Siemens SIMATIC NET SCALANCE W780 Series Configuration Manual

Siemens SIMATIC NET SCALANCE W780 Series Configuration Manual

Industrial wireless lan scalance w780/w740 to ieee 802.11n web based management
Hide thumbs Also See for SIMATIC NET SCALANCE W780 Series:
Table of Contents

Advertisement

SIMATIC NET
Industrial Wireless LAN
SCALANCE W780/W740 to IEEE
802.11n Web Based Management
Configuration Manual
08/2018
C79000-G8976-C267-13
___________________
Introduction
___________________
Description
___________________
Security recommendations
___________________
Technical basics
___________________
IP addresses
___________________
Configuring with Web Based
Management
___________________
Upkeep and maintenance
___________________
Troubleshooting/FAQ
___________________
Appendix A
___________________
Appendix B
___________________
Appendix C
___________________
Appendix D
1
2
3
4
5
6
7
8
A
B
C
D

Advertisement

Table of Contents
loading

Summary of Contents for Siemens SIMATIC NET SCALANCE W780 Series

  • Page 1 ___________________ Introduction ___________________ Description ___________________ SIMATIC NET Security recommendations ___________________ Technical basics Industrial Wireless LAN SCALANCE W780/W740 to IEEE ___________________ 802.11n Web Based Management IP addresses ___________________ Configuring with Web Based Management Configuration Manual ___________________ Upkeep and maintenance ___________________ Troubleshooting/FAQ ___________________ Appendix A ___________________...
  • Page 2 Note the following: WARNING Siemens products may only be used for the applications described in the catalog and in the relevant technical documentation. If products and components from other manufacturers are used, these must be recommended or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and maintenance are required to ensure that the products operate safely and without any problems.
  • Page 3: Table Of Contents

    Table of contents Introduction ............................. 9 Information on the Configuration Manual.................. 9 Type designations ........................14 Structure of the type designation .................... 15 Description ............................17 Network structures ........................18 Possible applications of SCALANCE W700 devices .............. 23 Product characteristics......................25 IEEE 802.11n ..........................
  • Page 4 Table of contents IPv4 / IPv6 ..........................77 IPv4 address .......................... 79 5.2.1 Structure of an IPv4 address ....................79 5.2.2 Initial assignment of an IPv4 address ..................80 5.2.3 Address assignment via DHCPv4 ..................80 5.2.4 Address assignment with the Primary Setup Tool ..............81 5.2.5 Address assignment with STEP 7..................
  • Page 5 Table of contents 6.4.13 Security ..........................143 6.4.13.1 Overview ..........................143 6.4.13.2 Supported Function Rights ....................146 6.4.13.3 Roles ............................. 146 6.4.13.4 Groups ..........................147 6.4.13.5 Inter AP blocking ........................148 6.4.14 WLAN ............................ 149 6.4.14.1 Overview AP ......................... 149 6.4.14.2 Client list ..........................
  • Page 6 Table of contents 6.5.12 SNMP ........................... 225 6.5.12.1 General ..........................225 6.5.12.2 Traps ............................ 228 6.5.12.3 v3 Groups ..........................229 6.5.12.4 v3 users ..........................232 6.5.13 System Time ........................234 6.5.13.1 Manual Setting ........................235 6.5.13.2 DST Overview ........................236 6.5.13.3 DST Configuration .......................
  • Page 7 Table of contents 6.7.3.4 MST General ......................... 342 6.7.3.5 MST Port ..........................344 6.7.4 DCP Forwarding ........................346 6.7.5 LLDP ............................. 347 "Layer 3 (IPv4)" menu ......................349 6.8.1 NAT ............................349 6.8.1.1 Basic ............................. 349 6.8.1.2 NAPT............................. 352 "Security" menu ........................355 6.9.1 Users .............................
  • Page 8 Table of contents Restoring the factory settings ....................428 Troubleshooting/FAQ ........................... 431 Firmware update via WBM or CLI not possible ..............431 Disrupted data transmission due to the received power being too high ......433 Compatibility with predecessor products ................434 Instructions for secure network design ................
  • Page 9: Introduction

    Introduction Information on the Configuration Manual Validity of the configuration manual This Configuration Manual covers the following products: ● SCALANCE W748-1 M12 ● SCALANCE W748-1 RJ-45 ● SCALANCE W788-1 M12 ● SCALANCE W788-2 M12 ● SCALANCE W788-2 M12 EEC ● SCALANCE W788-1 RJ-45 ●...
  • Page 10 Introduction 1.1 Information on the Configuration Manual Orientation in the documentation Apart from the Configuration Manual you are currently reading, the following documentation is also available from SIMATIC NET on the topic of Industrial Wireless LANs: ● Configuration Manual: SCALANCE W780/W740 Command Line Interface This document contains the CLI commands that are supported by SCALANCE W700 devices.
  • Page 11 Interface that supports both IPv4 and IPv6. As default the IPv4 support is already activated. The IPv6 support needs to be activated extra. SIMATIC NET manuals You will find SIMATIC NET manuals on the Internet pages of Siemens Industry Online Support: ● Using the search function: Siemens Industry Online Support (https://support.industry.siemens.com/cs/ww/en/)
  • Page 12 Siemens’ products and solutions undergo continuous development to make them more secure. Siemens strongly recommends that product updates are applied as soon as they are available and that the latest product versions are used. Use of product versions that are no longer supported, and failure to apply the latest updates may increase customers’...
  • Page 13: Configuration Manual, 08/2018, C79000-G8976-C267

    You will find the SIMATIC NET glossary here: ● SIMATIC NET Manual Collection or product DVD The DVD ships with certain SIMATIC NET products. ● On the Internet under the following address: 50305045 (https://support.industry.siemens.com/cs/ww/en/view/50305045) License conditions Note Open source software Read the license conditions for open source software carefully before using the product.
  • Page 14: Type Designations

    Introduction 1.2 Type designations Type designations Abbreviations used The information in the manuals for the SCALANCE W700 product family often applies to more than one product variant. In such situations, the designations of the products are shortened to avoid having to list all the type designations. The following table shows how the abbreviations relate to the product variants.
  • Page 15: Structure Of The Type Designation

    Introduction 1.3 Structure of the type designation Structure of the type designation The type designation of a SCALANCE W700 is made up of several parts that have the following meaning: SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 16 Introduction 1.3 Structure of the type designation SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 17: Description

    Description Note Interruption of the WLAN communication The WLAN communication can be influenced by high frequency interference signals and can be totally interrupted. Remember this and take suitable action. SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 18: Network Structures

    Description 2.1 Network structures Network structures The following article deals with the setting up of various network structures using access points and clients. A client is also an access point in client mode. Standalone configuration with access point This configuration does not require a server and the access point does not have a connection to a wired Ethernet.
  • Page 19 Description 2.1 Network structures Wireless access to a wired Ethernet network If one (or more) access points have access to wired Ethernet, the following applications are possible: ● A single device as gateway: A wireless network can be connected to a wired network via an access point. ●...
  • Page 20 Description 2.1 Network structures Multichannel configuration If neighboring access points use the same frequency channel, this can lead to longer response times due to any collisions that may occur. If the configuration shown in the figure is implemented as a single-channel system, computers A and B cannot communicate at the same time with the access points in their wireless cells.
  • Page 21 Description 2.1 Network structures Wireless Distribution System (WDS) WDS allows direct links between access points and or between access points and other WDS-compliant devices. These are used to create a wireless backbone or to connect an individual access point to a network that cannot be connected directly to the cable infrastructure due to its location.
  • Page 22 Description 2.1 Network structures Network access with a client or an access point in client mode The SCALANCE W700 device can be used to integrate wired Ethernet devices (for example SIMATIC S7 PLC) in a wireless network. The following graphic shows the connection of a SIMATIC S7 PLC to a wireless LAN. SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 23: Possible Applications Of Scalance W700 Devices

    Description 2.2 Possible applications of SCALANCE W700 devices Possible applications of SCALANCE W700 devices Note The SIMATIC NET WLAN products use OpenSSL. This is open source code with license conditions (BSD). Please refer to the current license conditions. Since the driver includes encryption software, you should also adhere to the appropriate regulations for your specific country.
  • Page 24 Description 2.2 Possible applications of SCALANCE W700 devices Possible applications of the SCALANCE W748 The SCALANCE W748 is equipped with an Ethernet interface and a WLAN interface. This makes the device suitable for the following applications: ● The SCALANCE W748 forwards data within its transmission range from one node to another without a connection to wired Ethernet being necessary.
  • Page 25: Product Characteristics

    Description 2.3 Product characteristics Product characteristics Properties of the SCALANCE W700 devices ● The Ethernet interface supports the following: – 10 Mbps and 100 Mbps both in full and half duplex – 1000 Mbps full duplex – Autocrossing – Autopolarity ●...
  • Page 26 Description 2.3 Product characteristics overlapping frequency ranges. The following overlaps exist with Industrial Wireless LAN and WirelessHART: IWLAN channel WHART channel IEEE 802.11 b/g/n IEEE 802.15.4 11 - 16 15 - 20 16 - 21 20 - 25 21 - 25 Note All SCALANCE W700 access points can be reconfigured for client mode.
  • Page 27 Description 2.3 Product characteristics Features of the SCALANCE W700 Type Number of Antennas Number and Degree of Article number WLAN type of Ethernet protection ports interface SCALANCE W748-1 M12 external 1 x gigabit IP65 6GK5748-1GD00-0AA0 Ethernet (cop- 6GK5748-1GD00-0AB0 per) SCALANCE W748-1 RJ-45 external 1 x gigabit IP30...
  • Page 28: Ieee 802.11N

    Description 2.4 IEEE 802.11n IEEE 802.11n Overview The standard IEEE 802.11n is an expansion of the 802.11 standard and was approved in 2009. Previous standards worked either in the 2.4 GHz frequency band (IEEE 802.11g /b) or in the 5 GHz frequency band (IEEE 802.11a). IEEE 802.11n can operate in both frequency band. In the IEEE 802.11n standard, there are mechanisms implemented in PHY and MAC layers that increase the data throughput and improve the wireless coverage.
  • Page 29 Description 2.4 IEEE 802.11n MIMO antenna technology MIMO (Multiple Input - Multiple Output) is based on an intelligent multiple antenna system. The transmitter and the receiver have several spatially separate antennas. The spatially separate antennas transmit the data streams at the same time. Up to four data streams are possible.
  • Page 30 Description 2.4 IEEE 802.11n Channel bonding With IEEE 802.11n, data can be transferred via two directly neighboring channels. The two 20 MHz channels are put together to form one channel with 40 MHz. This allows the channel bandwidth to be doubled and the data throughput to be increased. To be able to use channel bonding, the recipient must support 40 MHz transmissions.
  • Page 31 Description 2.4 IEEE 802.11n The guard interval of IEEE 802.11a /b/g is 800 ns. IEEE 802.11n can use the reduced guard interval of 400 ns. You specify the guard interval on the WBM page "AP 802.11n (Page 285)". Modulation and coding schemes The IEEE 802.11n standard supports different data rates.
  • Page 32: Requirements For Installation And Operation Of Scalance W Devices

    Description 2.5 Requirements for installation and operation of SCALANCE W devices Requirements for installation and operation of SCALANCE W devices A PG/PC with network connection must be available in order to configure the SCALANCE W devices. If no DHCP server is available, a PC on which the Primary Setup Tool (PST) is installed is necessary for the initial assignment of an IP address to the SCALANCE W devices.
  • Page 33: C-Plug And Key-Plug

    Description 2.6 C-PLUG and KEY-PLUG C-PLUG and KEY-PLUG Configuration information on the C-PLUG / KEY-PLUG The C-PLUG or KEY-PLUG stores the configuration of a device and can therefore transfer the configuration of the old device to the new device. NOTICE Do not remove or insert a C-PLUG / KEY-PLUG during operation! A PLUG may only be removed or inserted when the device is turned off.
  • Page 34 Description 2.6 C-PLUG and KEY-PLUG License information on the KEY-PLUG In addition to the configuration, the KEY-PLUG also contains a license that allows the use of the iFeatures. PLUG with preset function (PRESET-PLUG) With PRESET-PLUG it is possible to install the same configuration and the firmware belonging to it on several devices.
  • Page 35: Digital Input / Output

    Note You cannot configure the digital output with Web Based Management (WBM). If the digital input changes the status, an entry is made in the event protocol table. ● OID of the private MIB variable snMspsDigitalOutputLevel: iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).siemens(4329).industria lComProducts(20).iComPlatforms(1).simaticNet(1).snMsps(1).snMspsCommon(1).snMspsDi gitalIO(39).snMspsDigitalIOObjects(1).snMspsDigitalOutputTable(3).snMspsDigitalOut putEntry(1).snMspsDigitalOutputLevel(6) ●...
  • Page 36 Description 2.7 Digital input / output gitalIO(39).snMspsDigitalIOObjects(1).snMspsDigitalInputTable(2).snMspsDigitalInpu tEntry(1).snMspsDigitalInputLevel(6) ● values of the MIB variable – 1: Signal 0 at the digital input (DI) – 2: Signal 1 at the digital input (DI) MIB file The MIB variables can be found in the file "SN-MSPS-DIGITAL-IO-MIB" that is part of the private MIB file "snMspsWlan.mib".
  • Page 37: Power Over Ethernet (Poe)

    Description 2.8 Power over Ethernet (PoE) Power over Ethernet (PoE) General "Power over Ethernet" (PoE) is a power supply technique for network components according to IEEE 802.3af or IEEE 802.3at. The power is supplied over the Ethernet cables that connect the individual network components together. This makes an additional power cable unnecessary.
  • Page 38 2.8 Power over Ethernet (PoE) A Siemens power insert can also be used as the interface for the power input. Since a power insert supports a power supply of 24 VDC, it does not conform with 802.3af or IEEE 802.3at.
  • Page 39 Description 2.8 Power over Ethernet (PoE) Table 2- 3 Fitting connectors Color of the Color of the wire wire Power over Phantom power CAT5 CAT6a unused wires (10/100 Mbps only) Yellow Green/white Data Data/power Orange Green Data Data/power White Orange/white Data Data/power Blue Orange...
  • Page 40 Description 2.8 Power over Ethernet (PoE) SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 41: Security Recommendations

    ● Keep the firmware up to date. Check regularly for security updates of the product. You will find information on this on the Internet pages "Industrial Security (http://www.siemens.com/industrialsecurity)". ● Inform yourself regularly about security advisories and bulletins published by Siemens ProductCERT (http://www.siemens.com/cert/en/cert-security-advisories.htm). ● Only activate protocols that you really require to use the device.
  • Page 42 Security recommendations ● Use a central logging server to log changes and access operations. Operate your logging server within the protected network area and check the logging information regularly. ● Use WPA2/ WPA2-PSK with AES to protect the WLAN. If iPCF or iPCF-MC is used, use the AES encryption.
  • Page 43 Security recommendations Secure/non-secure protocols and services ● Avoid and disable non-secure protocols, for example Telnet and TFTP. For historical reasons, these protocols are still available, however not intended for secure applications. Use non-secure protocols on the device with caution. ● Check whether use of the following protocols and services is necessary: –...
  • Page 44 Security recommendations Available protocols per port The following list provides you with an overview of the open ports on this device. The table includes the following columns: ● Protocol All protocols that the device supports ● Port number Port number assigned to the protocol ●...
  • Page 45 Security recommendations Protocol Port number Port status Factory setting of Authentication the port DHCP UDP/67,68 Open Closed (when configured) RADIUS UDP/1812,1813 Open Closed (when configured) TFTP UDP/69 Open Closed (when configured) SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 46 Security recommendations SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 47: Technical Basics

    Technical basics Configuration limits for WBM and CLI Configuration limits of the device The following table lists the configuration limits for Web Based Management and the Command Line Interface of the device. Depending on your device, some functions are not available. Configurable function Maximum number System...
  • Page 48 Technical basics 4.1 Configuration limits for WBM and CLI Configurable function Maximum number Security IP addresses from RADIUS servers AAA: 4 • WLAN: 2 • Management ACLs (access rules for management) MAC ACL rule configuration Ingress and egress rules for MAC ACL (total) 40 per interface (20 ingress rules / 20 egress rules) Client: 80 (P1, WLAN)
  • Page 49: Interfaces And System Functions

    Technical basics 4.2 Interfaces and system functions Interfaces and system functions Availability of the interfaces The following table shows the availability of the physical and logical interfaces. Note that in this table all interfaces are listed. Depending on the system function, some interfaces are not available.
  • Page 50 Technical basics 4.2 Interfaces and system functions Availability of the system functions The following table shows the availability of the system functions on the devices. Note that all functions are described in this configuration manual and in the online help. Depending on the mode and the KEY-PLUG, some functions are not available.
  • Page 51 Technical basics 4.2 Interfaces and system functions Access point mode Access points in client mode. Client device Interfaces WLAN Basic ✓ -✓ Expansions ✓ ✓ Antennas ✓ ✓ Permitted chan- ✓ ✓ nels 802.11n ✓ ✓ ✓ AP WDS ✓ AP 802.11a/b/g ✓...
  • Page 52 Technical basics 4.2 Interfaces and system functions Access point mode Access points in client mode. Client device iFeatures iPCF ✓ ✓ W780 iFeatures Access point in client (MLFB 6GK5 907- mode: 8PA00) W780 iFeatures (MLFB 6GK5 907- 8PA00 Client: W740 iFeatures (MLFB 6GK5 907- 4PA00) iPCF-MC...
  • Page 53: Ethernet/Ip

