PH Scalance W700ax WBM 76 en Us
PH Scalance W700ax WBM 76 en Us
Security recommendations 2
Description 3
SIMATIC NET
Technical basics 4
Industrial Wireless LAN
SCALANCE W700 5
IP addresses
according to IEEE 802.11ax
Web Based Management V2.4 Configuring with Web
Based Management 6
Configuration Manual
Troubleshooting/FAQ 8
Appendix A "Supported
MIB Modules" A
07/2024
C79000-G8976-C618-08
Legal information
Warning notice system
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
DANGER
indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
Qualified Personnel
The product/system described in this documentation may be operated only by personnel qualified for the specific
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Proper use of Siemens products
Note the following:
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
documentation. If products and components from other manufacturers are used, these must be recommended or
approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and maintenance
are required to ensure that the products operate safely and without any problems. The permissible ambient
conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
All names identified by ® are registered trademarks of Siemens Aktiengesellschaft. The remaining trademarks in
this publication may be trademarks whose use by third parties for their own purposes could violate the rights of
the owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
Siemens Aktiengesellschaft Document order number: C79000-G8900-C618 Copyright © Siemens 2021 - 2024.
Digital Industries Ⓟ 08/2024 Subject to change All rights reserved
Postfach 48 48
90026 NÜRNBERG
GERMANY
Table of contents
1 Introduction ........................................................................................................................................... 9
1.1 Purpose of the configuration manual.................................................................................... 9
1.2 Scope of validity .................................................................................................................. 9
1.3 Supplementary documentation.......................................................................................... 10
1.4 Further documentation...................................................................................................... 11
1.5 Terms used ........................................................................................................................ 11
1.6 SIMATIC NET glossary......................................................................................................... 11
1.7 Cybersecurity information .................................................................................................. 12
1.8 Firmware ........................................................................................................................... 12
1.9 Open source license conditions .......................................................................................... 13
1.10 Error/fault .......................................................................................................................... 13
1.11 Decommissioning .............................................................................................................. 13
1.12 Recycling and disposal ....................................................................................................... 13
1.13 Marken .............................................................................................................................. 13
2 Security recommendations.................................................................................................................. 15
2.1 Security recommendations................................................................................................. 15
2.2 Available services............................................................................................................... 19
3 Description........................................................................................................................................... 23
3.1 Product properties and hardware equipment ...................................................................... 23
3.2 Availability of the interfaces ............................................................................................... 25
3.3 Availability of the system functions .................................................................................... 25
3.4 Configuration limits ........................................................................................................... 28
3.5 Planned operating environment ......................................................................................... 29
3.6 Requirements for installation and operation ....................................................................... 29
3.7 Configuration License PLUG (CLP)....................................................................................... 29
3.8 PRESET PLUG...................................................................................................................... 31
3.9 Power over Ethernet (PoE).................................................................................................. 32
3.10 Digital input / output.......................................................................................................... 33
4 Technical basics ................................................................................................................................... 35
4.1 PROFINET........................................................................................................................... 35
4.2 VLAN ................................................................................................................................. 35
1.8 Firmware
The firmware is available on the Internet pages of the Siemens Industry Online Support: (https://
[Link]/cs/ww/en/ps/28575/dl)
Firmware
The firmware is signed and encrypted. This ensures that only firmware created by Siemens can
be downloaded to the device.
Note
Open source software
Read the license conditions for open source software carefully before using the product.
The license terms and copyright information can be downloaded from the WBM or CLI as a
zip file.
• WBM: System > Load&Save > HTTP / TFTP / SFTP > LicenseCondition
• CLI: sftp save filetype LicenseConditions / tftp save filetype
LicenseConditions
1.10 Error/fault
If a fault develops, send the device to your SIEMENS representative for repair. Repairs on-site are
not permitted.
1.11 Decommissioning
Shut down the device properly to prevent unauthorized persons from accessing confidential
data in the device memory.
To do this, restore the factory settings on the device.
Also restore the factory settings on the storage medium.
1.13 Marken
The following and possibly other names not identified by the registered trademark sign ® are
registered trademarks of Siemens AG:
SCALANCE, RCoax
General
• Check the device regularly to ensure that these recommendations and/or other internal
security policies are complied with.
• Evaluate the security of your location and use a cell protection concept with suitable products
([Link]
• When the internal and external network are disconnected, an attacker cannot access internal
data from the outside. Therefore operate the device only within a protected network area.
• No product liability will be accepted for operation in a non-secure infrastructure.
• Use VPN to encrypt and authenticate communication from and to the devices.
• For data transmission via a non-secure network, use an encrypted VPN tunnel (IPsec,
OpenVPN).
• Separate connections correctly (WBM, SSH etc.).
• Check the user documentation of other Siemens products that are used together with the
device for additional security recommendations.
• Using remote logging, ensure that the system protocols are forwarded to a central logging
server. Make sure that the server is within the protected network and check the protocols
regularly for potential security violations or vulnerabilities.
WLAN
• We recommend that you ensure redundant coverage for WLAN clients.
• More information on data security and data encryption for SCALANCE W is available in
SCALANCE W: Setup of a Wireless LAN in the Industrial Environment (https://
[Link]/cs/ww/en/view/22681042)
Authentication
Note
Accessibility risk - Risk of data loss
Do not lose the passwords for the device. Access to the device can only be restored by resetting
the device to factory settings which completely removes all configuration data.
• Replace the default passwords for all user accounts, access modes and applications (if
applicable) before you use the device.
• Define rules for the assignment of passwords.
• Use passwords with a high password strength. Avoid weak passwords, (e.g. password1,
123456789, abcdefgh) or recurring characters (e.g. abcabc).
This recommendation also applies to symmetrical passwords/keys configured on the device.
• Make sure that passwords are protected and only disclosed to authorized personnel.
• Do not use the same passwords for multiple user names and systems.
• Store the passwords in a safe location (not online) to have them available if they are lost.
• Regularly change your passwords to increase security.
• A password must be changed if it is known or suspected to be known by unauthorized
persons.
• When user authentication is performed via RADIUS, make sure that all communication takes
place within the security environment or is protected by a secure channel.
• Watch out for link layer protocols that do not offer their own authentication between
endpoints, such as ARP or IPv4. An attacker could use vulnerabilities in these protocols to
attack hosts, switches and routers connected to your layer 2 network, for example, through
manipulation (poisoning) of the ARP caches of systems in the subnet and subsequent
interception of the data traffic. Appropriate security measures must be taken for non-secure
layer 2 protocols to prevent unauthorized access to the network. Physical access to the local
network can be secured or secure, higher layer protocols can be used, among other things.
Physical/remote access
• Operate the devices only within a protected network area. Attackers cannot access internal
data from the outside when the internal and the external network are separate from each
other.
• Limit physical access to the device exclusively to trusted personnel.
The memory card or the PLUG (C-PLUG, KEY-PLUG, CLP) contains sensitive data such as
certificates and keys that can be read out and modified. An attacker with control of the
device's removable media could extract critical information such as certificates, keys, etc. or
reprogram the media.
• Lock unused physical ports on the device. Unused ports can be used to gain forbidden access
to the plant.
• We highly recommend that you keep the protection from brute force attacks (BFA) activated
to prevent third parties from gaining access to the device. For more information, see the
configuration manuals, section "Brute Force Prevention (Page 287)".
• For communication via non-secure networks, use additional devices with VPN functionality
to encrypt and authenticate communication.
• When you establish a secure connection to a server (e.g. for an upgrade), make sure that
strong encryption methods and protocols are configured for the server.
• Terminate the management connections (e.g. HTTP, HTTPS, SSH) properly.
• Make sure that the device has been powered down completely before you decommission it.
For more information, refer to "Decommissioning (Page 13)".
• We recommend formatting a PLUG that is not being used.
Hardware / Software
• Use VLANs whenever possible as protection against denial-of-service (DoS) attacks and
unauthorized access.
• Restrict access to the device by setting firewall rules or rules in an access control list (ACL).
• Selected services are enabled by default in the firmware. It is recommended to enable only
the services that are absolutely necessary for your installation.
For more information on available services, see "List of available services (Page 19)".
• To ensure you are using the most secure encryption methods available, use the latest web
browser version compatible with the product. Also, the latest web browser versions of
Mozilla Firefox, Google Chrome, and Microsoft Edge have 1/n-1 record splitting enabled,
which reduces the risk of attacks such as SSL/TLS Protocol Initialization Vector
Implementation Information Disclosure Vulnerability (for example, BEAST).
• Ensure that the latest firmware version is installed, including all security-related patches.
You can find the latest information on security patches for Siemens products at the Industrial
Security ([Link] or ProductCERT Security Advisories
([Link] website.
For updates on Siemens product security advisories, subscribe to the RSS feed on the
ProductCERT Security Advisories website or follow @ProductCert on Twitter.
• Enable only those services that are used on the device, including physical ports. Free physical
ports can potentially be used to gain access to the network behind the device.
• Use the authentication and encryption mechanisms of SNMPv3 if possible. Use strong
passwords.
• Configuration files can be downloaded from the device. Ensure that configuration files are
adequately protected.
Configuration files can be password protected during download. You enter passwords on the
WBM page "System > Load & Save > Passwords (Page 144)".
• When using SNMP (Simple Network Management Protocol):
– Configure SNMP to generate a notification when authentication errors occur.
For more information, see WBM "System > SNMP > Notifications (Page 166)".
– Ensure that the default community strings are changed to unique values.
– Use SNMPv3 whenever possible. SNMPv1 and SNMPv2c are considered non-secure and
should only be used when absolutely necessary.
– If possible, prevent write access.
• Use the security functions such as address translation with NAT (Network Address
Translation) or NAPT (Network Address Port Translation) to protect receiving ports from
access by third parties.
• Use WPA2/ WPA2-PSK / WPA3-SAE with AES to protect the WLAN. You can find additional
information in the configuration manual Web Based Management "Security menu
(Page 289)".
• Use PMF (Protected Management Frames) to cryptographically protect the management
telegrams. You can find additional information in the configuration manual Web Based
Management "Security menu (Page 289)".
• Configurable port/service
Indicates whether the port number or the service can be configured via WBM / CLI.
• Authentication
Specifies whether the communication partner is authenticated.
If "optional", the authentication can be configured as required.
• Encryption
Specifies whether the transfer is encrypted.
If "optional", the encryption can be configured as required.
The following is a list of all available Layer 2 services through which the device can be
accessed.
The table includes the following columns:
• Layer 2 service
The Layer 2 services that the device supports.
• Default status
The default status of the service (open or closed).
• Service configurable
Indicates whether the service can be configured via WBM / CLI.
DCP Open ✓
LLDP Open ✓
RSTP Closed ✓
iPRP Closed ✓
MSTP Closed ✓
SIMATIC NET TIME Closed ✓
802.1x Closed ✓
Hardware equipment
The following table shows the hardware equipment of the SCALANCE W devices.
We reserve the right to make technical changes.
Device Access point Client Access point Client Access point Client
WAM766-1 WUM766-1 WAM763-1 WUM763-1 WAB762-1 WUB762-1
WAM 766-1 WUB762-1
EEC iFeatures
Number of WLAN inter‐ 2 1 2 1 1 1
faces
Connections for exter‐ 2 x N-Connector 2 x R-SMA female 1 x R-SMA female
nal antennas
Device Access point Client Access point Client Access point Client
WAM766-1 WUM766-1 WAM763-1 WUM763-1 WAB762-1 WUB762-1
WAM 766-1 WUB762-1
EEC iFeatures
Ethernet interface M12 Ethernet interface P1 LAN 4 x RJ45 socket 1 x RJ45 socket
PoE, X-coded, 8-pin
Power supply (direct) M12 interface, direct infeed, L- Terminal block, 5-pin Terminal block, 3-pin
coded, 4-pin
Digital input/output M12 interface, A-coded, 5-pin Terminal block, 2-pin Not available
Degree of protection IP65 IP30 IP20
CLP interface Available Available Not available
PoE interface Available Not available Not available
Device Access point Client Access point Client Access point Client
WAM766-1 WUM766-1 WAM763-1 WUM763-1 WAB762-1 WUB762-1
WAM766-1 WUB762-1
EEC iFeatures
Wireless interface WLAN 1 WLAN 1 WLAN 1 WLAN 1 WLAN 1 WLAN 1
(WLAN) WLAN 2 WLAN 2 WLAN 2
LAN interface P1 LAN PoE P1 LAN PoE P1 - P4 P1 - P4 P1 P1
VAP interface VAP X.Y - VAP X.Y - VAP X.Y -
X = 1 ... 2 X = 1 ... 2 X = 1 ... 2
Y = 1 ... 8 Y = 1 ... 8 Y=1
VLAN 24 24 24 24 5 5
Note
Availability of the CLP interface
Not all device variants have a CLP interface. For more detailed information, refer to the section
"Product properties and hardware equipment (Page 23)".
How it works
NOTICE
Do not remove or insert the PLUG during operation.
A PLUG may only be removed or inserted when the device is turned off.
The device checks whether a PLUG is inserted at one second intervals. If it is detected that the
PLUG has been removed, the device restarts.
If a valid PLUG license was inserted in the device, the device changes to a defined error state
following the restart. With SCALANCE W, the available wireless interfaces are deactivated in
this case.
If the device was configured at some time with a PLUG license, the device can no longer be used
without this PLUG. To be able to use the device again, reset the device to the factory settings.
Note
Availability of the CLP interface
Not all device variants have a CLP interface. For more detailed information, refer to the section
"Product properties and hardware equipment (Page 23)".
With PRESET-PLUG it is possible to install the same configuration and the firmware belonging
to it on several devices.
Note
Using configurations with DHCP
Create a PRESET-PLUG only from device configurations that use DHCP. Otherwise disruptions will
occur in network operation due to multiple identical IP addresses.
You assign fixed IP addresses extra following the basic installation.
In a CLP that was configured as a PRESET-PLUG, the device configuration, user accounts,
certificates and the firmware are stored.
Note
Restore factory defaults and restart with a PRESET PLUG inserted
If you reset a device to the factory defaults, when the device restarts an inserted PRESET PLUG
is formatted and the PRESET PLUG functionality is lost. You then need to create a new PRESET
PLUG.
We recommend that you remove the PRESET PLUG before you reset the device to the factory
settings.
For more detailed information on creating and using a PRESET PLUG refer to the section
Device configuration with PRESET-PLUG (Page 313).
General
"Power over Ethernet" (PoE) is a power supply strategy for network components according to
IEEE with 802.3af or 802.3at.
With PoE, power and data transmission takes place over the used Ethernet cables that
connect the individual network components. This makes an additional power cable
unnecessary and reduces investment and maintenance costs. PoE can be used with all
network components that require little power (max. 12.95 W).
Which Ethernet connectors of a device are capable of PoE can be found in the operating
instructions of the device.
Endspan
With endspan, the power is supplied via a switch that can reach a device over an Ethernet cable.
The switch must be capable of PoE, for example a SCALANCE X108PoE, SCALANCE X308-2M
POE, SCALANCE XR552‑12M.
Midspan
Midspan is used when the switch is not PoE-compliant. The power is supplied by an additional
device between the switch and end device. In this case, only data rates of 10/100 Mbps can be
achieved because the power is supplied on redundant wires.
A Siemens power insert can also be used as the interface for the power input. Since a power
insert supports a power supply of 24 VDC, it does not conform with 802.3af or IEEE 802.3at.
The following restrictions relating to the use of power inserts should be noted:
WARNING
Operate the power insert only when the following conditions apply:
• with extra low voltages SELV, PELV complying with IEC 60364-4-41
• in the United States and Canada with power supplies complying with NEC class 2
• in the United States and Canada, the cabling must meet the requirements of NEC/CEC
• power load maximum 0.5 A.
Introduction
Some device variants have a digital input and output. You can find information on the availability
of a digital input and output in the section "Product properties and hardware equipment
(Page 23)". You can find information on connection and pin assignment in the operating
instructions for the relevant device.
Application example
• Digital input to signal one item of information, for example "door open", "door closed".
• Digital output, for example for "go to sleep" for devices on an automated guided transport
system.
Note
You cannot configure the digital output with Web Based Management (WBM).
You can note the current state of the digital output and restore it after a restart. You can find
more information on the WBM page "System > Configuration".
If the digital input changes the status, an entry is made in the event protocol table.
Digital input
Using the private MIB variable snMspsDigitalInputLevel, you can read out the status of the digital
input.
Note
If the digital output changes status, an entry is made in the event protocol table.
MIB file
The MIB variables can be found in the file "SN-MSPS-DIGITAL-IO-MIB" that is part of the private
MIB file "[Link]". For more detailed information, refer to Appendix B "Private MIBs"
(Page 323).
PROFINET
PROFINET is an open standard (IEC 61158/61784) for industrial automation based on Industrial
Ethernet. PROFINET uses existing IT standards and allows end-to-end communication from the
field level to the management level as well as plant-wide engineering. PROFINET also has the
following features:
• Use of TCP/IP
• Automation of applications with real-time requirements
– Real-Time (RT) communication
– Isochronous Real-Time (IRT) communication
• Seamless integration of fieldbus systems
You configure PROFINET in "System > PROFINET (Page 187)".
PROFINET IO
Within the framework of PROFINET, PROFINET IO is a communications concept for implementing
modular, distributed applications. PROFINET IO is implemented by the PROFINET standard for
programmable controllers (IEC 61158-x-10).
4.2 VLAN
When a SCALANCE W device receives a doubly tagged frame, it uses the VLAN ID from the
outer VLAN tag ② and the priority information from the inner VLAN tag ①. The frame is
then forwarded to the relevant VLAN.
4.4 iFeatures
4.4.1 iPCF-2
The wireless range of an IWLAN system can be expanded by using multiple access points. If a
client is moved from the area covered by one access point to the area covered by another access
point, the wireless link is maintained after a short interruption (roaming). If very fast update
times and low latencies are required, for example for PROFINET communication, access points
and client modules need to be used that meet the requirements through proprietary
improvements, such as iPCF-2.
iPCF-2 and other iFeatures can only be operated alone. A combination with each other is not
possible.
How it works
iPCF
With iPCF the access point checks all nodes in the wireless cell cyclically. At the same time,
the scan includes the downlink traffic for this node. In the reply, the node sends the uplink
data. The access point scans a new node at least every 5 ms.
The scan of a node is seen by all other nodes in the cell. This allows a client to detect the
quality of the wireless link to the access point even when it is not communicating with the
access point itself. If the client does not receive any frames from the access point for a
certain time, it starts to search for a new access point.
In iPCF mode, both the search for a new access point and the registration with this access
point have been optimized in terms of time. Handover times significantly below 50 ms are
achieved.
The "Legacy Free (iPCF-LF)" setting is available to prevent the performance from being slowed
down by the IEEE 802.11 a/b/g device generation. When enabled, only the devices that
communicate with the IEEE 802.11n standard and have the "Legacy Free (iPCF-LF)" setting
enabled are accepted. WLAN mode IEEE 802.11n need not be enabled for this, however.
Stable PROFINET communication is only possible when a WLAN client is in a wireless cell with
more than 60 % or -65 dBm signal strength at all times. This can be checked by activating
and deactivating the various wireless cells.
This does not mean that the client needs to change when there is a signal strength < 60 % (<
-65 dBm). Make sure that access points are available with adequate signal strength.
iPCF-HT and iPCF-MC are expansions of iPCF for the WLAN mode IEEE 802.11n. You can find
more information in the document "IWLAN: Configuring an Industrial Wireless LAN" under
the following entry ID:
90880063 ([Link]
iPCF-2
iPCF-2 is introduced according to IEEE 802.11ax for the first time with the firmware version
V2.0 of the SCALANCE W700 devices. The functionality will be expanded and improved
during the subsequent stages.
iPCF-2 in FW V2.0 consists of various proprietary mechanisms that enable real-time
communication along defined paths, such as absolute prioritization of PROFINET traffic, Fast
Transition and more.
The function "TCP Event > WLAN Roaming" enables rapid roaming through transfer of
parameters of the access point to which the client will establish a connection next after
the application.
You configure iPCF-2 under "iFeatures > iPCF-2 (Page 304)".
4.4.2 iPRP
The "Parallel Redundancy Protocol" (PRP) is a redundancy protocol for cabled networks. It is
defined in Part 3 of the IEC 62439 standard.
With the "industrial Parallel Redundancy Protocol" (iPRP) the PRP technology can be used in
wireless networks. This improves the availability of wireless communication.
How it works
A PRP network consists of two completely independent networks. If one network is disrupted,
the frames are sent without interruption/reconfiguration via the parallel redundant network. To
achieve this the Ethernet frames are sent to the recipient in duplicate via both networks. Devices
capable of PRP have at least two separate Ethernet interfaces that are connected to independent
networks.
With devices not capable of PRP a redundancy box (RedBox) is connected upstream. This
allows access for so-called Single Attached Nodes (SAN) to PRP networks. The RedBox
duplicates every Ethernet frame to be sent and adds a PRP trailer to the frame that among
other things contains a sequence number. The RedBox simultaneously sends a copy of the
frame to the PRP A and PRP B network. At the receiving end the duplicate frame is discarded
by the RedBox. For this the RedBox requires certain transfer times designed for Ethernet
networks. For this reason using PRP in WLAN networks results in duplicate and delayed
frames.
With iPRP, this problem is solved and the use of PRP in WLAN with SCALANCE W devices
becomes possible
6LQJOH$WWDFKHG1RGH
6$1
5HGXQGDQF\%R[
5HG%R[
353$ 353%
9/$19/$1 9/$19/$1
9/$19/$1
9/$1 9/$1
&OLHQW$ &OLHQW%
:/$1!9/$1 353$ :/$1!9/$1 353%
39/$19/$1 39/$19/$1
353$ 353%
5HGXQGDQF\%R[
5HG%R[
,QGXVWULDO(WKHUQHW 6LQJOH$WWDFKHG1RGH
6$1
The access points (AP 1, AP 2 and AP 3) and the RedBox at the AP end are connected to each
other via a switch. PRP network A und B are separated from each other via VLANs.
If SAN1 sends a frame to SAN2, the frame is duplicated by the RedBox at the AP end and
the two redundant frames are transferred via the switch to the access points. Via the two
different wireless paths the redundant PRP frames are transferred to the RedBox at the client
end. The clients are also connected to their RedBox via a switch. This forwards the first PRP
frame to arrive to SAN2 and discards the second one.
With transfer paths that are not the same, iPRP reduces the number of duplicated and
out-of-order packets. The application/protocol used must be able to handle the remaining
duplicates and out-of-order packets.
Note
On the interfaces of the switches to the SCALANCE W devices, only the VLANs that are also set
on the VAP or WLAN interfaces of the SCALANCE W devices may be configured.
With iPRP the redundant partners (here: AP1 and AP3 or client A and client B) communicate
with each other via a switch to prevent the two redundant PRP frames from arriving at the
RedBox with too great a time difference.
If for example the communication between AP1 and client A is very slow, the slower frame is
discarded at the receiving end.
You configure iPRP in "iFeatures > iPRP (Page 306)".
Requirement
• iPRP can only be used with the CLP iFeatures (Page 29).
• The base bridge mode "802.1Q VLAN Bridge" is set.
• The VLANs have been created.
• Access point mode: The VAP interface is enabled.
• Client mode: In MAC mode "Layer 2 Tunnel" is set.
• Depending on the configuration the clients can communicate with every access point.
• The Spanning Tree Protocol is disabled.
4.5 SNMP
Introduction
With the aid of the Simple Network Management Protocol (SNMP), you monitor and control
network components from a central station, for example routers or switches. SNMP controls the
communication between the monitored devices and the monitoring station.
Tasks of SNMP:
• Monitoring of network components
• Remote control and remote parameter assignment of network components
• Error detection and error notification
In versions v1 and v2c, SNMP has no security mechanisms. Each user in the network can
access data and also change parameter assignments using suitable software.
For the simple control of access rights without security aspects, community strings are used.
The community string is transferred along with the query. If the community string is correct,
the SNMP agent responds and sends the requested data. If the community string is not
correct, the SNMP agent discards the query. Define different community strings for read and
write permissions. The community strings are transferred in plain text.
SNMPv3
Compared with the previous versions SNMPv1 and SNMPv2c, SNMPv3 introduces an extensive
security concept.
SNMPv3 supports:
• Fully encrypted user authentication
• Encryption of the entire data traffic
• Access control of the MIB objects at the user/group level
With the introduction of SNMPv3, you can no longer transfer user configurations to other
devices without taking special action, e.g. by loading a configuration file.
According to the standard, the SNMPv3 protocol uses a unique SNMP engine ID as an internal
identifier for an SNMP agent. This ID must be unique in the network. It is used to authenticate
access data of SNMPv3 users and to encrypt it.
Depending on whether you have enabled or disabled the “SNMPv3 User Migration” function,
the SNMP engine ID is generated differently.
Restriction when using the function
Use the "SNMPv3 User Migration" function only to transfer configured SNMPv3 users to a
substitute device when replacing a device.
Do not use the function to transfer configured SNMPv3 users to multiple devices. If you load
a configuration with created SNMPv3 users on several devices, these devices use the same
SNMP engine ID. If you use these devices in the same network, your configuration contradicts
the SNMP standard.
Compatibility with predecessor products
You can only transfer SNMPv3 users to a different device if you have created the users as
migratable users. To create a migratable user the "SNMPv3 User Migration" function must be
activated when you create the user.
Avoiding loops
The Spanning Tree algorithm detects redundant physical network structures and prevents the
formation of loops by disabling redundant paths. It evaluates the distance and performance of
a connection or bases the decisions on settings made by the user. Data is then exchanged only
over the remaining connection paths.
If the preferred data path fails, the Spanning Tree algorithm then searches for the most
efficient path possible with the remaining nodes.
By directly linking the devices, a status change (reconfiguration of the ports) can be made
without any delays.
• Alternate port (substitute for the root port)
A substitute for the root port is configured. If the connection to the root bridge is lost, the
device can establish a connection over the alternate port without any delay due to
reconfiguration.
• Reaction to events
Rapid spanning tree reacts to events, for example an aborted connection, without delay.
There is no waiting for timers as in spanning tree.
• Counter for the maximum bridge hops
The number of bridge hops a package is allowed to make before it automatically becomes
invalid.
In principle, therefore with rapid spanning tree, alternatives for many parameters are
preconfigured and certain properties of the network structure taken into account to reduce
the reconfiguration time.
Note
Entered passwords cannot be read as plain text; instead asterisks * are displayed.
Local logon
The local logging on of users by the device runs as follows:
1. The user logs on with user name and password on the device.
2. The device checks whether an entry exists for the user.
→ If an entry exists, the user is logged in with the rights of the associated role.
→ If no corresponding entry exists, the user is denied access.
If you have set the authorization mode "SiemensVSA", the authentication of users via a
RADIUS server runs as follows:
1. The user logs on with user name and password on the device.
2. The device sends an authentication request with the login data to the RADIUS server.
3. The RADIUS server runs a check and signals the result back to the device.
Case A: The RADIUS server reports a successful authentication and returns the group
assigned to the user to the device.
– The group is known on the device and the user is not entered in the table "External User
Accounts"
→ The user is logged in with the rights of the assigned group.
– The group is known on the device and the user is entered in the table "External User
Accounts"
→ The user is assigned the role with the higher rights and logged in with these rights.
– The group is not known on the device and the user is entered in the table "External User
Accounts"
→ The user is logged in with the rights of the role linked to the user account.
– The group is not known on the device and the user is not entered in the table "External
User Accounts"
→ The user is logged in with the rights of the role "Default".
Case B: The RADIUS server reports a successful authentication but does not return a group
to the device.
– The user is entered in the table "External User Accounts":
→ The user is logged in with the rights of the linked role.
– The user is not entered in the table "External User Accounts":
→ The user is logged in with the rights of the role "Default".
Case C: The RADIUS server reports a failed authentication to the device:
– The user is denied access.
4.8 NAT
NAT (Network Address Translation) is a method of translating IP addresses in data packets. With
this, two different networks (internal and external) can be connected together.
A distinction is made between source NAT in which the source IP address is translated and
destination NAT in which the destination IP address is translated.
IP masquerading
IP masquerading is a simplified source NAT. With each outgoing data packet sent via this
interface, the source IP address is replaced by the IP address of the interface. The adapted data
packet is sent to the destination IP address. For the destination host it appears as if the queries
always came from the same sender. The internal nodes cannot be reached directly from the
external network. By using NAPT, the services of the internal nodes can be made reachable via
the external IP address of the device.
IP masquerading can be used if the internal IP addresses cannot or should not be forwarded
externally, for example because the internal network structure should remain hidden.
You configure masquerading in "Layer 3" > "NAT" > "IP Masquerading (Page 265)".
NAPT
NAPT (Network Address and Port Translation) is a form of destination NAT and is often called port
forwarding.
Incoming data packets are translated that come from the external network and are intended
for an external IP address of the device (destination IP address). The destination IP address
is replaced by the IP address of the internal node. In addition to address translation, port
translation is also possible.
The options are available for port translation:
from to Response
a single port the same port If the ports are the same, the frames will be forwarded without port
translation.
a single port a single port The frames are translated to the port.
a port range a single port The frames from the port range are translated to the same port (n:1).
a port range the same port If the port ranges are the same, the frames will be forwarded without
range port translation.
Port forwarding can be used to allow external nodes access to certain services of the internal
network e.g. FTP, HTTP.
Configure NAPT under "Layer 3 (IPv4)" > "NAPT (Page 266)".
Multichannel configuration
If neighboring access points use the same frequency channel, this can lead to longer response
times due to any collisions that may occur. If the configuration shown in the figure is
implemented as a single-channel system, computers A and B cannot communicate at the same
time with the access points in their wireless cells.
If neighboring access points are set up for different frequencies, this leads to a considerable
improvement in performance. As a result, neighboring wireless cells each have their own
medium available and the delays resulting from time-offset transmission no longer occur.
The channel spacing should be as large as possible; a practical value is 25 MHz. Even in a
multichannel configuration, all access points can be configured with the same network name.
The following graphic shows a multichannel configuration on channels 1 and 2 with four
access points.
2
A
1
B
2
Note
The SIMATIC NET WLAN products use OpenSSL.
This is open source code with license conditions (BSD).
Please refer to the current license conditions.
