8-6 Event Logs ............................................................................................................................. 8-48
8-6-1 Introduction............................................................................................................................... 8-48
8-6-2 Detailed Information on Event Logs.......................................................................................... 8-49
8-6-3 Controller Events (Controller Errors and Information) .............................................................. 8-54
8-6-4 User-defined Events (User-defined Errors and Information) .................................................... 8-55
8-7 Changing Event Levels ......................................................................................................... 8-62
8-7-1 Applications of Changing Event Levels..................................................................................... 8-62
8-7-2 Events for Which the Event Level Can Be Changed................................................................. 8-62
8-7-3 Procedure to Change an Event Level ....................................................................................... 8-62
Section 9 Backup Functions
9-1 The Backup Functions ............................................................................................................ 9-3
9-1-1 Applications of Backup Functions............................................................................................... 9-3
9-1-2 Examples of Operating Procedures for the Backup Functions ................................................... 9-3
9-1-3 Data That Is Backed Up.............................................................................................................. 9-6
9-1-4 Types of Backup Functions......................................................................................................... 9-7
9-1-5 Relation Between the Different Types of Backup Functions and Data Groups........................... 9-9
9-1-6 Applicable Range of the Backup Functions .............................................................................. 9-10
9-2 SD Memory Card Backups.................................................................................................... 9-12
9-2-1 Backup (Controller to SD Memory Card).................................................................................. 9-13
9-2-2 Restore (SD Memory Card to Controller) ................................................................................. 9-18
9-2-3 Verify (between Controller and SD Memory Card) ................................................................... 9-20
9-3 Disabling Backups to SD Memory Cards ............................................................................ 9-25
9-4 Automatic Transfers from SD Memory Cards ..................................................................... 9-26
9-5 Sysmac Studio Controller Backups..................................................................................... 9-28
9-5-1 Backup (Controller to Computer) .............................................................................................. 9-29
9-5-2 Restore (Computer to Controller) ............................................................................................. 9-30
9-5-3 Verify (between Controller and Computer) ............................................................................... 9-31
9-6 Importing and Exporting Sysmac Studio Backup File Data .............................................. 9-32
9-7 Sysmac Studio Variable and Memory Backup Functions.................................................. 9-33
9-7-1 Applicable Data for Sysmac Studio Variable and Memory Backup Functions.......................... 9-33
9-7-2 Using Sysmac Studio Variable and Memory Backup Functions ............................................... 9-33
9-7-3 Compatibility between CPU Unit Models.................................................................................. 9-34
9-8 Backup Functions When EtherCAT Slaves Are Connected............................................... 9-36
9-8-1 Backed Up EtherCAT Slave Data ............................................................................................. 9-36
9-8-2 Backup Support Depending on the Controller Status ............................................................... 9-36
9-8-3 Conditions for Restoring EtherCAT Slave Data ........................................................................ 9-37
9-8-4 EtherCAT Slaves for Which You Can Back Up Data ................................................................. 9-38
9-9 Backup Functions When EtherCAT Slave Terminals Are Connected............................... 9-40
9-9-1 Backing Up Data in an EtherCAT Slave Terminal ..................................................................... 9-40
9-9-2 Backup Support Depending on the EtherCAT Slave Terminal Status....................................... 9-41
9-9-3 Conditions for Restoring EtherCAT Slave Terminal Data.......................................................... 9-41
9-10 Backup Functions When CJ-series Units Are Connected ................................................. 9-42
9-10-1 Backed Up CJ-series Unit Data ................................................................................................ 9-42
9-10-2 Backup Support Depending on the Controller Status............................................................... 9-42
9-10-3 Conditions for Restoring CJ-series Unit Data ........................................................................... 9-42
9-11 Backup-related Files ............................................................................................................. 9-44
9-11-1 Types of Backup-related Files................................................................................................... 9-44
9-11-2 Specifications of a Backup File................................................................................................. 9-45
9-11-3 Specifications of a Restore Command File............................................................................... 9-45
9-11-4 Specifications of an Automatic Transfer Command File ........................................................... 9-47
9-11-5 Specifications of a Controller Verification Results File.............................................................. 9-49
9-11-6 Specifications of an EtherCAT Verification Results File............................................................ 9-49
9-11-7 Specifications of an EtherCAT Slave Terminal Verification Results File ................................... 9-51
9-11-8 Specifications of CJ-series Unit Verification Results File.......................................................... 9-52