7
COMMUNICATION USING BUILT-IN ETHERNET
PORTS OF CPU MODULE
7.7 Remote Password
7
- 47
1
O
verv
iew
2
Per
fo
rma
nce
S
p
ecifica
tio
n
3
S
equ
en
ce P
ro
g
ra
m
Co
nfig
ura
tio
n a
nd
E
xecut
io
n Co
nd
iti
o
ns
4
I/O N
unb
er
Assig
n
m
e
nt
5
Me
mor
ie
s a
nd
File
s
Ha
nd
led
by CP
U Mo
du
le
6
Func
tions
7
Co
mmu
nic
a
tion
us
in
g
bu
ilt
-i
n E
th
e
rne
t po
rt
s o
f
CP
U mod
u
le
8
Co
mm
un
icatio
n
w
ith
Int
e
lli
ge
nt
Fun
ction
Mo
du
le
(b) Enabling parameter settings
After writing parameter settings to the CPU module, settings are enabled by
powering the programmable controller ON or resetting the CPU module.
(c) Performing remote password unlock/lock processing
Perform the remote password unlock/lock processing from an external device
using respective protocol as follows.
1) Using MELSOFT connection
Enter the remote password in the following dialog box that appears during
communication.
GX Developer performs unlock processing upon entering the remote
password and then access the CPU module.
2) Using MC protocol
Use the dedicated commands for the MC protocol.
For details on the MC protocol dedicated commands, refer to the following
manual.
Q Corresponding MELSEC Communication Protocol Reference Manual
3) Using file transfer (FTP server) function
Use the "password-lock"/"unlock" commands. (
(3) Precautions for remote password
Precautions for the remote password check function are described below.
(a) Setting remote password to UDP connections
• Determine the communication target external device and do not
communicate with unspecified external devices. (The communication target
external device needs to be determined since UDP/IP connections can
communicate with any other devices, including the device that has performed
unlock processing, after the remote password unlocking processing is
completed normally.)
• At the end of data communication, always perform the remote password lock
processing. (If lock processing is not performed, unlock status is held until a
time-out occurs. When there is no communication for 10 minutes, the CPU
module automatically performs time-out based lock processing.)
To prevent unauthorized access more strictly using the remote password, it is
recommended to set all connection protocols to TCP/IP and disable GX
Developer direct connection in parameter.
(b) Performing close processing before lock processing for TCP/IP
connections
When close processing is performed before lock processing for TCP/IP
connections, the CPU module automatically performs lock processing.
Figure 7.30 Password confirmation screen