Since the driver includes encryption software, you should also adhere to the appropriate
regulations for your specific country.
Requirement
• The access points are members of the same mobility domain
• Only possible with the following encryptions:
– WPA2-PSK
– WPA2 RADIUS
– WPA3-SAE
IPv4 IPv6
IP configuration • DHCP server • Stateless Address Autoconfiguration (SLAAC): Stateless au‐
• Manual toconfiguration using NDP (Neighbor Discovery Protocol)
– Creates a link local address for every interface that does
not require a router on the link.
– Checks the uniqueness of the address on the link that
requires no router on the link.
– Specifies whether the global addresses are obtained via
a stateless mechanism, a stateful mechanism or via
both mechanisms. (Requires a router on the link.)
• Manual
• DHCPv6 (stateful)
Available IP addresses 32-bit: 4, 29 * 10 address‐ 128-bit: 3, 4 * 1038 addresses
9
es
Address format Decimal: [Link] Hexadecimal: [Link]
with port: [Link]:20 with port: [Link]:20
Loopback [Link] ::1
IP addresses of the interface 5 IP addresses Multiple IP addresses
• LLA: A link local address (formed automatically) fe80::/128
per interface
• ULA: Several unique local unicast addresses per interface
• GUA: Several global unicast addresses per interface
Header • Checksum • Checking at a higher layer
• Variable length • Fixed size
• Fragmentation in the • Fragmentation in the extension header
header
• No security
Fragmentation Host and router Only endpoint of the communication
Quality of service Type of Service (ToS) for The prioritization is specified in the header field "Traffic Class".
prioritization
Types of frame Broadcast, multicast, uni‐ Multicast, unicast, anycast
cast
IPv4 IPv6
Identification of DHCP clients/ Client ID: DUID + IAID(s) = exactly one interface of the host
server • MAC address DUID = DHCP unique identifier
• DHCP client ID Unique identifier of server and clients
• System name IAID = Identity Association Identifier
• PROFINET station name At least one per interface is generated by the client and remains
unchanged when the DHCP client restarts
• IAID and DUID
Three methods of obtaining the DUID
• DUID-LLT
• DUID-EN
• DUID-LL
DHCP via UDP with broadcast via UDP with unicast
RFC 3315, RFC 3363
Stateful DHCPv6
Stateful configuration in which the IPv6 address and the con‐
figuration settings are transferred.
Four DHVPv6 messages are exchanged between client and
server:
1. SOLICIT:
Sent by the DHCPv6 client to localize DHCPv6 servers.
2. ADVERTISE
The available DHCPv6 servers reply to this.
3. REQUEST
The DHCPv6 client requests an IPv6 address and the config‐
uration settings from the DHCPv6 server.
4. REPLY
The DHCPv6 server sends the IPv6 address and the config‐
uration settings.
If the client and server support the function "Rapid commit" the
procedure is shortened to two DHCPv6 messages SOLICIT and
REPLY .
Stateless DHCPv6
In stateless DHCPv6, only the configuration settings are trans‐
ferred.
Prefix delegation
The DHCPv6 server delegates the distribution of IPv6 prefixes to
the DHCPv6 client. The DHCPv6 client is also known as PD rout‐
er.
Resolution of IP addresses in ARP (Address Resolution NDP (Neighbor Discovery Protocol)
hardware addresses Protocol)
Subnet mask
The subnet mask consists of four decimal numbers with the range from 0 to 255, each number
separated by a period; example: [Link]
The binary representation of the 4 subnet mask decimal numbers must contain a series of
consecutive 1s from the left and a series of consecutive 0s from the right.
The "1" values determine the network address within the IPv4 address. The "0" values
determine the device address within the IPv4 address.
Example:
Correct values
[Link] D = 1111 1111.1111 1111.0000 0000.0000 0000 B
[Link] D = 1111 1111.1111 1111.1000 0000.0000 0000 B
[Link] D = 1111 1111.1111 1110.0000 0000.0000.0000 B
Incorrect value:
[Link] D = 1111 1111.1111 1111.0000 0001.0000 0000 B
In the example for the IP address mentioned above, the subnet mask shown here has the
following meaning:
The first 2 bytes of the IP address determine the subnet - i.e. 192.168. The last two bytes
address the device, i.e. 16.2.
The following applies in general:
• The network address results from the AND combination of IPv4 address and subnet mask.
• The device address results from the AND-NOT combination of IPv4 address and subnet mask.
Example:
IPv4 address [Link] with subnet mask [Link]
The network part of the address covers 3 x 8 bits in binary representation; in other words 24
bits.
This results in the CIDR notation [Link]/24.
The host part covers 1 x 8 bits in binary notation. This results in an address range of 2 to the
power 8, in other words 256 possible addresses.
Result:
All devices with addresses from [Link] to [Link] are on one IP subnet, all
devices with addresses from [Link] to [Link] are on another IP subnet.
Configuration options
An initial IP address for a SCALANCE W device cannot be assigned using Web Based Management
(WBM) or the Command Line Interface (CLI) over Telnet because these configuration tools
require that an IP address already exists.
SINEC INS can be used as in-house DHCP server and assign IP addresses to devices in the
network.
Properties of DHCP
DHCP (Dynamic Host Configuration Protocol) is a method for automatic assignment of IPv4
addresses. It has the following characteristics:
• DHCP can be used both when starting up a device and during ongoing operation.
• The assigned IP address remains valid only for a limited time known as the lease time. When
half the period of validity has elapsed. the DHCP client can extend the period of the assigned
IPv4 address. When the entire time has elapsed, the DHCP client needs to request a new IPv4
address.
• There is normally no fixed address assignment; in other words, when a client requests an IP
address again, it normally receives a different address from the previous address. It is possible
to configure the DHCP server so that the DHCP client always receives the same fixed address
in response to its request. The parameter with which the DHCP client is identified for the
fixed address assignment is set on the DHCP client. The address can be assigned via the MAC
address, the DHCP client ID, PROFINET device name or the device name. You configure the
parameter in "System > DHCP Client (Page 154)".
• The following DHCP options are supported:
– DHCP option 66: Assignment of a dynamic TFTP server name
– DHCP option 67: Assignment of a dynamic boot file name
Note
DHCP uses a mechanism with which the IP address is assigned for only a short time (lease
time). If the device does not reach the DHCP server with a new request on expiry of the lease
time, the assigned IP address, the subnet mask and the gateway continue to be used.
The device therefore remains accessible under the last assigned IP address even without a
DHCP server. This is not the standard behavior of office devices but is necessary for problem-
free operation of the plant.
Introduction
The SINEC PNI is capable of assigning such an address to unconfigured devices that do not yet
have an IP address.
SINEC PNI
• To be able to assign an IP address to the device with SINEC PNI, it must be possible to reach
the device via Ethernet.
• You can find SINEC PNI on the Internet pages of Siemens Industry Online Support at the
following Link: ([Link]
• For additional information about assigning the IP address with SINEC PNI, refer to the online
help or the "SINEC PNI network management" operating instructions.
STEP 7 as of V13
For additional information on assigning the IP address using STEP 7 as of V13, refer to the online
help "Information system", section "Addressing PROFINET devices".
Mechanism for determining the maximum permitted packet size along the entire path from a
sender to a recipient.
LLA
Link local address FE80::/10
As soon as IPv6 is activated on the interface, a link local address is formed automatically. Can
only be reached by nodes located on the same link.
ULA
Unique Local Address
Defined in RFC 4193. The IPv6 interface can be reached via this address in the LAN.
GUA
Global unicast address
The IPv6 interface can be reached through this address, for example, via the Internet.
Interface ID
The interface ID is formed with the EUI-64 method or manually.
EUI-64
Extended Unique Identifier (RFC 4291); process for forming the interface ID. In Ethernet,
the interface ID is formed from the MAC address of the interface. Divides the MAC address
into the manufacturer-specific part (OUI) and the network-specific part (NIC) and inserts FFFE
between the two parts.
Example:
MAC address = [Link]
OUI = [Link]
NIC = [Link]
EUI-64 = OUI + FFFE + NIC = [Link]
Scope
Defines the range of the IPv6 address.
Rules / simplifications:
• If one or more fields have the value 0, a shortened notation is possible.
The address [Link] can also be shortened and written
as follows:
fd00::ffff:02d1:7d01:0000:8f21
To ensure uniqueness, this shortened form can only be used once within the entire address.
• Leading zeros within a field can be omitted.
The address [Link] can also be shortened and written
as follows:
fd00::ffff:2d1:7d01:0000:8f21
• Decimal notation with periods
The last 2 fields or 4 bytes can be written in the normal decimal notation with periods.
Example: The IPv6 address fd00::ffff.[Link] is equivalent to fd00::ffff:7d01:1
The prefix for the link local address is always [Link]. The prefix is shortened
and noted as follows: fe80::
IPv6 prefix
Specified in: RFC 4291
The IPv6 prefix represents the subnet identifier.
Prefixes and IPv6 addresses are specified in the same way as with the CIDR notation (Classless
Inter-Domain Routing) for IPv4.
Design
IPv6 address / prefix length
Example
IPv6 address: [Link]/48
Prefix: [Link]/48
Interface ID: ::1111
Requirements
• The device has an IP address.
Note
Assign an IP address to the device using DHCP or SINEC PNI.
• There is a network connection between the device and the client PC.
• The network settings of the device and of the client PC match.
Note
You can use a ping to check whether a connection exists and communication is possible.
WBM display
The display of the WBM was tested with the following desktop Internet browsers:
• Mozilla Firefox
• Google Chrome
• Microsoft Edge
The WBM is tested with the current version of the Internet browser available at the time of
firmware release.
Note
Display of the WBM and working with it on mobile devices
The display and operation of the WBM pages on mobile devices may differ compared with the
same pages on desktop devices. Some pages also have an optimized display for mobile devices.
6.2 Login
Changing language
1. From the drop-down list at the top right, select the language version of the WBM pages.
2. Click the "Go" button to change to the selected language.
Note
Available languages
English and German are available as languages.
Logging in to WBM
You have the following options for logging in via HTTPS. You either use the login option in the
center of the browser window or the login option in the upper left area of the browser window.
The following steps apply, whichever of the above options you choose.
1. "Name" input box:
– When you log in for the first time or following a "Restore Factory Defaults and Restart",
enter the user preset in the factory "admin".
With this user account, you can change the settings of the device (read and write access
to the configuration data).
– Enter the user name of the created user account. You configure local user accounts and
roles in "Security > Users".
2. "Password" input box:
– When you log in for the first time or following a "Restore Factory Defaults and Restart",
enter the password of the default user preset in the factory "admin": "admin".
– Enter the password of the relevant user account.
Note
The password for the "admin" user has been changed for devices with the US version.
Specialist personnel for professional WLAN installations can obtain the password from
Siemens support.
• Favorites
When the product ships, the button is disabled on all pages .
If you click this button, the symbol changes and the currently open page or currently open
tab is marked as favorite. Once you have enabled the button once, the navigation area is
divided into two tabs. The first tab "Menu" contains all the available menus as previously. The
second tab "Favorites" contains all the pages/tabs that you selected as favorites. On the
"Favorites" tab the pages/tabs are arranged according to the structure in the "Menu" tab.
If you disable all the favorites you have created, the "Favorites" tab is removed again. To do
this, click the button on the relevant pages/tabs.
You can save, upload and delete the favorites configuration of a device on the "System >
Load&Save" page using HTTP or TFTP.
• Update on / Update off
WBM pages with overview lists can also have the additional "Update" button.
With this button, you can enable or disable updating of the content area. If updating is turned
on, the display is updated every 2 seconds. To disable the update, click "On". Instead of "On",
"Off" is displayed. As default, updating is always disabled on the WBM page.
• PROFINET AR Status
Shows the PROFINET application relation status.
– Online
There is a connection to a PROFINET controller. The PROFINET controller has downloaded
its configuration data to the device. The device can send status data to the PROFINET
controller.
In this status, the parameters set by the PROFINET controller cannot be configured on the
device.
– Offline
There is no connection to a PROFINET controller.
• Power Line 1 / Power Line 2 / Power over Ethernet
Status of the power supplies 1 and 2 or power over Ethernet. The power line 2 and Power over
Ethernet are only displayed if they are supported by the hardware. You can find additional
information on this in the operating instructions.
• PLUG configuration (not with WxB762-1)
Shows the status of the configuration data on the PLUG, refer to the section "System > PLUG
> PLUG Configuration".
• PLUG license (not with WxB762-1)
Shows the status of the license on the PLUG, refer to the section "System > PLUG > PLUG
License".
• Fault Status
Shows the fault status of the device.
• Packet Capture
Shows the status of the "Packet Capture" function at the interface (Ethernet, WLAN).
Buttons you require often
The pages of the WBM contain the following standard buttons:
• Refresh the display with "Refresh"
Web Based Management pages that display current parameters have a "Refresh" button at
the bottom edge of the page. Click this button to request up-to-date information from the
device for the current page.
Note
If you click the "Refresh" button, before you have transferred your configuration changes to
the device using the "Set Values" button, your changes will be deleted and the previous
configuration will be loaded from the device and displayed here.
Messages
If you have enabled the "Automatic Save" mode and you change a parameter the following
message appears in the display area "Changes will be saved automatically in x seconds. Press
'Write Startup Config' to save the changes immediately."
Note
Interrupting the save
Saving starts only after the timer in the message has elapsed. How long saving takes depends
on the device.
During the save, the message "Saving configuration data in progress. Please do not switch off the
device" is displayed.
• Do not switch off the device immediately after the timer has elapsed.
6.3.2 Versions
Description
Table 1 has the following columns:
• Hardware
– Basic Device
Shows the basic device.
• Name
Shows the name of the device or module.
• Revision
Shows the hardware version of the device.
• Article number
Shows the article number of the device or described module.
Table 2 has the following columns:
• Software
– Firmware
Shows the current firmware version. If a new firmware file was downloaded and the
device has not yet restarted, the firmware version of the downloaded firmware file is
displayed here. After the next restart, the downloaded firmware is activated and used.
– Bootloader
Shows the version of the boot software stored on the device.
– Firmware_Running
Shows the firmware version currently being used on the device.
• Description
Shows the short description of the software.
• Version
Shows the version number of the software version.
• Date
Shows the date on which the software version was created.
6.3.3 I&M
Description
The table has the following rows:
• Manufacturer ID
Shows the manufacturer ID.
• Article number
Shows the article number.
• Basic MAC Address
Shows the MAC address of the IPv4 interface.
• Serial Number
Shows the serial number.
• Hardware Revision
Shows the hardware version.
• Software Revision
Shows the software version.
• Function tag
Shows the function tag (plant designation) of the device. The plant designation (HID) is
created during configuration of the device with HW Config of STEP 7.
• Location tag
Shows the location tag of the device. The location identifier (LID) is created during
configuration of the device with HW Config of STEP 7.
• Date
Shows the date created by STEP 7 during configuration of the device with HW Config.
• Descriptor
Shows the description created during configuration of the device with HW Config of STEP 7.
[Link] ARP-Tabelle
• IP Address
Shows the IPv4 address of the destination device.
• Media Type
Shows the type of connection.
– Dynamic
The device recognized the address data automatically.
– Static
The addresses were entered as static addresses.
Logging events
The device allows you to log occurring events, some of which you can specify on the page of the
System > Events menu. This, for example, allows you to record when an authentication attempt
failed or when the connection status of a port has changed.
The content of the events log table is retained even when the device is turned off.
You cannot configure anything on this page.
Description
The page contains the following boxes:
Severity filter
You can filter the entries in the table according to severity. Select the required entries in the
check boxes above the table.
Note
A maximum of 2000 entries in the table are possible for each severity. If the maximum number
of entries is reached for a severity, the oldest entries of this severity are overwritten in the table.
The table remains permanently in the memory.
Under "System > Event > Configuration", you can specify a limit for the entries for each severity
with "Log Table Alarm Threshold". If the specified limit will be reached with the next entry, an
alarm message is output.
• Info
When this parameter is enabled, all entries of the category "Info" are displayed.
• Warning
When this parameter is enabled, all entries of the category "Warning" are displayed.
• Critical
When this parameter is enabled, all entries of the category "Critical" are displayed.
To display all entries, either select all of them or leave the check boxes empty.
The table has the following columns:
• Restart
Counts the number of restarts since you last reset to factory settings and shows the device
restart after which the corresponding event occurred.
• System Up Time
Shows the time the device has been running since the last restart when the described event
occurred.
• System Time
Shows the system time in the format MM/DD/YYYY hh:mm:ss.
If the system time is set, the date and time of the described occurring event is displayed.
If no system time is set or time synchronization has not yet taken place, the system time that
has elapsed since the last restart is shown. After a restart, the time of day begins at
01/01/2000 [Link].
• Severity
Shows the severity of the message.
• Log Message
Displays a brief description of the event that has occurred. You will find the list of possible
messages in Appendix D (Page 327) of the configuration manual.
Description
• Severity Filters
You can filter the entries in the table according to severity. To display all the entries, enable
or disable all parameters.
Note
A maximum of 2000 entries in the table are possible for each severity. If the maximum
number of entries is reached for a severity, the oldest entries of this severity are overwritten
in the table. The table remains permanently in the memory.
– Info
Information
When this parameter is enabled, all entries of the category "Info" are displayed.
– Warning
Warnings
When this parameter is enabled, all entries of the category "Warning" are displayed.
– Critical
Critical
When this parameter is enabled, all entries of the category "Critical" are displayed.
6.3.6 Faults
Error status
If a fault occurs, it is shown on this page. On the device, faults are indicated by the red fault LED
lighting up.
Internal faults of the device and faults that you configure on the following pages are
indicated:
• "System > Events"
• "System > Fault Monitoring"
The calculation of the time of a fault always begins after the last system start. If there are no
faults present, the fault LED switches off.
Description
The page contains the following boxes:
• No. of Signaled Faults
Indicates how often the fault LED lit up and not how many faults occurred.
The table contains the following columns:
• Fault Time
Shows the time the device has been running since the last restart when the described fault
occurred.
• Fault Description
Displays a brief description of the error/fault that has occurred.
• Clear Fault State
Some faults can be acknowledged and thus removed from the fault list, e.g. a fault of the
event "Cold/Warm Start". You can acknowledge these faults or remove them from the fault
list with the "Clear Fault State" button.
6.3.7 Redundancy
Introduction
The page shows the current information about the Spanning Tree and the settings of the root
bridge.
If Spanning Tree is turned off, only the basic information about this device is displayed.
If Spanning Tree is turned on, the information about the status of the instance selected in
the "Instance ID" drop-down list is displayed and the information about the configured ports
is shown in the table. The information shown depends on the Spanning Tree mode.
Description
The page contains the following boxes:
• Spanning Tree Mode
Shows the set mode. You specify the mode in "Layer 2 > Spanning Tree".
The following values are possible:
– '-'
– STP
– RSTP
– MSTP
• Instance ID
Shows the number of the instance. The parameter depends on the configured mode.
• Bridge Priority / Root Priority
Which device becomes the root bridge is decided based on the bridge priority. The bridge
with the highest priority (in other words, with the lowest value for this parameter) becomes
the root bridge. If several devices in a network have the same priority, the device whose MAC
address has the lowest numeric value will become the root bridge. Both parameters, bridge
priority and MAC address together form the bridge identifier. Since the root bridge manages
all path changes, it should be located as centrally as possible due to the delay of the frames.
The value for the bridge priority is a whole multiple of 4096 with a range of values from 0 to
32768.
• Bridge Address / Root Address
The bridge address shows the MAC address of the device and the root address shows the MAC
address of the root bridge.
• Root Cost
The path costs from this device to the root bridge.
• Oper. Version
Describes the type of spanning tree in which the port operates
• Priority
If the path calculated by the spanning tree is possible over several ports of a device, the port
with the highest priority (in other words the lowest value for this parameter) is selected. A
value between 0 and 240 can be entered for the priority in steps of 16. If you enter a value
that cannot be divided by 16, the value is automatically adapted. The default is 128.
• Path Cost
This parameter is used to calculate the path that will be selected. The path with the lowest
value is selected as the route. If several ports of a device have the same value, the port with
the lowest port number is selected.
The calculation of the path costs is based largely on the transmission speed. The higher the
achievable transmission speed is, the lower the value of the path costs.
Typical values for path costs with rapid spanning tree:
– 10,000 Mbps = 2,000
– 1000 Mbps = 20,000
– 100 Mbps = 200,000
– 10 Mbps = 2,000,000
• Edge Type
Shows the type of the connection. The following values are possible:
– Edge Port
Description
• Interface
Shows the available interfaces.
• In Octet
Shows the number of received bytes.
• Out Octet
Shows the number of sent bytes.
• In Unicast
Shows the number of received unicast frames.
• In Non Unicast
Shows the number of received frames that are not of the type unicast.
• Out Unicast
Shows the number of sent unicast frames.
• Out Non Unicast
Shows the number of sent frames that are not of the type unicast.
• In Errors
Shows the number of all possible RX errors, refer to the "Packet Error" tab.
Description
• Port
Shows the available ports.
• Frame lengths
The other columns after the port number contain the absolute numbers of incoming frames
according to their frame length.
The following frame lengths are distinguished:
– 64 bytes
– 65 - 127 bytes
– 128 - 255 bytes
– 256 - 511 bytes
– 512 - 1023 bytes
– 1024 - Max.
Description
• Port
Shows the available ports.
• Unicast/Multicast /Broadcast
The other columns after the port number contain the absolute numbers of the incoming
frames according to their frame type "Unicast", "Multicast" and "Broadcast"
Description
• Port
Shows the available ports.
• Error types
The other columns after the port number contain the absolute numbers of the incoming
frames according to their error.
In the columns of the table, a distinction is made according to the following errors:
– CRC (Cyclic Redundancy Code)
The packet length is between 64 and 2048 bytes. The CRC of the packet is invalid.
– Undersize
The packet length is less than 64 bytes. The CRC of the packet is valid.
– Oversize
The packet size is more than 2048 bytes. The CRC of the packet is valid.
– Fragments
The packet length is less than 64 bytes. The CRC of the packet is invalid.
– Jabbers
The frame length is more than 2048 bytes. The CRC of the packet is invalid.
– Collisions
Frames in which a collision event was detected.
Address filtering
This WBM page shows the current content of the learning table. This table lists the source
addresses of unicast address frames.
Description
The table contains the following columns:
• VLAN ID
Shows the VLAN ID of the node.
Note
This column appears in the table only if a VLAN is configured.
• MAC Address
Shows the MAC address of the node.
• Status
Shows the status of each address entry:
– Learnt
The specified address was learned by receiving a frame from this node and will be deleted
when the aging time expires if no further packets are received from this node.
– Invalid
These values are not evaluated.
• Port
Shows the port via which the node with the specified address can be reached. Frames
received by the device whose destination address matches this address will be forwarded to
this port.
6.3.10 LLDP
Description
The table contains the following columns:
• System Name
System name of the connected device.
• Device ID
Device ID of the connected device. The device ID corresponds to the device name assigned
via SINEC PNI (STEP 7). If no device name is assigned, the MAC address of the device is
displayed.
• Local Interface
Port at which the device received the information.
• Hold Time[s]
Hold time in seconds
An entry remains stored on the device for the time specified here. If the device does not
receive any new information from the connected device during this time, the entry is deleted.
• Capability
Shows the properties of the connected device:
– Router
– Bridge
– Telephone
– DOCSIS Cable Device
– WLAN Access Point
– Repeater
– Station
– Other
• Port ID
Port of the device with which the device is connected. If no port ID is assigned, the MAC
address of the connected device is shown.
Introduction
This page shows the routes currently being used.
Description
The table has the following columns:
• Destination Network
Shows the destination address of this route.
• Subnet Mask
Shows the subnet mask of this route.
• Gateway
Shows the gateway for this route.
• Interface
Shows the interface for this route.
• Metric
Shows the metric of the route. The higher value, the longer packets require to their
destination.
• Routing Protocol
Shows the routing protocol from which the entry in the routing table originates. The
following entries are possible:
– Connected: Connected routes
– Static: Static routes
– DHCP: Routes via DHCP
6.3.12 IPv6-Routing
Introduction
This page shows the IPv6 routes currently being used.
Description
The table has the following columns:
• Destination Network
Shows the destination address of this route.
• Prefix Length
Shows the prefix length of this route.
• Gateway
Shows the gateway for this route.
• Interface
Shows the interface for this route.
• Metric
Shows the metric of the route. The higher value, the longer packets require to their
destination.
• Routing Protocol
Shows the routing protocol from which the entry in the routing table originates. The
following entries are possible:
– Connected: Connected routes
– Static: Static routes
– RIPng: Routes via RIPng
– OSPFv3: Routes via OSPFv3
– Other: Other routes
6.3.13 SNMP
This page displays the created SNMPv3 groups. You configure the SNMPv3 groups in "System >
SNMP".
Description
The table has the following columns:
• Group Name
Shows the group name.
• User Name
Shows the user that is assigned to the group.
6.3.14 Security
[Link] Overview
This page shows the security settings and the local and external user accounts.
Description
Services
• Login Authentication
Configure the setting under "Security > AAA > General".
– Local
The authentication must be made locally on the device.
– RADIUS
The authentication must be handled via a RADIUS server.
– Local and RADIUS
The authentication is possible both with the users that exist on the device (user name and
password) and via a RADIUS server.
The user is first searched for in the local database. If the user does not exist there, a RADIUS
request is sent.
– RADIUS and fallback Local
The authentication must be handled via a RADIUS server.
A local authentication is performed only when the RADIUS server cannot be reached in
the network.
• Password Policy
Shows which password policy is currently being used.
Local and external user accounts
Configure local user accounts and roles under "Security > Users".
When you create a local user account an external user account is generated automatically.
Local user accounts involve users each with a password for logging in on the device.
In the "External User Accounts" table, a user is linked to a role, e.g. the "user" role is assigned
to the "Service" user. The user is defined on a RADIUS server. The role is defined locally on
the device. When a RADIUS server authenticates a user, the corresponding group however is
unknown or does not exist, the device checks whether or not there is an entry for the user
in the table "External User Accounts". If an entry exists, the user is logged in with the rights
of the associated role. If the corresponding group is known on the device, both tables are
evaluated. The user is assigned the role with the higher rights.
Note
The table "External User Accounts" is only evaluated if you have set "SiemensVSA" in the RADIUS
Authorization Mode.
Note
The values displayed depend on the role of the logged-on user.
The page shows the function rights available locally on the device.
[Link] Roles
Note
The values displayed depend on the role of the logged-on user.
Description
The table contains the following columns:
• Role
Shows the name of the role.
• Function Right
Shows the function right of the role:
– 1
Users with this role can read device parameters but cannot change them.
– 15
Users with this role can both read and change device parameters.
– 0
This is a role that the device assigns internally when a user could not be authenticated.
The user is denied access to the device.
• Description
Shows a description of the role.
[Link] Groups
Note
The values displayed depend on the role of the logged-on user.
This page shows which group is linked to which role. The group is defined on a RADIUS
server. The roll is defined locally on the device.
Note
This WBM page is only available in access point mode.
The WBM page shows a list of the devices with which the clients are allowed to communicate.
Description
The table has the following columns:
• Radio
Shows the available WLAN interfaces to which the settings relate.
• Port
Shows the VAP interface to which the settings relate.
• MAC Address
Shows the MAC address of the device with which the client may communicate.
• IP Address
Shows the IPv4 address of the device with which the client may communicate.
• Resolver IP Address
Shows the IPv4 address with which the access point resolves the permitted IPv4 address.
6.3.15 WLAN
[Link] Overview AP
Note
This page is available only in access point mode.
Description
Table 1 has the following columns:
• Radio
Shows the available WLAN interfaces.
• WLAN Mode
Shows the transmission standard. If DFS is activated, the transmission standard "802.11h" is
not shown additionally but only the configured transmission standard with the suffix "DFS".
• Configured Channel
Shows the configured channel. If "Auto" is displayed, the access point searches for a free
channel itself.
• Alternative DFS Channel
If the DFS function is enabled, the configured alternative channel of the access point is
displayed.
If "Auto" is displayed, the access point searches for an alternative channel itself.
If the DFS function is activated and the access point searches for competing radar signals for
60 seconds before starting communication with the selected channel, the text "scanning ..."
is displayed instead of the channel.
• Operational channel
Shows the channel including the frequency via which the access point communicates.
At 80 MHz the channel range is displayed additionally.
• Channel Width [MHz]
Shows the set channel bandwidth.
– 20 MHz
– 40 MHz (only with IEEE 802.11n/ac/ax)
– 80 MHz (only with IEEE 802.11ac/ax)
• iFeatures
Shows which iFeatures are used.
– "-"
iFeatures are not used.
– iPRP
– iPCF-2
• Status
Shows the status of the WLAN interface.
– enabled
The WLAN interface is enabled.
– disabled
The WLAN interface is disabled.
Table 2 has the following columns:
• Radio
Shows the available WLAN interfaces in this column.
• Port
Shows the port of the virtual access point (VAP).
• MAC Address
Shows the MAC address of the virtual access point.
• SSID
Shows the SSID.
• PMF
Shows whether the management frames are cryptographically protected.
– disabled
The management frames are not encrypted.
– required
The management frames are always encrypted. A connection of the WLAN clients to the
access point is only possible when these also support PMF.
– optional
The management frames are encrypted or unencrypted depending on support of the
WLAN client.
• Security
Shows which authentication method is used.
If the authentication method "Open System + Encryption" or "Shared Key" is used, the
"Encrypted (WEP/AES)" authentication method is displayed for both.
If the access point is connected to a client that supports Fast BSS Transition, "FT" is displayed
in addition to the authentication method.
• Status
Shows the status of the WLAN interface.
– enabled
The WLAN interface is enabled.
– disabled
The WLAN interface is disabled.
Note
This WBM page is only available in access point mode.
Associated stations
The WBM page shows the clients logged on to the access point as well as additional information,
for example status, signal strength, MAC address.
Description
• Associated stations
Shows the number of clients logged in to the access point.
The table has the following columns:
• AID (Associated ID)
Shows the connection ID of the client. If the client connects to the access point via the VAP
interface, the client is assigned a connection ID. The connection ID is unique within a VAP
interface. If two clients log in at different VAP interfaces, both clients can receive the same ID.
