Programming and Operating Manual (Milling)
6FC5398-4DP10-0BA6, 09/2017
9
Siemens provides products and solutions with industrial security functions that support the secure operation of plants,
systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is necessary to implement – and
continuously maintain – a holistic, state-of-the-art industrial security concept. Siemens products and solutions only rep
one component of such a concept.
The customer is responsible for preventing unauthorized access to its plants, systems, machines and networks. Systems,
machines and components should only be connected to the enterprise network or the internet if and
and with appropriate security measures (e.g. use of firewalls and network segmentation) in place.
Additionally, Siemens’ guidance on appropriate security measures should be taken into account. For more information about
industrial security, please visit:
Industrial security (http://www.siemens.com/industrialsecurity).
Siemens’ products and solutions undergo continuous development to make them more secure. Siemens strongly
recommends to apply product updates as soon as available and to always use the latest product versions. Use of product
versions that are no longer supported, and failure to apply latest updates may increase customer’s exposure to cyber
threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS Feed at:
Industrial security (http://www.siemens.com/industrialsecurity).
Unsafe operating states resulting from software manipulation
Software manipulations (e.g. viruses, trojans, malware or worms) can cause unsafe operating states in your system that
may lead to death, serious injury, and property damage.
• Keep the software up to date.
• Incorporate the automation and drive components into a holistic, state-of-the-art industrial security concept for the
installation or machine.
• Make sure that you include all installed products into the holistic industrial security concept.
• Protect files stored on exchangeable storage media from malicious software by with suitable protection measures, e.g.
virus scanners.
Chapter "Machining typical milling parts (Page 235)" later in this manual provides you with typical machining examples
including workpiece drawings, typical programs, and step-by-step operating instructions. It helps you to quickly understand
CNC programming and operation through practical examples.
Panel Processing Units (PPUs)
2.1.1
Applicable control system
Horizontal panel, with English keys
SINUMERIK 808D ADVANCED T (Turning)
Horizontal panel, with Chinese keys
Milling variant
Horizontal panel, with English keys
SINUMERIK 808D ADVANCED M (Milling)
Horizontal panel, with Chinese keys
PPU160.3 Turning variant
Vertical panel, with English keys
SINUMERIK 808D ADVANCED T (Turning)
Vertical panel, with Chinese keys
Vertical panel, with English keys
SINUMERIK 808D ADVANCED M (Milling)
Vertical panel, with Chinese keys