PH SCALANCE-W700ax-WBM 76
PH SCALANCE-W700ax-WBM 76
Security recommendations 2
Description 3
SIMATIC NET
Technical basics 4
Industrial Wireless LAN
SCALANCE W700 5
IP addresses
according to IEEE 802.11ax
Web Based Management V2.0 Configuring with
Web Based Management 6
Configuration Manual
Troubleshooting/FAQ 8
Appendix A "Supported
MIB Modules" A
Appendix G "Permitted
characters in names, G
passwords and descriptions"
12/2022
C79000-G8976-C618-04
Legal information
Warning notice system
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
DANGER
indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
Qualified Personnel
The product/system described in this documentation may be operated only by personnel qualified for the specific
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Proper use of Siemens products
Note the following:
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
documentation. If products and components from other manufacturers are used, these must be recommended or
approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and maintenance
are required to ensure that the products operate safely and without any problems. The permissible ambient
conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
1 Introduction ........................................................................................................................................... 9
1.1 Purpose of the configuration manual.................................................................................... 9
1.2 Scope of validity .................................................................................................................. 9
1.3 Supplementary documentation.......................................................................................... 10
1.4 Further documentation...................................................................................................... 10
1.5 Terms used ........................................................................................................................ 11
1.6 SIMATIC NET glossary......................................................................................................... 11
1.7 Security information .......................................................................................................... 11
1.8 Firmware ........................................................................................................................... 12
1.9 Open source license conditions .......................................................................................... 12
1.10 Error/fault .......................................................................................................................... 13
1.11 Decommissioning .............................................................................................................. 13
1.12 Recycling and disposal ....................................................................................................... 13
1.13 Marken .............................................................................................................................. 13
2 Security recommendations.................................................................................................................. 15
2.1 Security recommendations................................................................................................. 15
2.2 Available services............................................................................................................... 19
3 Description........................................................................................................................................... 23
3.1 Network structures ............................................................................................................ 23
3.2 Possible applications .......................................................................................................... 25
3.3 Planned operating environment ......................................................................................... 25
3.4 Product characteristics ....................................................................................................... 26
3.5 IEEE 802.11r...................................................................................................................... 27
3.6 Requirements for installation and operation ....................................................................... 28
3.7 Configuration License PLUG (CLP)....................................................................................... 28
3.8 PRESET PLUG...................................................................................................................... 30
3.9 Power over Ethernet (PoE).................................................................................................. 30
3.10 Digital input / output.......................................................................................................... 31
4 Technical basics ................................................................................................................................... 35
4.1 Configuration limits ........................................................................................................... 35
4.2 Interfaces and system functions ......................................................................................... 35
4.3 PROFINET........................................................................................................................... 37
4.4 VLAN ................................................................................................................................. 37
4.5 MAC-based communication ............................................................................................... 38
4.6 iFeatures ........................................................................................................................... 39
4.6.1 iPCF-2................................................................................................................................ 39
4.6.2 iPRP ................................................................................................................................... 40
4.7 SNMP ................................................................................................................................ 42
4.8 Spanning Tree.................................................................................................................... 44
4.8.1 RSTP, MSTP, CIST ................................................................................................................ 45
4.9 User management ............................................................................................................. 46
4.10 NAT ................................................................................................................................... 48
5 IP addresses ......................................................................................................................................... 51
5.1 IPv4 / IPv6 .......................................................................................................................... 51
5.2 IPv4 address....................................................................................................................... 53
5.2.1 Structure of an IPv4 address ............................................................................................... 53
5.2.2 Initial assignment of an IPv4 address .................................................................................. 54
5.2.3 Address assignment via DHCPv4......................................................................................... 55
5.2.4 Address assignment with SINEC PNI.................................................................................... 56
5.2.5 Address assignment with STEP 7 ........................................................................................ 56
5.2.6 Address assignment with SINEC NMS ................................................................................. 57
5.3 IPv6 address....................................................................................................................... 57
5.3.1 IPv6 terms ......................................................................................................................... 57
5.3.2 Structure of an IPv6 address ............................................................................................... 58
6 Configuring with Web Based Management......................................................................................... 61
6.1 Web Based Management.................................................................................................... 61
6.2 Login ................................................................................................................................. 63
6.3 "Information" menu ........................................................................................................... 66
6.3.1 Start page.......................................................................................................................... 66
6.3.2 Versions............................................................................................................................. 72
6.3.3 I&M ................................................................................................................................... 73
6.3.4 ARP / neighbors.................................................................................................................. 74
6.3.4.1 ARP-Tabelle ........................................................................................................................ 74
6.3.4.2 IPv6 Neighbor Table ........................................................................................................... 75
6.3.5 Log Tables ......................................................................................................................... 76
6.3.5.1 Event Log .......................................................................................................................... 76
6.3.5.2 WLAN authentication log ................................................................................................... 78
6.3.6 Faults ................................................................................................................................ 79
6.3.7 Redundancy....................................................................................................................... 80
6.3.8 Ethernet Statistics .............................................................................................................. 84
6.3.8.1 Interface Statistics.............................................................................................................. 84
6.3.8.2 Packet Size......................................................................................................................... 85
6.3.8.3 Packet Type........................................................................................................................ 86
6.3.8.4 Packet Error ....................................................................................................................... 86
6.3.9 Learning Table ................................................................................................................... 88
Client
SCALANCE WUM766-1 6GK5766-1GE00-3DA0 MSAX65-W1-M12-E2
6GK5766-1GE00-3DB0 (US)
6GK5766-1GE00-3DC0 (ME)
SCALANCE WUM763-1 6GK5763-1AL00-3AA0 MSAX-W1-RJ-E2-NO
In order to protect plants, systems, machines and networks against cyber threats, it is
necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens’ products and solutions constitute one element of such a concept.
Customers are responsible for preventing unauthorized access to their plants, systems,
machines and networks. Such systems, machines and components should only be connected
to an enterprise network or the internet if and to the extent such a connection is necessary
and only when appropriate security measures (e.g. firewalls and/or network segmentation)
are in place.
For additional information on industrial security measures that may be implemented, please
visit
https://www.siemens.com/industrialsecurity (https://www.siemens.com/industrialsecurity).
Siemens’ products and solutions undergo continuous development to make them more
secure. Siemens strongly recommends that product updates are applied as soon as they are
available and that the latest product versions are used. Use of product versions that are no
longer supported, and failure to apply the latest updates may increase customer’s exposure
to cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS
Feed under
https://www.siemens.com/cert (https://www.siemens.com/cert).
1.8 Firmware
The firmware is available on the Internet pages of the Siemens Industry Online Support: (https://
support.industry.siemens.com/cs/ww/en/ps/28575/dl)
The firmware is signed and encrypted. This ensures that only firmware created by Siemens can
be downloaded to the device.
Note
Open source software
Read the license conditions for open source software carefully before using the product.
The license terms and copyright information can be downloaded from the WBM or CLI as a
zip file.
• WBM: System > Load&Save > HTTP / TFTP / SFTP > LicenseCondition
• CLI: sftp save filetype LicenseConditions / tftp save filetype
LicenseConditions
1.10 Error/fault
If a fault develops, send the device to your SIEMENS representative for repair. Repairs on-site are
not permitted.
1.11 Decommissioning
Shut down the device properly to prevent unauthorized persons from accessing confidential
data in the device memory.
To do this, restore the factory settings on the device.
Also restore the factory settings on the storage medium.
1.13 Marken
The following and possibly other names not identified by the registered trademark sign ® are
registered trademarks of Siemens AG:
SCALANCE, RCoax
General
• Check the device regularly to ensure that these recommendations and/or other internal
security policies are complied with.
• Evaluate the security of your location and use a cell protection concept with suitable products
(https://www.siemens.com/industrialsecurity).
• When the internal and external network are disconnected, an attacker cannot access internal
data from the outside. Therefore operate the device only within a protected network area.
• No product liability will be accepted for operation in a non-secure infrastructure.
• Use VPN to encrypt and authenticate communication from and to the devices.
• For data transmission via a non-secure network, use an encrypted VPN tunnel (IPsec,
OpenVPN).
• Separate connections correctly (WBM, SSH etc.).
• Check the user documentation of other Siemens products that are used together with the
device for additional security recommendations.
• Using remote logging, ensure that the system protocols are forwarded to a central logging
server. Make sure that the server is within the protected network and check the protocols
regularly for potential security violations or vulnerabilities.
WLAN
• We recommend that you ensure redundant coverage for WLAN clients.
• More information on data security and data encryption for SCALANCE W is available in
SCALANCE W: Setup of a Wireless LAN in the Industrial Environment (https://
support.industry.siemens.com/cs/ww/en/view/22681042)
Authentication
Note
Accessibility risk - Risk of data loss
Do not lose the passwords for the device. Access to the device can only be restored by resetting
the device to factory settings which completely removes all configuration data.
• Replace the default passwords for all user accounts, access modes and applications (if
applicable) before you use the device.
• Define rules for the assignment of passwords.
• Use passwords with a high password strength. Avoid weak passwords, (e.g. password1,
123456789, abcdefgh) or recurring characters (e.g. abcabc).
This recommendation also applies to symmetrical passwords/keys configured on the device.
• Make sure that passwords are protected and only disclosed to authorized personnel.
• Do not use the same passwords for multiple user names and systems.
• Store the passwords in a safe location (not online) to have them available if they are lost.
• Regularly change your passwords to increase security.
• A password must be changed if it is known or suspected to be known by unauthorized
persons.
• When user authentication is performed via RADIUS, make sure that all communication takes
place within the security environment or is protected by a secure channel.
• Watch out for link layer protocols that do not offer their own authentication between
endpoints, such as ARP or IPv4. An attacker could use vulnerabilities in these protocols to
attack hosts, switches and routers connected to your layer 2 network, for example, through
manipulation (poisoning) of the ARP caches of systems in the subnet and subsequent
interception of the data traffic. Appropriate security measures must be taken for non-secure
layer 2 protocols to prevent unauthorized access to the network. Physical access to the local
network can be secured or secure, higher layer protocols can be used, among other things.
Physical/remote access
• Operate the devices only within a protected network area. Attackers cannot access internal
data from the outside when the internal and the external network are separate from each
other.
• Limit physical access to the device exclusively to trusted personnel.
The memory card or the PLUG (C-PLUG, KEY-PLUG, CLP) contains sensitive data such as
certificates and keys that can be read out and modified. An attacker with control of the
device's removable media could extract critical information such as certificates, keys, etc. or
reprogram the media.
• Lock unused physical ports on the device. Unused ports can be used to gain forbidden access
to the plant.
• We highly recommend that you keep the protection from brute force attacks (BFA) activated
to prevent third parties from gaining access to the device. For more information, see the
configuration manuals, section "Brute Force Prevention (Page 287)".
• For communication via non-secure networks, use additional devices with VPN functionality
to encrypt and authenticate communication.
• When you establish a secure connection to a server (e.g. for an upgrade), make sure that
strong encryption methods and protocols are configured for the server.
• Terminate the management connections (e.g. HTTP, HTTPS, SSH) properly.
• Make sure that the device has been powered down completely before you decommission it.
For more information, refer to "Decommissioning (Page 13)".
• We recommend formatting a PLUG that is not being used.
Hardware / Software
• Use VLANs whenever possible as protection against denial-of-service (DoS) attacks and
unauthorized access.
• Restrict access to the device by setting firewall rules or rules in an access control list (ACL).
• Selected services are enabled by default in the firmware. It is recommended to enable only
the services that are absolutely necessary for your installation.
For more information on available services, see "List of available services (Page 19)".
• To ensure you are using the most secure encryption methods available, use the latest web
browser version compatible with the product. Also, the latest web browser versions of
Mozilla Firefox, Google Chrome, and Microsoft Edge have 1/n-1 record splitting enabled,
which reduces the risk of attacks such as SSL/TLS Protocol Initialization Vector
Implementation Information Disclosure Vulnerability (for example, BEAST).
• Ensure that the latest firmware version is installed, including all security-related patches.
You can find the latest information on security patches for Siemens products at the Industrial
Security (https://www.siemens.com/industrialsecurity) or ProductCERT Security Advisories
(https://www.siemens.com/cert) website.
For updates on Siemens product security advisories, subscribe to the RSS feed on the
ProductCERT Security Advisories website or follow @ProductCert on Twitter.
• Enable only those services that are used on the device, including physical ports. Free physical
ports can potentially be used to gain access to the network behind the device.
• Use the authentication and encryption mechanisms of SNMPv3 if possible. Use strong
passwords.
• Configuration files can be downloaded from the device. Ensure that configuration files are
adequately protected.
Configuration files can be password protected during download. You enter passwords on the
WBM page "System > Load & Save > Passwords (Page 145)".
• When using SNMP (Simple Network Management Protocol):
– Configure SNMP to generate a notification when authentication errors occur.
For more information, see WBM "System > SNMP > Notifications (Page 167)".
– Ensure that the default community strings are changed to unique values.
– Use SNMPv3 whenever possible. SNMPv1 and SNMPv2c are considered non-secure and
should only be used when absolutely necessary.
– If possible, prevent write access.
• Use the security functions such as address translation with NAT (Network Address
Translation) or NAPT (Network Address Port Translation) to protect receiving ports from
access by third parties.
• Use WPA2/ WPA2-PSK / WPA3-SAE with AES to protect the WLAN. You can find additional
information in the configuration manual Web Based Management "Security menu
(Page 289)".
• Use PMF (Protected Management Frames) to cryptographically protect the management
telegrams. You can find additional information in the configuration manual Web Based
Management "Security menu (Page 289)".
• Configurable port/service
Indicates whether the port number or the service can be configured via WBM / CLI.
• Authentication
Specifies whether the communication partner is authenticated.
If "optional", the authentication can be configured as required.
• Encryption
Specifies whether the transfer is encrypted.
If "optional", the encryption can be configured as required.
The following is a list of all available Layer 2 services through which the device can be
accessed.
The table includes the following columns:
• Layer 2 service
The Layer 2 services that the device supports.
• Default status
The default status of the service (open or closed).
• Service configurable
Indicates whether the service can be configured via WBM / CLI.
DCP Open ✓
LLDP Open ✓
RSTP Closed ✓
iPRP Closed ✓
MSTP Closed ✓
SIMATIC NET TIME Closed ✓
802.1x Closed ✓
Multichannel configuration
If neighboring access points use the same frequency channel, this can lead to longer response
times due to any collisions that may occur. If the configuration shown in the figure is
implemented as a single-channel system, computers A and B cannot communicate at the same
time with the access points in their wireless cells.
If neighboring access points are set up for different frequencies, this leads to a considerable
improvement in performance. As a result, neighboring wireless cells each have their own
medium available and the delays resulting from time-offset transmission no longer occur.
The channel spacing should be as large as possible; a practical value is 25 MHz. Even in a
multichannel configuration, all access points can be configured with the same network name.
The following graphic shows a multichannel configuration on channels 1 and 2 with four
access points.
2
A
1
B
2
Note
The SIMATIC NET WLAN products use OpenSSL.
This is open source code with license conditions (BSD).
Please refer to the current license conditions.
Since the driver includes encryption software, you should also adhere to the appropriate
regulations for your specific country.
is buffered within the mobility domain. This logon is valid for all members of the mobility
domain.
Based on the ID, the WLAN client recognizes whether the access point is a member of the
same mobility domain and can therefore log on without delay. Only WLAN clients with IEEE
802.11r support can use the improved roaming or handover functions.
Requirement
• The access points are members of the same mobility domain
• Only possible with the following encryptions:
– WPA2-PSK
– WPA2 RADIUS
– WPA3-SAE
How it works
NOTICE
Do not remove or insert the PLUG during operation.
A PLUG may only be removed or inserted when the device is turned off.
The device checks whether a PLUG is inserted at one second intervals. If it is detected that the
PLUG has been removed, the device restarts.
If a valid PLUG license was inserted in the device, the device changes to a defined error state
following the restart. With SCALANCE W, the available wireless interfaces are deactivated in
this case.
If the device was configured at some time with a PLUG license, the device can no longer be used
without this PLUG. To be able to use the device again, reset the device to the factory settings.
Note
Using configurations with DHCP
Create a PRESET-PLUG only from device configurations that use DHCP. Otherwise disruptions will
occur in network operation due to multiple identical IP addresses.
You assign fixed IP addresses extra following the basic installation.
In a CLP that was configured as a PRESET-PLUG, the device configuration, user accounts,
certificates and the firmware are stored.
Note
Restore factory defaults and restart with a PRESET PLUG inserted
If you reset a device to the factory defaults, when the device restarts an inserted PRESET PLUG
is formatted and the PRESET PLUG functionality is lost. You then need to create a new PRESET
PLUG.
We recommend that you remove the PRESET PLUG before you reset the device to the factory
settings.
For more detailed information on creating and using a PRESET PLUG refer to the section
Device configuration with PRESET-PLUG (Page 309).
General
"Power over Ethernet" (PoE) is a power supply strategy for network components according to
IEEE with 802.3af or 802.3at.
With PoE, power and data transmission takes place over the used Ethernet cables that
connect the individual network components. This makes an additional power cable
unnecessary and reduces investment and maintenance costs. PoE can be used with all
network components that require little power (max. 12.95 W).
Which Ethernet connectors of a device are capable of PoE can be found in the operating
instructions of the device.
Endspan
With endspan, the power is supplied via a switch that can reach a device over an Ethernet cable.
The switch must be capable of PoE, for example a SCALANCE X108PoE, SCALANCE X308-2M
POE, SCALANCE XR552‑12M.
Midspan
Midspan is used when the switch is not PoE-compliant. The power is supplied by an additional
device between the switch and end device. In this case, only data rates of 10/100 Mbps can be
achieved because the power is supplied on redundant wires.
A Siemens power insert can also be used as the interface for the power input. Since a power
insert supports a power supply of 24 VDC, it does not conform with 802.3af or IEEE 802.3at.
The following restrictions relating to the use of power inserts should be noted:
WARNING
Operate the power insert only when the following conditions apply:
• with extra low voltages SELV, PELV complying with IEC 60364-4-41
• in USA/CAN with power supplies complying with NEC class 2
• in USA/CAN, the cabling must meet the requirements of NEC/CEC
• Power load maximum 0.5 A.
Introduction
The devices have a digital input and output (M12, A-coded). You will find information about the
pin assignment in the operating instructions of the devices.
Application example
• Digital input to signal one item of information, for example "door open", "door closed".
• Digital output, for example for "go to sleep" for devices on an automated guided transport
system.
Note
You cannot configure the digital output with Web Based Management (WBM).
If the digital input changes the status, an entry is made in the event protocol table.
Digital input
Using the private MIB variable snMspsDigitalInputLevel, you can read out the status of the digital
input.
Note
If the digital output changes status, an entry is made in the event protocol table.
MIB file
The MIB variables can be found in the file "SN-MSPS-DIGITAL-IO-MIB" that is part of the private
MIB file "snMspsWlan.mib". You will find more detailed information in "Private MIB variables of
the SCALANCE W device".
See also
Appendix B "Private MIBs" (Page 319)
4.3 PROFINET
PROFINET
PROFINET is an open standard (IEC 61158/61784) for industrial automation based on Industrial
Ethernet. PROFINET uses existing IT standards and allows end-to-end communication from the
field level to the management level as well as plant-wide engineering. PROFINET also has the
following features:
• Use of TCP/IP
• Automation of applications with real-time requirements
– Real-Time (RT) communication
– Isochronous Real-Time (IRT) communication
• Seamless integration of fieldbus systems
You configure PROFINET in "System > PROFINET (Page 187)".
PROFINET IO
Within the framework of PROFINET, PROFINET IO is a communications concept for implementing
modular, distributed applications. PROFINET IO is implemented by the PROFINET standard for
programmable controllers (IEC 61158-x-10).
4.4 VLAN
When a SCALANCE W device receives a doubly tagged frame, it uses the VLAN ID from the
outer VLAN tag ② and the priority information from the inner VLAN tag ①. The frame is
then forwarded to the relevant VLAN.
4.6 iFeatures
4.6.1 iPCF-2
The wireless range of an IWLAN system can be expanded by using multiple access points. If a
client is moved from the area covered by one access point to the area covered by another access
point, the wireless link is maintained after a short interruption (roaming). If very fast update
times and low latencies are required, for example for PROFINET communication, access points
and client modules need to be used that meet the requirements through proprietary
improvements, such as iPCF-2.
iPCF-2 and other iFeatures can only be operated alone. A combination with each other is not
possible.
How it works
iPCF
With iPCF the access point checks all nodes in the wireless cell cyclically. At the same time,
the scan includes the downlink traffic for this node. In the reply, the node sends the uplink
data. The access point scans a new node at least every 5 ms.
The scan of a node is seen by all other nodes in the cell. This allows a client to detect the
quality of the wireless link to the access point even when it is not communicating with the
access point itself. If the client does not receive any frames from the access point for a
certain time, it starts to search for a new access point.
In iPCF mode, both the search for a new access point and the registration with this access
point have been optimized in terms of time. Handover times significantly below 50 ms are
achieved.
The "Legacy Free (iPCF-LF)" setting is available to prevent the performance from being slowed
down by the IEEE 802.11 a/b/g device generation. When enabled, only the devices that
communicate with the IEEE 802.11n standard and have the "Legacy Free (iPCF-LF)" setting
enabled are accepted. WLAN mode IEEE 802.11n need not be enabled for this, however.
Stable PROFINET communication is only possible when a WLAN client is in a wireless cell with
more than 60 % or -65 dBm signal strength at all times. This can be checked by activating
and deactivating the various wireless cells.
This does not mean that the client needs to change when there is a signal strength < 60 % (<
-65 dBm). Make sure that access points are available with adequate signal strength.
iPCF-HT and iPCF-MC are expansions of iPCF for the WLAN mode IEEE 802.11n. You can find
more information in the document "IWLAN: Configuring an Industrial Wireless LAN" under
the following entry ID:
90880063 (https://support.industry.siemens.com/cs/de/en/view/90880063)
iPCF-2
iPCF-2 is introduced according to IEEE 802.11ax for the first time with the firmware version
V2.0 of the SCALANCE W700 devices. The functionality will be expanded and improved
during the subsequent stages.
iPCF-2 in FW V2.0 consists of various proprietary mechanisms that enable real-time
communication along defined paths, such as absolute prioritization of PROFINET traffic, Fast
Transition and more.
The function "TCP Event > WLAN Roaming" enables rapid roaming through transfer of
parameters of the access point to which the client will establish a connection next after
the application.
You configure iPCF-2 under "iFeatures > iPCF-2 (Page 301)".
4.6.2 iPRP
The "Parallel Redundancy Protocol" (PRP) is a redundancy protocol for cabled networks. It is
defined in Part 3 of the IEC 62439 standard.
With the "industrial Parallel Redundancy Protocol" (iPRP) the PRP technology can be used in
wireless networks. This improves the availability of wireless communication.
How it works
A PRP network consists of two completely independent networks. If one network is disrupted,
the frames are sent without interruption/reconfiguration via the parallel redundant network. To
achieve this the Ethernet frames are sent to the recipient in duplicate via both networks. Devices
capable of PRP have at least two separate Ethernet interfaces that are connected to independent
networks.
With devices not capable of PRP a redundancy box (RedBox) is connected upstream. This
allows access for so-called Single Attached Nodes (SAN) to PRP networks. The RedBox
duplicates every Ethernet frame to be sent and adds a PRP trailer to the frame that among
other things contains a sequence number. The RedBox simultaneously sends a copy of the
frame to the PRP A and PRP B network. At the receiving end the duplicate frame is discarded
by the RedBox. For this the RedBox requires certain transfer times designed for Ethernet
networks. For this reason using PRP in WLAN networks results in duplicate and delayed
frames.
With iPRP, this problem is solved and the use of PRP in WLAN with SCALANCE W devices
becomes possible
6LQJOH$WWDFKHG1RGH
6$1
5HGXQGDQF\%R[
5HG%R[
353$ 353%
9/$19/$1 9/$19/$1
9/$19/$1
9/$1 9/$1
&OLHQW$ &OLHQW%
:/$1!9/$1 353$ :/$1!9/$1 353%
39/$19/$1 39/$19/$1
353$ 353%
5HGXQGDQF\%R[
5HG%R[
,QGXVWULDO(WKHUQHW 6LQJOH$WWDFKHG1RGH
6$1
The access points (AP 1, AP 2 and AP 3) and the RedBox at the AP end are connected to each
other via a switch. PRP network A und B are separated from each other via VLANs.
If SAN1 sends a frame to SAN2, the frame is duplicated by the RedBox at the AP end and
the two redundant frames are transferred via the switch to the access points. Via the two
different wireless paths the redundant PRP frames are transferred to the RedBox at the client
end. The clients are also connected to their RedBox via a switch. This forwards the first PRP
frame to arrive to SAN2 and discards the second one.
With transfer paths that are not the same, iPRP reduces the number of duplicated and
out-of-order packets. The application/protocol used must be able to handle the remaining
duplicates and out-of-order packets.
Note
On the interfaces of the switches to the SCALANCE W devices, only the VLANs that are also set
on the VAP or WLAN interfaces of the SCALANCE W devices may be configured.
With iPRP the redundant partners (here: AP1 and AP3 or client A and client B) communicate
with each other via a switch to prevent the two redundant PRP frames from arriving at the
RedBox with too great a time difference.
If for example the communication between AP1 and client A is very slow, the slower frame is
discarded at the receiving end.
You configure iPRP in "iFeatures > iPRP (Page 303)".
Requirement
• iPRP can only be used with the CLP iFeatures (Page 28).
• The base bridge mode "802.1Q VLAN Bridge" is set.
• The VLANs have been created.
• Access point mode: The VAP interface is enabled.
• Client mode: In MAC mode "Layer 2 Tunnel" is set.
• Depending on the configuration the clients can communicate with every access point.
• The Spanning Tree Protocol is disabled.
4.7 SNMP
Introduction
With the aid of the Simple Network Management Protocol (SNMP), you monitor and control
network components from a central station, for example routers or switches. SNMP controls the
communication between the monitored devices and the monitoring station.
Tasks of SNMP:
• Monitoring of network components
• Remote control and remote parameter assignment of network components
• Error detection and error notification
In versions v1 and v2c, SNMP has no security mechanisms. Each user in the network can
access data and also change parameter assignments using suitable software.
For the simple control of access rights without security aspects, community strings are used.
The community string is transferred along with the query. If the community string is correct,
the SNMP agent responds and sends the requested data. If the community string is not
correct, the SNMP agent discards the query. Define different community strings for read and
write permissions. The community strings are transferred in plain text.
SNMPv3
Compared with the previous versions SNMPv1 and SNMPv2c, SNMPv3 introduces an extensive
security concept.
SNMPv3 supports:
• Fully encrypted user authentication
• Encryption of the entire data traffic
• Access control of the MIB objects at the user/group level
With the introduction of SNMPv3, you can no longer transfer user configurations to other
devices without taking special action, e.g. by loading a configuration file.
According to the standard, the SNMPv3 protocol uses a unique SNMP engine ID as an internal
identifier for an SNMP agent. This ID must be unique in the network. It is used to authenticate
access data of SNMPv3 users and to encrypt it.
Depending on whether you have enabled or disabled the “SNMPv3 User Migration” function,
the SNMP engine ID is generated differently.
Restriction when using the function
Use the "SNMPv3 User Migration" function only to transfer configured SNMPv3 users to a
substitute device when replacing a device.
Do not use the function to transfer configured SNMPv3 users to multiple devices. If you load
a configuration with created SNMPv3 users on several devices, these devices use the same
SNMP engine ID. If you use these devices in the same network, your configuration contradicts
the SNMP standard.
Compatibility with predecessor products
You can only transfer SNMPv3 users to a different device if you have created the users as
migratable users. To create a migratable user the "SNMPv3 User Migration" function must be
activated when you create the user.
Avoiding loops
The Spanning Tree algorithm detects redundant physical network structures and prevents the
formation of loops by disabling redundant paths. It evaluates the distance and performance of
a connection or bases the decisions on settings made by the user. Data is then exchanged only
over the remaining connection paths.
If the preferred data path fails, the Spanning Tree algorithm then searches for the most
efficient path possible with the remaining nodes.
By directly linking the devices, a status change (reconfiguration of the ports) can be made
without any delays.
• Alternate port (substitute for the root port)
A substitute for the root port is configured. If the connection to the root bridge is lost, the
device can establish a connection over the alternate port without any delay due to
reconfiguration.
• Reaction to events
Rapid spanning tree reacts to events, for example an aborted connection, without delay.
There is no waiting for timers as in spanning tree.
• Counter for the maximum bridge hops
The number of bridge hops a package is allowed to make before it automatically becomes
invalid.
In principle, therefore with rapid spanning tree, alternatives for many parameters are
preconfigured and certain properties of the network structure taken into account to reduce
the reconfiguration time.
Local logon
The local logging on of users by the device runs as follows:
1. The user logs on with user name and password on the device.
2. The device checks whether an entry exists for the user.
→ If an entry exists, the user is logged in with the rights of the associated role.
→ If no corresponding entry exists, the user is denied access.
Depending on the RADIUS authorization mode you have selected on the "Security > AAA >
RADIUS Client" page, the device evaluates different information of the RADIUS server.
If you have set the authorization mode "SiemensVSA", the authentication of users via a
RADIUS server runs as follows:
1. The user logs on with user name and password on the device.
2. The device sends an authentication request with the login data to the RADIUS server.
3. The RADIUS server runs a check and signals the result back to the device.
Case A: The RADIUS server reports a successful authentication and returns the group
assigned to the user to the device.