• Radio
Shows the available WLAN interfaces.
• Port
Shows the VAP interface.
• Frequency Band
Shows the frequency band.
– 2.4 GHz
– 5 GHz
• Type
Shows the client type, for example "Sta" stands for IEEE 802.11 standard client.
• MAC Address
Shows the MAC address of the client.
• System Name
Shows the system name of the client if the client communicates this to the access point. Not
all clients support this parameter.
• Channel
Shows the channel over which the client communicates with the access point.
• Signal Strength [dBm]
Shows the signal strength of the connected client in decibel milliwatts.
• Signal strength [%]
Shows the signal strength of the connected client as a percentage.
• Age [s]
Shows the time that has elapsed since the last client activity.
• Security
Shows which authentication method is used.
• WLAN Mode
Shows the transmission standard. If DFS is activated, the transmission standard "802.11h" is
not shown additionally but only the configured transmission standard. e.g. "802.11a".
• Max. Data Rate (Mbps)
Shows the maximum data transmission speed in megabits per second.
• State
Shows the current state of the connection, for example "connected" that means the client is
connected to the access point and is ready to communicate with the AP.
[Link] Overlap AP
Note
This page is available only in access point mode.
Overlapping channels
For optimum data throughput, it is important that the set wireless channel is not used by other
access points. In the 2.4 GHz band (802.11b, 802.11g or 802.11n), the channels overlap, so that
an access point not only occupies the configured channel, but also the neighboring 2-3
channels. You should therefore make sure that there is adequate channel spacing to
neighboring access points.
The WBM page shows all access points that are visible on the set channel at 2.4 GHz or
at 5 GHz. If entries exist here, the maximum data throughput of the access point and the
availability of the communication link to the access point is potentially impaired.
Description
Table 1 has the following columns:
• Radio
Shows the available WLAN interfaces.
• Aging Time [min]
Specify the life time of the entries in the list. If an access point is inactive for longer than the
set time, it is removed from the list.
Note
Changing the aging time
The aging time is a WLAN setting. For this reason, if a change is made, the WLAN connection
is briefly interrupted to accept the new value.
• BSSID
Shows the MAC address of the access point.
• System Name
Shows the system name of the SCALANCE W device. The entry depends on the access point.
Not all access points support this parameter.
• Channel
Indicates the channel over which the access point is communicating.
• Signal Strength [dBm]
Shows the signal strength of the access point in decibel milliwatts.
• Signal strength [%]
Shows the signal strength of the access point as a percentage.
• Age [s]
Shows the time that has elapsed since the last access point activity.
• Security
Shows which authentication method is used.
• WLAN Mode
Shows the transmission standard. If DFS is activated, the transmission standard "802.11h" is
not shown additionally but only the configured transmission standard with the suffix "DFS".
Note
This page is only available for clients or access points in client mode.
The page shows an overview of the existing clients and their configuration.
Description
• Radio
Shows the available WLAN interfaces.
• WLAN Mode
Shows the transmission standard.
• MAC Mode
Shows how the MAC address is assigned to the interface.
– Own
The client uses the MAC address of the Ethernet interface for the WLAN interface.
– Layer 2 Tunnel
The client uses the MAC address of the Ethernet interface for the WLAN interface. The
network is also informed of the MAC addresses connected to the Ethernet interface of the
client. Up to eight MAC addresses can be used.
• MAC Address
Shows the MAC address of the WLAN interface.
• Operational channel
Shows the channel including frequency of the access point to which the client is connected.
• Channel Width [MHz]
Shows the set channel bandwidth.
– 20 MHz
– 40 MHz (only with IEEE 802.11n/ac/ax)
– 80 MHz (only with IEEE 802.11ac/ax)
• Connected BSSID
Shows the MAC address of the access point to which the client is connected.
• Connected SSID
Shows the SSID of the access point to which the client is connected.
• PMF
Shows whether the management frames are cryptographically protected.
– disabled
The management frames are not encrypted.
– required
The management frames are always encrypted. A connection of the WLAN clients to the
access point is only possible when these also support PMF.
– optional
The management frames are encrypted or unencrypted depending on support of the
access point.
• Security
Shows which authentication method is used.
If the client is connected to an access point that supports Fast BSS Transition, "FT" is displayed
in addition to the authentication method.
• Context
Shows which security context is used.
• iFeatures
Shows which iFeatures are used.
– "-"
iFeatures are not used.
– iPRP
• Max. Data Rate [Mbps]
Shows the maximum data transmission speed in megabits per second.
• Status
Shows the status of the WLAN interface.
– enabled
The WLAN interface is enabled.
– disabled
The WLAN interface is disabled.
Note
This page is only available for clients or access points in client mode.
This page shows all the access points visible to the client. The list also includes the access
points to which the client cannot connect due to its configuration.
Description
The table has the following columns:
• Radio
Shows the WLAN interface visible to the access point.
• Frequency Band
Shows the frequency band.
– 2.4 GHz
– 5 GHz
• SSID
Shows the SSID of the access point.
• BSSID
Shows the MAC address of the access point.
• System Name
Shows the system name of the access point. The entry depends on the access point. Not all
access points support this parameter.
• Channel
Shows the channel on which the access point transmits or communicates.
• Signal Strength [dBm]
Shows the signal strength of the access point in dBm.
• Signal strength [%]
Shows the signal strength of the access point as a percentage.
• Type
Shows the mode of the WLAN interface.
• Security
Shows which authentication method is used.
• Fast transition (FT)
Shows whether the access point supports Fast BSS Transition:
– "-"
FT is not supported or is not available.
– Over the Air
FT available wirelessly in access point. The client communicates with the destination
access point directly and wirelessly.
• WLAN Mode
Shows the transmission standard. If DFS is activated, the transmission standard "802.11h" is
not shown additionally but only the configured transmission standard, for example
"802.11n".
• State
Shows the status of the access point, for example whether or not the access point is available.
[Link] IP Mapping
Note
This WBM page is only available for clients or access points in client mode.
You can make WLAN access available for several SCALANCE W devices with one client if you
use IP mapping. This means that you do not need to equip every SCALANCE W device with
its own WLAN client. The prerequisite for this is that the connected SCALANCE W devices are
addressed only with IP frames. Communication at MAC address level (ISO/OSI layer 2) can
• be established with one component whose MAC address is configured on the client,
• be established with a maximum of eight components if the "Layer 2 Tunnel" function is
selected.
The "Layer 2 Tunnel" setting meets the requirements of industrial applications in which MAC
address-based communication takes place with several SCALANCE W devices downstream
from the client. Clients with this setting cannot connect on standard Wifi access points.
The client maintains a table with the assignment of MAC address and IP address to send
incoming IP frames to the correct MAC address. This WBM page shows this table.
Note
IP mapping table
If "Layer 2 Tunnel" is configured for a client, the IP mapping table is not displayed.
Description
The table has the following columns
• MAC Address
The MAC address of a device located downstream from the WLAN client from the perspective
of the access point.
• IP Address
The IP address managed for this device by the WLAN client.
• Type
There are two options for the type:
– system
The information relates to the WLAN client itself.
– learned
The information relates to a device downstream from the WLAN client.
MAC mode
Frames sent by the client to the access point always have the MAC address of the WLAN client
as the source MAC address. In the "learning table" of the access point there is therefore only the
MAC address of the WLAN client.
If there is only IP communication between the access point and the client, the default setting
"Own" can be retained. If MAC address-based frames are also to be sent by SCALANCE W700
devices downstream from the client, you need to select the "Layer 2 Tunnel" setting.
[Link] Errors
The page shows how many bad data frames were received or sent per WLAN interface in the
client or per VAP in the access point. If an increased number of errors occurs, you should check
the settings for the WLAN interface(s), the setup of the SCALANCE W devices and the connection
quality.
Description
The Sent Errors table has the following columns:
• Interface
Shows the interface to which the entries apply.
• Error types
The other columns after the WLAN interface contain the absolute numbers of the data
frames sent according to their error type.
The columns of the table distinguish between the following error types:
– Transmission Errors
Shows the number and percentage of bad data frames that were sent.
– Retry Count
Shows the number and percentage of data frames sent successfully that required one or
more retries.
Description
The table has the following columns:
• Interface
Shows the interface to which the entries apply.
• Frame types
The other columns after the interface contain the absolute numbers of the sent frames
according to the frame types.
In the columns of the table, a distinction is made according to the following frame types:
– Data Frames
Shows the number of sent data frames.
– Multicast/Broadcast Frames
Shows the number of sent multicast and broadcast frames.
– Unicast Frames
Shows the number of sent unicast frames.
– Average Rate [kbps]
Shows the average data rate of the last data frames sent.
Description
The table has the following columns:
• Interface
Shows the interface to which the entries apply.
• Frame types
The other columns after the interface contain the absolute numbers of the received frames
according to the frame types.
In the columns of the table, a distinction is made according to the following frame types:
– Data Frames
Shows the number of sent data frames.
– Multicast/Broadcast Frames
Shows the number of sent multicast and broadcast frames.
– Unicast Frames
Shows the number of sent unicast frames.
– Average Rate [kbps]
Shows the average data rate of the last data frames sent.
[Link] iPRP
You can check the iPRP connection and its settings on this page.
'LVSOD\LQDFFHVVSRLQWPRGH
'LVSOD\LQFOLHQWPRGH
Description
The table has the following columns:
• Radio
Shows the WLAN interfaces via which the client is connected to the access point.
• Port (only in access point mode)
Shows the VAP interface on which the iPRP clients are logged in. The column is hidden when
the table is empty.
• iPRP Client
Shows the MAC address of the iPRP client.
• Activity State
Shows the status of the iPRP connection. In the "inactive" status, the connection to at least
one connected device is interrupted.
• Partner Client
Shows the MAC address of the partner client. If the connection to the partner client is
interrupted, 'ff-ff-ff-ff-ff-ff' is output.
• Partner BSS
Shows the MAC address of the access point to which the partner client is connected. If the
connection to the access point of the partner client is interrupted, 'ff-ff-ff-ff-ff-ff' is output.
• Delete Frames Sent
Shows the number of sent iPRP delete frames that the device has sent to its partner device.
• Delete Frames Received
Shows the number of iPRP delete frames that the device has received from its partner device.
• Frames Deleted
Shows the number of frames that were deleted from the send queue due to the iPRP delete
frame.
• Scanning Sync State (in client mode only)
"Scanning Sync" indicates how the search for access points should take place.
The following status is possible:
– idle: Idle. No scan.
6.4.1 Configuration
System configuration
This page contains the configuration overview of the access options of the device.
Specify the services that access the device. With some services, there are further
configuration pages on which more detailed settings can be made.
The standard port can also be changed for your own services.
Note
Change standard port
Some programs can only access the service over the standard port, e.g. TIA Portal accesses
HTTPS over standard port 443. Before you change the port, check which port the program uses.
When you change the standard port, you must access the service using the changed port.
Reserved ports
Some ports are permanently reserved. Make sure that the specified port is not already in use. You
can find the ports used in the "List of available services".
Description
The page contains the following boxes:
• Telnet Server
Enable or disable the "Telnet Server" service for unencrypted access to the CLI.
• Telnet port
Standard port 23 is the default. You can optionally enter a port number in the range 1024 …
49151 or 49500 ... 65535.
• SSH Server
Enable or disable the "SSH Server" service for encrypted access to the CLI.
• SSH port
Standard port 22 is the default. You can optionally enter a port number in the range 1024 …
49151 or 49500 ... 65535.
• SSH key exchange algorithm level
From the drop-down list, select the level of the SSH key exchange algorithm for SSH access
to the CLI. The settings options are "Low" and "High". The two levels contain the following
encryption algorithms:
– High
Curve25519-sha256
Curve25519-sha256@[Link]
Ecdh-sha2-nistp256
Ecdh-sha2-nistp384
Ecdh-sha2-nistp521
Note
If you experience problems connecting to SSH clients (TeraTerm, PuTTY, STS) when the
level is set to "High", a possible cause is that the SSH clients do not support the exchange
algorithms of the "High" setting.
Make sure that you are using the latest versions of the SSH clients.
– Low
Curve25519-sha256
Curve25519-sha256@[Link]
Ecdh-sha2-nistp256
Ecdh-sha2-nistp384
Ecdh-sha2-nistp521
Diffie-hellman-group16-sha512
Diffie-hellman-group18-sha512
Diffie-hellman-group14-sha256
Diffie-hellman-group14-sha1
With the "Low" setting, you cannot set up a connection to the following SSH clients because
these programs do not support the respective algorigthms:
– TeraTerm
– PuTTY
– STS
• HTTP server
Enable or disable the "HTTP Server" service for unencrypted access to the WBM.
• HTTP port
Standard port 80 is the default. You can optionally enter a port number in the range 1024 …
49151 or 49500 ... 65535.
• HTTPS server
Enable or disable the HTTPS server service for encrypted access to the WBM.
• HTTPS port
Standard port 443 is the default. You can optionally enter a port number in the range 1024
… 49151 or 49500 ... 65535.
• HTTP Services
Specify how the WBM is accessed:
– HTTPS
Access to the WBM is only possible with HTTPS.
– HTTP/HTTPS
Access to the WBM is possible with HTTP and HTTPS.
– Redirect HTTP to HTTPS
Access via HTTP is automatically diverted to HTTPS.
• Minimum TLS Version
Select the minimum TLS version to be used for the encryption from the drop-down list.
Communication is not possible with devices that do not support the required TLS version.
• SMTP Client
Enable or disable the SMTP client. You can configure other settings in "System > SMTP Client".
• Syslog Client
Enable or disable the Syslog client. You can configure other settings in "System > Syslog
Client".
• DCP Server
Specify whether or not the device can be accessed with DCP (Discovery and Configuration
Protocol):
– "-" (disabled)
DCP is disabled. Device parameters can neither be read nor modified.
– Read/Write
With DCP, device parameters can be both read and modified.
– Read Only
With DCP, device parameters can be read but cannot be modified.
• Time
Select the setting from the drop-down list. The following settings are possible:
– Manual
The system time is set manually. You can configure other settings in "System > System
Time > Manual Setting".
– SIMATIC Time
The system time is set using a SIMATIC time transmitter. You can configure other settings
in "System > System Time > SIMATIC Time Client".
– SNTP Client
The system time is set via an SNTP server. You can configure other settings in "System >
System Time > SNTP Client".
– NTP Client
The system time is set via an NTP server. You can configure other settings in "System >
System Time > NTP Client".
• SNMP
Select the protocol from the drop-down list. The following settings are possible:
– "-" (SNMP disabled)
Access to device parameters via SNMP is not possible.
– SNMPv1/v2c/v3
Access to device parameters is possible with SNMP versions 1, 2c or 3. You can configure
other settings in "System > SNMP > General".
– SNMPv3
Access to device parameters is possible only with SNMP version 3. You can configure other
settings in "System > SNMP > General".
• SNMPv1/v2 Read-Only
Enable or disable write access to SNMP variables with SNMPv1/v2c.
• SINEMA Configuration Interface
If the SINEMA configuration interface is enabled, you can download configurations to the
device via the TIA Portal.
• Configuration Mode
Select the mode from the drop-down list. The following modes are possible:
– Automatic Save
Automatic backup mode. Approximately 1 minute after the last parameter change or
when you restart the device, the configuration is automatically saved. In addition to this,
the following message appears in the display area "Changes will be saved automatically
in x seconds. Press 'Write Startup Config' to save the changes immediately."
Note
Interrupting the save
Saving starts only after the timer in the message has elapsed. How long saving takes
depends on the device.
During saving, the following message is displayed: "Saving configuration data in progress.
Please do not switch off the device".
Do not switch off the device immediately after the timer has elapsed.
– Trial
Trial mode. In Trial mode, although changes are adopted, they are not saved in the
configuration file (startup configuration).
To save changes in the configuration file, use the "Write startup config" button. The display
area also shows the message "Trial Mode Active – Press "Write Startup Config" button to
make your settings persistent" as soon as there are unsaved modifications. This message
can be seen on every WBM page until the changes made have either been saved or the
device has been restarted.
• Retain Digital Output (only for device variants with DI/DO)
When the option is enabled, the current state of the digital output is saved in the
configuration and restored after a restart.
Default value: Disabled.
Procedure
1. To use the required function, select the respective check box.
2. Select the options you require from the drop-down lists.
3. Click the "Set Values" button.
6.4.2 General
[Link] Device
The boxes "Current System Time", "System Up Time" and "Device Type" cannot be changed.
Description
The page contains the following boxes:
• Current System Time
Shows the current system time. The system time is either set by the user or by a time-of-day
frame: either SINEC H1 time-of-day frame, NTP or SNTP. (readonly)
• System Up Time
Shows the operating time of the device since the last restart. (readonly)
• Device Type
Shows the type designation of the device. (readonly)
• System Name
You can enter the name of the device. The entered name is displayed in the selection area.
A maximum of 255 characters are possible.
The system name is also displayed in the CLI input prompt. The number of characters in the
CLI input prompt is limited. The system name is truncated after 16 characters.
• System Contact
You can enter the name of a contact person responsible for managing the device. A
maximum of 255 characters are possible.
• System Location
You can enter the location where the device is installed. The entered installation location is
displayed in the selection area. A maximum of 255 characters are possible.
Note
The ASCII code 0x20 to 0x7e is used in the input boxes.
Procedure
1. Enter the contact person responsible for the device in the "System Contact" input box.
2. Enter the identifier for the location at which the device is installed in the "System Location"
input box.
3. Enter the name of the device in the "System Name" input box.
4. Click the "Set Values" button.
[Link] Coordinates
Description
The page contains the following input boxes with a maximum length of 32 characters.
• "Latitude" input box
Geographical latitude: Here, enter the value for the northerly or southerly latitude of the
location of the device.
For example, the value +49° 1´31.67" means that the device is located at 49 degrees, 1 arc
minute and 31.67 arc seconds northerly latitude.
A southerly latitude is shown by a preceding minus character.
You can also append the letters N (northerly latitude) or S (southerly latitude) to the numeric
information (49° 1´31.67" N).
• "Longitude" input box
Geographic longitude: Here, you enter the value of the eastern or western longitude of the
location of the device.
The value +8° 20´58.73" means that the device is located at 8 degrees, 20 minutes and
58.73 seconds east.
A western longitude is indicated by a preceding minus sign.
You can also add the letter E (easterly longitude) or W (westerly longitude) to the numeric
information (8° 20´58.73" E).
• Input box: "Height"
Height Here, you enter the value of the geographic height above sea level in meters.
For example, 158 m means that the device is located at a height of 158 m above sea level.
Heights below sea level (for example the Dead Sea) are indicated by a preceding minus sign.
Procedure
1. Enter the calculated latitude in the "Latitude" input box.
2. Enter the calculated longitude in the "Longitude" input box.
3. Enter the height above sea level in the "Height" input box.
4. Click the "Set Values" button.
6.4.4 DNS
You can manually configure up to three DNS servers with IPv4 addresses on this page. Using
DHCP, the device can learn two DNS servers with IP addresses.
If there is more than one DNS server, the order in the table specifies the order in which
the servers are queried. The top server is queried first. A total of two DNS servers can be
configured on the device. Manually configured DNS servers are given preference.
If this function is enabled, the device can communicate with a DNS server as a DNS client.
You have the option of entering names in IP address boxes.
Note
Update from V1.0 to V1.1
The configuration of the DNS client is not transfered with an update from V1.0 to V1.1.
Note
The DNS client function can only be used if there is a DNS server in the network.
Description
The page contains the following boxes:
• DNS Client
Select or clear the check box indicating that the device operates as a DNS client.
• Used DNS Servers
Here you specify which DNS server the device uses:
– learned only
The device uses only the DNS servers assigned by DHCP.
– manual only
The device uses only the manually configured DNS servers. The DNS servers must be
connected to the Internet. A maximum of two DNS servers can be configured.
– all
The device uses all available DNS servers.
• DNS Server Address
Enter the IP address of the DNS server.
The table contains the following columns:
• Select
Select the check box in the row to be deleted.
• DNS Server Address
Shows the IP address of the DNS server.
• Origin
This shows whether the DNS server was configured manually or was assigned by DHCP.
Procedure
Activating DNS
1. Enable the "DNS-Client" check box.
2. Click the "Set Values" button.
Creating a DNS server
1. In the "DNS Server Address" box, enter the IP address of the DNS server.
2. Click the "Create" button.
Filtering DNS servers
1. In the "Used DNS Servers" drop-down list, select which DNS servers are to be used.
2. Click the "Set Values" button.
6.4.5 Restart
[Link] Restart
Restart
Note the following points about restarting a device:
• You can only restart the device with administrator privileges.
• A device should only be restarted with the buttons of this menu or with the appropriate CLI
commands and not by a power cycle on the device.
• If the device is in "Trial" mode, configuration modifications must be saved manually before a
restart. Any modifications you have made only become active on the device after clicking the
"Set values" button on the relevant WBM page.
• If the device is in "Automatic Save" mode, the last changes are saved automatically before a
restart.
Description
To restart the device, the buttons on this page provide you with the following options:
• Restart
Click this button to restart the system. You must confirm the restart in a dialog box. During
a restart, the device is reinitialized, the internal firmware is reloaded, and the device runs a
self-test. The settings of the start configuration are retained, e.g. the IP address of the device.
The learned entries in the address table are deleted. You can leave the browser window open
while the device restarts. After the restart you will need to log in again.
• Restore Memory Defaults and Restart
Click this button to restore the factory settings of the device, with the exception of protected
default settings, and to restart the device.
The protected presets include the following parameters:
– IP addresses
– Subnet mask
– IP address of the default gateway.
– DHCP client ID
– DHCP
– System name
– System location
– System contact
– User names and passwords
– Mode of the device
– DHCPv6 Rapid Commit
– PROFINET Name of Station
• Restore Factory Defaults and Restart
Click this button to restore the factory configuration settings and to restart the device. The
protected defaults are also reset. You must confirm the restart in a dialog box.
Note
By resetting all the defaults to the factory configuration settings, the IP address is also lost.
Assign an IP address to the device using DHCP or SINEC PNI.
With the appropriate connection, a previously correctly configured device can cause
circulating frames and therefore the failure of the data traffic.
• Scheduled restart
When you click this button, a timer starts and runs backwards with the defined time. When
the timer has expired, the device restarts.
The following message is also displayed in the display area: "The automatic restart starts in
[..] minutes. Click 'Cancel scheduled restart' to cancel the restart". This message can be seen
on every WBM page until you cancel the restart or the SCALANCE W device is restarted.
Note
Unsaved configuration is lost after reboot
The scheduled restart is performed after the time has elapsed without any further message.
Unsaved configuration changes are lost.
Save the current configuration via "System > Backup of configuration" before setting the
timer for the restart.
Description
• Sleep Duration [min.]
Specify how long the device should remain in power saving mode.
Value range 1 ... 44639. Default value 0: Power saving mode off
• Activate Sleep Mode
Use this button to activate the sleep timer.
Procedure
1. Enter a value of 1 ... 44639 minutes in the "Sleep Duration [min.]" text box.
2. Click on the "Activate Sleep Mode" button.
Result
The device applies the setting for the duration and immediately switches to sleep mode.
Once the time has elapsed, the device returns to the active state. The digital output is
deactivated after the restart.
Note
Retaining the state of the digital output
The device can note the current state of the digital output and restore it after a restart. You can
find more information on the WBM page "System > Configuration".
Change management
On this page, you specify when the WLAN settings become effective on the SCALANCE W device.
If you change a WLAN setting and confirm the change with "Set Values", this change is adopted
and takes effect immediately. To do this, the WLAN connection is briefly interrupted. This means
that you can lose the WLAN connection to your SCALANCE W device before it is fully configured.
With the "Manual Commit" setting, you have the opportunity of first fully configuring the
SCALANCE W device. The changes are accepted, but are not active immediately. The changes
only take effect when you confirm the changes with the "Commit Changes" button.
Note
If you configure the SCALANCE W device via the WLAN interface, we recommend that you use
the "Manual Commit" setting. Check the parameters again before you confirm the changes with
the "Commit Changes" button.
Description
The page contains the following boxes:
• Commit Mode
Select the required setting from the drop-down list.
– Automatic Commit
Each change in the WLAN settings is adopted and is immediately effective when you click
the "Set Values" button. In the default setting, the SCALANCE W device is set to "Automatic
Commit".
– Manual Commit
The changes are accepted, but are not effective immediately. The changes only take
effect when you click the "Commit Changes" button. The "Commit Changes" button is
displayed when you set "Manual Commit".
The following message is also displayed in the display area when there are WLAN
changes: "Manual Commit Mode active - Press 'Commit Changes' button to provide
current configuration to driver". This message can be seen on every WBM page until either
the changes made have taken effect or the SCALANCE W device has been restarted.
Note
When the changes take effect, the WLAN connections to all WLAN interfaces will be
interrupted for a short time. The WLAN driver is started with the new settings.
Note
Configuration files and Trial mode/Automatic Save
In "Automatic Save" mode, the data is saved automatically before the configuration files
(ConfigPack and Config) are transferred.
In "Trial" mode, although the changes are adopted, they are not saved in the configuration files
(ConfigPack and Config). Use the "Write Startup Config" button on the "System > Configuration"
WBM page to save changes in the configuration files.
You can download existing CLI configurations (RunningCLI) and upload your own CLI scripts
(Script).
Note
The downloadable CLI script is not intended to be uploaded again unchanged.
CLI commands for saving and loading files cannot be executed with the CLI script file (Script).
[Link] HTTP
Note
This WBM page is available both for connections using HTTP and for connections using HTTPS.
Description
For a clearer overview, the tables are divided into different areas. Each table has the following
columns:
• Type
Shows the name of the file.
Note
Size of certificate files
With certificate files only certificates with a maximum of 8192 bits are supported.
• Description
Shows the short description of the file type.
• Load
With this button, you can load files on the device. The button can be enabled, if this function
is supported by the file type.
• Save
With this button, you can save files from the device. The button can only be enabled if this
function is supported by the file type and the file exists on the device.
• Delete
With this button, you can delete files from the device. The button can only be enabled if this
function is supported by the file type and the file exists on the device.
Note
Following a firmware update, delete the cache of the Web browser.
Procedure
Loading data using HTTP(S)
1. Start the load function by clicking the one of the "Load" buttons.
The dialog for loading a file opens.
2. Go to the file you want to load.
3. Click the "Open" button in the dialog.
The file is now loaded.
Whether or not a restart is necessary, depends on the loaded file. If a restart is necessary, a
message to this effect will be output. Other files are executed immediately, for example the
CLI script file and new settings are applied without a restart.
Saving data using HTTP(S)
1. Start the save function by clicking the one of the "Save" buttons. Depending on the size of the
file this may take some time.
2. Depending on your browser configuration you will be prompted to select a storage location
and a name for the file. Or you accept the proposed file name. To make the selection, use the
dialog in your browser. After making your selection, click the "Save" button.
Deleting data using HTTP(S)
1. Start the delete function by clicking the one of the "Delete" buttons.
The file will be deleted.
Reusing configuration data
If several devices are to receive the same configuration and the IP addresses are assigned
using DHCP, the effort for configuration can be reduced by saving and reading in the
configuration data.
Follow the steps below to reuse configuration data:
1. Save the configuration data of a configured device on your PC.
2. Download this configuration file to all other devices you want to configure.
3. If individual settings are necessary for specific devices, these must be made online on the
relevant device.
Note
Configuration data has a checksum. If you edit the files, you can no longer upload them to the
device.
Password-protected config file
If the file is password-protected, you cannot load the file via DHCP with options 66 and 67.
[Link] TFTP
Description
The page contains the following boxes:
• TFTP Server Address
Here, enter the IP address or the FQDN (Fully Qualified Domain Name) of the TFTP server with
which you exchange data.
• TFTP Server Port
Here, enter the port of the TFTP server via which data exchange will be handled. If necessary,
you can change the default value 69 to your own requirements.
For a clearer overview, the tables are divided into different areas. Each table has the
following columns:
• Type
Shows the name of the file.
Note
Size of certificate files
With certificate files only certificates with a maximum of 8192 bits are supported.
• Description
Shows the short description of the file type.
• Filename
A file name is preset here for every file type.
Note
Changing the file name
You can change the file name preset in this column. After clicking the "Set Values" button, the
changed name is saved on the device and can also be used with the Command Line Interface.
• Actions
Select the action from the drop-down list. The selection depends on the selected file type, for
example the log file can only be saved.
The following actions are possible:
– Save file
With this selection, you save a file on the TFTP server.
– Load file
With this selection, you load a file from the TFTP server.
Procedure
Loading or saving data using TFTP
1. Enter the IP address or the FQDN of the TFTP server in the "TFTP Server Address" input box.
2. Enter the server port to be used in the in the "TFTP server port" input box.
3. Enter the name of a file in which you want to save the data or take the data from in the "File
name" input box.
4. Select the action you want to execute from the "Actions" drop-down list.
5. Click the "Set Values" button to start the selected actions. Depending on the size of the file this
may take some time.
6. After loading the configuration and the SSL certificate, restart the device. The changes only
take effect a restart.
Reusing configuration data
If several devices are to receive the same configuration and the IP addresses are assigned
using DHCP, the effort for configuration can be reduced by saving and reading in the
configuration data.
Follow the steps below to reuse configuration data:
1. Save the configuration data of a configured device on your PC.
2. Download this configuration file to all other devices you want to configure.
3. If individual settings are necessary for specific devices, these must be made online on the
relevant device.
Note that the configuration data is coded when it is saved. This means that you cannot edit
the files with a text editor.
Note
Configuration data has a checksum. If you edit the files, you can no longer upload them to the
device.
Password-protected config file
If the file is password-protected, you cannot load the file via DHCP with options 66 and 67.
[Link] SFTP
Description
The page contains the following boxes:
• SFTP Server Address
Enter the IP address or the FQDN of the SFTP server with which you exchange data.
• SFTP Server Port
Enter the port of the SFTP server via which data exchange will be handled. If necessary, you
can change the default value 22 to your own requirements.
• SFTP User
Enter the user for access to the SFTP server. This assumes that a user with the corresponding
rights has been created on the SFTP server.
The name must meet the following conditions:
– It must be unique.
– It must be between 1 and 250 characters long.
You can find information on the permitted characters in Appendix G of the WBM (Page 353).
• SFTP Password
Enter the password for the user
• SFTP Password Confirmation
Confirm the password.
For a clearer overview, the tables are divided into different areas. Each table has the
following columns:
• Type
Shows the file type.
• Description
Shows the short description of the file type.
• Filename
A file name is preset here for every file type.
Note
Changing the file name
You can change the file name preset in this column. After clicking the "Set Values" button, the
changed name is saved on the device and can also be used with the Command Line Interface.
• Actions
Select the action from the drop-down list. The selection depends on the selected file type, for
example you can only save the log file.
The following actions are possible:
– Save file
With this selection, you save a file on the SFTP server.
– Load file
With this selection, you load a file from the SFTP server.
Procedure
Loading or saving data using SFTP
1. Enter the address of the SFTP server in "SFTP Server Address".
2. Enter the port of the SFTP server to be used in "SFTP Server Port".
3. Enter the user data (user name and password) required for access to the SFTP server.
4. If applicable, enter the name of a file in which you want to save the data or take the data from
in "Filename".
Note
Files whose access is password protected
To be able to load these files on the device successfully, you need to enter the password
specified for the file in "System" > "Load&Save" > "Passwords".
5. Select the action you want to execute from the "Actions" drop-down list.
6. Click "Set Values" to start the selected action.
7. If a restart is necessary, a message to this effect will be output. Click the "OK" button to run
the restart. If you click the "Abort" button, there is no device restart. The changes only take
effect after a restart.
Reusing configuration data
If several identical devices are to receive the same configuration and the IP addresses are
assigned using DHCP, the effort for reconfiguration can be reduced by saving and reading in
the configuration data.
Follow the steps below to reuse configuration data:
1. Save the configuration data of a configured device on your PC.
2. Load these configuration files on all other devices you want to configure in this way.
3. If individual settings are necessary for specific devices, these must be made online on the
relevant device.
Note
Configuration data has a checksum. If you edit the files, you can no longer upload them to the
device.
Password-protected config file
If the file is password-protected, you cannot load the file via DHCP with options 66 and 67.
[Link] Passwords
There are files to which access is password-protected. For example to be able to use the HTTPS
certificate, you need to specify the corresponding password on this WBM page.
Description
The table has the following columns:
• Type
Shows the file type.
• Description
Shows the short description of the file type.
• Setting
When enabled, the file is used. Can only be enabled if the password is configured.
• Password
Enter the password for the file.
Entered passwords cannot be read as plain text; instead asterisks * are displayed.
• Password Confirmation
Confirm the password.
• Status
Shows whether the password corresponds to the file on the device.
– Valid
The "Enabled" check box is selected and the password matches the file.
– Invalid
The "Enabled" check box is selected but the password does not match the file or no file has
been loaded yet.
– '-'
The password cannot be evaluated or is not yet being used. The "Enabled" check box is not
selected.
– Required
A password is required for loading or saving.
Procedure
1. Enter the password in "Password".
2. To confirm the password, enter the password again in "Password Confirmation".
3. Select the "Enabled" option.
4. Click the "Set Values" button.
6.4.8 Events
[Link] Configuration
Description
• Log Table Alarm Threshold
Set the limit for the entries for each severity. A maximum of 2000 entries are possible for each
severity.
If the specified limit will be reached with the next entry, an alarm message is output, e.g. if
1950 is specified, the message that limit 1950 has been reached is output after entry 1949.
With Table 1, you can enable or disable all check boxes of a column of Table 2 at once. Table
1 has the following columns:
• All Events
Shows that the settings are valid for all events of table 2.
• E-mail / Trap / Log Table / Syslog / Faults
Enable or disable the required type of notification for all events. If "No Change" is selected, the
entries of the corresponding column in table 2 remain unchanged.
• Copy to Table
If you click the button, the setting is adopted for all events of table 2.
Procedure
Follow the steps below to change entries:
1. Select the check box in the row of the required event. Select the event in the column under
the following actions:
– E-mail
– Trap
– Log table
– Syslog
– Error
2. Click the "Set Values" button.
Description
The table has the following columns:
• Client Type
Select the client type for which you want to make settings:
– E-mail
Sending system event messages by e-mail
– Log Table
Entry of system events in the log table
– Syslog
Entry of system events in the Syslog file
– WLAN Authentication Log
Entry of system events in the WLAN authentication log
• Severity
Select the desired severity. The following settings are possible:
– Critical
System events with the severity Critical are processed.
– Warning
System events with the Warning severity or higher are processed: This means events of
the categories "Warning" and "Critical".
– Info
System events with the Info severity or higher are processed: This means events of the
categories "Info", "Warning" and "Critical".
Procedure
Follow the steps below to configure the required level:
1. Select the required values from the drop-down lists of the second table column after the
client types.
2. Click the "Set Values" button.
[Link] General
Description
The page contains the following boxes:
• SMTP Client
Enable or disable the SMTP client.
• SMTP Server Address
Enter the IP address or the FQDN of the SMTP server.
• Password Confirmation
Repeat the password.
• Port
Enter the port via which your SMTP server can be reached.
Factory settings:
– 25 (None)
– 465 (SSL/TLS and StartTLS)
• Security
Specify whether transfer of the e-mail from the device to the SMTP server is encrypted. This
is only possible when the SMTP server supports the selected setting.
Note
2-factor authentication (2FA)
2-factor authentication is not supported.
– SSL/TLS
– StartTLS
– None: The e-mail is transferred unencrypted.
• Test
Sends a test email to the configured receivers.
• Test Result
Shows whether the e-mail was sent successfully or not. If sending was not successful, the
message contains possible causes.
Procedure
Configuring the SMTP server
1. Enable the "SMTP Client" function.
2. Enter the IP address of the SMTP server in "SMTP Server Address".
3. Click the "Create" button. A new entry is generated in the table.
4. Enter the name of the sender that will be included in the e-mail for "Sender Email Address".
5. Enter the user name and password if the SMTP server prompts you to log in.
6. Under "Security", specify whether transfer to the SMTP server is encrypted.
7. Enable the SMTP server entry.
8. Click the "Set Values" button.
Note
Depending on the properties and configuration of the SMTP server, it may be necessary to
adapt the "Sender E-Mail Address" input for the e-mails. Check with the administrator of the
SMTP server.
[Link] Recipient
On this page, you specify who receives an e-mail when an event occurs.
Description
The page contains the following boxes:
• SMTP Server
Specify the SMTP server via which the e-mail is sent.
• Email address of the SMTP receiver
Enter the e-mail address to which the device sends an e-mail.
Procedure
Configuring an SMTP receiver
1. Select the required "SMTP server".
2. Enter the email address of the SMTP receiver.
3. Click the "Create" button. A new entry is generated in the table.
4. Activate the "Send" option for the entry.
5. Click the "Set Values" button.
6.4.10 DHCPv4
Description
The page contains the following boxes:
• DHCP client configuration file request (opt. 66, 67)
From the drop-down list, select whether you want the DHCP client to use options 66 and 67
to download a configuration file.
– On
Options 66 and 67 are enabled
– Off
Options 66 and 67 are disabled
• DHCP Mode
Select the DHCP mode from the drop-down list. The following modes are possible:
– via MAC Address
Identification is based on the MAC address.
– via DHCP Client ID
Identification is based on a freely defined DHCP client ID.
– via System Name
Identification is based on the system name. If the system name is 255 characters long, the
last character is not used for identification.
– via PROFINET Name of Station
Identification is based on the PROFINET station name.
The table has the following columns:
• Interface
Interface to which the setting relates.
• DHCP
Enable or disable the DHCP client for the relevant interface.
Procedure
1. Select the required mode from the "DHCP Mode" drop-down list. If you select the DHCP mode
"via DHCP Client ID" an input box appears.
– In the enabled input box "DHCP client ID" enter a string to identify the device. This is then
evaluated by the DHCP server.
2. Select the "DHCP Client Configuration Request (Opt. 66, 67)", if you want the DHCP client to
use options 66 and 67 to download and then enable a configuration file.
3. Enable the "DHCP" option in the table.
4. Click the "Set Values" button.
Note
If a configuration file is downloaded, this can trigger a system restart. If the currently running
configuration and the configuration in the downloaded configuration file differ, the system is
restarted.
Make sure that the option "DHCP Client Configuration Request (Opt. 66, 67)" is no longer set.
6.4.11 SNMP
[Link] General
Configuration of SNMP
On this page, you make the basic settings for SNMP. Enable the check boxes according to the
function you want to use.
Description
The page contains the following boxes:
• SNMP
Select the SNMP protocol from the drop-down list. The following settings are possible:
– "-" (Disabled)
SNMP is disabled.
– SNMPv1/v2c/v3
SNMPv1/v2c/v3 is supported.
Note
Note that SNMP in versions 1 and 2c does not have any security mechanisms.
– SNMPv3
Only SNMPv3 is supported.
• SNMPv1/v2c Read-Only
If you enable this option, SNMPv1/v2c can only read the SNMP variables.
Note
Community String
For security reasons, do not use the standard values "public" or "private". Change the
community strings following the initial installation.
The recommended minimum length for community strings is 6 characters.
For security reasons, only limited access to objects of the SNMPCommunityMIB is possible
with the SNMPv1/v2c Read Community String. With the SNMPv1/v2c Read/Write Community
String, you have full access to the SNMPCommunityMIB.
• SNMP Engine ID
Shows the SNMP engine ID.
• SNMP Agent Listen Port
Specify the port at which the SNMP agent waits for the SNMP queries. Standard port 161 is
the default.
You can optionally enter the standard port 162 or a port number in the range 1024 … 49151
or 49500 ... 65535.
Procedure
1. Select the required option from the "SNMP" drop-down list:
– "-" (disabled)
– SNMPv1/v2c/v3
– SNMPv3
2. Enable the "SNMPv1/v2c Read Only" check box if you only want read access to SNMP variables
with SNMPv1/v2c.
3. Enter the required character string in the "SNMPv1/v2c Read Community String" input box.
4. Enter the required character string in the "SNMPv1/v2c Read/Write Community String" input
box.
5. If necessary, enable the SNMPv3 User Migration.
6. Click the "Set Values" button.
Description
The page contains the following boxes:
• User Name
Enter a freely selectable user name. After you have entered the data, you can no longer
modify the name.
The table has the following columns:
• Select
Select the row you want to delete.
• User Name
Shows the created users.
• Authentication Protocol
Specify the authentication protocol for which a password will be stored.
The following settings are available:
– None
– MD5
– SHA
• Privacy Protocol
Specify the encryption protocol for which a password will be stored. This drop-down list is
only enabled when an authentication protocol has been selected.
The following settings are available:
– None
– DES
– AES
• Authentication Password
Enter the authentication password in the first input box. This password must have at least 1
character, the maximum length is 32 characters.
Use passwords that are as long as possible with a high password strength.
Note
Password policy
• High
Password length: at least 8 characters, maximum 32 characters
At least 1 uppercase letter
At least 1 special character
At least 1 number
• Low
Password length: at least 6 characters, maximum 32 characters
Permitted characters
• Characters of a character set according to ANSI X 3.4-1986
It cannot contain the following characters:
• §?";:
• The character for Delete and blanks also cannot be included.
Procedure
Create a new user
1. Enter the name of the new user in the "User Name" input box.
2. Click the "Create" button. A new entry is generated in the table.
3. Select the authentication algorithm for "Authentication Protocol". In the relevant input
boxes, enter the authentication password and the confirmation.
4. Select the algorithm in "Privacy Protocol". In the relevant input boxes, enter the encryption
password and the confirmation.
5. Click the "Set Values" button.
Delete user
1. Enable "Select" in the row to be deleted.
Repeat this for all users you want to delete.
2. Click the "Delete" button. The entry is deleted.
Description
The page contains the following boxes:
• Group Name
Enter the group that will be assigned to the user.
• User Name
Select the user to be a member of the specified group. The drop-down list only contains users
that are not yet assigned to a group.
The table has the following columns:
• Select
Select the row you want to delete.
• Group Name
Displays the SNMPv3 group. A group name can only be changed later if no access rights have
been defined for the group yet.
• User Name
Shows the user that is a member of this group.
Note
Different access permissions for different security levels can be assigned to a group. If no access
permission is defined for a security level, no access to the device is possible for members of the
group using this security level.
Description
The page contains the following boxes:
• Group Name
Select the name of the group.
• Security Level
Select the security level (authentication, encryption) for which you want to define the access
permissions of the group:
– No Auth/no Priv
No authentication enabled/no encryption enabled.
– Auth/no Priv
Authentication enabled/no encryption enabled.
– Auth/Priv
Authentication enabled/encryption enabled.
Procedure
Creating a new group
1. Select the name of the group for which you are configuring SNMP access.
2. Select the required security level from the "Security Level" drop-down list.
3. Click the "Create" button to create a new entry.
4. In the "Read View Name" field, enter the SNMPv3 view for read access.
5. In the "Write View Name" field, enter the SNMPv3 view for write access.
6. In the "Notification View Name" field, enter the SNMPv3 view for notifications.
7. Click the "Set Values" button.
Modifying a group
Once a group name and the security level have been specified, they can no longer be
modified after the group is created. If you want to change the group name or the security
level, you will need to delete the group and create it and configure it with the new name.
Deleting a group
1. Enable "Select" in the row to be deleted.
Repeat this for all groups you want to delete.
2. Click the "Delete" button. The entries are deleted.
Note
Controlling the SNMPv1 and SNMPv2c access
The preconfigured SIMATICNETRD and SIMATICNETWR views are used internally to control the
SNMPv1 and SNMPv2c access. If you delete or change these views, this directly affects the
SNMPv1 and SNMPv2c access.
Description
The page contains the following boxes:
• View Name
Select the name of the view that you want to configure. An SNMPv3 view always needs to be
assigned to an SNMPv3 access. For this reason, you need to enter a new SNMPv3 view in the
table in the "SNMP Access" tab.
• MIB Tree
Select the Object Identifier (OID) of the MIB area that is to be used for the SNMPv3 view. The
following options are possible:
– iso
– std
– member-body
– org
– mgmt
– private
– snmpV2
The drop-down list only contains the OIDs that are usually used. If the configuration of a
specific OID that is not listed is necessary, you can configure this via the CLI with the snmp
view command. This OID is then also displayed in the WBM in the overview table.
The table has the following columns:
• Select
Select the row you want to delete.
• View Name
The name of the SNMPv3 view.
• MIB Tree
The OID of the MIB area for the SNMPv3 view.
• View Type
The available options are as follows:
– Included
The MIB OID and its lower-level nodes are part of the SNMPv3 view. Access to the
corresponding MIB objects is possible.
– Excluded
The MIB OID and its lower-level nodes are not part of the SNMPv3 view. Access to the
corresponding MIB objects is not possible.
[Link] Notifications
Description
The page contains the following boxes:
• SNMPv1 Traps
Enable or disable sending of SNMPv1 traps. This setting affects all receivers of SNMPv1 traps
and has no effects on receivers of SNMPv2c or SNMPv3 notifications.
• SNMPv1/v2c Trap Community String
Enter the community string for sending SNMPv1/v2c notifications.
• SNMPv3 Notify User
Select the user to which SNMPv3 notifications are to be sent.
• SNMPv3 Notify Security Level
Select the security level (authentication, encryption) to be used for SNMPv3 notification. A
user and the access must be configured for this.
The following options are possible:
– no Auth/no Priv
No authentication enabled / no encryption enabled.
– Auth/no Priv
Authentication enabled / no encryption enabled.
– Auth/Priv
Authentication enabled / encryption enabled.
Procedure
Configuring a notification
1. Select the receiver for SNMPv3 notifications in the "SNMPv3 Notify User" drop-down list.
2. Select the security level for SNMPv3 notifications in the "SNMPv3 Notify Security Level" drop-
down list.
3. Select the receiver type in the "Notification Receiver Type" drop-down list.
4. In "Notification Receiver Address", enter the IP address of the station to which the device
should send traps or notifications.
5. Click the "Create" button to create a new trap entry.
There are different methods that can be used to set the system time of the device. Only one
method can be active at any one time.
If one method is activated, the previously activated method is automatically deactivated.
Description
The page contains the following boxes:
• Time Manually
Enable the manual time setting. If you enable the option, the "System Time" input box can be
edited.
• System Time
Enter the date and time in the format MM/DD/YYYY hh:mm:ss.
After a restart, the time of day begins at 01/01/2000 [Link].
• Use PC Time
Click the button to use the time setting of the PC.
• Last Synchronization Time
Shows when the last time-of-day synchronization took place. If no time-of-day
synchronization was possible, the box displays "Date/time not set".
• Last Synchronization Mechanism
Shows how the last time-of-day synchronization was performed.
– Not set
The time was not set.
– Manual
Manual time setting
– SNTP
Automatic time-of-day synchronization with SNTP
– NTP
Automatic time-of-day synchronization with NTP
– SIMATIC
Automatic time-of-day synchronization using the SIMATIC time frame
• Daylight Saving Time (DST)
Shows whether the daylight saving time changeover is active.
– active (offset +1 h)
The system time was changed to daylight saving time; in other words an hour was added.
You can see the current system time at the top right in the selection area of the WBM.
The current time including daylight saving time is displayed in the "System Time" box.
– inactive (offset +0 h)
The current system time is not changed.
Procedure
1. Enable the "Time Manually" option.
2. In the "System Time" input box, enter the date and time in the format MM/DD/YYYY hh:mm:ss.
3. Click the "Set Values" button.
The date and time are adopted and "Manual" is entered in "Last Synchronization Mechanism"
box.
Settings
• Select
Select the row you want to delete.
• DST No.
Shows the number of the entry.
If you create a new entry, a new line with a unique number is created.
• Name
Shows the name of the entry.
• Year
Shows the year for which the entry was created.
• Start Date
Shows the month, day and time for the start of daylight saving time.
• End Date
Shows the month, day and time for the end of daylight saving time.
• Recurring Date
With an entry of the type "Rule", the period in which daylight saving time is active is displayed
consisting of week, day, month and time of day.
With an entry of the type "Date" a "-" is displayed.
• State
Shows the status of the entry:
– Enabled
The entry was created correctly.
– Invalid
The entry was created new and the start and end date are identical.
• Type
Shows how the daylight saving time changeover is made:
– Date
A fixed date is entered for the daylight saving time changeover.
– Rule
A rule was defined for the daylight saving time changeover.
Procedure
Creating an entry
1. Click the "Create" button.
A new entry is created in the table.
2. Click on the required entry in the "DST No." column.
You change to the "DST Configuration" page.
3. Select the required type in the "Type" drop-down list.
Depending on the selected type, various settings are available.
4. Enter a name in the "Name" box.
5. If you have selected the type "Date", fill in the following boxes.
– Year
– Day (for start and end date)
– Hour (for start and end date)
– Month (for start and end date)
6. If you have selected the type "Rule", fill in the following boxes.
– Hour (for start and end date)
– Month (for start and end date)
– Week (for start and end date)
– Day (for start and end date)
7. Click the "Set Values" button.
Deleting an entry
1. Enable "Select" in the row to be deleted.
2. Click the "Delete" button. The entry is deleted.
Settings
Note
The content of this page depends on the selection in the "Type" box.
The boxes "DST No.", "Type" and "Name" are always shown.
• DST No.
Select the type of the entry.
• Type
Select how the daylight saving time changeover is made:
– Date
You can set a fixed date for the daylight saving time changeover.
This setting is suitable for regions in which the daylight saving time changeover is not
governed by rules.
– Rule
You can define a rule for the daylight saving time changeover.
This setting is suitable for regions in which the daylight saving time always begins or ends
on a certain weekday.
• Name
Enter a name for the entry.
The name can be a maximum of 16 characters long.
Settings with "Date" selected
You can set a fixed date for the start and end of daylight saving time.
• Year
Enter the year for the daylight saving time changeover.
• Start Date
Enter the following values for the start of daylight saving time:
– Day
Specify the day.
– Hour
Specify the hour.
– Month
Specify the month.
• End Date
Enter the following values for the end of daylight saving time:
– Day
Specify the day.
– Hour
Specify the hour.
– Month
Specify the month.
Settings with "Rule" selected
You can create a rule for the daylight saving time changeover.
• Start Date
Enter the following values for the start of daylight saving time:
– Hour
Specify the hour.
– Month
Specify the month.
– Week
Specify the week.
You can select the first to fifth or the last week of the month.
– Day
Specify the weekday.
• End Date
Enter the following values for the end of daylight saving time:
– Hour
Specify the hour.
– Month
Specify the month.
– Week
Specify the week.
You can select the first to fifth or the last week of the month.
– Day
Specify the weekday.
Note
To avoid time jumps, make sure that there is only one time server in the network.
Description
The page contains the following boxes:
• SNTP Client
Enable or disable automatic time-of-day synchronization using SNTP.
• Current System Time
Shows the current date and current normal time received by the device. If you specify a time
zone, the time information is adapted accordingly.
• Last Synchronization Time
Shows when the last time-of-day synchronization took place.
• Last Synchronization Mechanism
Shows how the last time-of-day synchronization was performed. The following methods are
possible:
– Not set
The time was not set.
– Manual
Manual time setting
– SNTP
Automatic time-of-day synchronization with SNTP
– NTP
Automatic time-of-day synchronization with NTP
– SIMATIC
Automatic time-of-day synchronization using the SIMATIC time frame
• Time Zone
In this box, enter the time zone you are using in the format +/- hh:mm. The time zone relates
to UTC standard world time.
The time in the "Current System Time" box is adapted accordingly.
• Daylight Saving Time (DST)
Shows whether the daylight saving time changeover is active.
– active (offset +1 h)
The system time was changed to daylight saving time; in other words an hour was added.
You can see the current system time at the top right in the selection area of the WBM.
The current time including daylight saving time is displayed in the "System Time" box.
– inactive (offset +0 h)
The current system time is not changed.
• SNTP Mode
Select the synchronization mode from the drop-down list. The following types of
synchronization are possible:
– Listen
With this mode, the device is passive and receives SNTP frames that deliver the time of
day. Settings in the input boxes "SNTP Server Address" and "SNTP Server Port" have no
effect in this mode.
In this mode, only IPv4 addresses are supported.
– Poll
If you select this mode, the input box "Poll Interval[s]" is displayed to allow further
configuration. In this mode, the settings in the input boxes "SNTP Server Address" and
"SNTP Server Port" are taken into account. With this type of synchronization, the device is
active and sends a time query to the SNTP server.
In this mode, IPv4 and IPv6 addresses are supported.
• Poll Interval[s]
Here, enter the interval between two time queries. In this box, you enter the query interval
in seconds. Possible values are 16 to 16284 seconds.
• SNTP Server Address
Enter the IP address or the FQDN (Fully Qualified Domain Name) of the SNTP server.
• SNTP Server Port
Enter the port of the SNTP server.
The following ports are possible:
– 123 (standard port)
– 1025 to 36564
• Primary
The check mark is set for the SNTP server that you create first. If several SNTP servers have
been created, the primary server is queried first.
Procedure
1. Click the "SNTP Client" check box to enable the automatic time setting.
2. In the "Time Zone" input box, enter the local time difference to world time (UTC). The input
format is +/-hh:mm (for example +02:00 for CEST, Central European Summer Time), because
the SNTP server always sends the UTC time. This time is then recalculated and displayed as
the local time based on the specified time zone. You configure the daylight saving time
switchover on the pages "System > System Time > DST Overview" and "System > System Time
> DST Configuration". You also need to take this into account when completing the "Time
Zone" input box.
3. Select one of the following options from the "SNTP Mode" drop-down list:
– Poll
For this mode, you need to configure the following:
- Time zone difference (step 2)
- Query interval (step 4)
- Time server (step 5)
- Port (step 7)
- Complete the configuration with step 8.
– Listen
For this mode, you need to configure the following:
- Time difference to the time sent by the server (step 2)
- Complete the configuration with step 8.
4. In the "Poll Interval[s]" input box, enter the time in seconds after which a new time query is
sent to the time server.
5. In the "SNTP Server Address" input box, enter the IP address or the FQDN of the SNTP server
whose frames will be used to synchronize the time of day.
6. Click the "Create" button.
A new row is inserted in the table for the SNTP server.
7. In the "SNTP Server Port" column, enter the port via which the SNTP server is available. The
port can only be modified if the IPv4 address or the FQDN name of the SNTP server is entered.
8. Click the "Set Values" button to transfer your changes to the device.
Note
To avoid time jumps, make sure that there is only one time server in the network.
Description
The page contains the following boxes:
• NTP Client
Select this check box to enable automatic time-of-day synchronization with NTP.
• Secure NTP Client only
When enabled, the device receives the system time from a secure NTP server. The setting
applies to all server entries.
To use the secure NTP client, you configure the parameters for authentication (key ID, hash
algorithm, key).
Note
We highly recommend using a secure NTP server.
Procedure
Time-of-day synchronization via NTP server
1. Click the "NTP Client" check box to enable the automatic time setting using NTP.
2. In "Time Zone", enter the local time difference to world time (UTC).
The input format is "+/-HH:MM" because the NTP server always sends UTC time, for example
+02:00 for CEST, the Central European Summer Time. This time is converted into local time
based on the specified time zone.
3. Select the "NTP Server Index".
4. Click the "Create" button.
A row for the NTP server is created in the table.
5. In "NTP Server Address", enter the IP address or FQDN of the NTP server whose frames are
used to synchronize the time of day.
6. In "NTP Server Port", enter the port via which the NTP server is available. The port can only be
modified if the address of the NTP server is entered.
7. In the "Poll Interval" column, enter the interval in seconds after which a new time-of-day
query is started on the time server.
8. Click the "Set Values" button.
Note
To avoid time jumps, make sure that there is only one time server in the network.
Description
The page contains the following boxes:
• SIMATIC Time Client
Select this check box to enable the device as a SIMATIC time client.
• Current System Time
Shows the current system time.
Procedure
1. Click the "SIMATIC Time Client" check box to enable the SIMATIC Time Client.
2. Click the "Set Values" button.
Note
No automatic logout from the CLI
If the connection is not terminated after the set time, check the "Keep alive" setting on the Telnet
client.
If the interval for "Keep alive" is shorter than the configured time, the connection is maintained
although no user data is transferred. You have set, for example, 300 seconds for the automatic
logoff and the "Keep alive" function is set to 120 seconds. In this case, a packet is sent every 120
seconds that keeps the connection uninterrupted.
• Turn off the "Keep alive" (interval time=0)
or
• Set the interval high enough so that the underlying connection is terminated when there is
inactivity.
Procedure
1. Enter a value of 60-3600 seconds in the "Web Base Management [s]" input box. If you enter
the value 0, the automatic logout is disabled.
2. Enter a value of 60-600 seconds in the "CLI (TELNET, SSH) [s]" input box. If you enter the value
0, the automatic logout is disabled.
3. Click the "Set Values" button.
• There is a Syslog server in your network that receives the log entries. (Since this is a UDP
connection, there is no acknowledgment to the sender)
• The IP address or the FQDN (Fully Qualified Domain Name) of the Syslog server is entered on
the device.
Description
The page contains the following boxes:
• Syslog Client
Enable or disable the Syslog function.
• Syslog Server Address
Enter the IP address, the FQDN (Fully Qualified Domain Name) or the host name of the Syslog
server.
This table contains the following columns
• Select
Select the row you want to delete.
• Syslog Server Address
Shows the IP address, the FQDN (Fully Qualified Domain Name) or the host name of the
Syslog server.
• Server Port
Enter the port of the Syslog server being used.
• TLS
When this check box is selected, communication with the Syslog server is encrypted.
Procedure
Enabling function
1. Select the "Syslog Client" check box.
2. Click the "Set Values" button.
Note
You will find the permitted operating voltage limits in the operating instructions of the device.
If a fault occurs, the error LED lights up on the device. The currently pending fault is
displayed under "Information > Faults".
In addition, the corresponding error message is entered in the result log table. The content of
the event log table is displayed in "Information > Log Tables > Event Log".
Procedure
1. Click the check box in front of the line name you want to monitor to enable or disable the
monitoring function.
2. From the "PROFINET Redundancy" drop-down list, select the desired entry for redundant
power supply to be monitored by PROFINET.
3. Click the "Set Values" button.
Description
The table has the following columns:
• Port
Shows the available ports.
• Setting
Select the setting from the drop-down list. You have the following options:
– Up
Error handling is triggered when the port changes to the active status.
(From "Link down" to "Link up")
– Down
Error handling is triggered when the port changes to the inactive status.
(From "Link up" to "Link down")
– "-" (disabled)
The error handling is not triggered.
Procedure
Configure error monitoring for a port
1. From the relevant drop-down list, select the options of the slots / ports whose connection
status you want to monitor.
2. Click the "Set Values" button.
Configure error monitoring for all ports
1. Select the required setting from the drop-down list of the "Setting" column.
2. Click the "Copy to Table" button. The setting is adopted for all ports of table 2.
3. Click the "Set Values" button.
6.4.16 PROFINET
Note
GSDML-configuration file: Mode Type
The GSDML configuration file can be used to configure the transfer mode for the Ethernet port.
The SCALANCE WxM76x supports only the "Autonegotiation" setting.
Description
The page contains the following boxes:
• PROFINET Device Diagnostics
Shows whether PROFINET is enabled ("On") or disabled ("Off").
• PROFINET runtime mode for next boot
Set whether PROFINET will be enabled ("On") or disabled ("Off") after the next device restart.
Note
PROFINET AR Status
If a PROFINET connection is established; in other words the PROFINET AR status is "Online",
you cannot disable PROFINET.
• PROFINET AR Status
This box shows the status of the PROFINET connection; in other words whether the device is
connected to a PROFINET controller "Online" or "Offline".
Here, online means that a connection to a PROFINET IO controller exists, that this has
downloaded its configuration data to the device and that the device can send status data to
the PROFINET IO controller. In this status known as "in data exchange", the parameters set via
the PROFINET controller cannot be configured.
• PROFINET Name of Station
This box displays the PROFINET device name according to the configuration in HW Config of
STEP 7 or via the CLI with the pnio station-name command.
6.4.17 PLUG
[Link] Configuration
NOTICE
Do not remove or insert the PLUG during operation.
A PLUG may only be removed or inserted when the device is turned off.
The device checks whether a PLUG is inserted at one second intervals. If it is detected that the
PLUG has been removed, the device restarts.
If a valid PLUG license was inserted in the device, the device changes to a defined error state
following the restart. With SCALANCE W, the available wireless interfaces are deactivated in
this case.
If the device was configured at some time with a PLUG license, the device can no longer be used
without this PLUG. To be able to use the device again, reset the device to the factory settings.
Note
The action is only executed after you click the "Set Values" button.
The action cannot be undone.
If you decide against executing the function after making your selection, click the "Refresh"
button. As a result the data of this page is read from the device again and the selection is
canceled.
Description
The table has the following rows:
• State
Shows the status of the PLUG. The following are possible:
– ACCEPTED
There is a PLUG with a valid and suitable configuration in the device.
– NOT ACCEPTED
Invalid or incompatible configuration on the inserted PLUG.
– NOT PRESENT
No PLUG is inserted in the device.
– FACTORY
PLUG is inserted and does not contain a configuration. This status is also displayed when
the PLUG was formatted during operation.
• Device Group
Shows the SIMATIC NET product line that used the PLUG previously.
• Device Type
Shows the device type within the product line that used the PLUG previously.
• Configuration Revision
The version of the configuration structure. This information relates to the configuration
options supported by the device and has nothing to do with the concrete hardware
configuration. This revision information does not therefore change if you add or remove
additional components (modules or extenders), it can, however, change if you update the
firmware.
• File System
Displays the type of file system on the PLUG.
• File System Size [Kilobytes]
Displays the maximum storage capacity of the file system on the PLUG.
• File System Usage [Kilobytes]
Displays the memory utilization of the file system of the PLUG.
• Info String
Shows additional information about the device that used the PLUG previously, for example,
article number, type designation, and the versions of the hardware and software. The
displayed software version corresponds to the version in which the configuration was last
changed. With the "NOT ACCEPTED" status, further information on the cause of the problem
is displayed.
If a PLUG was configured as a PRESET PLUG this is shown here as additional information in the
first row. For more detailed information on creating and using a PRESET PLUG refer to the
section "Maintenance (Page 313)".
• Firmware on PLUG
The setting is enabled by default.
When enabled, the firmware will be stored on the PLUG. This means that automatic firmware
updates/downgrades can be made with the PLUG. The "Info String" box shows whether or not
the firmware is stored on the PLUG. You can find more information on this in the section
"Configuration License PLUG (CLP) (Page 29)".
• Modify PLUG
Select the required setting from the drop-down list. You have the following options for
changing the configuration on the PLUG:
– Write current configuration to PLUG
This option is available only if the status of the PLUG is "NOT ACCEPTED" or "FACTORY".
The configuration in the internal flash memory of the device is copied to the PLUG.
– Erase PLUG to factory default
Deletes all data from the PLUG and performs low-level formatting.
Procedure
Requirement:
• User with administrator rights
Modifying the PLUG configuration
1. Select the required option from the "Modify PLUG" drop-down list.
2. Click the "Set Values" button.
[Link] License
NOTICE
Do not remove or insert the PLUG during operation.
A PLUG may only be removed or inserted when the device is turned off.
The device checks whether a PLUG is inserted at one second intervals. If it is detected that the
PLUG has been removed, the device restarts.
If a valid PLUG license was inserted in the device, the device changes to a defined error state
following the restart. With SCALANCE W, the available wireless interfaces are deactivated in
this case.
If the device was configured at some time with a PLUG license, the device can no longer be used
without this PLUG. To be able to use the device again, reset the device to the factory settings.
• Serial number
Shows the serial number of the PLUG.
• Info String
Displays additional information about the PLUG.
Note
When you save the configuration, the information about whether or not a PLUG was inserted in
the device at the time is also saved. This configuration is then only executable, if a PLUG with the
same article number / license is plugged in. This applies regardless of whether or not iFeatures
are configured.
6.4.18 Ping
Description
The page contains the following boxes:
• Destination Address
Enter the IPv4, IPv6 address or the FQDN (Fully Qualified Domain Name) of the device.
• Repeat
Enter the number of Ping requests.
• DNS Resolution
Select the IP address type in which an entered FQDN will be resolved.
– Auto
In this mode, the IP address type is selected automatically.
– IPv4
The entered FQDN will be resolved in an IPv4 address.
– IPv6
The entered FQDN will be resolved in an IPv6 address.
• Out Interface for IPv6
This selection is only required when the destination address is a multicast or a link local
address.
– "-" (factory setting)
– Select the relevant IPv6 interface.
• Ping
Click this button to start the Ping function.
• Ping Output
This box shows the output of the Ping function.
• Clear
Click this button to delete the ping output.
Note
DCP Discovery
The function is only available with the VLAN associated with the TIA interface. You can
configure the TIA interface with "Layer 3 > Subnets > Configuration".
Requirement:
To adapt network parameters, DCP requires write access to the device. If access is write-
protected, the network parameters cannot be configured.
On SCALANCE devices, you configure access under "System > Configuration".
Description
The page contains the following boxes:
• Timeout[s]
Specify the time for flashing. When the time elapses, flashing stops.
• Blink Own LEDs
Makes the LEDs of your own device flash.
You will find which LEDs flash in the operating instructions of the device, section "Device
description > LED display", explanation on localization of the device.
• Interface
Select the required interface.
• Discover
Starts the search for devices reachable via the selected interface.
On completion of the search the reachable devices are listed in the table. The table is limited
to 100 entries.
The table has the following columns:
• Port
Shows the port via which the device can be reached.
• MAC Address
Shows the MAC address of the device.
• Device Type
Shows the product line or product group to which the device belongs.
• Device Name
Adapt the PROFINET device name if necessary.
The device name must be DNS-compliant. If the device name is not used, the box is empty.
• IP Address
If necessary, adapt the IPv4 address of the device.
The IPv4 address should be unique within your network and should match the network. The
IPv4 address [Link] means that no IPv4 address has yet been set.
• Subnet mask
If necessary, adapt the subnet mask of the device.
• Gateway Address
Adapt the IPv4 address of the gateway if necessary.
• Status Device Name
– None: The device name is not used.
– Discovered: The set device name is used.
– Configured: The device was assigned a new device name.
• IP Status
– Discovered/IP: The device uses a static IPv4 address.
– Discovered/DHCP: The device has obtained the IPv4 address from a DHCP server.
– Configured: The device was assigned a new IPv4 address.
• Timeout[s]
Specify the time for flashing. When the time elapses, flashing stops.
• Flash
Makes the LEDs of the selected device flash.
Procedure
1. Select the TIA interface.
2. To show all devices that can be reached via the TIA interface, click the "Browse" button.
3. Adapt the desired properties.
4. Click the "Set Values" button.
The status of the modified properties changes to "Configured".
5. To ensure that the properties were applied correctly, click the "Browse" button again.
The status of the modified properties changes to "Discovered".
Backup
On this page, you can create backups of the configuration and save them on the device. The
backups are created in "ConfigPack" format and include users with passwords, certificates and
favorites in addition to the configuration. You can restore these backups directly from the device.
After the restore, the device restarts. The maximum number depends on the size of the backup
and the available memory space.
On the "System > Load&Save > HTTP/TFTP/SFTP" page, you can save the created backups in
ZIP format under "ConfigPackBackup" on your client PC to be able to load them from there
later. You can find more detailed information in the section "Load & Save (Page 129)".
Description
The page contains the following boxes:
• Name
Enter a name for the backup.
The table contains the following columns:
• Select
Select the row you want to delete.
• Name
Shows the name of the backup.
• Size [KB]
The first row "Available memory" shows how much memory is available for backups on the
device. When you create a backup, the available memory space is reduced accordingly.
The other rows show the size of each backup.
• Restore
Click the "Restore" button to load the relevant backup on the device.
Procedure
1. Enter the required name.
2. Click the "Create" button.
The current configuration is saved as a configuration backup.
Saving the backup may take some time. A new row is created for the backup. The size of the
backup is displayed and subtracted from the available memory space.
Note
Permitted characters for user name and password
The following characters are permitted:
• 0123456789
• A...Z a...z
• . -_
Additionally allowed in the password:
• Space
• !"%&/()=?*+<>',
Description
The page contains the following:
• Enable
Enable or disable reception of the TCP packets. To log this, activate the "TCP Event Log" event
under "System > Event".
• Username
Enter the user name to check the reception of the TCP packet. The user name and password
are entered in the TCP packet.
• Password
Enter the password belonging to the user name.
• Password (Confirmation)
Repeat the password to confirm it.
• Port number
Define the port at which the device waits for the TCP packets. The standard port 26864 is
preset, or you can enter a port number in the range 1 … 65535.
Note
Reserved ports
Some ports are permanently reserved. Make sure that the specified port is not already in use.
You can find the ports used in the "List of available services (Page 19)".
– Sleep Mode
Trigger the "Sleep Mode" function:
<User name>#<Password>#107#1;<Time>:
The last parameter specifies the sleep time in minutes.
In the following example, sleep mode is triggered for 10 minutes:
<User name>#<Password>#107#1;10:
Note
Identical WLAN configuration of the access points for WLAN roaming via TCP event
required
For problem-free WLAN roaming via TCP, all access points must have identical configuration of
the WLAN interface or the VAP (frequency band, SSID, WLAN mode, channel bandwidth,
security, DFS).
6.5.1 Ethernet
[Link] Overview
Description
The table has the following columns:
• Port
Shows the configurable ports. If you click on the link, the corresponding configuration page
is opened.
• Port name
Shows the name of the port.
• Status
Shows whether the port is on or off. Data traffic is possible only over an enabled port.
• OperStatus
Displays the current operational status. The operational status depends on the configured
"Status" and the "Link".
The available options are as follows:
– up
You have configured the status "enabled" for the port and the port has a valid connection
to the network.
– down
You have configured the status "disabled" or "Link down" for the port or the port has no
connection.
• Link
Shows the connection status to the network. With the connection status, the following is
possible:
– up
The port has a valid link to the network, a link integrity signal is being received.
– down
The link is down, for example because the connected device is turned off.
• Mode
Shows the transfer parameters of the port.
• Negotiation
Shows whether the automatic configuration is enabled or disabled.
• MAC Address
Shows the MAC address of the port.
[Link] Configuration
Configuring ports
With this page, you configure the Ethernet ports of the device.
Description
The table has the following rows:
• Port
Select the port to be configured from the drop-down list.
• Status
Specify whether the port is enabled or disabled.
– enabled
The port is enabled. Data traffic is possible only over an enabled port.
– disabled
The port is disabled.
• Port name
Enter a name for the port.
• MAC Address
Shows the MAC address of the port.
• Mode Type
The operating mode is set to "Auto negotiation". In this case, the parameters are negotiated
automatically with the connected terminal device. This must also be in the "Auto negotiation"
mode for this purpose.
Note
Before the port and partner port can communicate with each other, the settings must match
at both ends.
• Mode
Shows the transmission speed and the transmission method of the port.
• Negotiation
Shows whether the automatic configuration of the connection to the partner port is enabled
or disabled.
• OperStatus
Displays the current operational status. The operational status depends on the configured
"Status" and the "Link". The available options are as follows:
– up
You have configured the status "enabled" for the port and the port has a valid connection
to the network.
– down
You have configured the status "disabled" or "Link down" for the port or the port has no
connection.
• Link
Shows the connection status to the network. The available options are as follows:
– Up
The port has a valid link to the network, a link integrity signal is being received.
– Down
The link is down, for example because the connected device is turned off.
Procedure
Note
Changing the port configuration
With various automatic functions, the device prevents or reduces the effect on other ports and
priority classes (Class of Service) if a port is overloaded. This can mean that frames are discarded
even when flow control is enabled.
Port overload occurs when the device receives more frames than it can send, for example as the
result of different transmission speeds.
6.5.2 WLAN
[Link] Basic
Basic settings
On this page, you make several basic settings for the device, for example the country setting and
mode.
Note
To configure the WLAN interface, you must always specify the country code first. Some
parameters are dependent on the country setting, for example the transmission standard.
Description
• Country Code
Select the country in which the device will be operated from the drop-down list.
You do not need to know the data for the specific country, the channel division and output
power are set by the device according to the country you select.
You can find more information on currently available country approvals in the "Approvals
SCALANCE W700 802.11ax ([Link]
man)" documentation.
Note
Locale setting
The correct country setting is mandatory for operation complying with the approvals.
Selecting a country different from the country of use can lead to legal prosecution.
• Device Mode
Select the mode of the device. This selection is available only for access points.
The following modes are possible:
– AP - Access point mode
– Client - Client mode
Note
After the mode is changed, a message is displayed. If you confirm the message with "OK", the
device is reset to the memory defaults (protected settings) and restarted in the selected
mode.
If the device has restarted, you will need to log in again to be able to continue the
configuration.
• Frequency Band
Set frequency band with which the device operates.
– 2.4 GHz
– 5 GHz
– 2.4 GHz + 5 GHz
Dual operation in access point mode. The prerequisite is that CLP 2GB W700 AP iFeatures
is plugged in and accepted. Simultaneous configuration, for example via the CLI or SNMP,
can lead to inconsistencies in the web-based management.
If you switch to the "2.4 GHz + 5 GHz" setting (dual mode), all settings for antennas on the
"Antennas&Cable" tab are set to "Not defined".
Note
iFeatures in dual mode
When using iFeatures iPCF-2 or iPRP on a WLAN interface, the other WLAN interface must
be operated as standard WLAN.
• Radio Mode
Shows the mode of the WLAN interface.
Note
Data rate
The data rate is adjusted automatically.
• DFS (802.11h)
Enables or disables the "Dynamic Frequency Selection (DFS)" function.
– Enabled
With the DFS function, it is possible to also use the higher 5 Ghz channels.
These channels are country-specific and are subject to certain DFS regulations. You can
find additional information on this in the country-specific DFS documentation.
Before the access point transmits over one of these channels, it checks for competing
radar signals for 60 seconds according to the CAC (Channel Availability Check). The access
point also does not send any beacons for the duration of the search. With weather radar
channels (5.6 - 5.65 GHz), the duration of the search is 10 minutes.
If no radar signals are detected after the search period has elapsed, the access point
transmits on the channel. Otherwise, the access point changes channel and repeats the
check.
The access point also searches for radar signals continuously during operation.
If the access point discovers a radar signal on the current channel, it notifies the clients of
the channel change. It then automatically switches to an alternative DFS channel and the
current channel is blocked for 30 minutes.
– Disabled
The DFS function is not used.
• Outdoor Mode
– Enabled
If you have enabled Outdoor Mode, only the channels that are permitted for outdoor
operation are available to you.
– Disabled
If you have disabled Outdoor Mode, only the channels that are permitted for operation in
a building are available to you.
Procedure
1. To configure the WLAN interface, you must always specify the country first. Select the
country in which the device will be operated from the "Country Code" drop-down list.
2. Select the required frequency band from the "Frequency Band" drop-down list.
3. From the "WLAN Mode" drop down list, select the required transmission standard for the
configured frequency band.
4. Click the "Set Values" button.
[Link] Antennas&Power
Overview
The following figures provide an overview of the IWLAN antennas that are suitable for use with
SCALANCE W devices.
Type of antenna
W1780/W1740
W760/W720,
W780/W740
W770/W730
W770/W730
range (GHz)
SCALANCE
SCALANCE
SCALANCE
SCALANCE
SCALANCE
SCALANCE
WAM766-1/
WAM763-1/
WUM766-1
WUM763-1
Frequency
Antennas
IP65
2.4 ANT792-8DN ● ● ● ●
ANT793-8DP ● ● ● ●* ● ●
directional
ANT793-8DJ ● ● ● ●* ● ●
5
ANT793-8DK ● ● ● ●* ● ●
ANT793-8DL ● ● ● ●* ● ●
RCoax
radiating
cables ● ● ● ● ● ●
2.4 GHz
2.4
ANT792-4DN ● ● ● ● ● ●
RCoax
RCoax
radiating
cables ● ● ● ● ● ●
5 GHz
G_IK10_XX_30317
ANT793-4MN ● ● ● ● ● ●
*Antennas can only be used on one antenna connector per radio interface (R1A1 or R2A1) and the rest of the
Type of antenna
W1780/W1740
W760/W720,
W780/W740
W770/W730
W770/W730
range (GHz)
SCALANCE
SCALANCE
SCALANCE
SCALANCE
SCALANCE
SCALANCE
WAM766-1/
WAM763-1/
WUM766-1
WUM763-1
Frequency
Antennas
IP65
2.4 ANT792-6MN ● ● ● ● ● ●
ANT897-4ME
● ●
ANT897-5PN
● ●
ANT795-4MA ● ● ●
omnidirectional
ANT795-4MB ● ● ●
2.4
and
ANT795-4MC ● ● ● ●
5
ANT795-4MD ● ● ● ●
ANT795-4MX ● ● ● ●
ANT795-6MN ● ● ● ● ● ●
ANT795-6MP ● ● ● ● ● ●
2.4
and ANT795-6DC ● ● ● ● ● ●
G_IK10_XX_30318
5
Sector
5 ANT793-6DG ● ● ● ● ● ●
Note
50 Ω terminating resistor
Each WLAN interface has two antenna connections. Connectors that are not used must have a
50 Ω terminating resistor fitted.
An antenna must always be connected to the R1 A1 antenna connection as soon as the WLAN
interface is switched on. If no antenna is connected, the relevant interface must also be disabled
for Rx and Tx. Otherwise, there may be transmission disruptions.
Description
Table 1 has the following columns:
• Radio
Shows the available WLAN interfaces.
• Frequency Band (only in access point mode)
Shows the frequency band.
– 2.4 GHz
– 5 GHz
• Max. Tx Power
The value you set here corresponds to the transmit power per antenna port. With transmit
power greater than 15 dBm, the transmit speed may be reduced.
Note
The maximum possible transmit power varies depending on the channel and data rate. For
more information on transmit power, refer to the documentation "Characteristics
SCALANCE W700 802.11ax".
• Antenna Gain
If you select the "User defined" entry for the "Antenna Type", enter the antenna gain manually
in the "dBi" unit.
– Antenna Gain 2.4 GHz [dBi]
Here, enter the antenna gain the antenna has in the 2.4 GHz frequency band.
– Antenna Gain 5 GHz [dBi]
Here, enter the antenna gain the antenna has in the 5 GHz frequency band.
• Cable Length [m]
Enter the length of the flexible antenna connecting cable in meters between the device and
the external antenna.
• Additional Attenuation [dB]
Here, specify the additional attenuation caused, for example, by an additional splitter.
• Antenna Mode
Specify the use of the antenna. For antenna connection R1 A1, the entry cannot be changed.
– Tx
For sending only
– Rx
For receiving only
– Rx/Tx
For receiving and sending
The following table shows which combinations are possible:
R1 A1 R1 A2
Rx/Tx Rx/Tx
Rx/Tx Rx
Rx/Tx Tx
Rx/Tx --1)
– Channel numbers
Indicates the channels on which the current transmit power exceeds the maximum
permitted transmit power.
– "-"
The channels can be used with the current settings.
Procedure
Follow these steps to configure both antenna connections:
1. For the first antenna connector (R1 A1) in the "Antenna Type" drop-down list, select the type
of antenna.
2. In the "Cable Length" input box, enter the length of the connecting cable you are using in
meters. The "Antenna mode" entry cannot be changed at antenna connection R1A1.
3. For the second antenna connection (R1 A2), select the appropriate type of the second
antenna in the"Antenna Type" drop-down list and enter a value for "Cable length".
If you terminate the second antenna connection using a 50 Ω terminating resistor, select the
entry "Not used (Connect 50 Ohm Termination)".
4. Click the "Set Values" button.
[Link] Advanced
Description
The table has the following columns:
• Radio
Shows the available WLAN interfaces in this column.
• Frequency Band (only in access point mode)
Shows the frequency band.
– 2.4 GHz
– 5 GHz
• Beacon Interval [ms] (only in access point mode)
Specify the interval (10 - 1000 ms) at which the access point sends beacons. Beacons are
packets that are sent cyclically by an access point to inform clients of its existence.
Note
Interval with more than 2 VAP interfaces
With more than two VAP interfaces, use an interval greater than or equal to 100 ms.
• HW Retries
Specify the number of hardware retries. The max. number of hardware retries is 32.
The hardware retry is performed by the WLAN chip itself when it tries to repeat an
unacknowledged packet immediately.
If all hardware retries were unsuccessful, the packet is deleted and the WLAN client is
removed from the list.
Note
Hardware retries after an update to V2.1
If the number of hardware retries was set to more than 32 in an older firmware version, the
value is automatically set to 32 after the update to V2.1. This information is recorded in the
event log.
• A-MPDU
Aggregated MAC Protocol Data Unit (A-MPDU)
– Enabled
Multiple MPDU frames with the same destination address are bundled and sent as one
large A-MPDU. This allows the total throughput to be increased.
– Disabled
A-MPDU frames are received but not sent.
Procedure
1. Enter the values to be set in the input boxes as follows.
2. Select the option checkmark of the required functions.
3. Click the "Set Values" button.
Channel settings
For communication, a specific channel within a frequency band is used. You can either set this
channel specifically or configure so that the channel is selected automatically.
On this page, you specify which channels may be used for communication.
Description
Table 1 contains the following columns:
• Radio
Shows the available WLAN interfaces.
• Frequency Band (only in access point mode)
Shows the frequency band.
– 2.4 GHz
– 5 GHz
• Use Allowed Channels only
If you enable the option, you restrict the selection of channels via which the connection is
established.
In the following tables, you define which channels can be used to establish a wireless cell.
The tables are divided up according to frequency bands.
If the option is disabled, the channels available based on the settings (country code,
antennas, transmit power etc.) are used.
Above the tables for the frequency bands, you will find the following check box:
• Select / Deselect all
– Enabled
If you enable the check box, all channels are selected.
– Disabled
If you deselect the check box, the first valid channel of the frequency band remains
enabled. Enable the required channel.
Procedure
1. Select the "Use Allowed Channels only" option for the required WLAN interface.
2. Deselect the check box "Select / Deselect all".
3. Select the relevant check box for the required channel number.
4. Click the "Set Values" button.
[Link] AP
Note
This WBM page is only available in access point mode.
Configuration
On this WBM page, you specify the configuration for the access point.
Description
Table 1 has the following columns:
• Radio
Shows the available WLAN interfaces.
• Frequency Band
Shows the frequency band.
– 2.4 GHz
– 5 GHz
• Channel
Specify the main channel.
If you want the access point to search for a free channel itself, use "Auto". The selection of
channels used by an access point when establishing a wireless cell can be restricted. To do
this, select the "Use Allowed Channels only" check box on the "Allowed Channels" page.
.If you want to use a fixed channel, select the required channel from the drop-down list.
Note
Since no encryption is used for the SSID transfer, this function can only provide basic
protection against unauthorized access. The use of an authentication method (for example
WPA2 (RADIUS)/WPA3-SAE, if this is not possible WPA2-PSK) provides higher security. You
must also expect that certain terminal devices may have problems with access to a hidden
SSID.
Procedure
1. Select the required channel from the "Channel" drop-down list.
2. Enter network name in the "SSID" input box for the corresponding WLAN interface and port.
3. For the relevant WLAN interface and the port, select the "Enabled" check box.
4. Click the "Set Values" button.
[Link] Client
Connecting to a network
On this WBM page, you can specify how the device connects to a network as client.
Note
This WBM page is only available for clients or access points in client mode.
Description
Table 1 has the following columns:
• Radio
Shows the available WLAN interfaces.
• MAC Mode
Specify how the MAC address is assigned to the client. The following are possible:
– Own
The client uses the MAC address of the Ethernet interface for the WLAN interface.
– Layer 2 Tunnel
The client uses the MAC address of the Ethernet interface for the WLAN interface. The
network is also informed of the MAC addresses connected to the Ethernet interface of the
client. Up to eight MAC addresses can be used.
Table 2 has the following columns:
• Radio
Shows the available WLAN interfaces.
• Roaming Threshold
The client switches at a moderately higher field strength to the AP with the stronger signal.
Procedure
1. From the "MAC Mode" drop-down list, select the required assignment of the MAC address.
2. Select the desired mode from the "Background Scan Mode" drop-down list and set the
background scan interval.
3. Select the required scan time from the "Scan Time per Channel" drop-down list.
4. In table 3, enter an SSID for "SSID".
5. Select a security context.
6. Enable the required SSID.
7. Click the "Set Values" button.
Note
Roaming
For problem-free roaming of the client between the access points, it is important not to block LLC
(Link Layer Control) frames in the wired network. The LLC frames are used to update the FDB
(Forwarding Database) table on the network devices.
Note
This WBM page is only available for clients or access points in client mode.
The WLAN interface of the device must be enabled; otherwise, no recording is possible.
Description
The display is divided into two areas.
• Client
Represents the measurement of the client.
• Access point
Displays the measurement of the access point with which the client is currently connected.
This requires that the setting "Bidirectional Recording" is enabled. The access point sends its
data to a maximum of 3 clients on which signal recorders are running. The access point data
is not displayed on other clients.
Both areas each contain two graphics.
The first graphic contains the following elements:
• Scroll bar
With the scroll bar, you can look through the entire measurement. To do this you can use the
"<<" and ">>" buttons or the arrow keys on the keyboard.
• Bar (left)
In the bar on the left, the wanted signal from the client / access point is displayed in real time
according to the color scheme shown.
• Color scheme
The range > -35 dBm (blue) is the overmodulation range, in other words the WLAN signal is
too strong and is received overmodulated. As of approximately -60 dBm (yellow) the WLAN
signal is weaker.
• x axis
The x axis shows the course of the measurement in random samples and seconds.
• Measurement data
– Client
The measurement data shows the value of the effective user signal according to the color
scheme shown. The gray line shows the background noise.
If the client changes access points during a measurement (roaming) or reconnects, this
is displayed by a vertical black line. On the line the new AP system name and the BSSID are
shown.
If during a measurement the client has no connection to an access point, no user signal
is displayed. To make it clear that there is no connection to an access point, the BSSID is
set to [Link] and shown in red.
– Access point
The measurement data shows the value of the effective user signal according to the color
scheme shown. The gray line shows the background noise.
If the client changes access points during a measurement (roaming) or reconnects, this
is displayed by a vertical black line.
If the access point does not support the setting "Bidirectional Recording" no user signal is
displayed
The second graphic contains the following elements:
• Bar (left)
In the bar, only the percentage of failed transfer attempts is displayed according to the color
scheme.
• Color scheme
The color scheme goes from green to red and shows the values of failed transfer attempts.
– Green (0%): All transfer attempts were successful.
– Red (100%): All transfer attempts have failed.
• x axis
The x axis shows the course of the measurement in random samples and seconds.
• Measurement data
– Client
The measurement data shows the transfer attempts according to the color scheme
shown. The transfer attempts are shown as a bar. The data rate of the sent data packets
is represented as a gray line.
If the client changes access points during a measurement (roaming) or reconnects, this
is displayed by a vertical black line.
– Access point
The measurement data shows the transfer attempts according to the color scheme
shown. The transfer attempts are shown as a bar. The data rate of the sent data packets
is represented as a gray line.
If the client changes access points during a measurement (roaming) or reconnects, this
is displayed by a vertical black line. If the access point does not support the "Bidirectional
Recording" setting, no data is displayed.
Beside the graphics the following values are displayed:
• Status
Shows whether or not the signal recorder is recording values.
• Current Sample
The number of the current measurement
• CL RX-Signal [dBm] / AP RX-Signal [dBm]
The effective user signal of the client / access point in dBm
• CL NF [dBm] / AP NF [dBm]
The background noise of the client / access point in dBm
• CL Retries [%] / AP Retries [%]
The transfer repetitions of the client / access point as a percentage.
• CL RSSI / AP RSSI
The raw value of the RSSI (Received Signal Strength Indication) of the client / access point
• CL TX-Rate [Mbps] / AP TX-Rate [Mbps]
The average data rate of the sent data packets during the current random test
• Roaming Counter
The roaming counter shows how often the client has changed access points during the
recording. After 4,294,967,295 changes, the counter is reset.
• Operative Channel
The current channel or the channel on which the client is connected to the access point
• AP System Name
The system name of the access point
• BSSID
The BSSID (Basic Service Set Identification) of the access point
• Connected Stations
Number of clients connected to the access point over the same VAP interface.
• Bidirectional Status
Shows whether the data of the access point are also being recorded.
Notes on usage
Note the following tips that will help you to obtain useful measurements with the signal
recorder:
• Set a fixed data rate on the access point.
• Make sure that there is enough data communication during the measurement because the
statistics functions evaluate incoming data frames.
• The measurement path should be traveled 2 to 3 times with the same parameters to find out
whether loss of the user data signal always occurs at the same position.
• Selective measurements at a fixed position should be made over a longer period of time.
Procedure
1. Enter the time interval between two measurements.
2. In "Samples" enter the number of measurements.
3. In "Displayed Samples" select how many measurements will be shown in the graphic.
4. Click the "Start" button.
The status (to the right of the graphic) indicates whether the signal recorder is running. The
first measured value is displayed only after the set time interval has elapsed.
5. To stop the recording, click the "Stop" button.
6. Change to one of the following menu items to call up the result of the recording:
– System > Load&Save > HTTP
Click the "Save" button in the "WLANSigRec" table row to save the file
"signal_recorder_SCALANCE_W700.zip" in the file system of the connected PC.
– System > Load&Save > TFTP / SFTP
If necessary, change the file name "signal_recorder_SCALANCE_W700.zip" in the
"WLANSigRec" table row. In the table row "WLANSigRec", select the "Save file" entry from
the drop-down list of the last column and click the "Save Values" button.
7. The ZIP file contains two files with the results of the recording:
– A PDF file: The output is limited to 300 pages.
– A CSV file: Complete listing of the recording.
Note
Number of stored measurements
The last 10000 measuring points are saved in the exported files.
Measurement results
PDF file
The PDF file contains a graphic representation of the course of the effective user data signal
in dBm and the course of the data rate in Mbps. In terms of color, the graphic corresponds
to the appearance in the Web Based Management. If the client changes the access point
(roaming) during the measurement, this is indicated by vertical black bars with a black
square at the tip.
• Access point
Displays the measurement of the access point with which the client is currently connected.
