GuardLogix 5580/5380 Manual Guide
Topics covered
GuardLogix 5580/5380 Manual Guide
Topics covered
Activities including installation, adjustments, putting into service, use, assembly, disassembly, and maintenance are required to be carried out by suitably
trained personnel in accordance with applicable code of practice.
If this equipment is used in a manner not specified by the manufacturer, the protection provided by the equipment may be impaired.
In no event will Rockwell Automation, Inc. be responsible or liable for indirect or consequential damages resulting from the use or application of this
equipment.
The examples and diagrams in this manual are included solely for illustrative purposes. Because of the many variables and requirements associated with
any particular installation, Rockwell Automation, Inc. cannot assume responsibility or liability for actual use based on the examples and diagrams.
No patent liability is assumed by Rockwell Automation, Inc. with respect to use of information, circuits, equipment, or software described in this manual.
Reproduction of the contents of this manual, in whole or in part, without written permission of Rockwell Automation, Inc., is prohibited.
Throughout this manual, when necessary, we use notes to make you aware of safety considerations.
WARNING: Identifies information about practices or circumstances that can cause an explosion in a hazardous environment,
which may lead to personal injury or death, property damage, or economic loss.
ATTENTION: Identifies information about practices or circumstances that can lead to personal injury or death, property
damage, or economic loss. Attentions help you identify a hazard, avoid a hazard, and recognize the consequence.
IMPORTANT Identifies information that is critical for successful application and understanding of the product.
These labels may also be on or inside the equipment to provide specific precautions.
SHOCK HAZARD: Labels may be on or inside the equipment, for example, a drive or motor, to alert people that dangerous
voltage may be present.
BURN HAZARD: Labels may be on or inside the equipment, for example, a drive or motor, to alert people that surfaces may
reach dangerous temperatures.
ARC FLASH HAZARD: Labels may be on or inside the equipment, for example, a motor control center, to alert people to
potential Arc Flash. Arc Flash will cause severe injury or death. Wear proper Personal Protective Equipment (PPE). Follow ALL
Regulatory requirements for safe work practices and for Personal Protective Equipment (PPE).
Identifies information that is useful and can help to make a process easier to do or easier to understand.
Preface
About This Publication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Download Firmware, AOP, EDS, and Other Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Summary of Changes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Additional Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Chapter 1
Safety Integrity Level (SIL) SIL Certification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Concept SIL 2 and SIL 3 Safety Application Differences . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Proof Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
GuardLogix Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Controller Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
System Reaction Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Contact Information if Device Failure Occurs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Chapter 2
Safety Signature Safety Signature Hierarchy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Aggregate Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
View Safety Signature Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Quick View Pane . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Safety Signature Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Logix Designer Compare Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Signature States. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Blue Signature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Black Signature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Gray Signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Archive Safety Signature Reports for Audit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Signature Authentication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Settings that Do Not Affect the Safety Signature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Programmatic Changes to the Safety Application Signature . . . . . . . . . . . . . . . . . . . 25
Chapter 3
GuardLogix Controller System GuardLogix 5580 Controller Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Primary Controller. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Safety Partner. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Chassis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Power Supply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Compact GuardLogix 5380 Controller Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Compact GuardLogix 5380 SIL 3 Controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Power Supply . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Network Communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
EtherNet/IP Network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
DeviceNet Safety Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Use of Human Machine Interfaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Precautions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Access to Safety-related Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Chapter 4
Safety I/O for the GuardLogix Typical Safety Functions of Safety I/O Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Control System Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Status Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Status Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
On-delay or Off-delay Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
SIL 2 and SIL 3 Considerations for Safety I/O Modules . . . . . . . . . . . . . . . . . . . . . . . . 38
Safety Considerations for Safety I/O Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Ownership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Safety I/O Configuration Signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Safety I/O Device Replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Input Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Output Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Safety I/O Configuration Variations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Chapter 5
CIP Safety Systems and Safety Unique Node Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Network Numbers Safety Network Numbers (SNN). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Routable CIP Safety System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Considerations for Assigning SNNs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
How SNNs Get to Safety Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
SNN Formats. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Time-based SNN Format and Assignment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Manual SNN Format and Assignment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
SNNs for Out-of-box Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Chapter 6
Characteristics of Safety Tags, Safety Task. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
the Safety Task, and Safety Safety Task Period . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Safety Task Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
Programs
Safety Task Execution Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Safety Programs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Safety Routines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Safety Tags. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Valid Data Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Scope. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Safety Signature Elements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Chapter 7
Safety Applications Safety Concept Assumptions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Basics of Application Development and Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Commissioning Lifecycle. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Specification of the Safety Function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Create the Project. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
Test the Application Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
4 Rockwell Automation Publication 1756-RM012G-EN-P - November 2023
Table of Contents
Chapter 8
Safety Programming Programming Restrictions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Considerations Safety Add-On Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Program Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Produced/Consumed Safety Tags . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Configure the SNN for a Peer Safety Controller Connection. . . . . . . . . . . . . . . . . . 81
Produce a Safety Tag . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Consume Safety Tag Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Safety Tag Mapping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Standard Tags in Safety Routines (Tag Mapping) . . . . . . . . . . . . . . . . . . . . . . . . . 88
Restrictions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Create Tag Mapping Pairs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Monitor Tag Mapping Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Custom Tag Initialization During Prescan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Chapter 9
Monitor Status and Handle Faults Status Indicators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Monitor System Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
CONNECTION_STATUS Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Input and Output Diagnostics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
I/O Device Connection Status. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
De-energize to Trip System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Get System Value (GSV) and Set System Value (SSV) Instructions . . . . . . . . . . . . 97
Safety Faults. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Nonrecoverable Controller Faults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Nonrecoverable Safety Faults in the Safety Application . . . . . . . . . . . . . . . . . . . 97
Recoverable Safety Faults in the Safety Application . . . . . . . . . . . . . . . . . . . . . . 98
View Faults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Fault Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Develop a Fault Routine for Safety Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Use GSV/SSV Instructions in a Safety Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Safety Partner Fault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Rockwell Automation Publication 1756-RM012G-EN-P - November 2023 5
Table of Contents
Appendix A
Safety Instructions Safety Instructions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Appendix B
Create and Use a Create an Add-On Instruction Test Project. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Safety Add-On Instruction Create a Safety Add-On Instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Generate the Instruction Signature. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
The Safety Instruction Signature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
SIL 2 or SIL 3 Add-On Instruction Qualification Test . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Safety Validate Add-On Instructions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
Create Signature History Entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Export and Import the Safety Add-On Instruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Verify Safety Add-On Instruction Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Test the Application Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Project Validation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Safety Assessment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Appendix C
Reaction Times Connection Reaction Time Limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Specify the Requested Packet Interval (RPI) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
View the Maximum Observed Network Delay. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
System Reaction Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Safety Task Reaction Time. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Safety Task Period and Safety Task Watchdog. . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Logix System Reaction Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Simple Input-logic-output Chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Logic Chain Using Produced/Consumed Safety Tags . . . . . . . . . . . . . . . . . . . . . . 121
Factors That Affect Logix Reaction-time Components . . . . . . . . . . . . . . . . . . . . . . . . 121
Configure Guard I/O Input Module Delay Time Settings . . . . . . . . . . . . . . . . . . . . 122
Configure or View the Input and Output Safety Connection Reaction Time Limits. .
123
Configure the Safety Task Period and Watchdog . . . . . . . . . . . . . . . . . . . . . . . . . 124
Access Produced/Consumed Tag Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Appendix D
Checklists for GuardLogix Checklist for GuardLogix Controller System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Safety Applications Checklist for Safety Inputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Checklist for Safety Outputs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Checklist to Develop a Safety Application Program . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Appendix E
GuardLogix Systems Safety Data Useful Life . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Safety Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Product Failure Rates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Appendix F
RSLogix 5000 Software, Diverse Input Fault Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Version 14 and Later, Safety I/O Status Fault Latching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Application Instructions
Appendix G
History of Changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Notes:
About This Publication This manual describes the GuardLogix® 5580 and Compact GuardLogix 5380 controller
systems, which are type-approved and certified for use in safety applications as detailed in
SIL Certification on page 11.
Use this manual for the development, operation, and maintenance of a GuardLogix 5580 or
Compact GuardLogix 5380 controller-based safety system that uses the Studio 5000 Logix
Designer® application. Read and understand the safety concepts and the requirements that
are presented in this manual and familiarize yourself with applicable standards (for example
IEC 61508, IEC 62061, IEC 61511, and ISO 13849-1) before operating a GuardLogix 5580 or
Compact GuardLogix 5380 controller-based safety system.
Download Firmware, AOP, Download firmware, associated files (such as AOP, EDS, and DTM), and access product release
notes from the Product Compatibility and Download Center at rok.auto/pcdc.
EDS, and Other Files
Summary of Changes This publication contains the following new or updated information. This list includes
substantive updates only and is not intended to reflect all changes.
Topic Page
Added new chapter about the safety signature: Chapter 2, Safety Signature 17
Added catalog number 1756-L85ES 27
Updated text and screen shot for I/O replacement options 42
Added new section, Safety Signatures Elements, to Chapter 6 61
Added Safety Signature Report to safety revalidation considerations 70
Added requirement to initialize safety critical AOI tag values in AOI prescan logic 79
Updated safety instructions throughout Appendix A 105
Added information about the safety signature element for AOIs 113
Terminology In this publication, the terms ‘GuardLogix controller’ or ‘GuardLogix system’ apply to both
GuardLogix 5580 and Compact GuardLogix 5380 controllers unless otherwise noted.
Additional Resources These documents contain additional information concerning related products from Rockwell
Automation. You can view or download publications at rok.auto/literature.
Resource Description
ControlLogix Chassis Installation Instructions, Provides information on how to install various ControlLogix® chassis and
publication 1756-IN621 power supplies.
Compact GuardLogix 5380 SIL 2 Controllers Provides information on how to install Compact GuardLogix 5380 SIL 2
Installation Instructions, publication 5069-IN014 controllers.
Hardware Installation
Compact GuardLogix 5380 SIL 3 Controllers Provides information on how to install Compact GuardLogix 5380 SIL 3
Installation Instructions, publication 5069-IN023 controllers.
GuardLogix 5580 Controllers Installation Instructions, Provides information on how to install GuardLogix 5580 controllers.
publication 1756-IN048
1756 ControlLogix and GuardLogix Controllers Lists product specifications and certifications for ControlLogix and
Technical Data, publication 1756-TD001 GuardLogix controllers.
Technical Data CompactLogix 5380 and Compact GuardLogix 5380 Lists product specifications and certifications for CompactLogix™ 5380
Controllers Specifications Technical Data, controllers and Compact GuardLogix 5380 controllers.
publication 5069-TD002
EtherNet/ Network Devices User Manual, Describes how to configure and use EtherNet/IP™ devices to communicate on
publication ENET-UM006 the EtherNet/IP network.
Describes basic Ethernet concepts, infrastructure components, and
Networks Ethernet Reference Manual, ENET-RM002 infrastructure features.
DeviceNet Network Configuration User Manual, Provides information on how to use the 1756-DNB module in a Logix 5000™
publication DNET-UM004 control system.
Resource Description
System Security Design Guidelines Reference Manual, Rockwell guidance
Provides on how to conduct security assessments, implement
Design considerations Automation products in a secure system, harden the control system,
publication SECURE-RM001 manage user access, and dispose of equipment.
Logix 5000 Controllers Common Procedures Provides information on programming Logix 5000 controllers, including how
Programming Manual, publication 1756-PM001 to manage project files, organize tags, program and test routines, and handle
faults.
Logix 5000 Controllers Add-On Instructions Provides information on how to create and use standard and safety Add-On
Programming tasks and procedures Programming Manual, publication 1756-PM010 Instructions in Logix applications.
Logix 5000 Controllers General Instructions Reference Provides information on the Logix 5000 instruction set that includes general,
Manual, publication 1756-RM003 motion, and process instructions.
GuardLogix Safety Application Instruction Set Provides information on the GuardLogix Safety Application instruction set.
Reference Manual, publication 1756-RM095
Provides information on how to install, configure, program, and use
ControlLogix 5580 and GuardLogix 5580 Controllers ControlLogix 5580 controllers and GuardLogix 5580 controllers in Studio 5000
User Manual, publication 1756-UM543 Logix Designer® projects.
CompactLogix 5380 and Compact GuardLogix 5380 Provides information on how to install, configure, program, and use
User Manual, publication 5069-UM001 CompactLogix 5380 controllers and Compact GuardLogix 5380 controllers.
Logix 5000 controllers
Provides guidelines on how to replace these controllers:
Replacement Guidelines: Logix 5000 Controllers • Replace a ControlLogix 5560 or 5570 controller with a ControlLogix 5580
controller
Reference Manual, publication 1756-RM100
• Replace a CompactLogix 5370 L3 controller with a CompactLogix 5380
controller
Compact 5000 I/O Digital Modules User Manual, Describes how to use Compact 5000™ I/O digital modules in Logix 5000
publication 5069-UM004 control systems.
Guard I/O DeviceNet Safety Modules User Manual, Provides information on how to use Guard I/O™ DeviceNet® safety modules.
publication 1791DS-UM001
Guard I/O EtherNet/IP Safety Modules User Manual, Provides information on how to use Guard I/O™ EtherNet/IP safety modules.
I/O publication 1791ES-UM001
CompactBlock Guard I/O 2-Channel Incremental Describes the CompactBlock™ Guard I/O 2-Channel incremental encoder
Synchronous Serial Interface Encoder Module, serial synchronous interface module in a dual feedback version.
publication 1791ES-UM002
POINT Guard I/O Safety Modules User Manual, Provides information on how to install and use POINT Guard I/O™ modules.
publication 1734-UM013
Kinetix 5700 Safe Monitor Functions Safety Reference Describes the integrated stopping functions and safe monitoring functions
Manual, publication 2198-RM001 with a Logix 5000 controller and Kinetix® 5700 servo drives.
Kinetix 5500 Servo Drives User Manual, Provides information on how to install and use Kinetix 5500 servo drives.
publication 2198-UM001
Kinetix 5700 Servo Drives User Manual, Provides information on how to install and use Kinetix 5700 servo drives.
publication 2198-UM002
PowerFlex 527 Adjustable Frequency AC Drive Provides information on how to install and use PowerFlex® 527 drives.
Drives User Manual, publication 520-UM002
PowerFlex 755/755T Integrated Safety - Safe Torque Describes how to use PowerFlex® 755 drives and PowerFlex® 755T drive
Off Option Module User Manual, publication 750-UM004 products in safety integrity level (SIL) 3, Performance Level (PL) PLe, Category
(CAT) 3 applications.
Describes how to use PowerFlex 755 drives and PowerFlex 755T drive
PowerFlex 755/755T Integrated Safety Functions products in safety applications up to safety integrity level 3 (SIL 3),
Option Module User Manual, publication 750-UM005 Performance Level e (PLe), category 4.
PowerFlex 755 On-Machine Drive User Manual, Provides information on how to install, connect, and maintain the
publication 750-UM006 PowerFlex 755 On-Machine™ drives.
UL Standards Listing for Industrial Control Products, Assists original equipment manufacturers (OEMs) with construction of panels,
to help make sure that they conform to the requirements of Underwriters
publication CMPNTS-SR002 Laboratories.
Industrial Components Preventive Maintenance, Provides a quick reference tool for Allen-Bradley® industrial automation
Enclosures, and Contact Ratings Specifications, controls and assemblies.
publication IC-TD002
Standards and certifications Designed to harmonize with NEMA Standards Publication No. ICS 1.1-1987 and
Safety Guidelines for the Application, Installation, and provides general guidelines for the application, installation, and maintenance of
Maintenance of Solid-state Control, publication SGI-1.1 solid-state control in the form of individual devices or packaged assemblies
incorporating solid-state components.
Industrial Automation Wiring and Grounding Provides general guidelines for installing a Rockwell Automation industrial
Guidelines, publication 1770-4.1 system.
Product Certifications website, Provides declarations of conformity, certificates, and other certification
rok.auto/certifications. details.
TÜV Rheinland has approved GuardLogix 5580 and Compact GuardLogix 5380 controller
systems for use in safety-related applications where the de-energized state is considered to
be the safe state.
All I/O examples in this manual are based on achieving de-energization as the safe state for
typical machine safety and emergency shutdown (ESD) systems.
IMPORTANT As the system user, you are responsible for these items:
• The setup, SIL rating, and validation of any sensors or actuators that are
connected to the GuardLogix system
• Project management and functional test
• Access control to the safety system, including password handling
• Programming the application and the device configurations in
accordance with the information in this safety reference manual and
these publications:
• ControlLogix 5580 and GuardLogix 5580 Controllers User Manual,
publication 1756-UM543
• CompactLogix 5380 and Compact GuardLogix 5380 User Manual,
publication 5069-UM001
When applying Functional Safety, restrict access to qualified, authorized personnel who are
trained and experienced.
Use the Studio 5000 Logix Designer® application to create programs for GuardLogix 5580 and
Compact GuardLogix 5380 controllers. Only the safety task, not standard tasks, can be used for
safety functions.
A SIL 2 GuardLogix 5580 controller requires only the primary controller, and a SIL 3 GuardLogix
5580 controller requires both the primary controller and the safety partner. See GuardLogix
5580 Controller Hardware on page 27.
Compact GuardLogix 5380 controllers are also capable of SIL 2 and SIL 3 support depending on
the catalog number. See Compact GuardLogix 5380 Controller Hardware on page 29.
IMPORTANT The safety task can contain a number of safety functions. For a
particular function to be SIL 3, the entire chain of devices and
programming from the sensor to the actuator must be SIL 3. Be careful
that you do not use a SIL 2 input signal for a safety function that
requires SIL 3.
Proof Tests IEC 61508 requires you to perform various proof tests of the equipment that is used in the
system. Proof tests are performed at user-defined times. For example, proof tests can be once
a year, once every 15 years, or whatever time frame is appropriate.
GuardLogix 5580 and Compact GuardLogix 5380 controllers have a useful life of 20 years, no
proof test required. Other components of the system, such as safety I/O devices, sensors, and
actuators can have different useful life times.
IMPORTANT Your specific applications determine the time frame for the useful life.
GuardLogix Architecture This section provides examples of SIL 3 and SIL 2 systems, including the following:
• The overall safety function
• The GuardLogix portion of the overall safety function
• How other devices that operate outside the safety function, such as HMI, are connected
Safety System
Safety Network
Safety System
Safety
Controller
Stratix 5400 Switch
EtherNet/IP Adapter
I/O Modules Actuator
Safety I/O Modules
Sensor
Safety Network
Controller Specifications These publications list the specifications and the agency certifications for the products:
• ControlLogix Controllers Technical Data, publication 1756-TD001
• CompactLogix 5380 Controllers Specifications Technical Data, publication 5069-TD002
System Reaction Time The system reaction time is the worst-case time from a safety-related event as input to the
system or as a fault within the system, until the time that the system is in the safe state.
This worst-case definition includes the effects of asynchronous communications, and multiple
potential faults, occurring within the system. Actual reaction times can be faster.
Sensor Reaction Input Reaction Safety Task Output Reaction Actuator
Time Time Reaction Time Time Reaction Time
Each of the reaction times is dependent on factors such as the type of I/O device and
instructions that are used in the program.
For more information about reaction time calculations, see Appendix on page 117.
Contact Information if If you experience a failure with any device, contact Rockwell Automation Technical Support:
Rok.auto/knowledgebase
Device Failure Occurs
Your local Rockwell Automation sales office or Allen-Bradley distributor can also initiate the
following actions:
• Return the device to us so the failure is logged for the catalog number that is affected,
and a record is made of the failure.
• Request a failure analysis (if necessary) to try to determine the cause of the failure.
Notes:
For more information about how to generate, copy, or delete the safety signature, see
Commissioning Lifecycle on page 65.
Safety Signature Hierarchy The following image shows an example of the safety signature hierarchy:
• A signature with ID and time stamp exists for each element in the hierarchy.
• Expand the safety signature at the top to view its underlying elements.
• Expand a parent element to view its underlying child elements.
Figure 4 - Safety Signature Hierarchy
Safety Signature
Aggregate Signatures
Safety elements that include a collection of tags and parameters have aggregate signatures.
An aggregate signature represents the validity of all tags and parameters within the element.
If one of the preceding elements has a collection with no members, such as no controller-
scoped safety tags, the aggregate signature value appears as 64 zeros.
View Safety Signature In the Logix Designer application, there are multiple places where you can view safety
signature elements:
Elements
• Quick View pane
• Safety Signature report
• Compare Tool
To display all 64 characters of the safety signature ID in a tooltip, hover over the ID
in the Quick View pane.
From the tooltip, you can copy the signature ID.
Signature States A signature can have three states as indicated by its color: blue, black, or gray.
Blue Signature
A signature appears blue in these scenarios:
• After the first generation of the safety signature
• After any subsequent generation of the safety signature to indicate a change to a safety
element or one of its child elements
EXAMPLE The Safety Signature report in Figure 8 shows blue signatures as a result
of the following workflow:
1. Generate a safety signature for the first time.
2. Create safety tag in the S_DE1 program.
3. Generate the safety signature a subsequent time.
4. Generate the Safety Signature report.
The creation of the safety tag in step 2 results in blue signatures for these
elements:
• Parameters and Local Tags child element
• S_DE1, T01_Safety, and Safety Application parent elements
Parent Elements
Child Element
Black Signature
A signature appears black after any subsequent generation of the signature when no change
occurred to the safety element or any of its child elements.
Gray Signature
A gray signature is an unknown signature. An unknown signature occurs when the Logix
Designer application cannot verify that the signature ID matches the associated value.
Unknown signatures cannot be used for certification and must be updated.
A signature appears gray when you perform any of the following workflows:
• Delete the safety signature
• Create a controller project from an imported project with an existing safety signature
• Copy a safety signature element with an existing signature
Archive Safety Signature You can compare an original Safety Signature report to an updated Safety Signature report to
show which elements changed and which elements did not change for auditing purposes. If
Reports for Audit your validation plan does not require revalidation of unchanged elements, your certification
effort can be reduced, such as in these scenarios:
• You want to migrate a validated safety application to a future release without
revalidating the entire application.
• You want to add or update some elements of a validated safety application without
revalidating the unchanged elements.
• You want to copy some validated elements to another project without revalidating the
copied elements.
Safety Signature reports are archived as .htm files in the following default directory:
Signature Authentication If the Logix Designer application cannot authenticate the signature for an element, the
following occurs:
• A warning appears in the Errors pane below the Controller Organizer.
• No signature is shown for the element in the Quick View pane.
EXAMPLE If you copy a main routine, but the routine was changed before the
copy, warnings appear to indicate that the signature could not be
authenticated (Figure 9).
No signature appears for the copied routine in the Quick View pane
(Figure 10).
Figure 9 - Signature Authentication Failed—Warning
Settings that Do Not Affect In the Logix Designer application, version 36 or later, you can make the following changes to a
safety project with no effect on the safety signature:
the Safety Signature
• Change the controller slot number on a GuardLogix 5580 controller
Programmatic Changes to If there are no changes to your safety application, then the safety application signature and all
of its underlying elements remain constant across software and firmware releases with the
the Safety Application following possible exceptions:
Signature • You update the controller with a firmware revision that contains a change to the offline
compiler or internal signature algorithm. These changes can trigger a change to the
safety signature. These types of changes are infrequent.
• You use the copy/paste or import function in a way that causes an internal difference in
a component. For example, if you copy a safety routine from Project1 to Project2 and
TagA is program-scoped in Project1, but controller-scoped in Project2, then the safety
signature for the routine changes.
Unlike the safety application signature, the controller safety signature always changes with
any firmware release change, so that you complete some validation testing at the functional
controller level, even if no changes were made to the safety project.
Figure 11 - Controller and Safety Application Signatures
Controller
Safety Signature
Application
Safety Signature
Notes:
See Additional Resources on page 9 to find installation information for GuardLogix® 5580 and
Compact GuardLogix 5380 controllers.
GuardLogix 5580 The GuardLogix controller consists of a primary controller (1756-L8xES), which can be used
alone in SIL 2 applications, and a safety partner (1756- L8SP), which is added to create the SIL
Controller Hardware 3-capable controller.
Both the primary controller and safety partner perform power-up and runtime functional-
diagnostic tests of all safety-related components in the controller.
• Primary controller that is used without a safety partner is up to SIL 2.
• Primary controller that is used with a safety partner is up to SIL 3.
Controller Cat. No.
1756-L81ES, 1756-L82ES, 1756-L83ES, 1756-L84ES, 1756-L8SP, 1756-L81ESK,
GuardLogix 5580 controller
1756-L82ESK, 1756-L83ESK, 1756-L84ESK, 1756-L85ES(1), 1756-L8SPK
GuardLogix-XT™ controllers 1756-L81EXTS, 1756-L82EXTS, 1756-L83EXTS, 1756-L84EXTS, 1756-L8XTSP
(1) Supported by Studio 5000 Logix Designer® version 36 later.
For the most current list of GuardLogix controller and safety I/O devices certified series and
firmware revisions, see the safety certificates at https://rok.auto/certifications.
Firmware revisions are available from the Rockwell Automation Product Compatibility and
Download Center (PCDC) support website at
https://compatibility.rockwellautomation.com/Pages/home.aspx.
You can fill slots of a SIL 2 or SIL 3 system chassis that are not used by the GuardLogix SIL 2 or
SIL 3 system with other ControlLogix® 1756 modules. The module must be certified for low
voltage and EMC Directives.
To find certificates for the controllers and I/O modules, see https://rok.auto/certifications.
Primary Controller
The primary controller is the processor that performs standard and safety control functions
and communicates with the safety partner for safety-related functions in the GuardLogix
control system. The primary controller consists of a central processor, I/O interface, and
memory.
Safety Partner
To satisfy SIL 3 requirements, you must install a 1756-L8SP safety partner in the slot
immediately to the right of the primary controller. The safety partner is a co-processor that
provides 1oo2 architecture for safety-related functions in the system. The 1oo2 system does
not run degraded.
Be aware of the following types of fault scenarios:
• If the two processors disagree, the result is a major nonrecoverable fault, which
requires you to redownload the application.
• If the two processors cannot communicate, the result is a nonrecoverable safety fault,
which may require you to redownload the application.
For information about how to respond to nonrecoverable faults, see the following:
This manual links to Logix 5000 Controller and I/O Fault Codes,
publication, 1756-RD001; the file automatically downloads when you click
the link.
The primary controller configures the safety partner. Only one download of the user program
to the primary controller is required. The primary controller controls the operating mode of the
safety partner.
Chassis
The chassis provides the physical connections between modules and the 1756 GuardLogix
system. Any failure, though unlikely, would be detected as a failure by one or more of the
active components of the system. Therefore, the chassis is not relevant to the safety
discussion.
Power Supply
No extra configuration or wiring is required for SIL 2 or SIL 3 operation of the ControlLogix
power supplies. Any failure would be detected as a failure by one or more of the active
components of the GuardLogix system. Therefore, the power supply is not relevant to the
safety discussion.
Compact GuardLogix 5380 The Compact GuardLogix 5380 controller is a SIL 2 or SIL 3 capable controller that performs
standard and safety control functions for safety-related functions in the Compact GuardLogix
Controller Hardware control system.
Controller SIL Rating Cat. No.
5069-L306ERMS2, 5069-L306ERS2, 5069-L310ERMS2, 5069-L310ERS2,
5069-L320ERMS2, 5069-L320ERS2, 5069-L320ERS2K, 5069-L320ERMS2K,
5069-L330ERMS2, 5069-L330ERS2, 5069-L330ERS2K, 5069-L330ERMS2K,
SIL 2 5069-L340ERMS2, 5069-L340ERS2, 5069-L350ERMS2, 5069-L350ERS2,
5069-L350ERS2K, 5069-L350ERMS2K, 5069-L380ERMS2, 5069-L380ERS2,
Compact GuardLogix 5380 5069-L3100ERMS2, 5069-L3100ERS2
5069-L306ERMS3, 5069-L310ERMS3, 5069-L320ERMS3, 5069-L330ERMS3,
5069-L340ERMS3, 5069-L350ERMS3, 5069-L380ERMS3,
SIL 3 5069-L3100ERMS3, 5069-L320ERMS3K, 5069-L330ERMS3K,
5069-L350ERMS3K
IMPORTANT This equipment is supplied as open-type equipment for indoor use. It must be mounted within an enclosure that is
suitably designed for those specific environmental conditions that are present and appropriately designed to help
prevent personal injury resulting from accessibility to live parts.
The enclosure must have suitable flame-retardant properties to help prevent or minimize the spread of flame,
complying with a flame spread rating of 5VA or be approved for the application if nonmetallic. The interior of the
enclosure must be accessible only by the use of a tool.
For more information regarding specific enclosure type ratings that are required to comply with certain product
safety certifications, see:
• Compact GuardLogix 5380 SIL 2 Controllers Installation Instructions, publication 5069-IN014
• Compact GuardLogix 5380 SIL 3 Controllers Installation Instructions, publication 5069-IN023
For the most current list of GuardLogix controller and safety I/O devices certified series and
firmware revisions, see the safety certificates at https://rok.auto/certifications.
Firmware revisions are available from the Rockwell Automation Product Compatibility and
Download Center (PCDC) support website at
https://compatibility.rockwellautomation.com/Pages/home.aspx.
Expansion slots of the system bus can be populated with Compact 5000™ I/O expansion
modules that are certified to the Low Voltage and EMC Directives and populated per the
instructions that are listed under Power Supply.
To find certificates for the controllers and I/O modules, see https://rok.auto/certifications.
For information about how to respond to nonrecoverable faults, see the following:
This manual links to Logix 5000 Controller and I/O Fault Codes,
publication, 1756-RD001; the file automatically downloads when you click
the link.
The primary controller configures the safety partner. Only one download of the user program
to the primary controller is required. The primary controller controls the operating mode of the
safety partner.
Power Supply
For Functional Safety applications, SELV/PELV-listed power supplies are required for both
module power (MOD) and sensor actuator (SA) power.
IMPORTANT For more information on how to power the 5069 platform when a
CompactLogix™ or Compact GuardLogix Controller is present, see the
CompactLogix 5380 and Compact GuardLogix 5380 User Manual,
publication 5069-UM001.
EtherNet/IP Network
A GuardLogix 5580 or Compact GuardLogix 5380 controller can connect directly to an
EtherNet/IP™ network through the onboard Ethernet port and supports 10/100/1000 Mbps
network speeds. A separate Ethernet communication module is not required, but can be used
in the local chassis.
Contact your local Rockwell Automation sales office or Allen-Bradley distributor for other
communication interface modules available for use in the GuardLogix 5580 or Compact
GuardLogix 5380 controller system.
Controller A Controller B
EtherNet/IP Adapter
Compact I/O™
Peer-to-peer safety communication between two GuardLogix 5580 controllers in the same chassis is also possible via the
backplane.
1756-L84ES
1756-L8SP 1756-L84ES
DC INPUT DC INPUT
Backplane
SIL 3 SIL 2
Compact GuardLogix 5380 controllers connect directly to the EtherNet/IP network through the
onboard Ethernet ports. They also support 10/100/1000 Mbps network speeds. A local Ethernet
communication module is not used.
Figure 13 - Compact GuardLogix 5380 Peer-to-peer Communication via the EtherNet/IP Network
Stratix 5410 Switch
Controller A Controller B
EtherNet/IP Adapter
Compact I/O™
DeviceNet Network
Compact GuardLogix 5380 controllers can communicate with safety devices on a DeviceNet
network via a 1788-EN2DNR EtherNet/IP to DeviceNet linking device.
Figure 15 - Compact GuardLogix 5380 Controller with a DeviceNet Network
EtherNet/IP Network
1788 EtherNet-to-DeviceNet
Linking Device
DeviceNet Network
Use of Human Machine Follow these precautions and guidelines for HMI devices in SIL-rated GuardLogix systems.
Interfaces Precautions
You must exercise precautions and implement specific techniques on HMI devices. These
precautions include, but are not restricted to the following:
• Limited access and security
• Specifications, testing, and validation
• Restrictions on data and access
• Limits on data and parameters
For more information on how HMI devices fit into a typical SIL loop, see GuardLogix
Architecture on page 12.
Use sound techniques in the application software within the HMI and controller.
Reading data is unrestricted because reading doesn’t affect the behavior of the safety system.
However, the number, frequency, and size of the data being read can affect controller
availability. To avoid safety-related spurious trips, use good communication practices to limit
the impact of communication processing on the controller. Do not set read rates to the fastest
rate possible.
Writing Data in SIL-rated Systems
Writing data, or changing parameters, in a safety-related loop via a device that operates
outside the safety loop, such as HMI, is allowed only with the following restrictions:
• Only authorized, specially trained operators can write data in safety-related systems via
an HMI.
• The operator that writes data in a safety-related system via an HMI is responsible for
the effect of those changes in the safety loop.
• You must clearly document the variables that are to be written.
• You must use a clear, comprehensive, and explicit operator procedure to make safety-
related changes via an HMI.
• Writing data can be accepted in a safety-related system only if the following sequence
of events occurs:
a. The new value must be sent twice to two different standard tags. Both values must
not be changed with one command.
b. The two standard tags that receive the value from the HMI must be mapped into two
safety tags.
c. Safety-related code that executes in the controller, must check both safety tags for
equivalency and make sure that they are within range (boundary checks).
d. Both new variables must be read back and displayed on the HMI device. The HMI
display reads the safety tags that received the mapped tag values from the standard
tags.
e. Trained operators must visually check that both variables are the same and are the
correct value.
f. Trained operators must manually acknowledge that the values are correct on the HMI
display that sends a command to the safety logic, which allows the new values to be
used in the safety function. In every case, the operator must confirm the validity of
the change before they are accepted and applied in the safety loop.
Notes:
Safety I/O devices, like sensors and actuators, can be connected to safety input and output
modules. The GuardLogix controller monitors and controls the devices. For safety data, I/O
communication is performed through safety connections by using the CIP Safety™ protocol.
Safety logic is processed in the GuardLogix controller.