– The group is known on the device and the user is not entered in the table "External User
Accounts"
→ The user is logged in with the rights of the assigned group.
– The group is known on the device and the user is entered in the table "External User
Accounts"
→ The user is assigned the role with the higher rights and logged in with these rights.
– The group is not known on the device and the user is entered in the table "External User
Accounts"
→ The user is logged in with the rights of the role linked to the user account.
– The group is not known on the device and the user is not entered in the table "External
User Accounts"
→ The user is logged in with the rights of the role "Default".
Case B: The RADIUS server reports a successful authentication but does not return a group
to the device.
– The user is entered in the table "External User Accounts":
→ The user is logged in with the rights of the linked role "".
– The user is not entered in the table "External User Accounts":
→ The user is logged in with the rights of the role "Default".
Case C: The RADIUS server reports a failed authentication to the device:
– The user is denied access.
4.10 NAT
NAT (Network Address Translation) is a method of translating IP addresses in data packets. With
this, two different networks (internal and external) can be connected together.
A distinction is made between source NAT in which the source IP address is translated and
destination NAT in which the destination IP address is translated.
IP masquerading
IP masquerading is a simplified source NAT. With each outgoing data packet sent via this
interface, the source IP address is replaced by the IP address of the interface. The adapted data
packet is sent to the destination IP address. For the destination host it appears as if the queries
always came from the same sender. The internal nodes cannot be reached directly from the
external network. By using NAPT, the services of the internal nodes can be made reachable via
the external IP address of the device.
IP masquerading can be used if the internal IP addresses cannot or should not be forwarded
externally, for example because the internal network structure should remain hidden.
You configure masquerading in "Layer 3" > "NAT" > "IP Masquerading (Page 264)".
NAPT
NAPT (Network Address and Port Translation) is a form of destination NAT and is often called port
forwarding.
Incoming data packets are translated that come from the external network and are intended
for an external IP address of the device (destination IP address). The destination IP address
is replaced by the IP address of the internal node. In addition to address translation, port
translation is also possible.
The options are available for port translation:
from to Response
a single port the same port If the ports are the same, the frames will be forwarded without port
translation.
a single port a single port The frames are translated to the port.
a port range a single port The frames from the port range are translated to the same port (n:1).
a port range the same port If the port ranges are the same, the frames will be forwarded without
range port translation.
Port forwarding can be used to allow external nodes access to certain services of the internal
network e.g. FTP, HTTP.
Configure NAPT under "Layer 3 (IPv4)" > "NAPT (Page 265)".
IPv4 IPv6
IP configuration • DHCP server • Stateless Address Autoconfiguration (SLAAC): Stateless au‐
• Manual toconfiguration using NDP (Neighbor Discovery Protocol)
– Creates a link local address for every interface that does
not require a router on the link.
– Checks the uniqueness of the address on the link that
requires no router on the link.
– Specifies whether the global addresses are obtained via
a stateless mechanism, a stateful mechanism or via
both mechanisms. (Requires a router on the link.)
• Manual
• DHCPv6 (stateful)
Available IP addresses 32-bit: 4, 29 * 10 address‐ 128-bit: 3, 4 * 1038 addresses
9
es
Address format Decimal: 192.168.1.1 Hexadecimal: 2a00:ad80::0123
with port: 192.168.1.1:20 with port: [2a00:ad80::0123]:20
Loopback 127.0.0.1 ::1
IP addresses of the interface 5 IP addresses Multiple IP addresses
• LLA: A link local address (formed automatically) fe80::/128
per interface
• ULA: Several unique local unicast addresses per interface
• GUA: Several global unicast addresses per interface
Header • Checksum • Checking at a higher layer
• Variable length • Fixed size
• Fragmentation in the • Fragmentation in the extension header
header
• No security
Fragmentation Host and router Only endpoint of the communication
Quality of service Type of Service (ToS) for The prioritization is specified in the header field "Traffic Class".
prioritization
Types of frame Broadcast, multicast, uni‐ Multicast, unicast, anycast
cast
IPv4 IPv6
Identification of DHCP clients/ Client ID: DUID + IAID(s) = exactly one interface of the host
server • MAC address DUID = DHCP unique identifier
• DHCP client ID Unique identifier of server and clients
• System name IAID = Identity Association Identifier
• PROFINET station name At least one per interface is generated by the client and remains
unchanged when the DHCP client restarts
• IAID and DUID
Three methods of obtaining the DUID
• DUID-LLT
• DUID-EN
• DUID-LL
DHCP via UDP with broadcast via UDP with unicast
RFC 3315, RFC 3363
Stateful DHCPv6
Stateful configuration in which the IPv6 address and the con‐
figuration settings are transferred.
Four DHVPv6 messages are exchanged between client and
server:
1. SOLICIT:
Sent by the DHCPv6 client to localize DHCPv6 servers.
2. ADVERTISE
The available DHCPv6 servers reply to this.
3. REQUEST
The DHCPv6 client requests an IPv6 address and the config‐
uration settings from the DHCPv6 server.
4. REPLY
The DHCPv6 server sends the IPv6 address and the config‐
uration settings.
If the client and server support the function "Rapid commit" the
procedure is shortened to two DHCPv6 messages SOLICIT and
REPLY .
Stateless DHCPv6
In stateless DHCPv6, only the configuration settings are trans‐
ferred.
Prefix delegation
The DHCPv6 server delegates the distribution of IPv6 prefixes to
the DHCPv6 client. The DHCPv6 client is also known as PD rout‐
er.
Resolution of IP addresses in ARP (Address Resolution NDP (Neighbor Discovery Protocol)
hardware addresses Protocol)
Subnet mask
The subnet mask consists of four decimal numbers with the range from 0 to 255, each number
separated by a period; example: 255.255.0.0
The binary representation of the 4 subnet mask decimal numbers must contain a series of
consecutive 1s from the left and a series of consecutive 0s from the right.
The "1" values determine the network address within the IPv4 address. The "0" values
determine the device address within the IPv4 address.
Example:
Correct values
255.255.0.0 D = 1111 1111.1111 1111.0000 0000.0000 0000 B
255.255.128.0 D = 1111 1111.1111 1111.1000 0000.0000 0000 B
255.254.0.0 D = 1111 1111.1111 1110.0000 0000.0000.0000 B
Incorrect value:
255.255.1.0 D = 1111 1111.1111 1111.0000 0001.0000 0000 B
In the example for the IP address mentioned above, the subnet mask shown here has the
following meaning:
The first 2 bytes of the IP address determine the subnet - i.e. 192.168. The last two bytes
address the device, i.e. 16.2.
The following applies in general:
• The network address results from the AND combination of IPv4 address and subnet mask.
• The device address results from the AND-NOT combination of IPv4 address and subnet mask.
Example:
IPv4 address 192.168.0.0 with subnet mask 255.255.255.0
The network part of the address covers 3 x 8 bits in binary representation; in other words 24
bits.
This results in the CIDR notation 192.168.0.0/24.
The host part covers 1 x 8 bits in binary notation. This results in an address range of 2 to the
power 8, in other words 256 possible addresses.
Result:
All devices with addresses from 129.80.1.xxx to 129.80.127.xxx are on one IP subnet, all
devices with addresses from 129.80.128.xxx to 129.80.255.xxx are on another IP subnet.
Configuration options
An initial IP address for a SCALANCE W device cannot be assigned using Web Based Management
(WBM) or the Command Line Interface (CLI) over Telnet because these configuration tools
require that an IP address already exists.
SINEC INS can be used as in-house DHCP server and assign IP addresses to devices in the
network.
Properties of DHCP
DHCP (Dynamic Host Configuration Protocol) is a method for automatic assignment of IPv4
addresses. It has the following characteristics:
• DHCP can be used both when starting up a device and during ongoing operation.
• The assigned IP address remains valid only for a limited time known as the lease time. When
half the period of validity has elapsed. the DHCP client can extend the period of the assigned
IPv4 address. When the entire time has elapsed, the DHCP client needs to request a new IPv4
address.
• There is normally no fixed address assignment; in other words, when a client requests an IP
address again, it normally receives a different address from the previous address. It is possible
to configure the DHCP server so that the DHCP client always receives the same fixed address
in response to its request. The parameter with which the DHCP client is identified for the
fixed address assignment is set on the DHCP client. The address can be assigned via the MAC
address, the DHCP client ID, PROFINET device name or the device name. You configure the
parameter in "System > DHCP Client (Page 155)".
• The following DHCP options are supported:
– DHCP option 66: Assignment of a dynamic TFTP server name
– DHCP option 67: Assignment of a dynamic boot file name
Note
DHCP uses a mechanism with which the IP address is assigned for only a short time (lease
time). If the device does not reach the DHCP server with a new request on expiry of the lease
time, the assigned IP address, the subnet mask and the gateway continue to be used.
The device therefore remains accessible under the last assigned IP address even without a
DHCP server. This is not the standard behavior of office devices but is necessary for problem-
free operation of the plant.
Introduction
The SINEC PNI is capable of assigning such an address to unconfigured devices that do not yet
have an IP address.
SINEC PNI
• To be able to assign an IP address to the device with SINEC PNI, it must be possible to reach
the device via Ethernet.
• You can find SINEC PNI on the Internet pages of Siemens Industry Online Support at the
following Link: (https://support.industry.siemens.com/cs/de/en/ps/26672/dl)
• For additional information about assigning the IP address with SINEC PNI, refer to the online
help or the "SINEC PNI network management" operating instructions.
STEP 7 as of V13
For additional information on assigning the IP address using STEP 7 as of V13, refer to the online
help "Information system", section "Addressing PROFINET devices".
Mechanism for determining the maximum permitted packet size along the entire path from a
sender to a recipient.
LLA
Link local address FE80::/10
As soon as IPv6 is activated on the interface, a link local address is formed automatically. Can
only be reached by nodes located on the same link.
ULA
Unique Local Address
Defined in RFC 4193. The IPv6 interface can be reached via this address in the LAN.
GUA
Global unicast address
The IPv6 interface can be reached through this address, for example, via the Internet.
Interface ID
The interface ID is formed with the EUI-64 method or manually.
EUI-64
Extended Unique Identifier (RFC 4291); process for forming the interface ID. In Ethernet,
the interface ID is formed from the MAC address of the interface. Divides the MAC address
into the manufacturer-specific part (OUI) and the network-specific part (NIC) and inserts FFFE
between the two parts.
Example:
MAC address = AA:BB:CC:DD:EE:FF
OUI = AA:BB:CC
NIC = DD:EE:FF
EUI-64 = OUI + FFFE + NIC = AA:BB:CC:FF:FE:DD:EE:FF
Scope
Defines the range of the IPv6 address.
Rules / simplifications:
• If one or more fields have the value 0, a shortened notation is possible.
The address fd00:0000:0000:ffff:02d1:7d01:0000:8f21 can also be shortened and written
as follows:
fd00::ffff:02d1:7d01:0000:8f21
To ensure uniqueness, this shortened form can only be used once within the entire address.
• Leading zeros within a field can be omitted.
The address fd00:0000:0000:ffff:02d1:7d01:0000:8f21 can also be shortened and written
as follows:
fd00::ffff:2d1:7d01:0000:8f21
• Decimal notation with periods
The last 2 fields or 4 bytes can be written in the normal decimal notation with periods.
Example: The IPv6 address fd00::ffff.125.1.0.1 is equivalent to fd00::ffff:7d01:1
The prefix for the link local address is always fe80:0000:0000:0000. The prefix is shortened
and noted as follows: fe80::
IPv6 prefix
Specified in: RFC 4291
The IPv6 prefix represents the subnet identifier.
Prefixes and IPv6 addresses are specified in the same way as with the CIDR notation (Classless
Inter-Domain Routing) for IPv4.
Design
IPv6 address / prefix length
Example
IPv6 address: 2001:0db8:1234::1111/48
Prefix: 2001:0db8:1234::/48
Interface ID: ::1111
Requirements
• The device has an IP address.
Note
Assign an IP address to the device using DHCP or SINEC PNI.
• There is a network connection between the device and the client PC.
• The network settings of the device and of the client PC match.
Note
You can use a ping to check whether a connection exists and communication is possible.
WBM display
The display of the WBM was tested with the following desktop Internet browsers:
• Mozilla Firefox
• Google Chrome
• Microsoft Edge
The WBM is tested with the current version of the Internet browser available at the time of
firmware release.
Note
Display of the WBM and working with it on mobile devices
The display and operation of the WBM pages on mobile devices may differ compared with the
same pages on desktop devices. Some pages also have an optimized display for mobile devices.
6.2 Login
Changing language
1. From the drop-down list at the top right, select the language version of the WBM pages.
2. Click the "Go" button to change to the selected language.
Note
Available languages
English and German are available as languages.
2. Load the text file into the device using "System > Load&Save". To do so, use the "Upload"
button in the table row "LoginWelcomeMessage" regardless of the protocol used.
3. Log out. The configured text is shown below the login data on the login page.
Logging in to WBM
You have the following options for logging in via HTTPS. You either use the login option in the
center of the browser window or the login option in the upper left area of the browser window.
The following steps apply, whichever of the above options you choose.
1. "Name" input box:
– When you log in for the first time or following a "Restore Factory Defaults and Restart",
enter the user preset in the factory "admin".
With this user account, you can change the settings of the device (read and write access
to the configuration data).
– Enter the user name of the created user account. You configure local user accounts and
roles in "Security > Users".
2. "Password" input box:
– When you log in for the first time or following a "Restore Factory Defaults and Restart",
enter the password of the default user preset in the factory "admin": "admin".
– Enter the password of the relevant user account.
Note
The password for the "admin" user has been changed for devices with the US version.
Specialist personnel for professional WLAN installations can obtain the password from
Siemens support.
• Favorites
When the product ships, the button is disabled on all pages .
If you click this button, the symbol changes and the currently open page or currently open
tab is marked as favorite. Once you have enabled the button once, the navigation area is
divided into two tabs. The first tab "Menu" contains all the available menus as previously. The
second tab "Favorites" contains all the pages/tabs that you selected as favorites. On the
"Favorites" tab the pages/tabs are arranged according to the structure in the "Menu" tab.
If you disable all the favorites you have created, the "Favorites" tab is removed again. To do
this, click the button on the relevant pages/tabs.
You can save, upload and delete the favorites configuration of a device on the "System >
Load&Save" page using HTTP or TFTP.
• Update on / Update off
WBM pages with overview lists can also have the additional "Update" button.
With this button, you can enable or disable updating of the content area. If updating is turned
on, the display is updated every 2 seconds. To disable the update, click "On". Instead of "On",
"Off" is displayed. As default, updating is always disabled on the WBM page.
• PROFINET AR Status
Shows the PROFINET application relation status.
– Online
There is a connection to a PROFINET controller. The PROFINET controller has downloaded
its configuration data to the device. The device can send status data to the PROFINET
controller.
In this status, the parameters set by the PROFINET controller cannot be configured on the
device.
– Offline
There is no connection to a PROFINET controller.
• Power Line 1 / Power Line 2 / Power over Ethernet
Status of the power supplies 1 and 2 or power over Ethernet. The power line 2 and Power over
Ethernet are only displayed if they are supported by the hardware. You can find additional
information on this in the operating instructions.
• PLUG Configuration
Shows the status of the configuration data on the PLUG, refer to the section "System > PLUG
> PLUG Configuration".
• PLUG License
Shows the status of the license on the PLUG, refer to the section "System > PLUG > PLUG
License".
• Fault Status
Shows the fault status of the device.
• Packet Capture
Shows the status of the "Packet Capture" function at the interface (Ethernet, WLAN).
Buttons you require often
The pages of the WBM contain the following standard buttons:
• Refresh the display with "Refresh"
Web Based Management pages that display current parameters have a "Refresh" button at
the bottom edge of the page. Click this button to request up-to-date information from the
device for the current page.
Note
If you click the "Refresh" button, before you have transferred your configuration changes to
the device using the "Set Values" button, your changes will be deleted and the previous
configuration will be loaded from the device and displayed here.
Messages
If you have enabled the "Automatic Save" mode and you change a parameter the following
message appears in the display area "Changes will be saved automatically in x seconds. Press
'Write Startup Config' to save the changes immediately."
Note
Interrupting the save
Saving starts only after the timer in the message has elapsed. How long saving takes depends
on the device.
During the save, the message "Saving configuration data in progress. Please do not switch off the
device" is displayed.
• Do not switch off the device immediately after the timer has elapsed.
6.3.2 Versions
Description
Table 1 has the following columns:
• Hardware
– Basic Device
Shows the basic device.
• Name
Shows the name of the device or module.
• Revision
Shows the hardware version of the device. The version of the wireless card is displayed if the
WLAN interface is enabled.
• Article number
Shows the article number of the device or described module.
Table 2 has the following columns:
• Software
– Firmware
Shows the current firmware version. If a new firmware file was downloaded and the
device has not yet restarted, the firmware version of the downloaded firmware file is
displayed here. After the next restart, the downloaded firmware is activated and used.
– Bootloader
Shows the version of the boot software stored on the device.
– Firmware_Running
Shows the firmware version currently being used on the device.
• Description
Shows the short description of the software.
• Version
Shows the version number of the software version.
• Date
Shows the date on which the software version was created.
6.3.3 I&M
Description
The table has the following rows:
• Manufacturer ID
Shows the manufacturer ID.
• Article number
Shows the article number.
• Basic MAC Address
Shows the MAC address of the IPv4 interface.
• Serial Number
Shows the serial number.
• Hardware Revision
Shows the hardware version.
• Software Revision
Shows the software version.
• Revision Counter
Regardless of a version change, this box always displays the value "0".
• Function tag
Shows the function tag (plant designation) of the device. The plant designation (HID) is
created during configuration of the device with HW Config of STEP 7.
• Location tag
Shows the location tag of the device. The location identifier (LID) is created during
configuration of the device with HW Config of STEP 7.
• Date
Shows the date created by STEP 7 during configuration of the device with HW Config.
• Descriptor
Shows the description created during configuration of the device with HW Config of STEP 7.
6.3.4.1 ARP-Tabelle
• IP Address
Shows the IPv6 address of the destination device.
• Media Type
Shows the type of connection.
– Dynamic
The device recognized the address data automatically.
– Static
The addresses were entered as static addresses.
Logging events
The device allows you to log occurring events, some of which you can specify on the page of the
System > Events menu. This, for example, allows you to record when an authentication attempt
failed or when the connection status of a port has changed.
The content of the events log table is retained even when the device is turned off.
You cannot configure anything on this page.
Description
• Severity Filters
You can filter the entries in the table according to severity. To display all the entries, enable
or disable all parameters.
Note
A maximum of 2000 entries in the table are possible for each severity. If the maximum
number of entries is reached for a severity, the oldest entries of this severity are overwritten
in the table. The table remains permanently in the memory.
Under "System > Event > Configuration", you can specify a limit for the entries for each
severity with "Log Table Alarm Threshold". When the value is reached, a message is output.
– Info
Information
When this parameter is enabled, all entries of the category "Info" are displayed.
– Warning
Warnings
When this parameter is enabled, all entries of the category "Warning" are displayed.
– Critical
Critical
When this parameter is enabled, all entries of the category "Critical" are displayed.
The table has the following columns:
• Restart
Counts the number of restarts since you last reset to factory settings and shows the device
restart after which the corresponding event occurred.
• System Up Time
Shows the time the device has been running since the last restart when the described event
occurred.
• System Time
If the system time is set, the date and time of the described occurring event is displayed.
• Severity
Shows the severity of the message.
• Log Message
Displays a brief description of the event that has occurred. You will find the list of possible
messages in Appendix D (Page 323) of the configuration manual.
Description
• Severity Filters
You can filter the entries in the table according to severity. To display all the entries, enable
or disable all parameters.
Note
A maximum of 2000 entries in the table are possible for each severity. If the maximum
number of entries is reached for a severity, the oldest entries of this severity are overwritten
in the table. The table remains permanently in the memory.
– Info
Information
When this parameter is enabled, all entries of the category "Info" are displayed.
– Warning
Warnings
When this parameter is enabled, all entries of the category "Warning" are displayed.
– Critical
Critical
When this parameter is enabled, all entries of the category "Critical" are displayed.
6.3.6 Faults
Error status
If a fault occurs, it is shown on this page. On the device, faults are indicated by the red fault LED
lighting up.
Internal faults of the device and faults that you configure on the following pages are
indicated:
• "System > Events"
• "System > Fault Monitoring"
The calculation of the time of a fault always begins after the last system start. If there are no
faults present, the fault LED switches off.
Description
The page contains the following boxes:
• No. of Signaled Faults
Indicates how often the fault LED lit up and not how many faults occurred.
The table contains the following columns:
• Fault Time
Shows the time the device has been running since the last restart when the described fault
occurred.
• Fault Description
Displays a brief description of the error/fault that has occurred.
• Clear Fault State
Some faults can be acknowledged and thus removed from the fault list, e.g. a fault of the
event "Cold/Warm Start". You can acknowledge these faults or remove them from the fault
list with the "Clear Fault State" button.
6.3.7 Redundancy
Introduction
The page shows the current information about the Spanning Tree and the settings of the root
bridge.
If Spanning Tree is turned off, only the basic information about this device is displayed.
If Spanning Tree is turned on, the information about the status of the instance selected in
the "Instance ID" drop-down list is displayed and the information about the configured ports
is shown in the table. The information shown depends on the Spanning Tree mode.
Description
The page contains the following boxes:
• Spanning Tree Mode
Shows the set mode. You specify the mode in "Layer 2 > Configuration" and in "Layer 2 > MSTP
> General".
The following values are possible:
– '-'
– STP
– RSTP
– MSTP
• Instance ID
Shows the number of the instance. The parameter depends on the configured mode.
• Bridge Priority / Root Priority
Which device becomes the root bridge is decided based on the bridge priority. The bridge
with the highest priority (in other words, with the lowest value for this parameter) becomes
the root bridge. If several devices in a network have the same priority, the device whose MAC
address has the lowest numeric value will become the root bridge. Both parameters, bridge
priority and MAC address together form the bridge identifier. Since the root bridge manages
all path changes, it should be located as centrally as possible due to the delay of the frames.
The value for the bridge priority is a whole multiple of 4096 with a range of values from 0 to
32768.
• Bridge Address / Root Address
The bridge address shows the MAC address of the device and the root address shows the MAC
address of the root bridge.
• Root Cost
The path costs from this device to the root bridge.
• Bridge Status
Shows the status of the bridge, e.g. whether or not the device is the root bridge.
• Regional root priority (available only with MSTP)
For a description, see Bridge priority / Root priority
• Regional root address (available only with MSTP)
Shows the MAC address of the regional root bridge.
• Regional Root Cost (available only with MSTP)
Shows the path costs from this device to the regional root bridge.
The table contains the following boxes:
• Port
Shows the port via which the device communicates.
• Role
Shows the status of the port. The following values are possible:
– Disabled
The port was removed manually from the spanning tree and will no longer be taken into
account by the spanning tree.
– Designated
The ports leading away from the root bridge.
– Alternate
The port with an alternative route to a network segment
– Backup
If a switch has several ports to the same network segment, the "poorer" Port becomes the
backup port.
– Root
The port that provides the best route to the root bridge.
– Master
This port points to a root bridge located outside the MST region.
• Status
Displays the current state of the port. The values are only displayed. The parameter depends
on the configured protocol. The following statuses are possible:
– Discarding
The port receives BPDU frames. Other incoming or outgoing frames are discarded.
– Listening
The port receives and sends BPDU frames. The port is involved in the spanning tree
algorithm. Other outgoing and incoming frames are discarded.
– Learning
The port actively learns the topology; in other words, the node addresses. Other outgoing
and incoming frames are discarded.
– Forwarding
Following the reconfiguration time, the port is active in the network. The port receives
and sends data frames.
• Oper. Version
Describes the type of spanning tree in which the port operates
• Priority
If the path calculated by the spanning tree is possible over several ports of a device, the port
with the highest priority (in other words the lowest value for this parameter) is selected. A
value between 0 and 240 can be entered for the priority in steps of 16. If you enter a value
that cannot be divided by 16, the value is automatically adapted. The default is 128.
• Path Cost
This parameter is used to calculate the path that will be selected. The path with the lowest
value is selected as the route. If several ports of a device have the same value, the port with
the lowest port number is selected.
The calculation of the path costs is based largely on the transmission speed. The higher the
achievable transmission speed is, the lower the value of the path costs.
Typical values for path costs with rapid spanning tree:
– 10,000 Mbps = 2,000
– 1000 Mbps = 20,000
– 100 Mbps = 200,000
– 10 Mbps = 2,000,000.
• Edge Type
Shows the type of the connection. The following values are possible:
– Edge Port
Description
• Port
Shows the available ports.
• In Octet
Shows the number of received bytes.
• Out Octet
Shows the number of sent bytes.
• In Unicast
Shows the number of received unicast frames.
• In Non Unicast
Shows the number of received frames that are not of the type unicast.
• Out Unicast
Shows the number of sent unicast frames.
• Out Non Unicast
Shows the number of sent frames that are not of the type unicast.
• In Errors
Shows the number of all possible RX errors, refer to the "Packet Error" tab.
Description
• Port
Shows the available ports.
• Frame lengths
The other columns after the port number contain the absolute numbers of incoming frames
according to their frame length.
The following frame lengths are distinguished:
– 64 bytes
– 65 - 127 bytes
– 128 - 255 bytes
– 256 - 511 bytes
– 512 - 1023 bytes
– 1024 - Max.
Description
• Port
Shows the available ports.
• Unicast/Multicast /Broadcast
The other columns after the port number contain the absolute numbers of the incoming
frames according to their frame type "Unicast", "Multicast" and "Broadcast"
Description
• Port
Shows the available ports.
• Error types
The other columns after the port number contain the absolute numbers of the incoming
frames according to their error.
In the columns of the table, a distinction is made according to the following errors:
– CRC (Cyclic Redundancy Code)
The packet length is between 64 and 2048 bytes. The CRC of the packet is invalid.
– Undersize
The packet length is less than 64 bytes. The CRC of the packet is valid.
– Oversize
The packet size is more than 2048 bytes. The CRC of the packet is valid.
– Fragments
The packet length is less than 64 bytes. The CRC of the packet is invalid.
– Jabbers
The frame length is more than 2048 bytes. The CRC of the packet is invalid.
– Collisions
Frames in which a collision event was detected.
Address filtering
This WBM page shows the current content of the learning table. This table lists the source
addresses of unicast address frames.
Description
The table contains the following columns:
• VLAN ID
Shows the VLAN ID of the node.
Note
This column appears in the table only if a VLAN is configured.
• MAC Address
Shows the MAC address of the node.
• State
Shows the status of each address entry:
– Learnt
The specified address was learned by receiving a frame from this node and will be deleted
when the aging time expires if no further packets are received from this node.
– Invalid
These values are not evaluated.
• Port
Shows the port via which the node with the specified address can be reached. Frames
received by the device whose destination address matches this address will be forwarded to
this port.
6.3.10 LLDP
Description
The table contains the following columns:
• System Name
System name of the connected device.
• Device ID
Device ID of the connected device. The device ID corresponds to the device name assigned
via SINEC PNI (STEP 7). If no device name is assigned, the MAC address of the device is
displayed.
• Local Interface
Port at which the device received the information
• Hold Time
Hold time in seconds
An entry remains stored on the device for the time specified here. If the device does not
receive any new information from the connected device during this time, the entry is deleted.
• Capability
Shows the properties of the connected device:
– Router
– Bridge
– Telephone
– DOCSIS Cable Device
– WLAN Access Point
– Repeater
– Station
– Other
• Port ID
Port of the device with which the device is connected. If no port ID is assigned, the MAC
address of the connected device is shown.
Introduction
This page shows the routes currently being used.
Description
The table has the following columns:
• Destination Network
Shows the destination address of this route.
• Subnet Mask
Shows the subnet mask of this route.
• Gateway
Shows the gateway for this route.
• Interface
Shows the interface for this route.
• Metric
Shows the metric of the route. The higher value, the longer packets require to their
destination.
• Routing Protocol
Shows the routing protocol from which the entry in the routing table originates. The
following entries are possible:
– Connected: Connected routes
– Static: Static routes
– DHCP: Routes via DHCP
6.3.12 IPv6-Routing
Introduction
This page shows the IPv6 routes currently being used.
Description
The table has the following columns:
• Destination Network
Shows the destination address of this route.
• Prefix Length
Shows the prefix length of this route.
• Gateway
Shows the gateway for this route.
• Interface
Shows the interface for this route.
• Metric
Shows the metric of the route. The higher value, the longer packets require to their
destination.
• Routing Protocol
Shows the routing protocol from which the entry in the routing table originates. The
following entries are possible:
– Connected: Connected routes
– Static: Static routes
– RIPng: Routes via RIPng
– OSPFv3: Routes via OSPFv3
– Other: Other routes
6.3.13 SNMP
This page displays the created SNMPv3 groups. You configure the SNMPv3 groups in "System >
SNMP".
Description
The table has the following columns:
• Group Name
Shows the group name.
• User Name
Shows the user that is assigned to the group.
6.3.14 Security
6.3.14.1 Overview
This page shows the security settings and the local and external user accounts.
Description
Services
Note
The table "External User Accounts" is only evaluated if you have set "SiemensVSA" in the RADIUS
Authorization Mode.
Note
The values displayed depend on the role of the logged-on user.
The page shows the function rights available locally on the device.
