background image

Configuring with Web Based Management 

 

5.5 "System" menu 

 

SCALANCE W760/W720 to IEEE 802.11n Web Based Management 

126

 

Configuration Manual, 11/2014, C79000-G8976-C350-03 

 

Description 

The table has the following columns: 

 

Type 

Shows the user certificate 

 

Description 

Shows the short description of the user certificate. 

 

Enabled 

Specifies whether the user certificate needs a password. If you enable the settings, 

specify the password in "Password". 

 

Password 

Enter the password for the user certificate. 

 

 

 

Note 
When assigning the password, ASCII code 0x20 to 0x7e is used. 

 

 

Password Confirmation 

Confirm the password. 

 

Status 

Shows whether the current settings for the certificate match the device. 

 

Valid 

The settings are valid. 

 

Invalid 

The settings are invalid. 

Procedure 

1.

 

Select the "Enabled" option. 

2.

 

Enter the password in "Password". 

3.

 

To confirm the password, enter the password again in "Password Confirmation". 

4.

 

Click the "Set Values" button. 

Summary of Contents for SIMATIC NET SCALANCE W721-1

Page 1: ...___________________ ___________________ ___________________ SIMATIC NET Industrial Wireless LAN SCALANCE W760 W720 to IEEE 802 11n Web Based Management Configuration Manual 11 2014 C79000 G8976 C350 03 Introduction 1 Description 2 Technical basics 3 Assignment of an IP address 4 Configuring with Web Based Management 5 Upkeep and maintenance 6 Troubleshooting FAQ 7 Appendix A A Appendix B B Appendi...

Page 2: ...ted only by personnel qualified for the specific task in accordance with the relevant documentation in particular its warning notices and safety instructions Qualified personnel are those who based on their training and experience are capable of identifying risks and avoiding potential hazards when working with these products systems Proper use of Siemens products Note the following WARNING Siemen...

Page 3: ... 3 Technical basics 23 3 1 VLAN 23 3 2 MAC based communication 23 3 3 iPCF iPCF MC 25 3 4 NAT NAPT 27 3 5 SNMP 28 3 6 Spanning Tree 30 3 6 1 RSTP MSTP CIST 31 4 Assignment of an IP address 33 4 1 Structure of an IP address 33 4 2 Initial assignment of an IP address 34 4 3 Address assignment with DHCP 34 4 4 Address assignment with the Primary Setup Tool 35 4 5 Address assignment with STEP 7 36 5 C...

Page 4: ...Log 71 5 4 6 Faults 72 5 4 7 Redundancy 73 5 4 8 Ethernet Statistics 77 5 4 8 1 Interface statistics 77 5 4 8 2 Packet Size 78 5 4 8 3 Packet Type 79 5 4 8 4 Packet Error 80 5 4 9 Learning Table 81 5 4 10 DHCP Server 82 5 4 11 WLAN 84 5 4 11 1 Overview AP 84 5 4 11 2 Client List 86 5 4 11 3 WDS List 87 5 4 11 4 Overlap AP 89 5 4 11 5 Overview Client 90 5 4 11 6 Available AP 92 5 4 11 7 IP Mapping ...

Page 5: ...49 5 5 12 3 DST Configuration 150 5 5 12 4 SNTP Client 154 5 5 12 5 NTP Client 157 5 5 12 6 SIMATIC Time Client 159 5 5 13 Auto Logout 160 5 5 14 Syslog Client 160 5 5 15 Fault Monitoring 162 5 5 15 1 Power Supply 162 5 5 15 2 Link Change 163 5 5 16 PNIO 164 5 5 17 Ping 166 5 6 Interfaces menu 167 5 6 1 Ethernet 167 5 6 1 1 Ports Overview 167 5 6 1 2 Configuration 168 5 6 2 WLAN 170 5 6 2 1 Basic ...

Page 6: ...RADIUS Supplicant 227 5 9 2 5 Keys 228 5 9 3 Management ACL 229 5 10 iFeatures menu 232 5 10 1 iPCF 232 5 10 2 iPCF MC 233 6 Upkeep and maintenance 235 6 1 Firmware update via WBM 235 6 2 Restoring the default parameter settings 236 7 Troubleshooting FAQ 237 7 1 Firmware update via WBM or CLI not possible 237 7 2 Disrupted data transmission due to the received power being too high 238 7 3 Compatib...

Page 7: ...them in a WLAN network The operating instructions for the corresponding device describe how to install and connect up the devices correctly Orientation in the documentation Apart from the Configuration Manual you are currently reading the following documentation is also available from SIMATIC NET on the topic of Industrial Wireless LANs Configuration Manual SCALANCE W760 W720 Command Line Interfac...

Page 8: ... require for your IWLAN application For a flexible combination and installation of the individual IWLAN components both indoors and outdoors a wide ranging selection of compatible coaxial accessories are available The system manual also covers connecting cables as well as a variety of plug in connectors lightning protectors a power splitter and an attenuator SIMATIC NET manuals You will find SIMAT...

Page 9: ...end that you keep yourself informed with respect to our product updates Please find further information and newsletters on this subject at http support automation siemens com To ensure the secure operation of a plant or machine it is also necessary to take suitable preventive action e g cell protection concept and to integrate the automation and drive components into a state of the art holistic in...

Page 10: ... that have the following meaning SIMATIC NET glossary Explanations of many of the specialist terms used in this documentation can be found in the SIMATIC NET glossary You will find the SIMATIC NET glossary here SIMATIC NET Manual Collection or product DVD The DVD ships with certain SIMATIC NET products On the Internet under the following entry ID 50305045 http support automation siemens com WW vie...

Page 11: ...nt mode Standalone configuration with access point This configuration does not require a server and the access point does not have a connection to a wired Ethernet Within its transmission range the access point forwards data from one WLAN node to another The wireless network has a unique name All the devices exchanging data within this network must be configured with this name Figure 2 1 Standalon...

Page 12: ...ork can be connected to a wired network via an access point Span of wireless coverage for the wireless network with several access points The access points are all configured with the same unique SSID network name All nodes that want to communicate over this network must also be configured with this SSID If a mobile station moves from the area covered by one access point to the area covered by ano...

Page 13: ...annot communicate at the same time with the access points in their wireless cells If neighboring access points are set up for different frequencies this leads to a considerable improvement in performance As a result neighboring wireless cells each have their own medium available and the delays resulting from time offset transmission no longer occur The channel spacing should be as large as possibl...

Page 14: ...ts and or between access points and other WDS compliant devices These are used to create a wireless backbone or to connect an individual access point to a network that cannot be connected directly to the cable infrastructure due to its location Two alternative configurations are possible The WDS partner can be configured using the WDS ID or using its MAC address Figure 2 4 Implementation of WDS wi...

Page 15: ...se OpenSSL This is open source code with license conditions BSD Please refer to the current license conditions Since the driver includes encryption software you should also adhere to the appropriate regulations for your specific country Possible applications of the SCALANCE W761 The SCALANCE W761 is equipped with an Ethernet interface and a WLAN interface This makes the device suitable for the fol...

Page 16: ...and 100 Mbps both in full and half duplex Autocrossing Autopolarity Operating the WLAN interface in the frequency bands 2 4 GHz and 5 GHz The WLAN interface is compatible with the standards IEEE 802 11a IEEE 802 11b and IEEE 802 11g In the 802 11a and 802 11g mode the gross transmission rate is up to 54 Mbps IEEE 802 11n High speed WLAN standard wireless LAN and can operate in the 2 4 GHz and in t...

Page 17: ...he WLAN interface Suitable for inclusion of a RADIUS server for authentication Device related and application related monitoring of the wireless connection The interoperability of the devices with Wi Fi devices of other vendors was tested thoroughly Before commissioning the SCALANCE W700 check the wireless conditions on site If you intend to use Industrial Wireless LAN systems and WirelessHART sys...