Typical Safety Functions of The following is treated as the safe state by safety I/O devices:
Safety I/O Devices • Safety outputs: OFF
• Safety input data to controller: OFF
Safety Network
Safety Status
Safety
Safety Output, OFF Input
Data
Use safety I/O devices for applications that are in the safe state when the safety output turns
OFF.
Diagnostics
Safety I/O devices perform self-diagnostics when the power is turned ON and periodically
during operation. If a diagnostic failure is detected, safety input data (to the controller) and
local safety outputs are set to their safe state (OFF).
Status Data
In addition to safety input and output data, safety I/O devices support status data to monitor
device and I/O circuit health. See the product documentation for your device for specific
product capabilities.
Status Indicators
The safety I/O devices include status indicators. For details on status indicator operation, see
the product documentation for your specific device.
SIL 2 and SIL 3 A difference between the safety integrity levels is that single-channel I/O devices are possible
for SIL 2, and dual-channel I/O devices are typically required for SIL 3.
Considerations for
Safety I/O Modules From a safety architecture perspective, one channel means that the hardware fault tolerance
(HFT) is zero. When the HFT is zero, there are guidelines that state that faults must be detected
and the safety function must be taken to a safe state within the process safety time. An
exception applies if the diagnostic test rate is 100 times the demand rate. If you use safety I/O
modules in single channel SIL 2 applications, consider the following:
• Input or output channel must be configured for Safety Pulse Test
• Process Safety Time greater than 600 ms (the typical safety I/O pulse test interval) or
the demand rate must be less than one demand per minute (for example, one per hour)
ControlLogix® digital safety input modules support single-channel SIL 2 (see preceding
considerations) and dual-channel SIL 3 safety input circuits. Because these modules are rated
for both SIL 2 and SIL 3 operation, you can mix SIL 2 and SIL 3 circuits on the same module.
Figure 16 shows how to wire SIL 2 safety circuits to Guard I/O™ safety input modules.
I0 I1 T0 T1
If you have two SIL 2 safety circuits, you can add a second as shown in Figure 17.
I0 I1 T0 T1
I0 I1 T0 T1
IMPORTANT The onboard pulse test outputs (T0…Tx) are typically used with field
devices that have mechanical contacts. If a safety device that has
electronic outputs is used (to feed safety inputs), they must have the
appropriate safety ratings.
Safety Considerations for You must commission all devices with a node or IP address and communication rate, if
necessary, before their installation on a safety network.
Safety I/O Devices
Ownership
One GuardLogix controller owns each safety I/O device in a GuardLogix system. Multiple
GuardLogix controllers and multiple safety I/O devices can be used without restrictions in
chassis or on networks. When a controller owns an I/O device, it stores the configuration data
that you define for that device. This configuration controls how the devices operate in the
system.
From a control standpoint, one controller controls safety output devices. One controller also
owns each safety input device. However, safety input data can be shared (consumed) by
multiple GuardLogix controllers.
The safety I/O configuration signature verifies that the device is configured as expected by the
safety application. The configuration signature consists of the following:
• Signature ID to represent the I/O module configuration
• The time and date that the module configuration was last applied
Figure 19 - Safety I/O Configuration Signature
For a GuardLogix controller to establish a connection to a safety I/O module, the configuration
signature in the GuardLogix controller must match the configuration signature in the safety I/O
module. The process of synchronizing the configuration signatures requires these steps:
1. Create a safety I/O module in a Logix Designer application project.
2. Configure the I/O module in the module profile.
3. Download the project to the GuardLogix controller.
Online changes to the module configuration change the configuration signature. When online
changes are applied, the GuardLogix controller downloads the configuration to the I/O module.
Offline changes to the I/O module configuration change the time and date. Once altered, the
time and date remain changed even if the configuration is returned to the current running
configuration. Offline changes to the time and date require one of these actions:
• Upload to keep the existing configuration.
• Download to push the new configuration to the I/O modules.
If a safety I/O module was previously configured in another location, the I/O module retains the
configuration signature from the previous location. When a GuardLogix controller and a safety
I/O module attempt to establish a safety connection, a mismatch of the configuration
signatures can cause the connection to fail. To clear the safety I/O module configuration and
enable the GuardLogix controller to download the module configuration to the safety I/O
module, you must reset ownership.
When using a third-party module, if you connect to a safety I/O device without a configuration
signature, you must verify that a valid configuration exists in the safety I/O device.
The electronic keying configuration affects the process for replacing safety I/O modules.
Carefully consider the implications of each of the following electronic keying options.
Keying Option Description I/O Replacement Considerations
Lets the installed device accept the key of the device that is defined in the
project when the installed device can emulate the defined device. With
Compatible Module, you can typically replace a device with another device
that has the following characteristics:
• Same catalog number To maintain the safety signature, the replacement module must meet
Compatible Module Compatible Module requirements.
• Same or higher major revision
• Minor revision as follows:
– If the major revision is the same, the minor revision must be the same
or higher.
– If the major revision is higher, the minor revision can be any number.
Indicates that the keying attributes are not considered when attempting to
communicate with a device. With Disable Keying, communication can
occur with a device other than the type specified in the project.
ATTENTION: Be cautious when using Disable Keying. If used incorrectly,
this option can lead to personal injury or death, property damage, or Many safety devices do not have a Disable Keying option.
Disable Keying economic loss. Disabled Keying is not recommended for safety applications.
We strongly recommend that you do not use Disable Keying.
If you use Disable Keying, you must take full responsibility for
understanding whether the device being used can fulfill the functional
requirements of the application.
• To maintain the safety signature, the replacement module must be
Exact Match.
Indicates that all keying attributes must match to establish
communication. If any attribute does not match precisely, communication After
• a firmware change, keying in the safety application must be
Exact Match updated. Updating cannot be done without removing the controller
with the device does not occur. safety signature. See Revalidation Considerations on page 70.
• Exact Match is often used to meet specific industry requirements.
Two options for I/O device replacement are available on the Safety tab of the Controller
Properties dialog box in the Studio 5000 Logix Designer® application:
• Only Allow Automatic Configuration When No Safety Signature Exists
• Always Allow Automatic Configuration
Figure 20 - Safety I/O Replacement Options
This option instructs the GuardLogix controller to configure a safety device when the safety
task does not have a safety signature, and the replacement device is in an out-of-box
condition with no safety network number.
If the controller has a safety signature, the GuardLogix controller automatically configures the
replacement safety I/O device if the following are true:
• The device already has the correct safety network number.
• The device electronic keying is correct.
• The node or IP address is correct.
To set the proper safety network number (SNN) when a controller safety signature exists, a
manual action is required to download the proper SNN. Go online to the GuardLogix or
CompactGuardLogix controller with the Studio 5000 Logix Designer® application, then open the
Module Properties dialog, General tab, and click the “…” button next to the Safety Network
Number. Use the Set button to write the SNN to the module manually. After the manual action,
the remainder of the configuration is automatically downloaded.
For detailed information, see the Replace a Safety I/O Device procedure in the user manual for
the controller:
• ControlLogix 5580 and GuardLogix 5580 Controllers User Manual,
publication 1756-UM543
• CompactLogix 5380 and Compact GuardLogix 5380 User Manual,
publication 5069-UM001
Always Allow Automatic Configuration
The GuardLogix controller attempts to configure a replacement safety I/O device automatically
if the device is in an out-of-box condition. (When a safety network number does not exist in
the replacement safety device, and the node number and I/O device keying matches the
configuration of the controller.)
Input Operation Some safety input modules, such as Bulletin 1732, 1734, and 1791, have safety inputs that can be
configured as single or dual (Equivalent or Complement) point operation types. The selected
type configures the safety module to view the inputs individually or as a pair:
• A single configuration is appropriate for single channel inputs or dual channel inputs
that are monitored by a dual channel safety instruction like the Dual Channel Stop (DCS).
• A dual configuration configures dual channel discrepancy checking to take place at the
module level. The channel data from the input module is sent to the GuardLogix
controller as either the safe state or energized state. For example, equivalent inputs are
either both low (0) or both high (1).
Figure 21 - Input Point Operation Types
IMPORTANT When inputs are configured for a dual point operation type and
monitored by dual channel safety instructions, the instruction is unable
to detect discrepancy faults.
The method of monitoring discrepancy has no impact on the safety rating. The main effect is
the availability of diagnostic information:
• Module level diagnostics—Status indicators, input status bit, and application code can
be written to message the I/O module to monitor 1 bit for a discrepancy fault.
• Dual channel instruction diagnostics—Fault codes include channel-specific discrepancy
and whether the cause of a discrepancy is a delay or a change in state to a specific
channel.
Some safety input modules, such as Bulletin 1756, 5069, and 5094, have no point operation
type. All inputs are treated as single.
Figure 22 - No Input Point Operation Types
Output Operation For output modules, sourcing safety outputs can be configured as point operation type single
or dual. The selected type configures the safety module to treat the outputs individually or as a
pair:
• A single configuration allows the outputs to turn on and off individually and to fault
independently.
• A dual configuration verifies that safety task logic operates both outputs as a pair. If
one output has a module fault, the other output goes to the safe state.
Figure 23 - Output Point Operation Types
Bipolar outputs have no configuration for point operation type and must operate as a sinking
sourcing pair.
IMPORTANT The point operation type affects the PFH safety rating of the module.
Safety I/O Configuration As the range of products using the CIP Safety protocol continues to expand, there are
variations to the typical safety I/O configuration steps. Product specific procedures and
Variations requirements can include:
• Reset of ownership
• Setting the safety network number (SNN)
• Configuration signature generation
• Request packet interval (RPI) limits
• Device-specific configuration settings
For more information, see the user manual for your I/O device.
The CIP Safety protocol is an end-node to end-node safety protocol. This configuration allows
the routing of CIP Safety messages to and from CIP Safety devices through non-certified
bridges, switches, and routers.
For detailed information of CIP Safety functionality, see the ODVA website at
https://www.odva.org.
Unique Node Reference A key element of the CIP Safety protocol is the concept of a Unique Node Reference (also
called Unique Node ID or UNID). Every CIP Safety device must have a UNID value that is
assigned to each CIP Safety-capable port.
IMPORTANT It is your responsibility to make sure that all UNIDs are unique within the
scope of all devices that could possibly communicate with each other.
Safety Network Numbers Communications within a control system travel over subnets that are interconnected with
bridging or routing components. Examples of subnets:
(SNN)
• The backplane of a chassis
• A bank of I/O modules
• An Ethernet subnet within a LAN
Rather than creating a UNID directly for each CIP Safety device, which can be prone to error in
a large system, each subnet has a unique SNN, and the UNID is created from the SNN + the
Node Address.
Routable CIP Safety System The example system in Figure 24 is not interconnected to another CIP Safety system through a
larger, plant-wide Ethernet backbone. This example system illustrates the extent of a routable
CIP Safety system.
1732ES-IB16
5069-L320ERS2
1769-L36ERMS
5069-OBV8S
1791ES-IB16
1756-L84ES
1756-L81ES
1756-EN2T
1756-L7SP
1756-DNB
1756-L71S
1732DS-IB6 1732DS-IBSXOBV4
Considerations for Assigning When you create a controller project, the Studio 5000 Logix Designer® application generates
an SNN value automatically whenever a new subnet contains CIP Safety devices:
SNNs
• Each CIP Safety-capable port on the controller is assigned an SNN.
• If a bridge or adapter device is in the I/O tree and a child CIP Safety device is added, the
subnet that is created by the bridge or adapter is assigned an SNN.
If the entire CIP Safety system consists of one controller project, these automatically
generated SNN values are sufficient.
If there are multiple controllers that must interact or access the same safety I/O, the CIP
Safety system designer must coordinate the SNN values between the separate project files.
The Studio 5000 Logix Designer application provides copy/paste access to the SNN
assignments to enable this coordination.
You can also choose to map out the entire routable system (perhaps for the entire plant), and
manually assign SNN values to each subnet. The Studio 5000 Logix Designer application
provides a manual entry method for assigning SNN values to enable this design methodology.
SNN_1 SNN_5
1732ES-IB16
5069-L320E RS2
1769-L36ERMS
5069-OBV8S
5069
Backplane:
SNN_4
1791ES-IB16
1756
1756-L84ES
1756-L81ES
1756-EN2T
1756-L7SP
1756-L71S
1756-DNB
Backplane:
SNN_2
SNN_3
1732DS-IB6 1732DS-IBSXOBV4
Figure 26 shows how the preceding example relates to the Compact GuardLogix® 5380
(catalog number 5069-L320ERS2) Controller Organizer I/O tree.
Figure 26 - Controller Organizer
SNN_4
SNN_1
SNN_5
The configuration profile for each CIP Safety device in the I/O tree includes a parameter for
the SNN value that the controller uses when it opens the CIP Safety connection to that device.
This parameter automatically adopts the SNN value that is already established by the SNNs
known to the project:
• Safety devices (including safety controllers) that are direct children of a GuardLogix
controller adopt the SNN that matches the controller for the port that is used to connect
to the safety module.
- Safety devices directly under the backplane port adopt the backplane port SNN of
the GuardLogix controller.
- Safety devices directly under an Ethernet port adopt that Ethernet port SNN of the
GuardLogix controller.
• Safety devices (including safety controllers) on a remote subnet adopt the SNN value
that is already assigned to that subnet, or a new SNN is generated for the first CIP
Safety device on that subnet.
We recommend that you assign each controller SNN to the already established SNN for the
subnet. This recommendation enables the Logix Designer application to assign the correct
SNN to each safety I/O module and safety controller that are added to the project.
If safety I/O is copied from an existing project during GuardLogix program development, the
SNN value from the original location is retained. To create an SNN structure that resembles the
newly created I/O, you can manually change the SNN of copied devices to follow the SNN
structure of the new project by using copy/paste SNN from other I/O on the subnet or parent
device. If you copy safety I/O into a new remote rack, then a new time-based SNN can be
established and populated throughout the remote rack. See SNN Formats on page 51.
How SNNs Get to Safety Most CIP Safety I/O modules in the Factory Default state accept an SNN that is assigned by the
controller that owns that module. The SNN value that the Logix Designer application
Devices automatically adopts for the connection of that module is accepted when the controller opens
the initial connection to the module.
IMPORTANT CIP Safety I/O modules retain their UNID (SNN + Node) once it has been
assigned, and must be reset before they can be reused with another
value.
Some devices, such as another safety controller in the I/O tree, receive their SNN configuration
from a programming workstation. For these devices, you must manually configure the
connection to use the same SNN that has been programmed into that device if the Studio 5000
Logix Designer application did not automatically assign the correct SNN.
SNN Formats SNNs used by the system are 6-byte hexadecimal numbers. SNNs can be set and viewed in one
of two formats:
• Time-based
• Manual
The assignment of time-based SNNs is automatic when you create a GuardLogix safety
controller project or add EtherNet/IP by changing the IP mode (Compact GuardLogix 5380 only)
or controller type. Time-based SNNs generated by the software are always unique to the
project, whether generated by project creation or IP mode change. Devices that are created
directly under the controller port default to having the same SNN as that port on the controller.
IMPORTANT If you have a network diagram for your application (for example,
Figure 25), you must edit the SNNs of the controller to match your
network diagram. We recommend that you edit the SNNs before you add
devices to the I/O configuration in Controller Organizer.
New CIP Safety I/O devices added to ports under an adapter (as opposed to the controller
itself) follow similar rules.
• If no other device under the port uses an SNN, a time-based SNN is automatically
assigned.
• Otherwise, the device is assigned the same SNN as the first device in address order that
has an SNN.
IMPORTANT If you assign an SNN manually, make sure that system expansion does
not result in a duplication of SNN and unique node reference
combinations.
A warning appears if your project contains duplicate SNN and unique
node reference combinations. You can still verify the project, but we
recommend that you resolve the duplicate combinations.
However, there can be safety devices on the routable safety network that
have the same SNN and node address and are not in the project. In this
case, these safety devices are unknown to the Studio 5000 Logix
Designer application, and you may not see a warning.
If there are duplicate unique node references, as the system user, you
are responsible for proving that an unsafe condition cannot result.
SNNs for Out-of-box Devices Out-of-box CIP Safety I/O devices do not have an SNN. The SNN is set when a configuration is
sent to the device by the GuardLogix controller that owns the device.
IMPORTANT To add a CIP Safety I/O device to a configured GuardLogix system (the
SNN is present in the GuardLogix controller), the replacement CIP Safety
I/O device must have the correct SNN applied before it is added to the
CIP Safety network.
For detailed information, see the Replace a Safety I/O Device procedure
in the user manual for the controller:
• ControlLogix 5580 and GuardLogix 5580 Controllers User Manual,
publication 1756-UM543
• CompactLogix 5380 and Compact GuardLogix 5380 User Manual,
publication 5069-UM001
Notes:
IMPORTANT Only the instructions that are listed in Appendix A can be used in the
safety task.
Configure the safety task with a higher priority (lower number) to reduce fluctuations in
execution time. A higher priority can allow a lower setting for the safety task watchdog, which
improves the reaction time of the safety system.
IMPORTANT To get the most consistent safety task execution time and to minimize
safety task watchdog faults, we recommend that you run the safety
task as the highest priority user task.
You set the task priority and watchdog time in milliseconds (ms) on the Task Properties -
Safety Task dialog box. To open the dialog box, right-click the Safety Task and choose
Properties.
Figure 30 - Configure the Safety Task Period
• For standard tags that are mapped to safety tags, the standard tag values are copied to
the safety tags at the start of the safety task:
- The standard tag is free to continue changing.
IMPORTANT The addition of more mapped tags can increase the scan time.
- User code can change the safety tag within the safety task, but the change is not
reflected back to the standard tag.
• Safety output tag values can be changed during the safety task scan by the safety
application code of the user; the final value is transmitted to safety modules at the end
of the safety task scan. Likewise, safety produced values are transmitted to consuming
safety controllers at the end of the safety task scan.
IMPORTANT While safety-unlocked and without a safety signature, the controller helps prevent simultaneous write access to
safety memory from the safety task and communication commands. As a result, the safety task can be held off until a
communication update completes. The time that is required for the update varies by tag size. Insufficent time can
result in safety connection and safety watchdog timeouts. For example, if you make online edits when the safety task
rate is set to 1 ms, a safety watchdog timeout can occur.
To compensate for the hold-off time due to a communication update, you must increase the safety watchdog time.
Depending on the edit, a watchdog timeout can occur if there is insufficient time to complete the safety task
operation.
When the controller is safety-locked or a safety signature exists, the scenarios described in this note cannot occur.
Safety Programs A safety program has the attributes of a standard program, except that it can be scheduled
only in the safety task:
• A safety program can also define program-scoped safety tags.
• A safety program can be scheduled or unscheduled.
• A safety program can contain only safety components.
• All routines in a safety program are safety routines. One safety routine must be
designated as the main routine, and another safety routine can be designated as the
fault routine.
• A safety program cannot contain standard routines or standard tags.
Safety Routines Safety routines have the same attributes of standard routines, except for the following:
• Safety routines can exist only in safety programs.
• Safety routines cannot read or write standard tags.
• Safety routines can only be done in Ladder Logic.
One safety routine must be designated as the main routine in each safety program. Another
safety routine can be designated as the fault routine for that safety program.
Only safety-certified instructions are used in safety routines. For a listing of safety
instructions, see Appendix A.
Safety Tags The GuardLogix control system supports the use of both standard and safety tags in the same
project. However, the programming software operationally differentiates standard tags from
safety tags.
Safety tags have the same attributes as standard tags with the addition of mechanisms that
are certified to provide SIL 2/PLd and SIL 3/PLe data integrity.
The Studio 5000 Logix Designer application helps prevent the direct creation of invalid tags in
a safety program. If invalid tags are imported, they cannot be verified.
IMPORTANT You cannot create a standard alias tag of a safety tag. Instead, standard
tags can be mapped to safety tags using safety tag mapping. See Safety
Tag Mapping on page 88.
The Logix Designer application can write to safety tags directly via the Tag Monitor when the
GuardLogix 5580 controller is safety-unlocked, does not have a safety signature, and is
operating without safety faults.
The controller does not allow writes to safety tag data from external human machine interface
(HMI) devices or via message instructions from peer controllers. HMI devices can have read-
only access to safety tags depending on the External Access setting.
Data types can be combined to form structures. A structure provides a unique data type that
matches a specific need. Within a structure, each individual data type is called a member. Like
tags, members have a name and data type. You can create your own structures, such as arrays
or user-defined data types.
Logix controllers contain predefined data types for use with specific instructions. Safety tags
can be composed of the following:
• All primitive data types (for example, BOOL, SINT, INT, DINT, LINT, REAL)
• Predefined types used for safety application instructions
• User-defined data types or arrays that are composed of the two preceding types
Scope
The scope of a tag determines where you can access the tag data. When you create a tag, you
define it as a controller tag (global data) or a program tag for a specific safety or standard
program (local data). Safety tags can be controller-scoped or safety program-scoped.
Controller-scoped safety tags can be read by either standard or safety logic or external
communication devices, but can be written by only safety logic or another GuardLogix safety
controller.
Program-scoped safety tags can be read by external communication devices, but only local
safety routines can write to them. These are routines that reside within the safety program.
When you create program-scoped tags, the class is automatically specified, depending on
whether you created the tag in a standard or a safety program. When you create controller-
scoped tags, you must manually select the tag class.
When safety tags are controller-scoped, all programs have access to the safety data. Tags
must be controller-scoped if they are used in the following ways:
• Multiple programs in the project
• To produce or consume data
• In safety tag mapping
See Safety Tag Mapping on page 88 for more information.
Controller-scoped safety tags can be read, but not written to, by standard routines.
IMPORTANT Safety input tags and safety consumed tags are readable by any
standard routine, but the update rate is based on the execution of the
safety task. These tags are updated at the beginning of the safety task
execution, which differs from standard tag behavior.
Safety Signature Elements Safety tags, the safety task, and safety programs are safety signature elements. Each element
has a safety signature. The signature changes when its associated element is modified and
requires revalidation.
To view the safety signature for a safety tag, the safety task, or a safety program, select the
element in the Controller Organizer. The safety signature ID and timestamp appear in the Quick
View pane at the bottom of the Controller Organizer.
For more details about safety signature elements, see Chapter 2, Safety Signature .
Figure 32 - Safety Signature for Safety Task Element
Safety Task
Notes:
Basics of Application We recommend that a system integrator or a user who is trained and experienced in safety
applications develop the application program for the intended SIL 2 or SIL 3 system. The
Development and Testing developer must follow good design practices:
• Use functional specifications, including flowcharts, timing diagrams, and sequence
charts.
• Perform a review of safety task logic.
• Perform application validation.
The Studio 5000® environment is a suite of tools that are certified as an offline tool according
to clause 7.4.4 of IEC 61508-3. As you develop your safety application, consider the following:
IMPORTANT • The Studio 5000 Logix Designer® application has been certified to clause 7.4.4 of IEC 61508-3 Edition 2 and can be used
during the coding lifecycle of GuardLogix-based applications and also as an aide in the module test, integration test,
and validation test lifecycle phases. As a result, no additional justification for its use during those lifecycle phases is
required. If, however, other tools are used, either on their own or with the Studio 5000 Logix Designer application,
additional justification for those other tools are required. It is your responsibility to verify that other offline tools that
are used during all lifecycle phases are selected as a coherent part of the software development activities.
• It is your responsibility to conduct an assessment to determine the level of reliance that is placed on the Studio 5000
Logix Designer application and the potential failure mechanisms that can affect the executable software when the
Studio 5000 Logix Designer application is used in a manner other than what is specified in the product documentation.
• You must verify that all programming and configuration information that is entered into the Studio 5000 Logix Designer
application, and downloaded to the controller, meets the requirements for your application. See Confirm the Project on
page 70 for more information.
• As required by the safety integrity level, the software or design representation must match the characteristics of the
application.
• As required by the safety integrity level, the software or design representation must be compatible with the features
that are supported in the Studio 5000 Logix Designer application and GuardLogix controllers. It is your responsibility to
verify that the desired software and design representation are supported in the Studio 5000 Logix Designer application
and GuardLogix controllers. For example, if the design is represented in a flowchart format, it is your responsibility to
convert that design to a ladder diagram.
• Use of third-party, or internally developed, tools to generate logic automatically to import into the Studio 5000 Logix
Designer application for compilation and download to a GuardLogix controller requires assessment of its suitability at
the point in the development cycle where it is selected.
Commissioning Lifecycle The flowchart shows the steps that are required for commissioning a GuardLogix system. See
the links for an explanation of those topics.
Figure 33 - Commission the System
Specification of the Safety Function on
page 66
Yes
Project No
Valid?
Yes
The I/O portion of the specification must contain the analysis of field circuits, that is, the type
of sensors and actuators.
• Sensors (Digital or Analog)
- Signal in standard operation (dormant current principle for digital sensors, sensors
OFF means no signal)
- Determination of redundancies that are required for SIL levels
- Discrepancy monitoring and visualization, including your diagnostic logic
• Actuators
- Position and activation in standard operation (normally ON)
- Safe reaction/positioning when switching OFF or power failure
- Discrepancy monitoring and visualization, including your diagnostic logic
Review and test all logic. Keep safety-related logic and standard logic separate.
Label the Program
IMPORTANT One of the following editions of the Studio 5000 Logix Designer
application must be present to generate a safety signature: Professional,
Full, Lite Edition or a separate 9324-RLDGLXE GuardLogix Editor.
Once the application program tests are complete and before verification testing, you must
generate the safety signature. The programming software automatically uploads the safety
signature after it is generated.
The safety signature is composed of a safety signature ID (identification number), and a time
stamp (date and time). The safety signature ID applies to the entire safety portion of the
controller and uniquely identifies each project, including its logic, constant data, and
configuration.
You can generate the safety signature if the following conditions are true:
• The Studio 5000 Logix Designer application is online with the controller.
• The controller is in Program mode.
• The controller is safety-unlocked.
• The controller has no safety forces or pending online safety edits.
• The safety task status is OK.
IMPORTANT When the safety application has been validated, there can be
occasions that require a redownload (such as editing the Standard
application) even though the Safety application has not changed.
To verify that the correct safety application is downloaded, manually
record the safety signature after initial creation and check the safety
signature after every download to make sure that it matches the
original.
To generate the safety signature from the Safety tab of the Controller Properties dialog box,
click Generate.
In the Logix Designer application, you can also select Tools > Safety > Generate Signature.
Figure 34 - Generate Safety Signature
To view and copy the entire 64-character signature ID, click the Ellipse button next to the ID to
open the Safety Signature ID dialog box.
You can view the safety status via the safety status button on the online bar, or on
the Safety tab of the Controller Properties dialog box.
You can use the Copy button to create a record of the safety signature for use in safety project
documentation, comparison, and validation.
Click Copy to copy the ID, date, and time components to the Windows® clipboard.
Delete the Safety Signature
ATTENTION: If you delete the safety signature, you must retest and revalidate
your system at some level to meet SIL 2/PLd or SIL 3/PLe.
See Revalidation Considerations on page 70.
To delete the safety signature, click Delete. The safety signature cannot be deleted when the
following is true:
• The controller is safety-locked.
• The controller is in Run mode with the keyswitch in RUN.
• The controller is in Run or Remote Run mode with Protect Signature in Run Mode
enabled.
Active simulation with sources (field devices) must also be included, as it is the only way to
verify that the sensors and actuators in the system are wired correctly. Verify the operation of
programmed functions by manipulating sensors and actuators manually.
You must also include tests to verify the reaction to wiring faults and network communication
faults.
Project validation includes tests of fault routines, and input and output channels, to be sure
that the safety system operates properly.
To perform a project validation test on the GuardLogix controller, you must perform a full test
of your application. You must toggle each sensor and actuator that is involved in every safety
function. Be sure to test all shutdown functions, because these functions are not typically
exercised during normal operation.
Also, know that a project validation test is valid only for the specific application tested. If the
safety application is moved to another installation, you must perform startup and project
validation on the safety application in the context of the new sensors, actuators, wiring,
networks, and control system physical equipment.
Revalidation Considerations
The IEC 61508 functional safety standard requires an impact analysis before you upgrade or
modify components in a certified, functional safety system. Reference the standard to make
sure that you fulfill all requirements as they relate to your application. Consider the following
high-level information for impact analysis of safety controller software, hardware, and
firmware modification:
• All major and minor firmware releases for GuardLogix controller systems are certified
for use in safety applications. As part of the certification process, Rockwell Automation
tests the safety-related firmware functions, such as the CIP Safety™ communication
subsystems, embedded safety instruction execution, and safety-related diagnostic
functions. The firmware release notes identify changes to safety-related functions.
• Perform an impact analysis of the planned modifications.
- Review the firmware release notes for changes in safety-related functionality.
- Review the hardware and firmware compatibility in the Product Compatibility and
Download Center (PCDC) to identify potential compatibility conflicts.
- Plan, analyze, and document the impact of any modification, enhancement, or
adaptation of your validated safety system.
- As part of the upgrade process, remove and regenerate the safety signature.
• Based on the results of the safety impact analysis, choose the appropriate level of
hardware and software revalidation. Use the Safety Signature Report to determine
which safety elements have been modified and require revalidation. If your validation
plan does not require revalidation of unchanged elements, your certification effort can
be reduced.
IMPORTANT The compiler for GuardLogix 5580 and Compact GuardLogix 5380
controllers is different than the compiler for earlier controllers. Be sure
that applications for earlier controllers compile correctly on GuardLogix
5580 and Compact GuardLogix 5380 controllers.
For information about the creation and use of safety Add-On Instructions in SIL 3 applications,
see Appendix B.
The following steps illustrate one method for confirming the project.
1. While online with the controller, and with the controller in Program mode, save the
project.
2. Answer Yes to the Upload Tag Values prompt.
3. With the Studio 5000 Logix Designer application offline, save the project with a new
name, such as Offlineprojectname.ACD, where 'projectname' is the name of your
project. This file is the new tested master project file.
4. Close the project.
5. Move the original project archive file out of its current directory. You can delete this file
or store it in an archival location. This step is required because if the Studio 5000 Logix
Designer application finds the projectname.ACD in this directory, it correlates it with the
controller project and does not perform an actual upload.
6. With the controller still in Program mode, upload the project from the controller.
Safety Assessment
An independent, third-party review of the safety system can be required before the system is
approved for operation. An independent, third-party certification can be required for IEC 61508
SIL 2 or SIL 3 levels.
ATTENTION: Safety-locking alone does not satisfy SIL 2/PLd or SIL 3/PLe
requirements.
The default state of the controller is safety-unlocked. We recommend that you safety-lock the
GuardLogix controller to help protect safety control components from modification and help
prevent the safety signature from being deleted accidentally. However, safety-locking the
controller is not a requirement for SIL 2 or SIL 3.
The safety-lock feature applies only to safety components, such as the safety task, safety
programs, safety routines, safety tags, safety Add-On Instructions, safety I/O, and safety
signature.
No aspect of safety can be modified while the controller is in the safety-locked state. When the
controller is safety-locked, the following actions are not permitted in the safety task:
• Update the firmware
• Online or offline programming or editing
• Forcing safety I/O
• Data manipulation of safety components (except through routine logic or another
GuardLogix controller)
• Creating or editing safety Add-On Instructions
• Generating or deleting the safety signature
You can place the safety application in a safety-locked state regardless of whether you are
online, offline, or you have the original program source. However, no safety forces or pending
safety edits can be present. Safety-locked or -unlocked status cannot be modified when the
keyswitch is in the RUN position.
There are multiple ways to view the safety lock status of the controller:
• The 4-character display on the controller indicates lock status.
• In the Logix Designer application, the safety status button indicates the safety-lock
status.
• The Logix Designer application tray also displays the following icons to indicate the
safety controller’s safety-lock status.
= controller safety-locked
= controller safety-unlocked
If you set a password for the safety-lock feature, you must type it in the Enter Password field.
Otherwise, click Lock.
Figure 36 - Safety-lock the Controller
You can also set or change the password from the Safety Lock dialog box.
The safety-lock and -unlock feature uses two separate passwords. Passwords are optional.
IMPORTANT Rockwell Automation does not provide any form of password or security
override services. When products and passwords are configured,
Rockwell Automation encourages customers to follow good security
practices and to plan accordingly for password management.
Download the Safety Upon download, application testing is required unless a safety signature exists.
Application Program
IMPORTANT To verify that the correct safety application is downloaded or restored
from a memory card, you must manually check that the safety signature
matches the original signature in your safety documentation.
Downloads to a safety-locked GuardLogix controller are allowed only if the safety signature
and the firmware revision of the offline project all match what is contained in the target
GuardLogix controller and the safety task status of the controller is OK.
IMPORTANT If the safety signature does not match and the controller is safety-
locked, you must unlock the controller to download. In this case,
downloading to the controller deletes the safety signature. As a result,
you must revalidate the application.
Upload the Safety If the GuardLogix controller contains a safety signature, the safety signature is uploaded in an
online save of the project. The option to upload tag values includes both standard and safety
Application Program tag values.
Store and Load a Project GuardLogix and Compact GuardLogix controllers support firmware updates, and user program
storage and retrieval with a memory card. In a GuardLogix system, only the primary controller
from a Memory Card uses a memory card.
When you store a safety project on a memory card, we recommend that you select Remote
Program as the Load mode, that is, the mode the controller enters following the load. Before
actual machine operation, operator intervention is required to start the machine.
You can initiate a load from a memory card only under these conditions:
• If the controller type specified by the project that is stored on the memory card
matches your controller type.
• If the major and minor revisions of the project on the memory card match the major and
minor revisions of your controller.
IMPORTANT If you unlock the controller and initiate a load from the memory card, the
safety-lock status, passwords, and safety signature are then set to the
values contained on the memory card once the load is complete.
Force Data All data that is contained in an I/O, produced, or consumed safety tag, including
CONNECTION_STATUS, can be forced while the project is safety-unlocked and no safety
signature exists. However, forces must be removed, not just disabled, on all safety tags before
the safety project can be safety-locked or a safety signature can be generated. You cannot
force safety tags while the project is safety-locked or when a safety signature exists.
You can install and remove forces on standard tags regardless of the safety-
locked or unlocked state.
Inhibit a Device You cannot inhibit or uninhibit safety I/O devices or producer controllers with the Logix
Designer application under these conditions:
• The application program is safety-locked
• A safety signature exists
Anytime necessary, you can programmatically inhibit and uninhibit with SSV from the standard
task:
• Class Name: Module
• Attribute Name: Mode
• Source: Inhibit = 4; Uninhibit = 0
To inhibit a specific safety I/O device in the Logix Designer application, follow these steps.
1. In the Logix Designer application, right-click the device and choose Properties.
2. In the navigation pane, select Connection.
3. Select Inhibit Module and click Apply.
The device is inhibited whenever the checkbox is checked. If a communication device is
inhibited, all downstream devices are also inhibited.
Online Editing Standard logic online editing is unaffected by the safe state.
Online edits in standard routines are unaffected by the safety-locked or
safetyunlocked state.
Safety logic online editing can only be performed when the controller is safety-unlocked and
unsigned. Follow these guidelines for editing safety logic online:
• If the controller is locked with safety edits, you must unlock the controller to assemble
or cancel the edits.
• For safety routines, the controller cannot be locked when there is a pending edit, but it
can be locked when there is a test edit.
Editing Your Safety The following rules apply to changing your safety application program in the Studio 5000 Logix
Designer application:
Application
• Only authorized, specially trained personnel can make program edits. These personnel
must use all supervisory methods available, for example, using the controller keyswitch
and software password protections.
• When authorized, specially trained personnel make program edits, they assume the
central safety responsibility while the changes are in progress. These personnel must
also maintain safe application operation.
• When you edit online, you must use an alternate protection mechanism to maintain the
safety of the system.
• You must sufficiently document all program edits, which include the following:
- Authorization
- Impact analysis
- Execution
- Test information
- Revision information
• If online edits exist only in the standard routines, those edits are not required to be
validated before returning to normal operation.
• You must make sure that changes to the standard routine, regarding timing and tag
mapping, are acceptable to your safety application.
• You can edit the logic portion of your program while offline or online, as described in
the following sections.
When offline edits affect the safety program, you must revalidate all affected elements of the
application, as determined by the impact analysis, before you resume operation.
The safety-lock and safety signature features of the GuardLogix controller affect online edits.
See Generate the Safety Signature on page 67 and Lock the Controller on page 71 for more
information.
For detailed information on how to edit Ladder Logic in the Studio 5000 Logix Designer
application while online, see the Logix 5000 Controllers Quick Start, publication 1756-QS001.
For detailed information, see IEC 61508-3, Section 7.8 Software Modification
Institute alternate
Make Desired Modifications Test the Application Program
protection mechanisms
to Standard Logic Delete Safety
Application Signature
Unlock the Controller
Attach to Controller Compare the online safety
and Download signature ID to the
Make Desired
documented ID to verify
Modifications to Safety Logic Delete Safety that the safety application
Test the Application Program Application Signature has not been affected.
Make Required
Modification Impact Test Modifications
END
Yes
Confirm the Project
Record Safety
Application Signature
Safety Assessment
Project No
Valid?
Yes
END
IMPORTANT One of the following editions of the Logix Designer application must be present to make safety changes:
Professional, Full, Lite Edition, or a separate 9324-RLDGLXE GuardLogix Editor.
For information on the set of logic instructions available for safety projects, see Appendix A.
IMPORTANT When the GuardLogix controller is in Run or Program mode and you
have not validated the application program, you are responsible for
maintaining safe conditions.
Programming Restrictions The Logix Designer application limits the availability of some menu items and features, such
as cut, paste, delete, and replace, to protect safety components from being modified whenever
any of these are true:
• The controller is safety-locked
• A safety signature exists
• Safety faults are present
• Safety status is in any of these states when online:
- Partner missing
- Partner unavailable
- Hardware incompatible
- Firmware incompatible
IMPORTANT The maximum and last scan times of the safety task and safety programs
can be reset when online.
If even one of these conditions applies, you cannot do the following:
• Create or modify safety objects, including safety programs, safety routines, safety tags,
safety Add-On Instructions, and safety I/O devices
• Apply forces to safety tags
• Create safety tag mappings
• Modify or delete tag mappings
• Modify or delete user-defined data types that are used by safety tags
• Modify the controller name, description, chassis type, slot, and safety network number
• Create, modify, or delete a safety connection
When the controller is safety-locked, you cannot modify or delete the safety signature.
Safety Add-On Instructions You can create safety Add-On Instructions to be used in Safety applications. Safety Add-On
Instructions feature a safety instruction signature for use in safety-related applications up to
and including SIL 2-rated applications.
IMPORTANT You must initialize safety critical AOI tag values in AOI prescan logic.
For more information, see the Logix 5000 Controllers Add On Instructions Programming
Manual, publication 1756-PM010.
Program Parameters For program parameters, a safety parameter cannot be connected with or bound to a standard
parameter or controller-scoped tag.
Produced/Consumed To transfer safety data between GuardLogix controllers, you use produced and consumed
safety tags.
Safety Tags
Tags that are associated with safety I/O and produced or consumed safety data must be
controller-scoped safety tags. For produced/consumed safety tags, you must create a user-
defined data type with the first member of the tag structure that is reserved for the status of
the connection. This member is a predefined data type called CONNECTION_STATUS.
'
Produced and consumed safety tags are subject to the following restrictions:
• Only controller-scoped safety tags can be shared.
• Produced and consumed safety tags are limited to 128 bytes.
• Produced/consumed tag pairs must be of the same user-defined data type.
• The first member of that user-defined data type must be the predefined
CONNECTION_STATUS data type.
• The requested packet interval (RPI) of the consumed safety tag must match the safety
task period of the producing GuardLogix controller.
To configure produced and consumed safety tags to share data between peer safety
controllers, you must properly configure the peer safety controllers, produce a safety tag, and
consume a safety tag, as described below.
The safety application that is downloaded into the peer safety controller configures SNN
values for each CIP Safety™ port on the controller.
.
For an explanation of the Safety Network Number, see the GuardLogix 5580 and Compact
GuardLogix 5380 Controller Systems Safety Reference Manual, publication 1756-RM012.
If the automatically assigned SNN of the producer controller does not match the SNN the
controller actually uses, you can follow these steps to copy and paste the SNN.
Setting the correct SNNs of the controller usually results in the producer controller
being assigned the correct SNN. In these cases you need not perform this
procedure.
1. Add the producer controller to the consumer controller’s I/O tree.
Consumer Controller
Producer Controller
2. In the producer controller’s project, right-click the producer controller and choose
Controller Properties.
3. On the Safety tab, click the next to the port (Ethernet or Backplane) that
communicates with the consumer controller. This opens the Safety Network Number
dialog box.
5. In the I/O tree of the consumer controller's project, right-click on the module that
represents the producing controller, and choose Module Properties.
6. On the Module Properties General tab, click to open the Safety Network Number
dialog.
7. Paste the producer controller’s SNN into the SNN field and click OK.
5. Click OK.
6. Click Create.
5. From the Producer pull-down menus, select the controller that produces the data.
6. In the Remote Data field, enter the name of the produced tag.
7. Click the Safety tab.
8. In the Requested Packet Interval (RPI) field, enter the RPI for the connection in 1 ms
increments. The default is 20 ms.
• The RPI specifies the period when data updates over a connection. The RPI of the
consumed safety tag must match the safety task period of the producing safety
project.
Producer’s Project
Consumer’s Project
• The Connection Reaction Time Limit is the maximum age of safety packets on the
associated connection. For simple timing constraints, you can achieve an
acceptable Connection Reaction Time Limit by adjusting the safety task period of
the producing controller which adjusts the RPI.
• The Max Network Delay is the maximum observed transport delay from the time
that the data was produced until the time the data was received. When online,
click Reset Max to reset the Max Network Delay.
9. If the Connection Reaction time limit is acceptable, click OK.
If a safety consumed tag has the error code: “16#0111 Requested Packet
Interval (RPI) out of range,” check that the consumed tag RPI matches the
producer's safety task period.
10. If your application has more complex requirements, click Advanced on the Safety tab to
access the Advanced Connection Reaction Time Limit parameters.
• The Timeout Multiplier determines the number of RPIs to wait for a packet before
declaring a connection timeout.
• The Network Delay Multiplier defines the message transport time that is enforced
by the CIP Safety protocol. The Network Delay Multiplier specifies the round-trip
delay from the producer to the consumer and back to the producer.
You can use the Network Delay Multiplier to increase or decrease the Connection
Reaction Time Limit.
Mapped tags are copied from the standard tags to their corresponding safety tags at the
beginning of the safety task. The copying process can increase the safety task scan time.
\\
ATTENTION: When you use standard data in a safety routine, you are
responsible for providing a more reliable means to make sure that the data is
used in an appropriate manner. The use of standard data in a safety tag does
not make it safety data. You must not try to prevent safety function operation
with standard tag data.
This example illustrates how to qualify the standard data with safety data.
Qualify Standard Data with Safety Data
Node30ComboModule:O.Pt03Data
Latch circuit to help prevent automatic restart if the standard Safety Output
input (MappedTag) is failed in a ‘stuck at 1’ state.
Restrictions
Safety tag mapping is subject to these restrictions:
• The safety tag and standard tag pair must be controller-scoped.
• The data types of the safety and standard tag pair must match.
• Alias tags are not allowed.
• Mapping must take place at the whole tag level. For example, myTimer.pre is not
allowed if myTimer is a TIMER tag.
• A mapping pair is one standard tag that is mapped to one safety tag.
• You cannot map a standard tag to a safety tag that has been designated as a constant.
• Tag mapping cannot be modified when any of the following are true:
- The project is safety-locked.
- A safety signature exists.
- The keyswitch is in RUN position.
- A nonrecoverable safety fault exists.
- An invalid partnership exists between the primary controller and safety partner.
ATTENTION: When using standard data in a safety routine, you must verify
that the data is used in an appropriate manner. Using standard data in a
safety tag does not make it safety data. You must not directly control a
SIL 2/PLd or SIL 3/PLe safety output with standard tag data.
For more information, see the GuardLogix 5580 and Compact GuardLogix
5380 Controller Systems Safety Reference Manual, publication 1756-RM012.
2. Add an existing tag to the Standard Tag Name or Safety Tag Name column by entering
the tag name into the cell or selecting a tag from the dropdown menu.
Click the arrow to display a filtered tag browser dialog box. If you are in the Standard
Tag Name column, the browser shows only controller-scoped standard tags. If you are
in the Safety Tag Name column, the browser shows controller-scoped safety tags.
3. Add a tag to the Standard Tag Name or Safety Tag Name column by right-clicking in the
empty cell and selecting New Tag and typing the tag name into the cell.
4. Right-click in the cell and choose New tagname, where tagname is the text you entered
in the cell.
For more information, see the tag mapping restrictions on page 90.
Custom Tag Initialization Only safety tags that are configured as constant value tags are captured as part of the safety
signature.
During Prescan
IMPORTANT When you use non-constant safety tag values for a safety critical
operation, you must initialize the non-constant safety tags before Run
mode.
Give special consideration to instructions that use pseudo-operands, such as the following:
• .PRE value for TON, TOF, RTO, CTD and CTU
• .LEN value for FAL and FSC.
Unless modified by the application, pseudo-operands are initialized only once when the
application is downloaded. For details, see the “Pseudo-operand Initialization” online Help
topic.
Before the controller is in Run mode, you must initialize the .PRE and .LEN values for the
preceding instruction tags and other non-constant safety tags that are used in a safety critical
operation. Initialize these values by using one of these methods:
• A first scan subroutine
• An Add-On Instruction prescan routine
For more information about how to perform a custom tag initialization during prescan, see the
Logix 5000 Controllers Design Considerations Reference Manual, publication 1756-RM094.
The following example describes how to use the SaveSnapshot routine to copy non-constant
safety tag values to the safetyPrescanInitUDT backup, which consists of safety tag types, such
as CTU preset, FAL length, TON preset, DINT array, REAL, and BOOL.
Status Indicators For details on status indicator operation, see the user manual for the controller:
• ControlLogix 5580 and GuardLogix 5580 Controllers User Manual,
publication 1756-UM543
• CompactLogix 5380 and Compact GuardLogix 5380 User Manual,
publication 5069-UM001
IMPORTANT Status indicators do not provide excellent reliability for safety functions.
Use them only for general diagnostics during commissioning or
troubleshooting. Do not attempt to use status indicators to determine
operational status.
Monitor System Status You can view the status of safety tag connections. You can also determine current operating
status by interrogating various device objects. It is your responsibility to determine what data
is most appropriate to initiate a shutdown sequence.
CONNECTION_STATUS Data
The first member of the tag structure that is associated with safety input data and produced/
consumed safety tag data contains the status of the connection. This member is a pre-defined
data type called CONNECTION_STATUS.
Figure 42 - Data Type Dialog Box
The first 2 bits of the CONNECTION_STATUS data type contain the RunMode and
ConnectionFaulted status bits of a device. Table 8 describes the combinations of the RunMode
and ConnectionFaulted states.
IMPORTANT You are responsible for providing application logic to latch these I/O
failures and to verify that the system restarts properly.
IMPORTANT You are responsible for application logic to latch these I/O failures, and
to verify that the system restarts properly.
For information on how to use GuardLogix safety application instructions, see Appendix F and
the GuardLogix Safety Application Instructions Safety Set Reference Manual,
publication 1756-RM095.
Get System Value (GSV) and Set System Value (SSV) Instructions
The GSV and SSV instructions let you get (GSV) and set (SSV) controller system data that is
stored in device objects. When you enter a GSV/SSV instruction, the programming software
displays the valid object classes, object names, and attribute names for each instruction.
Restrictions exist for using the GSV and SSV instructions with safety components.
IMPORTANT The safety task cannot perform GSV or SSV operations on standard
attributes.
The attributes of safety objects that the standard task can write are only
for diagnostic purposes. They do not affect safety task execution.
For more information on which safety attributes are accessible via GSV and SSV instructions,
see the user manual for your controller:
• ControlLogix 5580 and GuardLogix 5580 Controllers User Manual,
publication 1756-UM543
• CompactLogix 5380 and Compact GuardLogix 5380 User Manual,
publication 5069-UM001
For general information about GSV and SSV instructions, see the Logix 5000 Controllers
General Instructions Reference Manual, publication 1756-RM003.
Safety Faults Faults in the GuardLogix 5580 and Compact GuardLogix 5380 system can be:
• Recoverable controller faults
• Nonrecoverable controller faults
• Nonrecoverable safety faults in the safety application
• Recoverable safety faults in the safety application
When the safety task encounters a nonrecoverable safety fault, a standard major recoverable
fault is also logged, and the controller proceeds to execute the controller fault handler, if one
exists. If the controller fault handler handles this fault, then the standard tasks continue to
run, even though the safety task remains faulted.
ATTENTION: Overriding a safety fault does not clear the fault. If you override a
safety fault, it is your responsibility to prove that operation of your system is
still safe.
You must provide proof to your certifying agency that your system can
continue to operate safely after an override of a safety fault.
Several nonrecoverable safety faults can be cleared, with or without a safety task signature, to
enable the safety task to run. The safety task inoperable fault requires that you download the
application again for the safety task to run.
When a recoverable fault is cleared programmatically, the safety task continues without
interruption.
When a recoverable fault in the safety application is not cleared programmatically, a Type 14,
Code 2 recoverable safety fault occurs. The safety task execution is stopped, and safety
protocol connections are closed and reopened to reinitialize them. Safety outputs are placed
in the safe state and the producer of safety-consumed tags commands the consumers to
place them in a safe state, as well.
If the recoverable safety fault is not handled, a standard major recoverable fault is also logged,
and the controller proceeds to execute the controller fault handler, if one exists. If the
controller fault handler handles this fault, then the standard tasks continue to run, even
though the safety task remains faulted.
The occurrence of recoverable faults is an indication that the application code is not
protecting itself from invalid data values or conditions. Consider modifying the application to
reduce the risk of these faults, rather than handling them at runtime.
ATTENTION: Overriding a safety fault does not clear the fault. If you override a
safety fault, it is your responsibility to prove that operation of your system is
still safe.
You must provide proof to your certifying agency that your system can
continue to operate safely after an override of a safety fault.
View Faults
The Recent Faults dialog box on the Major Faults tab of the Controller Properties dialog box
contains two subtabs, one for standard faults and one for safety faults.
The status display on the controller also shows fault codes with a brief status message. For
more information about status indicators, see the following:
• ControlLogix 5580 and GuardLogix 5580 Controllers User Manual,
publication 1756-UM543
• CompactLogix 5380 and Compact GuardLogix 5380 User Manual,
publication 5069-UM001
Fault Codes
GuardLogix 5580 and Compact GuardLogix 5380 controllers show fault codes on the Major
Faults tab of the Controller Properties dialog box and in the PROGRAM object,
MAJORFAULTRECORD or MINORFAULTRECORD attribute.