    Technical basics 4.3 EtherNet/IP EtherNet/IP EtherNet/IP EtherNet/IP (Ethernet/Industrial Protocol) is an open industry standard for industrial real-time Ethernet based on TCP/IP and UDP/IP. With EtherNet/IP, Ethernet is expanded by the Common Industrial Protocol (CIP) at the application layer. In EtherNet/IP, the lower layers of the OSI reference model are adopted by Ethernet with the physical, network and transport functions.
  • Page 54: Profinet

    Technical basics 4.4 PROFINET PROFINET PROFINET PROFINET is an open standard (IEC 61158/61784) for industrial automation based on Industrial Ethernet. PROFINET uses existing IT standards and allows end-to-end communication from the field level to the management level as well as plant-wide engineering.
  • Page 55: Vlan

    Technical basics 4.5 VLAN VLAN Network definition regardless of the spatial location of the nodes VLAN (Virtual Local Area Network) divides a physical network into several logical networks that are shielded from each other. Here, devices are grouped together to form logical groups. Only nodes of the same VLAN can address each other.
  • Page 56: Mac-Based Communication

    Technical basics 4.6 MAC-based communication MAC-based communication Frames sent by the client to the access point always have the MAC address of the WLAN client as the source MAC address. In the "learning table" of the access point there is therefore only the MAC address of the WLAN client.
  • Page 57: Ipcf / Ipcf-Ht / Ipcf-Mc

    Technical basics 4.7 iPCF / iPCF-HT / iPCF-MC iPCF / iPCF-HT / iPCF-MC The wireless range of an IWLAN system can be expanded by using multiple access points. If a client moves from the area covered by one access point to the area covered by another access point, the wireless link is maintained after a short interruption (roaming).
  • Page 58 Technical basics 4.7 iPCF / iPCF-HT / iPCF-MC suitable access points when it receives iPCF queries from the access point and the existing connection to an access point is working problem-free. This means that if a change to a different access point is necessary, this is achieved extremely quickly. In contrast to iPCF, the handover times for iPCF-MC are not dependent on the number of wireless channels being used.
  • Page 59 Plant Restrictions ● iPCF / iPCF-HT and iPCF-MC are developments of Siemens AG and function only with nodes on which iPCF / iPCFv2 / iPCF-MC is implemented. ● With an access point with several WLAN interfaces, it is possible to use both iPCF / iPCF- HT as well as standard WLAN at the same time.
  • Page 60 Technical basics 4.7 iPCF / iPCF-HT / iPCF-MC ● Access points with a WLAN interface cannot take part in the iPCF-MC procedures, iPCF is, however, possible. ● iPCF-HT is available only on WLAN interface 1 and can only be used in the 5 GHz band with WLAN mode "(only) IEEE 802.11n".
  • Page 61: Iref

    Technical basics 4.8 iREF iREF How it works If an access point has several activated antennas, the transmit power is distributed equally on these antennas. The transmit power is subject to country-specific legal restrictions. The maximum permitted power depends on the gain of the connected antennas. If the connected antennas have different gains, the maximum antenna gain effectively restricts the permitted transmit power.
  • Page 62 Technical basics 4.8 iREF Restrictions ● A maximum data rate of only up to 150 Mbps (MCS 0 - 7 or 1 x spatial stream) is possible ● iREF cannot be used along with other iFeatures (for example iPCF or iPCF-MC) Advantages ●...
  • Page 63: Iprp

    Technical basics 4.9 iPRP iPRP The "Parallel Redundancy Protocol" (PRP) is a redundancy protocol for cabled networks. It is defined in Part 3 of the IEC 62439 standard. With the "industrial Parallel Redundancy Protocol" (iPRP) the PRP technology can be used in wireless networks.
  • Page 64 Technical basics 4.9 iPRP The access points (AP 1, AP 2 and AP 3) and the RedBox at the AP end are connected to each other via a switch. PRP network A und B are separated from each other via VLANs. If SAN1 sends a frame to SAN2, the frame is duplicated by the RedBox at the AP end and the two redundant frames are transferred via the switch to the access points.
  • Page 65 Technical basics 4.9 iPRP With iPRP the redundant partners (here: AP1 and AP3 or client A and client B) communicate with each other via a switch to prevent the two redundant PRP frames from arriving at the RedBox with too great a time difference. If for example the communication between AP1 and client A is very slow, the slower frame is discarded at the receiving end.
  • Page 66: Aeroscout

    Technical basics 4.10 AeroScout 4.10 AeroScout AeroScout tags SCALANCE W700 devices support tags of the AeroScout company. Tags are battery- operated RFID sensors that send their data cyclically as multicast frames. Among other things, AeroScout tags have the following features: ●...
  • Page 67 Technical basics 4.10 AeroScout Accuracy of localization To achieve optimum precision in the localization of AeroScout Tags, ● we recommend the use of antennas with omnidirectional characteristics ● if the signals should be received by at least three access points. SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 68: Nat/Napt

    Technical basics 4.11 NAT/NAPT 4.11 NAT/NAPT What is NAT? With Network Address Translation (NAT), the IPv4 address in a data packet is replaced by another. NAT is normally used on a gateway between a private LAN and an external network with globally valid IPv4 addresses.
  • Page 69: Snmp

    Technical basics 4.12 SNMP 4.12 SNMP Introduction With the aid of the Simple Network Management Protocol (SNMP), you monitor and control network components from a central station, for example routers or switches. SNMP controls the communication between the monitored devices and the monitoring station. Tasks of SNMP: ●...
  • Page 70 Technical basics 4.12 SNMP The management station sends data packets of the following type: ● GET Request for a data record from the SNMP agent ● GETNEXT Calls up the next data record. ● GETBULK (available as of SNMPv2c) Requests multiple data records at one time, for example several rows of a table. ●...
  • Page 71 Technical basics 4.12 SNMP Compatibility with predecessor products You can only transfer SNMPv3 users to a different device if you have created the users as migratable users. To create a migratable user the "SNMPv3 User Migration" function must be activated when you create the user. SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 72: Spanning Tree

    Technical basics 4.13 Spanning Tree 4.13 Spanning Tree Avoiding loops The Spanning Tree algorithm detects redundant physical network structures and prevents the formation of loops by disabling redundant paths. It evaluates the distance and performance of a connection or bases the decisions on settings made by the user. Data is then exchanged only over the remaining connection paths.
  • Page 73: Rstp, Mstp, Cist

    Technical basics 4.13 Spanning Tree 4.13.1 RSTP, MSTP, CIST Rapid Spanning Tree Protocol (RSTP) One disadvantage of STP is that if there is a disruption or a device fails, the network needs to reconfigure itself: The devices start to negotiate new paths only when the interruption occurs.
  • Page 74 Technical basics 4.13 Spanning Tree Common and Internal Spanning Tree (CIST) CIST identifies the internal instance used by the switch that is comparable in principle with an internal RSTP instance. SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 75: User Management

    Technical basics 4.14 User management 4.14 User management Overview of user management Access to the device is managed by configurable user settings. Set up users with a password for authentication. Assign a role with suitable rights to the users. The authentication of users can either be performed locally by the device or by an external RADIUS server.
  • Page 76 Technical basics 4.14 User management RADIUS authorization mode "SiemensVSA" Requirement For the RADIUS authorization mode "Siemens VSA" the following needs to be set on the RADIUS server: ● Manufacturer code: 4196 ● Attribute number: 1 ● Attribute format: Character string (group name) Procedure If you have set the authorization mode "SiemensVSA", the authentication of users via a...
  • Page 77: Ip Addresses

    IP addresses IPv4 / IPv6 What are the essential differences? IPv4 IPv6 IP configuration DHCP server Stateless Address Autoconfiguration (SLAAC): Stateless • • autoconfiguration using NDP (Neighbor Discovery Proto- Manual • col) – Creates a link local address for every interface that does not require a router on the link.
  • Page 78 IP addresses 5.1 IPv4 / IPv6 IPv4 IPv6 Identification of DHCP cli- Client ID: DUID + IAID(s) = exactly one interface of the host ents/server MAC address DUID = DHCP unique identifier Identifies server and clients uniquely and should not change, not even when replacing network components! IAID = Identity Association Identifier At least one per interface is generated by the client and re-...
  • Page 79: Ipv4 Address

    IP addresses 5.2 IPv4 address IPv4 address 5.2.1 Structure of an IPv4 address Address classes IP address range Max. number of networks Max. number of Class CIDR hosts/network 1.x.x.x through 126.x.x.x 16777214 128.0.x.x through 191.255.x.x 16383 65534 192.0.0.x through 223.255.255.x 2097151 224.0.0.0 - 239.255.255.255 Multicast applications...
  • Page 80: Initial Assignment Of An Ipv4 Address

    IP addresses 5.2 IPv4 address Outside the local area network, the distinction between network ID and host ID is of no significance, in this case packets are delivered based on the entire IP address. Note In the bit representation of the subnet mask, the "ones" must be set left-justified; in other words, there must be no "zeros"...
  • Page 81: Address Assignment With The Primary Setup Tool

    For more detailed information, refer to the Primary Setup Tool configuration manual. You will find the PST at Siemens Industry Automation and Drives Service & Support on the Internet under the entry ID 19440762. You can access this entry at the following URL: PSTTool (https://support.industry.siemens.com/cs/ww/en/view/19440762)
  • Page 82: Address Assignment With Step 7

    IP addresses 5.2 IPv4 address 5.2.5 Address assignment with STEP 7 In STEP 7, you can configure the topology, the device name and the IP address; in other words, an IP address is specified for the MAC address of the device. If you connect the unconfigured device to the controller, the controller assigns the configured device name and the IP address to the device automatically.
  • Page 83: Ipv6 Address

    IP addresses 5.3 IPv6 address IPv6 address 5.3.1 IPv6 terms Network node A network node is a device that is connected to one or more networks via one or more interfaces. Router A network node that forwards IPv6 packets. Host A network node that represents an end point for IPv6 communication relations.
  • Page 84: Structure Of An Ipv6 Address

    IP addresses 5.3 IPv6 address Extended Unique Identifier (RFC 4291); method for forming the interface ID. In Ethernet, the interface ID is formed from the MAC address of the interface. Divides the MAC address into the manufacturer-specific part (OUI) and the network-specific part (NIC) and inserts FFFE between the two parts.
  • Page 85 IP addresses 5.3 IPv6 address Structure of the IPv6 address The IPv6 protocol distinguishes between three types of address: Unicast , anycast and multicast. The following section describes the structure of the global unicast addresses. IPv6 prefix Suffix Global prefix: Subnet ID Interface ID n bits...
  • Page 86 IP addresses 5.3 IPv6 address SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 87: Configuring With Web Based Management

    Configuring with Web Based Management Web Based Management How it works The device has an integrated HTTP server for Web Based Management (WBM). If a device is addressed with a Web browser, it returns HTML pages to the client PC depending on the user input.
  • Page 88 Configuring with Web Based Management 6.1 Web Based Management ● If a firewall is used, the relevant ports must be opened. – For access using HTTP: Port 80 – For access using HTTPS: Port 443 ● The display of the WBM was tested with the following desktop Web browsers: –...
  • Page 89: Login

    Configuring with Web Based Management 6.2 Login Login Establishing a connection to a device Follow the steps below to establish a connection to a device using an Internet browser: 1. There is a connection between the device and the client PC. With the ping command, you can check whether or not a connection exists.
  • Page 90 Configuring with Web Based Management 6.2 Login Logging in using the Internet browser Selecting the language of the WBM 1. From the drop-down list at the top right, select the language version of the WBM pages. 2. Click the "Go" button to change to the selected language. Note Available languages As of version 5.2 English and German are available.
  • Page 91 The password for the "admin" user has been changed for devices with the US version. Specialist personnel for professional WLAN installations can obtain the password from Siemens support. 3. Click the "Login" button or confirm your input with "Enter". When you log in with the default user "admin" for the first time or following a "Restore Memory Defaults and Restart", you will be prompted to change the password.
  • Page 92 The password for the "admin" user has been changed for devices with the US version. Specialist personnel for professional WLAN installations can obtain the password from Siemens support. 5. Click the "Login" button or confirm your input with "Enter". When you log in with the default user "admin" for the first time or following a "Restore Memory Defaults and Restart", you will be prompted to change the password.
  • Page 93: Wizard" Menu

    Configuring with Web Based Management 6.3 "Wizard" menu "Wizard" menu 6.3.1 Basic Wizard Introduction With the Basic Wizard, menus guide you through the configuration of the most important parameters. On the Basic Wizard pages, you can only configure the parameters important for the basic functionality.
  • Page 94: System Settings

    Configuring with Web Based Management 6.3 "Wizard" menu 6.3.1.1 System Settings Introduction On this Basic Wizard page, you specify the mode of the device. After changing the mode, a message is displayed. If you confirm the message with "OK", the device restarts with the factory-set configuration settings.
  • Page 95 Configuring with Web Based Management 6.3 "Wizard" menu Description The Basic Wizard page contains the following boxes: ● Restore Memory Defaults and Restart If you click this button, the factory configuration settings are restored with the exception of the parameters below followed by a restart. –...
  • Page 96: Country Settings

    Configuring with Web Based Management 6.3 "Wizard" menu 6.3.1.2 Country Settings Introduction On this Basic Wizard page, you configure the country and the system name. Description The Basic Wizard page contains the following boxes ● Country Code From this drop-down list, select the country in which the device will be deployed. You do not need to know the data for the specific country, the channel division and output power are set by the device according to the country you select.
  • Page 97: Ip Address Settings

    Configuring with Web Based Management 6.3 "Wizard" menu 6.3.1.3 IP Address Settings Introduction One of the basic steps in configuration of a device is setting the IP address. The IP address identifies a device in the network uniquely. Description The Basic Wizard page contains the following boxes ●...
  • Page 98: Management Interfaces

    Configuring with Web Based Management 6.3 "Wizard" menu 6.3.1.4 Management Interfaces System configuration On this Basic Wizard page, you specify the services with which the device can be accessed. With some services, there are further configuration pages on which more detailed settings can be made.
  • Page 99 Configuring with Web Based Management 6.3 "Wizard" menu ● DCP Server Specify whether or not the device can be accessed with DCP (Discovery and Configuration Protocol): – "-" (disabled) DCP is disabled. Device parameters can neither be read nor modified. –...
  • Page 100: Antenna Settings

    Configuring with Web Based Management 6.3 "Wizard" menu 6.3.1.5 Antenna Settings Introduction On this Basic Wizard page, you configure the settings for the external antenna. Description This table contains the following columns: ● Connector Shows the name of the relevant antenna connector. ●...
  • Page 101: Radio Settings

    Configuring with Web Based Management 6.3 "Wizard" menu ● Antenna Gain [dBi] If you select the "User defined" entry for the "Antenna Type", enter the antenna gain manually in the "dBi" unit. – Antenna Gain 2.4 GHz [dBi] Enter the antenna gain the antenna has in the 2.4 GHz frequency band. –...
  • Page 102 Configuring with Web Based Management 6.3 "Wizard" menu ● Radio Mode Shows the mode of the WLAN interface. ● Frequency Band Specify the frequency band. In client mode, dual-frequency operation is also possible. Note Configuring WLAN interfaces of the W786-2IA RJ-45 for different frequency bands If both WLAN interfaces are configured for the same frequency band on this device, there may be mutual influence or interference.
  • Page 103 Configuring with Web Based Management 6.3 "Wizard" menu ● max. Tx Power Specify the transmit power of the device. It may be necessary to reduce the transmit power when using antennas to avoid exceeding the maximum legal transmit power. Reducing the transmit power effectively reduces cell size Note The maximum possible transmit power varies depending on the channel and data rate.
  • Page 104: Access Point-Einstellungen

    Configuring with Web Based Management 6.3 "Wizard" menu 6.3.1.7 Access Point-Einstellungen Introduction On this Basic Wizard page, you specify the configuration for the Access Point . Note This page is available only in access point mode. SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 105 Configuring with Web Based Management 6.3 "Wizard" menu Description Table 1 contains the following columns: ● Radio Shows the available WLAN interfaces. ● Channel Specify the main channel. If you want the access point to search for a free channel itself, use "Auto".
  • Page 106: Client Settings

    Configuring with Web Based Management 6.3 "Wizard" menu 6.3.1.8 Client Settings Introduction On this Basic Wizard page, you specify the configuration for clients, for example the assignment of the MAC address. Note This page is only available in client mode. Description Table 1 contains the following columns: ●...
  • Page 107 Configuring with Web Based Management 6.3 "Wizard" menu ● MAC mode Specify how the MAC address is assigned to the client. The following are possible: – Automatic The client automatically adopts the source MAC address of the first frame that it receives over the Ethernet interface.
  • Page 108: Client Allowed Channel Settings

