
Chapter 2 Defining Add-On Instructions
Instruction Description
True This is simply the execution of the main logic routine.
False
In a ladder logic target routine, this entails placing an XIC before an instance of the instruction and
evaluating instruction results when the XIC is false.
In a Function Block target routine, this entails executing an instance of the instruction with the
EnableIn parameter set to zero (0).
Prescan Place the controller in Program mode, then place it in Run mode.
Postscan
With the controller configured for SFC Automatic Reset, place an instance of the instruction into the
Action of an SFC. Run the SFC such that this Action is executed and the SFC proceeds beyond the step
that is associated with this Action.
You can apply source protection to your Add-On Instruction to protect your
intellectual property or prevent unintended edits of a validated source.
With source protection you can limit a user of your Add-On Instruction to
read-only access or prevent access to the internal logic or local tags used by the
instruction. You can protect the use and modification of your instructions with a
source key file when you distribute them.
You have two options when using source protection.
• Source Protected
Users without the source key cannot view any routine or local tags, or make
any edits to the Add-On Instruction. Select this option if you want to
protect the source definition of an Add-On Instruction from the view of a
user. This may be due to the proprietary nature of the algorithms or for
strict revision control.
• Source Protected with Viewable Option
Users without the source key can view all components of the Add-On
Instruction including its logic and local tags, but are prevented from making
any edits to the instruction.
Tip: Apply source protection before generating an instruction signature for your Add-On Instruction definition.
You will need the source key to create a signature history entry.
When source protection is enabled, you can still copy the instruction signature or signature history, if they
exist.
Enable the source protection feature
If source protection is unavailable and not listed in your menus, you can enable it
by using the RS5KSrcPtc.exe tool on your installation CD.
Defining source protection
for an Add-On Instruction
60 Rockwell Automation Publication 1756-PM010F-EN-P - October 2014
Commenti su questo manuale