Page 18: ...net cop per IP20 6GK5721 1FC00 0AA0 6GK5721 1FC00 0AB0 1 1 US variant 2 4 IEEE 802 11n Overview The standard IEEE 802 11n is an expansion of the 802 11 standard and was approved in 2009 Previous standards worked either in the 2 4 GHz frequency band IEEE 802 11g b or in the 5 GHz frequency band IEEE 802 11a IEEE 802 11n can operate in both frequency band In the IEEE 802 11n standard there are mecha...

Page 19: ...ristic signals Here each spatial position is different from the neighboring position By characterizing the individual senders the recipient is capable of separating several signals from each other Maximum ratio combining MRC In a multiple antenna system the wireless signals are received by the individual antennas and combined to form one signal The MRC method is used to combine the wireless signal...

Page 20: ... to group together individual data packets to form a single larger packet this is known as frame aggregation There are two types of frame aggregation Aggregated MAC Protocol Data Unit A MPDU and Aggregated MAC Service Data Unit A MSDU The frame aggregation reduces the packet overheads Frame aggregation can only be used if the individual data packets are intended for the same receiving station clie...

Page 21: ...coding The various combinations are described in modulation and coding schemes 2 5 Requirements for installation and operation Requirements for installation and operation of SCALANCE W700 devices A PG PC with a network connection must be available in order to configure SCALANCE W700 devices If no DHCP server is available a PC on which the Primary Setup Tool PST is installed is necessary for the in...

Page 22: ...Description 2 5 Requirements for installation and operation SCALANCE W760 W720 to IEEE 802 11n Web Based Management 22 Configuration Manual 11 2014 C79000 G8976 C350 03 ...

Page 23: ...s for the VLAN assignment There are various options for the assignment to VLANs Port based VLAN Each port of a device is assigned a VLAN ID You configure port based VLAN in Layer 2 VLAN Page 200 Protocol based VLAN Each port of a device is assigned a protocol group Subnet based VLAN The IP address of the device is assigned a VLAN ID 3 2 MAC based communication Adopt MAC automatically Adopt MAC man...

Page 24: ...e device no longer responds to queries of the Primary Setup Tool when the query is received over the WLAN interface Queries of the PST over the Ethernet interface continue to be replied to Adopt Own MAC If IP based frames need to be sent to a device connected downstream from the client the default setting Own can be retained The client registers with the MAC address of its Ethernet adapter The IP ...

Page 25: ...existing connection to an access point is working problem free This means that if a change to a different access point is necessary this is achieved extremely quickly In contrast to iPCF the handover times for iPCF MC are not dependent on the number of wireless channels being used You configure iPCF MC in iFeatures iPCF MC Page 232 iPCF iPCF MC how it works The access point checks all nodes in the...

Page 26: ...E 802 11n Web Based Management 26 Configuration Manual 11 2014 C79000 G8976 C350 03 Wireless cell of access point 1 Wireless cell of access point 2 Wireless cell of access point 3 Wireless cell of access point 4 Plant Figure 3 1 Configuration example of iPCF MC ...

Page 27: ...ement interface WLAN2 must be operated in the same frequency band and must match in terms of their wireless coverage iPCF MC will not work if the two wireless interfaces are equipped with directional antennas that cover different areas The management interfaces of all access points to which a client can change must use the same channel A client scans only this one channel to find accessible access...

Page 28: ...e the IP protocol When using the ISO protocol that operates at layer 2 it is not possible to use NAT If a client from the global network wants to use a service in the internal network the translation list for the static address assignment needs to be configured You configure the translation list for NAPT in Layer 3 NAT NAPT 3 5 SNMP Introduction With the aid of the Simple Network Management Protoc...

Page 29: ... cannot modify it SNMP data packets are not encrypted and can easily be read by others The central station is also known as the management station An SNMP agent is installed on the devices to be monitored with which the management station exchanges data The management station sends data packets of the following type GET Request for a data record from the agent GETNEXT Calls up the next data record...

Page 30: ...t can be considered as a root element of a tree like network structure With the Bridge Priority parameter you can influence the selection of the root bridge The computer with the lowest value set for this parameter automatically becomes the root bridge If two computers have the same priority value the computer with the lower MAC address becomes the root bridge Response to changes in the network to...

Page 31: ... activated immediately after connection establishment If a spanning tree BPDU is received at an edge port the port loses its role as edge port and it takes part in R STP again If no further BPDU is received after a certain time has elapsed 3 x hello time the port returns to the edge port status Point to point direct communication between two neighboring devices By directly linking the devices a st...

Page 32: ...rotocol Among other things it provides the option of operating several RSTP instances within different VLANs or VLAN groups and for example making paths available within the individual VLANs that the single Rapid Spanning Tree Protocol would globally block Note Default setting HTTP is enabled as default on the device Common and internal Spanning Tree CIST CIST identifies the internal instance used...

Page 33: ...or the host ID the IP address can be assigned to a specific address class Subnet mask The bits of the host ID can be used to create subnets The leading bits represent the address of the subnet and the remaining bits the address of the host in the subnet A subnet is defined by the subnet mask The structure of the subnet mask corresponds to that of an IP address If a 1 is used at a bit position in t...

Page 34: ...n an IP address to an unconfigured device currently without an IP address DHCP default Primary Setup Tool STEP 7 NCM PC Note When the product ships and following Restore Factory Defaults and Restart DHCP is enabled If a DHCP server is available in the local area network and this responds to the DHCP request of a SCALANCE W700 the IP address subnet mask and gateway are assigned automatically when t...

Page 35: ...nt of IP addresses depending on the switch port or the VLAN ID Note DHCP uses a mechanism with which the IP address is assigned for only a short time lease time If the device does not reach the DHCP server with a new request on expiry of the lease time the assigned IP address the subnet mask and the gateway continue to be used The device therefore remains accessible under the last assigned IP addr...

Page 36: ... the unconfigured IWLAN device to the controller the controller assigns the configured device name and the IP address to the IWLAN device automatically STEP 7 V5 x and earlier For further information on the assignment of the IP address using STEP 7 V5 x and earlier refer to the documentation Configuring Hardware and Communication Connections STEP 7 in the section Steps for Configuring a PROFINET I...

Page 37: ...e connection via HTTPS Use HTTPS for protected data transmission If you want to access WBM only via a secure connection under System Configuration enable the option HTTPS Server only Requirements WBM display The device has an IP address There is a connection between the device and the client device With the Windows ping command you can check whether or not a connection exists Access via HTTPS is e...

Page 38: ... as of V7 on iOS as of V7 1 1 iPad mini Model A1432 Chrome as of V32 on Android as of version 4 4 3 Nexus 7C Asus Minimum resolution 960 x 640 pixels Note Display of the WBM and working with it on mobile devices The display on the WBM pages and how you work with them on mobile devices may differ compared with the same pages on desktop devices Some pages also have an optimized display for mobile de...

Page 39: ...76 C350 03 39 Logging on using the Internet browser Selecting the language of the WBM 1 From the drop down list at the top right select the language version of the WBM pages 2 Click the Go button to change to the selected language Note Available languages in this version only English is available Other languages will follow in a later version ...

Page 40: ... standard password user 3 Click the Login button or confirm your entry with Enter When you log in for the first time or following a Restore Factory Defaults and Restart you will be prompted to change the password The new password must be at least 6 characters long You need to repeat the password as confirmation The password entries must match Click the Set Values to complete the action and activat...

Page 41: ...e you have logged in successfully the start page appears 5 3 Wizard menu 5 3 1 Basic Wizard Introduction With the Basic Wizard menus guide you through the configuration of the most important parameters On the Basic Wizard pages you can only configure the parameters important for the basic functionality You make further settings when you have finished with the Basic Wizard Requirement The device is...