This requires that the setting "Bidirectional Recording" is enabled. The setting is supported by
access points with the following versions: SCALANCE W700 11n > V6.1, SCALANCE W1700
11ac > V1.0 and SCALANCE W700 11ax as of V1.1. The access point sends its data to a
maximum of 3 clients on which signal recorders are running. The access point data is not
displayed on other clients.
The following pages contain the detailed information of all individual measurements in the
form of a table.
The header row shows the IP address of the client and the BSSID and system name of the
access point.
Per measurement the table contains two rows. The data of the client is in the first row and
the data belonging to the access point in the second.
Page 2 shows a legend of the abbreviations in the table. The data starts on a new page when
the client changes access points.
Note
Note the description of the individual columns in the CSV file. These also apply to the columns
of the PDF file.
CSV file
The CSV file contains information on the configuration of the SCALANCE W700 device and
detailed information on all individual measurements and is divided into two areas.
• CL / AP RX-Signal [%]
The effective user data signal of the client (CL) / access point (AP) in %
• CL / AP RX-Signal [dBm]
The effective user data signal of the client (CL) / access point (AP) in dBm
• CL / AP NF [dBm]
The background noise in dBm
• CL / AP RSSI
The raw value of the RSSI (Received Signal Strength Indication)
• Roam
The roaming counter shows how often the client has changed access points during the
recording. After 4 294 967 295 changes the counter is reset.
• CL / AP Retry
The transfer repetitions of the client (CL) / access point (AP)
• Con Stations
Number of clients connected to the access point.
• Operating Ch.
The current channel or the channel on which the client is connected to the access point.
• Width
The channel bandwidth 20, 40 or 80 MHz
• Scan CH
The channel on which the client is currently scanning.
• TX-Rate
The average data rate of the sent data packets
• RX-Rate
The average data rate of the received data packets
• AP System Name
The system name of the access point
Note
This page is available only in access point mode.
On this page, enable the function "Packet Capture" on the interface (Ethernet, WLAN). The
function is for network diagnostics via a connected PC, e.g. to detect transfer errors.
You can also enable the function on several interfaces at the same time. When the function
is enabled the interface can be linked in Wireshark. For a period Wireshark record the data
traffic over the interface. Afterwards, you can view the content of the frames from the
recording or filter according to certain contents.
Note
Capture aborted after settings are changed
Changes to the settings of Packet Capture abort the capture. If the interface is still active, the
data collection process can be restarted after being aborted.
Description
The table contains the following columns:
• Interface
The interface to which the entry relates.
• Enable
Enable or disable the "Packet Capture" function. As default, the function is disabled.
Note
The access point records all incoming frames. Encrypted data is not decrypted before the
recording.
Performance
Enable the function only for diagnostics purposes. The increased data traffic could influence
the performance of the device.
Ethernet interface with SCALANCE WAM763-1
• You can select one or more ports (P1 - P4) for the Ethernet interface.
• Data traffic that is only forwarded and not received or sent by the WLAN interface is not
displayed.
[Link] start the recording, click "Start" in the "Capture" menu. You can obtain further information
about handling the program in Wireshark.
If you analyze several interfaces, you can use a Wireshark instance for each interface.
6.6.1 VLAN
[Link] General
On this page you specify whether or not the device forwards frames with VLAN tags
transparently (IEEE 802.1D/VLAN-unaware mode) or takes VLAN information into account (IEEE
802.1Q/VLAN-aware mode). If the device is in the "802.1Q VLAN Bridge" mode, you can define
VLANs and specify the use of the ports .
Note
Changing the agent VLAN ID
If the configuration PC is connected directly to the device via Ethernet and you change the
management VLAN ID, the device is no longer reachable via Ethernet following the change.
Description
The page contains the following boxes:
• Base Bridge mode
Select the required mode from the drop-down list. The following modes are possible:
Note
Changing Base Bridge mode
Note the section "Changing Base Bridge mode". This section describes how a change affects
the existing configuration.
• Status
Shows the status type of the entry in the internal port filter table. Here, static means that the
address was entered as a static address by the user.
• List of ports
Specify the use of the port. The following options are available:
– "-"
The port is not a member of the specified VLAN.
With a new definition, all ports have the identifier "-".
– M
The port is a member of the VLAN. Frames sent in this VLAN are forwarded with the
corresponding VLAN tag.
– U (uppercase)
The port is an untagged member of the VLAN. Frames sent in this VLAN are forwarded
without the VLAN tag. Frames without a VLAN tag are sent from this port.
– u (lowercase)
The port is an untagged member of the VLAN, but the VLAN is not configured as a port
VLAN. Frames sent in this VLAN are forwarded without the VLAN tag.
– F
The port is not a member of the specified VLAN. You can configure other settings in "Layer
2 > VLAN > Port-based VLAN".
– T
This option is only displayed and cannot be selected in the WBM.
This port is a trunk port, making it a member in all VLANs.
You configure this function in the CLI (Command Line Interface) using the "switchport
mode trunk" command.
Procedure
Requirement:
In Base Bridge mode "802.1Q VLAN Bridge" is set.
Creating a new VLAN
1. Enter an ID in the "VLAN ID" input box.
2. Click the "Create" button. A new entry is generated in the table. As default, the boxes have "-"
entered.
3. Enter a name for the VLAN under Name.
4. Specify the use of the port in the VLAN. If, for example you select M, the port is a member of
the VLAN. The frame sent in this VLAN is forwarded with the corresponding VLAN tag.
5. Click the "Set Values" button.
Requirement:
• On the "General" page, "802.1Q VLAN Bridge" is set for "Base Bridge Mode".
Description
Table 1 has the following columns:
Note
Table 1 is only available if at least one VLAN is configured.
• 1st column
Shows that the settings are valid for all ports.
• Priority / Port VID / Acceptable Frames / Ingress Filtering
In the drop-down list, select the setting for all ports. If "No Change" is selected, the entries of
the corresponding column in table 2 remain unchanged.
• Copy to Table
If you click the button, the setting is adopted for all ports of table 2.
Table 2 has the following columns:
• Port
Shows the available ports and interfaces. The port is made up of the module number and the
port number, for example port 0.1 is module 0, port 1.
• Priority
From the drop-down list, select the priority given to untagged frames.
The CoS priority (Class of Service) used in the VLAN tag. If a frame is received without a tag,
it will be assigned this priority. This priority specifies how the frame is further processed
compared with other frames.
There are a total of eight priorities with values 0 to 7, where 7 represents the highest priority
(IEEE 802.1p Port Priority).
• Port VID
Select the VLAN ID from the drop-down list. Only VLAN IDs defined on the "VLAN > General"
page can be selected.
If a received frame does not have a VLAN tag, it has a tag with the VLAN ID specified here
added to it and is sent according to the rules at the port.
• Acceptable Frames
Specify which types of frames will be accepted. The following alternatives are possible:
– Tagged Frames Only
The device discards all untagged frames. Otherwise, the forwarding rules apply according
to the configuration. Frames tagged with "0" are treated like untagged frames. The device
forwards all tagged frames. Otherwise, the forwarding rules apply according to the
configuration.
– All
The device forwards all frames.
– Untagged and Priority Tagged Only
The device discards all tagged frames. The device forwards all untagged frames as well as
frames with VLAN = 0 and a priority (Priority Tagged Frames). Otherwise, the forwarding
rules apply according to the configuration.
• Ingress Filtering
Specify whether the VID of received frames is evaluated.
You have the following options:
– Enabled
The VLAN ID of received frames decides whether they are forwarded: To forward a VLAN
tagged frame, the receiving port must be a member in the same VLAN. Frames from
unknown VLANs are discarded at the receiving port.
– Disabled
All frames are forwarded.
Procedure
1. In the row of the port to be configured, click on the relevant cell in the table to configure it.
2. Enter the values to be set in the input boxes as follows.
3. Select the values to be set from the drop-down lists.
4. Click the "Set Values" button.
Steps in configuration
1. Select the "Dynamic MAC Aging" check box.
2. Enter the time in seconds in the "Aging Time[s]" input box.
3. Click the "Set Values" button.
[Link] General
Description
The page contains the following boxes:
• Spanning Tree
Enable or disable Spanning Tree.
• Protocol Compatibility
Select the compatibility mode of Spanning Tree. For example if you select RSTP, Spanning
Tree behaves like RSTP.
The following settings are available:
– STP
– RSTP
– MSTP
Procedure
1. Select the "Spanning Tree" check box.
2. Select the compatibility mode from the "Protocol Compatibility" drop-down list.
3. Click the "Set Values" button.
Configuration CIST
The page consists of the following parts.
• The left-hand side of the page shows the configuration of the device.
• The central part shows the configuration of the root bridge that can be derived from the
spanning tree frames received by an device.
• The right-hand side shows the configuration of the regional root bridge that can be derived
from the MSTP frames received by an device. The displayed data is only visible if you have
enabled "Spanning Tree" on the "General" page and when "Protocol Compatibility" is set to
"MSTP". This also applies to the "Bridge Max Hop Count" parameter. If the device is a root
bridge, the information on the left and right matches.
Description
The page contains the following boxes:
• Bridge Priority / Root Priority
Which device becomes the root bridge is decided based on the bridge priority . The bridge
with the highest priority becomes the root bridge. The lower the value, the higher the
priority. If several devices in a network have the same priority, the device whose MAC address
has the lowest numeric value will become the root bridge. Both parameters, bridge priority
and MAC address, together form the bridge identifier. Since the root bridge manages all path
changes, it should be located as centrally as possible due to the delay of the frames. The value
for the bridge priority is a whole multiple of 4096 with a range of values from 0 to 61440.
• Bridge Address / Root Address
The bridge address shows the MAC address of the device and the root address shows the MAC
address of the root bridge.
• Root port
Shows the port over which the device communicates with the root bridge.
• Root Cost
The path costs from this device to the root bridge.
• Topology Changes / Last Topology Change
The entry for the device shows the number of reconfiguration actions due to the spanning
tree mechanism since the last startup. For the root bridge, the time since the last
reconfiguration is displayed as follows:
– Seconds: "sec" unit after the number
– Minutes: "min" unit after the number
– Hour: "hr" unit after the number
• Bridge Hello Time[s] / Root Hello Time[s]
Each bridge regularly sends configuration frames (BPDUs). The interval between two such
frames is the Hello time. The default for this parameter is 2 seconds.
• Bridge Forward Delay[s] / Root Forward Delay[s]
New configuration data is not used immediately by a bridge but only after the period
specified in the forward delay parameter. This ensures that operation is started with the new
topology only after all the bridges have the required information. The default for this
parameter is 15 seconds.
• Bridge Max Age / Root Max Age
Bridge Max Age defines the maximum "age" of a received BPDU for it to be accepted as valid
by the switch. The default for this parameter is 20 seconds.
• Bridge Max Hop Count
This parameter specifies how many MSTP nodes a BPDU may pass through. If an MSTP BPDU
is received and has a hop count that exceeds the value configured here, it is discarded. The
default for this parameter is 20.
• Regional root priority
For a description of the displayed values, see Bridge priority / Root priority
• Regional root address
Shows the MAC address of the regional root bridge.
• Regional Root Cost
Shows the path costs from this device to the regional root bridge.
• Region Name
Enter the name of the MSTP region to which this device belongs. By default, the MAC address
of the device is entered here. This value must be the same on all devices that belong to the
same MSTP region.
• Region Version
Enter the version number of the MSTP region in which the device is located. This value must
be the same on all devices that belong to the same MSTP region.
• Layer-2 Tunnel Admin Edge Port (Only available in access point mode)
Select this check box if there can be an end device on a layer 2 tunnel port. Otherwise, a
reconfiguration of the network will be triggered whenever a link to this port is modified. The
L2T clients should be interconnected.
• Layer-2 Tunnel Auto Edge Port (Only available in access point mode)
Select this check box if you want to detect automatically whether an end device is connected
at all layer 2 tunnel ports.
Procedure
1. Enter the data required for the configuration in the input boxes.
2. Click the "Set Values" button.
Description
Table 1 has the following columns:
• Column 1
Shows that the settings are valid for all ports of table 2.
• Spanning Tree Status
In the drop-down list, select the setting for all ports. If "No Change" is selected, the entries of
the corresponding column in table 2 remain unchanged.
• Copy to Table
If you click the button, the settings are adopted for all ports of table 2.
• Priority
Enter the priority of the port. The priority is only evaluated when the path costs are the same.
The value must be divisible by 16. If the value that cannot be divided by 16, the value is
automatically adapted.
Range of values: 0 - 240.
The default is 128.
• Cost Calc
Enter the path cost calculation. If you enter the value "0" here, the automatically calculated
value is displayed in the "Path Cost" box.
• Path Cost
The path costs from this port to the root bridge. The path with the lowest value is selected as
the path. If several ports of a device have the same value, the port with the lowest port
number will be selected.
If the "Cost Calc." box has the value "0", the automatically calculated value is shown.
Otherwise, the value of the "Cost Calc." box is displayed.
The calculation of the path costs is largely based on the transmission speed. The higher the
achievable transmission speed is, the lower the value of the path costs.
Typical values for path costs with rapid spanning tree:
– 1000 Mbps = 20,000
– 100 Mbps = 200,000
– 10 Mbps = 2,000,000
The values can, however, also be set individually.
• State
Displays the current state of the port. The values are only displayed and cannot be
configured. The "State" parameter depends on the configured protocol. The following is
possible for status:
– Disabled
The port only receives and is not involved in STP, MSTP and RSTP.
– Discarding
In the "Discarding" mode, BPDU frames are received. Other incoming or outgoing frames
are discarded.
– Listening
In this status, BPDUs are both received and sent. The port is involved in the spanning tree
algorithm.
– Learning
Stage prior to the forwarding status, the port is actively learning the topology (in other
words, the node addresses).
– Forwarding
Following the reconfiguration time, the port is active in the network; it receives and
forwards data frames.
• Fwd. Trans
Specifies the number of changes from the "Discarding" status to the "Forwarding" status.
• Edge Type
Specify the type of edge port. You have the following options:
– "-"
Edge port is disabled. The port is treated as a "no EdgePort".
– Admin
Select this option when there is always an end device on this port. Otherwise a
reconfiguration of the network will be triggered each time a connection is changed.
– Auto
Select this option if you want a connected end device to be detected automatically at this
port. When the connection is established the first time, the port is treated as a "no Edge
Port".
– Admin/Auto
Select these options if you operate a combination of both on this port. When the
connection is established the first time, the port is treated as an Edge Port.
• Edge
Shows the status of the port.
– Enabled
– "-"
Point-to-point is detected automatically. If the port is set to half duplex, a point-to-point
link is not assumed.
• P.t.P.
– Enabled
Shows that a point-to-point link exists.
– Disabled
Shows that no point-to-point link exists.
• Hello Time
Enter the interval after which the bridge sends configuration BPDUs. As default, 2 seconds is
set.
Range of values: 1-2 seconds
Note
The port-specific setting of the Hello time is only possible in MSTP compatible mode.
Procedure
1. In the input cells of the table row, enter the values of the port you are configuring.
2. From the drop-down lists of the cells of the table row, select the values of the port you are
configuring.
3. Click the "Set Values" button.
Description
The page contains the following box:
• MSTP Instance ID
Enter the number of the MSTP instance.
Permitted values: 1 - 64
You can define up to 16 MSTP instances.
The table has the following columns:
• Select
Select the row you want to delete.
• MSTP Instance ID
Shows the number of the MSTP instance.
• Root Address
Shows the MAC address of the root bridge
• Root Priority
Shows the priority of the root bridge.
• Bridge Priority
Enter the bridge priority in this box. The value for the bridge priority is a whole multiple of
4096 with a range of values from 0 to 61440.
• VLAN ID
Enter the VLAN ID. Here, you can also specify ranges with Start ID, "-", End ID. Several ranges
or IDs are separated by ",".
Permitted values: 1- 4094
Procedure
Creating a new entry
1. Enter the number of the MSTP instance in the "MSTP Instance ID" box.
2. Click the "Create" button.
3. Enter the identifier of the virtual LAN in the "VLAN ID" input box.
4. Enter the priority of the bridge in the "Bridge Priority" box.
5. Click the "Set Values" button.
Deleting entries
1. Use the check box at the beginning of the relevant row to select the entries to be deleted.
2. Click the "Delete" button to delete the selected entries from memory. The entries are deleted
from the memory of the device and the display on this page is updated.
Description
The page contains the following box:
• MSTP Instance ID
In the drop-down list, select the ID of the MSTP instance.
Table 1 has the following columns:
• Column 1
Shows that the settings are valid for all ports of table 2.
• MSTP Status
In the drop-down list, select the setting for all ports. If "No Change" is selected, the entries of
the corresponding column in table 2 remain unchanged.
• Copy to Table
If you click the button, the setting is adopted for all ports of table 2.
Procedure
1. In the input cells of the table row, enter the values of the port you are configuring.
2. From the drop-down lists of the cells of the table row, select the values of the port you are
configuring.
3. Click the "Set Values" button.
Applications
The DCP protocol is used by STEP 7 and SINEC PNI for configuration and diagnostics. In the
delivery state, DCP is enabled on all Ethernet ports; in other words, received DCP frames are
forwarded on all ports. With this option, you can disable the sending of frames for individual
ports, for example to prevent individual parts of the network from being configured with SINEC
PNI or to divide the full network into smaller parts for configuration and diagnostics.
All the ports of the device are displayed on this WBM page.
Description
The table has the following columns:
• Port
Shows the available Ethernet ports.
• Setting
Specify whether the port should block or forward outgoing DCP frames. You have the
following options available:
– Forward
DCP frames are forwarded at this port.
– Block
No outgoing DCP frames are forwarded at this port. It is nevertheless still possible to
receive via this port.
Procedure
1. Specify whether the port blocks or forwards the DCP frames.
2. Click the "Set Values" button.
6.6.5 LLDP
Applications
PROFINET uses LLDP for topology diagnostics. In the default setting, LLDP is enabled for all ports;
in other words, LLDP frames are sent and received on all ports. With this function, you have the
option of enabling or disabling sending and/or receiving per port.
Description
The table has the following columns:
• Port
Shows the port.
• Setting
Specify the LLDP functionality. The following options are available:
– Tx
This port can only send LLDP frames.
– Rx
This port can only receive LLDP frames.
– Rx & Tx
This port can receive and send LLDP frames.
– "-" (Disabled)
This port can neither receive nor send LLDP frames.
Procedure
1. Select the required LLDP functionality from the drop-down list.
2. Click the "Set Values" button.
6.7.1 Subnets
[Link] Overview
The page shows the subnets for the selected VLAN interface. This VLAN interface is also called
an IPv4 interface. A subnet always relates to an IPv4 interface. The IPv4 address is assigned in the
"Configuration" tab.
Description
The page contains the following boxes:
• Interface
Select the interface on which you want to configure the subnet.
The table has the following columns:
• Select
Select the row you want to delete.
This column is only shown if there are multiple interfaces.
• Interface
Shows the interface.
• TIA Interface
Shows whether or not the interface is used as TIA interface.
• Status
Shows the status of the interface.
• Interface Name
Shows the name of the interface.
• MAC Address
Shows the MAC address.
• IP Address
Shows the IPv4 address of the subnet.
• Subnet Mask
Shows the subnet mask.
• Address Type
Displays the address type. The following values are possible:
– Primary
The first IPv4 address that was configured on an IPv4 interface.
– Secondary
All other IPv4 addresses that were configured on an IPv4 interface.
• IP Assign Method
Shows how the IPv4 address is assigned. The following values are possible:
– Static
The IPv4 address is static. You enter the settings in "IP Address" and "Subnet Mask".
– Dynamic (DHCP)
The device obtains a dynamic IPv4 address from a DHCPv4 server.
Procedure
1. Select the VLAN interface from the "Interface" drop-down list.
2. Click the "Create" button. A new row is inserted in the table.
3. Configure the subnet on the "Configuration" tab.
[Link] Configuration
On this page, you configure the IPv4 interface.
Description
The page contains the following boxes:
• Interface (Name)
Select the interface from the drop-down list.
• Status
Specify whether the interface is enabled or disabled.
– Enabled
The interface is enabled. Data traffic is possible only over an enabled Interface.
– Disabled
The interface is disabled.
• Interface Name
Enter the name of the interface.
• MAC Address
Displays the MAC address of the selected interface.
• DHCP
Enable or disable the DHCP client for this IPv4 interface.
• IP Address
Enter the IPv4 address of the interface. The IPv4 addresses must not be used more than once.
• Subnet Mask
Enter the subnet mask of the subnet you are creating. Subnets on different interfaces must
not overlap.
• Address Type
Shows the address type.
– Primary
The first subnet of the interface.
• TIA Interface
Select whether this interface should become the TIA interface. The TIA interface defines on
which VLAN the PROFINET functionalities are available. This mainly affects the device search
with or via DCP.
• MTU
MTU (Maximum Transmission Unit) specifies the maximum size of the packet. If packets are
longer than the set MTU, they are fragmented. The MTU covers the IP headers and the
headers of the higher layers.
Range of values:
– With IPv4: 90 ... 1514
– With IPv6: 1280 ... 1514
Procedure
1. Select the interface from the "Interface (Name)" drop-down list.
2. Select the status of the interface in the "Status" drop-down list.
3. Enter a name for the Interface in "Interface Name".
4. Enter the IPv4 address of the subnet in the "IP Address" column or enable the "DHCP" option.
5. Enter the subnet mask belonging to the IPv4 address in the "Subnet Mask" column.
6. Click the "Set Values" button.
Description
The page contains the following boxes:
• Destination Network
Enter the network address of the destination that can be reached via this route.
• Subnet Mask
Enter the corresponding subnet mask.
• Gateway
Enter the IPv4 address of the gateway via which this network address is reachable.
• Administrative Distance
Enter the metric for the route. The metric corresponds to the quality of a connection, for
example speed, costs. If there are several equal routes, the route with the lowest metric value
is used.
If you do not enter anything, "not used" is entered automatically. The metric can be changed
later.
Range of values: 1 - 255 or -1 for "not used".
Here, 1 is the value for the best possible route. The higher value, the longer packets require
to their destination.
The table has the following columns:
• Select
Select the row you want to delete.
• Destination Network
Shows the network address of the destination.
• Subnet Mask
Shows the corresponding subnet mask.
• Gateway
Shows the IPv4 address of the next gateway.
• Interface
Shows the interface of the route.
• Administrative Distance
Enter the metric for the route. When creating the route, "not used" is entered automatically.
The metric corresponds to the quality of a connection, based for example on speed or costs.
If there are several equal routes, the route with the lowest metric value is used.
Range of values: 1 - 255
Here, 1 is the value for the best possible route. The higher value, the longer the packets
require to their destination.
• Status
Shows whether or not the route is active.
Procedure
1. Enter the network address of the destination in the "Destination Network" input box.
2. Enter the corresponding subnet mask in the "Subnet Mask" input box.
3. Enter the gateway in the "Gateway" input box.
6.7.3 NAT
[Link] Masquerading
Note
This page is only available for clients or access points in client mode.
Note
Enabling IP masquerading on at least one VLAN enables NAPT.
Requirements
• "802.1Q VLAN Bridge" is set for "Base bridge mode".
• A second VLAN is set up and the IPv4 interface is configured, see "Subnets (Page 259)".
Description
The table has the following columns:
• Interface
Interface to which the setting relates. Only interfaces with a configured subnet are available.
• Enable Masquerading
When enabled, with each outgoing data packet sent via this interface, the source IP address
is replaced by the IP address of the interface.
[Link] NAPT
Note
This page is only available for clients or access points in client mode.
On this WBM page, you can configure a port translation in addition to the address translation.
The following port translations are possible:
• From a single port to the same port:
If the ports are the same, the frames will be forwarded without port translation.
• From a single port to a single port
The frames are translated to the port.
• From a port range to a single port
The frames from the port range are translated to the same port (n:1).
• From a port range to the same port range
If the port ranges are the same, the frames will be forwarded without port translation.
Requirements
• IP masquerading is enabled.
• Under "Layer 2 > VLAN > Basic", "802.1Q VLAN Bridge" is set for "Base Bridge Mode".
Description
The page contains the following boxes:
• Source Interface
Select the interface on which the queries will arrive.
• Traffic Type
Specify the protocol for which the address assignment is valid.
• Use Interface IP from Source Interface
When enabled, the IP address of the selected interface is used for "Dest IP Address".
• Destination IP Address
Enter the destination IP address. The frames are received at this IP address. Can only be edited
if "Use Interface IP from Source Interface" is disabled.
Note
The rule is only enabled if the IP address of the VLAN is the same.
• Destination Port
Enter the destination port. Incoming frames with this port as the destination port are
forwarded. If the setting is intended to apply to a port range, enter the range with start port
"-" end port, for example 30 - 40.
• Translated Destination IP
Enter the IP address of the node to which this frame will be forwarded.
• Translated Destination Port
Enter the number of the port. This is the new destination port to which the incoming frame
will be forwarded. If the setting is intended to apply to a port range, enter the range with start
port "-" end port, for example 30 - 40.
The table has the following columns:
• Select
Select the check box in the row to be deleted.
• Source Interface
Shows the interface from which the packets need to come. Only these packets are considered
for port forwarding.
• Traffic Type
Shows the protocol for which the address assignment applies.
• Interface IP
Shows whether the IP address of the interface is used.
• Destination IP
Shows the destination IP address. The frames are received at this IP address.
• Destination Port
Shows the destination port. Incoming frames with this port as the destination port are
forwarded.
• Translated Destination IP
Shows the IP address of the node to which the packets will be forwarded.
• Translated Destination Port
Shows the destination port to which the packets are translated.
6.8.1 Subnets
Note
Update from V1.0 to V1.1
The configuration of the IPv6 addresses is not transferred with an update from V1.0 to V1.1.
Description
The page contains the following:
• Interface
Shows the VLAN interface on which IPv6 will be enabled.
• IPv6 Enable
Enable or disable IPv6 on the interface. When you enable the setting and accept it, the link-
local address is created automatically.
• IPv6 Address
Enter the IPv6 address. The input depends on the selected address type.
• Prefix Length
Enter the number of left-hand bits belonging to the prefix.
Procedure
Automatically form link-local address
1. Enable IPv6.
2. Click the "Set Values" button. In the table an entry with the interface is created and the
automatically formed link-local IPv6 address is displayed.
Assign link-local address
1. Enable IPv6.
2. In "IPv6 Address", enter the link-local address, e.g. FE80::21B:1BFF:FE40:9155
3. Enter "128" in "Prefix Length".
4. For "IPv6 Address Type" select the entry "Link Local".
5. For "Address Configuration" select the entry "Static".
6. Click the "Create" button. In the table an entry with the interface is created and the IPv6
address is displayed.
The automatically created link-local address is overwritten.
Description
The page contains the following:
• Destination Network
Destination Network (:: or [Link]) applies to all IPv6 addresses.
• Prefix Length
Enter the number of left-hand bits belonging to the prefix
• Gateway
Enter the IPv6 address of the gateway to which the IPv6 packets will be sent.
• Metric
Enter the metric for the route. The metric corresponds to the quality of a connection, based
for example on speed or costs. If there are several equal routes, the route with the lowest
metric value is used.
Range of values: 1 - 254
• Interface
Specify the interface via which the network address of the destination is reached.
This table contains the following columns:
• Select
Select the check box in the row to be deleted.
• Destination Network
Shows the network address of the destination.
• Prefix Length
Shows the prefix length.
• Gateway
Shows the IPv6 address of the next gateway.
• Interface
Shows the Interface of the route.
• Metric
Enter the metric for the route. When creating the route, "not used" is entered automatically.
The metric corresponds to the quality of a connection, based for example on speed or costs.
If there are several equal routes, the route with the lowest metric value is used.
Range of values: 1 - 254
• Status
Shows whether or not the route is active.
Steps in configuration
1. Enter the prefix length.
2. Enter the IPv6 address of the gateway.
3. Enter the metric of the route.
4. Select the interface through which the network address of the destination is reached.
5. Click the "Create" button. A new entry is generated in the table.
6.9.1 Users
Local users
On this page, you manage both local and external users that are defined on a RADIUS server and
the rights assigned to them.
When you create or delete a local user this change is also made automatically in the table
"External User Accounts". If you want to make change explicitly for the internal or external
user table, use the CLI commands.
Note
The values displayed depend on the rights of the logged-in user.
Description
The page contains the following:
• User Account
Enter the name for the user. The name must meet the following conditions:
– It must be unique.
– It must be between 1 and 250 characters long.
You can find information on permitted characters in Appendix G of the WBM (Page 353).
Note
User name cannot be changed
After creating a user, the user name can no longer be modified.
If a user name needs to be changed, the user must be deleted and a new user created.
Note
User names: admin
You can configure the device with this user name.
When you log in for the first time or log in after a "Restore Factory Defaults and Restart", you
are prompted to change the pre-defined password "admin". You can also rename the user
preset in the factory "admin" once. Afterwards, renaming "admin" is no longer possible.
• Password Policy
Shows which password policy is being used:
– High
Password length: At least 8 characters, maximum 32 characters
At least 1 uppercase letter
At least 1 special character
At least 1 number
– Low
Password length: at least 6 characters, maximum 128 characters
– Custom
You configure the password policy on the page "Security > Passwords > Options".
• Password
Enter the password. The strength of the password depends on its length and complexity.
You can find information on permitted characters in Appendix G of the WBM (Page 353).
Password Confirmation
Enter the password again to confirm it.
• Role
Select a role.
You can choose between system-defined and self-defined roles, refer to the page "Security >
Users > Roles".
• User Account
Shows the user name.
• Role
Shows the role of the user.
• Description
Displays a description of the user account. The description text can be up to 100 characters
long.
Procedure
Note
Changes in "Trial" mode
Even if the device is in "Trial" mode, changes that you carry out on this page are saved
immediately.
Creating users
1. Enter the name for the user.
2. Enter the password for the user.
3. Enter the password again to confirm it.
4. Select the role of the user.
5. Click the "Create" button.
6. Enter a description of the user.
7. Click the "Set Values" button.
Deleting users
1. Select the check box in the row to be deleted.
2. Click the "Delete" button. The entries are deleted and the page is updated.
[Link] Roles
Roles
On this page, you create roles that are valid locally on the device.
Note
The values displayed depend on the rights of the logged-in user.