6.3.14.3 Roles
Note
The values displayed depend on the role of the logged-on user.
Description
The table contains the following columns:
• Role
Shows the name of the role.
• Function Right
Shows the function right of the role:
– 1
Users with this role can read device parameters but cannot change them.
– 15
Users with this role can both read and change device parameters.
– 0
This is a role that the device assigns internally when a user could not be authenticated.
The user is denied access to the device.
• Description
Shows a description of the role.
6.3.14.4 Groups
Note
The values displayed depend on the role of the logged-on user.
This page shows which group is linked to which role. The group is defined on a RADIUS
server. The roll is defined locally on the device.
6.3.15 WLAN
6.3.15.1 Overview AP
Note
This page is available only in access point mode.
Description
Table 1 has the following columns:
• Radio
Shows the available WLAN interfaces.
• WLAN Mode
Shows the transmission standard. If DFS is activated, the transmission standard "802.11h" is
not shown additionally but only the configured transmission standard with the suffix "DFS".
• Configured Channel
Shows the configured channel. If "Auto" is displayed, the access point searches for a free
channel itself.
• Alternative DFS Channel
If the DFS function is enabled, the configured alternative channel of the access point is
displayed.
If "Auto" is displayed, the access point searches for an alternative channel itself.
If the DFS function is activated and the access point searches for competing radar signals for
60 seconds before starting communication with the selected channel, the text "scanning ..."
is displayed instead of the channel.
• Operational channel
Shows the channel including the frequency via which the access point communicates.
At 80 MHz the channel range is displayed additionally.
• Channel Width [MHz]
Shows the set channel bandwidth.
– 20 MHz
– 40 MHz (only with IEEE 802.11n/ac/ax)
– 80 MHz (only with IEEE 802.11ac/ax)
• iFeatures
Shows which iFeatures are used.
– "-"
iFeatures are not used.
– iPRP
– iPCF-2
• Status
Shows the status of the WLAN interface.
– enabled
The WLAN interface is enabled.
– disabled
The WLAN interface is disabled.
Table 2 has the following columns:
• Radio
Shows the available WLAN interfaces in this column.
• Port
Shows the port of the virtual access point (VAP).
• MAC Address
Shows the MAC address of the virtual access point.
• SSID
Shows the SSID.
• PMF
Shows whether the management frames are cryptographically protected.
– disabled
The management frames are not encrypted.
– required
The management frames are always encrypted. A connection of the WLAN clients to the
access point is only possible when these also support PMF.
– optional
The management frames are encrypted or unencrypted depending on support of the
WLAN client.
• Security
Shows which authentication method is used.
If the authentication method "Open System + Encryption" or "Shared Key" is used, the
"Encrypted (WEP/AES)" authentication method is displayed for both.
If the access point is connected to a client that supports Fast BSS Transition, "FT" is displayed
in addition to the authentication method.
• State
Shows the status of the WLAN interface.
– enabled
The WLAN interface is enabled.
– disabled
The WLAN interface is disabled.
Note
This page is only available for clients or access points in client mode.
The page shows an overview of the existing clients and their configuration.
Description
• Radio
Shows the available WLAN interfaces.
• WLAN Mode
Shows the transmission standard.
• MAC Mode
Shows how the MAC address is assigned to the interface.
– Own
The client uses the MAC address of the Ethernet interface for the WLAN interface.
– Layer 2 Tunnel
The client uses the MAC address of the Ethernet interface for the WLAN interface. The
network is also informed of the MAC addresses connected to the Ethernet interface of the
client. Up to eight MAC addresses can be used.
• MAC Address
Shows the MAC address of the WLAN interface.
• Operational channel
Shows the channel including frequency of the access point to which the client is connected.
• Channel Width [MHz]
Shows the set channel bandwidth.
– 20 MHz
– 40 MHz (only with IEEE 802.11n/ac/ax)
– 80 MHz (only with IEEE 802.11ac/ax)
• Connected BSSID
Shows the MAC address of the access point to which the client is connected.
• Connected SSID
Shows the SSID of the access point to which the client is connected.
• PMF
Shows whether the management frames are cryptographically protected.
– disabled
The management frames are not encrypted.
– required
The management frames are always encrypted. A connection of the WLAN clients to the
access point is only possible when these also support PMF.
– optional
The management frames are encrypted or unencrypted depending on support of the
access point.
• Security
Shows which authentication method is used.
If the client is connected to an access point that supports Fast BSS Transition, "FT" is displayed
in addition to the authentication method.
• Context
Shows which security context is used.
• iFeatures
Shows which iFeatures are used.
– "-"
iFeatures are not used.
– iPRP
Note
This page is only available for clients or access points in client mode.
This page shows all the access points visible to the client. The list also includes the access
points to which the client cannot connect due to its configuration.
Description
The table has the following columns:
• Radio
Shows the WLAN interface visible to the access point.
• Frequency Band
Shows the frequency band.
– 2.4 GHz
– 5 GHz
• SSID
Shows the SSID of the access point.
• BSSID
Shows the MAC address of the access point.
• System Name
Shows the system name of the access point. The entry depends on the access point. Not all
access points support this parameter.
• Channel
Shows the channel on which the access point transmits or communicates.
• Signal Strength [dBm]
Shows the signal strength of the access point in bBm.
• Signal strength [%]
Shows the signal strength of the access point as a percentage.
• Type
Shows the mode of the WLAN interface.
• Security
Shows which authentication method is used.
• Fast transition (FT)
Shows whether the access point supports Fast BSS Transition:
– "-"
FT is not supported or is not available.
– Over the Air
FT available wirelessly in access point. The client communicates with the destination
access point directly and wirelessly.
• WLAN Mode
Shows the transmission standard. If DFS is activated, the transmission standard "802.11h" is
not shown additionally but only the configured transmission standard, for example
"802.11n".
• State
Shows the status of the access point, for example whether or not the access point is available.
Note
This WBM page is only available for clients or access points in client mode.
You can make WLAN access available for several SCALANCE W devices with one client if you
use IP mapping. This means that you do not need to equip every SCALANCE W device with
its own WLAN client. The prerequisite for this is that the connected SCALANCE W devices are
addressed only with IP frames. Communication at MAC address level (ISO/OSI layer 2) can
• be established with one component whose MAC address is configured on the client,
• be established with a maximum of eight components if the "Layer 2 Tunnel" function is
selected.
The "Layer 2 Tunnel" setting meets the requirements of industrial applications in which MAC
address-based communication takes place with several SCALANCE W devices downstream
from the client. Clients with this setting cannot connect on standard Wifi access points.
The client maintains a table with the assignment of MAC address and IP address to send
incoming IP frames to the correct MAC address. This WBM page shows this table.
Note
IP mapping table
If "Layer 2 Tunnel" is configured for a client, the IP mapping table is not displayed.
Description
The table has the following columns
• MAC Address
The MAC address of a device located downstream from the WLAN client from the perspective
of the access point.
• IP Address
The IP address managed for this device by the WLAN client.
• Type
There are two options for the type:
– system
The information relates to the WLAN client itself.
– learned
The information relates to a device downstream from the WLAN client.
MAC mode
Frames sent by the client to the access point always have the MAC address of the WLAN client
as the source MAC address. In the "learning table" of the access point there is therefore only the
MAC address of the WLAN client.
If there is only IP communication between the access point and the client, the default setting
"Own" can be retained. If MAC address-based frames are also to be sent by SCALANCE W700
devices downstream from the client, you need to select the "Layer 2 Tunnel" setting.
6.3.15.5 Overlap AP
Note
This page is available only in access point mode.
Overlapping channels
For optimum data throughput, it is important that the set wireless channel is not used by other
access points. In the 2.4 GHz band (802.11b, 802.11g or 802.11n), the channels overlap, so that
an access point not only occupies the configured channel, but also the neighboring 2-3
channels. You should therefore make sure that there is adequate channel spacing to
neighboring access points.
The WBM page shows all access points that are visible on the set channel at 2.4 GHz or
at 5 GHz or on the adjacent channels at 2.4 Ghz. If entries exist here, the maximum data
throughput of the access point and the availability of the communication link to the access
point is potentially impaired.
Description
Table 1 has the following columns:
• Radio
Shows the available WLAN interfaces.
• Aging Time [min]
Specify the life time of the entries in the list. If an access point is inactive for longer than the
set time, it is removed from the list.
Note
Changing the aging time
The aging time is a WLAN setting. For this reason, if a change is made, the WLAN connection
is briefly interrupted to accept the new value.
Note
This WBM page is only available in access point mode.
Associated stations
The WBM page shows the clients logged on to the access point as well as additional information,
for example status, signal strength, MAC address.
Description
• Associated stations
Shows the number of clients logged in to the access point.
The table has the following columns:
• AID (Associated ID)
Shows the connection ID of the client. If the client connects to the access point via the VAP
interface, the client is assigned a connection ID. The connection ID is unique within a VAP
interface. If two clients log in at different VAP interfaces, both clients can receive the same ID.
• Radio
Shows the available WLAN interfaces.
• Port
Shows the VAP interface.
• Frequency Band
Shows the frequency band.
– 2.4 GHz
– 5 GHz
• Type
Shows the client type, for example "Sta" stands for IEEE 802.11 standard client.
• MAC Address
Shows the MAC address of the client.
• System Name
Shows the system name of the client if the client communicates this to the access point. Not
all clients support this parameter.
• Channel
Shows the channel over which the client communicates with the access point.
• Signal Strength [dBm]
Shows the signal strength of the connected client in decibel milliwatts.
• Signal strength [%]
Shows the signal strength of the connected client as a percentage.
• Age [s]
Shows the time that has elapsed since the last client activity.
• Security
Shows which authentication method is used.
• WLAN Mode
Shows the transmission standard. If DFS is activated, the transmission standard "802.11h" is
not shown additionally but only the configured transmission standard. e.g. "802.11a".
• Max. Data Rate (Mbps)
Shows the maximum data transmission speed in megabits per second.
• Status
Shows the current status of the connection, for example "connected" that means the client
is connected to the access point and is ready to communicate with the AP.
6.3.16.1 Errors
The page shows how many bad data frames were received or sent per WLAN interface in the
client or per VAP in the access point. If an increased number of errors occurs, you should check
the settings for the WLAN interface(s), the setup of the SCALANCE W devices and the connection
quality.
Description
The Sent Errors table has the following columns:
• Interface
Shows the interface to which the entries apply.
• Error types
The other columns after the WLAN interface contain the absolute numbers of the data
frames sent according to their error type.
The columns of the table distinguish between the following error types:
– Transmission Errors
Shows the number and percentage of bad data frames that were sent.
– Retry Count
Shows the number and percentage of data frames sent successfully that required one or
more retries.
Description
The table has the following columns:
• Interface
Shows the VAP interface to which the entries apply.
• Frame types
The other columns after the VAP interface contain the absolute numbers of the sent frames
according to the frame types.
In the columns of the table, a distinction is made according to the following frame types:
– Data Frames
Shows the number of sent data frames.
– Multicast/Broadcast Frames
Shows the number of sent multicast and broadcast frames.
– Unicast Frames
Shows the number of sent unicast frames.
– Average Rate [kbps]
Shows the average data rate of the last data frames sent.
Description
The table has the following columns:
• Interface
Shows the VAP interface to which the entries apply.
• Frame types
The other columns after the VAP interface contain the absolute numbers of the received
frames according to the frame types.
In the columns of the table, a distinction is made according to the following frame types:
– Data Frames
Shows the number of sent data frames.
– Multicast/Broadcast Frames
Shows the number of sent multicast and broadcast frames.
– Unicast Frames
Shows the number of sent unicast frames.
– Average Rate [kbps]
Shows the average data rate of the last data frames sent.
6.3.17.1 iPRP
On this WBM page you can check whether the settings for iPRP are correct. For example, you can
see which device is the partner client.
Description
The table has the following columns:
• Radio
Shows the WLAN interfaces via which the client is connected to the access point.
• Port (only in access point mode)
Shows the VAP interface on which the iPRP clients are logged in.
• iPRP Client
Shows the MAC address of the iPRP client.
• ActivationState
Shows whether or not iPRP is enabled.
• Partner Client
Shows the MAC address of the partner client.
• Partner BSS
Shows the MAC address of the access point to which the partner client is connected.
• Delete Frames Sent
Shows the number of sent iPRP delete frames that the device has sent to its partner device.
• Delete Frames Received
Shows the number of iPRP delete frames that the device has received from its partner device.
• Frames Deleted
Shows the number of frames not yet sent that were deleted from the queue due to the iPRP
delete frame.
6.4.1 Configuration
System configuration
The WBM page contains the configuration overview of the access options of the device.
Specify the services that access the device. With some services, there are further
configuration pages on which more detailed settings can be made.
The standard port can also be changed for your own services.
Note
Change standard port
Some programs can only access the service over the standard port, e.g. TIA Portal accesses
HTTPS over standard port 443. Before you change the port, check which port the program uses.
When you change the standard port, you must access the service using the changed port.
Reserved ports
Some ports are permanently reserved. Make sure that the specified port is not already in use. You
can find the ports used in the "List of available services".
Description
The page contains the following boxes:
• Telnet Server
Enable or disable the "Telnet Server" service for unencrypted access to the CLI.
• Telnet port
Standard port 23 is the default. You can optionally enter a port number in the range 1024 …
49151 or 49500 ... 65535.
• SSH Server
Enable or disable the "SSH Server" service for encrypted access to the CLI.
• SSH port
Standard port 22 is the default. You can optionally enter a port number in the range 1024 …
49151 or 49500 ... 65535.
– Trial
Trial mode. In Trial mode, although changes are adopted, they are not saved in the
configuration file (startup configuration).
To save changes in the configuration file, use the "Write startup config" button. The display
area also shows the message "Trial Mode Active – Press "Write Startup Config" button to
make your settings persistent" as soon as there are unsaved modifications. This message
can be seen on every WBM page until the changes made have either been saved or the
device has been restarted.
Procedure
1. To use the required function, select the respective check box.
2. Select the options you require from the drop-down lists.
3. Click the "Set Values" button.
6.4.2 General
6.4.2.1 Device
The boxes "Current System Time", "System Up Time" and "Device Type" cannot be changed.
Description
The page contains the following boxes:
• Current System Time
Shows the current system time. The system time is either set by the user or by a time-of-day
frame: either SINEC H1 time-of-day frame, NTP or SNTP. (readonly)
• System Up Time
Shows the operating time of the device since the last restart. (readonly)
• Device Type
Shows the type designation of the device. (readonly)
• System Name
You can enter the name of the device. The entered name is displayed in the selection area.
A maximum of 255 characters are possible.
The system name is also displayed in the CLI input prompt. The number of characters in the
CLI input prompt is limited. The system name is truncated after 16 characters.
• System Contact
You can enter the name of a contact person responsible for managing the device. A
maximum of 255 characters are possible.
• System Location
You can enter the location where the device is installed. The entered installation location is
displayed in the selection area. A maximum of 255 characters are possible.
Note
The ASCII code 0x20 to 0x7e is used in the input boxes.
Procedure
1. Enter the contact person responsible for the device in the "System Contact" input box.
2. Enter the identifier for the location at which the device is installed in the "System Location"
input box.
3. Enter the name of the device in the "System Name" input box.
4. Click the "Set Values" button.
6.4.2.2 Coordinates
Description
The page contains the following input boxes with a maximum length of 32 characters.
• "Latitude" input box
Geographical latitude: Here, enter the value for the northerly or southerly latitude of the
location of the device.
For example, the value +49° 1´31.67" means that the device is located at 49 degrees, 1 arc
minute and 31.67 arc seconds northerly latitude.
A southerly latitude is shown by a preceding minus character.
You can also append the letters N (northerly latitude) or S (southerly latitude) to the numeric
information (49° 1´31.67" N).
• "Longitude" input box
Geographic longitude: Here, you enter the value of the eastern or western longitude of the
location of the device.
The value +8° 20´58.73" means that the device is located at 8 degrees, 20 minutes and
58.73 seconds east.
A western longitude is indicated by a preceding minus sign.
You can also add the letter E (easterly longitude) or W (westerly longitude) to the numeric
information (8° 20´58.73" E).
• Input box: "Height"
Height Here, you enter the value of the geographic height above sea level in meters.
For example, 158 m means that the device is located at a height of 158 m above sea level.
Heights below sea level (for example the Dead Sea) are indicated by a preceding minus sign.
Procedure
1. Enter the calculated latitude in the "Latitude" input box.
2. Enter the calculated longitude in the "Longitude" input box.
3. Enter the height above sea level in the "Height" input box.
4. Click the "Set Values" button.
6.4.4 DNS
If there is more than one DNS server, the order in the table specifies the order in which the
servers are queried. The top server is queried first. A total of 7 DNS servers can be configured
on the device. Manually configured DNS servers are given preference.
The DNS () server (Domain Name System) assigns a domain name to an IP address so that a
device can be uniquely identified.
If this function is enabled, the device can communicate with a DNS server as a DNS client.
You have the option of entering names in IP address boxes.
Note
Update from V1.0 to V1.1
The configuration of the DNS client is not transfered with an update from V1.0 to V1.1.
Note
The DNS client function can only be used if there is a DNS server in the network.
Description
The page contains the following boxes:
• DNS Client
Select or clear the check box indicating that the device operates as a DNS client.
• Used DNS Servers
Here you specify which DNS server the device uses:
– learned only
The device uses only the DNS servers assigned by DHCP.
– manual only
The device uses only the manually configured DNS servers. The DNS servers must be
connected to the Internet. A maximum of three DNS servers can be configured.
– all
The device uses all available DNS servers.
• DNS Server Address
Enter the IP address of the DNS server.
The table contains the following columns:
• Select
Select the check box in the row to be deleted.
• DNS Server Address
Shows the IP address of the DNS server.
• Origin
This shows whether the DNS server was configured manually or was assigned by DHCP.
Procedure
Activating DNS
1. Enable the "DNS-Client" check box.
2. Click the "Set Values" button.
Creating a DNS server
1. In the "DNS Server Address" box, enter the IP address of the DNS server.
2. Click the "Create" button.
Filtering DNS servers
1. In the "Used DNS Servers" drop-down list, select which DNS servers are to be used.
2. Click the "Set Values" button.
6.4.5 Restart
6.4.5.1 Restart
Restart
Note the following points about restarting a device:
• You can only restart the device with administrator privileges.
• A device should only be restarted with the buttons of this menu or with the appropriate CLI
commands and not by a power cycle on the device.
• If the device is in "Trial" mode, configuration modifications must be saved manually before a
restart. Any modifications you have made only become active on the device after clicking the
"Set values" button on the relevant WBM page.
• If the device is in "Automatic Save" mode, the last changes are saved automatically before a
restart.
Description
To restart the device, the buttons on this page provide you with the following options:
• Restart
Click this button to restart the system. You must confirm the restart in a dialog box. During
a restart, the device is reinitialized, the internal firmware is reloaded, and the device runs a
self-test. The settings of the start configuration are retained, e.g. the IP address of the device.
The learned entries in the address table are deleted. You can leave the browser window open
while the device restarts. After the restart you will need to log in again.
• Restore Memory Defaults and Restart
Click this button to restore the factory settings of the device, with the exception of protected
default settings, and to restart the device.
The protected presets include the following parameters:
– IP addresses
– Subnet mask
– IP address of the default gateway.
– DHCP client ID
– DHCP
– System name
– System location
– System contact
– User names and passwords
– Mode of the device
– DHCPv6 Rapid Commit
– PROFINET Name of Station
• Restore Factory Defaults and Restart
Click this button to restore the factory configuration settings and to restart the device. The
protected defaults are also reset. You must confirm the restart in a dialog box.
Note
By resetting all the defaults to the factory configuration settings, the IP address is also lost.
Assign an IP address to the device using DHCP or SINEC PNI.
With the appropriate connection, a previously correctly configured device can cause
circulating frames and therefore the failure of the data traffic.
• Scheduled restart
When you click this button, a timer starts and runs backwards with the defined time. When
the timer has expired, the device restarts.
The following message is also displayed in the display area: "The automatic restart starts in
[..] minutes. Click 'Cancel scheduled restart' to cancel the restart". This message can be seen
on every WBM page until you cancel the restart or the SCALANCE W device is restarted.
Note
Unsaved configuration is lost after reboot
The scheduled restart is performed after the time has elapsed without any further message.
Unsaved configuration changes are lost.
Save the current configuration via "System > Backup of configuration" before setting the
timer for the restart.
Description
• Sleep Duration [min.]
Specify how long the device should remain in power saving mode.
Value range 1 ... 44639. Default value 0: power saving mode off
• Activate Sleep Mode
Use this button to activate the sleep timer.
Procedure
1. Enter a value of 1 ... 44639 minutes in the "Sleep Duration [min.]" text box.
2. Click on the "Activate Sleep Mode" button.
Result
The device applies the setting for the duration and immediately switches to sleep mode.
Once the time has elapsed, the device returns to the active state.
Change management
On this page, you specify when the WLAN settings become effective on the SCALANCE W device.
If you change a WLAN setting and confirm the change with "Set Values", this change is adopted
and takes effect immediately. To do this, the WLAN connection is briefly interrupted. This means
that you can lose the WLAN connection to your SCALANCE W device before it is fully configured.
With the "Manual Commit" setting, you have the opportunity of first fully configuring the
SCALANCE W device. The changes are accepted, but are not active immediately. The changes
only take effect when you confirm the changes with the "Commit Changes" button.
Note
If you configure the SCALANCE W device via the WLAN interface, we recommend that you use
the "Manual Commit" setting. Check the parameters again before you confirm the changes with
the "Commit Changes" button.
Description
The page contains the following boxes:
• Commit Mode
Select the required setting from the drop-down list.
– Automatic Commit
Each change in the WLAN settings is adopted and is immediately effective when you click
the "Set Values" button. In the default setting, the SCALANCE W device is set to "Automatic
Commit".
– Manual Commit
The changes are accepted, but are not effective immediately. The changes only take
effect when you click the "Commit Changes" button. The "Commit Changes" button is
displayed when you set "Manual Commit".
The following message is also displayed in the display area when there are WLAN
changes: "Manual Commit Mode active - Press 'Commit Changes' button to provide
current configuration to driver". This message can be seen on every WBM page until either
the changes made have taken effect or the SCALANCE W device has been restarted.
Note
When the changes take effect, the WLAN connections to all WLAN interfaces will be
interrupted for a short time. The WLAN driver is started with the new settings.
6.4.7.2 HTTP
Note
This WBM page is available both for connections using HTTP and for connections using HTTPS.
Firmware
The firmware is signed and encrypted. This ensures that only firmware created by Siemens
can be downloaded to the device.
Configuration files
Note
Configuration files and Trial mode/Automatic Save
In "Automatic Save" mode, the data is saved automatically before the configuration files
(ConfigPack and Config) are transferred.
In "Trial" mode, although the changes are adopted, they are not saved in the configuration files
(ConfigPack and Config). Use the "Write Startup Config" button on the "System > Configuration"
WBM page to save changes in the configuration files.
Note
The downloadable CLI script is not intended to be uploaded again unchanged.
CLI commands for saving and loading files cannot be executed with the CLI script file (Script).
Description
For a clearer overview, the tables are divided into different areas. Each table has the following
columns:
• Type
Shows the name of the file.
Note
Size of certificate files
With certificate files only certificates with a maximum of 8192 bits are supported.
• Description
Shows the short description of the file type.
• Load
With this button, you can load files on the device. The button can be enabled, if this function
is supported by the file type.
• Save
With this button, you can save files from the device. The button can only be enabled if this
function is supported by the file type and the file exists on the device.
• Delete
With this button, you can delete files from the device. The button can only be enabled if this
function is supported by the file type and the file exists on the device.
Note
Following a firmware update, delete the cache of the Web browser.
Procedure
Loading files using HTTP
1. Start the load function by clicking the one of the "Load" buttons.
The dialog for loading a file opens.
2. Go to the file you want to load.
3. Click the "Open" button in the dialog.
The file is now loaded.
Whether or not a restart is necessary, depends on the loaded file. If a restart is necessary, a
message to this effect will be output. Other files are executed immediately, for example the
CLI script file and new settings are applied without a restart.
Saving files using HTTP
1. Start the save function by clicking the one of the "Save" buttons. Depending on the size of the
file this may take some time.
2. Depending on your browser configuration you will be prompted to select a storage location
and a name for the file. Or you accept the proposed file name. To make the selection, use the
dialog in your browser. After making your selection, click the "Save" button.
Note
Configuration data has a checksum. If you edit the files, you can no longer upload them to the
device.
Password-protected config file
If the file is password-protected, you cannot load the file via DHCP with options 66 and 67.
6.4.7.3 TFTP
Configuration files
Note
Configuration files and Trial mode/Automatic Save
In "Automatic Save" mode, the data is saved automatically before the configuration files
(ConfigPack and Config) are transferred.
In "Trial" mode, although the changes are adopted, they are not saved in the configuration files
(ConfigPack and Config). Use the "Write Startup Config" button on the "System > Configuration"
WBM page to save changes in the configuration files.
Note
The downloadable CLI script is not intended to be uploaded again unchanged.
CLI commands for saving and loading files cannot be executed with the CLI script file (Script).
Description
The page contains the following boxes:
• TFTP Server Address
Here, enter the IP address or the FQDN (Fully Qualified Domain Name) of the TFTP server with
which you exchange data.
• TFTP Server Port
Here, enter the port of the TFTP server via which data exchange will be handled. If necessary,
you can change the default value 69 to your own requirements.
For a clearer overview, the tables are divided into different areas. Each table has the
following columns:
• Type
Shows the name of the file.
Note
Size of certificate files
With certificate files only certificates with a maximum of 8192 bits are supported.
• Description
Shows the short description of the file type.
• Filename
Enter a file name.
• Actions
Select the action from the drop-down list. The selection depends on the selected file type, for
example the log file can only be saved.
The following actions are possible:
– Save file
With this selection, you save a file on the TFTP server.
– Load file
With this selection, you load a file from the TFTP server.
Procedure
Loading or saving data using TFTP
1. Enter the IP address or the FQDN of the TFTP server in the "TFTP Server Address" input box.
2. Enter the server port to be used in the in the "TFTP server port" input box.
3. Enter the name of a file in which you want to save the data or take the data from in the "File
name" input box.
4. Select the action you want to execute from the "Actions" drop-down list.
5. Click the "Set Values" button to start the selected actions. Depending on the size of the file this
may take some time.
6. After loading the configuration and the SSL certificate, restart the device. The changes only
take effect a restart.
Reusing configuration data
If several devices are to receive the same configuration and the IP addresses are assigned
using DHCP, the effort for configuration can be reduced by saving and reading in the
configuration data.
Follow the steps below to reuse configuration data:
1. Save the configuration data of a configured device on your PC.
2. Download this configuration file to all other devices you want to configure.
3. If individual settings are necessary for specific devices, these must be made online on the
relevant device.
Note that the configuration data is coded when it is saved. This means that you cannot edit
the files with a text editor.
Note
Configuration data has a checksum. If you edit the files, you can no longer upload them to the
device.
Password-protected config file
If the file is password-protected, you cannot load the file via DHCP with options 66 and 67.
6.4.7.4 SFTP
Configuration files
Note
Configuration files and Trial mode/Automatic Save
In "Automatic Save" mode, the data is saved automatically before the configuration files
(ConfigPack and Config) are transferred.
In "Trial" mode, although the changes are adopted, they are not saved in the configuration files
(ConfigPack and Config). Use the "Write Startup Config" button on the "System > Configuration"
WBM page to save changes in the configuration files.
Note
The downloadable CLI script is not intended to be uploaded again unchanged.
CLI commands for saving and loading files cannot be executed with the CLI script file (Script).
Description
The page contains the following boxes:
• SFTP Server Address
Enter the IP address or the FQDN of the SFTP server with which you exchange data.
• SFTP Server Port
Enter the port of the SFTP server via which data exchange will be handled. If necessary, you
can change the default value 22 to your own requirements.
• SFTP User
Enter the user for access to the SFTP server. This assumes that a user with the corresponding
rights has been created on the SFTP server.
The name must meet the following conditions:
– It must be unique.
– It must be between 1 and 250 characters long.
– The following characters must not be included: § ? " ; :
The characters for Space and Delete also cannot be included.
• SFTP Password
Enter the password for the user
• SFTP Password Confirmation
Confirm the password.
For a clearer overview, the tables are divided into different areas. Each table has the
following columns:
• Type
Shows the file type.
• Description
Shows the short description of the file type.
• Filename
A file name is preset here for every file type.
Note
Changing the file name
You can change the file name preset in this column. After clicking the "Set Values" button, the
changed name is saved on the device and can also be used with the Command Line Interface.
• Actions
Select the action from the drop-down list. The selection depends on the selected file type, for
example you can only save the log file.
The following actions are possible:
– Save file
With this selection, you save a file on the SFTP server.
– Load file
With this selection, you load a file from the SFTP server.
Procedure
Loading or saving data using SFTP
1. Enter the address of the SFTP server in "SFTP Server Address".
2. Enter the port of the SFTP server to be used in "SFTP Server Port".
3. Enter the user data (user name and password) required for access to the SFTP server.
4. If applicable, enter the name of a file in which you want to save the data or take the data from
in "Filename".
Note
Files whose access is password protected
To be able to load these files on the device successfully, you need to enter the password
specified for the file in "System" > "Load&Save" > "Passwords".
