A summary of operational differences
between Enhanced and Legacy Security modes is provided in Section 1.1, .
4.9.1 Passwords and Privilege Levels - Legacy Mode
PACSystems CPUs are equipped with password management. Passwords are disabled by
default, but can be enabled, disabled, or configured with PAC Machine Edition (PME).
When in Online mode, PLCs can be password protected at varying privilege levels (1-4).
(Passwords are not enabled when the PLC is in Offline mode.) Passwords are unique to the
PLC (and subsequently each access level), but will be shared between users. Unique
passwords cannot be assigned to individual users.
NOTE:
▪ Duplicate passwords may be used on different privilege levels. For example, Level 1
and Level 2 may share the same password.
▪ Passwords must be between one and seven ASCII characters in length.
After passwords have been configured, access to the CPU data will be restricted to the
user’s privilege level. Higher privilege levels will provide access to lower privilege levels.