Description
The page contains the following:
• Role Name
Enter the name for the role. The name must meet the following conditions:
– It must be unique.
– It must be between 1 and 64 characters long.
You can find information on the permitted characters in Appendix G of the WBM (Page 353).
Note
Role name cannot be changed
After creating a role, the name of the role can no longer be changed.
If a name of a role needs to be changed, the role must be deleted and a new role created.
• Role
Shows the name of the role.
• Function Right
Select the function rights of the role:
– 1
Users with this role can read device parameters but cannot change them. Users with this
role can only change their own password.
– 15
Users with this role can both read and change device parameters.
Note
Function right cannot be changed
If you have assigned a role, you can no longer change the function right of the role.
If you want to change the function right of a role, follow the steps outlined below:
1. Delete all assigned users.
2. Change the function right of the role.
3. Assign the role again.
• Description
Enter a description for the role. With predefined roles a description is displayed. The
description text can be up to 100 characters long.
Procedure
Creating a role
1. Enter the name for the role.
2. Click the "Create" button.
3. Select the function rights of the role.
4. Enter a description for the role.
5. Click the "Set Values" button.
Deleting a role
1. Select the check box in the row to be deleted.
2. Click the "Delete" button. The entries are deleted and the page is updated.
[Link] Groups
User groups
On this page you link a group with a role.
For example, the group "Administrators" is linked to the "admin" role. The group is defined
on a RADIUS server. The role is defined locally on the device. When a RADIUS server
authenticates a user and assigns the user to the "Administrators" group, this user is given
rights of the "admin" role.
Note
The values displayed depend on the rights of the logged-in user.
Description
The page contains the following:
• Group Name
Enter the name of the group. The name must match the group on the RADIUS server.
The name must meet the following conditions:
– It must be unique.
– It must be between 1 and 64 characters long.
You can find information on the permitted characters in Appendix G of the WBM (Page 353).
The table contains the following columns:
• Select
Select the check box in the row to be deleted.
• Group
Shows the name of the group.
• Role
Select a role. Users who are authenticated with the linked group on the RADIUS server receive
the rights of this role locally on the device.
You can choose between system-defined and self-defined roles, refer to the page "Security >
Users > Roles.".
• Description
Enter a description for the link of the [Link] a role. The description text can be up to 100
characters long.
Procedure
Linking a group to a role
1. Enter the name of a group.
2. Click the "Create" button.
3. Select a role.
4. Enter a description for the link of a [Link] a role.
5. Click the "Set Values" button.
Deleting the link between a group and a role
1. Select the check box in the row to be deleted.
2. Click the "Delete" button. The entries are deleted and the page is updated.
6.9.2 Passwords
Note
If you are logged in via a RADIUS server, you cannot change any passwords.
On this page, you can change passwords. If you are logged in with the right to change device
parameters, you can change the passwords for all user accounts. If you are logged in as user,
you can only change your own password.
• Password Policy
Shows which password policy is being used when assigning new passwords.
Note
Checking the password policy of existing users
The set password policy is used when assigning new passwords. Existing passwords are not
checked. If you change the password policy from "Low" to "High", the previously used
passwords remain valid. As an important measure for increasing security, change the
passwords used up to now.
– High
Password length: at least 8 characters, maximum 128 characters
At least 1 uppercase letter
At least 1 special character
At least 1 number
– Low
Password length: at least 6 characters, maximum 128 characters
– Custom
You configure the password policy on the page "Security > Passwords > Options".
• New Password
Enter the new password for the selected user.
You can find information on the permitted characters in Appendix G of the WBM (Page 353).
• Password Confirmation
Enter the new password again to confirm it.
Procedure
1. From the "User Account" drop-down list, select the user whose password you want to change.
2. Enter the valid password for the currently logged in user in the "Current User Password" input
box.
3. Enter the new password for the selected user in the "New Password" input box.
4. Repeat the new password in the "Password Confirmation" input box.
5. Click the "Set Values" button.
Note
The factory settings for the passwords when the devices ship are as follows:
• admin: admin
When you log in for the first time or following a "Restore Factory Defaults and Restart", with
the preset user "aadmin" you will be prompted to change the password.
Note
Changing the password in Trial mode
Even if you change the password in Trial mode, this change is saved immediately.
[Link] Options
On this page, you specify which password policy will be used when assigning new passwords.
Description
• Password Policy
Shows which password policy is currently being used.
• New Password Policy
Select the required setting from the drop-down list.
– High
Password length: at least 8 characters, maximum 128 characters
At least 1 number
At least 1 special character
At least 1 uppercase letter
– Low
Password length: at least 6 characters, maximum 128 characters
– User-defined
Configure the desired password requirements under "Password Policy Details".
• Password Policy Details
When you have selected the "High" or "Low" password policy, the relevant password
requirements are displayed.
When you have selected the "User-defined" password policy, you can configure the relevant
password requirements.
– Minimum Password Length
Specifies the minimum length of a password.
– Minimum Number of Numeric Characters
Specifies the minimum number of numeric characters in a password.
– Minimum Number of Special Characters
Specifies the minimum number of special characters in a password.
– Minimum Number of Uppercase Letters
Specifies the minimum number of uppercase characters in a password.
– Minimum Number of Lowercase Letters
Specifies the minimum number of lowercase characters in a password.
6.9.3 AAA
[Link] General
Description
The page contains the following boxes:
Note
To be able to use the login authentication "RADIUS", "Local and RADIUS" or "RADIUS and fallback
Local", a RADIUS server must be stored and configured for user authentication.
• Login Authentication
Specify how the login is made:
– Local
The authentication must be made locally on the device.
– RADIUS
The authentication must be handled via a RADIUS server.
– Local and RADIUS
The authentication is possible both with the users that exist on the device (user name and
password) and via a RADIUS server.
The user is first searched for in the local database. If the user does not exist there, a RADIUS
request is sent.
– RADIUS and fallback Local
The authentication must be handled via a RADIUS server.
A local authentication is performed only when the RADIUS server cannot be reached in
the network.
[Link] RADIUS-Client
Description
The page contains the following boxes:
• RADIUS Authorization Mode
For the login authentication, the RADIUS authorization mode specifies how the rights are
assigned to the user with a successful authentication.
– Standard
In this mode the user is logged in with administrator rights if the server returns the value
"Administrative User" to the device for the attribute "Service Type". In all other cases the
user is logged in with read rights.
– Vendor Specific
In this mode the assignment of rights depends on whether and which group the server
returns for the user and whether or not there is an entry for the user in the table "External
User Accounts".
The table has the following columns:
• Select
Select the row you want to delete.
• Auth. Server Type
Shows which authentication method the server will be used for.
– Login
The server is used only for the login authentication.
• RADIUS Server Address
Enter the IP address or the FQDN (Fully Qualified Domain Name) of the RADIUS server.
• Server Port
Here, enter the input port on the RADIUS server. As default, input port 1812 is set. The range
of values is 1 to 65535.
• Shared Secret
Enter your access ID here. The range of values is 1...128 characters.
• Shared Secret Conf.
Enter your access ID again as confirmation.
• Max. Retrans.
Enter the maximum number of retries for an attempted query.
The initial connection attempt is repeated the number of times specified here before another
configured RADIUS server is queried or the login counts as having failed. As default 3 retries
are set, this means 4 connection attempts. The range of values is 1 to 5.
• Timeout[s]
Specify how long the RADIUS client waits for a response from the RADIUS server before
attempting login again.
• Primary Server
Using the options in the drop-down list, specify whether or not this server is the primary
server. You can select one of the options "yes" or "no".
• Test
With this button, you can test whether the credentials of the specified RADIUS user are on the
server.
The authentication test is performed once. If there is a failed login to the RADIUS server, this
event is logged.
• Test Result
Shows whether or not the RADIUS server is available:
– Not reachable
The IP address is not reachable.
The IP address is reachable, the RADIUS server is, however, not running.
– Reachable, key not accepted
The IP address is reachable, the RADIUS server does not, however accept the shared secret.
– Reachable, key accepted
The IP address is reachable, the RADIUS server accepts the specified shared secret.
Steps in configuration
Entering a new server
1. Click the "Create" button. A new entry is generated in the table.
The following default values are entered in the table:
– RADIUS Server Address: [Link]
– Server Port: 1812
– Max. Retrans.: 3
– Primary server: No
2. In the relevant row, enter the following data in the input boxes:
– RADIUS Server Address
– Server Port
– Shared Secret
– Shared Secret Conf
– Max. Retrans.: 3
– Primary server: No
3. If necessary check the reachability of the RADIUS server.
4. Click the "Set Values" button.
Repeat this procedure for every server you want to enter.
Modifying servers
1. In the relevant row, enter the following data in the input boxes:
– RADIUS Server Address
– Server Port
– Shared Secret
– Shared Secret Conf
– Max. Retrans.
– Primary Server
2. If necessary check the reachability of the RADIUS server.
3. Click the "Set Values" button.
Repeat this procedure for every server whose entry you want to modify
Deleting servers
1. Click the check box in the first column before the row you want to delete to select the entry
for deletion.
Repeat this for all entries you want to delete.
2. Click the "Delete" button. The data is deleted from the memory of the device and the page is
updated.
Brute Force Prevention (BFP) refers to the protection of the device from unauthorized access by
trying a sufficiently large number of passwords. The number of incorrect login attempts within a
specific time period is limited for this purpose.
Description
The page contains the following boxes:
• User Specific BFP is Enabled. / User Specific BFP is Disabled.
– Enabled:
With login authentication, the "Local" or "Local and RADIUS" mode is set and the
maximum number of invalid login attempts is greater than 0.
– Disabled:
With login authentication, the "RADIUS" or "RADIUS and fallback Local" mode is set or the
maximum number of invalid login attempts is 0.
You configure the login authentication under "Security > AAA > General > Login
Authentication".
• Acceptable Invalid Login Attempts Per User
The maximum number of invalid login attempts for a user accepted by the device. Further
login attempts for this user are blocked for a specific time.
The users that are not configured as local users for the device are summarized under the user
name "UnknownUser".
0: User Specific BFP is Disabled.
• Blocked[s]
The time in seconds until the blocking will be removed. To display the current value, click the
"Refresh" button.
When a blocked IP address attempts to log in before the timer expires, the timer restarts.
• Delete
Ends blocking for the IP address and resets the displays in the "Last Failed[s]" and "Blocked[s]"
boxes.
6.9.5 WLAN
Safety levels
To make the network secure, authentication and encryption are used. On this page, you specify
the security settings.
Description
The table has the following columns:
• Port
Shows the available ports.
• Frequency Band
Shows the frequency band.
• Authentication Type
Select the type of authentication. The selection depends on the operating mode and the
transmission standard.
– Open System
There is no authentication.
– WPA (RADIUS)
Wi-Fi Protected Access (WPA) is a method specified by the Wi-Fi Alliance to close security
gaps in WEP. Authentication using a server (802.1x) is mandatory. The dynamic exchange
of keys at each data frame introduces further security.
– WPA-PSK
WPA Pre Shared Key (WPA-PSK) is a weakened form of WPA. In this method, authentication
is not carried out by a server but is based on a password. This password is configured
manually on the client and server.
– WPA2 (RADIUS)
WPA2 (Wi-Fi Protected Access 2) is a further development of WPA and implements the
functions of the IEEE 802.11i security standard. However, WPA authentication works with
the RADIUS server.
– WPA2-PSK
WPA2-PSK is based on the 802.11i standard. However, WPA authentication works without
a RADIUS server. Instead of this, a key (pass phrase) is stored on each client and access
point. The pass phrase is used for authentication and further encryption.
– WPA/WPA2-AUTO-PSK
First try to connect with WPA2. If the client is not WPA2-enabled, the connection is made
using WPA.
– WPA/WPA2 AUTO (RADIUS)
First try to connect using WPA2 (RADIUS). If the client is not WPA2-enabled, the
connection is made using WPA (RADIUS).
– WPA3-SAE
Only configurable in WLAN mode "802.11ax"
WPA3 replaces WPA2 and uses the Simultaneous Authentication of Equals (SAE) to
authenticate access points and clients. With SAE, keys are mutually stored and
exchanged, but the pass phrase is not made public, so attackers cannot find the keys
through brute force dictionary attacks. With WPA3, PMF must be negotiated for all WPA3
connections, which offers additional protection against deauthentication and
disassociation attacks.
• Cipher
– AUTO
Either AES or TKIP is automatically selected, depending on the capability of the other
station.
– TKIP (Temporal Key Integrity Protocol)
A symmetrical stream encryption method with the RC4 (Ron’s Code 4) algorithm. In
contrast to the weak WEP encryption, TKIP uses changing keys derived from a main key.
TKIP can also recognize corrupted data frames.
– AES (Advanced Encryption Standard)
Strong symmetrical block encryption method based on the Rijndael algorithm that further
improves the functions of TKIP.
• Key
Enter a key here. This key must be known on both the client and the access point and is
entered by the user at both ends.
– For a key with 8 to 63 characters, you can only use the following readable ASCII
characters: 0x20 - 0x7e.
– For a key with precisely 64 characters, you can use the following ASCII characters: 0 - 9,
a - f and A - F.
• Key Confirmation
Confirm the key entered above.
• PMF (Protected Management Frames)
Can only be used with the following:
– WLAN mode: IEEE 802.11n/ac/ax
– Authentication type: WPA2-PSK, WPA2 (RADIUS) and WPA3-SAE
With this setting, the management frames are cryptographically protected. This prevents, for
example, the WLAN client being separated from the access point due to corrupted
disassociation / deauthenticate frames. You can find more information on this in the IEEE
802.11w standard.
The following settings are possible:
– disabled
The management frames are not encrypted.
– required
The management frames are always encrypted. A connection of the WLAN clients to the
access point is only possible when these also support PMF. With the WPA3-SAE
authentication type, this setting is always selected and cannot be configured.
– optional
The management frames are encrypted or unencrypted depending on support of the
WLAN client.
Procedure
1. Select the required security settings.
2. Click the "Set Values" button.
Safety levels
To make the network secure, authentication and encryption are used. On this page, you specify
the security settings.
Note
This page is only available for clients or access points in client mode.
Description
The table has the following columns:
• Security Context
Shows the security context.
• Authentication Type
Select the type of authentication. The selection depends on the operating mode and the
transmission standard.
– Open System
There is no authentication.
– WPA (RADIUS)
Wi-Fi Protected Access (WPA) is a method specified by the Wi-Fi Alliance to close security
gaps in WEP. Authentication using a server (802.1x) is mandatory. The dynamic exchange
of pass phrases at each data frame introduces further security.
Note
Make the relevant RADIUS settings initially on the page "Security > WLAN > Client RADIUS
Supplicant".
– WPA-PSK
WPA Pre Shared Key (WPA-PSK) is a weakened form of WPA. In this method, authentication
is not carried out by a server but is based on a password. This password is configured
manually on the client and server.
– WPA2 (RADIUS)
WPA2 (Wi-Fi Protected Access 2) is a further development of WPA and implements the
functions of the IEEE 802.11i security standard. However, WPA authentication works with
the RADIUS server.
Note
Make the relevant RADIUS settings initially on the page "Security > WLAN > Client RADIUS
Supplicant".
– WPA2-PSK
WPA2-PSK is based on the 802.11i standard. However, WPA authentication works without
a RADIUS server. Instead of this, a key (pass phrase) is stored on each client and access
point. The pass phrase is used for authentication and further encryption.
– WPA3-SAE
Only configurable in WLAN mode "802.11ax"
WPA3 replaces WPA2 and uses the Simultaneous Authentication of Equals (SAE) to
authenticate access points and clients. With SAE, pass phrases are mutually stored and
exchanged, but the pass phrase is not made public, so attackers cannot find the pass
phrases through brute force dictionary attacks. With WPA3, PMF must be negotiated for
all WPA3 connections, which offers additional protection against deauthentication and
disassociation attacks.
• Cipher
– AUTO
Either AES or TKIP is automatically selected, depending on the capability of the other
station.
– TKIP (Temporal Key Integrity Protocol)
A symmetrical stream encryption method with the RC4 (Ron’s Code 4) algorithm. In
contrast to the weak WEP encryption, TKIP uses changing pass phrases derived from a
main pass phrase. TKIP can also recognize corrupted data frames.
– AES (Advanced Encryption Standard)
Strong symmetrical block encryption method based on the Rijndael algorithm that further
improves the functions of TKIP.
Note
To provide better protection of your data against attacks, use WPA2/ WPA2-PSK with AES.
• Pass Phrase
Enter a pass phrase here for authentication with the WPA2-PSK or WPA3-SAE . This pass
phrase must be known on both the client and the access point and is entered by the user at
both ends.
For a pass phrase with 8 to 63 characters, you can only use the following readable ASCII
characters: 0x20 - 0x7e.
For a pass phrase with precisely 64 characters, you can use the following ASCII characters: 0
- 9, a - f and A - F.
Note
New pass phrase when the authentication type is changed
When the authentication type is changed, the previous pass phrase is deleted.
Procedure
1. Select the required security settings. The settings that are possible depend on the set
"Authentication Type".
2. Click the "Set Values" button.
Note
This WBM page is only available in access point mode.
Description
The page contains the following boxes:
• Reauthentication Mode
Specify who sets the time after which the clients are forced to reauthenticate.
– - (disabled)
The reauthentication mode is disabled.
– Server
Enables time management on the server.
– Local
Enables local time management. Set the validity period for "Reauthentication Interval".
• Reauthentication Interval [s]
If time management is local, enter the period of validity of the authentication in seconds. The
minimum time is 1 minute (enter 60), the maximum time is 12 hours (enter 43200). The
default is one hour (3,600 seconds).
The table has the following columns:
• Server IP Address
Enter the IP address or the FQDN (Fully Qualified Domain Name) of the RADIUS server.
• Server Port
Here, enter the input port on the RADIUS server.
• Shared Secret
Enter the password of the RADIUS server.
For the password, ASCII code 0x20 to 0x7e is used.
• Shared Secret Conf
Confirm the password.
• Max. Retransmissions
Enter the maximum number of connection attempts.
• Primary Server
Specify whether or not this server is the primary server.
– Yes: Primary server
– No: Backup server
• Status
With this check box, you can enable or disable the RADIUS server.
Procedure
Entering a new server
To display a new server, follow the steps below:
1. In the relevant row, enter the following data in the input boxes:
– IP address or FQDN of the RADIUS server
– Port number of the input port
– Password
– Confirmation of the password
– Maximum number of transmission retries
– Primary server
2. Click the "Set Values" button.
Modifying servers
1. In the relevant row, enter the following data in the input boxes:
– IP address or FQDN of the RADIUS server
– Port number of the input port
– Password
– Confirmation of the password
– Maximum number of transmission retries
– Primary server
2. Select the "Status" check box to enable the RADIUS server.
3. Click the "Set Values" button.
Repeat this procedure for every server whose entry you want to modify.
Client Supplicant
On this WBM page, you configure the settings for the RADIUS authorization of the client.
Note
This page is only available for clients or access points in client mode.
Description
• Minimum TLS Version
Specify the minimum TLS version to be used for WLAN RADIUS authentication.
Note
RADIUS Server
This is only possible when the RADIUS Server supports the TLS version.
Note
Minimum TLS version must be appropriate to the security level of the SSL certificates
Authentication attempts with WLAN client and server certificates whose encryption
mechanisms do not correspond to the requirements of the selected min. TLS version fail.
Select a suitable minimum TLS version.
Example: The SHA1 signature algorithm is not supported by TLS V1.2 as of version V3.0. If
you want to use SHA1 certificates, the min. TLS version cannot be higher than V1.1. You can
find information on the supported security mechanisms with RADIUS authentication in the
WBM, appendix "Ciphers used > RADIUS (Page 347)".
Note
Dot1X user name and Dot1X user password
With WPA (RADIUS), WPA2 (RADIUS), EAP-TLS, EAP-TTLS and PEAP the Dot1X user name and the
Dot1X user password must be configured.
With the setting "Auto" either the certificate must be loaded or the Dot1X user name and the
Dot1X user passport must be configured.
Procedure
1. Enter the necessary values in the input boxes.
2. Select the required entry in the "Dot1x EAP Types" drop-down list.
3. Click the "Set Values" button.
[Link] 802.11r
On this WBM page, you configure the setting for Fast BSS Transition.
Note
This WBM page is only available in access point mode.
You can find additional information under "Description > IEEE 802.11r".
Requirement
• The access points are members of the same mobility domain.
• Only possible with WPA2 (WPA2-PSK and WPA2 RADIUS) and WPA3 encryption.
Description
The table has the following columns:
• Radio
Shows the available WLAN interfaces.
• Port
Shows the VAP interface.
• Mobility Domain ID
Enter the ID of the mobility domain. The access points with the same ID are members of one
mobility domain. Based on the ID, the WLAN client recognizes whether the access point is a
member of the same mobility domain and can therefore log on without delay.
[Link] Basic
Note
This WBM page is only available in access point mode.
This function can only be enabled when the CLP 2GB W700 AP iFeatures (6GK5
907-8UA00-0AA0) is inserted in the device and the configuration has been applied.
Description
The page contains the following box:
• Update interval [s]
Enter the update interval for the ARP resolution of the allowed IP addresses. The resolved
MAC addresses are displayed under "Information > Security > Inter AP Blocking".
The table has the following columns:
• Radio
Shows the WLAN interface to which the settings relate.
• Port
Shows the VAP interface to which the settings relate.
• Frequency Band
Shows the frequency band to which the settings relate.
• SSID
Shows the SSID to which the settings relate.
• Enable
When enabled, the access restriction is used. You configure which devices are accessible to
the clients in "Security > Inter AP Blocking > Allowed Addresses".
• Block Gratuitous ARP Requests
When enabled, gratuitous ARP packets from this VAP interface are not forwarded to Ethernet.
• Block Non-IP Frames
When enabled, there is no exchange of non-IP packets, for example layer 2 packets between
the client and the devices configured on the access point as permitted communications
partners.
Note
This WBM page is only available in access point mode.
On this WBM page, you specify which devices are accessible to the clients.
Description
The page contains the following boxes:
• Port
Select the required port from the drop-down list.
• IP Address
Enter the IP address of the devices accessible to the client.
The table has the following columns:
• Select
Select the check box in the row to be deleted
• Radio
Specifies the WLAN interface to which the settings relate
• Port
Specifies the VAP interface to which the settings relate
• IP Address
The IP Address of the devices accessible to the client. If necessary, you can change the IP
address.
• Resolver IP Address
The IP address that the access point uses to resolve the allowed IP address. The entry is
necessary when the management IP address of the access point is located in a different
subnet.
If the IP address "[Link]" is configured for "Resolver IP Address", the management IP address
is used for resolution.
Procedure
Creating an entry
1. Select a port from the "Port" drop-down list.
2. In the "IP Address" box, enter the IP address accessible for the client.
3. Click the "Create" button. A new entry is created in the table.
Deleting an entry
1. Enable "Select" in the row to be deleted.
2. Click the "Delete" button. The entry is deleted.
6.10.1 iPCF-2
On this page, you can enable iPCF-2.
iPCF-2 is recommended for use in environments that use automation protocols. With iPCF-2,
cyclic data exchange between the access point and its logged-on clients is defined and
maintained, provided that a dedicated free channel with sufficient reception strength is
available for iPCF-2. In addition, depending on the application, no DFS channel should be
used.
Note
This page is only available in connection with the inserted CLP iFeatures. For more detailed
information, refer to the section "Configuration License PLUG (CLP) (Page 29)".
Note
Mutual interlock of iFeatures
iPRP and iPCF-2 are not compatible with each other and cannot be used at the same time on a
device.
During dual operation of an access point, an iFeature cannot be enabled on a WLAN interface if
an iFeature has already been enabled on the other interface.
'LVSOD\LQDFFHVVSRLQWPRGH
'LVSOD\LQFOLHQWPRGH
Description
The table has the following columns:
• Radio
Shows the WLAN interface to which the settings relate.
• Enable iPCF-2
Enable or disable iPCF-2 mode.
A message about changes in the settings is displayed.
Procedure
1. Select the "Enable iPCF-2" option for the required WLAN interface.
2. Click the "Update" button.
Result
iPCF-2 mode is enabled. Enabling this results in the following changes on the WLAN interface:
• VAPx.1 is enabled on the page "Interface > WLAN > AP". All other VAPs are disabled on the
respective interface.
• If the authentication type on VAP x.1 is "WPA2-PSK", the settings on the page "Security >
WLAN > 802.11r" are configured as follows:
– The Mobility Domain ID is automatically generated on VAPx.1 based on the last two SSID
characters. The value is applied for VAPx.1.
– Fast BSS Transition is enabled on VAP x.1.
6.10.2 iPRP
On this page, you can enable iPRP.
Note
This page is only available in connection with the inserted CLP iFeatures. For more detailed
information, refer to the section "Configuration License PLUG (CLP) (Page 29)".
Note
Mutual interlock of iFeatures
iPRP and iPCF-2 are not compatible with each other and cannot be used at the same time on a
device.
During dual operation of an access point, an iFeature cannot be enabled on a WLAN interface if
an iFeature has already been enabled on the other interface.
Note
SCALANCE W700 IEEE802.11ax firmware does not support synchronization of the clients during
scanning and roaming operations. Therefore, simultaneous scanning and roaming operations,
which can result in brief transfer interruptions, can occur.
Note
iPRP with oversize frames (jumbo frames)
To be able to use oversize frames, oversize frames (jumbo frames) must be configured on all
devices in the network.
Agent VLAN (management VLAN) with iPRP
The iPRP VLAN can be used as the agent VLAN. This depends where the device is located.
• If the device is located in the PRP network A or PRP network B, use the VLAN that PRP A or PRP
B is assigned to as the agent VLAN.
• If the access points are located in both PRP networks, you can use one of the two VLANs as
the agent VLAN. As an alternative you can also use other VLANs as agent VLANs. The division
into PRP networks A and B must remain. A single management VLAN for all devices in
network A and B is not possible without further measures.
With the "industrial Parallel Redundancy Protocol" (iPRP), the PRP technology can be used
in wireless networks. With IPRP the PRP frames are transferred parallel via two wireless
links. The parallel transfer allows disruptions of the transfer on one wireless link to be
compensated on the other.
With transfer paths that are not the same, iPRP reduces the number of duplicated and
out-of-order packets. The application/protocol used must be able to handle the remaining
duplicates and out-of-order packets.
'LVSOD\LQDFFHVVSRLQWPRGH
'LVSOD\LQFOLHQWPRGH
Description
The page contains the following:
• Ethernet interface (only with SCALANCE WxM763)
Select the required Ethernet interface P1 ... P4 on which you want to enable iPRP.
• PRP A
Select the VLAN assignment for PRP A.
• PRP B
Select the VLAN assignment for PRP B.
Procedure
1. For "PRP A", select the VLAN assignment for PRP A.
2. For "PRP B", select the VLAN assignment for PRP B.
3. Specify the PRP network in which the port is a member.
4. Select the "Enable iPRP" setting. Click the "Set Values" button.
The appropriate VLAN settings are made automatically.
Requirement
• The device has an IP address.
• The user is logged in with administrator rights.
Result
The firmware has been transferred completely to the device.
On the "Information > Versions" there are the entries "Firmware" and "Firmware Running".
Firmware Runningshows the version of the current firmware. "Firmware" shows the firmware
version stored after loading the firmware. To activate this firmware, restart the device with
"System > Restart".
Note
Using configurations with DHCP
If you want to use the ConfigPack with embedded firmware to commission multiple devices with
the same configuration and firmware, create a ConfigPack only from device configurations that
use DHCP. Otherwise, disruptions will occur in network operation due to multiple identical IP
addresses.
You assign fixed IP addresses extra following the basic installation.
1. Start the remote configuration using Telnet (CLI) and log on with a user with the "admin" role.
2. Change to the global configuration mode with the command "configure terminal".
3. You change to the loadsave configuration mode with the "loadsave" command.
4. Enter the "firmware-in-configpack" command without parameters.
The firmware currently on this device is now included as a separate file in the ConfigPack
when you save it.
Note
Embedding firmware in ConfigPack.
When the device is restarted this functionality is lost again and must be reactivated.
If you save a ConfigPack in the WBM or CLI, the firmware is embedded. The file can be
supplied with a password before download. To load the file into the device successfully, use
the specified password.
Refer to the information in the section Load & Save (Page 129).
Note
Installing ConfigPack with DHCP options 66, 67
You can also install the ConfigPack using DHCP with options 66 and 67 activated.
You activate the options in the menu "System > DHCP > DHCP Client".
Password-protected ConfigPack and DHCP options 66.67
If the file is password-protected, you cannot install the file via DHCP with options 66 and 67.
If you install a ConfigPack using WBM or CLI, firmware stored there is also installed.
NOTICE
Do not remove or insert a PLUG during operation
A PLUG may only be removed or inserted when the device is turned off.
Note
Support of PRESET-PLUG functionality
SCALANCE W700ax supports PRESET-PLUG functionality as of firmware version V1.0. SCALANCE
W1700ac supports PRESET-PLUG functionality as of firmware version V1.1.
With the PRESET-PLUG, you can install the same device configuration (start configuration,
user accounts, certificates) including the corresponding firmware on multiple devices.
The PRESET PLUG is write-protected.
You configure the PRESET PLUG using the Command Line Interface (CLI).
Creating a PRESET-PLUG
You create the PRESET PLUG using the Command Line Interface (CLI). You can create a PRESET-
PLUG from any PLUG. To do this, follow the steps outlined below:
Note
Using configurations with DHCP
Create a PRESET-PLUG only from device configurations that use DHCP. Otherwise disruptions will
occur in network operation due to multiple identical IP addresses.
You assign fixed IP addresses extra following the basic installation.
Requirement
• A CLP on which you want to configure the PRESET-PLUG functionality is inserted in the device.
Procedure
1. Start the remote configuration using SSH (CLI) and log in as a user with the "admin" role.
2. Switch to the global configuration mode with the command "configure terminal".
3. You change to the PLUG configuration mode with the "plug" command.
4. Create the PRESET-PLUG with the "presetplug" command.
The firmware version of the device and the current device configuration incl. user accounts
and certificates are stored on the PLUG and the PLUG is then write protected.