Page 42: ...onfiguration and exits the Wizard Navigation within the pages of the Basic Wizard is possible only with the Previous and Next buttons 5 3 1 1 System Settings Introduction On this Basic Wizard page you specify the mode of the device After changing the mode a message is displayed If you confirm the message with OK the device restarts with the factory set configuration settings Log on again and start...

Page 43: ...ored with the exception of the parameters below followed by a restart IP address Subnet mask IP address of the default gateway DHCP client ID DHCP System name System location System contact User names and passwords Mode of the device After restarting the device you will need to log on again and start the Basic wizard again to configure the device Device Mode drop down list Select the mode of the d...

Page 44: ...he data for the specific country the channel division and output power are set by the device according to the country you select Note Locale setting The correct country setting is mandatory for operation complying with the approvals Selecting a country different from the country of use can lead to legal prosecution System Name input box You can enter the name of the device If you configure this bo...

Page 45: ...llowing boxes DHCP Client check box Specify how the IP address will be assigned There are two methods of assigning IP addresses Enabled The device obtains a dynamic IP address from a DHCP Server Disabled You enter the IP settings in the IP Address and Subnet Mask input boxes IP Address input box Enter an IP address that is unique within your network Subnet Mask input box Enter the subnet mask of t...

Page 46: ... Wizard Description The page contains the following boxes Telnet Server check box Enable or disable the Telnet Server service for unencrypted access to the CLI SSH Server check box Enable or disable the SSH Server service for encrypted access to the CLI HTTPS Server only check box Enable or disable access using HTTPS DCP Server drop down list Specify whether or not the device can be accessed with ...

Page 47: ...ossible with SNMP version 3 You can configure other settings in System SNMP General SNMPv1 v2 Read Only check box Enable or disable write access to SNMP variables with SNMPv1 v2c SINEMA Configuration Interface check box If the SINEMA configuration interface is enabled you can download configurations to the device via the TIA Portal 5 3 1 5 Antenna Settings Introduction On this Basic Wizard page yo...

Page 48: ...e length of the flexible antenna connecting cable in meters between the device and the external antenna Additional Attenuation dB Here specify the additional attenuation caused for example by an additional splitter Note If you use other WLAN interfaces make sure that you have adequate channel spacing 5 3 1 6 Radio Settings Introduction On this Basic Wizard page you specify the configuration for th...

Page 49: ...Disabled The device is being operated in indoor mode In indoor mode the selection of country dependent channels and the transmit power for operation in a building are restricted max Tx Power Specify the transmit power of the device It may be necessary to reduce the transmit power depending on the antennas being used to avoid exceeding the maximum legal transmit power Reducing the transmit power ef...

Page 50: ...zard page you specify the configuration for the access point Note This page is available only in access point mode Description of the displayed boxes Table 1 contains the following columns Radio Shows the available WLAN interface Channel Specify the main channel If you want the access point to search for a free channel itself use Auto If you want to use a fixed channel select the required channel ...

Page 51: ...dard The following settings are possible 20 Channel bandwidth 20 MHz 40 up Channel bandwidth 40 MHz The configured channel and the neighboring channel above it are used 40 down Channel bandwidth 40 MHz The configured channel and the neighboring channel below it are used Table 2 contains the following columns Port Shows the VAP interface SSID Enter the SSID The length of the character string for SS...

Page 52: ... are possible Automatic The client automatically adopts the source MAC address of the first frame that it receives over the Ethernet interface Manual If you select Manual enter the MAC address in the MAC Address column Own The client uses the MAC address of the Ethernet interface for the WLAN interface Layer 2 Tunnel The client uses the MAC address of the Ethernet interface for the WLAN interface ...

Page 53: ...ts to connect to the network from the SSID list that has the best transmission quality Table 2 contains the following columns Radio Shows the available WLAN interface SSID Enter the SSID of the access point with which the client connects In the Basic Wizard you can only specify one SSID After completing the Basic Wizard you can define further SSIDs with Interfaces WLAN Client 5 3 1 9 Client Allowe...

Page 54: ...is allowed to establish the connection In the following tables you define the channels on which the client searches for an AP The tables are divided up according to frequency bands If the option is disabled the channels available based on the settings country code antennas transmit power etc are used Above the tables for the frequency bands you will find the following check box Select Deselect all...

Page 55: ...d out and cannot be enabled Note To specify the channels the setting Use Allowed Channels only must be enabled 5 3 1 10 Security Settings Introduction To make the network secure authentication and encryption are used You specify the security levels with the type of authentication and the encryption procedure Note If AUTO or 802 11n or 802 11n only is set for WLAN Mode AUTO only the authentication ...

Page 56: ...cation with RADIUS server You configure the access data on the next Basic Wizard page WPA2 PSK WPA2 authentication with WPA2 key Enter the WPA2 key in WPA 2 Pass Phrase WPA2 RADIUS WPA2 authentication with RADIUS server You configure the access data on the next Basic Wizard page Cipher Select the encryption method AUTO AES or TKIP is used depending on the capability of the other station TKIP Tempo...

Page 57: ... complex for example consisting of random numbers letters upper lowercase have few repetitions and special characters Do not use known names words or terms that could be guessed If a device is lost or if the key becomes known change the key on all devices to maintain security WPA 2 Pass Phrase Confirmation Confirm the entered WPA 2 key 5 3 1 11 Dot1x Supplicant Settings Introduction On this Basic ...

Page 58: ...is combination For password assignment ASCII code 0x20 to 0x7e is used Dot1x User Password Confirmation Enter the password again in this input box 5 3 1 12 Dot1x Radius Server Settings Introduction On this Basic Wizard page you configure the settings for the primary RADIUS Server After completing the Basic Wizard you can configure a backup server and other settings for example the number of logon ...

Page 59: ...tion Enter the password again in this input box 5 3 1 13 Summary of Settings Introduction The settings are summarized on this page The content of the page depends on the set parameters and the mode of the device Check the settings before you exit the Basic Wizard with the Set Values button If settings are incorrect go back using the Previous button and change the settings to the required ones Set ...

Page 60: ... maintenance data such as the order number serial number version number etc You cannot configure anything on this page Description of the displayed values The table has the following rows Manufacturer ID Shows the manufacturer ID Order ID Shows the order number Serial Number Shows the serial number Hardware Revision Shows the hardware version Software Revision Shows the software version Revision C...

Page 61: ...configuration of the device with HW Config of STEP 7 Location Tag Shows the location tag location identifier of the device The location identifier LID is created during configuration of the device with HW Config of STEP 7 5 4 2 Start Page View of the Start page When you enter the IP address of the device the start page is displayed after a successful login You cannot configure anything on this pag...

Page 62: ...ith Web Based Management 5 4 Information menu SCALANCE W760 W720 to IEEE 802 11n Web Based Management 62 Configuration Manual 11 2014 C79000 G8976 C350 03 Navigation area 3 Left hand area Content area 4 Middle area ...

Page 63: ... full title of the currently selected menu item is always displayed Mode Shows whether the device is an access point or a client Printer When you click this button a popup window opens with a view of the page content optimized for the printer Help When you click this button the help page of the currently selected menu item is opened in a new browser window LED simulation Each component of a device...

Page 64: ...Click the individual menus to display the submenus The submenus contain pages on which information is available or with which you can create configurations These pages are always displayed in the content area Content area 4 In the navigation area click a menu to display the pages of the WBM in the content area The following is displayed below the picture of the device PNIO Name of Station PROFINET...

Page 65: ...ower edge The button only becomes active if you change at least one value on the page Click this button to save the configuration data you have entered on the device Once you have saved the button becomes inactive again Note Changing configuration data is possible only with the admin login Create entries with Create Pages in which you can make new entries have a Create button at the lower edge Cli...

Page 66: ...rdware and software of the device You cannot configure anything on this page Description Table 1 has the following columns Hardware Basic Device Shows the basic device WLAN1 Shows the available wireless card Name Shows the name of the device or module Revision Shows the hardware version of the device For the wireless card only one version is then displayed if the WLAN interface is enabled Order ID...

