Table Of Contents - Siemens SIMATIC NET SCALANCE S615 Configuration Manual

Industrial ethernet security web based management
Hide thumbs Also See for SIMATIC NET SCALANCE S615:
Table of Contents

Advertisement

Table of contents

Preface .........................................................................................................................................................3
1
Description..................................................................................................................................................13
1.1
Function .................................................................................................................................13
1.2
Configuration examples .........................................................................................................14
1.2.1
TeleControl with SINEMA RC ................................................................................................14
1.2.2
Secure access with S615.......................................................................................................16
1.3
Requirements for operation....................................................................................................16
1.3.1
Use in a PROFINET environment ..........................................................................................17
1.4
System functions....................................................................................................................18
1.5
Configuration limits for WBM and CLI ....................................................................................19
1.6
Configuration limits for SINEMA RC ......................................................................................21
1.7
PLUG .....................................................................................................................................22
1.7.1
C-PLUG and KEY-PLUG .......................................................................................................22
1.7.2
PRESET PLUG ......................................................................................................................23
2
Security recommendation...........................................................................................................................25
3
Technical basics .........................................................................................................................................31
3.1
Structure of an IPv4 address..................................................................................................31
3.2
ICMP ......................................................................................................................................33
3.3
VLAN......................................................................................................................................35
3.3.1
VLAN......................................................................................................................................35
3.3.2
VLAN tagging .........................................................................................................................36
3.4
SNMP.....................................................................................................................................37
3.5
Security functions...................................................................................................................40
3.5.1
User management..................................................................................................................40
3.5.2
Firewall...................................................................................................................................42
3.5.2.1
Firewall...................................................................................................................................42
3.5.3
NAT ........................................................................................................................................45
3.5.4
NAT and firewall.....................................................................................................................46
3.5.5
Certificates .............................................................................................................................49
3.5.6
VPN........................................................................................................................................49
3.5.6.1
IPsec VPN..............................................................................................................................49
3.5.6.2
OpenVPN ...............................................................................................................................53
3.5.6.3
VPN connection establishment ..............................................................................................54
3.6
Redundancy ...........................................................................................................................58
3.6.1
Spanning Tree........................................................................................................................58
3.6.1.1
RSTP......................................................................................................................................59
3.6.2
VRRPv3 .................................................................................................................................59
SCALANCE S615 Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C388-08
7

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents