32 Appx.2: Protection Setting .................................................................................................................... 465
32.1 Protect Setting Screen ..................................................................................................................... 466
32.4 Changing the Password................................................................................................................... 470
32.5 Clearing the Password..................................................................................................................... 471
34.1 Introduction ...................................................................................................................................... 476
34.2 EMC Directives ................................................................................................................................ 476
34.3 EMC Measures ................................................................................................................................ 477
34.4 Panel Structure ................................................................................................................................ 477
34.4.2 Measures for Door ................................................................................................................... 478
34.6.1 Shield Clamp Fitting................................................................................................................. 481
34.6.2 Ferrite Core.............................................................................................................................. 482
34.6.3 Surge Absorber........................................................................................................................ 483
35.1 Restriction for Packing ..................................................................................................................... 488
35.1.1 Target Products ....................................................................................................................... 488
35.1.2 Handling by User ..................................................................................................................... 489
35.1.3 Reference ................................................................................................................................ 489
35.5.1 Important Notes ....................................................................................................................... 493