Page 67: ...ded firmware is activated and used Bootloader Shows the version of the boot software stored on the device Firmware_Running Shows the firmware version currently being used on the device Description Shows the short description of the software Version Shows the version number of the software version Date Shows the date on which the software version was created 5 4 4 ARP Table Assignment of MAC addres...

Page 68: ...t device Media Type Shows the type of connection Dynamic The device recognized the address data automatically Static The addresses were entered as static addresses 5 4 5 Log Tables 5 4 5 1 Event Log Logging events The device allows you to log occurring events some of which you can specify on the page of the System Events menu This for example allows you to record when an authentication attempt fai...

Page 69: ...the entries enable or disable all parameters 6 Info Informative 4 Warning Warnings 2 Critical Critical The table has the following columns Restart Counts the number of restarts since you last reset to factory settings and shows the device restart after which the corresponding event occurred System Up Time Shows the time the device has been running since the last restart when the described event oc...

Page 70: ... you have restored the device to the factory settings and restarted the device Note The number of entries in this table is restricted to 400 When this number is reached the oldest entries are overwritten The table remains permanently in memory Show all button Click this button to display all the entries on the WBM page Note that displaying all messages can take some time The button only becomes ac...

Page 71: ... the device has been running since the last restart when the described fault occurred System Time Shows the time at which the described error occurred Log Message Displays a brief description of the event that has occurred You will find the list of possible messages in Appendix D of the configuration manual If the system time is set the time is also displayed at which the event occurred Descriptio...

Page 72: ... From the drop down list select the page you want to go to 5 4 6 Faults Error status This page displays any errors that occur Errors of the Cold Warm Start event can be deleted following confirmation If there are no more unanswered error fault messages the fault LED goes off The time calculation always begins after the last system start When the system is restarted a new entry with the type of res...

Page 73: ...ce Clear Fault State To delete errors of the Cold Warm Start event click the Clear Fault State button 5 4 7 Redundancy Introduction The page shows the current information about the Spanning Tree and the settings of the root bridge If Spanning Tree is turned off only the basic information about this device is displayed If Spanning Tree is turned on the information about the status of the instance s...

Page 74: ... The bridge with the highest priority in other words with the lowest value for this parameter becomes the root bridge If several devices in a network have the same priority the device whose MAC address has the lowest numeric value will become the root bridge Both parameters bridge priority and MAC address together form the bridge identifier Since the root bridge manages all path changes it should ...

Page 75: ...the spanning tree Designated The ports leading away from the root bridge Alternate The port with an alternative route to a network segment Backup If a switch has several ports to the same network segment the poorer Port becomes the backup port Root The port that provides the best route to the root bridge Master This port points to a root bridge located outside the MST region State Displays the cur...

Page 76: ...est port number is selected If the value in the Cost Calc box is 0 the automatically calculated value is displayed Otherwise the value of the Cost Calc box is displayed The calculation of the path costs is largely based on the transmission speed The higher the achievable transmission speed is the lower the value of the path costs Typical values for path costs with rapid spanning tree 10 000 Mbps 2...

Page 77: ...ase MIB Figure 5 1 Interface statistics Displayed values The table has the following columns In Octet Shows the number of received bytes Out Octet Shows the number of sent bytes In Unicast Shows the number of received unicast frames In Non Unicast Shows the number of received frames that are not of the type unicast Out Unicast Shows the number of sent unicast frames Out Non Unicast Shows the numbe...

Page 78: ...igure anything on this page Description The table has the following columns Port Shows the available ports Frame lengths The other columns after the port number contain the absolute numbers of incoming frames according to their frame length The following frame lengths are distinguished 64 bytes 65 127 bytes 128 255 bytes 256 511 bytes 512 1023 bytes 1024 max Description of the button Reset Counter...

Page 79: ...lticast and Broadcast were received at each port You cannot configure anything on this page Description The table has the following columns Port Shows the available ports Unicast Multicast Broadcast The other columns after the port number contain the absolute numbers of the incoming frames according to their frame type Unicast Multicast and Broadcast Description of the button Reset Counter button ...

Page 80: ...ror types The other columns after the port number contain the absolute numbers of the incoming frames according to their error type In the columns of the table a distinction is made according to the following error types CRC Packets whose content does not match the CRC checksum Undersize Packets with a length less than 64 bytes Oversize Packets discarded because they were too long Fragments Packet...

Page 81: ...set all counters The counters are also reset by a restart on the device 5 4 9 Learning Table Address filtering This WBM page shows the current content of the learning table This table lists the source addresses of unicast address frames Description This table contains the following columns VLAN ID Shows the VLAN ID of the node Note This column appears in the table only if a VLAN is configured MAC ...

Page 82: ...the node with the specified address can be reached Frames received by the device whose destination address matches this address will be forwarded to this port Button Show all Click this button to display all the entries on the WBM page Note that displaying all messages can take some time Next button Click this button to go to the next page Prev button Click this button to go to the previous page D...

Page 83: ...hows the MAC address of the DHCP client Allocation Method Shows whether the IPv4 address was assigned statically or dynamically You configure the static entries in System DHCP Static Leases Binding State Shows the status of the assignment assigned The assignment is used not assigned The assignment is not used probing The assignment is being checked unknown The status of the assignment is unknown E...

Page 84: ...on standard 802 11h is not shown additionally but only the configured transmission standard 802 11a Configured Channel Shows the configured channel If Auto is displayed the access point searches for a free channel itself Alternative DFS Channel If the DFS function is enabled the configured alternative channel of the access point is displayed If Auto is displayed the access point searches for an al...

Page 85: ...and 2 4 GHz If the access point detects another access point on the configured channel or on neighboring channels the access point changes the channel bandwidth from 40 MHz to 20 MHz If you set a free channel on the access point the access point uses the channel bandwidth 40 MHz iFeatures Shows which iFeatures are used iFeatures are not used iPCF Status Shows the status of the WLAN interface enabl...

Page 86: ...t Logged on clients The page the clients logged on with the access point as well as additional information for example status signal strength MAC address Note This tab is available only in access point mode Description Associated stations Shows the number of clients logged on to the access point The table has the following columns AID Associated ID Shows the connection ID of the client If the clie...

Page 87: ...rypted WEP AES is displayed for both authentication methods WLAN Mode Shows the transmission standard If DFS is activated the transmission standard 802 11h is not shown additionally but only the configured transmission standard 802 11a Max Data Rate Mbps Shows the maximum data transmission speed in megabits per second State Shows the current status of the connection for example Connected means tha...

Page 88: ...e name of the WDS partner Channel Shows the channel over which the access point communicates with the WDS partner Signal Strength dBm Shows the signal strength of the connected access point in bBm Signal Strength Shows the signal strength of the connected access point as a percentage Security Shows which authentication method is used If the authentication method Open System Encryption or Shared Ke...

Page 89: ...should therefore make sure that there is adequate channel spacing to neighboring access points This page shows all access points that are visible on the set or adjacent channels at 2 4 GHz If entries exist here the maximum data throughput of the access point and the availability of the communication link to the access point is potentially impaired Description Table 1 has the following columns Radi...

Page 90: ... point Signal Strength dBm Shows the signal strength of the client in dBm Signal Strength Shows the signal strength of the client as a percentage Age s Shows the time that has elapsed since the last access point activity Security Shows which authentication method is used If the authentication method Open System Encryption or Shared Key is used Encrypted WEP AES is displayed for both authentication...

Page 91: ... of the client Up to 4 MAC addresses can be used MAC Address Displays the MAC address of the WLAN interface Operative Channel Shows the channel of the access point with which the client is connected HT Channel Width MHz Shows the channel bandwidth 20 Channel bandwidth 20 MHz 40 up Channel bandwidth 40 MHz The configured channel and the neighboring channel above it are used 40 down Channel bandwidt...

