Installation and Authorization
S7-GRAPH for S7-300/400 Programming Sequential Control Systems
C79000-G7076-C526-01
2-5
Backup
If a backup of your hard disk contains copies of your authorizations, there is a risk
that the valid, installed authorizations will be overwritten and destroyed when you
write the backup data to the hard disk.
To avoid loss of the authorization by overwriting an authorized system with a
backup:
• Either remove all authorizations before you make your backup
• Or exclude the authorizations from the backup.
Hard Disk Optimization
If you use an optimization program that allows fixed blocks to be moved on the
hard disk, you should only use this function after first transferring all authorizations
from the hard disk back to the authorization diskette.
Defective Sectors
After installing an authorization, a special cluster is created on the hard disk that is
sometimes indicated as "defective". Do not attempt to repair this or you will
probably destroy the authorization.
Read-Only and Copy Protection
The authorization diskette must not be made read-only.
Files on the authorization diskette can be copied to a different drive (for example
hard disk) and used there. It is, however, not possible to install an authorization
with the copied data; this is only possible with the original authorization diskette.
Permitted Drives
The authorization can only be installed on a hard disk drive. If you have a
compressed drive (for example DBLSPACE), you can install on its host drive.
The authorization tool prevents installation on unsuitable drives.
Location
When you install an authorization, the files are transferred to the protected folder
"AX NF ZZ" with the attributes "system" and "hidden".
• Do not change these attributes.
• The files must not be modified or deleted.