Configuring the safety sensor
Leuze electronic RSL 430 76
9 Configuring the safety sensor
To start up the safety sensor in your application, the safety sensor must be individually adapted using the
software. All configuration data is defined using the configuration and diagnostics software.
General procedure for configuring safety sensor
Ä Assessing the risk
• The system has been determined and its boundaries defined.
• The safety sensor has been selected as the safety component.
• The type of guarding has been determined (danger zone guarding, point of operation guarding, access
guarding).
Ä Calculating safety distance
Shape and size of the protective and warning fields
Ä Configuring the safety sensor
• Configuration and diagnostics software (see chapter 4 "Configuration and diagnostic software Sen-
sorStudio")
• Determine the configuration project (see chapter 9.3 "Determine the configuration project")
• Configure the protective function (see chapter 9.4 "Configuring protective function")
Ä Checking function (see chapter 11 "Testing")
9.1 Defining safety configuration
WARNING
Serious accidents caused by incorrect safety configuration!
The protective function of the safety sensor is only ensured if the safety sensor is correctly con-
figured for the intended application.
Ä Allow only competent persons to perform safety configuration.
Ä Select the safety configuration so that the safety sensor can be used as intended (see chap-
ter 2.1 "Intended use").
Ä Select the protective field dimensions and contours according to the safety distance calcu-
lated for the application (see chapter 7.1.1 "Calculation of safety distanceS").
Ä Select the parameters of the safety configuration according to your risk analysis.
Ä After start-up, check the function of the safety sensor (see chapter 11.1 "Before the initial
start-up and following modifications").
WARNING
Additional protection against manipulation when the monitoring time is increased!
If the monitoring time is increased to above 5s or if manipulation protection is deactivated, the
system operator must introduce other measures to prevent manipulation.
Ä For example, make sure that the distance range in which manipulation is possible cannot be
accessed by personnel under normal operating conditions.