Page 92: ...ion rate of the interface Status Shows the status of the WLAN interface enabled The WLAN interface is enabled disabled The WLAN interface is disabled 5 4 11 6 Available AP Available access points Note This page is only available for clients or access points in client mode This page shows all the access points visible to the client The list also includes the access points to which the client cannot...

Page 93: ...nel on which the access point transmits or communicates Signal Strength dBm Shows the signal strength of the access point in dBm Signal Strength Shows the signal strength of the access point as a percentage Type Shows the mode of the WLAN interface Security Shows which authentication method is used If the authentication method Open System Encryption or Shared Key is used Encrypted WEP AES is displ...

Page 94: ...ss level ISO OSI layer 2 can be established with one component whose MAC address is configured on the client be established with a maximum of eight components if the Layer 2 Tunnel function is selected The Layer 2 Tunnel setting meets the requirements of industrial applications in which MAC address based communication takes place with several devices downstream from the client Clients with this se...

Page 95: ...in the direction from the client to the access point always have the MAC address of the WLAN interface as the source MAC address As a result the ARP tables at the access point end always contain only the MAC address of the WLAN interface of the clients If there are several devices downstream from the client the Auto find Adopt MAC function should not be enabled In this case the MAC address would b...

Page 96: ...rs table has the following columns Interface Shows the WLAN interface to which the entries apply Error types The other columns after the WLAN interface contain the absolute numbers of the frames sent according to their error type The columns of the table distinguish the following error types Transmission Errors Shows the number of bad frames that were sent Dropped Frames Shows the number of frames...

Page 97: ...umns after the WLAN interface contain the absolute numbers of the frames received according to their error type The columns of the table distinguish the following error types Received Errors Shows the number of bad frames that were received Duplicate Frames Shows the number of frames that were received twice Decryption Errors Shows the number of bad encrypted frames FCS Errors Shows the number of ...

Page 98: ...20 to IEEE 802 11n Web Based Management 98 Configuration Manual 11 2014 C79000 G8976 C350 03 5 4 12 2 Management Sent The WBM page shows how many frames in response to logging on or logging off were counted per VAP interface Note This tab is available only in access point mode ...

Page 99: ...esting association frames relevant for a logon Association Responses Shows the number of responding association frames relevant for a logon Disassociation Request Shows the number of requesting disassociation frames relevant for a logoff Authentication Request Shows the number of requesting authentication frames relevant for a logon Authentication Responses Shows the number of responding authentic...

Page 100: ...to IEEE 802 11n Web Based Management 100 Configuration Manual 11 2014 C79000 G8976 C350 03 5 4 12 3 Management Received The WBM page shows how many frames in response to logging on or logging off were counted per VAP interface Note This tab is available only in access point mode ...

Page 101: ...esting association frames relevant for a logon Association Responses Shows the number of responding association frames relevant for a logon Disassociation Request Shows the number of requesting disassociation frames relevant for a logoff Authentication Request Shows the number of requesting authentication frames relevant for a logon Authentication Responses Shows the number of responding authentic...

Page 102: ...ed Management 5 4 Information menu SCALANCE W760 W720 to IEEE 802 11n Web Based Management 102 Configuration Manual 11 2014 C79000 G8976 C350 03 5 4 12 4 Data Sent The WBM page shows how many frames were sent per VAP interface ...

Page 103: ...ns after the VAP interface contain the absolute numbers of the sent frames according to the frame types In the columns of the table a distinction is made according to the following frame types Data Frames Shows the number of sent data frames Multicast Broadcast Frames Shows the number of sent multicast and broadcast frames Unicast Frames Shows the number of sent unicast frames Average Rate Shows a...

Page 104: ...anagement 5 4 Information menu SCALANCE W760 W720 to IEEE 802 11n Web Based Management 104 Configuration Manual 11 2014 C79000 G8976 C350 03 5 4 12 5 Data Received The WBM page shows how many frames were received per VAP interface ...

Page 105: ...ter the VAP interface contain the absolute numbers of the received frames according to the frame types In the columns of the table a distinction is made according to the following frame types Data Frames Number of received data frames Multicast Broadcast Frames Shows the number of received multicast and broadcast frames Unicast Frames Shows the number of received unicast frames Average Rate Shows ...

Page 106: ...ess options of the device Specify the services that access the device With some services there are further configuration pages on which more detailed settings can be made Description The page contains the following boxes Telnet Server check box Enable or disable the Telnet Server service for unencrypted access to the CLI SSH Server check box Enable or disable the SSH Server service for encrypted a...

Page 107: ...ng from the drop down list The following settings are possible Manual The system time is set manually You can configure other settings in System Time Manual Setting SIMATIC Time The system time is set using a SIMATIC time transmitter You can configure other settings in System System Time SIMATIC Time Client SNTP Client The system time is set via an SNTP server You can configure other settings in S...

Page 108: ...e Automatic save mode Approximately 1 minute after the last parameter change or when you restart the device the configuration is automatically saved Trial Trial mode In Trial mode although changes are adopted they are not saved in the configuration file startup configuration To save changes in the configuration file use the Write Startup Config button The Write Startup Config button is displayed w...

Page 109: ...em Time Shows the current system time The system time is either set by the user or by a time of day frame either SINEC H1 time of day frame NTP or SNTP readonly System Up Time Shows the running time of the device since the last restart readonly Device Type Shows the type of the device readonly System Name input box You can enter the name of the device The entered name is displayed in the selection...

Page 110: ...ct person responsible for the device in the System Contact input box 2 Enter the identifier for the location at which the device is installed in the System Location input box 3 Enter the name of the device in the System Name input box 4 Click the Set Values button 5 5 2 2 Coordinates Information on geographic coordinates In the Geographic Coordinates window you can enter information on the geograp...

Page 111: ...ric information 49 1 31 67 N Longitude input box Geographical longitude Here you enter the value of the eastern or western longitude of the location of the device The value 8 20 58 73 means that the device is located at 8 degrees 20 minutes and 58 73 seconds east A western longitude is indicated by a preceding minus sign You can also add the letter E easterly longitude or W westerly longitude to t...

Page 112: ...in the IP Address and Subnet Mask input boxes Dynamic DHCP The device obtains a dynamic IP address from a DHCP server IP Address input box Enter the IP address of the device After clicking the Set Values button this IP address is also displayed in the address bar of the Web browser If this does not take place automatically you will need to enter the IP address in the address bar of the Web browser...

Page 113: ...ing the Agent VLAN ID If the configuration PC is connected directly to the device via Ethernet and you change the Agent VLAN ID the device is no longer reachable via Ethernet following the change MAC Address Shows the MAC address of the device The MAC address is linked to the hardware and cannot be modified Procedure 1 In the input boxes enter the IP address subnet mask and the default gateway 2 S...

Page 114: ...supported Description The page contains the following boxes DNS Client check box If the check box is enabled the DNS client function is enabled Used DNS Server drop down list Here you specify which DNS server the device uses public only The device uses only the DNS servers assigned by DHCP manual only The device uses only the manually configured DNS servers The DNS servers must be connected to the...

Page 115: ... enter the IP address of a DNS server here After clicking the Create button an entry is generated in the table of DNS servers The table for the DNS servers with the following columns Select Select a check box in this column and click the Delete button to delete an entry in the list Name Server Address The IP address of the DNS server Origin This shows whether the DNS server was configured manually...

Page 116: ...following points about restarting a device You can only restart the device with administrator privileges A device should only be restarted with the buttons of this menu or with the appropriate CLI commands and not by a power cycle on the device Any modifications you have made only become active on the device after clicking the Set Values button on the relevant WBM page If the device is in Trial Mo...

Page 117: ...efaults and Restart button Click this button to restore the factory configuration settings with the exception of the following parameters and to restart IP addresses Subnet mask IP address of the default gateway DHCP client ID DHCP System name System location System contact User names and passwords Mode of the device Restore Factory Defaults and Restart button Click this button to restore the fact...