5. Select the action you want to execute from the "Actions" drop-down list.
6. Click "Set Values" to start the selected action.
7. If a restart is necessary, a message to this effect will be output. Click the "OK" button to run
the restart. If you click the "Abort" button, there is no device restart. The changes only take
effect after a restart.
Reusing configuration data
If several identical devices are to receive the same configuration and the IP addresses are
assigned using DHCP, the effort for reconfiguration can be reduced by saving and reading in
the configuration data.
Follow the steps below to reuse configuration data:
1. Save the configuration data of a configured device on your PC.
2. Load these configuration files on all other devices you want to configure in this way.
3. If individual settings are necessary for specific devices, these must be made online on the
relevant device.
Note
Configuration data has a checksum. If you edit the files, you can no longer upload them to the
device.
Password-protected config file
If the file is password-protected, you cannot load the file via DHCP with options 66 and 67.
6.4.7.5 Passwords
There are files to which access is password-protected. For example to be able to use the HTTPS
certificate, you need to specify the corresponding password on this WBM page.
Description
The table has the following columns:
• Type
Shows the file type.
• Description
Shows the short description of the file type.
• Setting
• When enabled, the file is used. Can only be enabled if the password is configured.
• Password
Enter the password for the file.
• Password Confirmation
Confirm the password.
• Status
Shows whether the password corresponds to the file on the device.
– Valid
The "Enabled" check box is selected and the password matches the file.
– Invalid
The "Enabled" check box is selected but the password does not match the file or no file has
been loaded yet.
– '-'
The password cannot be evaluated or is not yet being used. The "Enabled" check box is not
selected.
– Required
A password is required for loading or saving.
Procedure
1. Enter the password in "Password".
2. To confirm the password, enter the password again in "Password Confirmation".
3. Select the "Enabled" option.
4. Click the "Set Values" button.
6.4.8 Events
6.4.8.1 Configuration
Description
• Log Table Alarm Threshold
Set the limit for the entries for each severity. A maximum of 2000 entries are possible for each
severity.
If the specified limit will be reached with the next entry, an alarm message is output, e.g. if
1950 is specified, the message that limit 1950 has been reached is output after entry 1949.
With Table 1, you can enable or disable all check boxes of a column of Table 2 at once. Table
1 has the following columns:
• All Events
Shows that the settings are valid for all events of table 2.
• E-mail / Trap / Log Table / Syslog / Faults
Enable or disable the required type of notification for all events. If "No Change" is selected, the
entries of the corresponding column in table 2 remain unchanged.
• Copy to Table
If you click the button, the setting is adopted for all events of table 2.
– Trap
The device sends an SNMP trap. This is only possible if "SNMPv1 Traps" is enabled in
"System > Configuration".
– Log Table
The device writes an entry to the event log table. The content of the event log table is
displayed in "Information > Log Tables > Event Log".
– Syslog
The device writes an entry to the system log server. This is only possible if the system log
server is set up and the "Syslog Client" function is enabled.
– Error
The device triggers an error. The error LED lights up and the currently pending error is
displayed under "Information > Faults".
Procedure
Follow the steps below to change entries:
1. Select the check box in the row of the required event. Select the event in the column under
the following actions:
– E-mail
– Trap
– Log table
– Syslog
– Error
2. Click the "Set Values" button.
Description
The table has the following columns:
• Client Type
Select the client type for which you want to make settings:
– E-mail
Sending system event messages by e-mail
– Log Table
Entry of system events in the log table
– Syslog
Entry of system events in the Syslog file
– WLAN Authentication Log
Entry of system events in the WLAN authentication log
• Severity
Select the desired severity. The following settings are possible:
– Critical
System events with the severity Critical are processed.
– Warning
System events with the Warning severity or higher are processed: This means events of
the categories "Warning" and "Critical".
– Info
System events with the Info severity or higher are processed: This means events of the
categories "Info", "Warning" and "Critical".
Procedure
Follow the steps below to configure the required level:
1. Select the required values from the drop-down lists of the second table column after the
client types.
2. Click the "Set Values" button.
6.4.9.1 General
Description
The page contains the following boxes:
• SMTP Client
Enable or disable the SMTP client.
• SMTP Server Address
Enter the IP address of the SMTP server.
The table contains the following columns:
• Select
Select the check box in a row to be deleted.
• Status
Specify whether this SMTP server will be used.
• SMTP Server Address
Shows the SMTP server IP address.
• Sender Email Address
Enter the e-mail address of the sender that is specified in the e-mail.
• User Name
If necessary, enter the user name used for authentication on the SMTP server.
• Password
If necessary, enter the password used for authentication on the SMTP server.
• Password Confirmation
Repeat the password.
• Port
Enter the port via which your SMTP server can be reached.
Factory settings:
– 25 (None)
– 465 (SSL/TLS and StartTLS)
• Security
Specify whether transfer of the e-mail from the device to the SMTP server is encrypted. This
is only possible when the SMTP server supports the selected setting.
Note
2-factor authentication (2FA)
2-factor authentication is not supported.
– SSL/TLS
– StartTLS
– None: The e-mail is transferred unencrypted.
• Test
Sends a test email to the configured receivers.
• Test Result
Shows whether the e-mail was sent successfully or not. If sending was not successful, the
message contains possible causes.
Procedure
Configuring the SMTP server
1. Enable the "SMTP Client" function.
2. Enter the IP address of the SMTP server in "SMTP Server Address".
3. Click the "Create" button. A new entry is generated in the table.
4. Enter the name of the sender that will be included in the e-mail for "Sender Email Address".
5. Enter the user name and password if the SMTP server prompts you to log in.
6. Under "Security", specify whether transfer to the SMTP server is encrypted.
6.4.9.2 Recipient
On this page, you specify who receives an e-mail when an event occurs.
Description
The page contains the following boxes:
• SMTP Server
Specify the SMTP server via which the e-mail is sent.
• Email address of the SMTP receiver
Enter the e-mail address to which the device sends an e-mail.
The table contains the following columns:
• Select
Select the check box in a row to be deleted.
• SMTP Server
Shows the IP address of the SMTP server to which the entry relates.
• Send
When enabled, the device sends an email to this receiver.
• Email address of the SMTP receiver
Shows the e-mail address to which the device sends an e-mail if a fault occurs.
Procedure
Configuring an SMTP receiver
1. Select the required "SMTP server".
2. Enter the email address of the SMTP receiver.
3. Click the "Create" button. A new entry is generated in the table.
4. Activate the "Send" option for the entry.
5. Click the "Set Values" button.
6.4.10 DHCPv4
Description
The page contains the following boxes:
• DHCP client configuration file request (opt. 66, 67)
From the drop-down list, select whether you want the DHCP client to use options 66 and 67
to download a configuration file.
– On
Options 66 and 67 are enabled
– Off
Options 66 and 67 are disabled
• DHCP Mode
Select the DHCP mode from the drop-down list. The following modes are possible:
– via MAC Address
Identification is based on the MAC address.
– via DHCP Client ID
Identification is based on a freely defined DHCP client ID.
– via System Name
Identification is based on the system name. If the system name is 255 characters long, the
last character is not used for identification.
– via PROFINET Name of Station
The identification is made using the PROFINET device name.
Procedure
1. Select the required mode from the "DHCP Mode" drop-down list. If you select the DHCP mode
"via DHCP Client ID" an input box appears.
– In the enabled input box "DHCP client ID" enter a string to identify the device. This is then
evaluated by the DHCP server.
2. Select the "DHCP Client Configuration Request (Opt. 66, 67)", if you want the DHCP client to
use options 66 and 67 to download and then enable a configuration file.
3. Enable the "DHCP" option in the table.
4. Click the "Set Values" button.
Note
If a configuration file is downloaded, this can trigger a system restart. If the currently running
configuration and the configuration in the downloaded configuration file differ, the system is
restarted.
Make sure that the option "DHCP Client Configuration Request (Opt. 66, 67)" is no longer set.
6.4.11 SNMP
6.4.11.1 General
Configuration of SNMP
On this page, you make the basic settings for SNMP. Enable the check boxes according to the
function you want to use.
Description
The page contains the following boxes:
• SNMP
Select the SNMP protocol from the drop-down list. The following settings are possible:
– "-" (Disabled)
SNMP is disabled.
– SNMPv1/v2c/v3
SNMPv1/v2c/v3 is supported.
Note
Note that SNMP in versions 1 and 2c does not have any security mechanisms.
– SNMPv3
Only SNMPv3 is supported.
• SNMPv1/v2c Read-Only
If you enable this option, SNMPv1/v2c can only read the SNMP variables.
Note
Community String
For security reasons, do not use the standard values "public" or "private". Change the
community strings following the initial installation.
The recommended minimum length for community strings is 6 characters.
For security reasons, only limited access to objects of the SNMPCommunityMIB is possible
with the SNMPv1/v2c Read Community String. With the SNMPv1/v2c Read/Write Community
String, you have full access to the SNMPCommunityMIB.
• SNMP Engine ID
Shows the SNMP engine ID.
• SNMP Agent Listen Port
Specify the port at which the SNMP agent waits for the SNMP queries. Standard port 161 is
the default.
You can optionally enter the standard port 162 or a port number in the range 1024 … 49151
or 49500 ... 65535.
Procedure
1. Select the required option from the "SNMP" drop-down list:
– "-" (disabled)
– SNMPv1/v2c/v3
– SNMPv3
2. Enable the "SNMPv1/v2c Read Only" check box if you only want read access to SNMP variables
with SNMPv1/v2c.
3. Enter the required character string in the "SNMPv1/v2c Read Community String" input box.
4. Enter the required character string in the "SNMPv1/v2c Read/Write Community String" input
box.
5. If necessary, enable the SNMPv3 User Migration.
6. Click the "Set Values" button.
Description
The page contains the following boxes:
• User Name
Enter a freely selectable user name. After you have entered the data, you can no longer
modify the name.
The table has the following columns:
• Select
Select the row you want to delete.
• User Name
Shows the created users.
• Authentication Protocol
Specify the authentication protocol for which a password will be stored.
The following settings are available:
– None
– MD5
– SHA
• Privacy Protocol
Specify the encryption protocol for which a password will be stored. This drop-down list is
only enabled when an authentication protocol has been selected.
The following settings are available:
– None
– DES
– AES
• Authentication Password
Enter the authentication password in the first input box. This password must have at least 1
character, the maximum length is 32 characters.
Note
Length of the password
As an important measure to maximize security, we recommend that the password has a
minimum length of 6 characters and that it contains special characters, uppercase/lowercase
letters, numbers.
• Privacy Password
Enter your encryption password. This password must have at least 1 character, the maximum
length is 32 characters.
Note
Length of the password
As an important measure to maximize security, we recommend that the password has a
minimum length of 6 characters and that it contains special characters, uppercase/lowercase
letters, numbers.
Procedure
Create a new user
1. Enter the name of the new user in the "User Name" input box.
2. Click the "Create" button. A new entry is generated in the table.
3. Select the authentication algorithm for "Authentication Protocol". In the relevant input
boxes, enter the authentication password and the confirmation.
4. Select the algorithm in "Privacy Protocol". In the relevant input boxes, enter the encryption
password and the confirmation.
5. Click the "Set Values" button.
Delete user
1. Enable "Select" in the row to be deleted.
Repeat this for all users you want to delete.
2. Click the "Delete" button. The entry is deleted.
Description
The page contains the following boxes:
• Group Name
Enter the group that will be assigned to the user.
• User Name
Select the user to be a member of the specified group. The drop-down list only contains users
that are not yet assigned to a group.
The table has the following columns:
• Select
Select the row you want to delete.
• Group Name
Displays the SNMPv3 group. A group name can only be changed later if no access rights have
been defined for the group yet.
• User Name
Shows the user that is a member of this group.
Note
Different access permissions for different security levels can be assigned to a group. If no access
permission is defined for a security level, no access to the device is possible for members of the
group using this security level.
Description
The page contains the following boxes:
• Group Name
Select the name of the group.
• Security Level
Select the security level (authentication, encryption) for which you want to define the access
permissions of the group:
– No Auth/no Priv
No authentication enabled/no encryption enabled.
– Auth/no Priv
Authentication enabled/no encryption enabled.
– Auth/Priv
Authentication enabled/encryption enabled.
Procedure
Creating a new group
1. Select the name of the group for which you are configuring SNMP access.
2. Select the required security level from the "Security Level" drop-down list.
3. Click the "Create" button to create a new entry.
4. In the "Read View Name" field, enter the SNMPv3 view for read access.
5. In the "Write View Name" field, enter the SNMPv3 view for write access.
6. In the "Notification View Name" field, enter the SNMPv3 view for notifications.
7. Click the "Set Values" button.
Modifying a group
Once a group name and the security level have been specified, they can no longer be
modified after the group is created. If you want to change the group name or the security
level, you will need to delete the group and create it and configure it with the new name.
Deleting a group
1. Enable "Select" in the row to be deleted.
Repeat this for all groups you want to delete.
2. Click the "Delete" button. The entries are deleted.
Note
Controlling the SNMPv1 and SNMPv2c access
The preconfigured SIMATICNETRD and SIMATICNETWR views are used internally to control the
SNMPv1 and SNMPv2c access. If you delete or change these views, this directly affects the
SNMPv1 and SNMPv2c access.
Description
The page contains the following boxes:
• View Name
Select the name of the view that you want to configure. An SNMPv3 view always needs to be
assigned to an SNMPv3 access. For this reason, you need to enter a new SNMPv3 view in the
table in the "SNMP Access" tab.
• MIB Tree
Select the Object Identifier (OID) of the MIB area that is to be used for the SNMPv3 view. The
following options are possible:
– iso
– std
– member-body
– org
– mgmt
– private
– snmpV2
The drop-down list only contains the OIDs that are usually used. If the configuration of a
specific OID that is not listed is necessary, you can configure this via the CLI with the snmp
view command. This OID is then also displayed in the WBM in the overview table.
The table has the following columns:
• Select
Select the row you want to delete.
• View Name
The name of the SNMPv3 view.
• MIB Tree
The OID of the MIB area for the SNMPv3 view.
• View Type
The available options are as follows:
– Included
The MIB OID and its lower-level nodes are part of the SNMPv3 view. Access to the
corresponding MIB objects is possible.
– Excluded
The MIB OID and its lower-level nodes are not part of the SNMPv3 view. Access to the
corresponding MIB objects is not possible.
6.4.11.6 Notifications
Description
The page contains the following boxes:
• SNMPv1 Traps
Enable or disable sending of SNMPv1 traps. This setting affects all receivers of SNMPv1 traps
and has no effects on receivers of SNMPv2c or SNMPv3 notifications.
• SNMPv1/v2c Trap Community String
Enter the community string for sending SNMPv1/v2c notifications.
• SNMPv3 Notify User
Select the user to which SNMPv3 notifications are to be sent.
• SNMPv3 Notify Security Level
Select the security level (authentication, encryption) to be used for SNMPv3 notification. A
user and the access must be configured for this.
The following options are possible:
– no Auth/no Priv
No authentication enabled / no encryption enabled.
– Auth/no Priv
Authentication enabled / no encryption enabled.
– Auth/Priv
Authentication enabled / encryption enabled.
Procedure
Configuring a notification
1. Select the receiver for SNMPv3 notifications in the "SNMPv3 Notify User" drop-down list.
2. Select the security level for SNMPv3 notifications in the "SNMPv3 Notify Security Level" drop-
down list.
3. Select the receiver type in the "Notification Receiver Type" drop-down list.
4. In "Notification Receiver Address", enter the IP address of the station to which the device
should send traps or notifications.
5. Click the "Create" button to create a new trap entry.
There are different methods that can be used to set the system time of the device. Only one
method can be active at any one time.
If one method is activated, the previously activated method is automatically deactivated.
Description
The page contains the following boxes:
• Time Manually
Enable the manual time setting. If you enable the option, the "System Time" input box can be
edited.
• System Time
Enter the date and time in the format "MM/DD/YYYY HH:MM:SS".
After a restart, the time of day begins at 01/01/2000 00:00:00.
• Use PC Time
Click the button to use the time setting of the PC.
• Last Synchronization Time
Shows when the last time-of-day synchronization took place. If no time-of-day
synchronization was possible, the box displays "Date/time not set".
• Last Synchronization Mechanism
Shows how the last time synchronization was performed.
– Not set
The time was not set.
– Manual
Manual time setting
– SNTP
Automatic time-of-day synchronization with SNTP
– NTP
Automatic time-of-day synchronization with NTP
– SIMATIC
Automatic time-of-day synchronization using the SIMATIC time frame
• Daylight Saving Time (DST)
Shows whether the daylight saving time changeover is active.
– active (offset +1 h)
The system time was changed to daylight saving time; in other words an hour was added.
You can see the current system time at the top right in the selection area of the WBM.
The current time including daylight saving time is displayed in the "System Time" box.
– inactive (offset +0 h)
The current system time is not changed.
Procedure
1. Enable the "Time Manually" option.
2. In the "System Time" input box, enter the date and time in the format "MM/DD/YYYY
HH:MM:SS".
3. Click the "Set Values" button.
The date and time are adopted and "Manual" is entered in "Last Synchronization Mechanism"
box.
Settings
• Select
Select the row you want to delete.
• DST No.
Shows the number of the entry.
If you create a new entry, a new line with a unique number is created.
• Name
Shows the name of the entry.
• Year
Shows the year for which the entry was created.
• Start Date
Shows the month, day and time for the start of daylight saving time.
• End Date
Shows the month, day and time for the end of daylight saving time.
• Recurring Date
With an entry of the type "Rule", the period in which daylight saving time is active is displayed
consisting of week, day, month and time of day.
With an entry of the type "Date" a "-" is displayed.
• State
Shows the status of the entry:
– Enabled
The entry was created correctly.
– Invalid
The entry was created new and the start and end date are identical.
• Type
Shows how the daylight saving time changeover is made:
– Date
A fixed date is entered for the daylight saving time changeover.
– Rule
A rule was defined for the daylight saving time changeover.
Procedure
Creating an entry
1. Click the "Create" button.
A new entry is created in the table.
2. Click on the required entry in the "DST No." column.
You change to the "DST Configuration" page.
3. Select the required type in the "Type" drop-down list.
Depending on the selected type, various settings are available.
4. Enter a name in the "Name" box.
5. If you have selected the type "Date", fill in the following boxes.
– Year
– Day (for start and end date)
– Hour (for start and end date)
– Month (for start and end date)
6. If you have selected the type "Rule", fill in the following boxes.
– Hour (for start and end date)
– Month (for start and end date)
– Week (for start and end date)
– Day (for start and end date)
7. Click the "Set Values" button.
Deleting an entry
1. Enable "Select" in the row to be deleted.
2. Click the "Delete" button. The entry is deleted.
Settings
Note
The content of this page depends on the selection in the "Type" box.
The boxes "DST No.", "Type" and "Name" are always shown.
• DST No.
Select the type of the entry.
• Type
Select how the daylight saving time changeover is made:
– Date
You can set a fixed date for the daylight saving time changeover.
This setting is suitable for regions in which the daylight saving time changeover is not
governed by rules.
– Rule
You can define a rule for the daylight saving time changeover.
This setting is suitable for regions in which the daylight saving time always begins or ends
on a certain weekday.
• Name
Enter a name for the entry.
The name can be a maximum of 16 characters long.
Settings with "Date" selected
You can set a fixed date for the start and end of daylight saving time.
• Year
Enter the year for the daylight saving time changeover.
• Start Date
Enter the following values for the start of daylight saving time:
– Day
Specify the day.
– Hour
Specify the hour.
– Month
Specify the month.
• End Date
Enter the following values for the end of daylight saving time:
– Day
Specify the day.
– Hour
Specify the hour.
– Month
Specify the month.
Settings with "Rule" selected
You can create a rule for the daylight saving time changeover.
• Start Date
Enter the following values for the start of daylight saving time:
– Hour
Specify the hour.
– Month
Specify the month.
– Week
Specify the week.
You can select the first to fifth or the last week of the month.
– Day
Specify the weekday.
• End Date
Enter the following values for the end of daylight saving time:
– Hour
Specify the hour.
– Month
Specify the month.
– Week
Specify the week.
You can select the first to fifth or the last week of the month.
– Day
Specify the weekday.
Note
To avoid time jumps, make sure that there is only one time server in the network.
Description
The page contains the following boxes:
• SNTP Client
Enable or disable automatic time-of-day synchronization using SNTP.
• Current System Time
Shows the current date and current normal time received by the device. If you specify a time
zone, the time information is adapted accordingly.
• Last Synchronization Time
Shows when the last time-of-day synchronization took place.
Procedure
1. Click the "SNTP Client" check box to enable the automatic time setting.
2. In the "Time Zone" input box, enter the local time difference to world time (UTC). The input
format is "+/-HH:MM" (for example +02:00 for CEST), because the SNTP server always sends
the UTC time. This time is then recalculated and displayed as the local time based on the
specified time zone. You configure the daylight saving time switchover on the pages "System
> System Time > DST Overview" and "System > System Time > DST Configuration". You also
need to take this into account when completing the "Time Zone" input box.
3. Select one of the following options from the "SNTP Mode" drop-down list:
– Poll
For this mode, you need to configure the following:
- Time zone difference (step 2)
- Query interval (step 4)
- Time server (step 5)
- Port (step 7)
- Complete the configuration with step 8.
– Listen
For this mode, you need to configure the following:
- Time difference to the time sent by the server (step 2)
- Complete the configuration with step 8.
4. In the "Poll Interval[s]" input box, enter the time in seconds after which a new time query is
sent to the time server.
5. In the "SNTP Server Address" input box, enter the IP address or the FQDN of the SNTP server
whose frames will be used to synchronize the time of day.
6. Click the "Create" button.
A new row is inserted in the table for the SNTP server.
7. In the "SNTP Server Port" column, enter the port via which the SNTP server is available. The
port can only be modified if the IPv4 address or the FQDN name of the SNTP server is entered.
8. Click the "Set Values" button to transfer your changes to the device.
Description
The page contains the following boxes:
• NTP Client
Select this check box to enable automatic time-of-day synchronization with NTP.
• Current System Time
Shows the current date and current normal time received by the device. If you specify a time
zone, the time information is adapted accordingly.
• Last Synchronization Time
Shows when the last time-of-day synchronization took place.
Procedure
1. Click the "NTP Client" check box to enable the automatic time setting using NTP.
2. Enter the necessary values in the following boxes:
– Time zone
– IP address or FQDN of the NTP server
– NTP Server Port
– Query interval
3. Click the "Set Values" button.
Note
To avoid time jumps, make sure that there is only one time server in the network.
Description
The page contains the following boxes:
• SIMATIC Time Client
Select this check box to enable the device as a SIMATIC time client.
• Current System Time
Shows the current system time.
Procedure
1. Click the "SIMATIC Time Client" check box to enable the SIMATIC Time Client.
2. Click the "Set Values" button.
Note
No automatic logout from the CLI
If the connection is not terminated after the set time, check the "Keep alive" setting on the Telnet
client.
If the interval for "Keep alive" is shorter than the configured time, the connection is maintained
although no user data is transferred. You have set, for example, 300 seconds for the automatic
logoff and the "Keep alive" function is set to 120 seconds. In this case, a packet is sent every 120
seconds that keeps the connection uninterrupted.
• Turn off the "Keep alive" (interval time=0)
or
• Set the interval high enough so that the underlying connection is terminated when there is
inactivity.
Procedure
1. Enter a value of 60-3600 seconds in the "Web Base Management [s]" input box. If you enter
the value 0, the automatic logout is disabled.
2. Enter a value of 60-600 seconds in the "CLI (TELNET, SSH) [s]" input box. If you enter the value
0, the automatic logout is disabled.
3. Click the "Set Values" button.
• There is a Syslog server in your network that receives the log entries. (Since this is a UDP
connection, there is no acknowledgment to the sender)
• The IP address or the FQDN (Fully Qualified Domain Name) of the Syslog server is entered on
the device.
Description
The page contains the following boxes:
• Syslog Client
Enable or disable the Syslog function.
• Syslog Server Address
Enter the IP address, the FQDN (Fully Qualified Domain Name) or the host name of the Syslog
server.
This table contains the following columns
• Select
Select the row you want to delete.
• Syslog Server Address
Shows the IP address, the FQDN (Fully Qualified Domain Name) or the host name of the
Syslog server.
• Server Port
Enter the port of the Syslog server being used.
• TLS
When this check box is selected, communication with the Syslog server is encrypted.
Procedure
Enabling function
1. Select the "Syslog Client" check box.
2. Click the "Set Values" button.
Note
You will find the permitted operating voltage limits in the operating instructions of the device.
If a fault occurs, the error LED lights up on the device. The currently pending fault is
displayed under "Information > Faults".
In addition, the corresponding error message is entered in the result log table. The content of
the event log table is displayed in "Information > Log Tables > Event Log".
Procedure
1. Click the check box in front of the line name you want to monitor to enable or disable the
monitoring function.
2. From the "PROFINET Redundancy" drop-down list, select the desired entry for redundant
power supply to be monitored by PROFINET.
3. Click the "Set Values" button.
Description
The table has the following columns:
• Port
Shows the available ports.
• Setting
Select the setting from the drop-down list. You have the following options:
– Up
Error handling is triggered when the port changes to the active status.
(From "Link down" to "Link up")
– Down
Error handling is triggered when the port changes to the inactive status.
(From "Link up" to "Link down")
– "-" (disabled)
The error handling is not triggered.
Procedure
Configure error monitoring for a port
1. From the relevant drop-down list, select the options of the slots / ports whose connection
status you want to monitor.
2. Click the "Set Values" button.
Configure error monitoring for all ports
1. Select the required setting from the drop-down list of the "Setting" column.
2. Click the "Copy to Table" button. The setting is adopted for all ports of table 2.
3. Click the "Set Values" button.
6.4.16 PROFINET
Note
GSDML-configuration file: Mode Type
The GSDML configuration file can be used to configure the transfer mode for the Ethernet port.
The SCALANCE WxM76x supports only the "Autonegotiation" setting.
Description
The page contains the following boxes:
• PROFINET Device Diagnostics
Shows whether PROFINET is enabled ("On") or disabled ("Off").
• PROFINET runtime mode for next boot
Set whether PROFINET will be enabled ("On") or disabled ("Off") after the next device restart.
Note
PROFINET AR Status
If a PROFINET connection is established; in other words the PROFINET AR status is "Online",
you cannot disable PROFINET.
• PROFINET AR Status
This box shows the status of the PROFINET connection; in other words whether the device is
connected to a PROFINET controller "Online" or "Offline".
Here, online means that a connection to a PROFINET IO controller exists, that this has
downloaded its configuration data to the device and that the device can send status data to
the PROFINET IO controller. In this status known as "in data exchange", the parameters set via
the PROFINET controller cannot be configured.
• PROFINET Name of Station
This box displays the PROFINET device name according to the configuration in HW Config of
STEP 7.
6.4.17 PLUG
6.4.17.1 Configuration
NOTICE
Do not remove or insert the PLUG during operation.
A PLUG may only be removed or inserted when the device is turned off.
The device checks whether a PLUG is inserted at one second intervals. If it is detected that the
PLUG has been removed, the device restarts.
If a valid PLUG license was inserted in the device, the device changes to a defined error state
following the restart. With SCALANCE W, the available wireless interfaces are deactivated in
this case.
If the device was configured at some time with a PLUG license, the device can no longer be used
without this PLUG. To be able to use the device again, reset the device to the factory settings.
Note
The action is only executed after you click the "Set Values" button.
The action cannot be undone.
If you decide against executing the function after making your selection, click the "Refresh"
button. As a result the data of this page is read from the device again and the selection is
canceled.
Description
The table has the following rows:
• State
Shows the status of the PLUG. The following are possible:
– ACCEPTED
There is a PLUG with a valid and suitable configuration in the device.
– NOT ACCEPTED
Invalid or incompatible configuration on the inserted PLUG.
– NOT PRESENT
No PLUG is inserted in the device.
– FACTORY
PLUG is inserted and does not contain a configuration. This status is also displayed when
the PLUG was formatted during operation.
• Device Group
Shows the SIMATIC NET product line that used the PLUG previously.
• Device Type
Shows the device type within the product line that used the PLUG previously.
• Configuration Revision
The version of the configuration structure. This information relates to the configuration
options supported by the device and has nothing to do with the concrete hardware
configuration. This revision information does not therefore change if you add or remove
additional components (modules or extenders), it can, however, change if you update the
firmware.
• File System
Displays the type of file system on the PLUG.
• File System Size [Kilobytes]
Displays the maximum storage capacity of the file system on the PLUG.
• File System Usage [Kilobytes]
Displays the memory utilization of the file system of the PLUG.
• Info String
Shows additional information about the device that used the PLUG previously, for example,
article number, type designation, and the versions of the hardware and software. The
displayed software version corresponds to the version in which the configuration was last
changed. With the "NOT ACCEPTED" status, further information on the cause of the problem
is displayed.
If a PLUG was configured as a PRESET PLUG this is shown here as additional information in the
first row. For more detailed information on creating and using a PRESET PLUG refer to the
section "Maintenance (Page 309)".
• Firmware on PLUG
The setting is enabled by default.
When enabled, the firmware will be stored on the PLUG. This means that automatic firmware
updates/downgrades can be made with the PLUG. The "Info String" box shows whether or not
the firmware is stored on the PLUG. You can find more information on this in the section
"Configuration License PLUG (CLP) (Page 28)".
• Modify PLUG
Select the required setting from the drop-down list. You have the following options for
changing the configuration on the PLUG:
– Write current configuration to PLUG
This option is available only if the status of the PLUG is "NOT ACCEPTED" or "FACTORY".
