EasyManua.ls Logo

Siemens SICLOCK TC 400

Siemens SICLOCK TC 400
134 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Configuration Tool
7-56
© Siemens AG 2007 All Rights Reserved
SICLOCK
®
TC 400
Number Unique, three-part parameter number, e.g. 000.005.00012
Parameter Associated values are grouped under a parameter.
Parameter lists are shown with square brackets after the parameter name,
e.g. "Leap second[20]".
Entry The individual values of a parameter are each called an entry of a parameter.
Note
Entries can be edited individually, but not read or written individually. The
entire parameter is always read or written with all its entries. If a list is being
considered, the entire list is read or written.
Value Numeric value or setting of the parameter entry
Write protection – the parameter cannot be edited
The current authorization level does not permit write access to this parame-
ter.
Unrestricted access
The current authorization level permits reading, editing and writing of the
parameter
Unrestricted access without upload – critical operating parameter
The current authorization level permits reading, editing and writing of the
parameter
To protect such parameters in the device, the parameter must be explicitly
selected and written individually. See Reading parameters / writing
parameters / resetting parameters to factory settings (Section 7.3.4).
Display parameters
Display parameters can only be read and are typically actual values.
To refresh the actual value display, activate the automatic update .
Parameter info Information about the selected parameter
Information about the selected parameter/entry is displayed here.
Table 7-3 Operator options and displays in the Parameters tab
Field/Button Meaning/Instruction
Note
If the configuration tool is not authorized or operated with a low authorization level,
not all parameters are displayed. This restriction affects, for example, settings
under "System".
The access rights also change with the authorization level.

Table of Contents