Page 118: ...setting Check the parameters again before you confirm the changes with the Commit Changes button Description The page contains the following boxes Drop down list Commit Mode Select the required setting from the drop down list Automatic Commit Each change in the WLAN settings is adopted and is immediately effective when you click the Set Values button With its default setting the device is set to A...

Page 119: ... from the event log table X MIB Private MSPS MIB file Scalance_w_msps mib X Script CLI script file X StartupInfo Startup log file X Users File with user names and passwords X X WLANAuthlo g File with entries from the WLAN Authentication Log information on successful or failed authentication attempts X WLANCert in client mode only User certificate You can specify a password for the user certificate...

Page 120: ...ble X MIB Private MSPS MIB file Scalance_w_msps mib X Script CLI script file X StartupInfo Startup log file X Users File with user names and passwords X X WLANAuthlog File with entries from the WLAN Authentication Log information on successful or failed authentication attempts X WLANCert in client mode only User certificate You can specify a password for the user certificate on the WBM page Load S...

Page 121: ... Note Incompatibility with predecessor versions During the installation of a previous version the configuration data and log files can be lost In this case the device starts up with the factory settings after the firmware has been installed Note Configuration files and trial mode Automatic Save mode In Automatic Save mode the data is saved automatically before the configuration files ConfigPack an...

Page 122: ...ete the cache of the Web browser Procedure Loading files using HTTP 1 Start the load function by clicking the one of the Load buttons The dialog for loading a file opens 2 Go to the file you want to load 3 Click the Open button in the dialog The file is now loaded Whether or not a restart is necessary depends on the loaded file If a restart is necessary a message to this effect will be output Othe...

Page 123: ...nd saving data via a TFTP server On this page you can configure the TFTP server and the file names The WBM also allows you to store device data in an external file on your client PC or to load such data from an external file from the PC to the devices This means for example that you can also load new firmware from a file located on your client PC Note Incompatibility with predecessor versions Duri...

Page 124: ...ich data exchange will be handled If necessary you can change the default value 69 to your own requirements The table has the following columns Type Shows the file type Description Shows the short description of the file type Input box Filename Enter a file name Drop down list Actions Select the action from the drop down list The selection depends on the selected file type for example the log file...

Page 125: ...rt the device The changes only take effect a restart Reusing configuration data If several devices are to receive the same configuration and the IP addresses are assigned using DHCP the effort for configuration can be reduced by saving and reading in the configuration data Follow the steps below to reuse configuration data 1 Save the configuration data of a configured device on your PC 2 Download ...

Page 126: ... needs a password If you enable the settings specify the password in Password Password Enter the password for the user certificate Note When assigning the password ASCII code 0x20 to 0x7e is used Password Confirmation Confirm the password Status Shows whether the current settings for the certificate match the device Valid The settings are valid Invalid The settings are invalid Procedure 1 Select t...

Page 127: ...s To enable or disable the options click the relevant check boxes of the columns Description With Table 1 you can enable or disable all check boxes of a column of Table 2 at once Table 1 has the following columns All Events Shows that the settings are valid for all events of table 2 E Mail Trap Log Table Syslog Fault Enable or disable the required type of notification for all events If No Change i...

Page 128: ...naling contact or the power supply monitoring Overlap AP Detection Only in access point mode This event is triggered when there is an entry in the overlap AP list WDS Only in access point mode The connection status of a WDS link has changed DFS Only in access point mode This event occurs if a radar signal was received or the DFS scan was started or stopped WLAN General Only in access point mode Th...

Page 129: ...Procedure Follow the steps below to change entries 1 Select the check box in the row of the required event Select the event in the column under the following actions E mail Trap Log table Syslog Fault 2 Click the Set Values button 5 5 8 2 Severity Setting the severity filter On this page set the threshold levels for sending system event notifications The first table column shows the client type fo...

Page 130: ... drop down lists of the second table column after the client types 2 Click the Set Values button 5 5 9 SMTP Client Network monitoring with e mails The device provides the option of automatically sending an e mail if an alarm event occurs for example to the network administrator The e mail contains the identification of the sending device a description of the cause of the alarm in plain language an...

Page 131: ...es to all configured SMTP servers Send Test Mail Send a test e mail to check your configuration SMTP Port Enter the port via which your SMTP server can be reached Factory settings 25 This setting applies to all configured SMTP servers SMTP Server IP Address Enter the IP address or the FQDN name of the SMTP server This table contains the following columns Select Enable the check box in a row to be ...

Page 132: ...a fault occurs 5 Click the Set Values button Note Depending on the properties and configuration of the SMTP server it may be necessary to adapt the Sender Email Address box for the e mails Check with the administrator of the SMTP server See also Address assignment with DHCP Page 34 5 5 10 DHCP 5 5 10 1 DHCP Client Setting the DHCP mode If the DHCP mode is activated the DHCP client starts a DHCP re...

Page 133: ...n via PNIO Name of Station Identification is based on the PNIO name of the station The table has the following columns Interface Interface to which the setting relates DHCP Enable or disable the DHCP client for the relevant interface Procedure Follow the steps below to configure the IP address using the DHCP client ID 1 Enable the DHCP Client option 2 Select the DHCP mode via DHCP Client ID from t...

Page 134: ...omatically to the connected devices The IPv4 addresses are either distributed dynamically from an address band you have specified or a specific IPv4 address static can be assigned to a particular device On this page specify the IPv4 address band from which the DHCP client receives any IPv4 address You configure the static assignment of the IPv4 addresses in Static Leases Requirements for the DHCP ...

Page 135: ... disabled as default there may be conflicts with the IPv4 addresses To avoid this assign these devices an IPv4 address outside the IPv4 address band The table has the following columns Select Select the check box in the row to be deleted Pool ID Shows the number of the IPv4 address band If you click the Create button a new row with a unique number Pool ID is created Note Only one Pool ID ID 1 can ...

Page 136: ...e within the network address range you configured for Subnet Lease Time sec Specify for how many seconds the assigned IPv4 address remains valid Once this period has elapsed the device must either request a new IPv4 address or extend the lease time of the existing IPv4 address 5 5 10 3 DHCP Options Note This tab is available only on the client SCALANCE W722 1 RJ 45 On this page you specify which D...

Page 137: ...ions not supported The DHCP options 50 60 and 255 are not supported The table has the following columns Select Select the check box in the row to be deleted Pool ID Shows the number of the IPv4 address band Option Code Shows the number of the DHCP option Use Interface IP Specify whether or not the internal IPv4 address of the device will be used Value Enter the DHCP parameter that is transferred t...

Page 138: ...the following boxes Pool ID drop down list Select the required IPv4 address band Hardware Type drop down list Ethernet MAC Identification is based on the MAC address Enter the MAC address in Value A MAC address consists of six byes separated by hyphens in hexadecimal notation e g 00 ab 1d df b4 1d Value input box Enter the MAC address and click the Create button to create the entry A maximum of 20...

Page 139: ...that the IPv4 address depends on the MAC address Value Shows the MAC address to which the IPv4 address is assigned IP Address Specify the IPv4 address The IPv4 address must match the subnet of the IPv4 address band 5 5 11 SNMP 5 5 11 1 General Configuration of SNMP On this page you make the basic settings for SNMP Enable the check boxes according to the function you want to use ...

Page 140: ... Read Write Community String input box Enter the community string for read and write access of the SNMP protocol SNMPv1 v2c Read Community String input box Enter the community string for access of the SNMP protocol SNMPv1 Traps check box Enable or disable the sending of traps alarm frames On the Trap tab specify the IP addresses of the devices to which SNMP traps will be sent SNMPv1 v2c Trap Commu...