    Configuring with Web Based Management 6.3 "Wizard" menu 6.3.1.9 Client Allowed Channel Settings Introduction For communication, a specific channel within a frequency band is used. On this page, you can either set this channel specifically or configure so that the channel is selected automatically.
  • Page 109 Configuring with Web Based Management 6.3 "Wizard" menu Above the tables for the frequency bands, you will find the following check box: ● Select / Deselect all – Enabled If you enable the check box, all channels are selected. – Disabled If you deselect the check box, only the first valid channel of the frequency band remains enabled.
  • Page 110: Security Settings

    Configuring with Web Based Management 6.3 "Wizard" menu 6.3.1.10 Security Settings Introduction To make the network secure, authentication and encryption are used. You specify the security levels with the type of authentication and the encryption procedure. Use WPA2/AES, to prevent misuse of a password WPA2 (RADIUS) / WPA2-PSK with AES provides the greatest security.
  • Page 111 Configuring with Web Based Management 6.3 "Wizard" menu ● Authentication Type Select the type of authentication. Note WLAN mode IEEE 802.11 n With devices operated in WLAN mode IEEE8002.11n only WPA2 (WPA2-PSK and WPA2 Radius) encryption is possible. – Open System Without authentication –...
  • Page 112 Configuring with Web Based Management 6.3 "Wizard" menu ● WPA(2) Pass Phrase Enter a WPA(2) key. The key can be 8 to 63 ASCII characters or exactly 64 hexadecimal characters long. This WPA(2) key must be known on both the client and the access point and is entered by the user at both ends.
  • Page 113: Dot1X Supplicant Settings

    Configuring with Web Based Management 6.3 "Wizard" menu 6.3.1.11 Dot1x Supplicant Settings Introduction On this Basic Wizard page, you configure the user name and the password with which the client will be logged on with the RADIUS server. If you require additional authentication methods, you can configure them after completing the Basic Wizard with "Security >...
  • Page 114: Dot1X Radius Server Settings

    Configuring with Web Based Management 6.3 "Wizard" menu 6.3.1.12 Dot1x RADIUS Server Settings Introduction On this Basic Wizard page, you configure the settings for the primary RADIUS Server. After completing the Basic Wizard, you can configure a backup server and other settings, for example the number of logon attempts with "Security>...
  • Page 115: Summary Of Settings

    Configuring with Web Based Management 6.3 "Wizard" menu 6.3.1.13 Summary of Settings Introduction The settings are summarized on this page. The content of the page depends on the set parameters and the mode of the device. Check the settings before you exit the Basic Wizard with the "Set Values" button. If settings are incorrect, go back using the "Prev"...
  • Page 116: Information" Menu

    Configuring with Web Based Management 6.4 "Information" menu "Information" menu 6.4.1 Startseite View of the Start page When you enter the IP address of the device, the start page is displayed after a successful login. You cannot configure anything on this page. SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 117 Configuring with Web Based Management 6.4 "Information" menu General layout of the WBM pages The following areas are generally available on every WBM page: ● Selection area (1): Top area ● Display area (2): Top area ● Navigation area (3): Left-hand area ●...
  • Page 118 6.4 "Information" menu Selection area (1) The following is available in the selection area: ● Logo of Siemens AG ● Display of: "System Location/System Name". – "System Location" contains the location of the device. With the settings when the device ships, the IP address of the Ethernet interface is displayed.
  • Page 119 Configuring with Web Based Management 6.4 "Information" menu ● Help When you click this button, the help page of the currently selected menu item is opened in a new browser window. On every help page, there is an input box for the search function at the top edge. In this input box, enter a term for which you need additional information and start the search by pressing Enter.
  • Page 120 Configuring with Web Based Management 6.4 "Information" menu Content area (4) The content area shows a graphic of the device. The graphic always shows the device whose WBM you have called up. The following is displayed below the picture of the device: ●...
  • Page 121 Configuring with Web Based Management 6.4 "Information" menu Buttons you require often The pages of the WBM contain the following standard buttons: ● Refresh the display with "Refresh" Web Based Management pages that display current parameters have a "Refresh" button at the lower edge of the page.
  • Page 122: Versions

    Configuring with Web Based Management 6.4 "Information" menu ● Drop-down list for page change In pages with a large number of data records, you can navigate to the desired page. From the drop-down list, select the affected page to display it. ●...
  • Page 123 Configuring with Web Based Management 6.4 "Information" menu Description Table 1 has the following columns: ● Hardware – Basic Device Shows the basic device – WLAN1 / WLAN 2 Shows the available wireless card ● Name Shows the name of the device or module. ●...
  • Page 124: I&M

    Configuring with Web Based Management 6.4 "Information" menu 6.4.3 I&M Identification and maintenance data This page contains information about device-specific vendor and maintenance data such as the article number, serial number, version numbers etc. You cannot configure anything on this page. Description of the displayed values The table has the following rows: ●...
  • Page 125: Arp / Neighbors

    Configuring with Web Based Management 6.4 "Information" menu ● Function tag Shows the function tag (plant designation) of the device. The plant designation (HID) is created during configuration of the device with HW Config of STEP 7. ● Location tag Shows the location tag of the device.
  • Page 126: Ipv6 Neighbor Table

    Configuring with Web Based Management 6.4 "Information" menu ● IP Address Shows the IP address of the destination device. ● Media Type Shows the type of connection. – Dynamic The device recognized the address data automatically. – Static The addresses were entered as static addresses. 6.4.4.2 IPv6 Neighbor Table Assignment of MAC address and IPv6 address...
  • Page 127: Log Tables

    Configuring with Web Based Management 6.4 "Information" menu ● IP Address Shows the IPv6 address of the destination device. ● Media Type Shows the type of connection. – Dynamic The device recognized the address data automatically. – Static The addresses were entered as static addresses. 6.4.5 Log Tables 6.4.5.1...
  • Page 128 Configuring with Web Based Management 6.4 "Information" menu Description ● Severity Filters You can filter the entries in the table according to severity. To display all the entries, enable or disable all parameters. Note For each severity, a maximum of 400 entries in the table are possible. If the maximum number of entries is reached for a severity, the oldest entries of this severity are overwritten in the table.
  • Page 129: Wlan Authentication Log

    Configuring with Web Based Management 6.4 "Information" menu 6.4.5.2 WLAN authentication log Logging authentication attempts This page shows a table with information on successful or failed authentication attempts. You cannot configure anything on this page. Description ● Severity Filters You can filter the entries in the table according to severity. To display all the entries, enable or disable all parameters.
  • Page 130: Faults

    Configuring with Web Based Management 6.4 "Information" menu The table has the following columns: ● Restart Counts the number of restarts since you last reset to factory settings and shows the device restart after which the corresponding event occurred. ● System Up Time Shows the time the device has been running since the last restart when the described event occurred.
  • Page 131: Redundancy

    Configuring with Web Based Management 6.4 "Information" menu Description The page contains the following boxes: ● No. of Signaled Faults Indicates how often the fault LED lit up and not how many faults occurred. ● "Reset Counters" button The number is reset with this button. The counter is reset when there is a restart. The table contains the following columns: ●...
  • Page 132 Configuring with Web Based Management 6.4 "Information" menu If Spanning Tree is turned on, the information about the status of the instance selected in the "Instance ID" drop-down list is displayed and the information about the configured ports is shown in the table. The information shown depends on the Spanning Tree mode. SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 133 Configuring with Web Based Management 6.4 "Information" menu Description The page contains the following boxes: ● Spanning Tree Mode Shows the set mode. You specify the mode in "Layer 2 > Configuration" and in "Layer 2 > MSTP > General". The following values are possible: –...
  • Page 134 Configuring with Web Based Management 6.4 "Information" menu The table contains the following boxes: ● Port Shows the port via which the device communicates. ● Role Shows the status of the port. The following values are possible: – Disabled The port was removed manually from the spanning tree and will no longer be taken into account by the spanning tree.
  • Page 135 Configuring with Web Based Management 6.4 "Information" menu ● Path Cost This parameter is used to calculate the path that will be selected. The path with the lowest value is selected as the route. If several ports of a device have the same value, the port with the lowest port number will be selected.
  • Page 136: Ethernet Statistics

    Configuring with Web Based Management 6.4 "Information" menu 6.4.8 Ethernet Statistics 6.4.8.1 Interface Statistics Interface statistics The page shows the statistics from the interface table of the Management Information Base (MIB). Displayed values The table has the following columns: ● In Octet Shows the number of received bytes.
  • Page 137: Packet Size

    Configuring with Web Based Management 6.4 "Information" menu 6.4.8.2 Packet Size Frames sorted by length This page displays how many frames of which size were received at each port. You cannot configure anything on this page. Description The table has the following columns: ●...
  • Page 138: Frame Type

    Configuring with Web Based Management 6.4 "Information" menu 6.4.8.3 Frame Type Received frames sorted by type This page displays how many frames of the type "UnicastUnicast", "MulticastMulticast", and "BroadcastBroadcast" were received at each port. You cannot configure anything on this page.
  • Page 139: Learning Table

    Configuring with Web Based Management 6.4 "Information" menu Description The table has the following columns: ● Port Shows the available ports. ● Error types The other columns after the port number contain the absolute numbers of the incoming frames according to their error type. In the columns of the table, a distinction is made according to the following error types: –...
  • Page 140: Ipv6 Routing

    Configuring with Web Based Management 6.4 "Information" menu Description This table contains the following columns: ● VLAN ID Shows the VLAN ID of the node. Note This column appears in the table only if a VLAN is configured. ● MAC Address Shows the MAC address of the node.
  • Page 141: Dhcp-Server

    Configuring with Web Based Management 6.4 "Information" menu ● Gateway Shows the gateway for this route. ● Interface Shows the interface for this route. ● Metric Shows the metric of the route. The higher value, the longer packets require to their destination.
  • Page 142: Snmp

    Configuring with Web Based Management 6.4 "Information" menu ● Allocation Method Shows whether the IPv4 address was assigned statically or dynamically. You configure the static entries in "System > DHCP > Static Leases". ● Binding State Shows the status of the assignment. –...
  • Page 143: Security

    Configuring with Web Based Management 6.4 "Information" menu 6.4.13 Security 6.4.13.1 Overview Note The values displayed depend on the rights of the logged-on user. This page shows the security settings and the local and external user accounts. SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 144 Configuring with Web Based Management 6.4 "Information" menu Description Services The "Services" list shows the security settings. ● SSH Server You configure the setting in "System > Configuration". – Enabled: Encrypted access to the CLI. – Disabled: No encrypted access to the CLI. ●...
  • Page 145 Configuring with Web Based Management 6.4 "Information" menu ● Login Authentication You configure the setting in "Security > AAA > General". – Local The authentication must be made locally on the device. – RADIUS The authentication must be handled via a RADIUS server. –...
  • Page 146: Supported Function Rights

    Configuring with Web Based Management 6.4 "Information" menu The table "Local User Accounts" has the following columns: ● User Account Shows the name of the local user. ● Role Shows the role of the user. You can obtain more information on the function rights of the role in "Information >...
  • Page 147: Groups

    Configuring with Web Based Management 6.4 "Information" menu Description of the displayed values This table contains the following columns: ● Role Shows the name of the role. ● Function Right Shows the function right of the role: – 1 Users with this role can read device parameters but cannot change them. –...
  • Page 148: Inter Ap Blocking

    Configuring with Web Based Management 6.4 "Information" menu Description of the displayed values The table has the following columns: ● Group Shows the name of the group. The name matches the group on the RADIUS server. ● Role Shows the name of the role. Users who are authenticated with the linked group on the RADIUS server receive the rights of this role locally on the device.
  • Page 149: Wlan

    Configuring with Web Based Management 6.4 "Information" menu Description The table has the following columns: ● Radio Shows the available WLAN interfaces to which the settings relate. ● Port ● Shows the VAP interface to which the settings relate. ● MAC Address Shows the MAC address of the SCALANCE W device with which the client may communicate.
  • Page 150 Configuring with Web Based Management 6.4 "Information" menu Description Table 1 has the following columns: ● Radio Shows the available WLAN interfaces. ● Port Shows the available VAP interfaces. ● WLAN Mode Shows the transmission standard. If DFS is activated, the transmission standard "802.11h"...
  • Page 151 Configuring with Web Based Management 6.4 "Information" menu If the DFS function is activated and the access point browses for primary users for 60 seconds before starting communication with the selected channel, the text "scanning ..." is displayed instead of the channel. ●...
  • Page 152: Client List

    Configuring with Web Based Management 6.4 "Information" menu Table 2 has the following columns: ● Radio Shows the available WLAN interfaces in this column. ● Port Shows the port of the virtual access point. ● MAC Address Shows the MAC address of the virtual access point. ●...
  • Page 153 Configuring with Web Based Management 6.4 "Information" menu Description ● Logged-on clients Shows the number of clients logged on to the access point. The table has the following columns: ● AID (Associated ID) Shows the connection ID of the client. If the client connects to the access point via the VAP interface, the client is assigned a connection ID.
  • Page 154: Wds List

    Configuring with Web Based Management 6.4 "Information" menu ● Security Shows which authentication method is used. – If the authentication method "Open System + Encryption" or "Shared Key" is used, the "Encrypted (WEP/AES)" is displayed for both authentication methods. – If iPCF, iPCF-HT or iPCF-MC mode is enabled on a WLAN interface, the following is displayed depending on the encryption status: iPCF Encrypted (AES): Encryption is enabled.
  • Page 155 Configuring with Web Based Management 6.4 "Information" menu Description The table has the following columns: ● Radio Shows the available WLAN interfaces. ● Port Shows the port. ● BSSID ● Shows the MAC address of the WDS partner. ● WDS ID Shows the name of the WDS partner.
  • Page 156: Overlap Ap

    Configuring with Web Based Management 6.4 "Information" menu 6.4.14.4 Overlap AP Overlapping channels Note This WBM page is only available in access point mode. For optimum data throughput, it is important that the set wireless channel is not used by other access points.
  • Page 157 Configuring with Web Based Management 6.4 "Information" menu The table has the following columns: ● Radio Shows the available WLAN interfaces in this column. ● Type Shows the mode of the WLAN interface. ● SSID Shows the SSID of the access point. ●...
  • Page 158: Force Roaming

    Configuring with Web Based Management 6.4 "Information" menu 6.4.14.5 Force roaming In access point mode: In client mode: This WBM page shows the current status of the connection. It also shows whether there is roaming. The device monitors the connection to certain addresses cyclically. To achieve this, the device sends echo messages (pings) to the configured destination addresses at regular intervals.
  • Page 159: Overview Client

    Configuring with Web Based Management 6.4 "Information" menu Description The table has the following columns: ● Port Shows the available interfaces. – VAP X.Y (in access point mode) – WLAN 0/X (in client mode) ● Destination Address / State Shows which destination address is monitored and the status of the connection. You configure the destination address in "Interfaces >...
  • Page 160 Configuring with Web Based Management 6.4 "Information" menu Description ● Radio Shows the available WLAN interfaces. ● WLAN Mode Shows the transmission standard. ● MAC Mode Shows how the MAC address is assigned to the interface. – Automatic The client automatically adopts the source MAC address of the first frame that it receives over the Ethernet interface.
  • Page 161 Configuring with Web Based Management 6.4 "Information" menu ● MAC Address Shows the MAC address of the WLAN interface. ● Operational channel Shows the channel of the access point to which the client is connected. ● HT Channel Width [MHz] Shows the channel bandwidth.
  • Page 162: Available Aps

    Configuring with Web Based Management 6.4 "Information" menu ● iFeatures Shows which iFeatures are used. – - iFeatures are not used. – iPCF – iPCF-HT – iPCF-MC – iPRP – iREF – AeroScout ● State Shows the status of the WLAN interface. –...
  • Page 163 Configuring with Web Based Management 6.4 "Information" menu Description The table has the following columns: ● Radio Shows the WLAN interface visible to the access point. ● SSID Shows the SSID of the access point. ● BSSID Shows the MAC address of the access point. ●...
  • Page 164: Ip Mapping Table

    Configuring with Web Based Management 6.4 "Information" menu 6.4.14.8 IP mapping table WLAN access for several SCALANCE W700 devices via a client Note This WBM page is only available for clients or access points in client mode. You can make WLAN access available for several SCALANCE W700 devices with one client if you use IP mapping.
  • Page 165 Configuring with Web Based Management 6.4 "Information" menu Description The table has the following columns ● MAC Address The MAC address of a device located downstream from the WLAN client from the perspective of the access point. ● IP Address The IP address managed for this device by the WLAN client.
  • Page 166: Background Noise

    Configuring with Web Based Management 6.4 "Information" menu 6.4.14.9 Background noise The page displays the background noise of the channel. Description ● Connector Shows the name of the relevant antenna connector. ● Channel [dBm] Shows the background noise of the set channel. ●...
  • Page 167: Wlan Statistics