The configuration in the internal flash memory of the device is copied to the PLUG.
– Erase PLUG to factory default
Deletes all data from the PLUG and performs low-level formatting.
Procedure
Requirement:
• User with administrator rights
Modifying the PLUG configuration
1. Select the required option from the "Modify PLUG" drop-down list.
2. Click the "Set Values" button.
6.4.17.2 License
NOTICE
Do not remove or insert the PLUG during operation.
A PLUG may only be removed or inserted when the device is turned off.
The device checks whether a PLUG is inserted at one second intervals. If it is detected that the
PLUG has been removed, the device restarts.
If a valid PLUG license was inserted in the device, the device changes to a defined error state
following the restart. With SCALANCE W, the available wireless interfaces are deactivated in
this case.
If the device was configured at some time with a PLUG license, the device can no longer be used
without this PLUG. To be able to use the device again, reset the device to the factory settings.
• Serial number
Shows the serial number of the PLUG.
• Info String
Displays additional information about the PLUG.
Note
When you save the configuration, the information about whether or not a PLUG was inserted in
the device at the time is also saved. This configuration is then only executable, if a PLUG with the
same article number / license is plugged in. This applies regardless of whether or not iFeatures
are configured.
6.4.18 Ping
Description
The page contains the following boxes:
• Destination Address
Enter the IPv4, IPv6 address or the FQDN (Fully Qualified Domain Name) of the device.
• Repeat
Enter the number of Ping requests.
• DNS Resolution
Select the IP address type in which an entered FQDN will be resolved.
– Auto
In this mode, the IP address type is selected automatically.
– IPv4
The entered FQDN will be resolved in an IPv4 address.
– IPv6
The entered FQDN will be resolved in an IPv6 address.
• Out Interface for IPv6
This selection is only required when the destination address is a multicast or a link local
address.
– "-" (factory setting)
– Select the relevant IPv6 interface.
• Ping
Click this button to start the Ping function.
• Ping Output
This box shows the output of the Ping function.
• Clear
Click this button to delete the ping output.
Note
DCP Discovery
The function is only available with the VLAN associated with the TIA interface. You can
configure the TIA interface with "Layer 3 > Subnets > Configuration".
Requirement:
To adapt network parameters, DCP requires write access to the device. If access is write-
protected, the network parameters cannot be configured.
On SCALANCE devices, you configure access under "System > Configuration".
Description
The page contains the following boxes:
• Timeout[s]
Specify the time for flashing. When the time elapses, flashing stops.
• Blink Own LEDs
Makes the LEDs of your own device flash.
• Interface
Select the required interface.
• Discover
Starts the search for devices reachable via the selected interface.
On completion of the search the reachable devices are listed in the table. The table is limited
to 100 entries.
The table has the following columns:
• Port
Shows the port via which the device can be reached.
• MAC Address
Shows the MAC address of the device.
• Device Type
Shows the product line or product group to which the device belongs.
• Device Name
Adapt the PROFINET device name if necessary.
The device name must be DNS-compliant. If the device name is not used, the box is empty.
• IP Address
If necessary, adapt the IPv4 address of the device.
The IPv4 address should be unique within your network and should match the network. The
IPv4 address 0.0.0.0 means that no IPv4 address has yet been set.
• Subnet mask
If necessary, adapt the subnet mask of the device.
• Gateway Address
Adapt the IPv4 address of the gateway if necessary.
• Status Device Name
– None: The device name is not used.
– Discovered: The set device name is used.
– Configured: The device was assigned a new device name.
• IP Status
– Discovered/IP: The device uses a static IPv4 address.
– Discovered/DHCP: The device has obtained the IPv4 address from a DHCP server.
– Configured: The device was assigned a new IPv4 address.
• Timeout[s]
Specify the time for flashing. When the time elapses, flashing stops.
• Flash
Makes the LEDs of the selected device flash.
Procedure
1. Select the TIA interface.
2. To show all devices that can be reached via the TIA interface, click the "Browse" button.
3. Adapt the desired properties.
4. Click the "Set Values" button.
The status of the modified properties changes to "Configured".
5. To ensure that the properties were applied correctly, click the "Browse" button again.
The status of the modified properties changes to "Discovered".
Backup
On this page, you can create backups of the configuration. The maximum number depends on
the size of the backup and the available memory space.
The created backups are saved under the "ConfigPackBackup" file type. On the "System >
Load&Save > HTTP/TFTP/SFTP" page, you can save configuration backups in ZIP format on
your client PC or load them from there.
Description
The page contains the following boxes:
• Name
Enter a name for the backup.
The table contains the following columns:
• Select
Select the row you want to delete.
• Name
Shows the name of the backup.
• Size [KB]
The first row "Available memory" shows how much memory is available for backups on the
device. When you create a backup, the available memory space is reduced accordingly.
The other rows show the size of each backup.
• Restore
Click the "Restore" button to load the relevant backup on the device.
Procedure
1. Enter the required name.
2. Click the "Create" button.
The current configuration is saved as a configuration backup.
Saving the backup may take some time. A new row is created for the backup. The size of the
backup is displayed and subtracted from the available memory space.
Note
Permitted characters for user name and password
The following characters are permitted:
• 0123456789
• A...Z a...z
• . -_
Additionally allowed in the password:
• Space
• !"%&/()=?*+<>',
Description
The page contains the following:
• Enable
Enable or disable reception of the TCP packets. To log this, activate the "TCP Event Log" event
under "System > Event".
• Username
Enter the user name to check the reception of the TCP packet. The user name and password
are entered in the TCP packet.
• Password
Enter the password belonging to the user name.
• Password (Confirmation)
Repeat the password to confirm it.
• Port number
Define the port at which the device waits for the TCP packets. The standard port 26864 is
preset, or you can enter a port number in the range 1 … 65535.
Note
Reserved ports
Some ports are permanently reserved. Make sure that the specified port is not already in use.
You can find the ports used in the "List of available services (Page 19)".
Note
Identical WLAN configuration of the access points for WLAN roaming via TCP event
required
For problem-free WLAN roaming via TCP, all access points must have identical configuration of
the WLAN interface or the VAP (frequency band, SSID, WLAN mode, channel bandwidth,
security, DFS).
6.5.1 Ethernet
6.5.1.1 Overview
Description
The table has the following columns:
• Port
Shows the configurable ports. If you click on the link, the corresponding configuration page
is opened.
• Port name
Shows the name of the port.
• State
Shows whether the port is on or off. Data traffic is possible only over an enabled port.
• OperState
Displays the current operational status. The operational status depends on the configured
"Status" and the "Link".
The available options are as follows:
– up
You have configured the status "enabled" for the port and the port has a valid connection
to the network.
– down
You have configured the status "disabled" or "Link down" for the port or the port has no
connection.
• Link
Shows the connection status to the network. With the connection status, the following is
possible:
– up
The port has a valid link to the network, a link integrity signal is being received.
– down
The link is down, for example because the connected device is turned off.
• Mode
Shows the transfer parameters of the port.
• Negotiation
Shows whether the automatic configuration is enabled or disabled.
• MAC Address
Shows the MAC address of the port.
6.5.1.2 Configuration
Configuring ports
With this page, you configure the Ethernet ports of the device.
Description
The table has the following rows:
• Port
Select the port to be configured from the drop-down list.
• State
Specify whether the port is enabled or disabled.
– enabled
The port is enabled. Data traffic is possible only over an enabled port.
– disabled
The port is disabled.
• Port name
Enter a name for the port.
• MAC Address
Shows the MAC address of the port.
• Mode Type
The operating mode is set to "Auto negotiation". In this case, the parameters are negotiated
automatically with the connected terminal device. This must also be in the "Auto negotiation"
mode for this purpose.
Note
Before the port and partner port can communicate with each other, the settings must match
at both ends.
• Mode
Shows the transmission speed and the transmission method of the port.
• Negotiation
Shows whether the automatic configuration of the connection to the partner port is enabled
or disabled.
• OperState
Displays the current operational status. The operational status depends on the configured
"Status" and the "Link". The available options are as follows:
– up
You have configured the status "enabled" for the port and the port has a valid connection
to the network.
– down
You have configured the status "disabled" or "Link down" for the port or the port has no
connection.
• Link
Shows the connection status to the network. The available options are as follows:
– Up
The port has a valid link to the network, a link integrity signal is being received.
– Down
The link is down, for example because the connected device is turned off.
Procedure
Note
Changing the port configuration
With various automatic functions, the device prevents or reduces the effect on other ports and
priority classes (Class of Service) if a port is overloaded. This can mean that frames are discarded
even when flow control is enabled.
Port overload occurs when the device receives more frames than it can send, for example as the
result of different transmission speeds.
6.5.2 WLAN
6.5.2.1 Basic
Basic settings
On this page, you make several basic settings for the device, for example the country setting and
mode.
Note
To configure the WLAN interface, you must always specify the country code first. Some
parameters are dependent on the country setting, for example the transmission standard.
Description
• Country Code
Select the country in which the device will be operated from the drop-down list.
You do not need to know the data for the specific country, the channel division and output
power are set by the device according to the country you select.
You can find more information on currently available country approvals in the "Approvals
SCALANCE W700 802.11ax (https://support.industry.siemens.com/cs/ww/en/view/
109802595)" documentation.
Note
Locale setting
The correct country setting is mandatory for operation complying with the approvals.
Selecting a country different from the country of use can lead to legal prosecution.
• Device Mode
Select the mode of the device. This selection is available only for access points.
The following modes are possible:
– AP - Access point mode
– Client - Client mode
Note
After the mode is changed, a message is displayed. If you confirm the message with "OK", the
device is reset to the memory defaults (protected settings) and restarted in the selected
mode.
If the device has restarted, you will need to log in again to be able to continue the
configuration.
• Frequency Band
Set frequency band with which the device operates.
– 2.4 GHz
– 5 GHz
• Radio Mode
Shows the mode of the WLAN interface.
Note
Data rate
The data rate is adjusted automatically.
• DFS (802.11h)
Enables or disables the "Dynamic Frequency Selection (DFS)" function.
– Enabled
With the DFS function, it is possible to also use the higher 5 Ghz channels.
These channels are country-specific and are subject to certain DFS regulations. You can
find additional information on this in the country-specific DFS documentation.
Before the access point transmits over one of these channels, it checks for competing
radar signals for 60 seconds according to the CAC (Channel Availability Check). The access
point also does not send any beacons for the duration of the search. With weather radar
channels (5.6 - 5.65 GHz), the duration of the search is 10 minutes.
If no radar signals are detected after the search period has elapsed, the access point
transmits on the channel. Otherwise, the access point changes channel and repeats the
check.
The access point also searches for radar signals continuously during operation.
If the access point discovers a radar signal on the current channel, it notifies the clients of
the channel change. It then automatically switches to an alternative DFS channel and the
current channel is blocked for 30 minutes.
– Disabled
The DFS function is not used.
• Outdoor Mode
– Enabled
If you have enabled Outdoor Mode, only the channels that are permitted for outdoor
operation are available to you.
– Disabled
If you have disabled Outdoor Mode, only the channels that are permitted for operation in
a building are available to you.
Procedure
1. To configure the WLAN interface, you must always specify the country first. Select the
country in which the device will be operated from the "Country Code" drop-down list.
2. Select the required frequency band from the "Frequency Band" drop-down list.
3. From the "WLAN Mode" drop down list, select the required transmission standard for the
configured frequency band.
4. Click the "Set Values" button.
6.5.2.2 Antennas&Power
Overview
The following figures provide an overview of the IWLAN antennas that are suitable for use with
SCALANCE W devices.
Type of antenna
W1780/W1740
W760/W720,
range (GHz)
W780/W740
W770/W730
W770/W730
SCALANCE
SCALANCE
SCALANCE
SCALANCE
SCALANCE
WAM766-1/
WUM766-1
Frequency
Antennas
IP65
ANT792-8DN ● ● ●
ANT793-8DP ● ● ● ●* ●
directional
ANT793-8DJ ● ● ● ●* ●
5
ANT793-8DK ● ● ● ●* ●
ANT793-8DL ● ● ● ●* ●
RCoax
radiating
cables ● ● ● ● ●
2.4 GHz
ANT792-4DN ● ● ● ● ●
RCoax
RCoax
radiating
cables ● ● ● ● ●
5 GHz
G_IK10_XX_30317
ANT793-4MN ● ● ● ● ●
* Antennas can only be used on one antenna connector per radio interface (R1A1 or R2A1) and the rest
of the antenna connectors have to be fitted with a terminating resistor.
W1780/W1740
W760/W720,
range (GHz)
W780/W740
W770/W730
W770/W730
SCALANCE
SCALANCE
SCALANCE
SCALANCE
SCALANCE
WAM766-1/
WUM766-1
Frequency
Antennas
IP65
ANT792-8DN ● ● ●
ANT793-8DP ● ● ● ●* ●
directional
ANT793-8DJ ● ● ● ●* ●
5
ANT793-8DK ● ● ● ●* ●
ANT793-8DL ● ● ● ●* ●
RCoax
radiating
cables ● ● ● ● ●
2.4 GHz
ANT792-4DN ● ● ● ● ●
RCoax
RCoax
radiating
cables ● ● ● ● ●
5 GHz
G_IK10_XX_30317
ANT793-4MN ● ● ● ● ●
* Antennas can only be used on one antenna connector per radio interface (R1A1 or R2A1) and the rest
of the antenna connectors have to be fitted with a terminating resistor.
The antenna name provides information about the properties of the antennas listed in the
IWLAN antenna overview:
$QWHQQDVIRU6&$/$1&(:GHYLFHV
$17 ದ ದ ' [
+LJKJDLQ
'LUHFWLYLW\
*+] *DLQ
2PQLGLUHF
0 WLRQDO
*+] 9HU\KLJK DQWHQQD
JDLQ
Antennas&Power
Note
50 Ω terminating resistor
Each WLAN interface has two antenna connections. Connectors that are not used must have a
50 Ω terminating resistor fitted.
An antenna must always be connected to the R1 A1 antenna connection as soon as the WLAN
interface is switched on. If no antenna is connected, the relevant interface must also be disabled
for Rx and Tx. Otherwise, there may be transmission disruptions.
Description
Table 1 has the following columns:
• Radio
Shows the available WLAN interfaces.
• Frequency Band (only in access point mode)
Shows the frequency band.
– 2.4 GHz
– 5 GHz
• Max. Tx Power
The value you set here corresponds to the transmit power per antenna port. With transmit
power greater than 15 dBm, the transmit speed may be reduced.
Note
The maximum possible transmit power varies depending on the channel and data rate. For
more information on transmit power, refer to the documentation "Characteristics SCALANCE
W700 801.11ax".
• Antenna Type
Select the type of external antenna connected to the device. If the type of your external
antenna is not available, select the entry "User defined".
If you terminate an antenna connector using a 50 Ω terminating resistor, select the entry "Not
used (Connect 50 Ohm Termination)".
Only dual-band antennas are available in dual mode. Select the desired antennas A1 and A2
for the WLAN 1 (5 GHz) interface. The selected antennas are adopted for the WLAN 2 (2.4
GHz) interface once enabled. If a dual-band antenna is switched to single-band mode via the
CLI or SNMP, the relevant second WLAN interface is disabled.
Note
When you select an antenna, keep in mind:
• The antennas with national approval for your device You can find additional information
under Wireless approval (https://www.siemens.com/wireless-approvals).
• The country-specific and channel-dependent maximum permissible antenna gain You
can find additional information on this in the reference document "Approvals for
SCALANCE W700 802.11ax".
• Antenna Gain
If you select the "User defined" entry for the "Antenna Type", enter the antenna gain manually
in the "dBi" unit.
– Antenna Gain 2.4 GHz [dBi]
Here, enter the antenna gain the antenna has in the 2.4 GHz frequency band.
– Antenna Gain 5 GHz [dBi]
Here, enter the antenna gain the antenna has in the 5 GHz frequency band.
• Cable Length [m]
Enter the length of the flexible antenna connecting cable in meters between the device and
the external antenna.
• Additional Attenuation [dB]
Here, specify the additional attenuation caused, for example, by an additional splitter.
• Antenna Mode
Specify the use of the antenna. For antenna connection R1 A1, the entry cannot be changed.
– Tx
For sending only
– Rx
For receiving only
– Rx/Tx
For receiving and sending
The following table shows which combinations are possible:
R1 A1 R1 A2
Rx/Tx Rx/Tx
Rx/Tx Rx
Rx/Tx Tx
Rx/Tx --1)
– Channel numbers
Indicates the channels on which the current transmit power exceeds the maximum
permitted transmit power.
– "-"
The channels can be used with the current settings.
Procedure
Follow these steps to configure both antenna connections:
1. For the first antenna connector (R1 A1) in the "Antenna Type" drop-down list, select the type
of antenna.
2. In the "Cable Length" input box, enter the length of the connecting cable you are using in
meters. The "Antenna mode" entry cannot be changed at antenna connection R1A1.
3. For the second antenna connection (R1 A2), select the appropriate type of the second
antenna in the"Antenna Type" drop-down list and enter a value for "Cable length".
If you terminate the second antenna connection using a 50 Ω terminating resistor, select the
entry "Not used (Connect 50 Ohm Termination)".
4. Click the "Set Values" button.
6.5.2.3 Advanced
Description
The table has the following columns:
• Radio
Shows the available WLAN interfaces in this column.
• Frequency Band (only in access point mode)
Shows the frequency band.
– 2.4 GHz
– 5 GHz
• Beacon Interval [ms] (only in access point mode)
Shows the interval at which the access point sends beacons. Beacons are packets that are
sent cyclically by an access point to inform clients of its existence.
• HW Retries
Specify the number of hardware retries.
Hardware retries >30 are not recommended.
The hardware retry is performed by the WLAN chip itself when it tries to repeat an
unacknowledged packet immediately.
If all hardware retries were unsuccessful, the packet is deleted and the WLAN client is
removed from the list.
• A-MPDU
Aggregated MAC Protocol Data Unit (A-MPDU)
– Enabled
Multiple MPDU frames with the same destination address are bundled and sent as one
large A-MPDU. This allows the total throughput to be increased.
– Disabled
A-MPDU frames are received but not sent.
Procedure
1. Enter the values to be set in the input boxes as follows.
2. Select the option checkmark of the required functions.
3. Click the "Set Values" button.
Channel settings
For communication, a specific channel within a frequency band is used. You can either set this
channel specifically or configure so that the channel is selected automatically.
On this page, you specify which channels may be used for communication.
Description
Table 1 contains the following columns:
• Radio
Shows the available WLAN interfaces.
• Frequency Band (only in access point mode)
Shows the frequency band.
– 2.4 GHz
– 5 GHz
• Use Allowed Channels only
If you enable the option, you restrict the selection of channels via which the connection is
established.
In the following tables, you define which channels can be used to establish a wireless cell.
The tables are divided up according to frequency bands.
If the option is disabled, the channels available based on the settings (country code,
antennas, transmit power etc.) are used.
Above the tables for the frequency bands, you will find the following check box:
• Select / Deselect all
– Enabled
If you enable the check box, all channels are selected.
– Disabled
If you deselect the check box, the first valid channel of the frequency band remains
enabled. Enable the required channel.
The tables of the frequency bands have the following columns:
• Radio
Shows the available WLAN interfaces.
• Frequency Band
Shows the frequency band.
– 2.4 GHz
– 5 GHz
• Radio Mode
Shows the mode.
• Channel number
To specify the valid channels for the required frequency band, select the appropriate check
box for the channel number.
The table displays the permitted channels of the country. Only the valid channels can be
enabled. Invalid channels are grayed out and cannot be enabled.
Note
To specify the channels, the setting "Use Allowed Channels only" must be enabled.
Procedure
1. Select the "Use Allowed Channels only" option for the required WLAN interface.
2. Deselect the check box "Select / Deselect all".
3. Select the relevant check box for the required channel number.
4. Click the "Set Values" button.
6.5.2.5 AP
Note
This WBM page is only available in access point mode.
Configuration
On this WBM page, you specify the configuration for the access point.
Description
Table 1 has the following columns:
• Radio
Shows the available WLAN interfaces.
• Frequency Band
Shows the frequency band.
– 2.4 GHz
– 5 GHz
• Channel
Specify the main channel.
If you want the access point to search for a free channel itself, use "Auto". The selection of
channels used by an access point when establishing a wireless cell can be restricted. To do
this, select the "Use Allowed Channels only" check box on the "Allowed Channels" page.
.If you want to use a fixed channel, select the required channel from the drop-down list.
• Alternative DFS Channel
If you have enabled the "DFS" function, on the "Basic" page, specify the alternative channel
here. If you want the access point to search for a free channel itself, use "Auto".
If a competing radar signal was detected both on the main and alternative channel, the
access point automatically searches for a free channel.
If you want to use a fixed channel, select the required channel from the drop-down list.
• Channel Width [MHz]
You can only specify the channel bandwidth for the IEEE 802.11n, IEEE 802.11ac and IEEE
802.11 ax transmission standards.
The following settings are possible.
– 20 MHz
– 40 MHz
Only with IEEE 802.11ac/ax:
– 80 MHz
• Selected Channels
– Channel number (frequency) or Auto
When a fixed channel is set for "Channel", this channel is shown including frequency.
– At 80 MHz only and with fixed channel: Channel range
Four channels are required for the 80 MHz channel bandwidth in the corresponding
channel range. The channel range consists of the channel configured for "Channel" and
the three next channels.
• Selected Alternative DFS Channels
– Channel number (frequency) or Auto
When a fixed channel is set for "Alternative DFS Channel", this channel is shown including
frequency.
– At 80 MHz only and with fixed channel: Channel range
Four channels are required for the 80 MHz channel bandwidth in the corresponding
channel range. The channel range consists of the channel configured for "Channel" and
the three next channels.
Note
Since no encryption is used for the SSID transfer, this function can only provide basic
protection against unauthorized access. The use of an authentication method (for example
WPA2 (RADIUS)/WPA3-SAE, if this is not possible WPA2-PSK) provides higher security. You
must also expect that certain terminal devices may have problems with access to a hidden
SSID.
Procedure
1. Select the required channel from the "Channel" drop-down list.
2. Enter network name in the "SSID" input box for the corresponding WLAN interface and port.
3. For the relevant WLAN interface and the port, select the "Enabled" check box.
4. Click the "Set Values" button.
6.5.2.6 Client
Connecting to a network
On this WBM page, you can specify how the device connects to a network as client.
Note
This WBM page is only available for clients or access points in client mode.
Description
Table 1 has the following columns:
• Radio
Shows the available WLAN interfaces.
• MAC Mode
Specify how the MAC address is assigned to the client. The following are possible:
– Own
The client uses the MAC address of the Ethernet interface for the WLAN interface.
– Layer 2 Tunnel
The client uses the MAC address of the Ethernet interface for the WLAN interface. The
network is also informed of the MAC addresses connected to the Ethernet interface of the
client. Up to eight MAC addresses can be used.
Table 2 has the following columns:
• Radio
Shows the available WLAN interfaces.
• Roaming Threshold
The client switches at a moderately higher field strength to the AP with the stronger signal.
• Background Scan Mode
While the client is connected to an access point, it scans for other access points in the
background with which it can connect when necessary. Specify the mode for the scan.
The following options are available:
– Always
The client scans continuously for access points.
– Disabled
As long as the client is connected, there is no scan for further access points.
The client updates its scan list based on the beacons (management frames) that it has
received on the current channel.
• Background Scan Interval [ms]
Specify the interval at which further access points are scanned.
Table 3 has the following columns:
• Radio
Shows the WLAN interface.
• Scan Channels
Shows the channels on which the client searches for an access point. The display depends on
the wireless approvals of the selected country and the settings for "Allowed Channels".
Table 4 has the following columns:
• Radio
Shows the WLAN interface.
• Enabled
Enables or disables the relevant SSID.
• SSID
Enter the SSID of the access point with which the client will connect.
For the SSID, ASCII code 0x20 to 0x7e is used.
• Security
Select a security context. You create and configure a security context in "Security > WLAN >
Basic".
Default setting: Context 1
Procedure
1. From the "MAC Mode" drop-down list, select the required assignment of the MAC address.
2. Select the desired mode from the "Background Scan Mode" drop-down list and set the
background scan interval.
3. In table 3, enter an SSID for "SSID".
4. Select a security context.
5. Enable the required SSID.
6. Click the "Set Values" button.
Note
Roaming
For problem-free roaming of the client between the access points, it is important not to block LLC
(Link Layer Control) frames in the wired network. The LLC frames are used to update the FDB
(Forwarding Database) table on the network devices.
Note
This WBM page is only available for clients or access points in client mode.
The WLAN interface of the device must be enabled; otherwise, no recording is possible.
Description
The display is divided into two areas.
• Client
Represents the measurement of the client.
• Access point
Displays the measurement of the access point with which the client is currently connected.
This requires that the setting "Bidirectional Recording" is enabled. The access point sends its
data to a maximum of 3 clients on which signal recorders are running. The access point data
is not displayed on other clients.
Both areas each contain two graphics.
The first graphic contains the following elements:
• Scroll bar
With the scroll bar, you can look through the entire measurement. To do this you can use the
"<<" and ">>" buttons or the arrow keys on the keyboard.
• Bar (left)
In the bar on the left, the wanted signal from the client / access point is displayed in real time
according to the color scheme shown.
• Color scheme
The range > -35 dBm (blue) is the overmodulation range, in other words the WLAN signal is
too strong and is received overmodulated. As of approximately -60 dBm (yellow) the WLAN
signal is weaker.
• x axis
The x axis shows the course of the measurement in random samples and seconds.
• Measurement data
– Client
The measurement data shows the value of the effective user signal according to the color
scheme shown. The gray line shows the background noise.
If the client changes access points during a measurement (roaming) or reconnects, this
is displayed by a vertical black line. On the line the new AP system name and the BSSID are
shown.
If during a measurement the client has no connection to an access point, no user signal
is displayed. To make it clear that there is no connection to an access point, the BSSID is
set to 00:00:00:00:00:00 and shown in red.
– Access point
The measurement data shows the value of the effective user signal according to the color
scheme shown. The gray line shows the background noise.
If the client changes access points during a measurement (roaming) or reconnects, this
is displayed by a vertical black line.
If the access point does not support the setting "Bidirectional Recording" no user signal is
displayed
The second graphic contains the following elements:
• Bar (left)
In the bar, only the percentage of failed transfer attempts is displayed according to the color
scheme.
• Color scheme
The color scheme goes from green to red and shows the values of failed transfer attempts.
– Green (0%): All transfer attempts were successful.
– Red (100%): All transfer attempts have failed.
• x axis
The x axis shows the course of the measurement in random samples and seconds.
• Measurement data
– Client
The measurement data shows the transfer attempts according to the color scheme
shown. The transfer attempts are shown as a bar. The data rate of the sent data packets
is represented as a gray line.
If the client changes access points during a measurement (roaming) or reconnects, this
is displayed by a vertical black line.
– Access point
The measurement data shows the transfer attempts according to the color scheme
shown. The transfer attempts are shown as a bar. The data rate of the sent data packets
is represented as a gray line.
If the client changes access points during a measurement (roaming) or reconnects, this
is displayed by a vertical black line. If the access point does not support the "Bidirectional
Recording" setting, no data is displayed.
Beside the graphics the following values are displayed:
• Status
Shows whether or not the signal recorder is recording values.
• Current Sample
The number of the current measurement
• CL RX-Signal [dBm] / AP RX-Signal [dBm]
The effective user signal of the client / access point in dBm
• CL NF [dBm] / AP NF [dBm]
The background noise of the client / access point in dBm
• CL Retries [%] / AP Retries [%]
The transfer repetitions of the client / access point as a percentage.
• CL RSSI / AP RSSI
The raw value of the RSSI (Received Signal Strength Indication) of the client / access point
• CL TX-Rate [Mbps] / AP TX-Rate [Mbps]
The average data rate of the sent data packets during the current random test
• Roaming Counter
The roaming counter shows how often the client has changed access points during the
recording. After 4,294,967,295 changes, the counter is reset.
• Operative Channel
The current channel or the channel on which the client is connected to the access point
• AP System Name
The system name of the access point
• BSSID
The BSSID (Basic Service Set Identification) of the access point
• Connected Stations
Number of clients connected to the access point over the same VAP interface.
• Bidirectional Status
Shows whether the data of the access point are also being recorded.
Notes on usage
Note the following tips that will help you to obtain useful measurements with the signal
recorder:
• Set a fixed data rate on the access point.
• Make sure that there is enough data communication during the measurement because the
statistics functions evaluate incoming data frames.
• The measurement path should be traveled 2 to 3 times with the same parameters to find out
whether loss of the user data signal always occurs at the same position.
• Selective measurements at a fixed position should be made over a longer period of time.
Procedure
1. Enter the time interval between two measurements.
2. In "Samples" enter the number of measurements.
3. In "Displayed Samples" select how many measurements will be shown in the graphic.
4. Click the "Start" button.
The status (to the right of the graphic) indicates whether the signal recorder is running. The
first measured value is displayed only after the set time interval has elapsed.
5. To stop the recording, click the "Stop" button.
6. Change to one of the following menu items to call up the result of the recording:
– System > Load&Save > HTTP
Click the "Save" button in the "WLANSigRec" table row to save the file
"signal_recorder_SCALANCE_W700.zip" in the file system of the connected PC.