Page 141: ...ed in the Events menu occur Note Traps are sent only when the SNMPv1 Traps option was selected in the General or System Confguration tab Description IP Address Enter the IP address or the FQDN name of the station to which the device sends SNMP traps You can specify up to ten different recipients servers The table has the following columns Select Select the row you want to delete IP Address If nece...

Page 142: ...tton to create a new trap entry 3 Select the check box in the required row Trap 4 Click the Set Values button Deleting a trap entry 1 Enable Select in the row to be deleted 2 Click the Delete button The entry is deleted 5 5 11 3 v3 Groups Security settings and assigning permissions SNMP version 3 allows permissions to be assigned authentication and encryption at protocol level The security levels ...

Page 143: ...ncryption enabled Auth Priv Authentication enabled encryption enabled The table has the following columns Select Select the row you want to delete Group Name Shows the defined group names Security Level Shows the configured security level Read Enable or disable read access for the required group Write Enable or disable wite access for the required group Note For write access to work you also need ...

Page 144: ...te rights for the group in Write 6 Click the Set Values button Modifying a group 1 Specify the required read rights for the group in Read 2 Specify the required write rights for the group in Write 3 Click the Set Values button Note Once a group name and the security level have been specified they can no longer be modified after the group is created If you want to change the group name or the secur...

Page 145: ...ery frame This user name and the applicable security settings are checked by both the sender and recipient Description The page contains the following boxes User Name Enter a freely selectable user name After you have entered the data you can no longer modify the name The table has the following columns Select Select the row you want to delete User Name Shows the created users Group Name Select th...

Page 146: ...ned to an SNMPv3 group If the user is not assigned to an SNMPv3 group no automatic saving is triggered and the configured user disappears again after restarting the device Yes The user is assigned to an SNMPv3 group No The user is not assigned to an SNMPv3 group Procedure Create a new user 1 Enter the name of the new user in the User Name input box 2 Click the Create button A new entry is generate...

Page 147: ...on the delete action is canceled The data of the selected rows is retained The selections are removed If you want to repeat the action you will need to reselect the data records to be deleted 5 5 12 System Time There are different methods that can be used to set the system time of the device Only one method can be active at any one time If one method is activated the previously activated method is...

Page 148: ...settings the time is set to the value 01 01 2000 00 00 00 Use PC Time Click the button to use the time setting of the PC Last Synchronization Time This box is read only and shows when the last time of day synchronization took place If no time of day synchronization was possible the box displays Date time not set Last Synchronization Mechanism This box displays how the last time of day synchronizat...

Page 149: ...ime are adopted and Manual is entered in the Last Synchronization Mechanism box 5 5 12 2 DST Overview On this page you can create new entries for the daylight saving time changeover The table provides an overview of the existing entries Settings Figure 5 2 DST Overview Select Select the row you want to delete DST No Shows the number of the entry If you create a new entry a new line with a unique n...

Page 150: ...aving or standard time the system time for the local time zone is correctly set You can define a rule for the daylight saving time changeover or specify a fixed date Settings Note The content of this page depends on the selection in the Type box The boxes DST No Type and Name are always displayed DST No Select the type of the entry Type Select how the daylight saving time changeover is made Date Y...

Page 151: ...ion Date You can set a fixed date for the start and end of daylight saving time Year Enter the year for the daylight saving time changeover Start Date Enter the following values for the start of daylight saving time Day Specify the day Hour Specify the hour Month Specify the month End Date Enter the following values for the end of daylight saving time Day Specify the day Hour Specify the hour Mont...

Page 152: ...Web Based Management 5 5 System menu SCALANCE W760 W720 to IEEE 802 11n Web Based Management 152 Configuration Manual 11 2014 C79000 G8976 C350 03 Settings with Recurring selected Figure 5 4 DST Configuration Recurring ...

Page 153: ... the following values for the start of daylight saving time Hour Specify the hour Month Specify the month Week Specify the week You can select the 1st to 5th or the last week of the month Weekday Specify the weekday End Date Enter the following values for the end of daylight saving time Hour Specify the hour Month Specify the month Week Specify the week You can select the 1st to 5th or the last we...

Page 154: ...ime Protocol is used for synchronizing the time in the network The appropriate frames are sent by an SNTP server in the network Description The page contains the following boxes SNTP Client Enable or disable automatic time of day synchronization using SNTP Current System Time Shows the values currently set in the system for date and time Last Synchronization Time This box is read only and shows wh...

Page 155: ... the format HH MM The time zone relates to UTC standard world time Settings for daylight saving and standard time are taken into account in this box by specifying the time offset SNTP Mode Select the synchronization mode from the drop down list The following types of synchronization are possible Poll If you select this protocol type the input boxes SNTP Server IP Address SNTP Server Port and Poll ...

Page 156: ...the following options from the SNTP Mode drop down list Poll For this mode you need to configure the following time zone difference step 2 time server step 4 Port step 5 query interval step 6 complete the configuration with step 7 Listen For this mode you need to configure the following time difference to the time sent by the server step 2 complete the configuration with step 7 4 In the SNTP Serve...

Page 157: ...able automatic time of day synchronization with NTP Current System Time This box displays the current system time Last Synchronization Time This box is read only and shows when the last time of day synchronization took place Last Synchronization Mechanism This box displays how the last time of day synchronization was performed The following methods are possible Not set The system time was not set ...

Page 158: ...e Settings for daylight saving and standard time are taken into account in this box by specifying the time offset NTP Server IP Address Enter the IP address or the FQDN name of the NTP server NTP Server Port Enter the port of the NTP server The following ports are possible 123 standard port 1025 to 36564 Poll Interval s Here enter the interval between two time queries In this box you enter the que...

Page 159: ...system time Last Synchronization Time This box is read only and shows when the last time of day synchronization took place Last Synchronization Mechanism This box displays how the last time of day synchronization was performed The following methods are possible Not set The system time was not set Manual Manual time setting SNTP Automatic time of day synchronization with SNTP NTP Automatic time of ...

Page 160: ...e 1 Enter a value of 60 3600 seconds in the Web Based Management s input box If you enter the value 0 the automatic logout is disabled 2 Enter a value of 60 600 seconds in the CLI TELNET SSH s input box If you enter the value 0 the automatic logout is disabled 3 Click the Set Values button 5 5 14 Syslog Client System event agent Syslog according to RFC 3164 is used for transferring short unencrypt...

Page 161: ...me of the Syslog server is entered on the device Description The page contains the following boxes Syslog Client Enable or disable the Syslog function Server IP Address Enter the IP address or the FQDN name of the Syslog server This table contains the following columns Select Select the row you want to delete Server Address Shows the IP address or the FQDN name of the Syslog server Server Port Ent...

Page 162: ...ntry 2 Create a new entry Deleting an entry 1 Select the check box in the row to be deleted 2 Click the Delete button All selected entries are deleted and the display is refreshed 5 5 15 Fault Monitoring 5 5 15 1 Power Supply Settings for monitoring the power supply Configure whether or not the power supply should be monitored by the messaging system A fault is then signaled by the message system ...

Page 163: ...an error is signaled when there should be a link on a port and this is missing or when there should not be a link on a port and a link is detected A fault causes the signaling contact to trigger and the fault LED on the device to light up and depending on the configuration can trigger a trap an e mail or an entry in the event log table Description The table has the following columns Port Shows the...

Page 164: ...ed boxes The page contains the following boxes PNIO AR Status This box shows the status of the PROFINET IO connection in other words whether the device is connected to a PROFINET IO controller Online or Offline Here online means that a connection to a PROFINET IO controller exists that this has downloaded its configuration data to the device and that the device can send status data to the PROFINET...

Page 165: ...C SCALANCE W734 1 RJ 45 SCALANCE W700 and STEP 7 The Ethernet interface can be configured in STEP 7 if the following requirements are met STEP 7 V13 Update 3 with HSP0107 or STEP7 version 5 5 4 with GSDML version 2 31 The diagnostics functions can also be used The WLAN interface cannot be configured with STEP 7 PNIO for client devices If a client is to be used as a PNIO device the MAC address of t...