    Configuring with Web Based Management 6.4 "Information" menu 6.4.15 WLAN statistics 6.4.15.1 Faults The WBM page show how many bad frames were received or sent per WLAN interface. If an increased number of errors occurs, you should check the settings for the WLAN interface(s), the setup of the SCALANCE W devices and the connection quality.
  • Page 168 Configuring with Web Based Management 6.4 "Information" menu The Received Errors table has the following columns: ● Interface Shows the WLAN interface to which the entries apply. ● Error types The other columns after the WLAN interface contain the absolute numbers of the frames received according to their error type.
  • Page 169: Management Sent

    Configuring with Web Based Management 6.4 "Information" menu 6.4.15.2 Management Sent The WBM page shows how many frames in response to logging on or logging off were counted per VAP interface. Note This WBM page is only available in access point mode. Description The table has the following columns: ●...
  • Page 170: Management Received

    Configuring with Web Based Management 6.4 "Information" menu 6.4.15.3 Management Received The WBM page shows how many frames in response to logging on or logging off were counted per VAP interface. Note This WBM page is only available in access point mode. Description The table has the following columns: ●...
  • Page 171: Data Sent

    Configuring with Web Based Management 6.4 "Information" menu 6.4.15.4 Data Sent The WBM page shows how many frames were sent per VAP interface. Description The table has the following columns: ● Interface Shows the VAP interface to which the entries apply. ●...
  • Page 172: Data Received

    Configuring with Web Based Management 6.4 "Information" menu – Multicast/Broadcast Frames Shows the number of sent multicast and broadcast frames. – Unicast Frames Shows the number of sent unicast frames. – Average Data Rate Shows the average data rate of the last data frames sent. 6.4.15.5 Data Received The WBM page shows how many frames were received per VAP interface.
  • Page 173: Wlan Ifeatures

    Configuring with Web Based Management 6.4 "Information" menu Description The table has the following columns: ● Interface Shows the VAP interface to which the entries apply. ● Frame types The other columns after the VAP interface contain the absolute numbers of the received frames according to the frame types.
  • Page 174 Configuring with Web Based Management 6.4 "Information" menu Description The page contains the following box: ● Logged-on Clients Shows the number of clients logged on to the access point The table has the following columns: ● AID (Associated ID) Shows the connection ID of the client. If the client connects to the access point via the VAP interface, the client is assigned a connection ID.
  • Page 175: Iref Wds List

    Configuring with Web Based Management 6.4 "Information" menu 6.4.16.2 iREF WDS List The WBM page shows the access points logged on to the access point via a WDS link. This page shows information such as the antenna used and the signal strength of the WLAN interface.
  • Page 176: Aeroscout

    Configuring with Web Based Management 6.4 "Information" menu ● Signal Strength [dBm] Shows the signal strength of the connected access point in decibel milliwatts. ● Signal strength [%] Shows the signal strength of the connected access point as a percentage. 6.4.16.3 AeroScout This page shows information on forwarding AeroScout frames.
  • Page 177: Iprp

    Configuring with Web Based Management 6.4 "Information" menu Description ● Tag Information Forwarding In the management program that evaluates the AeroScout frames, you can specify whether or not a SCALANCE W700 device will forward frames. Here, you can see which setting was made in the management program.
  • Page 178 Configuring with Web Based Management 6.4 "Information" menu Description The table has the following columns: ● Radio Shows the WLAN interfaces via which the client is connected to the access point ● Port (only in access point mode) Shows the VAP interface on which the iPRP clients are logged on. ●...
  • Page 179 Configuring with Web Based Management 6.4 "Information" menu ● Frames Deleted Shows the number of frames not yet sent that were deleted from the queue due to the iPRP delete frame. ● Scanning Sync State (in client mode only) So that both clients do not search for an access point and change to the scan mode at he same time they synchronize with each other.
  • Page 180: System" Menu

    Configuring with Web Based Management 6.5 "System" menu "System" menu 6.5.1 Configuration System configuration The WBM page contains the configuration overview of the access options of the device. Specify the services that access the device. With some services, there are further configuration pages on which more detailed settings can be made.
  • Page 181 Configuring with Web Based Management 6.5 "System" menu ● DNS Client Enable or disable the DNS client. You can configure other settings in "System > DNS". ● SMTP Client Enable or disable the SMTP client. You can configure other settings in "System > SMTP Client".
  • Page 182 Configuring with Web Based Management 6.5 "System" menu ● SNMPv1/v2 Read-Only Enable or disable write access to SNMP variables with SNMPv1/v2c. ● SNMPv1 Traps Enable or disable the sending of traps (alarm frames). You can configure other settings in "System > SNMP > Traps". ●...
  • Page 183: General

    Configuring with Web Based Management 6.5 "System" menu Procedure 1. To use the required function, select the corresponding check box. 2. Select the options you require from the drop-down lists. 3. Click the "Set Values" button. 6.5.2 General 6.5.2.1 Device General device information This page contains the general device information.
  • Page 184: Coordinates

    Configuring with Web Based Management 6.5 "System" menu The system name is also displayed in the CLI input prompt. The number of characters in the CLI input prompt is limited. The system name is truncated after 16 characters. ● System Contact You can enter the name of a contact person responsible for managing the device.
  • Page 185 Configuring with Web Based Management 6.5 "System" menu Description The page contains the following input boxes with a maximum length of 32 characters. ● "Latitude" input box Geographical latitude: Here, enter the value for the northerly or southerly latitude of the location of the device.
  • Page 186: Agent Ipv4

    Configuring with Web Based Management 6.5 "System" menu 6.5.3 Agent IPv4 Configuration of the IP addresses On this WBM page, you configure the IPv4 address for the device. Description The page contains the following boxes: ● IP Assgn. Method ● Shows how the IPv4 address is assigned. –...
  • Page 187: Agent Ipv6

    Configuring with Web Based Management 6.5 "System" menu parameter in "Layer 2 > VLAN > General". You can only select VLANs that have already been configured. Note Changing the Agent VLAN ID If the configuration PC is connected directly to the device via Ethernet and you change the agent VLAN ID, the device is no longer reachable via Ethernet following the change.
  • Page 188 Configuring with Web Based Management 6.5 "System" menu Description The page contains the following: ● Interface Shows the VLAN interface on which IPv6 will be enabled. ● IPv6 Enable Enable or disable IPv6 on the interface. When you enable the setting and accept it, the link local address is created automatically.
  • Page 189: Ipv6 Default Routes

    Configuring with Web Based Management 6.5 "System" menu ● IPv6 Address Shows the IPv6 address. ● Prefix Length Shows the prefix length. ● IPv6 Address Type Displays the address type. The following values are possible: – Unicast – Link Local ●...
  • Page 190 Configuring with Web Based Management 6.5 "System" menu Description The page contains the following: ● Destination Network Destination Network (:: or 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0) applies to all IPv6 addresses. ● Prefix Length Enter the number of left-hand bits belonging to the prefix ●...
  • Page 191: Dns

    Configuring with Web Based Management 6.5 "System" menu ● Administrative Distance Enter the metric for the route. When creating the route, "not used" is entered automatically. The metric corresponds to the quality of a connection, based for example on speed or costs. If there are several equal routes, the route with the lowest metric value is used.
  • Page 192 Configuring with Web Based Management 6.5 "System" menu Description The page contains the following boxes: ● DNS client If the check box is enabled, the "DNS client" function is enabled. ● Used DNS Servers Here you specify which DNS server the device uses: –...
  • Page 193: Restart

    Configuring with Web Based Management 6.5 "System" menu Procedure Activating DNS 1. Enable the "DNS Client" check box. 2. Click the "Set Values" button. Creating a DNS server 1. In the "DNS Server Address" box, enter the IP address of the DNS server. 2.
  • Page 194 Configuring with Web Based Management 6.5 "System" menu Description To restart the device, the buttons on this page provide you with the following options: ● Restart Click this button to restart the system. You must confirm the restart in a dialog box. During a restart, the device is reinitialized, the internal firmware is reloaded, and the device runs a self-test.
  • Page 195: Commit Control

    Configuring with Web Based Management 6.5 "System" menu 6.5.7 Commit Control Change management On this page, you specify when the WLAN settings become effective on the SCALANCE W device. If you change a WLAN setting and confirm the change with "Set Values", this change is adopted and takes effect immediately.
  • Page 196: Load & Save

    Electronic data sheets for describing devices in the EtherNet/IP mode Firmware The firmware is signed and encrypted. This en- sures that only firmware created by Siemens can be downloaded to the device. GSDML Information on the device properties (PROFINET) HTTPS Cert...
  • Page 197 Configuring with Web Based Management 6.5 "System" menu File type Description Down- Save Delete load Private MSPS MIB file "Scalance_w_msps.mib" RunningCLI Text file with CLI commands This file contains an overview of the current config- uration in the form of CLI commands. Passwords are masked in this file as follows: [PASSWORD] You can download the text file.
  • Page 198 The zip file contains the country list as a csv and as a pdf file. Debug This file contains information for Siemens Support. It is encrypted and can be sent by e-mail to Siemens Support without any security risk. Electronic Data Sheet (EDS) Electronic data sheets for describing devices in the...
  • Page 199 Configuring with Web Based Management 6.5 "System" menu File type Description Save Down- load Script Text file with CLI commands You can upload a script file in a device. The CLI commands it contains are executed accordingly. CLI commands for saving and loading files cannot be executed with the CLI script file.
  • Page 200: Http

    This WBM page is available both for connections using HTTP and for connections using HTTPS. Firmware The firmware is signed and encrypted. This ensures that only firmware created by Siemens can be downloaded to the device. Note Incompatibility with predecessor versions During the installation of a previous version, the configuration data and log files can be lost.
  • Page 201 Configuring with Web Based Management 6.5 "System" menu You can download existing CLI configurations (RunningCLI) and upload your own CLI scripts (Script). Note The downloadable CLI script (RunningCLI) is not intended to be uploaded again unchanged. Description The table has the following columns: ●...
  • Page 202 Configuring with Web Based Management 6.5 "System" menu ● Load With this button, you can load files on the device. The button can be enabled, if this function is supported by the file type. ● Save With this button, you can save files from the device. The button can only be enabled if this function is supported by the file type and the file exists on the device.
  • Page 203: Tftp

    PC to the devices. This means, for example, that you can also load new firmware from a file located on your client PC. Firmware The firmware is signed and encrypted. This ensures that only firmware created by Siemens can be downloaded to the device. Note Incompatibility with predecessor versions During the installation of a previous version, the configuration data and log files can be lost.
  • Page 204 Configuring with Web Based Management 6.5 "System" menu Configuration files Note Configuration files and trial mode/Automatic Save mode In Automatic Save mode, the data is saved automatically before the configuration files (ConfigPack and Config) are transferred. In Trial mode, although the changes are adopted, they are not saved in the configuration files (ConfigPack and Config).
  • Page 205 Configuring with Web Based Management 6.5 "System" menu Description The page contains the following boxes: ● TFTP Server Address Here, enter the IP address or the FQDN (Fully Qualified Domain Name) of the TFTP server with which you exchange data. ●...
  • Page 206: Sftp

    On this page, the certificates required to establish a secure VPN connection can also be loaded. Firmware The firmware is signed and encrypted. This ensures that only firmware created by Siemens can be downloaded to the device. Configuration files Note Configuration files and Trial mode /Automatic Save In "Automatic Save"...
  • Page 207 Configuring with Web Based Management 6.5 "System" menu You can download existing CLI configurations (RunningCLI) and upload your own CLI scripts (Script). Note The downloadable CLI script is not intended to be uploaded again unchanged. Description The page contains the following boxes: ●...
  • Page 208 Configuring with Web Based Management 6.5 "System" menu The table has the following columns: ● Type Shows the file type. ● Description Shows the short description of the file type. ● Filename A file name is preset here for every file type. Note Changing the file name You can change the file name preset in this column.
  • Page 209: Passwords

    Configuring with Web Based Management 6.5 "System" menu If several identical devices are to receive the same configuration and the IP addresses are assigned using DHCP, the effort for reconfiguration can be reduced by saving and reading in the configuration data. Follow the steps below to reuse configuration data: 1.
  • Page 210 Configuring with Web Based Management 6.5 "System" menu Description The table has the following columns: ● Type Shows the certificate. ● Description Shows a short description of the certificate. ● Enabled Specifies whether the certificate needs a password. If you enable the setting, specify the password in "Password".
  • Page 211: Events

    Configuring with Web Based Management 6.5 "System" menu 6.5.9 Events 6.5.9.1 Configuration Selecting system events On this page, you specify how a device reacts to system events. To enable or disable the options, click the relevant check boxes of the columns. Description With Table 1, you can enable or disable all check boxes of a column of Table 2 at once.
  • Page 212 Configuring with Web Based Management 6.5 "System" menu Table 2 has the following columns: ● Event The column contains the following values: – Cold/warm restart The device was turned on or restarted by the user. – Link Change This event occurs only when the port status is monitored and has changed, see "System >...
  • Page 213: Severity Filters

    Configuring with Web Based Management 6.5 "System" menu ● E-mail The device sends an e-mail. This is only possible if the SMTP server is set up and the "SMTP client" function is enabled. ● Trap The device sends an SNMP trap. This is only possible if "SNMPv1 Traps" is enabled in "System >...
  • Page 214: Smtp Client

    Configuring with Web Based Management 6.5 "System" menu Description The table has the following columns: ● Client Type Select the client type for which you want to make settings: – E-mail Sending system event messages by e-mail – Log Table Entry of system events in the log table –...
  • Page 215 Configuring with Web Based Management 6.5 "System" menu On this page, you can configure up to three SMTP servers and the corresponding e-mail addresses. Description The page contains the following boxes: ● SMTP Client Enable or disable the SMTP client. ●...
  • Page 216 Configuring with Web Based Management 6.5 "System" menu The table contains the following columns: ● Select Select the check box in a row to be deleted. ● SMTP Server Address Shows the IP address, the FQDN (Fully Qualified Domain Name) or the host name of the SMTP server.
  • Page 217: Dhcpv4

    Configuring with Web Based Management 6.5 "System" menu 6.5.11 DHCPv4 6.5.11.1 DHCP client Setting of the DHCP mode If the device is configured as a DHCP client, it starts a DHCP query. As the reply to the query the device receives an IPv4 address from the DHCP server. The server manages an address range from which it assigns IPv4 addresses.
  • Page 218: Dhcp Server

    Configuring with Web Based Management 6.5 "System" menu The table has the following columns: ● Interface Interface to which the setting relates. ● DHCP Enable or disable the DHCP client for the relevant interface. Procedure 1. Select the required mode from the "DHCP Mode" drop-down list. If you select the DHCP mode "via DHCP Client ID"...
  • Page 219 Configuring with Web Based Management 6.5 "System" menu Requirements for the DHCP server ● In access point mode – The connected devices are configured so that they obtain the IPv4 address from a DHCP server. ● In client mode – The connected devices are configured so that they obtain the IPv4 address from a DHCP server.
  • Page 220 Configuring with Web Based Management 6.5 "System" menu Description The page contains the following boxes: ● DHCP Server Enable or disable the DHCP server on the device. Note To avoid conflicts with IPv4 addresses, only one device may be configured as a DHCP server in the network.
  • Page 221: Dhcp Options

    Configuring with Web Based Management 6.5 "System" menu ● Enable Specify whether or not this IPv4 address band will be used. Note If you enable the IPv4 address band. the settings in this and the other DHCP tabs ate grayed out and can no longer be edited. ●...
  • Page 222 Configuring with Web Based Management 6.5 "System" menu Description The page contains the following boxes: ● Pool ID Select the required IPv4 address band. ● Option Code Enter the number of the required DHCP option. A maximum of 20 DHCP options are possible.
  • Page 223: Static Leases

    Configuring with Web Based Management 6.5 "System" menu ● Use Interface IP Specify whether or not the internal IPv4 address of the device will be used. ● Value Enter the DHCP parameter that is transferred to the DHCP client. The content depends on the DHCP option.
  • Page 224 Configuring with Web Based Management 6.5 "System" menu Description The page contains the following boxes: ● Pool ID From the drop-down list, select the required IPv4 address band. ● Hardware Type Select the method according to which a client is identified. –...
  • Page 225: Snmp

    Configuring with Web Based Management 6.5 "System" menu 6.5.12 SNMP 6.5.12.1 General Configuration of SNMP On this page, you make the basic settings for SNMP. Enable the check boxes according to the function you want to use. SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 226 Configuring with Web Based Management 6.5 "System" menu Description The page contains the following boxes: ● SNMP Select the SNMP protocol from the drop-down list. The following settings are possible: – "-" (disabled) SNMP is disabled. – SNMPv1/v2c/v3 SNMPv1/v2c/v3 is supported. Note Note that SNMP in versions 1 and 2c does not have any security mechanisms.
  • Page 227 Configuring with Web Based Management 6.5 "System" menu ● SNMPv3 User Migration – Enabled If the function is enabled, an SNMP engine ID is generated that can be migrated. You can transfer configured SNMPv3 users to a different device. If you enable this function and load the configuration of the device on another device, configured SNMPv3 users are retained.
  • Page 228: Traps