– System > Load&Save > TFTP / SFTP
If necessary, change the file name "signal_recorder_SCALANCE_W700.zip" in the
"WLANSigRec" table row. In the table row "WLANSigRec", select the "Save file" entry from
the drop-down list of the last column and click the "Save Values" button.
7. The ZIP file contains two files with the results of the recording:
– A PDF file: The output is limited to 300 pages.
– A CSV file: Complete listing of the recording.
Note
Number of stored measurements
The last 10000 measuring points are saved in the exported files.
Measurement results
PDF file
The PDF file contains a graphic representation of the course of the effective user data signal
in dBm and the course of the data rate in Mbps. In terms of color, the graphic corresponds
to the appearance in the Web Based Management. If the client changes the access point
(roaming) during the measurement, this is indicated by vertical black bars with a black
square at the tip.
• Access point
Displays the measurement of the access point with which the client is currently connected.
This requires that the setting "Bidirectional Recording" is enabled. The setting is supported by
access points with the following versions: SCALANCE W700 11n > V6.1, SCALANCE W1700
11ac > V1.0 and SCALANCE W700 11ax as of V1.1. The access point sends its data to a
maximum of 3 clients on which signal recorders are running. The access point data is not
displayed on other clients.
The following pages contain the detailed information of all individual measurements in the
form of a table.
The header row shows the IP address of the client and the BSSID and system name of the
access point.
Per measurement the table contains two rows. The data of the client is in the first row and
the data belonging to the access point in the second.
Page 2 shows a legend of the abbreviations in the table. The data starts on a new page when
the client changes access points.
Note
Note the description of the individual columns in the CSV file. These also apply to the columns
of the PDF file.
CSV file
The CSV file contains information on the configuration of the SCALANCE W700 device and
detailed information on all individual measurements and is divided into two areas.
• CL / AP RX-Signal [%]
The effective user data signal of the client (CL) / access point (AP) in %
• CL / AP RX-Signal [dBm]
The effective user data signal of the client (CL) / access point (AP) in dBm
• CL / AP NF [dBm]
The background noise in dBm
• CL / AP RSSI
The raw value of the RSSI (Received Signal Strength Indication)
• Roam
The roaming counter shows how often the client has changed access points during the
recording. After 4 294 967 295 changes the counter is reset.
• CL / AP Retry
The transfer repetitions of the client (CL) / access point (AP)
• Con Stations
Number of clients connected to the access point.
• Operating Ch.
The current channel or the channel on which the client is connected to the access point.
• Width
The channel bandwidth 20, 40 or 80 MHz
• Scan CH
The channel on which the client is currently scanning.
• TX-Rate
The average data rate of the sent data packets
• RX-Rate
The average data rate of the received data packets
• AP System Name
The system name of the access point
Note
This page is available only in access point mode.
On this page, enable the function "Packet Capture" on the interface (Ethernet, WLAN). The
function is for network diagnostics via a connected PC, e.g. to detect transfer errors.
You can also enable the function on several interfaces at the same time. When the function
is enabled the interface can be linked in Wireshark. For a period Wireshark record the data
traffic over the interface. Afterwards, you can view the content of the frames from the
recording or filter according to certain contents.
Description
The table contains the following columns:
• Interface
The interface to which the entry relates.
• Enable
Enable or disable the "Packet Capture" function. As default, the function is disabled.
Note
The access point records all incoming frames. Encrypted data is not decrypted before the
recording.
Performance
Enable the function only for diagnostics purposes. The increased data traffic could influence
the performance of the device.
Ethernet interface with SCALANCE WAM763-1
• You can select one or more ports (P1 - P4) for the Ethernet interface.
• Data traffic that is only forwarded and not received or sent by the WLAN interface is not
displayed.
11.To start the recording, click "Start" in the "Capture" menu. You can obtain further information
about handling the program in Wireshark.
If you analyze several interfaces, you can use a Wireshark instance for each interface.
6.6.1 VLAN
6.6.1.1 General
On this page you specify whether or not the device forwards frames with VLAN tags
transparently (IEEE 802.1D/VLAN-unaware mode) or takes VLAN information into account (IEEE
802.1Q/VLAN-aware mode). If the device is in the "802.1Q VLAN Bridge" mode, you can define
VLANs and specify the use of the ports .
Note
Changing the agent VLAN ID
If the configuration PC is connected directly to the device via Ethernet and you change the
management VLAN ID, the device is no longer reachable via Ethernet following the change.
Description
The page contains the following boxes:
• Base Bridge mode
Select the required mode from the drop-down list. The following modes are possible:
Note
Changing Base Bridge mode
Note the section "Changing Base Bridge mode". This section describes how a change affects
the existing configuration.
• State
Shows the status type of the entry in the internal port filter table. Here, static means that the
address was entered as a static address by the user.
• List of ports
Specify the use of the port. The following options are available:
– "-"
The port is not a member of the specified VLAN.
With a new definition, all ports have the identifier "-".
– M
The port is a member of the VLAN. Frames sent in this VLAN are forwarded with the
corresponding VLAN tag.
– U (uppercase)
The port is an untagged member of the VLAN. Frames sent in this VLAN are forwarded
without the VLAN tag. Frames without a VLAN tag are sent from this port.
– u (lowercase)
The port is an untagged member of the VLAN, but the VLAN is not configured as a port
VLAN. Frames sent in this VLAN are forwarded without the VLAN tag.
– F
The port is not a member of the specified VLAN. You can configure other settings in "Layer
2 > VLAN > Port-based VLAN".
– T
This option is only displayed and cannot be selected in the WBM.
This port is a trunk port, making it a member in all VLANs.
You configure this function in the CLI (Command Line Interface) using the "switchport
mode trunk" command.
Procedure
Requirement:
In Base Bridge mode "802.1Q VLAN Bridge" is set.
Creating a new VLAN
1. Enter an ID in the "VLAN ID" input box.
2. Click the "Create" button. A new entry is generated in the table. As default, the boxes have "-"
entered.
3. Enter a name for the VLAN under Name.
4. Specify the use of the port in the VLAN. If, for example you select M, the port is a member of
the VLAN. The frame sent in this VLAN is forwarded with the corresponding VLAN tag.
5. Click the "Set Values" button.
Description
Table 1 has the following columns:
Note
Table 1 is only available if at least one VLAN is configured.
• Port
Shows that the settings are valid for all ports of table 2.
• Priority / Port VID / Acceptable Frames / Ingress Filtering
In the drop-down list, select the setting for all ports. If "No Change" is selected, the entries of
the corresponding column in table 2 remain unchanged.
• Copy to Table
If you click the button, the setting is adopted for all ports of table 2.
Table 2 has the following columns:
• Port
Shows the available ports and interfaces.
• Priority
From the drop-down list, select the priority given to untagged frames.
The CoS priority (Class of Service) used in the VLAN tag. If a frame is received without a tag,
it will be assigned this priority. This priority specifies how the frame is further processed
compared with other frames.
There are a total of eight priorities with values 0 to 7, where 7 represents the highest priority
(IEEE 802.1p Port Priority).
• Port VID
Select the VLAN ID from the drop-down list. Only VLAN IDs defined on the "VLAN > General"
page can be selected.
If a received frame does not have a VLAN tag, it has a tag with the VLAN ID specified here
added to it and is sent according to the rules at the port.
• Acceptable Frames
Specify which types of frames will be accepted. The following alternatives are possible:
– Tagged Frames Only
The device discards all untagged frames. Otherwise, the forwarding rules apply according
to the configuration. Frames tagged with "0" are treated like untagged frames. The device
forwards all tagged frames. Otherwise, the forwarding rules apply according to the
configuration.
– All
The device forwards all frames.
– Untagged and Priority Tagged Only
The device discards all tagged frames. The device forwards all untagged frames as well as
frames with VLAN = 0 and a priority (Priority Tagged Frames). Otherwise, the forwarding
rules apply according to the configuration.
• Ingress Filtering
Specify whether the VID of received frames is evaluated.
You have the following options:
– Enabled
The VLAN ID of received frames decides whether they are forwarded: To forward a VLAN
tagged frame, the receiving port must be a member in the same VLAN. Frames from
unknown VLANs are discarded at the receiving port.
– Disabled
All frames are forwarded.
Procedure
1. In the row of the port to be configured, click on the relevant cell in the table to configure it.
2. Enter the values to be set in the input boxes as follows.
3. Select the values to be set from the drop-down lists.
4. Click the "Set Values" button.
Steps in configuration
1. Select the "Dynamic MAC Aging" check box.
2. Enter the time in seconds in the "Aging Time[s]" input box.
3. Click the "Set Values" button.
6.6.3.1 General
Description
The page contains the following boxes:
• Spanning Tree
Enable or disable Spanning Tree.
• Protocol Compatibility
Select the compatibility mode of Spanning Tree. For example if you select RSTP, Spanning
Tree behaves like RSTP.
The following settings are available:
– STP
– RSTP
– MSTP
Procedure
1. Select the "Spanning Tree" check box.
2. Select the compatibility mode from the "Protocol Compatibility" drop-down list.
3. Click the "Set Values" button.
Configuration CIST
The page consists of the following parts.
• The left-hand side of the page shows the configuration of the device.
• The central part shows the configuration of the root bridge that can be derived from the
spanning tree frames received by an device.
• The right-hand side shows the configuration of the regional root bridge that can be derived
from the MSTP frames received by an device. The displayed data is only visible if you have
enabled "Spanning Tree" on the "General" page and when "Protocol Compatibility" is set to
"MSTP". This also applies to the "Bridge Max Hop Count" parameter. If the device is a root
bridge, the information on the left and right matches.
Description
The page contains the following boxes:
• Bridge Priority / Root Priority
Which device becomes the root bridge is decided based on the bridge priority . The bridge
with the highest priority becomes the root bridge. The lower the value, the higher the
priority. If several devices in a network have the same priority, the device whose MAC address
has the lowest numeric value will become the root bridge. Both parameters, bridge priority
and MAC address, together form the bridge identifier. Since the root bridge manages all path
changes, it should be located as centrally as possible due to the delay of the frames. The value
for the bridge priority is a whole multiple of 4096 with a range of values from 0 to 61440.
• Bridge Address / Root Address
The bridge address shows the MAC address of the device and the root address shows the MAC
address of the root bridge.
• Root port
Shows the port over which the device communicates with the root bridge.
• Root Cost
The path costs from this device to the root bridge.
• Topology Changes / Last Topology Change
The entry for the device shows the number of reconfiguration actions due to the spanning
tree mechanism since the last startup. For the root bridge, the time since the last
reconfiguration is displayed as follows:
– Seconds: "sec" unit after the number
– Minutes: "min" unit after the number
– Hour: "hr" unit after the number
• Bridge Hello Time[s] / Root Hello Time[s]
Each bridge regularly sends configuration frames (BPDUs). The interval between two such
frames is the Hello time. The default for this parameter is 2 seconds.
• Bridge Forward Delay[s] / Root Forward Delay[s]
New configuration data is not used immediately by a bridge but only after the period
specified in the forward delay parameter. This ensures that operation is started with the new
topology only after all the bridges have the required information. The default for this
parameter is 15 seconds.
• Bridge Max Age / Root Max Age
Bridge Max Age defines the maximum "age" of a received BPDU for it to be accepted as valid
by the switch. The default for this parameter is 20 seconds.
• Bridge Max Hop Count
This parameter specifies how many MSTP nodes a BPDU may pass through. If an MSTP BPDU
is received and has a hop count that exceeds the value configured here, it is discarded. The
default for this parameter is 20.
• Regional root priority
For a description of the displayed values, see Bridge priority / Root priority
• Regional root address
Shows the MAC address of the regional root bridge.
Procedure
1. Enter the data required for the configuration in the input boxes.
2. Click the "Set Values" button.
Description
Table 1 has the following columns:
• Column 1
Shows that the settings are valid for all ports of table 2.
• Spanning Tree Status
In the drop-down list, select the setting for all ports. If "No Change" is selected, the entries of
the corresponding column in table 2 remain unchanged.
• Copy to Table
If you click the button, the settings are adopted for all ports of table 2.
Table 2 has the following columns:
• Port
Shows the available ports and interfaces.
• Spanning Tree Status
Specify whether the port is integrated in the spanning tree or not.
Note
If you disable the "Spanning Tree Status" option for a port, this may cause the formation of
loops. The topology must be kept in mind.
• Priority
Enter the priority of the port. The priority is only evaluated when the path costs are the same.
The value must be divisible by 16. If the value that cannot be divided by 16, the value is
automatically adapted.
Range of values: 0 - 240.
The default is 128.
• Cost Calc
Enter the path cost calculation. If you enter the value "0" here, the automatically calculated
value is displayed in the "Path Cost" box.
• Path Cost
The path costs from this port to the root bridge. The path with the lowest value is selected as
the path. If several ports of a device have the same value, the port with the lowest port
number will be selected.
If the "Cost Calc." box has the value "0", the automatically calculated value is shown.
Otherwise, the value of the "Cost Calc." box is displayed.
The calculation of the path costs is largely based on the transmission speed. The higher the
achievable transmission speed is, the lower the value of the path costs.
Typical values for path costs with rapid spanning tree:
– 1000 Mbps = 20,000
– 100 Mbps = 200,000
– 10 Mbps = 2,000,000
The values can, however, also be set individually.
• State
Displays the current state of the port. The values are only displayed and cannot be
configured. The "State" parameter depends on the configured protocol. The following is
possible for status:
– Disabled
The port only receives and is not involved in STP, MSTP and RSTP.
– Discarding
In the "Discarding" mode, BPDU frames are received. Other incoming or outgoing frames
are discarded.
– Listening
In this status, BPDUs are both received and sent. The port is involved in the spanning tree
algorithm.
– Learning
Stage prior to the forwarding status, the port is actively learning the topology (in other
words, the node addresses).
– Forwarding
Following the reconfiguration time, the port is active in the network; it receives and
forwards data frames.
• Fwd. Trans
Specifies the number of changes from the "Discarding" status to the "Forwarding" status.
• Edge Type
Specify the type of edge port. You have the following options:
– "-"
Edge port is disabled. The port is treated as a "no EdgePort".
– Admin
Select this option when there is always an end device on this port. Otherwise a
reconfiguration of the network will be triggered each time a connection is changed.
– Auto
Select this option if you want a connected end device to be detected automatically at this
port. When the connection is established the first time, the port is treated as a "no Edge
Port".
– Admin/Auto
Select these options if you operate a combination of both on this port. When the
connection is established the first time, the port is treated as an Edge Port.
• Edge
Shows the status of the port.
– Enabled
– "-"
Point-to-point is detected automatically. If the port is set to half duplex, a point-to-point
link is not assumed.
• P.t.P.
– Enabled
Shows that a point-to-point link exists.
– Disabled
Shows that no point-to-point link exists.
• Hello Time
Enter the interval after which the bridge sends configuration BPDUs. As default, 2 seconds is
set.
Range of values: 1-2 seconds
Note
The port-specific setting of the Hello time is only possible in MSTP compatible mode.
Procedure
1. In the input cells of the table row, enter the values of the port you are configuring.
2. From the drop-down lists of the cells of the table row, select the values of the port you are
configuring.
3. Click the "Set Values" button.
Description
The page contains the following box:
• MSTP Instance ID
Enter the number of the MSTP instance.
Permitted values: 1 - 64
You can define up to 16 MSTP instances.
The table has the following columns:
• Select
Select the row you want to delete.
• MSTP Instance ID
Shows the number of the MSTP instance.
• Root Address
Shows the MAC address of the root bridge
• Root Priority
Shows the priority of the root bridge.
• Bridge Priority
Enter the bridge priority in this box. The value for the bridge priority is a whole multiple of
4096 with a range of values from 0 to 61440.
• VLAN ID
Enter the VLAN ID. Here, you can also specify ranges with Start ID, "-", End ID. Several ranges
or IDs are separated by ",".
Permitted values: 1- 4094
Procedure
Creating a new entry
1. Enter the number of the MSTP instance in the "MSTP Instance ID" box.
2. Click the "Create" button.
3. Enter the identifier of the virtual LAN in the "VLAN ID" input box.
4. Enter the priority of the bridge in the "Bridge Priority" box.
5. Click the "Set Values" button.
Deleting entries
1. Use the check box at the beginning of the relevant row to select the entries to be deleted.
2. Click the "Delete" button to delete the selected entries from memory. The entries are deleted
from the memory of the device and the display on this page is updated.
Description
The page contains the following box:
• MSTP Instance ID
In the drop-down list, select the ID of the MSTP instance.
Table 1 has the following columns:
• Column 1
Shows that the settings are valid for all ports of table 2.
• MSTP Status
In the drop-down list, select the setting for all ports. If "No Change" is selected, the entries of
the corresponding column in table 2 remain unchanged.
• Copy to Table
If you click the button, the setting is adopted for all ports of table 2.
Procedure
1. In the input cells of the table row, enter the values of the port you are configuring.
2. From the drop-down lists of the cells of the table row, select the values of the port you are
configuring.
3. Click the "Set Values" button.
Applications
The DCP protocol is used by STEP 7 and SINEC PNI for configuration and diagnostics. In the
delivery state, DCP is enabled on all Ethernet ports; in other words, received DCP frames are
forwarded on all ports. With this option, you can disable the sending of frames for individual
ports, for example to prevent individual parts of the network from being configured with SINEC
PNI or to divide the full network into smaller parts for configuration and diagnostics.
All the ports of the device are displayed on this WBM page.
Description
The table has the following columns:
• Port
Shows the available Ethernet ports.
• Setting
Specify whether the port should block or forward outgoing DCP frames. You have the
following options available:
– Forward
DCP frames are forwarded at this port.
– Block
No outgoing DCP frames are forwarded at this port. It is nevertheless still possible to
receive via this port.
Procedure
1. Specify whether the port blocks or forwards the DCP frames.
2. Click the "Set Values" button.
6.6.5 LLDP
Applications
PROFINET uses LLDP for topology diagnostics. In the default setting, LLDP is enabled for all ports;
in other words, LLDP frames are sent and received on all ports. With this function, you have the
option of enabling or disabling sending and/or receiving per port.
Description
The table has the following columns:
• Port
Shows the port.
• Setting
Specify the LLDP functionality. The following options are available:
– Tx
This port can only send LLDP frames.
– Rx
This port can only receive LLDP frames.
– Rx & Tx
This port can receive and send LLDP frames.
– "-" (Disabled)
This port can neither receive nor send LLDP frames.
Procedure
1. Select the required LLDP functionality from the drop-down list.
2. Click the "Set Values" button.
6.7.1 Subnets
6.7.1.1 Overview
The page shows the subnets for the selected VLAN interface. This VLAN interface is also called
an IPv4 interface. A subnet always relates to an IPv4 interface. The IPv4 address is assigned in the
"Configuration" tab.
Description
The page contains the following boxes:
• Interface
Select the interface on which you want to configure the subnet.
The table has the following columns:
• Select
Select the row you want to delete.
• Interface
Shows the interface.
• TIA Interface
Shows whether or not the interface is used as TIA interface.
• Status
Shows the status of the interface.
• Interface Name
Shows the name of the interface.
• MAC Address
Shows the MAC address.
• IP Address
Shows the IPv4 address of the subnet.
• Subnet Mask
Shows the subnet mask.
• Address Type
Displays the address type. The following values are possible:
– Primary
The first IPv4 address that was configured on an IPv4 interface.
– Secondary
All other IPv4 addresses that were configured on an IPv4 interface.
• IP Assign Method
Shows how the IPv4 address is assigned. The following values are possible:
– Static
The IPv4 address is static. You enter the settings in "IP Address" and "Subnet Mask".
– Dynamic (DHCP)
The device obtains a dynamic IPv4 address from a DHCPv4 server.
Procedure
1. Select the VLAN interface from the "Interface" drop-down list.
2. Click the "Create" button. A new row is inserted in the table.
3. Configure the subnet on the "Configuration" tab.
6.7.1.2 Configuration
On this page, you configure the IPv4 interface.
Description
The page contains the following boxes:
• Interface (Name)
Select the interface from the drop-down list.
• Status
Specify whether the interface is enabled or disabled.
– Enabled
The interface is enabled. Data traffic is possible only over an enabled Interface.
– Disabled
The interface is disabled.
• Interface Name
Enter the name of the interface.
• MAC Address
Displays the MAC address of the selected interface.
• DHCP
Enable or disable the DHCP client for this IPv4 interface.
• IP Address
Enter the IPv4 address of the interface. The IPv4 addresses must not be used more than once.
• Subnet Mask
Enter the subnet mask of the subnet you are creating. Subnets on different interfaces must
not overlap.
• Address Type
Shows the address type.
– Primary
The first subnet of the interface.
• TIA Interface
Select whether this interface should become the TIA interface. The TIA interface defines on
which VLAN the PROFINET functionalities are available. This mainly affects the device search
with or via DCP.
• MTU
MTU (Maximum Transmission Unit) specifies the maximum size of the packet. If packets are
longer than the set MTU, they are fragmented. The MTU covers the IP headers and the
headers of the higher layers.
Range of values:
– With IPv4: 90 ... 1514
– With IPv6: 1280 ... 1514
Procedure
1. Select the interface from the "Interface (Name)" drop-down list.
2. Select the status of the interface in the "Status" drop-down list.
3. Enter a name for the Interface in "Interface Name".
4. Enter the IPv4 address of the subnet in the "IP Address" column or enable the "DHCP" option.
5. Enter the subnet mask belonging to the IPv4 address in the "Subnet Mask" column.
6. Click the "Set Values" button.
Description
The page contains the following boxes:
• Destination Network
Enter the network address of the destination that can be reached via this route.
• Subnet Mask
Enter the corresponding subnet mask.
• Gateway
Enter the IPv4 address of the gateway via which this network address is reachable.
• Administrative Distance
Enter the metric for the route. The metric corresponds to the quality of a connection, for
example speed, costs. If there are several equal routes, the route with the lowest metric value
is used.
If you do not enter anything, "not used" is entered automatically. The metric can be changed
later.
Range of values: 1 - 255 or -1 for "not used".
Here, 1 is the value for the best possible route. The higher value, the longer packets require
to their destination.
The table has the following columns:
• Select
Select the row you want to delete.
• Destination Network
Shows the network address of the destination.
• Subnet Mask
Shows the corresponding subnet mask.
• Gateway
Shows the IPv4 address of the next gateway.
• Interface
Shows the interface of the route.
• Administrative Distance
Enter the metric for the route. When creating the route, "not used" is entered automatically.
The metric corresponds to the quality of a connection, based for example on speed or costs.
If there are several equal routes, the route with the lowest metric value is used.
Range of values: 1 - 255
Here, 1 is the value for the best possible route. The higher value, the longer the packets
require to their destination.
• Status
Shows whether or not the route is active.
Procedure
1. Enter the network address of the destination in the "Destination Network" input box.
2. Enter the corresponding subnet mask in the "Subnet Mask" input box.
3. Enter the gateway in the "Gateway" input box.
6.7.3 NAT
6.7.3.1 Masquerading
Note
This page is only available for clients or access points in client mode.
Note
Enabling IP masquerading on at least one VLAN enables NAPT.
Requirements
• "802.1Q VLAN Bridge" is set for "Base bridge mode".
• A second VLAN is set up and the IPv4 interface is configured, see "Subnets (Page 258)".
Description
The table has the following columns:
• Interface
Interface to which the setting relates. Only interfaces with a configured subnet are available.
• Enable Masquerading
When enabled, with each outgoing data packet sent via this interface, the source IP address
is replaced by the IP address of the interface.
6.7.3.2 NAPT
Note
This page is only available for clients or access points in client mode.
On this WBM page, you can configure a port translation in addition to the address translation.
The following port translations are possible:
• From a single port to the same port:
If the ports are the same, the frames will be forwarded without port translation.
• From a single port to a single port
The frames are translated to the port.
• From a port range to a single port
The frames from the port range are translated to the same port (n:1).
• From a port range to the same port range
If the port ranges are the same, the frames will be forwarded without port translation.
Requirements
• IP masquerading is enabled.
• Under "Layer 2 > VLAN > Basic", "802.1Q VLAN Bridge" is set for "Base Bridge Mode".
Description
The page contains the following boxes:
• Source Interface
Select the interface on which the queries will arrive.
• Traffic Type
Specify the protocol for which the address assignment is valid.
• Use Interface IP from Source Interface
When enabled, the IP address of the selected interface is used for "Dest IP Address".
• Destination IP Address
Enter the destination IP address. The frames are received at this IP address. Can only be edited
if "Use Interface IP from Source Interface" is disabled.
Note
The rule is only enabled if the IP address of the VLAN is the same.
• Destination Port
Enter the destination port. Incoming frames with this port as the destination port are
forwarded. If the setting is intended to apply to a port range, enter the range with start port
"-" end port, for example 30 - 40.
• Translated Destination IP
Enter the IP address of the node to which this frame will be forwarded.
• Translated Destination Port
Enter the number of the port. This is the new destination port to which the incoming frame
will be forwarded. If the setting is intended to apply to a port range, enter the range with start
port "-" end port, for example 30 - 40.
The table has the following columns:
• Select
Select the check box in the row to be deleted.
• Source Interface
Shows the interface from which the packets need to come. Only these packets are considered
for port forwarding.
• Traffic Type
Shows the protocol for which the address assignment applies.
• Interface IP
Shows whether the IP address of the interface is used.
• Destination IP
Shows the destination IP address. The frames are received at this IP address.
• Destination Port
Shows the destination port. Incoming frames with this port as the destination port are
forwarded.
• Translated Destination IP
Shows the IP address of the node to which the packets will be forwarded.
• Translated Destination Port
Shows the destination port to which the packets are translated.
6.8.1 Subnets
Note
Update from V1.0 to V1.1
The configuration of the IPv6 addresses is not transferred with an update from V1.0 to V1.1.
Description
The page contains the following:
• Interface
Shows the VLAN interface on which IPv6 will be enabled.
• IPv6 Enable
Enable or disable IPv6 on the interface. When you enable the setting and accept it, the link-
local address is created automatically.
• IPv6 Address
Enter the IPv6 address. The input depends on the selected address type.
• Prefix Length
Enter the number of left-hand bits belonging to the prefix
• IPv6 Address Type
Select the address type:
– Unicast
– Link Local: IPv6 address is only valid on the link.
• Address Configuration
Specify the mechanism for the address configuration:
– DHCPv6
Status dependent: Obtains the IPv6 address and the configuration file from the DHCPv6
server.
– SLAAC (Stateless Address Auto Configuration) (Default)
Stateless autoconfiguration using NDP (Neighbor Discovery Protocol)
– Static
Enter a static IPv6 address.
• DHCPv6 Rapid Commit
When enabled the procedure for the IPv6 address assignment is shortened. Instead of 4
DHCPv6 messages (SOLICIT, ADVERTISE , REQUEST, REPLY) only 2 DHCPv6 messages
(SOLICIT, REPLY) are used. You will find further information on the messages in RFC 3315.
The table has the following columns:
• Select
Select the check box in the row to be deleted.
• Interface Name
Shows the name of the VLAN interface.
• IPv6 Address
Shows the IPv6 address.
• Prefix Length
Shows the prefix length.
Procedure
Automatically form link-local address
1. Enable IPv6.
2. Click the "Set Values" button. In the table an entry with the interface is created and the
automatically formed link-local IPv6 address is displayed.
Assign link-local address
1. Enable IPv6.
2. In "IPv6 Address", enter the link-local address, e.g. FE80::21B:1BFF:FE40:9155
3. Enter "128" in "Prefix Length".
4. For "IPv6 Address Type" select the entry "Link Local".
5. For "Address Configuration" select the entry "Static".
6. Click the "Create" button. In the table an entry with the interface is created and the IPv6
address is displayed.
The automatically created link-local address is overwritten.
Description
The page contains the following:
• Destination Network
Destination Network (:: or 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0) applies to all IPv6 addresses.
• Prefix Length
Enter the number of left-hand bits belonging to the prefix
• Gateway
Enter the IPv6 address of the gateway to which the IPv6 packets will be sent.
• Metric
Enter the metric for the route. The metric corresponds to the quality of a connection, based
for example on speed or costs. If there are several equal routes, the route with the lowest
metric value is used.
Range of values: 1 - 254
• Interface
Specify the interface via which the network address of the destination is reached.
This table contains the following columns:
• Select
Select the check box in the row to be deleted.
• Destination Network
Shows the network address of the destination.
• Prefix Length
Shows the prefix length.
• Gateway
Shows the IPv6 address of the next gateway.
• Interface
Shows the Interface of the route.
• Metric
Enter the metric for the route. When creating the route, "not used" is entered automatically.
The metric corresponds to the quality of a connection, based for example on speed or costs.
If there are several equal routes, the route with the lowest metric value is used.
Range of values: 1 - 254
• Status
Shows whether or not the route is active.
Steps in configuration
1. Enter the prefix length.
2. Enter the IPv6 address of the gateway.
3. Enter the metric of the route.
4. Select the interface through which the network address of the destination is reached.
5. Click the "Create" button. A new entry is generated in the table.
6.9.1 Users
Local users
On this page, you create local users with the corresponding rights.
When you create or delete a local user this change is also made automatically in the table
"External User Accounts". If you want to make change explicitly for the internal or external
user table, use the CLI commands.
Note
The values displayed depend on the rights of the logged-in user.
Description
The page contains the following:
• User Account
Enter the name for the user. The name must meet the following conditions:
– It must be unique.
– It must be between 1 and 250 characters long.
– It must not contain the following characters: :;"|€´?§32°µ ä ö ü Ä Ö Ü
The characters for Space and Delete also cannot be contained.