This manual links to Logix 5000 Controller and I/O Fault Codes,
publication, 1756-RD001; the file automatically downloads when you click
the link.
Develop a Fault Routine for If a fault condition occurs that is severe enough for the controller to shut down, the controller
generates a major fault and stops the execution of logic.
Safety Applications
Some applications do not want all safety faults to shut down the entire system. In those
situations, use a fault routine to clear a specific fault and let the standard control portion of
your system continue to operate or configure some outputs to remain ON.
ATTENTION: You must provide proof to your certifying agency that your
system can continue to operate safely after an override of a safety fault.
The occurrence of recoverable faults is an indication that the application
code is not protecting itself from invalid data values or conditions. Consider
modifying the application to eliminate these faults, rather than handling them
at runtime.
The controller supports two levels for handling major faults in a safety application:
• Safety Program Fault Routine
• Controller Fault Handler
Both routines can use the GSV and SSV instructions as described on page 99.
Each safety program can have its own fault routine. The controller executes the program’s
fault routine when an instruction fault occurs. If the program’s fault routine does not clear the
fault, or if a program fault routine does not exist, the safety task faults and shuts down.
When the safety task faults, a standard major recoverable fault is also logged, and the
controller proceeds to execute the controller fault handler, if one exists. If the controller fault
handler handles this fault, then the standard tasks continue to run, even though the safety
task remains faulted.
The controller fault handler is an optional component that executes when the program fault
routine cannot clear the fault or does not exist.
You can create one program for the controller fault handler. After you create that program,
you must configure a routine as the main routine.
The Logix 5000 Controllers Major and Minor Faults Programming Manual,
publication 1756-PM014, provides details on creating and testing a fault routine.
Use GSV/SSV Instructions in For standard tasks, you can use the GSV instruction to get values for the available attributes.
When using the SSV instruction, the software displays only the attributes that you can set.
a Safety Application
For the safety task, the GSV and SSV instructions are more restricted. The SSV instructions in
safety and standard tasks cannot set bit 0 (major fault on error) in the mode attribute of a
safety I/O device.
ATTENTION: Use the SSV instruction carefully. Making changes to objects can
cause unexpected controller operation or injury to personnel.
For more information on using the GSV and SSV instructions in safety applications, refer to the
Input/Output Instructions chapter of the Logix 5000 Controllers General Instructions Reference
Manual, publication 1756-RM003.
Safety Partner Fault The 1756-L8SP safety partner has an OK status indicator.
If the SIL configuration is set to SIL 2, and a Safety Partner is installed in the slot next the
Safety Primary, these actions occur:
• On the Safety Partner, the OK status indicator flashes red.
• The controller logs a Type 14, Code 12 minor fault that indicates that the controller is
configured for SIL 2, and a Safety Partner is present.
• The Studio 5000 Logix Designer® application refuses to download a SIL 2 application.
Monitor Safety Status You can use the following to monitor the controller status:
• The Online bar in the Logix Designer application.
• The Safety tab in the Controller Properties dialog box.
Controller Status
When the Controller Status button is selected as shown in Figure 43, the
online bar shows the controller’s mode (Remote Program) and status (OK). The Energy Storage
OK indicator combines the status of the primary controller and the safety partner.
If either or both have an energy storage fault, the status indicator illuminates. The I/O
indicator combines the status of standard and safety I/O. The I/O with the most significant
error status is displayed next to the status indicator.
Forces status
The Forces Status button indicates Forces or No Forces. When the button is
selected, the online bar shows whether I/O or SFC forces is enabled or disabled and installed or
not installed. The ForcesStatus menu contains commands to remove, enable, or disable all
forces.
Online Edit status
The Online Edit Status button indicates whether edits or no edits exist in the
online ladder routine or function block diagram. When the button is selected, the online bar
shows the edit state of the controller. If edits are made by another user, this area will also
shows a textual description of the edits.
Safety Status
When you click the Safety Status button , the online bar displays the safety
signature.
Figure 44 - Safety Signature Online Display
The Safety Status button itself indicates whether the controller is safety-locked or -unlocked,
or faulted. It also displays an icon that shows the safety status. When a safety signature exists,
the icons include a small check mark.
Table 10 - Safety Status Icon
If the safety status is This icon appears
SIL 2/PLd Application, both online and offline SIL 3/PLe Application
The controller is not safety-locked and online.
Safety-locked
The controller is safety-locked and offline.
Safety Faulted
Safety Task Inoperable The controller is safety-locked and the safety task is inoperable.
Except for safety task OK, the descriptions indicate that nonrecoverable safety faults exist.
The status of the safety partner can be viewed on the Connections tab of its Module Properties
dialog box.
Figure 46 - Safety Partner Status
The ConnectionFaulted value indicates whether the safety connection between the safety
producer and the safety consumer is Valid (0) or Faulted (1). If ConnectionFaulted is set to
Faulted (1) for any reason, the safety data is reset to zero and the RunMode value is set to Idle
State (0).
The RunMode value indicates if consumed data is actively being updated by a device that is in
the Run Mode (1) or Idle State (0). Idle state is indicated if the connection is closed, the safety
task is faulted, or the remote controller or device is in Program mode or Test mode. For safety
I/O connections, the RunMode is always inverse the ConnectionFaulted status. It does not
provide unique data.
The following table describes the combinations of the ConnectionFaulted and RunMode states.
Table 11 - Safety Connection Status
ConnectionFaulted Status RunMode Status Safety Connection Operation
Data is actively being controlled by the producing device.
0 = Valid 1 = Run The producing device is in Run mode.
The connection is active and the producing device is in the
0 = Valid 0 = Idle Idle state. The safety data is reset to zero. This applies to
consumed connections only.
The safety connection is faulted. The state of the producing
1 = Faulted 0 = Idle device is unknown. The safety data is reset to zero and the
RunMode value is set to Idle State (0).
1 = Faulted 1 = Run Invalid state.
If a device is inhibited, the ConnectionFaulted bit is set to Faulted (1) and the RunMode bit is set
to Idle (0) for each connection associated with the device. As a result, safety consumed data is
reset to zero.
Utilizing Status
Connection Status(.ConnectionFaulted) is the status of the safety connection between the
safety controller and safety I/O module. When the connection is operating properly, this bit is
LO (0). When the connection is NOT operating properly, this bit is HI (1). When the connection
status is HI (connection not operating properly), all other module defined tags are LO and
considered invalid data.
Point Status is available for both safety inputs (.PtxxInputStatus) and safety outputs
(.PtxxOutputStatus). When a point status tag is HI (1), it indicates that individual channel is
functioning and wired correctly, and that the safety connection between the safety controller
and the safety I/O module on which this channel resides is operating properly.
Combined Status is also available for both safety inputs (.CombinedInputStatus) and safety
outputs (.CombinedOutputStatus). When the combined status tag is HI (1), it indicates that all
input or output channels on the module are functioning and wired correctly, and that the
safety connection between the safety controller and the safety I/O module on which these
channels reside is operating properly.
Whether combined status or point status is used is application-dependent. Point status simply
provides more granular status.
The dual-channel safety instructions have built in safety I/O status monitoring. Input status
and Output status are parameters for the safety input and output instructions. The DCS
instruction (and other dual-channel safety instructions) has input status for input channels A
and B. The CROUT instruction has input status for Feedbacks 1 and 2, and has output status for
the output channels that are driven by the CROUT outputs O1 and O2. The status tags used in
these instructions must be HI (1) for the safety instruction output tags (O1 for input instructions
and O1/O2 for CROUT) to be energized.
For proper safety instruction operation, it is important to drive the input status and output
status tags BEFORE/ABOVE the safety instruction as shown in Figure 47.
When you use instructions, such as XIC and OTE, you are responsible for interrogating the
safety I/O status:
• Before you use a safety input channel as an interlock, verify that the safety input
channel status is HI (1).
• Before you energize a safety output channel, verify that the safety output channel
status is HI (1).
ATTENTION: These safety instructions are the only instructions that can be
used in the safety tasks in SIL 2 or SIL 3 applications.
Safety Instructions The following tables list the safety application instructions that are certified for use in SIL 2 or
SIL 3 applications.
If you use Logix Designer version 17 or later, use the newer, preferred instructions in Table 12.
For a list of preferred instructions in place of the corresponding legacy instructions, see the
GuardLogix Safety Application Instruction Set Reference Manual, publication 1756-RM095.
Table 12 - Safety Instructions
Mnemonic Name Purpose
CROUT Configurable Redundant Output Controls and monitors redundant outputs.
Dual Channel Input - Analog (integer
DCA
version)
Monitors two analog values for deviation and range tolerance.
Dual Channel Input - Analog (floating
DCAF point version)
DCM Dual Channel Input - Monitor Monitors dual-input safety devices.
Monitors dual-input safety devices whose main purpose is to provide a stop function, such as an E-stop, light
DCS Dual Channel Input - Stop curtain, or gate switch.
Energizes dual-input safety devices whose main function is to start a machine safely, for example an enable
DCSRT Dual Channel Input - Start pendant.
DCST Dual Channel Input - Stop With Test Monitors dual-input safety devices whose main purpose is to provide a stop function, such as an E-stop, light
curtain, or gate switch. It includes the added capability to initiate a functional test of the stop device.
Dual Channel Input - Stop With Test Monitors dual-input safety devices whose main purpose is to provide a stop function, such as an E-stop, light
DCSTL curtain, or gate switch. It includes the added capability to initiate a functional test of the stop device. It can
and Lock monitor a feedback signal from a safety device and issue a lock request to a safety device.
Monitors dual-input safety devices whose main purpose is to provide a stop function, such as an E-stop, light
Dual Channel Input - Stop With Test curtain,
DCSTM or gate switch. It includes the added capability to initiate a functional test of the stop device and the
and Mute ability to mute the safety device.
Automatically disables the protective function of a light curtain temporarily, by using four sensors that are
FSBM Four Sensor Bi-directional Muting arranged sequentially before and after the sensing field of the light curtain.
SMAT Safety Mat Indicates whether the safety mat is occupied.
Monitors two diverse safety inputs, one from a right-hand push button and one from a left-hand push button, to
THRSe Two-Hand Run Station – Enhanced control one output. Features configurable channel-to-channel discrepancy time and enhanced capability for
bypassing a two-hand run station.
Automatically disables the protective function of a light curtain temporarily, by using two muting sensors that are
TSAM Two Sensor Asymmetrical Muting arranged asymmetrically.
Automatically disables the protective function of a light curtain temporarily, by using two muting sensors that are
TSSM Two Sensor Symmetrical Muting arranged symmetrically.
For more information about the safety application instructions in Table 14, see Appendix F.
Table 14 - RSLogix 5000 Software, Version 14 and Later, Safety Application Instructions
Mnemonic Name Purpose
DIN Diverse Input Monitors two diverse safety inputs to control one output and has a 500-ms inputs-inconsistent timeout value.
ENPEN Enable Pendant Monitors two safety inputs to control one output and has a 3-s inputs-inconsistent timeout value.
ESTOP E-stop Monitors two safety inputs to control one output and has a 500-ms inputs-inconsistent timeout value.
FPMS 5-position Mode Selector Monitors five safety inputs to control one of the five outputs that corresponds to the active input.
LC Light Curtain Monitors two safety inputs from a light curtain to control one output.
RIN Redundant Input Monitors two safety inputs to control one output and has a 500-ms inputs-inconsistent timeout value.
ROUT Redundant Output Monitors the state of one input to control and monitor two outputs.
Monitors two diverse safety inputs, one from a right-hand push button and one from a left-hand push button, to
THRS Two-handed Run Station control one output.
Routines in the safety task can use the ladder diagram safety instructions in Table 15.
Table 15 - Ladder Diagram Safety Instructions
Type Mnemonic Name Purpose
EXPT(1) (2) (3)
X to the Power of Y Returns the value of X to the power of Y.
XPY(4)
Advanced Math
LN(2) (3) Natural Log Compute the natural log of a number.
LOG(2) (3) Log Base 10 Compute the log base 10 of a number.
AVE(2) File Average Calculate the mean/average over a set of values.
COP (5) Copy File Copy binary data from one tag to another (no type conversion).
(2) File Arithmetic and Logic Perform copy, arithmetic, logic, and function operations on data that is stored in an array.
FAL
FLL File Fill Fill the elements of an array with the source value, while leaving the source value unchanged.
FSC(2) File Search and Compare Compare the values in an array, element by element.
SIZE Size in Elements Find the size of a dimension of an array.
Array (File)
STD(2) File Standard Deviation Calculate the standard deviation over a set of values.
BSL Bit Shift Left Shifts the specified number of bits to the left.
BSU Bit Shift Right Shifts the specified number of bits to the right.
FFL Fifo Load Store a value into an array by using first-in/first-out semantics.
FFU Fifo Unload Retrieve a value from an array by using last-in/first-out semantics.
LFL Lifo Load Store a value into an array by using last-in/first-out semantics.
LFU Lifo Unload Retrieve a value from an array by using last-in/first-out semantics.
IMPORTANT If you use Motion Direct Commands with a Kinetix® 5500 drive, Kinetix 5700 servo drive, or a PowerFlex® 527 drive, see
the user manual for the drive for information on how to use this feature in safety applications.
• Kinetix 5500 Servo Drives User Manual, publication 2198-UM001
• Kinetix 5700 Servo Drives User Manual, publication 2198-UM002
• PowerFlex® 527 Adjustable Frequency AC Drive User Manual, publication 520-UM002
• PowerFlex 755/755T Integrated Safety - Safe Torque Off Option Module User Manual, publication 750-UM004
• PowerFlex 755/755T Integrated Safety Functions Option Module User Manual, publication 750-UM005
Notes:
Safety Add-On Instructions use the instruction signature of high-integrity Add-On Instructions
and also a safety instruction signature for use in safety-related functions up to and including
SIL 3.
Figure 48 on page 112 shows the steps that are required to create a safety Add-On Instruction
and then use that instruction in a safety application program. The shaded items are steps
unique to Add-On Instructions. See the links for an explanation of those topics.
Create/modify Application
Generate the Instruction Signature on page 113
Download
Create/Modify Test Program
Yes
No All
Delete safety signature,
Tests Pass?
if it exists
Test the Application Program on page 115
Yes
No
Project Valid?
Yes
Done
Create an Add-On You must create a unique test project to create and test the safety Add-On Instruction. This
project must be a separate and dedicated project to minimize any unexpected influences.
Instruction Test Project Follow the guidelines for projects that are described in Create the Project on page 66.
Create a Safety Add-On For guidance in how to create Add-On Instructions, see the Logix 5000 Controllers Add-On
Instruction Programming Manual, publication 1756-PM010.
Instruction
Generate the Instruction The instruction signature lets you quickly determine if the instruction has been modified. Each
Add-On Instruction can have its own signature. The instruction signature is required when an
Signature Add-On Instruction is used in safety-related functions, and can sometimes be required for
regulated industries. Use it when your application calls for a higher level of integrity.
The instruction signature consists of an ID number and time stamp that identifies the contents
of the Add-On Instruction at a given point in time.
Once generated, the instruction signature seals the Add-On Instruction, which helps prevent it
from being edited while the signature is in place. This restriction includes rung comments, tag
descriptions, and any instruction documentation that was created. When the instruction is
sealed, you can perform only these actions:
• Copy the instruction signature
• Create or copy a signature history entry
• Create instances of the Add-On Instruction
• Download the instruction
• Remove the instruction signature
• Print reports
When you generate an instruction signature, the Studio 5000 Logix Designer application
displays the instruction definition with the seal icon.
IMPORTANT If you protect your Add-On Instruction with the source protection feature
in the Studio 5000 Logix Designer application, enable source protection
before you generate the instruction signature.
When you generate a safety signature for a controller project, the Quick View Pane and Safety
Signature Report show a safety signature element for AOIs even if the instruction signature is
not generated. For more information about safety signature elements, see Chapter 2 on
page 17.
The Safety Instruction When a sealed safety Add-On Instruction is downloaded for the first time, a safety instruction
signature is automatically generated. The safety instruction signature is an ID number that
Signature identifies the execution characteristics of the safety Add-On Instruction.
SIL 2 or SIL 3 Add-On Safety Add-On Instruction tests must be performed in a separate, dedicated application to
verify that unintended influences are minimized. You must follow a well-designed test plan and
Instruction Qualification perform a unit test of the safety Add-On Instruction that exercises all possible execution paths
Test through the logic, including the valid and invalid ranges of all input parameters.
Safety Validate Add-On An independent, third-party review of the safety Add-On Instruction can be required before the
instruction is approved for use. An independent, third-party validation may be required for
Instructions functional safety certification.
Create Signature The signature history provides a record for future reference. A signature history entry consists
of the instruction signature, the name of the user, the time stamp value, and a user-defined
History Entry description. Up to six history entries can be stored. You must be offline to create a signature
history entry.
The Signature Listing report in the Studio 5000 Logix Designer application prints
the instruction signature, the time stamp, and the safety instruction signature. To
print the report, right-click Add-On Instruction in the Controller Organizer and
choose Print>Signature Listing.