    Configuring with Web Based Management 6.5 "System" menu 6.5.12.2 Traps SNMP traps for alarm events If an alarm event occurs, a device can send SNMP traps (alarm frames) to up to ten different management stations at the same time. Traps are only sent if the events specified in the "Events"...
  • Page 229: V3 Groups

    Configuring with Web Based Management 6.5 "System" menu 3. Select the check box in the required row "Trap". 4. Click the "Set Values" button. Deleting a trap entry 1. Enable "Select" in the row to be deleted. 2. Click the "Delete" button. The entry is deleted. 6.5.12.3 v3 Groups Security settings and assigning permissions...
  • Page 230 Configuring with Web Based Management 6.5 "System" menu The table has the following columns: ● Select Select the row you want to delete. ● Group Name Shows the defined group names. ● Security Level Shows the configured security level. ● Read Enable or disable read access for the required group.
  • Page 231 Configuring with Web Based Management 6.5 "System" menu Modifying a group 1. Specify the required read rights for the group in "Read". 2. Specify the required write rights for the group in "Write". 3. Click the "Set Values" button. Note Once a group name and the security level have been specified, they can no longer be modified after the group is created.
  • Page 232: V3 Users

    Configuring with Web Based Management 6.5 "System" menu 6.5.12.4 v3 users User-specific security settings On the WBM page, you can create new SNMPv3 users and modify or delete existing users. The user-based security model works with the concept of the user name; in other words, a user ID is added to every frame.
  • Page 233 Configuring with Web Based Management 6.5 "System" menu ● Group Name Select the group which will be assigned to the user. ● Authentication Protocol Specify the authentication protocol for which a password will be stored. The following settings are available: –...
  • Page 234: System Time

    Configuring with Web Based Management 6.5 "System" menu ● Privacy Password Confirmation Confirm the encryption password by repeating the entry. ● Persistence Shows whether or not the user is assigned to an SNMPv3 group. If the user is not assigned to an SNMPv3 group, no automatic saving is triggered and the configured user is deleted after restarting the device.
  • Page 235: Manual Setting

    Configuring with Web Based Management 6.5 "System" menu 6.5.13.1 Manual Setting Manual setting of the system time On this page, you set the date and time of the system yourself. For this setting to be used, enable "Time Manually". Description The page contains the following boxes: ●...
  • Page 236: Dst Overview

    Configuring with Web Based Management 6.5 "System" menu ● Last Synchronization Mechanism Shows how the last time synchronization was performed. – Not set The time was not set. – Manual Manual time setting – SNTP Automatic time-of-day synchronization with SNTP –...
  • Page 237 Configuring with Web Based Management 6.5 "System" menu Settings ● Select Select the row you want to delete. ● DST No. Shows the number of the entry. If you create a new entry, a new line with a unique number is created. ●...
  • Page 238 Configuring with Web Based Management 6.5 "System" menu ● State Shows the status of the entry: – Enabled The entry was created correctly. – Invalid The entry was created new and the start and end date are identical. ● Type Shows how the daylight saving time changeover is made: –...
  • Page 239: Dst Configuration

    Configuring with Web Based Management 6.5 "System" menu Deleting an entry 1. Enable "Select" in the row to be deleted. 2. Click the "Delete" button. The entry is deleted. 6.5.13.3 DST Configuration On this page, you can configure the entries for the daylight saving time changeover. As result of the changeover to daylight saving or standard time, the system time for the local time zone is correctly set.
  • Page 240 Configuring with Web Based Management 6.5 "System" menu You can set a fixed date for the start and end of daylight saving time. ● Year Enter the year for the daylight saving time changeover. ● Start Date Enter the following values for the start of daylight saving time: –...
  • Page 241 Configuring with Web Based Management 6.5 "System" menu SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 242: Sntp Client

    Configuring with Web Based Management 6.5 "System" menu You can create a rule for the daylight saving time changeover. ● Start Date Enter the following values for the start of daylight saving time: – Hour Specify the hour. – Month Specify the month.
  • Page 243 Configuring with Web Based Management 6.5 "System" menu Description The page contains the following boxes: ● SNTP Client Enable or disable automatic time-of-day synchronization using SNTP. ● Current System Time Shows the current date and current normal time received by the device. If you specify a time zone, the time information is adapted accordingly.
  • Page 244 Configuring with Web Based Management 6.5 "System" menu ● Time Zone In this box, enter the time zone you are using in the format "+/- HH:MM". The time zone relates to UTC standard world time. The time in the "Current System Time" box is adapted accordingly. ●...
  • Page 245: Ntp Client

    Configuring with Web Based Management 6.5 "System" menu Procedure 1. Click the "SNTP Client" check box to enable the automatic time setting. 2. In the "Time Zone" input box, enter the local time difference to world time (UTC). The input format is "+/-HH:MM" (for example +02:00 for CEST), because the SNTP server always sends the UTC time.
  • Page 246 Configuring with Web Based Management 6.5 "System" menu Description The page contains the following boxes: ● NTP Client Select this check box to enable automatic time-of-day synchronization with NTP. ● Current System Time Shows the current date and current normal time received by the IE switch. If you specify a time zone, the time information is adapted accordingly.
  • Page 247: Simatic Time Client

    Configuring with Web Based Management 6.5 "System" menu ● Daylight Saving Time (DST) Shows whether the daylight saving time changeover is active. – active (offset +1 h) The system time was changed to daylight saving time; in other words an hour was added.
  • Page 248 Configuring with Web Based Management 6.5 "System" menu Description The page contains the following boxes: ● SIMATIC Time Client Select this check box to enable the device as a SIMATIC time client. ● Current System Time Shows the current system time. ●...
  • Page 249: Auto Logout

    Configuring with Web Based Management 6.5 "System" menu 6.5.14 Auto Logout Setting the automatic logout On this page, set the times after which there is an automatic logout from WBM or the CLI following user in activity. If you have been logged out automatically, you will need to log in again. Note No automatic logout from the CLI If the connection is not terminated after the set time, check the "Keep alive"...
  • Page 250: Syslog Client

    Configuring with Web Based Management 6.5 "System" menu 6.5.15 Syslog Client System event agent Syslog according to RFC 3164 is used for transferring short, unencrypted text messages over UDP in the IP network. This requires a Syslog server. Requirements for sending log entries: ●...
  • Page 251: Fault Monitoring

    Configuring with Web Based Management 6.5 "System" menu Procedure Enabling function 1. Select the "Syslog Client" check box. 2. Click the "Set Values" button. Creating a new entry 1. In the "Syslog Server Address" input box, enter the IP address, the FQDN or the host name of the Syslog server on which the log entries will be saved.
  • Page 252 Configuring with Web Based Management 6.5 "System" menu In addition, the corresponding error message is entered in the result log table. The content of the event log table is displayed in "Information > Log Tables > Event Log". Note This WBM page is not available on the SCALANCE W786-2 SFP. Procedure 1.
  • Page 253: Link Change

    Configuring with Web Based Management 6.5 "System" menu Procedure 1. Click the check box in front of the line name you want to monitor to enable or disable the monitoring function. 2. From the "PROFINET Redundancy" drop-down list, select the desired entry for redundant power supply to be monitored by PROFINET.
  • Page 254: Profinet

    Configuring with Web Based Management 6.5 "System" menu Description The table has the following columns: ● Port Shows the available ports. ● Setting Select the setting from the drop-down list. You have the following options: – Up Error handling is triggered when the port changes to the active status. (From "Link down"...
  • Page 255 Configuring with Web Based Management 6.5 "System" menu Description of the displayed boxes The page contains the following boxes: ● PROFINET Device Diagnostics Shows whether PROFINET is enabled ("On") or disabled ("Off"). ● PROFINET runtime mode for next boot Set whether PROFINET will be enabled ("On") or disabled ("Off") after the next device restart.
  • Page 256: Ethernet/Ip

    Configuring with Web Based Management 6.5 "System" menu SCALANCE W700 and STEP 7 The Ethernet interface can be configured in STEP 7 if the following requirements are met: ● STEP 7 V13 Update 3 with HSP0107 or ● STEP7 version 5.5.4 with GSDML version 2.31 The diagnostics functions can also be used.
  • Page 257 Configuring with Web Based Management 6.5 "System" menu Note Devices with two Ethernet ports On devices with two Ethernet interfaces only one of the interfaces (P1 or P2) may be used for the Ethernet configuration. This applies to the following devices: •...
  • Page 258: Plug

    Configuring with Web Based Management 6.5 "System" menu 6.5.19 PLUG 6.5.19.1 Configuration NOTICE Do not remove or insert a C-PLUG / KEY-PLUG during operation! A PLUG may only be removed or inserted when the device is turned off. The device checks whether or not a PLUG is inserted at one second intervals. If it is detected that the PLUG was removed, there is a restart.
  • Page 259 Configuring with Web Based Management 6.5 "System" menu SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 260 Configuring with Web Based Management 6.5 "System" menu Description The table has the following rows: ● State Shows the status of the C-PLUG. The following are possible: – ACCEPTED There is a C-PLUG with a valid and suitable configuration in the device. –...
  • Page 261 Configuring with Web Based Management 6.5 "System" menu ● File System Displays the type of file system on the PLUG. NOTICE New file system UBI As of SCALANCE W firmware version 2.0, UBI is the standard file system for the C- PLUG or KEY-PLUG.
  • Page 262: License

    Configuring with Web Based Management 6.5 "System" menu "FACTORY". The configuration in the internal flash memory of the device is copied to the PLUG. – Erase PLUG to factory default Deletes all data from the PLUG and triggers low-level formatting. Procedure 1.
  • Page 263 Configuring with Web Based Management 6.5 "System" menu Information about the license of the KEY-PLUG A C-PLUG can only store the configuration of a device. In addition to the configuration, a KEY-PLUG also contains a license that enables certain functions of your SIMATIC NET device.
  • Page 264: Ping

    Configuring with Web Based Management 6.5 "System" menu ● Serial number Shows the serial number of the KEY-PLUG. ● Info String Shows additional information about the device that used the KEY-PLUG previously, for example, article number, type designation, and the versions of the hardware and software.
  • Page 265 Configuring with Web Based Management 6.5 "System" menu Description The page contains the following boxes: ● Destination Address Enter the IPV4, IPv6 address or the FQDN (Fully Qualified Domain Name) of the device. ● Repeat Enter the number of ping requests. ●...
  • Page 266: Interfaces" Menu

    Configuring with Web Based Management 6.6 "Interfaces" menu "Interfaces" menu 6.6.1 Ethernet 6.6.1.1 Overview Overview of the port configuration The page shows the configuration for the data transfer for all ports of the device. You cannot configure anything on this page. Description The table has the following columns: ●...
  • Page 267: Configuration

    Configuring with Web Based Management 6.6 "Interfaces" menu ● Link Shows the connection status to the network. With the connection status, the following is possible: – up The port has a valid link to the network, a link integrity signal is being received. –...
  • Page 268 Configuring with Web Based Management 6.6 "Interfaces" menu Description The table has the following rows: ● Port Select the port to be configured from the drop-down list. ● State Specify whether the port is enabled or disabled. – enabled The port is enabled. Data traffic is possible only over an enabled port. –...
  • Page 269 Configuring with Web Based Management 6.6 "Interfaces" menu ● Mode Type Note The parameter cannot be configured on the SCALANCE W786-2 SFP. Select the transmission speed and the transmission method of the port from this drop- down list. The transmission speed can be 10 Mbps, 100 Mbps or 1000 Mbps. As the transmission mode, you can configure full duplex (FD) or half duplex (HD).
  • Page 270 Configuring with Web Based Management 6.6 "Interfaces" menu Procedure Note Changing the port configuration With various automatic functions, the device prevents or reduces the effect on other ports and priority classes (Class of Service) if a port is overloaded. This can mean that frames are discarded even when flow control is enabled.
  • Page 271: Wlan

    Configuring with Web Based Management 6.6 "Interfaces" menu 6.6.2 WLAN 6.6.2.1 Basic Basic settings On this page, you make several basic settings for the device, for example the country setting and mode. Note To configure the WLAN interface, you must always specify the country code first. Some parameters are dependent on the country setting, for example the transmission standard.
  • Page 272 Configuring with Web Based Management 6.6 "Interfaces" menu Description ● Country Code Select the country in which the device will be operated from the drop-down list. You do not need to know the data for the specific country, the channel division and output power are set by the device according to the country you select.
  • Page 273 Configuring with Web Based Management 6.6 "Interfaces" menu ● Radio Mode Shows the mode of the WLAN interface. ● Frequency Band Specify the frequency band. In client mode, dual-frequency operation is also possible. – 2.4 GHz – 5 GHz – 2.4 GHz + 5 GHz (only in client mode) Note Configuring WLAN interfaces of the W786-2IA RJ-45 for different frequency bands If both WLAN interfaces are configured for the same frequency band on this device, there...
  • Page 274 In the USA and in countries that follow the FCC (Federal Communication Commission) when operating with DFS (Dynamic Frequency Selection), the IWLAN RCoax Cable 5 GHz may not be used. The current status of the approvals can be found on the Internet http://www.siemens.com/wireless-approvals ● Outdoor Mode – Enabled If you have enabled the outdoor mode, you only have the channels available that are permitted for outdoor operation.
  • Page 275 Configuring with Web Based Management 6.6 "Interfaces" menu ● max. Tx Power Specify the maximum possible transmit power of the device. If the transmit power is set too high the received signal at the client may be overmodulated. Check the received signal strength at the client (dBm). It may be necessary to reduce the transmit power depending on the antennas being used to avoid exceeding the maximum legal transmit power.
  • Page 276: Advanced

    Configuring with Web Based Management 6.6 "Interfaces" menu 6.6.2.2 Advanced Further possible settings On this page, you can specify details of the transmission characteristics. You only need to adapt the parameters on this page if the SCALANCE W700 device cannot be used as it is intended with the default settings.
  • Page 277 Configuring with Web Based Management 6.6 "Interfaces" menu size after they have been received. This can be beneficial if the transmission quality is poor because larger packets are more difficult to transmit. However fragmentation into smaller packets means a poorer throughput. Note You can only edit this value if the you have set the transmission standard "802.11g"...
  • Page 278 Configuring with Web Based Management 6.6 "Interfaces" menu ● Multi Radar Detection (only in access point mode) – Enabled This function is only available if you have enabled the "DFS" function on the "Basic" page. This function is suitable for systems with several access points connected via an Ethernet network and that send on the same channel.
  • Page 279: Antennas

    Configuring with Web Based Management 6.6 "Interfaces" menu 6.6.2.3 Antennas Overview Overview of IWLAN antennas: The antenna name provides information about the properties of the antennas listed in the IWLAN antenna overview: SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 280 Configuring with Web Based Management 6.6 "Interfaces" menu Antennas Configuration of external antennas On this page, you configure the settings for the connected external antennas. Note 50 Ω-terminating resistor Each WLAN interface has three antenna connectors. Connectors that are not used must have a 50 Ω...
  • Page 281 Configuring with Web Based Management 6.6 "Interfaces" menu Description The table has the following columns: ● Connector Shows the name of the relevant antenna connector. ● Antenna Type Select the type of external antenna connected to the device. If the type of your external antenna is not available, select the entry "User defined".
  • Page 282 Configuring with Web Based Management 6.6 "Interfaces" menu ● Additional Attenuation [dB] Here, specify the additional attenuation caused, for example, by an additional splitter. ● Antenna Mode Specify the use of the antenna. For antenna connector 1 (R1 A1 and R2 A1), the entry cannot be changed.
  • Page 283: Allowed Channels

    Configuring with Web Based Management 6.6 "Interfaces" menu 3. For the second antenna connector (R1 A2) in the "Antenna Type" drop-down list, select the type of antenna. 4. In the "Cable Length" input box, enter the length of the connecting cable you are using in meters.
  • Page 284 Configuring with Web Based Management 6.6 "Interfaces" menu Description Table 1 contains the following columns: ● Radio Shows the available WLAN interfaces. ● Use Allowed Channels only If you enable the option, you restrict the selection of channels via which the AP or the client is allowed to establish the connection.
  • Page 285: 285

