Introduction
You can use Modbus function code commands to perform diagnostics on the BMENUA0100 module. Modbus commands can reach the module only over its backplane port. Because Modbus is not an inherently secure protocol, you need to encapsulate Modbus commands within IPSEC.
Only FC FC43/14 (Read Device Identification) and FC03 (to read DDT MW%) requests are supported on the BMENUA0100 module.
Modbus Data Access and the Cybersecurity Operating Mode
The method you can use to access Modbus data depends on the cybersecurity operating mode. If the BMENUA0100 module is operating in:
Standard mode: The BMENUA0100 module accepts the Modbus TCP/IP client data flow from any client that can access the backplane Ethernet network. Use standard Modbus communication methods, including DATA_EXCH, MBP_MSTR, READ_VAR and WRITE_VAR function blocks, and Control Expert commands.
Secured mode: The BMENUA0100 module accepts the Modbus TCP/IP client data flow only from the M580 CPU. You can implement the DATA_EXCH block in the application.The READ_VAR and WRITE_VAR can also be used.
NOTE: To address the Modbus server in the module, UnitID 100 needs to be used. Refer to your Modbus client documentation for information describing how to set this value. For example, when using the DATA_EXCH block, UnitId may be set with ADDMX as follows: ADDMX(0.0.3{192.168.10.2}100.TCP.MBS) where 192.168.168.10.2 is the backplane IP address of BMENUA0100 module.
43/14: Read Device Identification
The following device identification data can be returned using function code 43 / subcode 14:
Category |
Object ID |
Object Name |
Type |
---|---|---|---|
Basic |
0x00 |
VendorName |
ASCII string |
0x01 |
ProductCode |
ASCII string |
|
0x02 |
MajorMinorRevision |
ASCII string |
|
Regular |
0x03 |
VendorUrl |
ASCII string |
0x04 |
ProductName |
ASCII string |
|
0x05 |
ModelName |
ASCII string |
|
0x06 |
UserApplicationName |
ASCII string |
|
0x07...0xFF |
Reserved |
ASCII string |