Export and Import the Safety When you export a safety Add-On Instruction, choose the option to include all referenced Add-
On Instructions and user-defined data types in the same export file. By including referenced
Add-On Instruction Add-On Instructions, you make it easier to preserve the signatures.
Verify Safety Add-On After you download the application project that contains the imported safety Add-On
Instruction, you must compare the instruction signature value, the date and time stamp, and
Instruction Signatures the safety instruction signature values with the original values you recorded before you
exported the safety Add-On Instruction. If they match, the safety Add-On Instruction is valid
and you can continue with the validation of your application.
Test the Application This step consists of any combination of Run and Program mode, online or offline program
edits, upload and download, and informal testing that is required to get an application to run
Program properly.
Project Validation Perform an engineering test of the application, including the safety system. For more
information about requirements, see Validate the Project on page 69.
Safety Assessment An independent, third-party review of the safety system can be required before the system is
approved for operation. An independent, third-party validation may be required for functional
safety certification. For more information about safety assessments, see the Machinery
SafeBook 5.
The output reaction time is the time from when safety data is received from the GuardLogix
controller to when the output terminal changes state.
For information on how to determine the input and output reaction times, see the product
documentation for your specific safety I/O device.
Connection Reaction The Connection Reaction Time Limit (CRTL) is the maximum age of safety packets on the
associated connection. If the age of the data that is used by the consuming device exceeds
Time Limit the CRTL, a connection fault occurs.
If you adjust these values, then you can adjust the connection reaction time limit. If a valid
packet is not received within the CRTL, the safety connection times out, and the input and
output data is placed in the safe state (OFF).
IMPORTANT The default values generate an Input connection reaction time limit of
40 ms. If no edits are made to the defaults, verify this connection
reaction time limit is used in the safety reaction time calculations.
The CRTL is shown on the Safety tab of the Module Properties dialog box.
For safety input connections, you can set the RPI on the Safety tab of the Module Properties
dialog box. The RPI is entered in 1 ms increments.
The CRTL is adjusted immediately when the RPI is changed via the Logix Designer® application.
Figure 50 - Requested Packet Interval
For safety output connections, the RPI is fixed at the safety task period. If the corresponding
Connection Time Reaction Limit is not satisfactory, you can adjust the safety task period via
the Safety Task Properties dialog box.
See System Reaction Time on page 14 for safety task period details.
For typical applications, the default CRTL for input connections of 4 x RPI and the default CRTL
for output connections of 3 x RPI is usually sufficient. For more complex requirements, use the
Advanced button to modify the Connection Reaction Time Limit parameters, as described on
page 123.
System Reaction Time To determine the system reaction time of any control chain, you must add up the reaction
times of all the components of the safety chain.
System Reaction Time = Sensor Reaction Time + Logix System Reaction Time +
Actuator Reaction Time
Figure 52 - System Reaction Time
Sensor Reaction Input Reaction Safety Task Output Reaction Actuator Reaction
Time Time Reaction Time Time Time
Safety task reaction time = (safety task period + safety task watchdog) × 1.01
The safety task watchdog time is the maximum permissible time for safety task processing. If
the time to process a safety task exceeds the safety task watchdog time, a nonrecoverable
safety fault occurs in the controller, which results in a transition to the safe state (off).
You define the safety task watchdog time, which must be less than or equal to the safety task
period.
The safety task watchdog time is set in the task properties window of the Studio 5000 Logix
Designer application. This value can be modified online, regardless of controller mode, but it
cannot be changed when the controller is safety-locked or once a safety signature is created.
Logix System Reaction Time The following sections provide information on how to calculate the Logix system reaction time
for a simple input-logic-output chain and for a more complex application by using produced/
consumed safety tags in the logic chain.
Safety Network
The Logix system reaction time for any simple input to logic to output chain consists of these
five components:
1. Safety input device reaction time (plus input delay time, if applicable)
2. Safety Input Connection Reaction Time Limit
(Read from the Module Properties dialog box in the Logix Designer application, this value
is a multiple of the safety input device connection RPI.)
3. Controller reaction time (see Safety Task Reaction Time on page 119)
4. Safety Output Connection Reaction Time Limit
(Read from the Module Properties dialog box in the Studio 5000 Logix Designer®
application, this value is a multiple of the safety task period.)
5. Safety output device reaction time
Ethernet
Ethernet Switch Ethernet
Network Network
Controller A
Controller B
GuardLogix
GuardLogix
2. Safety Input Connection 6. Safety Output Connection
1. Safety Input 7. Safety Output
Reaction Time Limit Reaction Time Limit
Device Delay Device Delay
Safety Network Safety Network
The Logix system reaction time for any input to controller A logic to controller B logic to output
chain consists of these seven components:
1. Safety input device reaction time (plus input delay time, if applicable)
2. Safety Input Connection Reaction Time Limit
3. Safety Task Period plus Safety Task Watchdog time for Controller A
4. Produced/Consumed Safety Connection Reaction Time Limit
(Read from the Safety tab of the consumed tag connection.)
5. Safety Task Period plus Safety Task Watchdog time for Controller B
6. Safety Output Connection Reaction Time Limit
7. Safety output device reaction time
Factors That Affect Logix A number of factors can influence the Logix Reaction Time components that are described in
the previous sections.
Reaction-time Components
Table 18 - Factors Affecting Logix System Reaction Time
These Reaction Time Components Are Influenced by the Following Factors
Input device reaction time
Input device delay
On-Off and Off-On delay settings for each input channel, if applicable
Input device settings for:
• Requested Packet Interval (RPI)
• Timeout Multiplier
Safety Input Connection Reaction Time • Network Delay Multiplier
Limit
The amount of network communication traffic(1)
The EMC environment of the system(1)
Safety Task Period setting
Safety Task Period and Safety Task Safety Task Watchdog setting
Watchdog The number and execution time of instructions in the safety task(2)
Any higher priority tasks that preempt safety task execution(2)
The following sections describe how to access data or settings for many of these factors.
Value Description
Requested Packet Interval (RPI) How often the input and output packets are placed on the wire (network).
Timeout Multiplier The Timeout Multiplier is the number of retries before timing out.
The Network Delay Multiplier accounts for any known delays on the wire. When
Network Delay Multiplier these delays occur, timeouts can be avoided using this parameter.
If you adjust these values, then you can adjust the Connection Reaction Time Limit. If a valid
packet is not received within the CRTL, the safety connection times out, and the input and
output data is placed in the safe state.
IMPORTANT The Timeout Multiplier and Network Delay Multiplier settings provide
resilience for variations in network reliability and performance.
Use caution when reducing the values of these parameters as this
increases the likelihood of false trips.
To access the safety task period and watchdog time settings, right-click the Safety Task and
choose Properties.
Figure 55 - Safety Task Properties
The priority of the safety task is not a safety concern, as the safety task watchdog monitors if
a higher priority task interrupts the task.
5. You can view or edit the current settings in the Advanced dialog box.
Notes:
The checklists on the following pages provide a sample of safety considerations and are not
intended to be a complete list of items to verify. Your particular safety application can have
additional safety requirements, for which we have provided space in the checklists.
Make copies of the checklists and keep these pages for future use.
Checklist for Safety Inputs For programming or startup, an individual checklist can be completed for every safety input in
the system. This method is the only way to make sure that the requirements are fully and
clearly implemented. This checklist can also be used as documentation on the connection of
external wiring to the application program.
Input Checklist for GuardLogix System
Company
Site
Safety Function Definition
SIL Input Channels
Fulfilled
Number Input Device Requirements Comment
Yes No
1 Have you followed installation instructions and precautions to conform to applicable safety standards?
2 Have you performed project validation tests on the system and devices?
3 Are control, diagnostics, and alarm functions performed in sequence in application logic?
Have you uploaded and compared the configuration of each device to the configuration sent by the configuration
4 tool?
5 Are devices wired in compliance with the target standard and required safety level?
6 Have you verified that the electrical specifications of the sensor and input are compatible?
Checklist for Safety Outputs For programming or startup, an individual requirement checklist must be completed for every
safety output in the system. This method is the only way to make sure that the requirements
are fully and clearly implemented. This checklist can also be used as documentation on the
connection of external wiring to the application program.
Output Checklist for GuardLogix System
Company
Site
Safety Function Definition
SIL Output Channels
Fulfilled
Number Output Device Requirements Comment
Yes No
1 Have you followed installation instructions and precautions to conform to applicable safety standards?
2 Have you performed project validation tests on the devices?
Have you uploaded and compared the configuration of each device to the configuration sent by the
3 configuration tool?
4 Have you verified that test outputs are not used as safety outputs?
5 Are devices wired in compliance with the target standard and required safety level?
6 Have you verified that the electrical specifications of the output and the actuator are compatible?
Checklist to Develop a Use the following checklist to help maintain safety when you create or modify a safety
application program.
Safety Application Program
Checklist for GuardLogix Application Program Development
Company
Site
Project Definition
Fulfilled
Number Application Program Requirements Comment
Yes No
1 Are you using version 31 or later(1) (2)of the Studio 5000 Logix Designer® application, the GuardLogix
system programming tool?
Were the programming guidelines in Chapter 8 followed during the creation of the safety application
2 program?
3 Does the safety application program contain only a ladder diagram?
Does the safety application program contain only those instructions that are listed in Appendix A as
4 suitable for safety application programming?
5 Does the safety application program clearly differentiate between safety and standard tags?
6 Are only safety tags used for safety routines?
7 Have you verified that safety routines do not attempt to read from or write to standard tags?
8 Have you verified that no safety tags are aliased to standard tags and vice versa?
9 Is each safety output tag correctly configured and connected to a physical output channel?
10 Have you verified that all mapped tags have been conditioned in safety application logic?
11 Have you defined the process parameters that the fault routines monitor?
Have you sealed any safety Add-On Instructions with an instruction signature and recorded the safety
12 instruction signature? Optional for one time use Add-On Instructions. Required Add-On Instructions are
reused on different applications.
13 Has an independent safety reviewer reviewed the program (if necessary)?
14 Has the review been documented and signed?
(1) The Studio 5000 Logix Designer® application, version 31 or later, supports GuardLogix 5580 and Compact GuardLogix 5380 controllers.
(2) To obtain the latest software and firmware, see the Rockwell Automation Product Compatibility and Download Center (PCDC) support website at
https://www.rockwellautomation.com/global/support/pcdc.page.
Notes:
Safety Data For safety I/O devices safety data, including PFD and PFH values, see the manuals for those
products, as listed in the Additional Resources on page 9.
Data for Rockwell Automation machine safety products is now available in the form of a library
file to be used with the Safety Integrity Software Tool for the Evaluation of Machine
Applications (SISTEMA).
Product Failure Rates The data in the following tables applies to mission times up to and including 20 years.
Table 19 - Safety Parameters
GuardLogix 5580 Controllers GuardLogix 5580 Compact GuardLogix Compact GuardLogix
Attribute
and Safety Partner (1) (2) Controller (1) (2) 5380 SIL 2 Controller 5380 SIL 3 Controller
Safety Function Architecture (HFT) (3) 1 0 0 1
No Part/ No Effect Detected Failure Rate (NPED) [hr] 2.80E-06 2.58E-06 4.04E-06 3.17E-06
Safe Failure Rate (S) [failures/hr] 7.24E-07 6.61E-07 7.33E-07 6.26E-07
Dangerous Failure Rate (D) [failures/hr] 7.10E-07 6.61E-07 7.33E-07 6.13E-07
Dangerous Detected Failure Rate (DD) [failures/hr] 7.10E-07 6.54E-07 7.26E-07 6.13E-07
Dangerous Undetected Failure Rate (DU) [failures/hr] 7.38E-11 6.40E-09 7.23E-09 6.45E-11
Automatic Diagnostic Test Interval (TD) [hr] — <SRT <SRT —
Useful Life [yr] 20 20 20 20
Systematic Capability (SC) 3 3 3 3
(1) These values are product failure rates to be used when the product is represented as a block in a reliability block diagram (RBD).
(2) These product failure rates are valid for ambient temperatures up to 60 °C (140 °F) and altitudes of up to 2000 m (6561.7 ft). See publication 1756-TD001 and 1756-IN048.
(3) The HFT specified here is the product internal HFT.
1
MTTFd = λ
d
PFH = λDU
IMPORTANT This appendix is relevant when using any of the original safety
application instructions released in RSLogix 5000® software, version 14,
in Table 14. The safety application instructions in Table 12 and Table 13
are preferred for new applications.
Diverse Input Fault Handling All safety input values that are associated with a particular connection are set to safe state
when a CIP Safety™ connection fault condition is detected. When using diverse input pairs, one
of the inputs uses a value of one to initiate the safety function. This requires safety logic that
evaluates fault conditions, so that the safety function is executed when an input fault occurs
(even though the input value remains at zero).
I/O Status Fault Latching The following diagrams provide examples of the application logic that is required to latch and
reset I/O failures. The examples show the logic necessary for input only modules, and for input
and output combination modules. The examples use the Combined Status feature of the I/O
modules, which presents the status of all input channels in one Boolean variable. Another
Boolean variable represents the status of all output channels. This approach reduces the
amount of I/O conditioning logic that is required and forces the logic to shut down all input or
output channels on the affected module.
Use Figure 56 on page 134 to determine which rungs of logic are required for different
application situations. Input Fault Latch and Reset Flowchart on page 134 shows logic that
overwrites the actual input-tag variables while a fault condition exists. If the actual input state
is required for troubleshooting while the input failure is latched, use the logic shown in Ladder
Diagram Example 1 on page 135. This logic uses internal tags that represent the inputs to be
used in the application logic. While the input failure is latched, the internal tags are set to their
safe state. While the input failure is not latched, the actual input values are copied to the
internal tags.
Use the Ladder Diagram Example 2 on page 136 to determine which rungs of application logic
in Output Fault Latch and Reset Flowchart on page 137 are required.
Yes
Yes
No
Write logic to latch input failure. Is input fault information required for
(Example Rung 0) Yes diagnostic purposes?
Yes
Write logic to set safe state value when an input has a
fault. (Example Rung 4)
Done
Node30:I.InputStatus Node30InputsFaulted
0 / L
Node31:I.CombinedStatus Node31InputsFaulted
/ L
If the raising edge of the fault reset signal is detected and the input status is OK, then unlatch the inputs faulted indication.
Node31:I.CombinedStatus Node31InputsFaulted
U
If the inputs have a fault, then overwrite the input tags with safe state values.
Node30InputsFaulted Node30:I.Pt00Data
2 U
Node30:I.Pt01Data
U
Node30:I.Pt07Data
U
If the inputs have a fault, then overwrite the input tags with safe state values.
Node31InputsFaulted Node31:I.Pt00Data
3 U
Node31:I.Pt01Data
U
Node31:I.Pt11Data
U
If the inputs faulted indication is true, then set the Diverse input values to their safe state (1).
Node30InputsFaulted Node30:I.Pt01Data
4 L
Node30:I.Pt03Data
L
Node30:I.InputStatus Node30InputsFaulted
0 / L
Node31:I.CombinedStatus Node31InputsFaulted
/ L
If the raising edge of the fault reset signal is detected and the input status is OK, then unlatch the inputs faulted indication.
Node31:I.CombinedStatus Node31InputsFaulted
U
If the inputs do not have a fault, then write the input tag values to the internal representations of the inputs.
Node30:I.Pt01Data Node30Input01
Node30:I.Pt07Data Node30Input07
If the inputs do not have a fault, then write the input tag values to the internal representations of the inputs.
Node31:I.Pt01Data Node31Input01
Node31:I.Pt11Data Node31Input11
If the inputs faulted indication is true, then set the internal representations of the Diverse inputs to their safe state (1).
Node30InputsFaulted Node31Input01
4 L
Node31Input03
L
Yes
Write logic to latch output failure. Yes Is output fault information required for
(Example Rung 0) diagnostic purposes?
Done
Node30:I.OutputStatus Node30OutputsFaulted
0 / L
If the raising edge of the fault reset signal is detected and the input status is OK, then unlatch the inputs faulted indication.
RedundantOutputTag.O2 Node30:O.Pt01Data
Notes:
The following terms and abbreviations are used throughout this manual. For definitions of
terms that are not listed here, see the Allen-Bradley Industrial Automation Glossary,
publication AG-7.1.
accept edits Action that is taken to accept and download online edit changes. See also pending edits.
Add-On Instruction An instruction that you create as an add-on to the Logix instruction set. Once defined, an Add-
On Instruction can be used like any other Logix instruction and can be used across various
projects. An Add-On Instruction is composed of parameters, local tags, logic routine, and
optional scan-mode routines.
assemble edits You assemble edits when you have made online edit changes to the controller program and
want the changes to become permanent, because you no longer need the ability to test, untest,
or cancel the edits.
Average frequency of a dangerous The probability of a system to have a dangerous failure occur per hour.
failure (PFH)
cancel edits Action that is taken to reject and delete any unassembled online edit changes.
CIP™ (Common Industrial Protocol) An industrial communication protocol that is used by Logix 5000-based automation systems
on EtherNet/IP™, ControlNet®, and DeviceNet® communication networks.
CIP Safety™ (Common Industrial SIL 2-rated or SIL 3-rated version of CIP.