Note
User name cannot be changed
After creating a user, the user name can no longer be modified.
If a user name needs to be changed, the user must be deleted and a new user created.
Note
User names: admin
You can configure the device with this user name.
When you log in for the first time or log in after a "Restore Factory Defaults and Restart", you
will be prompted to change the predefined password "admin". You can also rename the
"admin" user preset in the factory once. Afterwards, renaming "admin" is no longer possible.
• Password Policy
Shows which password policy is being used.
– High
Password length: at least 8 characters, maximum 128 characters
At least 1 uppercase letter
At least 1 special character
At least 1 number
– Low
Password length: at least 6 characters, maximum 128 characters
– Custom
You configure the password policy on the page "Security > Passwords > Options".
• Password
Enter the password. The strength of the password depends on its length and complexity.
– It must not contain the following characters: ; : ' ? ß § " ² ³ ° | € µ ä ö ü Ä Ö Ü
– The characters for Space and Delete also cannot be contained.
• Password Confirmation
Enter the password again to confirm it.
• Role
Select a role.
You can choose between system-defined and self-defined roles, refer to the page "Security >
Users > Roles.".
• User Account
Shows the user name.
• Role
Shows the role of the user.
• Description
Displays a description of the user account. The description text can be up to 100 characters
long.
Procedure
Note
Changes in "Trial" mode
Even if the device is in "Trial" mode, changes that you carry out on this page are saved
immediately.
Creating users
1. Enter the name for the user.
2. Enter the password for the user.
3. Enter the password again to confirm it.
4. Select the role of the user.
5. Click the "Create" button.
6. Enter a description of the user.
7. Click the "Set Values" button.
Deleting users
1. Select the check box in the row to be deleted.
2. Click the "Delete" button. The entries are deleted and the page is updated.
6.9.1.2 Roles
Roles
On this page, you create roles that are valid locally on the device.
Note
The values displayed depend on the rights of the logged-in user.
Description
The page contains the following:
• Role Name
Enter the name for the role. The name must meet the following conditions:
– It must be unique.
– It must be between 1 and 64 characters long.
– It must not contain the following characters: ;"|€´?§32°µ ä ö ü Ä Ö Ü
The characters for Space and Delete also cannot be contained.
Note
Role name cannot be changed
After creating a role, the name of the role can no longer be changed.
If a name of a role needs to be changed, the role must be deleted and a new role created.
• Role
Shows the name of the role.
• Function Right
Select the function rights of the role:
– 1
Users with this role can read device parameters but cannot change them. Users with this
role can change their own password.
– 15
Users with this role can both read and change device parameters.
Note
Function right cannot be changed
If you have assigned a role, you can no longer change the function right of the role.
If you want to change the function right of a role, follow the steps outlined below:
1. Delete all assigned users.
2. Change the function right of the role:
3. Assign the role again.
• Description
Enter a description for the role. With predefined roles a description is displayed. The
description text can be up to 100 characters long.
Procedure
Creating a role
1. Enter the name for the role.
2. Click the "Create" button.
3. Select the function rights of the role.
4. Enter a description for the role.
5. Click the "Set Values" button.
Deleting a role
1. Select the check box in the row to be deleted.
2. Click the "Delete" button. The entries are deleted and the page is updated.
6.9.1.3 Groups
User groups
On this page you link a group with a role.
In this example the group "Administrators" is linked to the "admin" role: The group is
defined on a RADIUS server. The role is defined locally on the device. When a RADIUS server
authenticates a user and assigns the user to the "Administrators" group, this user is given
rights of the "admin" role.
Note
The values displayed depend on the rights of the logged-in user.
Description
The page contains the following:
• Group Name
Enter the name of the group. The name must match the group on the RADIUS server.
The name must meet the following conditions:
– It must be unique.
– It must be between 1 and 64 characters long.
– The following are not permitted: § ? " ; :
The table contains the following columns:
• Select
Select the check box in the row to be deleted.
• Group
Shows the name of the group.
• Role
Select a role. Users who are authenticated with the linked group on the RADIUS server receive
the rights of this role locally on the device.
You can choose between system-defined and self-defined roles, refer to the page "Security >
Users > Roles.".
• Description
Enter a description for the link of the group.to a role. The description text can be up to 100
characters long.
Procedure
Linking a group to a role.
1. Enter the name of a group.
2. Click the "Create" button.
3. Select a role.
4. Enter a description for the link of a group.to a role.
5. Click the "Set Values" button.
Deleting the link between a group and a role
1. Select the check box in the row to be deleted.
2. Click the "Delete" button. The entries are deleted and the page is updated.
6.9.2 Passwords
Note
If you are logged in via a RADIUS server, you cannot change any passwords.
On this page, you can change passwords. If you are logged in with the right to change device
parameters, you can change the passwords for all user accounts. If you are logged in as user,
you can only change your own password.
– High
Password length: at least 8 characters, maximum 128 characters
At least 1 uppercase letter
At least 1 special character
At least 1 number
– Low
Password length: at least 6 characters, maximum 128 characters
– Custom
You configure the password policy on the page "Security > Passwords > Options".
• New Password
Enter the new password for the selected user.
– It must not contain the following characters: ; : ' ? ß § " ² ³ ° | € µ ä ö ü Ä Ö Ü
– The characters for Space and Delete also cannot be contained.
• Password Confirmation
Enter the new password again to confirm it.
Procedure
1. From the "User Account" drop-down list, select the user whose password you want to change.
2. Enter the valid password for the currently logged in user in the "Current User Password" input
box.
3. Enter the new password for the selected user in the "New Password" input box.
4. Repeat the new password in the "Password Confirmation" input box.
5. Click the "Set Values" button.
Note
The factory settings for the passwords when the devices ship are as follows:
• admin: admin
When you log in for the first time or following a "Restore Factory Defaults and Restart", with
the preset user "aadmin" you will be prompted to change the password.
Note
Changing the password in Trial mode
Even if you change the password in Trial mode, this change is saved immediately.
6.9.2.1 Options
On this page, you specify which password policy will be used when assigning new passwords.
Description
• Password Policy
Shows which password policy is currently being used.
• New Password Policy
Select the required setting from the drop-down list.
– High
Password length: at least 8 characters, maximum 128 characters
At least 1 number
At least 1 special character
At least 1 uppercase letter
– Low
Password length: at least 6 characters, maximum 128 characters
– User-defined
Configure the desired password requirements under "Password Policy Details".
• Password Policy Details
When you have selected the "High" or "Low" password policy, the relevant password
requirements are displayed.
When you have selected the "User-defined" password policy, you can configure the relevant
password requirements.
– Minimum Password Length
Specifies the minimum length of a password.
– Minimum Number of Numeric Characters
Specifies the minimum number of numeric characters in a password.
– Minimum Number of Special Characters
Specifies the minimum number of special characters in a password.
– Minimum Number of Uppercase Letters
Specifies the minimum number of uppercase characters in a password.
– Minimum Number of Lowercase Letters
Specifies the minimum number of lowercase characters in a password.
6.9.3 AAA
6.9.3.1 General
Description
The page contains the following boxes:
Note
To be able to use the login authentication "RADIUS", "Local and RADIUS" or "RADIUS and fallback
Local", a RADIUS server must be stored and configured for user authentication.
• Login Authentication
Specify how the login is made:
– Local
The authentication must be made locally on the device.
– RADIUS
The authentication must be handled via a RADIUS server.
– Local and RADIUS
The authentication is possible both with the users that exist on the device (user name and
password) and via a RADIUS server.
The user is first searched for in the local database. If the user does not exist there, a RADIUS
request is sent.
– RADIUS and fallback Local
The authentication must be handled via a RADIUS server.
A local authentication is performed only when the RADIUS server cannot be reached in
the network.
6.9.3.2 RADIUS-Client
Description
The page contains the following boxes:
• RADIUS Authorization Mode
For the login authentication, the RADIUS authorization mode specifies how the rights are
assigned to the user with a successful authentication.
– Standard
In this mode the user is logged in with administrator rights if the server returns the value
"Administrative User" to the device for the attribute "Service Type". In all other cases the
user is logged in with read rights.
– Vendor Specific
In this mode the assignment of rights depends on whether and which group the server
returns for the user and whether or not there is an entry for the user in the table "External
User Accounts".
The table has the following columns:
• Select
Select the row you want to delete.
• RADIUS Server Address
Enter the IP address or the FQDN (Fully Qualified Domain Name) of the RADIUS server.
• Server Port
Here, enter the input port on the RADIUS server. As default, input port 1812 is set. The range
of values is 1 to 65535.
• Shared Secret
Enter your access ID here. The range of values is 1...128 characters
• Shared Secret Conf.
Enter your access ID again as confirmation.
• Max. Retrans.
Enter the maximum number of retries for an attempted query.
The initial connection attempt is repeated the number of times specified here before another
configured RADIUS server is queried or the login counts as having failed. As default 3 retries
are set, this means 4 connection attempts. The range of values is 1 to 5.
• Timeout[s]
Specify how long the RADIUS client waits for a response from the RADIUS server before
attempting login again.
• Primary Server
Using the options in the drop-down list, specify whether or not this server is the primary
server. You can select one of the options "yes" or "no".
• Test
With this button, you can test whether or not the specified RADIUS server is available. The test
is performed once and not repeated cyclically.
• Test Result
Shows whether or not the RADIUS server is available:
– Not reachable
The IP address is not reachable.
The IP address is reachable, the RADIUS server is, however, not running.
– Reachable, key not accepted
The IP address is reachable, the RADIUS server does not, however accept the shared secret.
– Reachable, key accepted
The IP address is reachable, the RADIUS server accepts the specified shared secret.
Steps in configuration
Entering a new server
1. Click the "Create" button. A new entry is generated in the table.
The following default values are entered in the table:
– RADIUS Server Address: 0.0.0.0
– Server Port: 1812
– Max. Retrans.: 3
– Primary server: No
2. In the relevant row, enter the following data in the input boxes:
– RADIUS Server Address
– Server Port
– Shared Secret
– Shared Secret Conf
– Max. Retrans.: 3
– Primary server: No
3. If necessary check the reachability of the RADIUS server.
4. Click the "Set Values" button.
Repeat this procedure for every server you want to enter.
Modifying servers
1. In the relevant row, enter the following data in the input boxes:
– RADIUS Server Address
– Server Port
– Shared Secret
– Shared Secret Conf
– Max. Retrans.
– Primary Server
2. If necessary check the reachability of the RADIUS server.
3. Click the "Set Values" button.
Repeat this procedure for every server whose entry you want to modify
Deleting servers
1. Click the check box in the first column before the row you want to delete to select the entry
for deletion.
Repeat this for all entries you want to delete.
2. Click the "Delete" button. The data is deleted from the memory of the device and the page is
updated.
Brute Force Prevention (BFP) refers to the protection of the device from unauthorized access by
trying a sufficiently large number of passwords. The number of incorrect login attempts within a
specific time period is limited for this purpose.
Description
The page contains the following boxes:
• User Specific BFP is Enabled. / User Specific BFP is Disabled.
– Enabled:
With login authentication, the "Local" or "Local and RADIUS" mode is set and the
maximum number of invalid login attempts is greater than 0.
– Disabled:
With login authentication, the "RADIUS" or "RADIUS and fallback Local" mode is set or the
maximum number of invalid login attempts is 0.
You configure the login authentication under "Security > AAA > General > Login
Authentication".
• Acceptable Invalid Login Attempts Per User
The maximum number of invalid login attempts for a user accepted by the device. Further
login attempts for this user are blocked for a specific time.
The users that are not configured as local users for the device are summarized under the user
name "UnknownUser".
0: User Specific BFP is Disabled.
• Blocked [s]
The time in seconds (s) until the blocking will be removed. To display the current value, click
the "Refresh" button.
When a blocked IP address attempts to log in before the timer expires, the timer restarts.
• Delete
Ends blocking for the IP address and resets the displays in the "Last Failed [s]" and "Blocked [s]"
boxes.
6.9.5 WLAN
Safety levels
To make the network secure, authentication and encryption are used. On this page, you specify
the security settings.
Description
The table has the following columns:
• Port
Shows the available ports.
• Frequency Band
Shows the frequency band.
• Authentication Type
Select the type of authentication. The selection depends on the operating mode and the
transmission standard.
– Open System
There is no authentication.
– WPA (RADIUS)
Wi-Fi Protected Access (WPA) is a method specified by the Wi-Fi Alliance to close security
gaps in WEP. Authentication using a server (802.1x) is mandatory. The dynamic exchange
of keys at each data frame introduces further security.
– WPA-PSK
WPA Pre Shared Key (WPA-PSK) is a weakened form of WPA. In this method, authentication
is not carried out by a server but is based on a password. This password is configured
manually on the client and server.
– WPA2 (RADIUS)
WPA2 (Wi-Fi Protected Access 2) is a further development of WPA and implements the
functions of the IEEE 802.11i security standard. However, WPA authentication works with
the RADIUS server.
– WPA2-PSK
WPA2-PSK is based on the 802.11i standard. However, WPA authentication works without
a RADIUS server. Instead of this, a key (pass phrase) is stored on each client and access
point. The pass phrase is used for authentication and further encryption.
– WPA/WPA2-AUTO-PSK
First try to connect with WPA2. If the client is not WPA2-enabled, the connection is made
using WPA.
– WPA/WPA2 AUTO (RADIUS)
First try to connect using WPA2 (RADIUS). If the client is not WPA2-enabled, the
connection is made using WPA (RADIUS).
– WPA3-SAE
Only configurable in WLAN mode "802.11ax"
WPA3 replaces WPA2 and uses the Simultaneous Authentication of Equals (SAE) to
authenticate access points and clients. With SAE, keys are mutually stored and
exchanged, but the pass phrase is not made public, so attackers cannot find the keys
through brute force dictionary attacks. With WPA3, PMF must be negotiated for all WPA3
connections, which offers additional protection against deauthentication and
disassociation attacks.
• Cipher
– AUTO
Either AES or TKIP is automatically selected, depending on the capability of the other
station.
– TKIP (Temporal Key Integrity Protocol)
A symmetrical stream encryption method with the RC4 (Ron’s Code 4) algorithm. In
contrast to the weak WEP encryption, TKIP uses changing keys derived from a main key.
TKIP can also recognize corrupted data frames.
– AES (Advanced Encryption Standard)
Strong symmetrical block encryption method based on the Rijndael algorithm that further
improves the functions of TKIP.
• Key
Enter a key here. This key must be known on both the client and the access point and is
entered by the user at both ends.
– For a key with 8 to 63 characters, you can only use the following readable ASCII
characters: 0x20 - 0x7e.
– For a key with precisely 64 characters, you can use the following ASCII characters: 0 - 9,
a - f and A - F.
• Key Confirmation
Confirm the key entered above.
• PMF (Protected Management Frames)
Can only be used with the following:
– WLAN mode: IEEE 802.11n/ac/ax
– Authentication type: WPA2-PSK, WPA2 (RADIUS) and WPA3-SAE
With this setting, the management frames are cryptographically protected. This prevents, for
example, the WLAN client being separated from the access point due to corrupted
disassociation / deauthenticate frames. You can find more information on this in the IEEE
802.11w standard.
The following settings are possible:
– disabled
The management frames are not encrypted.
– required
The management frames are always encrypted. A connection of the WLAN clients to the
access point is only possible when these also support PMF. With the WPA3-SAE
authentication type, this setting is always selected and cannot be configured.
– optional
The management frames are encrypted or unencrypted depending on support of the
WLAN client.
Procedure
1. Select the required security settings.
2. Click the "Set Values" button.
Safety levels
To make the network secure, authentication and encryption are used. On this page, you specify
the security settings.
Note
This page is only available for clients or access points in client mode.
Description
The table has the following columns:
• Security Context
Shows the security context.
• Authentication Type
Select the type of authentication. The selection depends on the operating mode and the
transmission standard.
– Open System
There is no authentication.
– WPA (RADIUS)
Wi-Fi Protected Access (WPA) is a method specified by the Wi-Fi Alliance to close security
gaps in WEP. Authentication using a server (802.1x) is mandatory. The dynamic exchange
of keys at each data frame introduces further security.
Note
Make the relevant RADIUS settings initially on the page "Security > WLAN > Client RADIUS
Supplicant".
– WPA-PSK
WPA Pre Shared Key (WPA-PSK) is a weakened form of WPA. In this method, authentication
is not carried out by a server but is based on a password. This password is configured
manually on the client and server.
– WPA2 (RADIUS)
WPA2 (Wi-Fi Protected Access 2) is a further development of WPA and implements the
functions of the IEEE 802.11i security standard. However, WPA authentication works with
the RADIUS server.
Note
Make the relevant RADIUS settings initially on the page "Security > WLAN > Client RADIUS
Supplicant".
– WPA2-PSK
WPA2-PSK is based on the 802.11i standard. However, WPA authentication works without
a RADIUS server. Instead of this, a key (pass phrase) is stored on each client and access
point. The pass phrase is used for authentication and further encryption.
– WPA3-SAE
Only configurable in WLAN mode "802.11ax"
WPA3 replaces WPA2 and uses the Simultaneous Authentication of Equals (SAE) to
authenticate access points and clients. With SAE, keys are mutually stored and
exchanged, but the pass phrase is not made public, so attackers cannot find the keys
through brute force dictionary attacks. With WPA3, PMF must be negotiated for all WPA3
connections, which offers additional protection against deauthentication and
disassociation attacks.
• Encryption
Encryption protects the transferred data from eavesdropping and corruption. You can only
disable encryption if you have selected "Open System" for authentication. All other security
methods include both authentication and encryption.
• Cipher
– AUTO
Either AES or TKIP is automatically selected, depending on the capability of the other
station.
– TKIP (Temporal Key Integrity Protocol)
A symmetrical stream encryption method with the RC4 (Ron’s Code 4) algorithm. In
contrast to the weak WEP encryption, TKIP uses changing keys derived from a main key.
TKIP can also recognize corrupted data frames.
– AES (Advanced Encryption Standard)
Strong symmetrical block encryption method based on the Rijndael algorithm that further
improves the functions of TKIP.
Note
To provide better protection of your data against attacks, use WPA2/ WPA2-PSK with AES.
• Key
Enter a key here for authentication with the WPA2-PSK or WPA3-SAE . This key must be known
on both the client and the access point and is entered by the user at both ends.
For a key with 8 to 63 characters, you can only use the following readable ASCII characters:
0x20 - 0x7e.
For a key with precisely 64 characters, you can use the following ASCII characters: 0 - 9, a -
f and A - F.
Note
New key when the authentication type is changed
When the authentication type is changed, the previous key is deleted.
• Key Confirmation
Confirm the key entered above.
• PMF (Protected Management Frames)
Can only be used with the following:
– WLAN mode: IEEE 802.11n/ac/ax
– Authentication type: WPA2-PSK, WPA2 (RADIUS) and WPA3-SAE
With this setting, the management frames are cryptographically protected. This prevents, for
example, the WLAN client being separated from the access point due to corrupted
disassociation / deauthenticate frames. You can find more information on this in the IEEE
802.11w standard.
The following settings are possible:
– disabled
The management frames are not encrypted.
– required
The management frames are always encrypted. A connection of the WLAN clients to the
access point is only possible when these also support PMF. With the WPA3 authentication
type, this setting is preset and cannot be configured.
– optional
The management frames are encrypted or unencrypted depending on support of the
access point.
Procedure
1. Select the required security settings. The settings that are possible depend on the set
"Authentication Type".
2. Click the "Set Values" button.
Note
This WBM page is only available in access point mode.
Description
The page contains the following boxes:
• Reauthentication Mode
Specify who sets the time after which the clients are forced to reauthenticate.
– - (disabled)
The reauthentication mode is disabled.
– Server
Enables time management on the server.
– Local
Enables local time management. Set the validity period for "Reauthentication Interval".
• Reauthentication Interval [s]
If time management is local, enter the period of validity of the authentication in seconds. The
minimum time is 1 minute (enter 60), the maximum time is 12 hours (enter 43200). The
default is one hour (3,600 seconds).
The table has the following columns:
• Server IP Address
Enter the IP address or the FQDN (Fully Qualified Domain Name) of the RADIUS server.
• Server Port
Here, enter the input port on the RADIUS server.
• Shared Secret
Enter the password of the RADIUS server.
For the password, ASCII code 0x20 to 0x7e is used.
• Shared Secret Conf
Confirm the password.
• Max. Retransmissions
Enter the maximum number of connection attempts.
• Primary Server
Specify whether or not this server is the primary server.
– Yes: Primary server
– No: Backup server
• Status
With this check box, you can enable or disable the RADIUS server.
Procedure
Entering a new server
To display a new server, follow the steps below:
1. In the relevant row, enter the following data in the input boxes:
– IP address or FQDN of the RADIUS server
– Port number of the input port
– Password
– Confirmation of the password
– Maximum number of transmission retries
– Primary server
2. Click the "Set Values" button.
Modifying servers
1. In the relevant row, enter the following data in the input boxes:
– IP address or FQDN of the RADIUS server
– Port number of the input port
– Password
– Confirmation of the password
– Maximum number of transmission retries
– Primary server
2. Select the "Status" check box to enable the RADIUS server.
3. Click the "Set Values" button.
Repeat this procedure for every server whose entry you want to modify.
Client Supplicant
On this WBM page, you configure the settings for the RADIUS authorization of the client.
Note
This page is only available for clients or access points in client mode.
Description
• Minimum TLS Version
Specify the minimum TLS version to be used for WLAN RADIUS authentication.
Note
RADIUS Server
This is only possible when the RADIUS Server supports the TLS version.
Note
Dot1X user name and Dot1X user password
With WPA (RADIUS), WPA2 (RADIUS), EAP-TLS, EAP-TTLS and PEAP the Dot1X user name and the
Dot1X user password must be configured.
With the setting "Auto" either the certificate must be loaded or the Dot1X user name and the
Dot1X user passport must be configured.
Procedure
1. Enter the necessary values in the input boxes.
2. Select the required entry in the "Dot1x EAP Types" drop-down list.
3. Click the "Set Values" button.
6.9.5.5 802.11r
On this WBM page, you configure the setting for Fast BSS Transition.
Note
This WBM page is only available in access point mode.
You can find additional information under "Description > IEEE 802.11r".
Requirement
• The access points are members of the same mobility domain.
• Only possible with WPA2 (WPA2-PSK and WPA2 RADIUS) and WPA3 encryption.
Description
The table has the following columns:
• Radio
Shows the available WLAN interfaces.
• Port
Shows the VAP interface.
• Fast BSS Transition
When enabled, the "Fast BSS Transition" function is supported. Can only be enabled when the
mobility domain is entered.
Note
Restriction of the Fast BSS Transition function in V2.0
The access point and the client only support "Fast Transition over the Air".
• Mobility Domain ID
Enter the ID of the mobility domain. The access points with the same ID are members of one
mobility domain. Based on the ID, the WLAN client recognizes whether the access point is a
member of the same mobility domain and can therefore log on without delay.
6.10.1 iPCF-2
On this page, you can enable iPCF-2.
iPCF-2 is recommended for use in environments that use automation protocols. With iPCF-2,
cyclic data exchange between the access point and its logged-on clients is defined and
maintained, provided that a dedicated free channel with sufficient reception strength is
available for iPCF-2. In addition, depending on the application, no DFS channel should be
used.
Note
This page is only available in connection with the inserted CLP iFeatures. For more detailed
information, refer to the section "Configuration License PLUG (CLP) (Page 28)".
Note
Use of iPCF-2 with other iFeatures
iPCF-2 and other iFeatures, e.g. iPRP, are not mutually compatible and cannot be used at the
same time with one device.
Note
Mutual interlocking of iFeatures in dual mode of an access point
In active dual mode, iPCF-2 cannot be enabled simultaneously on one WLAN interface if iPRP has
already been enabled on the other.
'LVSOD\LQaccess PRGH
'LVSOD\LQFOLHQWPRGH
Description
The table has the following columns:
• Radio
Shows the WLAN interface to which the settings relate.
• Enable iPCF-2
Enable or disable iPCF-2 mode.
A message about changes in the 802.11r settings is displayed.
Procedure
1. Select the "Enable iPCF-2" option for the required WLAN interface.
2. Click the "Update" button.
Result
iPCF-2 mode is enabled. Enabling this results in the following changes on the WLAN interface:
• VAPx.1 is enabled on the page "Interface > WLAN > AP". All other VAPs are disabled on the
respective interface.
• If the authentication type on VAP x.1 is "WPA2-PSK", the settings on the page "Security >
WLAN > 802.11r" are configured as follows:
– The Mobility Domain ID is automatically generated on VAPx.1 based on the last two SSID
characters. The value is applied for VAPx.1.
– Fast BSS Transition is enabled on VAP x.1.
6.10.2 iPRP
On this page, you can enable iPRP.
Note
This page is only available in connection with the inserted CLP iFeatures. For more detailed
information, refer to the section "Configuration License PLUG (CLP) (Page 28)".
Note
Use of iPRP with other iFeatures
iPRP and other iFeatures, e.g. iPCF-2, are not compatible with each other and cannot be used at
the same time on a device.
Note
Mutual interlocking of iFeatures in dual mode of an access point
In active dual mode, iPRP cannot be enabled simultaneously on one WLAN interface if iPCF-2 has
already been enabled on the other.
Note
iPRP with oversize frames (jumbo frames)
To be able to use oversize frames, oversize frames (jumbo frames) must be configured on all
devices in the network.
Agent VLAN (management VLAN) with iPRP
The iPRP VLAN can be used as the agent VLAN. This depends where the device is located.
• If the device is located in the PRP network A or PRP network B, use the VLAN that PRP A or PRP
B is assigned to as the agent VLAN.
• If the access points are located in both PRP networks, you can use one of the two VLANs as
the agent VLAN. As an alternative you can also use other VLANs as agent VLANs. The division
into PRP networks A and B must remain. A single management VLAN for all devices in
network A and B is not possible without further measures.
With the "industrial Parallel Redundancy Protocol" (iPRP), the PRP technology can be used
in wireless networks. With IPRP the PRP frames are transferred parallel via two wireless
links. The parallel transfer allows disruptions of the transfer on one wireless link to be
compensated on the other.
With transfer paths that are not the same, iPRP reduces the number of duplicated and
out-of-order packets. The application/protocol used must be able to handle the remaining
duplicates and out-of-order packets.
'LVSOD\LQDFFHVVSRLQWPRGH
'LVSOD\LQFOLHQWPRGH
Description
The page contains the following:
• Ethernet interface (only with SCALANCE WxM763)
Select the required Ethernet interface P1 ... P4 on which you want to enable iPRP.
• PRP A
Select the VLAN assignment for PRP A.
• PRP B
Select the VLAN assignment for PRP B.
Procedure
1. For "PRP A", select the VLAN assignment for PRP A.
2. For "PRP B", select the VLAN assignment for PRP B.
3. Specify the PRP network in which the port is a member.
4. Select the "Enable iPRP" setting. Click the "Set Values" button.
The appropriate VLAN settings are made automatically.
Requirement
• The device has an IP address.
• The user is logged in with administrator rights.
Result
The firmware has been transferred completely to the device.
On the "Information > Versions" there are the entries "Firmware" and "Firmware Running".
Firmware Runningshows the version of the current firmware. "Firmware" shows the firmware
version stored after loading the firmware. To activate this firmware, restart the device with
"System > Restart".
Note
Using configurations with DHCP
If you want to use the ConfigPack with embedded firmware to commission multiple devices with
the same configuration and firmware, create a ConfigPack only from device configurations that
use DHCP. Otherwise, disruptions will occur in network operation due to multiple identical IP
addresses.
You assign fixed IP addresses extra following the basic installation.
1. Start the remote configuration using Telnet (CLI) and log on with a user with the "admin" role.
2. Change to the global configuration mode with the command "configure terminal".
3. You change to the loadsave configuration mode with the "loadsave" command.
4. Enter the "firmware-in-configpack" command without parameters.
The firmware currently on this device is now included as a separate file in the ConfigPack
when you save it.
Note
Embedding firmware in ConfigPack.
When the device is restarted this functionality is lost again and must be reactivated.
If you save a ConfigPack in the WBM or CLI, the firmware is embedded. The file can be
supplied with a password before download. To load the file into the device successfully, use
the specified password.
Refer to the information in the section Load & Save (Page 128).
Note
Installing ConfigPack with DHCP options 66, 67
You can also install the ConfigPack using DHCP with options 66 and 67 activated.
You activate the options in the menu "System > DHCP > DHCP Client".
Password-protected ConfigPack and DHCP options 66.67
If the file is password-protected, you cannot install the file via DHCP with options 66 and 67.
If you install a ConfigPack using WBM or CLI, firmware stored there is also installed.
NOTICE
Do not remove or insert a PLUG during operation
A PLUG may only be removed or inserted when the device is turned off.
Note
Support of PRESET-PLUG functionality
SCALANCE W700ax supports PRESET-PLUG functionality as of firmware version V1.0. SCALANCE
W1700ac supports PRESET-PLUG functionality as of firmware version V1.1.
With the PRESET-PLUG, you can install the same device configuration (start configuration,
user accounts, certificates) including the corresponding firmware on multiple devices.
The PRESET PLUG is write-protected.
You configure the PRESET PLUG using the Command Line Interface (CLI).
Creating a PRESET-PLUG
You create the PRESET PLUG using the Command Line Interface (CLI). You can create a PRESET-
PLUG from any PLUG. To do this, follow the steps outlined below:
Note
Using configurations with DHCP
Create a PRESET-PLUG only from device configurations that use DHCP. Otherwise disruptions will
occur in network operation due to multiple identical IP addresses.