    Configuring with Web Based Management 6.6 "Interfaces" menu 3. Select the relevant check box for the required channel number. 4. Click the "Set Values" button. 6.6.2.5 802.11n Properties of 802.11n With the IEEE 802.11n standard, it is possible to put together individual data packets in one larger data packet, the A-MPDU and A-MSDU data packets.
  • Page 286 Configuring with Web Based Management 6.6 "Interfaces" menu ● A-MSDU Aggregated MAC Service Data Unit (A-MSDU) Enables or disables that several MSDUs with the same destination address are bundled into an A-MSDU and are sent together. This reduces the network load. Due to their shorter maximum length A-MSDUs are more suitable for the bundling of several shorter frames.
  • Page 287 Configuring with Web Based Management 6.6 "Interfaces" menu 6.6.2.6 Configuration On this WBM page, you specify the configuration for the access point. Note This WBM page is only available in access point mode. SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 288 Configuring with Web Based Management 6.6 "Interfaces" menu Description Table 1 has the following columns: ● Radio Shows the available WLAN interfaces. ● Channel Specify the main channel. If you want the access point to search for a free channel itself, use "Auto". The selection of channels used by an access point when establishing a wireless cell can be restricted.
  • Page 289 Configuring with Web Based Management 6.6 "Interfaces" menu Table 2 has the following columns: ● Radio Shows the available WLAN interfaces. ● Available Channels This box displays the permitted channels. The display depends on the wireless approvals of the currently selected country and the settings on the "Allowed Channels" page. Table 3 has the following columns: ●...
  • Page 290: Ap Wds

    Configuring with Web Based Management 6.6 "Interfaces" menu Procedure 1. Select the required channel from the "Channel" drop-down list. 2. Enter network name in the "SSID" input box for the corresponding WLAN interface and port. 3. For the relevant WLAN interface and the port, select the "Enabled" check box. 4.
  • Page 291 Configuring with Web Based Management 6.6 "Interfaces" menu Description The table has the following columns: ● Radio Shows the available WLAN interfaces. ● Port Shows the WDS interfaces. ● Port enabled Enables the WDS interface. ● Connection over Specify the VAP interface via which the WDS connection is established. Both the MAC address of the VAP as well as security settings for example WPA2 used.
  • Page 292 Configuring with Web Based Management 6.6 "Interfaces" menu Note In WDS operation, the following restrictions apply to all access points involved: • All access points that will communicate with each other must use the same channel, the same transmission procedure and the same data rate. •...
  • Page 293: Ap 802.11A/B/G Data Rates

    Configuring with Web Based Management 6.6 "Interfaces" menu 6.6.2.8 AP 802.11a/b/g data rates Data transmission speeds with IEEE 802.11a/b/g Note The WBM page is only available in access point mode. The WBM page can only be configured if "802.11a", "802.11g" or "802.11n" is set for WLAN mode.
  • Page 294 Configuring with Web Based Management 6.6 "Interfaces" menu Description Table 1 has the following columns: ● Radio Specifies the WLAN interface to which the information relates. ● "Use selected data rates only'". If you enable this option, you can specify the data transmission speeds for the required WLAN interface.
  • Page 295: Ap 802.11N Data Rates

    Configuring with Web Based Management 6.6 "Interfaces" menu "Default Values" button The "Default Values" button sets the selection of values to conform with the standard. Procedure To configure a certain data transmission speed on WLAN 1: 1. Enable the "Use selected data rates only'" option for "WLAN 1". 2.
  • Page 296 Configuring with Web Based Management 6.6 "Interfaces" menu Description Table 1 has the following columns: ● Radio Specifies the WLAN interface to which the information relates. ● "Use selected data rates only'". If you enable this option, you can specify the data transmission speeds for the required WLAN interface.
  • Page 297 Configuring with Web Based Management 6.6 "Interfaces" menu With Table 2, you can enable or disable all check boxes of a column of Table 3 (MCS Index) at once. Table 2 has the following columns: ● All data rates settings Shows that the setting is valid for all entries of Table 3.
  • Page 298: Client

    Configuring with Web Based Management 6.6 "Interfaces" menu 1. Disable the "Use selected data rates only" option in Table 1. 2. Click the "Set Values" button. 6.6.2.10 Client Connecting to a network On this WBM page, you can specify how the device connects to a network as client. Note This WBM page is only available in client mode.
  • Page 299 Configuring with Web Based Management 6.6 "Interfaces" menu Description Table 1 has the following columns: ● Radio Shows the available WLAN interfaces. ● MAC Mode Specify how the MAC address is assigned to the client. The following are possible: – Automatic The client automatically adopts the source MAC address of the first frame that it receives over the Ethernet interface.
  • Page 300 Configuring with Web Based Management 6.6 "Interfaces" menu ● min. AP signal strength The client has a signal strength set. Note iPCF / iPCF-HT / IPCF-MC enabled When iPCF / iPCF-HT / IPCF-MC is enabled, the signal strength cannot be set. The client must receive the signal coming from the access point with at least the specified signal strength to be able to connect to this access point.
  • Page 301 Configuring with Web Based Management 6.6 "Interfaces" menu ● Background Scan Mode While the client is connected to an access point, it scans for other access points in the background with which it can connect when necessary. Specify the mode for the scan. The following options are available: –...
  • Page 302: Force Roaming

    Configuring with Web Based Management 6.6 "Interfaces" menu ● SSID Enter the SSID of the access point with which the client will connect. For the SSID, ASCII code 0x20 to 0x7e is used. ● Security Select a security context. You create and configure a security context in "Security > WLAN >...
  • Page 303 Configuring with Web Based Management 6.6 "Interfaces" menu On this page you specify when roaming is performed. ● On connection termination (only in access point mode) If the wired Ethernet interface is no longer available the WLAN interface is turned off. The clients roam and then connect to a different access point.
  • Page 304 Configuring with Web Based Management 6.6 "Interfaces" menu Description Table 1 is only available in access point mode and is divided into the following columns: ● Radio Shows the available WLAN interfaces. ● Force roaming on link down When enabled if there is a connection abort via the Ethernet interface, the WLAN interface is turned off.
  • Page 305: Signal Recorder

    Configuring with Web Based Management 6.6 "Interfaces" menu Procedure Creating force roaming 1. Click the "Create" button. 2. Make the following settings: – Destination address – Interval – Max. Lost Packets 3. Specify through which destination address the following interface will be monitored: –...
  • Page 306 Configuring with Web Based Management 6.6 "Interfaces" menu Description The display is divided into two areas. ● Client Represents the measurement of the client. ● Access point Displays the measurement of the access point with which the client is currently connected.
  • Page 307 Configuring with Web Based Management 6.6 "Interfaces" menu The first graphic contains the following elements: ● Scroll bar With the scroll bar, you can look through the entire measurement. To do this you can use the "<<" and ">>" buttons or the arrow keys on the keyboard. ●...
  • Page 308 Configuring with Web Based Management 6.6 "Interfaces" menu The second graphic contains the following elements: ● Bar (left) In the bar on the left-hand side the transfer attempts and the data rate of the client / access point are displayed according to the color scheme. ●...
  • Page 309 Configuring with Web Based Management 6.6 "Interfaces" menu ● CL M-Signal [dBm] If the client has an iPCF-MC connection, the user signal of the management channel is displayed. ● Roaming Counter The roaming counter shows how often the client has changed access points during the recording.
  • Page 310 Configuring with Web Based Management 6.6 "Interfaces" menu ● Start Click the button in this column to start recording the wanted signal. Note • If you start a new recording, the previous recording will be overwritten. • If the recording has lasted less than 10 minutes and has not yet been completed (e.g. due to a restart or power down), the measured values are deleted.
  • Page 311 Configuring with Web Based Management 6.6 "Interfaces" menu 6. Change to one of the following menu items to call up the result of the recording: – System > Load&Save > HTTP Click the "Save" button in the "WLANSigRec" table row to save the file "signal_recorder_SCALANCE_W700.zip"...
  • Page 312 Configuring with Web Based Management 6.6 "Interfaces" menu Below the graphic, the configuration data of the client is displayed. SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 313 Configuring with Web Based Management 6.6 "Interfaces" menu The following pages contain the detailed information of all individual measurements in the form of a table. The header row shows the IP address of the client and the BSSID and system name of the access point.
  • Page 314 Configuring with Web Based Management 6.6 "Interfaces" menu CSV file The CSV file contains information on the configuration of the SCALANCE W700 device and detailed information on all individual measurements and is divided into two areas. The first area contains the configured settings: ●...
  • Page 315 Configuring with Web Based Management 6.6 "Interfaces" menu ● CL / AP RX-Signal [dBm] The effective user data signal of the client (CL) / access point (AP) in dBm ● CL / AP NF [dBm] The background noise in dBm ●...
  • Page 316: Spectrum Analyzer

    Configuring with Web Based Management 6.6 "Interfaces" menu 6.6.2.13 Spectrum analyzer Technical information The frequency range depends on the configuration. Parameters Value Amplitude accuracy In 2.4 GHz 3 dBm In 5 GHz 7 dBm Resolution bandwidth 330 KHz Min. signal strength -100 dBm Max.
  • Page 317 Configuring with Web Based Management 6.6 "Interfaces" menu Representing signals of the frequency range With the spectrum analyzer you can recognize and represent the electromagnetic signals of a frequency range. You can measure the strength of all signals located in the environment of the access point.
  • Page 318 Configuring with Web Based Management 6.6 "Interfaces" menu Description The page contains the following graphics: SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 319 Configuring with Web Based Management 6.6 "Interfaces" menu In all graphics, the lower x axis shows the channels around the selected center frequency for which the measurements are made. The upper x axis shows the frequency range. The display of the y axis depends on the selected graphic. ●...
  • Page 320 Configuring with Web Based Management 6.6 "Interfaces" menu The y axis shows the course of the measured values over time from current (0 s) to the values received before 500 s. The graphic shows the strength of all signals that the access point receives in its environment in the configured frequency range.
  • Page 321 Configuring with Web Based Management 6.6 "Interfaces" menu The y axis shows the signal strength in dBm. The graphic shows how often signals occur with a certain strength in the configured frequency range. The color goes from the lowest value (0%) in black to the highest value (100%) in red. The page contains the following buttons: ●...
  • Page 322 Configuring with Web Based Management 6.6 "Interfaces" menu ● Color Scheme With this icon, you change the color scheme for the graphic type "Spectrogram": – The color goes from the lowest value (-100 dBm) in black to the highest value (0 dBm) in red.
  • Page 323 Configuring with Web Based Management 6.6 "Interfaces" menu 6. Change to one of the following menu items to call up the result of the measurement: – System > Load&Save > HTTP Click the "Save" button in the "WLANSpectrumAnalyzer" table row to save the file "wlan_spectrum_analyzer_SCALANCE_W700.zip"...
  • Page 324: Remote Capture

    Configuring with Web Based Management 6.6 "Interfaces" menu 6.6.3 Remote Capture On this WBM page activate the function "Remote Capture" on the interface (Ethernet, WLAN). The function is for network diagnostics via a connected PC, e.g. to detect transfer errors. You can also enable the function on several interfaces at the same time.
  • Page 325 Configuring with Web Based Management 6.6 "Interfaces" menu The page contains the following boxes: ● WLAN Capture Mode (only in access point mode) Specify the recording mode for the WLAN interface: – Own Traffic In this case, the frames are recorded that were received and sent by the device. Exception: The data packets dealt with directly by the hardware are not displayed, for example hardware repetitions, acknowledgment frames.
  • Page 326 Configuring with Web Based Management 6.6 "Interfaces" menu 10.On the "Remote Interfaces" tab, the host and the interfaces on which the function "Remote Capture" was previously enabled are displayed. 11.Select the interface and click the "OK" button. 12.To start the recording click "Start". You can obtain further information about handling the program in Wireshark.
  • Page 327: Layer 2" Menu

    Configuring with Web Based Management 6.7 "Layer 2" menu "Layer 2" menu 6.7.1 VLAN 6.7.1.1 General VLAN configuration page On this page you specify whether or not the device forwards frames with VLAN tags transparently (IEEE 802.1D/VLAN-unaware mode) or takes VLAN information into account (IEEE 802.1Q/VLAN-aware mode).
  • Page 328 Configuring with Web Based Management 6.7 "Layer 2" menu Description The page contains the following boxes: ● Base Bridge mode Select the required mode from the drop-down list. The following modes are possible: Note Changing Base bridge mode Note the section "Changing Base bridge mode". This section describes how a change affects the existing configuration.
  • Page 329 Configuring with Web Based Management 6.7 "Layer 2" menu ● Status Shows the status type of the entry in the port filter table. Here, static means that the address was entered as a static address by the user. ● List of ports Specify the use of the port.
  • Page 330 Configuring with Web Based Management 6.7 "Layer 2" menu 802.1Q VLAN Bridge: Important rules for VLANs Make sure you keep to the following rules when configuring and operating your VLANs: ● Frames with the VLAN ID "0" are handled as untagged frames but retain their priority value.
  • Page 331: Port-Based Vlan

    Configuring with Web Based Management 6.7 "Layer 2" menu 6.7.1.2 Port-based VLAN Processing received frames On this page, you specify the configuration of the port properties for receiving frames. Requirement: ● On the "General" page, "802.1Q VLAN Bridge" is set for "Base Bridge Mode". Description Table 1 has the following columns: Note...
  • Page 332 Configuring with Web Based Management 6.7 "Layer 2" menu Table 2 has the following columns: ● Port Shows the available ports and interfaces. ● Priority From the drop-down list, select the priority given to untagged frames. The CoS priority (Class of Service) used in the VLAN tag. If a frame is received without a tag, it will be assigned this priority.
  • Page 333: Dynamic Mac Aging

    Configuring with Web Based Management 6.7 "Layer 2" menu 3. Select the values to be set from the drop-down lists. 4. Click the "Set Values" button. 6.7.2 Dynamic MAC Aging Protocol settings and switch functionality The device automatically learns the source addresses of the connected nodes. This information is used to forward frames to the nodes specifically involved.
  • Page 334: Spanning Tree

    Configuring with Web Based Management 6.7 "Layer 2" menu 6.7.3 Spanning Tree 6.7.3.1 General General settings of spanning tree This is the basic page for spanning tree. Select the compatibility mode from the drop-down list. As default, Multiple Spanning Tree is enabled. On the configuration pages of these functions, you can make detailed settings.
  • Page 335 Configuring with Web Based Management 6.7 "Layer 2" menu Description The page contains the following boxes: ● Spanning Tree Enable or disable MSTP. ● Protocol Compatibility Select the compatibility mode of MSTP. For example if you select RSTP, MSTP behaves like RSTP.
  • Page 336: Cist General

    Configuring with Web Based Management 6.7 "Layer 2" menu 6.7.3.2 CIST General MSTP-CIST configuration The page consists of the following parts. ● The left-hand side of the page shows the configuration of the device. ● The central part shows the configuration of the root bridge that can be derived from the spanning tree frames received by an device.
  • Page 337 Configuring with Web Based Management 6.7 "Layer 2" menu ● Root port Shows the port via which the switch communicates with the root bridge. ● Root Cost The path costs from this device to the root bridge. ● Topology Changes / Last Topology Change The entry for the device shows the number of reconfiguration actions due to the spanning tree mechanism since the last startup.
  • Page 338: Cist Port

    Configuring with Web Based Management 6.7 "Layer 2" menu ● Reset Counters Click this button to reset the counters on this page. ● Layer-2 Tunnel Admin Edge Port (Only available in access point mode) Select this check box if there can be an end device on a layer 2 tunnel port. Otherwise a reconfiguration of the network will be triggered whenever a link to this port is modified.
  • Page 339 Configuring with Web Based Management 6.7 "Layer 2" menu Description Table 1 has the following columns: ● Column 1 Shows that the settings are valid for all ports of table 2. ● Spanning Tree Status In the drop-down list, select the setting for all ports. If "No Change" is selected, the entries of the corresponding column in table 2 remain unchanged.
  • Page 340 Configuring with Web Based Management 6.7 "Layer 2" menu ● Path Cost The path costs from this port to the root bridge. The path with the lowest value is selected as the path. If several ports of a device have the same value, the port with the lowest port number will be selected.
  • Page 341 Configuring with Web Based Management 6.7 "Layer 2" menu this port. When the connection is established the first time, the port is treated as a "no Edge Port". – Admin/Auto Select these options if you operate a combination of both on this port. When the connection is established the first time, the port is treated as an Edge Port.
  • Page 342: Mst General

    Configuring with Web Based Management 6.7 "Layer 2" menu Procedure 1. In the input cells of the table row, enter the values of the port you are configuring. 2. From the drop-down lists of the cells of the table row, select the values of the port you are configuring.
  • Page 343 Configuring with Web Based Management 6.7 "Layer 2" menu ● Bridge Priority Enter the bridge priority in this box. The value for the bridge priority is a whole multiple of 4096 with a range of values from 0 to 61440. ●...
  • Page 344: Mst Port

    Configuring with Web Based Management 6.7 "Layer 2" menu 6.7.3.5 MST Port Configuration of the Multiple Spanning Tree port parameters On this page, you set the parameters for the ports of the configured multiple spanning tree instances. Description The page contains the following box: ●...
  • Page 345 Configuring with Web Based Management 6.7 "Layer 2" menu ● MSTP Status Click the check box to enable or disable this option. ● Priority Enter the priority of the port. The priority is only evaluated when the path costs are the same.
  • Page 346: Dcp Forwarding

    Configuring with Web Based Management 6.7 "Layer 2" menu Procedure 1. In the input cells of the table row, enter the values of the port you are configuring. 2. From the drop-down lists of the cells of the table row, select the values of the port you are configuring.
  • Page 347: Lldp

