NSM-8×1AES/NSM-7×2AES Installation and Operation Manual
75
Appendix B: Resource Module X-Y Network Communication
Preliminary—Contents are proprietary and confidential. Do not photocopy or distribute.
Expected Response
The expected response for this command is a statement defining the
locked destination. Response syntax is as follows
W!<Lvl><Dest>,<ID>,1
Table B-12.
Lock/Protect Command Syntax
Command Syntax
Element
Syntax Format Description
Header
@
@ followed by a space ( ) indicates
pass-through commands
Command
W
Lock/Protect
command
Parameters
<Lvls>
Level number(s) (0–9, A–F) to be
affected
/
Separator
<Dest>,
Destination number (0 – FFF0) you
wish to lock.
<ID>
Device ID for the requesting device's
ID (valid ID numbers are in hex = 0–
9, A–F).
<#>
1 = Applies the
Lock
property
2 = Applies the
Protect
property
0 = Applies the
Unlock/Unprotect
property, and is only effective if it is
sent by the device that set the lock or
the protect.
Closing
Carriage return
Table B-13.
Lock/Protect
Response Syntax
Response Syntax
Element
Syntax Format Description
Header
None
Command
W!
Lock/Protect Response command