Protocol – safety certified)
configuration signature A number that uniquely identifies the configuration of a device. The configuration signature is
composed of an ID number, date, and time.
detected failure A failure that diagnostic tests, proof tests, operator intervention, or through normal operation
detect.
diagnostic coverage (DC) The ratio of the dangerous detected failure rate to the dangerous failure rate.
get system value (GSV) A user application instruction that retrieves specified controller status information and places
it in a destination tag.
hardware fault tolerance The HFT equals n, where n+1 faults could cause the loss of the safety function. An HFT of 1
means that 2 faults are required before safety is lost.
instruction signature The instruction signature consists of an ID number and date/time stamp that identifies the
contents of the Add-On Instruction definition at a given point in time.
maximum SIL (SILCL) Maximum SIL claim limit for a SCS (safety-related control system) subsystem in relation to
architectural constraints and systematic safety integrity (from IEC 62061).
MT (mission time) The length of time over which the device maintains the stated PFD, PFH, and ratings before
replacement is required.
network delay multiplier This value represents the transport time of a message across the communication network.
See also timeout multiplier.
nonrecoverable controller fault A fault that forces all processing to be ended and requires controller power to be cycled from
off to on. The user program is not preserved and must be redownloaded.
nonrecoverable safety fault A fault, which even though properly handled by the fault handling mechanisms that are
provided by the safety controller and implemented by the user, ends all safety task processing,
and requires external user action to restart the safety task.
online Situation where you are monitoring/modifying the program in the controller.
overlap When a task (periodic or event) is triggered while the task is still executing from the previous
trigger.
partnership The primary controller and safety partner must both be present in SIL 3, and the hardware and
firmware must be compatible for partnership to be established.
pending edits A change to a routine that has been made in the Studio 5000 Logix Designer® application, but
has not yet been communicated to the controller by accepting the edit.
Performance Level (PL) The discrete level that is used in the EN ISO 13849-1, to specify the ability of safety-related
parts of control systems to perform a safety function under foreseeable conditions.
periodic task A task that the operating system triggers at a repetitive period. Whenever the time expires, the
task is triggered and its programs are executed. Data and outputs that the programs in the
task establish retain their values until the next execution of the task or until another task
manipulates them. Periodic tasks always interrupt the continuous task.
personal computer (PC) Computer that is used to interface with and control a Logix-based system via the Studio 5000®
environment.
primary controller The processor in a dual-processor controller that performs standard controller functionality
and communicates with the safety partner to perform safety-related functions.
recoverable fault A fault, which when properly handled by implementing the fault handling mechanisms that are
provided by the controller, does not force user logic execution to be ended.
requested packet interval (RPI) How frequently the originating application requires the transmission of data from the target
application.
routine A set of logic instructions in one programming language, such as a ladder diagram. Routines
provide executable code for the project in a controller. Each program has a main routine. You
can also specify optional routines.
safe failure fraction (SFF) The sum of safe failures plus the sum of dangerous detected failures divided by the sum of all
failures.
safety Add-On Instruction An Add-On Instruction that can use safety application instructions. In addition to the
instruction signature used for high-integrity Add-On Instructions, safety Add-On Instructions
feature a SIL 2 or SIL 3 safety instruction signature for use in safety-related functions.
safety application instructions Safety Instructions that provide safety-related functionality. They have been certified to SIL 3
for use in safety routines.
safety component Any object, task, program, routine, tag, or module that is marked as a safety-related item.
safety input A combination of produced and consumed safety tags, mapped safety inputs, and inputs from
safety modules.
safety instruction signature The safety instruction signature is an ID number that identifies the execution characteristics
of the safety Add-On Instruction. The signature is used to verify the integrity of the safety Add-
On Instruction during downloads to the controller.
safety integrity level (SIL) A relative level of risk-reduction that is provided by a safety function, or to specify a target
level of risk reduction.
safety I/O Safety I/O has most of the attributes of standard I/O except it features mechanisms that are
certified to SIL 2 or SIL 3 for data integrity.
safety network number (SNN) Uniquely identifies a network across all networks in the safety system. You are responsible for
assigning a unique number for each safety network or safety subnet within a system. The
safety network number constitutes part of the Unique Node Identifier (UNID).
safety partner The processor in a dual-processor controller that works with the primary controller to perform
safety-related functions in a SIL 3 system.
safety program A safety program has all attributes of a standard program, except that it can be scheduled only
in a safety task. The safety program consists of zero or more safety routines. It cannot contain
standard routines or standard tags.
safety protocol A network communication method that is designed and certified for transport of data with
high integrity.
safety routine A safety routine has all attributes of a standard routine except that it is valid only in a safety
program and that it consists of one or more instructions suitable for safety applications. (See
Appendix A on page 105 for a list of Safety Application Instructions and standard Logix
Instructions that can be used in safety routine logic.)
safety tags A safety tag has all attributes of a standard tag except that the GuardLogix® controller
provides mechanisms that are certified to SIL 2 or SIL 3 to help protect the integrity of their
associated data. They can be program-scoped or controller-scoped.
safety task A safety task has all attributes of a standard task except that it is valid only in a GuardLogix
controller and that it can schedule only safety programs. Only one safety task can exist in a
GuardLogix controller. The safety task must be a periodic/timed task.
safety task period The period at which the safety task executes.
safety task reaction time The sum of the safety task period plus the safety task watchdog. This time is the worst case
delay from any input change that is presented to the GuardLogix controller until the processed
output is available to the producing connection.
safety signature The safety signature is composed of a safety signature ID, and a timestamp (date and time
when the safety signature ID is generated). The safety signature is used to verify the integrity
of the safety application program during downloads to the controller.
safety signature ID A value, which the firmware calculates, that uniquely represents the logic and configuration of
the safety system. The safety signature ID is independent of the timestamp.
safety task watchdog The maximum time that is allowed from the start of safety task execution to its completion.
Exceeding the safety task Watchdog triggers a nonrecoverable safety fault.
set system value (SSV) A user application instruction that sets controller system data.
standard Any object, task, tag, program, or component in your project that is not a safety-related item
(that is, standard controller refers generically to a ControlLogix® or CompactLogix™ controller).
standard component Any object, task, tag, program, and so on, that is not marked as being a safety-related item.
standard controller As used in this document, standard controller refers generically to a ControlLogix or
CompactLogix controller.
symbolic addressing A method of addressing that provides an ASCII interpretation of the tag name.
system reaction time The worst case time from a safety-related event as input to the system or as a fault within the
system, until the time that the system is in the safe state. System reaction time includes
sensor and actuator Reaction Times, Input and Output Reaction Times (including network
connection delays), and the Controller Reaction Time.
systematic capability (SC) A confidence that the systematic safety integrity meets the requirements of the specified
safety integrity level (SIL). (from IEC 61508-4)
task A scheduling mechanism for executing a program. A task provides scheduling and priority
information for a set of one or more programs that execute based on certain criteria. Once a
task is triggered (activated), all programs assigned (scheduled) to the task execute in the order
in which they are displayed in the controller organizer.
test edits Once online edits have been accepted, there are two versions of user logic residing in
controller memory. The Test Edits command in the Studio 5000 Logix Designer application
causes the controller to execute the new, edited version of user logic. The original, unedited
version of user logic is still in controller memory, but is not executed. See untest edits.
timeout multiplier This value determines the number of messages that can be lost before declaring a connection
error. See also network delay multiplier.
undetected failure A failure that is undetected by diagnostic tests, proof tests, operator intervention, or through
normal operation.
untest edits Once online edits have been accepted, there are two versions of user logic residing in
controller memory. The Untest Edits command in the Studio 5000 Logix Designer application
causes the controller to execute the original, unedited version of user logic. The new, edited
version of user logic is still in controller memory, but is not executed. See test edits.
A Compact GuardLogix
controller 29
access power supply 30
safety-related system 34 concept
Add-On Instruction
safety integrity level (SIL) 11
create test project 113 configuration signature 40
export and import 115
confirm
flowchart 112
instruction signature 113 project 70
qualification test connection
SIL 2 or SIL 3 113 status 103
safety connection reaction time limit 87, 117
create 113 connection status 96
safety instruction signature 113 I/O device 96
safety validate 114 CONNECTION_STATUS 80, 102
signature
data 95
verify 115
ConnectionFaulted bit 103
agency certification 14
consideration
aggregate signatures 18
SNN assignment 48
analysis
consume tag data 86
failure 15
AOI SeeAdd-On Instruction consumed tag 80
application data 124
control and information protocol
development 64
definition 141
testing 64
controller
application program
Compact GuardLogix 29
changing 76
fault handler 99
See program
GuardLogix 27
test 67, 115
lock 71
assessment logging
safety 71, 115 safety lock, unlock 72
average frequency of dangerous failure (PFH) safety signature 68
definition 141 copy
safety signature 69
create
B Add-On Instruction
black safety signature 21 test project 113
blue safety signature 21 project 66
safety Add-On Instruction 111, 113
signature history 115
C
certifications 14 D
change parameters
data
SIL-rated system 34
changing your application program 76 CONNECTION_STATUS 95
force 74
chassis GuardLogix system safety 131
GuardLogix 28 produced and consumed tag 124
checklist safety 131
GuardLogix controller system 127 data types
GuardLogix safety application 127 CONNECTION_STATUS 80
program development 129 de-energize to trip system 96, 133
safety inputs 128 default
safety outputs 128
safety-lock 71
CIP Safety 47
delay time setting
routable system 47
Guard I/O input module 122
CIP Safety protocol delete
definition 143
safety signature 69
commissioning lifecycle 65
development
communication
application 64
network 30
W
watchdog
safety task 119
time 124
watchdog time 56
Notes:
Documentation Feedback
Your comments help us serve your documentation needs better. If you have any suggestions on how to improve our content, complete the
form at rok.auto/docfeedback.
At the end of life, this equipment should be collected separately from any unsorted municipal waste.
Rockwell Automation maintains current product environmental compliance information on its website at rok.auto/pec.
Allen-Bradley, ArmorBlock, Compact 5000, CompactBlock, CompactLogix, ControlLogix, expanding human possibility, Guard I/O, GuardLogix, GuardLogix-XT, Kinetix, Logix 5000, On-Machine,
POINT Guard I/O, POINT I/O, PowerFlex, Rockwell Automation, RSLogix 5000, Stratix, Studio 5000, and Studio 5000 Logix Designer are trademarks belonging to Rockwell Automation, Inc.
CIP, CIP Safety, ControlNet, DeviceNet, and EtherNet/IP are trademarks of ODVA, Inc.
Trademarks not belonging to Rockwell Automation are property of their respective companies.
Rockwell Otomasyon Ticaret A.Ş. Kar Plaza İş Merkezi E Blok Kat:6 34752, İçerenköy, İstanbul, Tel: +90 (216) 5698400 EEE Yönetmeliğine Uygundur
Maintaining SIL-level compliance in safety-related software changes involves several key considerations. Access control is crucial; only authorized and specially trained operators should be allowed to make changes, and such changes must be documented thoroughly, including authorization, impact analysis, and execution details . Safety-related modifications should follow rigorous testing and validation protocols, ensuring all changes are reviewed within the context of the entire safety system, including impact analysis and revalidation when necessary . Any new parameters introduced need careful verification for accuracy and reflected on HMI devices, with both operator acknowledgment and safety function validation before application . Additionally, compliance with applicable safety standards like IEC 61508 and IEC 62061, and the appropriate use of certified hardware and software components, are mandatory . The safety task should utilize only safety-certified routines and instructions to prevent compromising safety functions .
A De-energize to Trip System operates on the principle that transitioning to a zero-state or turning outputs OFF should occur during fault conditions to ensure safety. In the context of GuardLogix controllers, safety I/O device faults result in inputs or outputs being set to this safe, de-energized state . This design is important as it inherently prioritizes safety by favoring a fail-safe position in the event of failures or errors, reducing the risk of accidents or unintentional operations leading to unsafe conditions . It ensures that any uncontrolled process states are inherently brought to a halt, securing the environment against potential hazards .
Safety Add-On Instructions within the Logix Designer are created with a focus on maintaining compliance with SIL 2 and SIL 3 requirements by implementing a safety instruction signature that prevents editing and preserves the integrity of the instruction . Validation involves independent third-party review, rigorous testing, and following a well-defined test plan that examines all logic paths and parameter ranges . Developers must ensure these instructions are included in a signature history for reference, with offline creation of entries for audit purposes. Consistent adherence to these methods upholds the safety integrity levels and functional safety standards required in high-stakes environments .
A safety signature in the Logix Designer application serves to verify the integrity of the safety application. It is mandatory for the development and operation of a safety application at a SIL 2/PLd or SIL 3/PLe level. The safety signature is a hierarchy of elements, like safety tasks, programs, and routines, each with a unique ID and timestamp to track changes . It is essential for ensuring the project's safety and integrity, as it prevents unauthorized changes to safety logic and configuration once it is generated . Furthermore, the signature report allows for auditing to identify which elements have changed, potentially simplifying the certification process by not requiring revalidation of unchanged elements . The safety signature is crucial for both the validation process and maintaining the safety status, as it records the safety condition and locks the configuration to prevent alterations that could affect safety performance ."}
The Logix Designer application provides several methods and tools for accessing safety signature elements, including the Quick View pane, the Safety Signature report, and the Compare Tool. The Quick View pane displays the safety signature when a safety element is selected, and you can hover over the signature ID to view all 64 characters . The Safety Signature report is generated through the application under Tools > Safety and provides a detailed list of all safety signature elements, highlighting changes or states through colors and tooltips . Additionally, the Compare Tool allows for comparison of safety signature elements between two controller projects, aiding in identifying differences or changes . The significance of these tools lies in their role in supporting audit and certification processes, as they can help identify changes to safety elements, which may reduce certification efforts when migrating or updating validated applications without revalidating unchanged elements ."}
Fault monitoring and handling in the GuardLogix system involves managing recoverable and nonrecoverable faults. Recoverable faults in the safety application result in the suspension of safety tasks and reinitialization of safety protocol connections. If not cleared programmatically, they lead to a Type 14, Code 2 safety fault, which requires closing and reopening protocol connections to ensure safety outputs revert to a safe state . Nonrecoverable faults halt both safety and standard tasks, necessitating application redownload for recovery . Faults are categorized into safety application faults and controller faults, with safety-specific fault routines and a controller fault handler available to manage them. The controller fault handler allows standard tasks to continue if it can handle the fault, despite the safety task remaining faulted . The GSV and SSV instructions are used to handle fault data; however, their use in safety tasks is restricted to ensure safety integrity . To prevent and manage faults, application code should be reviewed and modified to reduce risks, and a fault routine should be developed to address specific faults without requiring complete system shutdown .
The Logix System Reaction Time in an input-output chain is influenced by the following factors: input device delay, input and output connection reaction time limits, safety task period and watchdog settings, and network conditions such as the amount of network communication traffic and the EMC environment . The connection reaction time limits are determined by the Requested Packet Interval (RPI), Timeout Multiplier, and Network Delay Multiplier . Moreover, the system reaction time is a sum of several components including sensor reaction time, Logix system reaction time, and actuator reaction time. For optimization, the safety task period and watchdog settings can be adjusted, and network conditions such as RPI and timeout settings can be fine-tuned for specific applications to ensure system reliability and efficiency . For more complex requirements, the connection reaction time limit parameters can be specifically modified to meet stringent system needs .
The Logix Designer application identifies safety signature states using colors: blue, black, or gray. Blue indicates a newly generated or updated signature due to changes in the safety element or its child elements. Black signifies a subsequent signature generation with no changes to safety elements. Gray denotes an unknown signature, where the application cannot authenticate the ID with its value, often arising from deleting or copying signature elements, or importing projects with existing signatures. These signature states help in validating and certifying safety elements within the controller project .
Safety I/O devices in the GuardLogix Control System perform crucial functions and behaviors. They connect to safety input and output modules, and their safety data communication is managed through the CIP Safety™ protocol, ensuring reliable data transmission . Typical functions include setting safety outputs to OFF when in a safe state, and sending safety input data to the controller in an OFF state. This facilitates applications that require the safety system to be in a safe state with outputs turned OFF . The devices perform self-diagnostics upon power ON and periodically during operation. If a failure is detected, the system sets safety input data and local safety outputs to their safe state (OFF) to maintain safety . Furthermore, the devices support additional status data for device and circuit health monitoring and include visual status indicators for operational identification . Some safety I/O devices incorporate delays, like on-delay and off-delay functions, to control safety inputs and outputs, allowing them to filter out noise or signals not intended for state changes . These devices are used in systems that may require a specific state change timing, aiding in noise reduction and ensuring correct safety state transitions .
Archived Safety Signature Reports are essential in auditing and validation processes as they allow comparison between original and updated signature reports to identify which elements in a safety application have changed and which have not. This information is vital to determine if revalidation is necessary, thus potentially saving resources by avoiding unnecessary testing for unchanged elements . This is particularly useful when updating or migrating safety applications to new releases, as it reduces the effort required for certification by focusing only on elements that have undergone changes . These reports can also help in verifying the integrity of the application, ensuring compliance with safety standards by maintaining consistent safety signatures throughout the project .