    Configuring with Web Based Management 6.7 "Layer 2" menu Description The table has the following columns: ● Port Shows the available Ethernet ports. ● Setting Specify whether the port should block or forward outgoing DCP frames. You have the following options available: –...
  • Page 348 Configuring with Web Based Management 6.7 "Layer 2" menu Applications PROFINET uses LLDP for topology diagnostics. In the default setting, LLDP is enabled for all ports; in other words, LLDP frames are sent and received on all ports. With this function, you have the option of enabling or disabling sending and/or receiving per port.
  • Page 349: Layer 3 (Ipv4)" Menu

    This page is only available in client mode. On this page, you specify the basic settings for NAT. Note You can find an application example for NAT and NAPT at the following address: https://support.industry.siemens.com/cs/ww/en/view/37593580 SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 350 Configuring with Web Based Management 6.8 "Layer 3 (IPv4)" menu Description The page contains the following boxes: ● Interface Select the required Ethernet interface from the drop-down list. ● Enable NAT Enable or disable NAT for the Ethernet interface. ● TCP Idle Timeout [s] Enter the required time in seconds.
  • Page 351 Configuring with Web Based Management 6.8 "Layer 3 (IPv4)" menu ● PROFINET Transparent Mode Only available when the KEY-PLUG iFeatures is inserted. With NAT, communication with connected PROFINET devices via WLAN is not possible because they are not visible to the outside. If you select this setting, you can make individual PROFINET devices visible again.
  • Page 352: Napt

    Configuring with Web Based Management 6.8 "Layer 3 (IPv4)" menu Procedure 1. In the "Local Interface IP address" input box, enter the local IP address of the Ethernet interface. 2. In the "Local Interface Subnet Mask" input box, enter the subnet mask for the local Ethernet.
  • Page 353 Configuring with Web Based Management 6.8 "Layer 3 (IPv4)" menu ● Global Port Enter the global port. Incoming frames with this port as the destination port are forwarded. If the setting is intended to apply to a port range, enter the range with start port "-"...
  • Page 354 Configuring with Web Based Management 6.8 "Layer 3 (IPv4)" menu Procedure 1. From the "Traffic Type" drop-down list, select the protocol for which the address assignment is valid. 2. Enter the number of the global port or a port range in "Global Port". 3.
  • Page 355: Security" Menu

    Configuring with Web Based Management 6.9 "Security" menu "Security" menu 6.9.1 Users 6.9.1.1 Local Users Local users On this page, you create local users with the corresponding rights. When you create or delete a local user this change is also made automatically in the table "External User Accounts".
  • Page 356 Configuring with Web Based Management 6.9 "Security" menu Description The page contains the following: ● User Account Enter the name for the user. The name must meet the following conditions: – It must be unique. – It must be between 1 and 250 characters long. –...
  • Page 357 Configuring with Web Based Management 6.9 "Security" menu ● Password Confirmation Enter the password again to confirm it. ● Role Select a role. You can choose between system-defined and self-defined roles, refer to the page "Security > Users > Roles.". The table contains the following columns: ●...
  • Page 358: Roles

    Configuring with Web Based Management 6.9 "Security" menu Deleting users 1. Select the check box in the row to be deleted. 2. Click the "Delete" button. The entries are deleted and the page is updated. 6.9.1.2 Roles Roles On this page, you create roles that are valid locally on the device. Note The values displayed depend on the rights of the logged-in user.
  • Page 359 Configuring with Web Based Management 6.9 "Security" menu The table contains the following columns: ● Select Select the check box in the row to be deleted. Note Predefined roles and assigned roles cannot be deleted or modified. ● Role Shows the name of the role. ●...
  • Page 360: Groups

    Configuring with Web Based Management 6.9 "Security" menu 6.9.1.3 Groups User Groups On this page you link a group with a role. In this example the group "Administrators" is linked to the "admin" role: The group is defined on a RADIUS server. The role is defined locally on the device. When a RADIUS server authenticates a user and assigns the user to the "Administrators"...
  • Page 361: Passwords

    Configuring with Web Based Management 6.9 "Security" menu ● Role Select a role. Users who are authenticated with the linked group on the RADIUS server receive the rights of this role locally on the device. You can choose between system-defined and self-defined roles, refer to the page "Security >...
  • Page 362 Configuring with Web Based Management 6.9 "Security" menu Description ● Current User Shows the user that is currently logged in. ● Current User Password Enter the password for the currently logged in user. ● User Account Select the user whose password you want to change. ●...
  • Page 363: Options

    Configuring with Web Based Management 6.9 "Security" menu ● New Password Enter the new password for the selected user. ● Password Confirmation Enter the new password again to confirm it. Procedure 1. In the "Current User Password" enter the valid password of the currently logged in user. 2.
  • Page 364: Aaa

    Configuring with Web Based Management 6.9 "Security" menu Description ● Password Policy Shows which password policy is currently being used. ● New Password Policy Select the required setting from the drop-down list. – High Password length: at least 8 characters, maximum 128 characters At least 1 uppercase letter At least 1 special character At least 1 number...
  • Page 365: Radius Client

    Configuring with Web Based Management 6.9 "Security" menu Description The page contains the following boxes: Note To be able to use the login authentication "RADIUS", "Local and RADIUS" or "RADIUS and fallback Local" a RADIUS server must be stored and configured for user authentication. ●...
  • Page 366 Configuring with Web Based Management 6.9 "Security" menu Description of the displayed boxes The page contains the following boxes: ● RADIUS Authorization Mode For the login authentication, the RADIUS authorization mode specifies how the rights are assigned to the user with a successful authentication. –...
  • Page 367 Configuring with Web Based Management 6.9 "Security" menu ● Test With this button, you can test whether or not the specified RADIUS server is available. The test is performed once and not repeated cyclically. ● Test Result Shows whether or not the RADIUS server is available: –...
  • Page 368 Configuring with Web Based Management 6.9 "Security" menu Modifying servers 1. In the relevant row, enter the following data in the input boxes: – RADIUS Server Address – Server Port – Shared Secret – Shared Secret Conf – Max. Retrans. –...
  • Page 369: Wlan

    Configuring with Web Based Management 6.9 "Security" menu 6.9.4 WLAN 6.9.4.1 Basic (Access Point) Safety levels To make the network secure, authentication and encryption are used. On this page, you specify the security settings. Note WLAN mode IEEE 802.11 n With devices operated in WLAN mode IEEE8002.11n, only WPA2 (WPA2-PSK and WPA2 Radius) encryption is possible.
  • Page 370 Configuring with Web Based Management 6.9 "Security" menu Description The table has the following columns: ● Port Shows the available ports. ● Authentication Type Select the type of authentication. The selection depends on the operating mode and the transmission standard. –...
  • Page 371 Configuring with Web Based Management 6.9 "Security" menu different clients, some using "WPA" and others "WPA2". The same encryption method is set on the clients – iPCF authentication Authentication with optional AES encryption. Authentication is set automatically if iPCF, iPCF-HT or iPCF-MC mode is enabled on the WLAN interface. If you want encryption with AES, only keys with a 128 bit key length are supported.
  • Page 372 Configuring with Web Based Management 6.9 "Security" menu Procedure 1. Select the required security settings. The settings that are possible depend on the "Authentication Type" you have selected. Authentication Type Encryption Cipher Encryption key source Open System disabled Open System Enabled Default Key Shared Key...
  • Page 373: Basic (Client)

    Configuring with Web Based Management 6.9 "Security" menu 6.9.4.2 Basic (Client) Safety levels To make the network secure, authentication and encryption are used. On this page, you specify the security settings. Note WLAN mode IEEE 802.11 n With devices operated in WLAN mode IEEE8002.11n only WPA2 (WPA2-PSK and WPA2 Radius) encryption is possible.
  • Page 374 Configuring with Web Based Management 6.9 "Security" menu ● Authentication Type Select the type of authentication. The selection depends on the operating mode and the transmission standard. – Open System There is no authentication. Encryption with a fixed (unchanging) WEP key can be selected as an option.
  • Page 375 Configuring with Web Based Management 6.9 "Security" menu different clients, some using "WPA" and others "WPA2". The same encryption method is set on the clients. – iPCF authentication Authentication with optional AES encryption. Authentication is set automatically if iPCF, iPCF-HT or iPCF-MC mode is enabled on the WLAN interface. If you want encryption with AES, only keys with a 128 bit key length are supported.
  • Page 376: Ap Communication

    Configuring with Web Based Management 6.9 "Security" menu Procedure 1. To create a new security context, click the "Create" button. 2. Select the required security settings. The settings that are possible depend on the "Authentication Type" you have selected. When iPCF, iPCF-HT or iPCF-MC mode is enabled, it is not possible to select the "Authentication Type".
  • Page 377 Configuring with Web Based Management 6.9 "Security" menu Description Table 1 has the following columns: ● Column 1 Shows that the settings are valid for all ports of table 2. ● within own VAP / with other VAPs / with Ethernet / Client Limiter In the drop-down list, select the setting for all ports.
  • Page 378: Ap Radius Authenticator

    Configuring with Web Based Management 6.9 "Security" menu ● with Ethernet – Enabled Clients can communicate via the Ethernet interface of the access point. – Disabled Option is disabled. ● Client limiter – Enabled The number of WLAN clients that can be logged on simultaneously is limited. –...
  • Page 379 Configuring with Web Based Management 6.9 "Security" menu Description The page contains the following boxes: ● Reauthentication Mode Specify who sets the time after which the clients are forced to reauthenticate. – - (disabled) Reauthentication mode is disabled. – Server Enables time management on the server.
  • Page 380: Client Radius Supplicant

    Configuring with Web Based Management 6.9 "Security" menu To display a new server, follow the steps below: 1. In the relevant row, enter the following data in the input boxes: – IP address or FQDN name of the RADIUS server. –...
  • Page 381 Configuring with Web Based Management 6.9 "Security" menu Description The table has the following columns: ● Security context Shows the security context. ● Dot1x User Name Enter the user name with which you want to log on to the RADIUS server. ●...
  • Page 382: Key

    Configuring with Web Based Management 6.9 "Security" menu Procedure 1. Enter the necessary values in the input boxes. 2. Select the required entry in the "Dot1x EAP Types" drop-down list. 3. Click the "Set Values" button. 6.9.4.6 Specifying the WEP key To allow you to enable the encryption for the "Open System"...
  • Page 383: Mac Acl

    Configuring with Web Based Management 6.9 "Security" menu Procedure 1. Enter at least one WEP key. 2. Click the "Set Values" button. 6.9.5 MAC ACL 6.9.5.1 Rules Configuration On this page, you specify the access rules for the MAC-based Access Control List. Using the MAC-based ACL, you can specify whether frames of certain MAC addresses are forwarded or discarded.
  • Page 384 Configuring with Web Based Management 6.9 "Security" menu ● Ingress Interfaces Shows a list of all ingress interfaces to which this rule applies. ● Egress Interfaces Shows a list of all egress interfaces to which this rule applies. Note Entering the MAC addresses You can configure access rules for MAC addresses.
  • Page 385: Ingress Rules

    Configuring with Web Based Management 6.9 "Security" menu Deleting an entry You cannot delete active entries. 1. Enable "Select" in the row to be deleted. 2. Click the "Delete" button. The entry is deleted. 6.9.5.2 Ingress Rules Introduction On this page, you specify the ACL rule according to which incoming frames are filtered at interfaces.
  • Page 386 Configuring with Web Based Management 6.9 "Security" menu The table has the following columns: ● Rule Order Shows the order of the ACL rules. ● Rule Number Shows the number of the ACL rule. ● Source MAC address Shows the MAC address of the source. ●...
  • Page 387: Egress Rules

    Configuring with Web Based Management 6.9 "Security" menu 6.9.5.3 Egress Rules Introduction On this page, you specify the ACL rule according to which outgoing frames are filtered at interfaces. You specify the ACL rule in the "Rules Configuration" tab. Description of the displayed boxes The page contains the following boxes: ●...
  • Page 388 Configuring with Web Based Management 6.9 "Security" menu ● Source MAC address Shows the MAC address of the source. ● Dest. MAC Address Shows the MAC address of the destination. ● Action Shows the action. – Forward If the frame complies with the ACL rule, the frame is forwarded. –...
  • Page 389: Ip Acl

    Configuring with Web Based Management 6.9 "Security" menu 6.9.6 IP ACL 6.9.6.1 Rules Configuration Introduction On this page, you specify the rules for the IP-based Access Control List. Using the IP-based ACL, you can specify whether frames of certain IPv4 addresses are forwarded or discarded. Description of the displayed boxes The table has the following columns: ●...
  • Page 390: Protocol Configuration

    Configuring with Web Based Management 6.9 "Security" menu ● Ingress Interfaces Shows a list of all ingress interfaces to which this rule applies. ● Egress Interfaces Shows a list of all egress interfaces to which this rule applies. Note Subnet mask for individual hosts If you create the rule for a single system (one IPv4 address), specify the subnet mask "255.255.255.255".
  • Page 391 Configuring with Web Based Management 6.9 "Security" menu Description The table has the following columns: ● Rule Number Shows the number of the protocol rule. When you create a rule, a new row with a unique number is created. ● Protocol Select the protocol for which this rule is valid.
  • Page 392: Ingress Rules

    Configuring with Web Based Management 6.9 "Security" menu 6.9.6.3 Ingress Rules Introduction On this page, you specify the ACL rules according to which incoming frames are handled by interfaces. You specify the ACL rules in the "Rules Configuration" tab. IP ACL ingress rules - first part of the table: IP ACL ingress rules - second part of the table: Description of the displayed boxes The page contains the following boxes:...
  • Page 393 Configuring with Web Based Management 6.9 "Security" menu ● Add To permanently assign the ACL rule to the interface, click the "Add" button. The configuration is shown in the table. ● Remove Rule From the "Remove rule" drop-down list, select the ACL rule to be deleted. ●...
  • Page 394 Configuring with Web Based Management 6.9 "Security" menu ● Message Type Shows a message type to decide the format of the message. ● Message Code Shows a message code to specify the function of the message. ● DSCP Shows a value for classifying the priority. Steps in configuration Follow the steps below to assign an ACL rule to an interface: 1.
  • Page 395: Egress Rules

    Configuring with Web Based Management 6.9 "Security" menu 6.9.6.4 Egress Rules Introduction On this page, you specify the ACL rules according to which outgoing frames are handled by interfaces. You specify the ACL rules in the "Rules Configuration" tab. SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 396 Configuring with Web Based Management 6.9 "Security" menu Description of the displayed boxes The page contains the following boxes: ● Interface Select the required interface from the drop-down list. The available interfaces (Page 49) depend on the device. To select a VLAN interface, an IP interface must be configured. Note If you use a VLAN interface, the ACL rule applies to all ports that belong to the VLAN.
  • Page 397 Configuring with Web Based Management 6.9 "Security" menu ● Action Select whether the frame is forwarded or rejected when it corresponds to the ACL rule. – Forward If the frame complies with the ACL rule, the frame is forwarded. – Discard If the frame complies with the ACL rule, the frame is not forwarded.
  • Page 398: Management Acl

    Configuring with Web Based Management 6.9 "Security" menu 6.9.7 Management ACL Description of configuration On this page, you can increase the security of your device. To specify which station with which IP address is allowed to access your device, configure the IP address or an entire address range.
  • Page 399 Configuring with Web Based Management 6.9 "Security" menu ● IP Address Enter the IP address or the network address to which the rule will apply. – If you use the IPv4 address 0.0.0.0, the settings apply to all IPv4 addresses. –...
  • Page 400: Inter Ap Blocking

    Configuring with Web Based Management 6.9 "Security" menu ● VAP X.Y Specify whether the station (or the IP address) accesses the device via the VAP interface. ● WDS X.Y Specify whether the station (or the IP address) accesses the device via the WDS interface.
  • Page 401 Configuring with Web Based Management 6.9 "Security" menu When should Inter AP blocking be used? The clients connected to an access point can normally communicate with all SCALANCE W700 devices of the layer 2 network. With inter AP blocking, the communication of the clients connected to the access point can be restricted.
  • Page 402: Allowed Addresses

    Configuring with Web Based Management 6.9 "Security" menu ● Activate When enabled, the access restriction is used. You configure which devices are accessible to the clients in "Security > Inter AP Blocking >Allowed Addresses". ● Block Gratuitous ARP Requests When enabled, gratuitous ARP packets are not forwarded. ●...
  • Page 403 Configuring with Web Based Management 6.9 "Security" menu Description The page contains the following boxes: ● Port Select the required port from the drop-down list. ● IP Address Enter the IP address of the devices accessible to the client. The table has the following columns: ●...
  • Page 404: Ifeatures" Menu