5. Turn off the power to the device.
6. Remove the PRESET-PLUG.
7. Start the device either with a new CLP inserted or with the internal configuration.
3. Insert the PRESET-PLUG correctly oriented into the slot. The PRESET-PLUG is correctly inserted
when it is completely inside the device and does not jut out of the slot.
4. Turn on the power to the device again.
If there is a different firmware version on the device to be installed compared with that on the
PRESET-PLUG, an upgrade/downgrade of the firmware is performed. You can recognize this
by the red F-LED flashing (flashing interval: 2 sec on/0.2 sec off). Afterwards the device is
restarted and the device configuration incl. users and certificates on the PRESET-PLUG is
transferred to the device.
5. Wait until the device has fully started up.
(the red F-LED is off)
6. Turn off the power to the device after the installation.
7. Remove the PRESET-PLUG.
8. Start the device either with a new CLP inserted or with the internal configuration.
Note
Restore factory defaults and restart with a PRESET PLUG inserted
If you reset the device to the factory defaults, when the device restarts an inserted PRESET PLUG
is formatted and the PRESET PLUG functionality is lost. You then need to create a new PRESET
PLUG. The keys stored on the KEY-PLUG for releasing functions are retained.
We recommend that you remove the PRESET PLUG before you reset the device to the factory
settings.
NOTICE
Previous settings
If you reset, all the settings you have made will be overwritten by factory defaults.
NOTICE
Inadvertent reset
An inadvertent reset can cause disturbances and failures in a configured network with further
consequences.
Cause
If there is a power failure during the firmware update, it is possible that the device is no longer
accessible using Web Based Management or the CLI.
When pressing the button, be sure to read the information in the "Reset button" section of
the operating instructions.
Solution
You can then also assign firmware to a SCALANCE W using TFTP.
Follow the steps below to load new firmware using TFTP:
1. Turn off the power to the device.
2. Now press the Reset button and reconnect the power to the device while holding down the
button.
3. Hold down the button until the red fault LED (F) starts to flash after approximately 2 seconds.
4. Now release the button. The bootloader waits in this state for a new firmware file that you can
download by TFTP.
5. Connect a PC to the SCALANCE W over the Ethernet interface.
6. Assign an IP address to the SCALANCE W with the SINEC PNI.
7. Open a DOS box and change to the directory where the file with the new firmware is located
and then execute the command "tftp -i <ip address> PUT <firmware>". As an alternative, you
can use a different TFTP client.
8. Close the cover to ensure that the device is closed and water and dust proof.
Note
Use of CLI and TFTP in Windows 10
If you want to access the CLI or TFTP in Windows 10, make sure that the relevant functions are
enabled in Windows 10.
Result
The firmware is transferred to the device.
Note
Please note that the transfer of the firmware can take several minutes. During the transmission,
the red error LED (F) flashes.
Once the firmware has been transferred completely to the device, the device is restarted
automatically.
Solution
If communication is disrupted by an excessive signal strength (greater than -35 dBm), you can
eliminate the problem in the following ways:
• Increase the distance between the transmitter and receiver.
• Reduce the transmit power of the IWLAN partner with suitable settings in WBM or CLI.
NOTICE
Changing the default password after configuring with STEP 7
If a device in the default status is configured only with STEP 7, it is not possible to change the
default password. This change must be made directly on the device using WBM or CLI.
Otherwise the default password is retained and any user could log in using the default
password.
1)
Part of the [Link]
You can download the [Link] for SCALANCE W from Siemens Industry Auto‐
mation and Drives Service & Support under the entry ID 67637278 (https://
[Link]/cs/ww/en/view/67637278)
2)
Part of the private MIB file "Scalance_w_msps.mib". You can download the file in the WBM
with the "Save" button under "System > Load & Save > HTTP > MIB".
OID
The private MIB variables of the SCALANCE W have the following object identifier:
iso(1).org(3).dod(6).internet(1).private(4). enterprises(1)
siemens(4329) industrialComProducts(20) iComPlatforms(1)
simaticNet(1) snMsps(1) snMspsCommon(1)
Message Description
Warm start performed, Ver: V02.00.00 - event/ Type of startup and the loaded firmware version
status summary after startup.
Power supply: Status of the power supplies line 1 and line 2
• L1 is connected
• L2 is not connected
• PoE is connected
• PoE is not connected
No line is monitored. Information about monitoring the power supply from the signaling system
Spanning Tree disabled. Information on the status of the Spanning Tree protocol
Spanning Tree enabled.
No Fault states pending after startup. Fault status following system start
Scheduled restart cancelled. The scheduled restart was aborted.
Scheduled restart in xx seconds. The device restarts in xx seconds.
Message Description
Power up on line 1 / 2 / PoE. Power supply available on line 1, line 2 or PoE
Power down on line 1 / 2 / PoE. Power supply interrupted on line 1, line 2 or PoE
Message Description
Link up on P1. There is a connection on the Ethernet interface
Link down on P1. There is no connection on the Ethernet interface
Link up on P1: <Speed> The speed that is currently present is >= 100 Mbps and full duplex (FD)
New Fault state: "Result of autonegotiation on P1: The speed is < 100 Mbps or half duplex (HD)
<Speed>
Result of autonegotiation on P1: <Speed>
Link up on P1: <Speed>
Messages
Link down up VAP X.Y. The VAP interface Y on the WLAN interface X is enabled.
Link down on VAP X.Y. The VAP interface Y on the WLAN interface X is disabled.
Overlap-AP found on WLAN X: AP <System Name> A further access point was detected on the channel set for the WLAN
<MAC Address> found on channel <channel num‐ interface X or on a neighboring channel.
ber> <RSSI value>
Overlap-AP aged out on WLAN X: AP <System The overlapping access point could not be detected during the configured
Name> <MAC Address> on channel <channel aging time and was removed from the "Overlap AP" list.
number> <RSSI value>
DFS: Radar interference detected on WLANX at If the access point discovers a radar signal on the current channel, it noti‐
channel <channel number> (frequency <frequen‐ fies the clients of the channel change. It then automatically switches to an
cy> MHz) alternative DFS channel and the current channel is blocked for 30 minutes.
DFS: start DFS scan on WLANX at channel <chan‐
nel number> (frequency <frequency> MHz)
DFS: finished DFS scan on WLANX at channel
<channel number> (frequency <frequency> MHz)
DFS: channel <channel number> (frequency <fre‐ No radar signal detected on the channel any longer. The channel was
quency> MHz) aged out from NOL at WLANX and removed from the list of blocked channels and can be used again.
can be used again
DFS: Radar interference detected on WLANX at There is no free channel available, the WLAN interface X will be deactiva‐
channel <channel number> (frequency <frequen‐ ted until one of the channels becomes available.
cy> MHz)
DFS: No Channels are available al WLANX.
Messages Description
Link up on WLAN X. The WLAN interface X is enabled.
Link down on WLAN X. The WLAN interface X is disabled.
Messages on configuration
Messages Description
WBM/SSH/Telnet: User {user name} failed to log in An incorrect password was entered during login. The event can be enabled
from {ip address}. or disabled in "System -> Events" (Authentication Failure).
Restart requested. Restart due to a user request. The event can be enabled or disabled in
"System -> Events" (Cold/Warm Start).
Device configuration changed. The configuration was changed.
WBM/SSH/Telnet: User {user name} is locked for The user / IP address was locked for the duration (in minutes) after the
%d minutes after %d unsuccessful login attempts. failed login.
WBM/SSH/Telnet: The session of user {user name} The session was ended.
was closed after %d seconds of inactivity.
Message Description
Log file cleared. The log entries are deleted.
Message Description
Update DNS: empty nameservers list. No DNS server has been created.
Messages Description
Messages about sleep mode:
Device changed to Sleep Mode for %d minutes. Sleep mode was triggered on the device for the duration (in minutes).
DI/DO messages:
TCP Event {ip address} Result: 1 aborted - wrong The format of the TCP packet does not match.
TCP packet format
TCP Event {ip address} Result: 1 aborted - wrong Wrong user name or password specified
username or password
TCP Event {ip address} Result: 1 aborted - internal Save failed due to an internal error
storage failed
TCP Event {ip address} Result: 1 aborted - incorrect Invalid action
action
TCP Event {ip address} Result: 1 aborted - wrong Invalid command
command code
TCP Event {ip address} Result: 1 aborted - incorrect Invalid action for digital output
Digital Out action
TCP Event {ip address} Result: 1 aborted - invalid Invalid sleep mode duration
Sleep Mode duration
TCP Event {ip address} Result: 1 aborted - invalid Invalid action for sleep mode
Sleep Mode action
TCP Event {ip address} Result: 1 incoming - Digital The digital output has been activated.
Out activated
TCP Event {ip address} Result: 1 incoming - Digital The digital output has been deactivated.
Out deactivated
TCP Event {ip address} Result: 1 incoming - Sleep The sleep mode has been activated.
Mode activated
TCP Event {ip address} Result: 1 aborted The action failed.
Messages on WLAN roaming:
WLAN roaming triggered by TCP Event A connection transition to another access point was initiated.
WLAN roaming by TCP Event: Client is already con‐ The client has already logged in on the access point.
nected to BSSID: <BSSID>
Messages Description
File upload via HTTP(S): load of FileType <File Loading the file via HTTP(S) was successful. A restart is required.
type> OK
→ restart required
File upload via HTTP(S): load of FileType<File Loading the file via HTTP(S) was successful.
type> OK
File upload via HTTP(S): validation of FileType <File Loading the file via HTTP(S) was successful. The file is identical to the
type> IDENTICAL existing file.
File upload via HTTP(S): validation of FileType <File Loading the file via HTTP(S) failed. The file contains errors or is invalid.
type> FAILED
File upload via TFTP: load of FileType <File type> Loading the file using TFTP was successful. A restart is required.
OK
→ restart required
File upload via TFTP: load of FileType <File type> Loading the file using TFTP was successful.
OK
File upload via TFTP: validation of FileType <File Loading the file using TFTP was successful. The file is identical to the ex‐
type> IDENTICAL isting file.
File upload via TFTP: validation of FileType <File Loading the file using TFTP failed. The file contains errors or is invalid.
type> FAILED
File upload via TFTP: file transfer of FileType <File Loading the file using TFTP failed. The file name is incorrect or the file does
type> FAILED not exist on the server.
File upload via TFTP: file transfer of FileType <File Loading the file using TFTP failed. The TFTP server cannot be reached or
type> failed. Cannot connect to given IP address the settings are incorrect.
File download via TFTP: file transfer of FileType Saving the file using TFTP failed. The TFTP server cannot be reached or the
<File type> failed. Cannot connect to given IP ad‐ settings are incorrect.
dress
Messages Description
New Fault state: <Fault description> Incoming fault
<Fault description>: "Warm start performed." Not all events automatically lead to a fault. On the "Events" WBM page, you
"Cold start performed." "Link down on P1." "Link up specify which events will be logged, for example device restart, changed
on P1." "Power down on line L1 (L2)" "DFS: No link on the Ethernet port.
channels are available at WLAN2".
Fault state gone: <Fault description> Outgoing fault
<Fault description>: "Warm start performed."
"Cold start performed." "Link down on P1." "Link up
on P1." "Power down on line L1 (L2)" "DFS: No
channels are available at WLAN2" "PLUG not ac‐
cepted. See System PLUG mask for details."
Messages Description
New Fault state (reconfiguration): <Fault descrip‐ Incoming fault
tion> The event was triggered due to a change in the configuration.
<Fault description>: "Link down on P1." "Link up on
P1." "Power down on line L1 (L2)".
Fault state gone (reconfiguration): <Fault descrip‐ Outgoing fault
tion> The event was triggered due to a change in the configuration.
<Fault description>: "Link down on P1." "Link up on
P1." "Power down on line L1 (L2)".
Fault state: <Fault description> cleared. Fault was acknowledged by the user.
<Fault description>: "Warm start performed" "Cold
start performed".
Messages Description
Backup Restore: Loaded file type <File type> (re‐ The file was successfully loaded after restoring the configuration backup to
start required). the device. A restart is required.
Possible file types:
• Config
• ConfigPack
• WBMFav
• Users
Backup Restore: Loaded file type <File type> which The file was successfully loaded after restoring the configuration backup to
is identical. the device. The file is identical to the existing file.
Messages Description
Spanning Tree: topology change detected. The topology of the network has changed; the network will be reorgan‐
ized.
Spanning Tree: new root bridge <MAC address> The topology of the network has changed; there is a new root bridge in the
detected. network.
Messages Description
RADIUS: Access accepted / rejected for client <MAC The authentication of the client was successful or not successful.
Adress>.
Messages Description
Syslog-Server not reachable! The configured Syslog server is not accessible.
Unable to send messages to syslog server. Please The syslog server configuration is incomplete.
check syslog socket configuration.
Unable to send e-mail(s) because of IP connection Sending of e-mail(s) failed. SMTP server cannot be reached (e.g. network
failure. connection interrupted).
Unable to send e-mail(s) because of SMTP authen‐ Sending of e-mail(s) failed. Authentication of the client on the SMTP serv‐
tication failure. er incorrect.
Unable to send e-mail(s) because SMTP message Sending of e-mail(s) failed. SMTP server accessible, configuration incom‐
transfer failed. plete or faulty (e.g. receiver e-mail address wrong / not available).
SNMP: Authentification failure. Authentication of an SNMP client failed; access not possible (e.g.
SNMPv1/v2 read-only configured or Read Community String incorrectly
configured).
IP communication is possible. Remote logging ac‐ IP communication is possible. Remote logging is activated.
tivated.
IP communication is not possible. Remote logging IP communication is not possible. Remote logging is deactivated. Check
deactivated. Please check IP configuration and net‐ whether or not the device has an IP address.
work connectivity.
Messages Description
Connected to <Server name> server with IP ad‐ The connection to the time server was established.
dress <IP address>.
Time synchronized via '<Server name>' with serv‐ The time is synchronized.
er IP '<IP address>:<Port>'.
NTP:Client: SecureNTP key updated for the associ‐ The NTPsecure authentication key for the NTP server with the relevant NTP
ation id <NTP Server Index> server index is updated.
Messages Description
Digital output is closed. The digital output is closed (conductive).
Digital output is open. The digital output is opened (not conductive).
Value of digital input is 0. The voltage at the digital input is -30 to +3 V DC.
Value of digital input is 1. The voltage at the digital input is +10 to +30 V DC.
Alarm Description
Startup configuration: Internal storage There is no PLUG inserted.
PLUG: Not present
Startup configuration: Internal storage There is no PLUG inserted. Functions are configured on the device for
PLUG: Missing which a PLUG License (CLP) is required.
PLUG: License missing
Startup configuration: Internal storage Invalid or incompatible configuration on the inserted PLUG.
PLUG: Configuration not accepted Functions are configured on the device for which a PLUG License (CLP) is
PLUG: License missing required.
Startup configuration: Internal storage The PLUG license (CLP) is wrong.
PLUG: Configuration accepted
PLUG: License wrong
Startup configuration: Internal storage Invalid or incompatible configuration on the inserted PLUG.
PLUG: Configuration not accepted
PLUG: License accepted
Startup configuration: Internal storage The internal configuration was written successfully to an empty PLUG Li‐
PLUG: Factory clean → filled with internal configu‐ cense (CLP).
ration
PLUG: Configuration accepted
PLUG: License accepted
Startup configuration: Internal storage The internal configuration was written successfully to an empty PLUG
PLUG: Factory clean → filled with internal configu‐ Configuration (CLP).
ration
PLUG: Configuration accepted
Startup configuration: PLUG storage The configuration was loaded successfully from the PLUG License (CLP).
PLUG: Configuration accepted
PLUG: License accepted
Startup configuration: PLUG storage The configuration was loaded successfully from the PLUG Configuration
PLUG: Configuration accepted (CLP).
Messages Description
Factory default PLUG found. There is an empty or formatted PLUG in the device.
PLUG: Filled PLUG was found. The PLUG in the device has been emptied. The current device configura‐
PLUG: Configuration Accepted tion was written to the PLUG.
PLUG: Removed at runtime. The PLUG License (CLP) or the PLUG Configuration (CLP) was removed
during operation.
PLUG accepted. PLUG was accepted.
PLUG: Different device type found. Different device type
Message Description
Client <MAC address> <System Name> associated success‐ The client has logged in successfully on the access point.
fully.
Client <MAC address> <System Name> disassociated with The client was logged off from the access point.
reason <reason description>.
VAP<Num>: Client <MAC address> failed to associate; sta‐ The connection of the client to the VAP has failed. The reason is
tus (<text>). displayed as text.
VAP<Num>: Client <MAC address> disassociated with rea‐ The client was successfully disconnected from the VAP. The rea‐
son (<text>). son is displayed as text.
VAP<Num>: Client <MAC address> deauthenticated with The client was logged off from the AP. The reason is displayed as
reason (<text>). text.
VAP<Nummer> Client <MAC address> failed to authenti‐ The authentication of the client failed. The reason is displayed as
cate; status (<text>). text.
VAP<Num>: Client <MAC address> failed to disassociate; The connection of the client could not be terminated. The reason
status (<text>). is displayed as text.
VAP<Num>: Client <MAC address> associated successfully. The client has connected successfully to the VAP or the client has
logged on successfully to the VAP.
VAP<Num>: Client <MAC address> associated successful‐ The client has connected successfully to the VAP or the client has
ly using FT Over-the-air. logged on successfully to the VAP.
Fast BSS Transition "Over-the-air" was used for the connection
transition.
RADIUS: Access rejected for client <MAC address>. The RADIUS server denies the client access.
RADIUS: Access accepted for client <MAC address>. The RADIUS server allows the client access.
Message Description
Associated successfully to AP <MAC address> <System The client has logged in successfully on the access point.
Name> at channel <Channel number> (frequency <fre‐ If the client is not connected to any access point and then logs on
quency> MHz). to an access point for the first time, a WLAN Authentication Log
is output. Example:
Associated successfully to AP [Link] at channel 40
(frequency 5200 MHz).
Associated successfully to AP <MAC address> <System The client has logged in successfully on the access point. The
Name> at channel <Channel number> (frequency <fre‐ roaming time is specified on switching of access points.
quency> MHz) roaming time <time> ms.
Associated successfully to AP <MAC address> <System The client has logged in successfully on the access point.
Name> using FT Over-the-air at channel <Channel number> Fast BSS Transition "Over-the-air" was used for the connection
(frequency <frequency> MHz) roaming time <time> ms. transition. The roaming time is specified.
Associated successfully to AP <BSSID> using FT Over-the-air The client has logged in successfully on the access point.
at channel <Channel number> (frequency <frequency> Fast BSS Transition "Over-the-air" was used for the connection
MHz) roaming time <time> ms. transition. The roaming time is specified.
Message Description
Disassociated from AP <MAC address> <System Name> The client was logged off from the access point.
with reason (Disassociated because sending STA is leaving
(or has left) BSS).
Deauthenticated from AP <MAC address> with reason The client was logged off from the access point. The reason is
(<text>). displayed as text.
Failed to authenticate to AP <MAC address>; status (<text>). The authentication of the client with the access point failed. The
reason is displayed as text.
Failed to disassociate from AP <MAC address>; status The connection of the client to the access point could not be
(<text>). terminated. The reason is displayed as text.
Failed to associate to AP <MAC address>; status (<text>). The connection of the client to the access point has failed. The
reason is displayed as text.
4-Way handshake to AP <MAC address> failed (Info element An error occurred during authentication in the four-stage hand‐
in 4-Way Handshake different from (Re)Association Request/ shake procedure. The info element is different in the various
Probe Response/Beacon frames of the access point for the 4-way handshake.
Expansion of messages on the roaming operation in the access point and client mode
Expansion Description
roaming time <time> ms Additional information in the messages "Associated successfully"
and "Reassociated successfully":
Specifies the WLAN roaming time that is measured from the log‐
ical start of the login procedure in the client until receipt of the
first positive response for connection.
roaming time including authorization <time> ms Additional information in the messages "Authorized successful‐
ly":
Specifies the WLAN roaming time that is measured from the log‐
ical start of the login procedure in the client until the end of key
exchange.
Message Description
Log file cleared. The log entries are deleted.
Note
Additional information about the meaning of the boxes is available in RFC 5424 (https://
[Link]/doc/html/rfc5424).
Log text {protocol}: User {user name} logged in from {ip address}.
Standard IEC 62443-3-3 Reference: SR1.1
Description Valid login information that is specified during remote login.
Example WBM: User admin logged in from [Link].
Severity Info
Facility local0
Log text {protocol}: Default user {user name} logged in from {ip address}.
Standard IEC 62443-3-3 Reference: n/a (NERC-CIP 007-R5)
Description User logged in with default user name and password.
Example SSH: Default user admin logged in from [Link].
Severity Info
Facility local0
Log text {protocol}: User {user name} logged out from {ip address}.
Standard IEC 62443-3-3 Reference: SR1.1
Description User session completed - logged out.
Example SSH: User admin logged out from [Link].
Severity Info
Facility local0
Log text {protocol}: User {user name} failed to log in from {ip address}.
Standard IEC 62443-3-3 Reference: SR1.1
Description Incorrect user name or incorrect password (login information) specified during
remote login.
Example SSH: User testuser failed to log in from [Link].
Severity Warning
Facility local0
Log text {protocol}: User {user name} changed password of user {action user name}.
Standard IEC 62443-3-3 Reference: SR1.3
Description User has changed other password.
Example WBM: User admin changed password of user test.
Severity Info
Facility local0
Log text {protocol}: User {user name} created user-account {action user name}.
Standard IEC 62443-3-3 Reference: SR1.3
Description The administrator created a new account.
Example WBM: User admin created user-account joachim.
Severity Info
Facility local0
Log text {protocol}: User {user name} deleted user-account {action user name}.
Standard IEC 62443-3-3 Reference: SR1.3
Description The administrator deleted an existing account.
Example WBM: User admin deleted user-account joachim.
Severity Info
Facility local0
Log text {protocol}: User {user name} created group {group} and assigned to role {role}.
Standard IEC 62443-3-3 Reference: SR1.4
Description The administrator has created a group and assigned it to a role.
Example WBM: User admin created group it-service and assigned to role service.
Severity Info
Facility local0
Log text User {user name} deleted group {group} and the role {role} assignment.
Standard IEC 62443-3-3 Reference: SR1.4
Description The administrator has deleted an existing group and the role assignment.
Example WBM: User admin deleted group it-service and the role service assignment.
Severity Info
Facility local0
Log text User {user name} account is locked for {time} minutes after {failed login count}
unsuccessful login attempts.
Standard IEC 62443-3-3 Reference: SR1.11
Description If there are too many failed logins, the corresponding user account was locked for a
specific period of time.
Example User admin account is locked for 10 minutes after 30 unsuccessful login attempts.
Severity Warning
Facility local0
Log text Overlap-AP found on {wlan interface}: AP {ssid} {ap mac} found on channel {chan-
nel} rssi {signal strength}.
Standard IEC 62443-3-3 Reference: SR 2.2
Description Radio frequency is already in use.
Example Overlap-AP found on WLAN 1: AP scalance [Link] found on channel 11
rssi 12.
Severity Info
Facility local0
Log text {vap}: Client {client mac} disassociated with reason {reason}.
Standard IEC 62443-3-3 Reference: SR 2.2
Description WLAN client disconnected from AP.
Log text {vap}: Client {client mac} failed to associate, status {status}.
Standard IEC 62443-3-3 Reference: SR 2.2
Description WLAN client connection to AP denied.
Example VAP1.1: Client [Link] failed to associate, status (Invalid group cipher).
Severity Warning
Facility local0
Log text {vap}: Client {client mac} failed to authenticate, status {status}.
Standard IEC 62443-3-3 Reference: SR 2.2
Description The WLAN client was not able to authenticate itself.
Example VAP1.1: Client [Link] failed to authenticate, status (Invalid group ci‐
pher).
Severity Warning
Facility local0
Log text RADIUS: {ip address} - No response from the RADIUS server.
Standard IEC 62443-3-3 Reference: SR 2.2
Description RADIUS server not found.
Example RADIUS: [Link] - No response from the RADIUS server.
Severity Warning
Facility local0
Session lock
Log text The session of user {user name} was closed after {time} seconds of inactivity.
Standard IEC 62443-3-3 Reference: SR2.5
Description The current session was locked due to inactivity.
Example The session of user admin was closed after 60 seconds of inactivity.
Severity Warning
Facility local0
Log text {protocol}: The maximum number of {max sessions} concurrent login session ex‐
ceeded.
Standard IEC 62443-3-3 Reference: SR2.7
Description The maximum number of parallel connections is exceeded.
Log text {protocol}: User {user name} saved file type ConfigPack
Standard IEC 62443-3-3 Reference: SR7.3
Description Backup completed
Example WBM: User admin saved file type ConfigPack..
Severity Info
Facility local0
Log text {protocol}: User {user name} failed to save file type ConfigPack.
Standard IEC 62443-3-3 Reference: SR7.3
Description Backup failed
Example WBM: User admin failed to save file type ConfigPack.
Severity Warning
Facility local0
Severity Warning
Facility local0
Log text {protocol}: Loaded file type Firmware {version} (restart required).
Standard IEC 62443-3-3 Reference: SR7.4
Description Firmware update was successfully uploaded.
Example TFTP: Loaded file type Firmware V02.00.00 (restart required).
Severity Info
Facility local0
Log text {protocol}: User {user name} loaded file type Firmware {version} (restart required).
Standard IEC 62443-3-3 Reference: SR7.4
Description Firmware update was successfully uploaded.
Example WBM: User admin loaded file type Firmware V02.00.00 (restart required).
Severity Info
Facility local0
Log text {protocol}: User {user name} loaded file type Config (restart required).
Standard IEC 62443-3-3 Reference: SR7.4
Description The configuration is applied.
Example WBM: User admin loaded file type Config (restart required).
Severity Info
Facility local0
Log text {protocol}: User {user name} loaded file type ConfigPack (restart required).
Standard IEC 62443-3-3 Reference: SR7.4
Description The configuration is applied.
Example WBM: User admin loaded file type ConfigPack (restart required).
Severity Info
Facility local0
Encryption method
None ✓
WPA-TKIP ✓
WPA-AES ✓
Authentication
Password / PSK ✓
Password / SAE ✓
IEEE 802.1X EAP PEAP ✓
IEEE 802.1X EAP TLS ✓
IEEE 802.1X EAP TTLS ✓
IEEE 802.1X EAP others -
EAP protocol: MS-CHAPv2 ✓
EAP protocol: TLS ✓
EAP protocol: GTC ✓
F.2 RADIUS
The following table shows cipher suites and signature algorithms that SCALANCE W devices
support for RADIUS authentication.
Default setting TLS 1.2
F.3 SSL
RADIUS Client
SSH Server
SFTP Client
Hash algorithm
DES ✓
MD5 ✓
SHA1 ✓
SHA256 ✓
Passwords
Observe the following rules when creating or changing the passwords:
Note
Passwords
To improve security, make sure that passwords are as long as possible.
Passwords must be at least 8 characters long and contain special characters, upper and
lowercase characters as well as numbers.
User names
Observe the following rules when creating or changing the user names:
Note
User names
To improve security, make sure that user names are as long as possible.
Role names
Observe the following rules when creating or changing the role names:
Group names
Observe the following rules when creating or changing the group names:
File names
When creating or changing the file names, remember the following rules:
Note
User names
To improve security, make sure that user names are as long as possible.
F
B Factory defaults, 315
Backup, 125, 198 Factory setting, 315
Basic MAC address, 73 Fault monitoring
BFP, 287 Connection status change, 186
Bridge priority, 42 File name
Brute Force Prevention, 287 Permitted characters and length, 354
Forward Delay, 248
Fragments, 87
C
Client
Available access points, 105
G
Overview, 103 Geographic coordinates, 120
Client Supplicant, 298 Group name
CLP Permitted characters, 354
Formatting, 192 Groups, 277
Saving the configuration, 192
Collisions, 87
Configuration manuals, 316 H
Configuration mode, 118
Hardware version, 73
Configuring the network via Ethernet
HTTP
Connecting to network, 54
Port, 116
CRC, 87
Server, 116
HTTPS
Port, 116
D Server, 116
DCP Discovery, 195
DCP server, 116, 257
Default routes I
IPv6 routes, 271
Information
DHCP
ARP table, 74
Client, 154
Groups, 96
DNS Client, 123
Inter AP blocking, 97
Documentation on the Internet, 10
IPv6 Neighbor Table, 75
SSH
Port, 115
R Server, 115
Standalone configuration, 47
RADIUS, 283
Start page, 66
Redundant networks, 247
STEP 7, 257
Reset, 124
Subnets
Reset device, 315
Configuration (IPv4), 262
Reset timer BFP, 287
Syslog, 183
Restart, 124
Client, 116
Restore Factory Defaults, 315
System
Role name
Configuration, 113
Permitted characters, 354
General information, 119
Roles, 276
System event log
Root bridge, 42
Agent, 183
Routing, 263
System events
IPv4 routing table, 89
Configuration, 145
IPv6 routing table, 90
Severity filter, 149
Static routes, 263
System manual, 11
System Time, 168
S
Security settings, 162 T
Serial number, 73
Telnet
SFTP
Server, 115
Load/save, 141
TFTP
SHA algorithm, 162
Load/save, 138
Signal recorder, 227
Time, 117
SINEC PNI, 257
Time of day
SMTP
Manual setting, 169
Client, 116
SIMATIC Time Client, 181
SNMP, 40, 117, 156, 162
SNTP (Simple Network Time Protocol), 174
Groups, 161
System time, 168
Overview, 91
Time zone, 177, 180
SNMPv1, 40
Time-of-day synchronization, 174
SNMPv2c, 40
UTC time, 177, 180
SNMPv3, 40
Trigger interval BFP, 287
Trap, 166
SNMPv3
Access, 162
Groups, 161
U
Notifications, 166 User groups, 277
Users, 158 User name
Views, 164 Permitted characters and length, 353
Software revision, 73
Source NAT
Masquerading, 46 V
Spanning Tree
Vendor, 73
Information, 80
Vendor ID, 73
Rapid Spanning Tree, 43
VLAN, 35
Port VID, 244
Priority, 243
Tag, 243
W
Web Based Management, 62
Wireless access, 48
WLAN statistics
Bad data frames, 109
Received frames, 111
Sent frames, 111