You assign fixed IP addresses extra following the basic installation.
Requirement
• A CLP on which you want to configure the PRESET-PLUG functionality is inserted in the device.
Procedure
1. Start the remote configuration using SSH (CLI) and log in as a user with the "admin" role.
2. Switch to the global configuration mode with the command "configure terminal".
3. You change to the PLUG configuration mode with the "plug" command.
4. Create the PRESET-PLUG with the "presetplug" command.
The firmware version of the device and the current device configuration incl. user accounts
and certificates are stored on the PLUG and the PLUG is then write protected.
5. Turn off the power to the device.
6. Remove the PRESET-PLUG.
7. Start the device either with a new CLP inserted or with the internal configuration.
3. Insert the PRESET-PLUG correctly oriented into the slot. The PRESET-PLUG is correctly inserted
when it is completely inside the device and does not jut out of the slot.
4. Turn on the power to the device again.
If there is a different firmware version on the device to be installed compared with that on the
PRESET-PLUG, an upgrade/downgrade of the firmware is performed. You can recognize this
by the red F-LED flashing (flashing interval: 2 sec on/0.2 sec off). Afterwards the device is
restarted and the device configuration incl. users and certificates on the PRESET-PLUG is
transferred to the device.
5. Wait until the device has fully started up.
(the red F-LED is off)
6. Turn off the power to the device after the installation.
7. Remove the PRESET-PLUG.
8. Start the device either with a new CLP inserted or with the internal configuration.
Note
Restore factory defaults and restart with a PRESET PLUG inserted
If you reset the device to the factory defaults, when the device restarts an inserted PRESET PLUG
is formatted and the PRESET PLUG functionality is lost. You then need to create a new PRESET
PLUG. The keys stored on the KEY-PLUG for releasing functions are retained.
We recommend that you remove the PRESET PLUG before you reset the device to the factory
settings.
NOTICE
Previous settings
If you reset, all the settings you have made will be overwritten by factory defaults.
NOTICE
Inadvertent reset
An inadvertent reset can cause disturbances and failures in a configured network with further
consequences.
Cause
If there is a power failure during the firmware update, it is possible that the device is no longer
accessible using Web Based Management or the CLI.
When pressing the button, be sure to read the information in the "Reset button" section of
the operating instructions.
Solution
You can then also assign firmware to a SCALANCE W using TFTP.
Follow the steps below to load new firmware using TFTP:
1. Turn off the power to the device.
2. Now press the Reset button and reconnect the power to the device while holding down the
button.
3. Hold down the button until the red fault LED (F) starts to flash after approximately 2 seconds.
4. Now release the button. The bootloader waits in this state for a new firmware file that you can
download by TFTP.
5. Connect a PC to the SCALANCE W over the Ethernet interface.
6. Assign an IP address to the SCALANCE W with the SINEC PNI.
7. Open a DOS box and change to the directory where the file with the new firmware is located
and then execute the command "tftp -i <ip address> PUT <firmware>". As an alternative, you
can use a different TFTP client.
8. Close the cover to ensure that the device is closed and water and dust proof.
Note
Use of CLI and TFTP in Windows 10
If you want to access the CLI or TFTP in Windows 10, make sure that the relevant functions are
enabled in Windows 10.
Result
The firmware is transferred to the device.
Note
Please note that the transfer of the firmware can take several minutes. During the transmission,
the red error LED (F) flashes.
Once the firmware has been transferred completely to the device, the device is restarted
automatically.
Solution
If communication is disrupted by an excessive signal strength (greater than -35 dBm), you can
eliminate the problem in the following ways:
• Increase the distance between the transmitter and receiver.
• Reduce the transmit power of the IWLAN partner with suitable settings in WBM or CLI.
NOTICE
Changing the default password after configuring with STEP 7
If a device in the default status is configured only with STEP 7, it is not possible to change the
default password. This change must be made directly on the device using WBM or CLI.
Otherwise the default password is retained and any user could log in using the default
password.
1)
Part of the AUTOMATION.MIB
You can download the AUTOMATION.MIB for SCALANCE W from Siemens Industry Auto‐
mation and Drives Service & Support under the entry ID 67637278 (https://
support.industry.siemens.com/cs/ww/en/view/67637278)
2)
Part of the private MIB file "Scalance_w_msps.mib". You can download the file in the WBM
with the "Save" button under "System > Load & Save > HTTP > MIB".
OID
The private MIB variables of the SCALANCE W have the following object identifier:
iso(1).org(3).dod(6).internet(1).private(4). enterprises(1)
siemens(4329) industrialComProducts(20) iComPlatforms(1)
simaticNet(1) snMsps(1) snMspsCommon(1)
Alarm Description
Warm start performed, Ver: V02.00.00 - event/ Type of startup and the loaded firmware version.
status summary after startup.
Power supply: Status of the power supplies line 1 and line 2
• L1 is connected
• L2 is not connected
• PoE is connected
• PoE is not connected
No line is monitored. Information about monitoring the power supply from the signaling system
Spanning Tree disabled. Information on the status of the Spanning Tree protocol
Spanning Tree enabled.
No Fault states pending after startup. Fault state following system start
Scheduled restart cancelled. The scheduled restart was aborted.
Scheduled restart in xx seconds. The device restarts in xx seconds.
Alarm Description
Power up on line 1 / 2 / PoE. Power supply available on line 1, line 2 or PoE.
Power down on line 1 / 2 / PoE. Power supply interrupted on line 1, line 2 or PoE.
Alarm Description
Link up on P1. There is a connection on the Ethernet interface.
Link down on P1. There is no connection on the Ethernet interface.
Link up on P1: <Speed> The speed that is currently present is >= 100 Mbps and full duplex (FD)
New Fault state: "Result of autonegotiation on P1: The speed is < 100 Mbps or half duplex (HD)
<Speed>
Result of autonegotiation on P1: <Speed>
Link up on P1: <Speed>
Messages
Link down up VAP X.Y. The VAP interface Y on the WLAN interface X is enabled.
Link down on VAP X.Y. The VAP interface Y on the WLAN interface X is disabled.
Overlap-AP found on WLAN X: AP <System Name> A further access point was detected on the channel set for the WLAN
<MAC> found on channel <channel number> interface X or on a neighboring channel.
<RSSI value>
Overlap-AP aged out on WLAN X: AP <System The overlapping access point could not be detected during the configured
Name> <MAC> on channel <channel number> aging time and was removed from the "Overlap AP" list.
<RSSI value>
DFS: Radar interference detected on WLANX at If the access point discovers a radar signal on the current channel, it noti‐
<Channel frequency> MHz fies the clients of the channel change. It then automatically switches to an
DFS: start DFS scan on WLANX at new channel alternative DFS channel and the current channel is blocked for 30 minutes.
<Channel frequency> MHz
DFS: finished DFS scan on WLANX at <Channel fre‐
quency> MHz
DFS: <Channel frequency> MHz aged out from No radar signal detected on the channel any longer. The channel was
NOL at WLANX and can be used again removed from the list of blocked channels and can be used again.
DFS: Radar interference detected on WLANX at There is no free channel available, the WLAN interface X will be deactiva‐
<Channel frequency> MHz ted until one of the channels becomes available.
DFS: No Channels are available al WLAN X.
Messages Description
Link up on WLAN X. The WLAN interface X is enabled.
Link down on WLAN X. The WLAN interface X is disabled.
Messages on configuration
Messages Description
WBM/SSH/Telnet: User {user name} failed to log in An incorrect password was entered during login. The event can be enabled
from {ip address}. or disabled in "System -> Events" (Authentication Failure).
Restart requested. Restart due to a user request. The event can be enabled or disabled in
"System -> Events" (Cold/Warm Start).
Device configuration changed. The configuration was changed.
WBM/SSH/Telnet: User {user name} is locked for The user / IP address was locked for the duration (in minutes) after the
%d minutes after %d unsuccessful login attempts. failed login.
WBM/SSH/Telnet: The session of user {user name} The session was ended.
was closed after %d seconds of inactivity.
Message Description
Update DNS: empty nameservers list. No DNS server has been created.
Messages Description
Messages about sleep mode:
Device changed to Sleep Mode for %d minutes. Sleep mode was triggered on the device for the duration (in minutes).
DI/DO messages:
TCP Event {ip address} Result: 1 aborted - wrong The format of the TCP packet does not match.
TCP packet format
TCP Event {ip address} Result: 1 aborted - wrong Wrong user name or password specified
username or password
TCP Event {ip address} Result: 1 aborted - internal Save failed due to an internal error
storage failed
TCP Event {ip address} Result: 1 aborted - incorrect Invalid action
action
TCP Event {ip address} Result: 1 aborted - wrong Invalid command
command code
TCP Event {ip address} Result: 1 aborted - incorrect Invalid action for digital output
Digital Out action
TCP Event {ip address} Result: 1 aborted - invalid Invalid sleep mode duration
Sleep Mode duration
TCP Event {ip address} Result: 1 aborted - invalid Invalid action for sleep mode
Sleep Mode action
TCP Event {ip address} Result: 1 incoming - Digital The digital output has been activated.
Out activated
TCP Event {ip address} Result: 1 incoming - Digital The digital output has been deactivated.
Out deactivated
TCP Event {ip address} Result: 1 incoming - Sleep The sleep mode has been activated.
Mode activated
TCP Event {ip address} Result: 1 aborted The action failed.
Messages Description
File upload via HTTP(S): load of FileType <File Loading the file via HTTP(S) was successful. A restart is required.
type> OK
→ restart required
File upload via HTTP(S): load of FileType<File Loading the file via HTTP(S) was successful.
type> OK
File upload via HTTP(S): validation of FileType <File Loading the file via HTTP(S) was successful. The file is identical to the
type> IDENTICAL existing file.
File upload via HTTP(S): validation of FileType <File Loading the file via HTTP(S) failed. The file contains errors or is invalid.
type> FAILED
File upload via TFTP: load of FileType <File type> Loading the file using TFTP was successful. A restart is required.
OK
→ restart required
File upload via TFTP: load of FileType <File type> Loading the file using TFTP was successful.
OK
Messages Description
File upload via TFTP: validation of FileType <File Loading the file using TFTP was successful. The file is identical to the ex‐
type> IDENTICAL isting file.
File upload via TFTP: validation of FileType <File Loading the file using TFTP failed. The file contains errors or is invalid.
type> FAILED
File upload via TFTP: file transfer of FileType <File Loading the file using TFTP failed. The file name is incorrect or the file does
type> FAILED not exist on the server.
File upload via TFTP: file transfer of FileType <File Loading the file using TFTP failed. The TFTP server cannot be reached or
type> failed. Cannot connect to given IP address the settings are incorrect.
File download via TFTP: file transfer of FileType Saving the file using TFTP failed. The TFTP server cannot be reached or the
<File type> failed. Cannot connect to given IP ad‐ settings are incorrect.
dress
Messages Description
New Fault state: <Fault description> Incoming fault
<Fault description>: "Warm start performed." Not all events automatically lead to a fault. On the "Events" WBM page, you
"Cold start performed." "Link down on P1." "Link up specify which events will be logged, for example device restart, changed
on P1." "Power down on line L1 (L2)" "DFS: No link on the Ethernet port.
channels are available at WLAN2".
Fault state gone: <Fault description> Outgoing fault
<Fault description>: "Warm start performed."
"Cold start performed." "Link down on P1." "Link up
on P1." "Power down on line L1 (L2)" "DFS: No
channels are available at WLAN2" "PLUG not ac‐
cepted. See System PLUG mask for details."
New Fault state (reconfiguration): <Fault descrip‐ Incoming fault
tion> The event was triggered due to a change in the configuration.
<Fault description>: "Link down on P1." "Link up on
P1." "Power down on line L1 (L2)".
Fault state gone (reconfiguration): <Fault descrip‐ Outgoing fault
tion> The event was triggered due to a change in the configuration.
<Fault description>: "Link down on P1." "Link up on
P1." "Power down on line L1 (L2)".
Fault state: <Fault description> cleared. Fault was acknowledged by the user.
<Fault description>: "Warm start performed" "Cold
start performed".
Messages Description
Backup Restore: Loaded file type <File type> (re‐ The file was successfully loaded after restoring the configuration backup to
start required). the device. A restart is required.
Possible file types:
• Config
• ConfigPack
• WBMFav
• Users
Backup Restore: Loaded file type <File type> which The file was successfully loaded after restoring the configuration backup to
is identical. the device. The file is identical to the existing file.
Messages Description
Spanning Tree: topology change detected. The topology of the network has changed; the network will be reorgan‐
ized.
Spanning Tree: new root bridge xx:xx:xx:xx:xx:xx The topology of the network has changed; there is a new root bridge with
detected. MAC address xx:xx:xx:xx:xx:xx. in the network.
Messages Description
RADIUS: Access accepted / rejected for client The authentication of the client was successful or not successful.
<MAC>.
Messages Description
Syslog-Server not reachable! The configured Syslog server is not accessible.
Unable to send messages to syslog server. Please The syslog server configuration is incomplete.
check syslog socket configuration.
Unable to send e-mail(s) because of IP connection Sending of e-mail(s) failed. SMTP server cannot be reached (e.g. network
failure. connection interrupted).
Unable to send e-mail(s) because of SMTP authen‐ Sending of e-mail(s) failed. Authentication of the client on the SMTP serv‐
tication failure. er incorrect.
Unable to send e-mail(s) because SMTP message Sending of e-mail(s) failed. SMTP server accessible, configuration incom‐
transfer failed. plete or faulty (e.g. receiver e-mail address wrong / not available).
SNMP: Authentification failure. Authentication of an SNMP client failed; access not possible (e.g.
SNMPv1/v2 read-only configured or Read Community String incorrectly
configured).
Messages Description
IP communication is possible. Remote logging ac‐ IP communication is possible. Remote logging is activated.
tivated.
IP communication is not possible. Remote logging IP communication is not possible. Remote logging is deactivated. Check
deactivated. Please check IP configuration and net‐ whether or not the device has an IP address.
work connectivity.
Alarm Description
Startup configuration: Internal storage There is no PLUG inserted.
PLUG: Not present
Startup configuration: Internal storage There is no PLUG inserted. Functions are configured on the device for
PLUG: Missing which a PLUG License (CLP) is required.
PLUG: License missing
Startup configuration: Internal storage Invalid or incompatible configuration on the inserted PLUG.
PLUG: Configuration not accepted Functions are configured on the device for which a PLUG License (CLP) is
PLUG: License missing required.
Startup configuration: Internal storage The PLUG license (CLP) is wrong.
PLUG: Configuration accepted
PLUG: License wrong
Startup configuration: Internal storage Invalid or incompatible configuration on the inserted PLUG.
PLUG: Configuration not accepted
PLUG: License accepted
Startup configuration: Internal storage The internal configuration was written successfully to an empty PLUG Li‐
PLUG: Factory clean → filled with internal configu‐ cense (CLP).
ration
PLUG: Configuration accepted
PLUG: License accepted
Startup configuration: Internal storage The internal configuration was written successfully to an empty PLUG
PLUG: Factory clean → filled with internal configu‐ Configuration (CLP).
ration
PLUG: Configuration accepted
Startup configuration: PLUG storage The configuration was loaded successfully from the PLUG License (CLP).
PLUG: Configuration accepted
PLUG: License accepted
Startup configuration: PLUG storage The configuration was loaded successfully from the PLUG Configuration
PLUG: Configuration accepted (CLP).
Messages Description
Factory default PLUG found. There is an empty or formatted PLUG in the device.
PLUG: Filled PLUG was found. The PLUG in the device has been emptied. The current device configura‐
PLUG: Configuration Accepted tion was written to the PLUG.
PLUG: Removed at runtime. The PLUG License (CLP) or the PLUG Configuration (CLP) was removed
during operation.
Messages Description
PLUG accepted. PLUG was accepted.
PLUG: Different device type found. Different device type
Alarm Description
Client <MAC address> <system name> associated success‐ The client has logged in successfully on the access point.
fully
Client <MAC address> <system name> disassociated with The client was logged off from the access point.
reason <reason description>
VAP<Num>: Client <MAC> failed to associated; status The connection of the client to the VAP has failed. The reason is
(<text>) displayed as text.
VAP<Num>: Client <MAC> disassociated with reason The client was successfully disconnected from the VAP. The rea‐
(<text>) son is displayed as text.
VAP<Num>: Client <MAC> deauthenticated with reason The client was logged off from the AP. The reason is displayed as
(<text>) text.
VAP<number> Client <MAC> failed to authenticate; status The authentication of the client failed. The reason is displayed as
(<text>) text.
VAP<Num>: Client <MAC> failed to disassociated; status The connection of the client could not be terminated. The reason
(<text>) is displayed as text.
VAP<Num>: Client <MAC> associated successfully The client has connected successfully to the VAP or the client has
logged on successfully to the VAP.
VAP<Num>: Client <MAC> associated successfully using FT The client has connected successfully to the VAP or the client has
Over-the-air logged on successfully to the VAP.
Fast BSS Transition "Over-the-air" was used for the connection
transition.
RADIUS: Access rejected for client <MAC> The RADIUS server denies the client access.
RADIUS: Access accepted for client <MAC> The RADIUS server allows the client access.
Alarm Description
Associated successfully to AP <MAC address> <system The client has logged in successfully on the access point.
name> at channel <channel number> (frequency <frequen‐ If the client is not connected to any access point and then logs on
cy> MHz) to an access point for the first time, a WLAN Authentication Log
is output. Example:
Associated successfully to AP d4:f5:27:b2:46:60 at channel 40
(frequency 5200 MHz).
Associated successfully to AP <MAC address> <system The client has logged in successfully on the access point. The
name> at channel <channel number> (frequency <frequen‐ roaming time is specified on switching of access points.
cy> MHz) roaming time <time> ms
Alarm Description
Associated successfully to AP <MAC address> <system The client has logged in successfully on the access point.
name> using FT Over-the-air at channel <channel number> Fast BSS Transition "Over-the-air" was used for the connection
(frequency <frequency> MHz) roaming time <time> ms transition. The roaming time is specified.
Disassociated from AP <MAC address> <system name> with The client was logged off from the access point.
reason (Disassociated because sending STA is leaving (or
has left) BSS)
Failed to authenticate to AP <MAC>; status (<text>) The authentication of the client with the access point failed. The
reason is displayed as text.
Failed to disassociate from AP <MAC>; status (<text>) The connection of the client to the access point could not be
terminated. The reason is displayed as text.
Failed to associate to AP <MAC>; status (<text>) The connection of the client to the access point has failed. The
reason is displayed as text.
Expansion of messages on the roaming operation in the access point and client mode
Expansion Description
roaming time <time> ms Additional information in the messages "Associated successfully"
and "Reassociated successfully":
Specifies the WLAN roaming time that is measured from the log‐
ical start of the login procedure in the client until receipt of the
first positive response for connection.
roaming time including authorization <time> ms Additional information in the messages "Authorized successful‐
ly":
Specifies the WLAN roaming time that is measured from the log‐
ical start of the login procedure in the client until the end of key
exchange.
Note
Additional information about the meaning of the boxes is available in RFC 5424 (https://
datatracker.ietf.org/doc/html/rfc5424).
Log text {protocol}: User {user name} logged in from {ip address}.
Standard IEC 62443-3-3 Reference: SR1.1
Description Valid login information that is specified during remote login.
Example WBM: User admin logged in from 192.168.0.1.
Severity Info
Facility local0
Log text {protocol}: Default user {user name} logged in from {ip address}.
Standard IEC 62443-3-3 Reference: n/a (NERC-CIP 007-R5)
Description User logged in with default user name and password.
Example SSH: Default user admin logged in from 192.168.0.1.
Severity Info
Facility local0
Log text {protocol}: User {user name} logged out from {ip address}.
Standard IEC 62443-3-3 Reference: SR1.1
Description User session completed - logged out.
Example SSH: User admin logged out from 192.168.0.1.
Severity Info
Facility local0
Log text {protocol}: User {user name} failed to log in from {ip address}.
Standard IEC 62443-3-3 Reference: SR1.1
Description Incorrect user name or incorrect password (login information) specified during
remote login.
Example SSH: User testuser failed to log in from 192.168.0.1.
Severity Warning
Facility local0
Log text {protocol}: User {user name} changed password of user {action user name}.
Standard IEC 62443-3-3 Reference: SR1.3
Description User has changed other password.
Example WBM: User admin changed password of user test.
Severity Info
Facility local0
Log text {protocol}: User {user name} created user-account {action user name}.
Standard IEC 62443-3-3 Reference: SR1.3
Description The administrator created a new account.
Example WBM: User admin created user-account joachim.
Severity Info
Facility local0
Log text {protocol}: User {user name} deleted user-account {action user name}.
Standard IEC 62443-3-3 Reference: SR1.3
Description The administrator deleted an existing account.
Example WBM: User admin deleted user-account joachim.
Severity Info
Facility local0
Log text {protocol}: User {user name} created group {group} and assigned to role {role}.
Standard IEC 62443-3-3 Reference: SR1.4
Description The administrator has created a group and assigned it to a role.
Example WBM: User admin created group it-service and assigned to role service.
Severity Info
Facility local0
Log text User {user name} deleted group {group} and the role {role} assignment.
Standard IEC 62443-3-3 Reference: SR1.4
Description The administrator has deleted an existing group and the role assignment.
Example WBM: User admin deleted group it-service and the role service assignment.
Severity Info
Facility local0
Log text User {user name} account is locked for {time} minutes after {failed login count}
unsuccessful login attempts.
Standard IEC 62443-3-3 Reference: SR1.11
Description If there are too many failed logins, the corresponding user account was locked for a
specific period of time.
Example User admin account is locked for 10 minutes after 30 unsuccessful login attempts.
Severity Warning
Facility local0
Log text Overlap-AP found on {wlan interface}: AP {ssid} {ap mac} found on channel {chan-
nel} rssi {signal strength}.
Standard IEC 62443-3-3 Reference: SR 2.2
Description Radio frequency is already in use.
Example Overlap-AP found on WLAN 1: AP scalance 20:a8:b9:80:44:80 found on channel 11
rssi 12.
Severity Info
Facility local0
Log text {vap}: Client {client mac} disassociated with reason {reason}.
Standard IEC 62443-3-3 Reference: SR 2.2
Description WLAN client disconnected from AP.
Log text {vap}: Client {client mac} failed to associate, status {status}.
Standard IEC 62443-3-3 Reference: SR 2.2
Description WLAN client connection to AP denied.
Example VAP1.1: Client 18:65:90:ab:78:f4 failed to associate, status (Invalid group cipher).
Severity Warning
Facility local0
Log text {vap}: Client {client mac} failed to authenticate, status {status}.
Standard IEC 62443-3-3 Reference: SR 2.2
Description The WLAN client was not able to authenticate itself.
Example VAP1.1: Client 18:65:90:ab:78:f4 failed to authenticate, status (Invalid group ci‐
pher).
Severity Warning
Facility local0
Log text RADIUS: {ip address} - No response from the RADIUS server.
Standard IEC 62443-3-3 Reference: SR 2.2
Description RADIUS server not found.
Example RADIUS: 192.168.0.10 - No response from the RADIUS server.
Severity Warning
Facility local0
Session lock
Log text The session of user {user name} was closed after {time} seconds of inactivity.
Standard IEC 62443-3-3 Reference: SR2.5
Description The current session was locked due to inactivity.
Example The session of user admin was closed after 60 seconds of inactivity.
Severity Warning
Facility local0
Log text {protocol}: The maximum number of {max sessions} concurrent login session ex‐
ceeded.
Standard IEC 62443-3-3 Reference: SR2.7
Description The maximum number of parallel connections is exceeded.
Log text {protocol}: User {user name} saved file type ConfigPack
Standard IEC 62443-3-3 Reference: SR7.3
Description Backup completed
Example WBM: User admin saved file type ConfigPack..
Severity Info
Facility local0
Log text {protocol}: User {user name} failed to save file type ConfigPack.
Standard IEC 62443-3-3 Reference: SR7.3
Description Backup failed
Example WBM: User admin failed to save file type ConfigPack.
Severity Warning
Facility local0
Severity Warning
Facility local0
Log text {protocol}: Loaded file type Firmware {version} (restart required).
Standard IEC 62443-3-3 Reference: SR7.4
Description Firmware update was successfully uploaded.
Example TFTP: Loaded file type Firmware V02.00.00 (restart required).
Severity Info
Facility local0
Log text {protocol}: User {user name} loaded file type Firmware {version} (restart required).
Standard IEC 62443-3-3 Reference: SR7.4
Description Firmware update was successfully uploaded.
Example WBM: User admin loaded file type Firmware V02.00.00 (restart required).
Severity Info
Facility local0
Log text {protocol}: User {user name} loaded file type Config (restart required).
Standard IEC 62443-3-3 Reference: SR7.4
Description The configuration is applied.
Example WBM: User admin loaded file type Config (restart required).
Severity Info
Facility local0
Log text {protocol}: User {user name} loaded file type ConfigPack (restart required).
Standard IEC 62443-3-3 Reference: SR7.4
Description The configuration is applied.
Example WBM: User admin loaded file type ConfigPack (restart required).
Severity Info
Facility local0
Encryption method
None ✓
WPA-TKIP ✓
WPA-AES ✓
Authentication
Password / PSK ✓
Password / SAE ✓
IEEE 802.1X EAP PEAP ✓
IEEE 802.1X EAP TLS ✓
IEEE 802.1X EAP TTLS ✓
IEEE 802.1X EAP others -
EAP protocol: MS-CHAPv2 ✓
EAP protocol: TLS ✓
EAP protocol: GTC ✓
F.2 SSL
RADIUS Client
SSH Server
SFTP Client
Passwords
Observe the following rules when creating or changing the passwords:
Note
Passwords
To improve security, make sure that passwords are as long as possible.
Passwords must be at least 8 characters long and contain special characters, upper and
lowercase characters as well as numbers.
User names
Observe the following rules when creating or changing the user names:
Note
User names
To improve security, make sure that user names are as long as possible.
Role names
Observe the following rules when creating or changing the role names:
Group names
Observe the following rules when creating or changing the group names:
F
B Factory defaults, 311
Backup, 124, 197 Factory setting, 311
Basic MAC address, 73 Fault monitoring
BFP, 287 Connection status change, 186
Bridge priority, 44 Forward Delay, 247
Brute Force Prevention, 287 Fragments, 87
C G
Client Geographic coordinates, 119
Available access points, 102 Glossary, 11
Overview, 100 Group name
Client Supplicant, 298 Permitted characters, 346
CLP Groups, 277
Formatting, 192
Saving the configuration, 192
Collisions, 87 H
Configuration manuals, 312
Hardware version, 74
Configuration mode, 117
HTTP
Configuring the network via Ethernet
Port, 115
Connecting to network, 54
Server, 115
CRC, 87
HTTPS
Port, 115
Server, 115
D
DCP Discovery, 195
DCP server, 116, 256 I
Default routes
Information
IPv6 routes, 270
ARP table, 74
DHCP
Groups, 97
Client, 155
IPv6 Neighbor Table, 75
DNS Client, 122
LLDP, 89
Documentation on the Internet, 10
Log tables, 76
J P
Jabbers, 87 Packet error statistics, 86
Password, 278
Options, 282
L Permitted characters and length, 345
Permitted characters and length, 345
LLDP, 89, 257
Ping, 194
Local users, 271
PLUG, 189
Location, 119
PLUG License, 193
Log tables
PLUG License
WLAN authentication log, 78
iFeatures, 193
Logging in
point-to-point, 45
via HTTP, 63
Port
via HTTPS, 63
Port configuration, 203, 206
Login, 287
Port configuration, 206
Logout
Power supply
Automatic, 182
Monitoring, 185
PROFINET, 37, 187
PROFINET IO, 37
M
Maintenance data, 73
MSTP, 252 R
Port, 248
RADIUS, 283
Port parameters, 254
Redundant networks, 246
MSTP instance, 254, 255
Reset, 123
Multichannel configuration, 24
S T
Security settings, 163 Telnet
Serial number, 73 Server, 114
SFTP TFTP
Load/save, 141 Load/save, 137
SHA algorithm, 163 Time, 116
Signal recorder, 226 Time of day
SIMATIC NET glossary, 11 Manual setting, 170
SINEC PNI, 256 SIMATIC Time Client, 181
SMTP SNTP (Simple Network Time Protocol), 176
Client, 116 System time, 169
SNMP, 42, 116, 157, 163 Time zone, 178
Groups, 162 Time-of-day synchronization, 176
Overview, 92 UTC time, 178
SNMPv1, 42 Trigger interval BFP, 287
SNMPv2c, 42
SNMPv3, 42
Trap, 167 U
SNMPv3
Undersize, 87
Access, 163
User groups, 277
Groups, 162
User name
Notifications, 167
Permitted characters and length, 345
Users, 159
Views, 165
Software revision, 74
Source NAT
V
Masquerading, 48 Vendor, 73
Spanning Tree Vendor ID, 73
Information, 80 VLAN, 37
Rapid Spanning Tree, 45 Port VID, 243
SSH Priority, 243
Port, 114 Tag, 243
Server, 114
Standalone configuration, 23
Start page, 66 W
STEP 7, 256
Web Based Management, 62
Subnets
Wireless access, 24
Configuration (IPv4), 261
WLAN statistics
Bad data frames, 109
Received frames, 111
Sent frames, 111