    Configuring with Web Based Management 6.10 "iFeatures" menu 6.10 "iFeatures" menu 6.10.1 iPCF Note This WBM page can only be configured with the following KEY-PLUGs: • Access point: W780 iFeatures (MLFB 6GK5 907-8PA00) • Client: W740 iFeatures (MLFB 6GK5 907-4PA00) When should iPCF be used? Note Use of iPCF with other iFeatures...
  • Page 405 Configuring with Web Based Management 6.10 "iFeatures" menu Description In both modes, the table has the following columns: ● Radio Specifies the WLAN interface to which the settings relate. ● Enable iPCF Enable or disable the iPCF mode. For PROFINET communication, we recommend that you enable the iPCF mode.
  • Page 406 Configuring with Web Based Management 6.10 "iFeatures" menu ● Legacy Free (iPCF-LF) These settings determine which device generation can establish a connection to this device. – Enabled Only the devices that communicate with the IEEE 802.11n standard and have the "Legacy Free (iPCF-LF)"...
  • Page 407 Configuring with Web Based Management 6.10 "iFeatures" menu there, it connects to it. If it does not find an access point on this channel, it scans the next channel. ● Signal Quality Threshold Can only be configured if "Next Channel" is set for "Scanning Mode". The access point specifies a signal quality for the client.
  • Page 408: Ipcf-Ht

    Configuring with Web Based Management 6.10 "iFeatures" menu 6.10.2 iPCF-HT Note This WBM page can only be configured with the following KEY-PLUGs: • Access point: W780 iFeatures (MLFB 6GK5 907-8PA00) • Client: W740 iFeatures (MLFB 6GK5 907-4PA00) When should iPCF-HT (High Throughput) be used? Note Use of iPCF-HT The function iPCF-HT...
  • Page 409 Configuring with Web Based Management 6.10 "iFeatures" menu Description In both modes, the table has the following columns: ● Radio Specifies the WLAN interface to which the settings relate. ● Enable iPCF-HT Enable or disable iPCF-HT. When enabled, the data rates provided by the access point are adapted.
  • Page 410 Configuring with Web Based Management 6.10 "iFeatures" menu In access point mode, the table has the following additional columns: ● Protocol Support Specify which protocol is handled with priority by the WLAN interface. – PROFINET if you set PROFINET, there must be no PROFINET controller downstream from the client.
  • Page 411 Configuring with Web Based Management 6.10 "iFeatures" menu ● Signal Quality Threshold Can only be configured if "Next Channel" is set for "Scanning Mode". The access point specifies a signal quality for the client. When scanning the client must receive the signal coming from the access point with at least the specified signal quality. Only then is a connection established.
  • Page 412: Ipcf-Mc

    Configuring with Web Based Management 6.10 "iFeatures" menu 6.10.3 iPCF-MC Note Use of iPCF with other iFeatures The function iPCF-MC and other iFeatures (e.g. iPCF, iPCF-HT, iPRP) are not compatible with each other and cannot be used at the same time on a device. Assignment of the interfaces With 11n devices, remember that the assignment of the WLAN interfaces is fixed for iPCF- •...
  • Page 413 Configuring with Web Based Management 6.10 "iFeatures" menu When should iPCF-MC be used? iPCF was developed to achieve short handover times when roaming between cells. The iPCF-MC technique allows short handover times even for freely mobile clients and when a lot of cells are involved or a large number of channels is being used.
  • Page 414 Configuring with Web Based Management 6.10 "iFeatures" menu Description The page contains the following boxes: ● Enable iPCF-MC activated Enable or disable the iPCF-MC mode of the SCALANCE W700 device. For PROFINET communication, we recommend enabling the iPCF-MC mode. By enabling iPCF-MC, the data rates provided by the access point are adapted.
  • Page 415 Configuring with Web Based Management 6.10 "iFeatures" menu ● Management Scan Period (in client mode only) This parameter specifies the time between two management channel scans (specified in iPCF cycles). If, for example, you select two, the client runs a management channel scan only in every second iPCF cycle.
  • Page 416: Iprp

    Configuring with Web Based Management 6.10 "iFeatures" menu 6.10.4 iPRP Note This WBM page can only be configured with the following KEY-PLUGs: • Access point: W780 iFeatures (MLFB 6GK5 907-8PA00) • Client: W740 iFeatures (MLFB 6GK5 907-4PA00) Requirements for using iPRP ●...
  • Page 417 Configuring with Web Based Management 6.10 "iFeatures" menu Description The page contains the following: ● PRP A Select the VLAN assignment for PRP from the drop-down list. ● PRP B Select the VLAN assignment for PRP B from the drop-down list. This table contains the following columns: ●...
  • Page 418 Configuring with Web Based Management 6.10 "iFeatures" menu ● PRP Network Specify the PRP network in which the port is a member. ● AP Radio Redundancy (in client mode only) – Radio Prevents the two clients of a client pair connecting on the same WLAN interface of the access point.
  • Page 419: Iref

    Configuring with Web Based Management 6.10 "iFeatures" menu 6.10.5 iREF Note • This WBM page is only available in access point mode. • This WBM page can only be configured with the following KEY-PLUG: – Access point: W780 iFeatures (MLFB 6GK5 907-8PA00) When should iREF be used? Note Use of iREF with other iFeatures...
  • Page 420: Aeroscout

    Configuring with Web Based Management 6.10 "iFeatures" menu 6.10.6 AeroScout Note • This WBM page is only available in access point mode. • This WBM page can only be configured with the following KEY-PLUG: Access point: W780 iFeatures (MLFB 6GK5 907-8PA00) Note Using Aeroscout •...
  • Page 421: Upkeep And Maintenance

    Upkeep and maintenance Firmware update - via WBM Requirement ● The device has an IP address. ● The user is logged in with administrator rights. Firmware update via HTTP 1. Click "System > Load&Save" in the navigation area. Click the "HTTP" tab. 2.
  • Page 422 Upkeep and maintenance 7.1 Firmware update - via WBM Result The firmware is has been transferred completely to the device. On the "Information > Versions" there are the entries "Firmware" and "Firmware Running". Firmware Runningshows the version of the current firmware. "Firmware" shows the firmware version stored after loading the firmware.
  • Page 423: Device Configuration With Preset-Plug

    Upkeep and maintenance 7.2 Device configuration with PRESET-PLUG Device configuration with PRESET-PLUG Please not the additional information and security notes in the operating instructions of your device. NOTICE Do not remove or insert a PLUG during operation A PLUG may only be removed or inserted when the device is turned off. Note Support as of V6.0 The PRESET-PLUG functionality is supported as of firmware version V6.0.
  • Page 424 Upkeep and maintenance 7.2 Device configuration with PRESET-PLUG 6. Remove the PRESET-PLUG. 7. Start the device either with a new PLUG inserted or with the internal configuration. Procedure for installation with the aid of the PRESET-PLUG 1. Turn off the power to the device. 2.
  • Page 425 Upkeep and maintenance 7.2 Device configuration with PRESET-PLUG Formatting a PRESET-PLUG (resetting the preset function) You format the PRESET PLUG using the Command Line Interface (CLI) to reset the preset function. To do this, follow the steps outlined below: 1. Start the remote configuration using Telnet (CLI) and log on with a user with the "admin" role.
  • Page 426: Embedding Firmware In Configpack

    Upkeep and maintenance 7.3 Embedding firmware in ConfigPack. Embedding firmware in ConfigPack. Please not the additional information and security notes in the operating instructions of your device. With the the ConfigPack with embedded firmware file you can install a device configuration including the firmware belonging to it on one or more devices.
  • Page 427 Upkeep and maintenance 7.3 Embedding firmware in ConfigPack. Procedure in the WBM 1. Connect to the WBM of the device on which you want to install the ConfigPack as administrator. 2. Go to the menu "System > Load&Save". 3. In the row "ConfigPack", click the "Load" button 4.
  • Page 428: Restoring The Factory Settings

    Upkeep and maintenance 7.4 Restoring the factory settings Restoring the factory settings NOTICE Previous settings If you reset, all the settings you have made will be overwritten by factory defaults. NOTICE Inadvertent reset An inadvertent reset can cause disturbances and failures in a configured network with further consequences.
  • Page 429 Upkeep and maintenance 7.4 Restoring the factory settings Via the configuration You will find detailed information on resetting the device parameters using the WBM and CLI in the configuration manuals: ● Web Based Management, section "Restart" ● Command Line Interface, section "Reset and Defaults" SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 430 Upkeep and maintenance 7.4 Restoring the factory settings SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 431: Troubleshooting/Faq

    Troubleshooting/FAQ Firmware update via WBM or CLI not possible Cause If there is a power failure during the firmware update, it is possible that the device is no longer accessible using Web Based Management or the CLI. When pressing the button, make sure you adhere to the instructions in the section "Reset button".
  • Page 432 Troubleshooting/FAQ 8.1 Firmware update via WBM or CLI not possible Result The firmware is transferred to the device. Note Please note that the transfer of the firmware can take several minutes. During the transmission, the red error LED (F) flashes. Once the firmware has been transferred completely to the device, the device is restarted automatically.
  • Page 433: Disrupted Data Transmission Due To The Received Power Being Too High

    Troubleshooting/FAQ 8.2 Disrupted data transmission due to the received power being too high Disrupted data transmission due to the received power being too high Causes and effects of excessive received power If the received power at the input of a SCALANCE W device is too high, this overdrives the amplifier circuit.
  • Page 434: Compatibility With Predecessor Products

    Compatibility with predecessor products Mixed mode Mixed operation with predecessor products (6GK57xx-xAA60-xAx0) is possible. Further information about predecessor products can be found on the Internet at Siemens Industry Automation and Drives Service & Support, entry ID: 42784493 (https://support.industry.siemens.com/cs/ww/en/view/42784493) Note the following points if you want to make mixed operation possible: ●...
  • Page 435: Instructions For Secure Network Design

    Troubleshooting/FAQ 8.4 Instructions for secure network design Instructions for secure network design Note the information below to protect your network against attacks: ● Use a secure connection with HTTPS In contrast to HTTP, HTTPS allows you secure access for configuring the WLAN clients and the access points using Web Based Management.
  • Page 436: Configuring The Device Using The Tia Portal

    Troubleshooting/FAQ 8.5 Configuring the device using the TIA Portal. Configuring the device using the TIA Portal. Once you have inserted the network component, you can edit the properties and parameters offline, for example the device name. Offline means there is no connection to the device. To be able to see the changes on the device, the change must first be compiled and then loaded on the device.
  • Page 437: Message: Sinema Configuration Not Yet Accepted

    Troubleshooting/FAQ 8.5 Configuring the device using the TIA Portal. 3. When the "Extended download to device" dialog opens, configure the "Settings for the download". – Select the protocol you are using, e.g. HTTPS. – Configure the relevant interface parameters on the configuration PC. When necessary, make interface or protocol specific settings on the operator panel.
  • Page 438 Troubleshooting/FAQ 8.5 Configuring the device using the TIA Portal. If you now change a parameter directly on the device (WBM/CLI/SNMP) these changes are lost when the device restarts. Solution 1. Open the relevant STEP 7 project in STEP 7 Basic / Professional 2.
  • Page 439: Wlan Client Trigger Handover Via Snmp

    Using the private MIB variable snMspsWlanForceHandover, you can force a handover. Note With Web Based Management (WBM) or using the Command Line Interface (CLI) you cannot configure this function. OID of the private MIB variable snMspsWlanForceHandover: iso(1).org(3).dod(6).internet(1).private(4).enterprises(1).siemens(4329).industrialCo mProducts(20).iComPlatforms(1).simaticNet(1).snMsps(1).snMspsCommon(1).snMspsWlan(27) .snMspsWlanObjects(1). snMspsWlanSmt(1). snMspsWlanRoamingConfigTable(4). snMspsWlanR oamingConfigEntry(1). snMspsWlanForceHandover(14) values of the MIB variable ●...
  • Page 440 Troubleshooting/FAQ 8.6 WLAN client Trigger handover via SNMP SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 441: Mib Files Supported By Scalance W700 Device

    The following table shows the MIB files available for a SCALANCE W device: Root OID Reference AUTOMATION SNTP (Siemens) .1.3.6.1.4.1.4329.6.3.11 Vendor specific 1) 2) AUTOMATION SYSTEM MIB (Siemens) .1.3.6.1.4.1.4329.6.3.2 Vendor specific 1) 2) AUTOMATION TELNET (Siemens) .1.3.6.1.4.1.4329.6.3.8 Vendor specific 1) 2) AUTOMATION TIME MIB (Siemens) .1.3.6.1.4.1.4329.6.3.3...
  • Page 442 UDP-MIB .1.3.6.1.2.1.7 Part of the AUTOMATION.MIB You can download the AUTOMATION.MIB for SCALANCE W700 from Siemens Indus- try Automation and Drives Service & Support under the following entry ID 67637278 (https://support.industry.siemens.com/cs/ww/en/view/67637278) Part of the private MIB file "Scalance_w_msps.mib". The file can be downloaded in WBM using "System >...
  • Page 443: Private Mib Variables Of The Scalance W700

    HTTP > MIB" using the "Save" button. The private MIB variables of the SCALANCE W have the following object identifier: iso(1).org(3).dod(6).internet(1).private(4). enterprises(1) siemens(4329) industrialComProducts(20) iComPlatforms(1) simaticNet(1) snMsps(1) snMspsCommon(1) WLAN-specific MIB variables The WLAN-specific MIB variables can be found in "...
  • Page 444 Appendix B B.1 Private MIB variables of the SCALANCE W700 SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 445: Underlying Standards

    Appendix C Underlying standards Standards met by SCALANCE W700 devices completely or partly The following table lists some of the standards for SCALANCE W700 devices. Name of the standard Topic IEEE 802.1AB Link Layer Discovery Protocol (LLDP) IEEE 802.1D-1998 Media Access Control (MAC), bridges IEEE 802.1Q Virtual Bridged LANs (VLAN Tagging, Port Based VLANs) IEEE 802.1W-2004...
  • Page 446 Appendix C C.1 Underlying standards SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...
  • Page 447: Messages In The Event Log

    Appendix D Messages in the event log Messages during system startup (general) Alarm Description Warm start performed, Ver: V02.00.00 - Type of startup and the loaded firmware version. event/status summary after startup Power supply: Status of the power supplies line 1 and line 2. L1 is connected •...
  • Page 448 Appendix D D.1 Messages in the event log Messages WDS Y at WLAN X is down. No link exists on the WDS interface Y of WLAN interface X. Overlap-AP found on WLAN X: AP <System Name> <MAC> A further access point was detected on the channel set for found on channel <channel number.>...
  • Page 449 Appendix D D.1 Messages in the event log Messages Description File upload via TFTP: load of FileType <file type> OK Loading the file using TFTP was successful. A restart is → restart required required. File upload via TFTP: load of FileType <file type> OK Loading the file using TFTP was successful.
  • Page 450 Appendix D D.1 Messages in the event log Messages about MSTP Messages Description You enable or disable the "Spanning Tree" event in "System > Events" Spanning Tree: topology change detected. The topology of the network has changed; the network will be reor- ganized.
  • Page 451 Appendix D D.1 Messages in the event log Alarm Description Startup configuration: Internal storage Invalid or incompatible configuration on the inserted PLUG. PLUG: Configuration not accepted There are functions configured on the device for which a license (KEY- PLUG: License missing PLUG) is required.
  • Page 452: Messages In The Wlan Authentication Log

    Appendix D D.2 Messages in the WLAN Authentication Log Messages in the WLAN Authentication Log Messages in access point mode Alarm Description Client <MAC address> <system name> associated suc- The client has logged in successfully on the access point. cessfully. Client <MAC address>...
  • Page 453: Index

    Index Default routes IPv6 routes, 190 DHCP Client, 217 Access point Overlapping channels, 156 Daylight saving time, 237, 239 Overview, 149 Overview of logged-on clients, 152 WDS list, 154 AeroScout Configuration, 420, 420 E-Mail function, 214 Display configuration, 176 Alarm events, 214 Status code, 176 Line monitoring, 214 Alarm events, 214...
  • Page 454 Index Maximum ratio combining, 29 MIMO, 29 KEY-PLUG, 33 Spatial multiplexing, 29 Formatting, 262 iFeatures iFeatures, 263 iREF, 62 Information ARP table, 125 Groups, 148 Inter AP blocking, 149 Line monitoring, 214 IPv6 Neighbor Table, 126 LLDP, 347 Log tables, 127 Local users, 355 Role, 147 Location, 184...
  • Page 455 Index Logged-on clients, 152 Signal recorder, 305 Overlap APs, 156 SIMATIC NET glossary, 13 Overlapping channels, 156 SMTP WDS partner, 154 Client, 181 SNMP, 69, 99, 181, 225, 229 Groups, 229 Overview, 142 SNMPv1, 69 Packet error statistics, 138 SNMPv2c, 69 Password, 361 SNMPv3, 69 Options, 364...
  • Page 456 Index Undersize, 139 User Groups, 360 Vendor, 124 Vendor ID, 124 VLAN, 55 Port VID, 332 Priority, 332 Tag, 332 WDS, 290 Web Based Management, 87 Requirement, 87 Wireless access, 19 WLAN statistics Bad frames, 167 Received frames, 171 Sent frames, 172 SCALANCE W780/W740 to IEEE 802.11n Web Based Management Configuration Manual, 08/2018, C79000-G8976-C267-13...

Table of Contents