Page 166: ...ith the ping function you can check whether a certain IP address is reachable in the network Description The table has the following columns IP Address input box Enter the IP address of the device Repeat input box Enter the number of ping requests Ping button Click this button to start the ping function Ping Output This box shows the output of the ping function Clear button Click this button to em...

Page 167: ... following columns Port Shows the configurable ports If you click on the link the corresponding configuration page is opened Port Name Shows the name of the port Status Shows whether the port is on or off Data traffic is possible only over an enabled port Link Shows the connection status to the network With the connection status the following is possible Up The port has a valid link to the network...

Page 168: ...Ethernet port of the device Description The table has the following rows Port drop down list Select the port to be configured from the drop down list Status drop down list Specify whether the port is enabled or disabled enabled The port is enabled Data traffic is possible only over an enabled port disabled The port is disabled Input box Port Name Here enter a name for the port MAC Address Shows th...

Page 169: ...alid link to the network a link integrity signal is being received Down The link is down for example because the connected device is turned off Changing the port configuration Click the appropriate box to change the configuration Note With various automatic functions the device prevents or reduces the effect on other ports and priority classes Class of Service if a port is overloaded This can mean...

Page 170: ... 2014 C79000 G8976 C350 03 5 6 2 WLAN 5 6 2 1 Basic Basic settings On this page you make several basic settings for the device for example the country setting and mode Note To configure the WLAN interface you must always specify the Country Code first Some parameters are dependent on the country setting for example the transmission standard ...

Page 171: ...de of the device This selection is available only for access points The following operating modes are possible AP Access point mode Client Client mode Note After changing the mode a message is displayed If you confirm the message with OK the device restarts in the changed mode with the factory set configuration settings If you have restarted the device after changing the mode you will need to log ...

Page 172: ...there is a high data throughput WLAN Mode Select the required transmission standard for the configured frequency band WLAN Mode 2 4 GHz Specify the transmission standard for the 2 4 GHz frequency band The selection depends on the country setting WLAN Mode 5 GHz Specify the transmission standard for the 5 GHz frequency band The selection depends on the country setting DFS 802 11h Enables or disable...

Page 173: ...th interfaces of access points with two WLAN interfaces are operated in the same frequency range this may cause wireless interference on one or both interfaces at a transmit power higher than 15 dBm Tx Power Check Indicates whether the settings that have been made will violate the permitted transmit power restrictions of the selected country The following parameters influence this calculation max ...

Page 174: ...s broadcast unicast and multicast packets directly after each beacon recommended setting for normal network environments If you entered a 5 in this field this would mean that the access point collects the packets and sends them after every fifth beacon Increasing this value allows a longer sleep mode for the clients but means a greater delay for packets RTS CTS Threshold Bytes RTS CTS Request To S...

Page 175: ...is deleted Force roaming on link down Only in access point mode If the wired Ethernet interface is no longer available cable break connector removed a client connected over the wireless network is not aware of this The access point can force the logged on clients to roam by deactivating its WLAN interface The client then attempts to log on at a different access point You enable this feature by sel...

Page 176: ...xternal antenna Note Transmission disruptions without an antenna connected The antenna R1A1 must be always be connected as soon as the associated WLAN Interface is turned on If no antenna is connected the relevant interface must also be disabled for Rx and Tx Otherwise there may be transmission disruptions Description of the displayed boxes The table has the following columns Connector Shows the n...

Page 177: ... the length of the flexible antenna connecting cable in meters between the device and the external antenna Additional Attenuation dB Here specify the additional attenuation caused for example by an additional splitter or a long antenna cable Antenna Mode For the antenna connector R1 A1 the entry Rx Tx transmit and receive cannot be changed Steps in configuration To configure one or more antennas f...

Page 178: ...munication Description Table 1 contains the following columns Radio Shows the available WLAN interfaces in this column Use Allowed Channels only If you enable the option you restrict the selection of channels via which the AP or the client is allowed to establish the connection In the following tables you define the channels that the AP can use to establish a wireless cell when the Auto channel se...

Page 179: ...ect the appropriate check box for the channel number The table displays the permitted channels of the country Only the valid channels can be enabled Invalid channels are grayed out and cannot be enabled Note To specify the channels the setting Use Allowed Channels only must be enabled Procedure 1 Enable the Used Allowed Channels only option for the required WLAN interface 2 Deselect the Select Des...

Page 180: ... data packet Range of values 1024 65535 bytes Guard Interval ns Only in access point mode Select the send pause that must be kept to between two transmitted OFDM symbols The following settings are possible The selection depends on the selected transmission standard 400 short The send pause is 400 ns 800 long The send pause is 800 ns Procedure Configure 802 11n settings on the access point 1 Enable...

Page 181: ...ss point mode Description Table 1 has the following columns Radio Shows the available WLAN interfaces in this column Channel Specify the main channel If you want the access point to search for a free channel itself use Auto The selection of channels used by an access point when establishing a wireless cell can be restricted To do this select the Use Allowed Channels only check box on the Allowed C...

Page 182: ...nnel above it are used 40 down Channel bandwidth 40 MHz The configured channel and the neighboring channel below it are used Note Channel bandwidth 40 MHz and frequency band 2 4 GHz If the access point detects another access point on the configured channel or on neighboring channels the access point changes the channel bandwidth from 40 MHz to 20 MHz If you set a free channel on the access point t...

Page 183: ... is used for the SSID transfer this function can only provide basic protection against unauthorized access The use of an authentication method for example WPA2 RADIUS or WPA2 PSK if this is not possible provides higher security You must also expect that end devices may have problems with access to a hidden SSID WDS only If you enable this option the access point only supports communication via WDS...

Page 184: ...mode Description The table has the following columns Radio Shows the available WLAN interfaces in this column Port Shows the port Port enabeld Enables the WDS interface Connection over Specify the VAP interface via which the WDS connection is established Both the MAC address of the VAP as well as security settings for example WPA2 are used Partner ID Type Specify the type of WDS communication MAC ...

Page 185: ...me data rate You can select either WEP or WPA 2 PSK as the encryption method You configure the security settings in the assigned VAP interface Security WLAN Basic You cannot use authentication with a RADIUS server for a WDS connection In the IEEE 802 11h transmission mode it is not practical to select the WDS mode In WDS mode all access points must use the same channel If a signal from a primary u...

Page 186: ...or data transmission speeds The access point will then use only the selected data transmission speeds for communication with the clients Description Table 1 has the following columns Radio Specifies the WLAN interface to which the information relates Use selected data rates only If you enable this option you can specify the data transmission speeds for the required WLAN interface If this option is...

Page 187: ...ion to assign the required data transmission speed to the WLAN interface Note You need to enable at least one data transmission speed Basic Enable the option to declare the required data transmission speed as Basic The Basic parameter specifies that a client must be capable of this speed to be able to connect to the access point The Basic option can only be enabled if an available data transmissio...

Page 188: ...Coding Schemes for the WLAN mode 802 11n You can select any combination of these data transmission speeds The access point will then use only the selected data transmission speeds for communication with the clients Description Table 1 has the following columns Radio Specifies the WLAN interface to which the information relates Use selected data rates only If you select this option you can specify ...

Page 189: ...aces WLAN Antennas If for example you only use one antenna only the MCS 0 to 7 are displayed Streams Shows the maximum possible number of parallel data streams that can be transmitted with the selected MCS index Data Rate Mbps Shows the supported data transmission speeds in megabits per second The displayed data transmission speeds depend on the settings Guard Interval and HT Channel Width The HT ...

Page 190: ... reset the selection 1 Click the Default Values button The selection is reset to the default setting Or 1 Disable the Use selected data rates only option in Table 1 2 Click the Set Values button 5 6 2 10 Client Connecting to a network With this menu command you can specify how the device connects to a network as client Note This tab is only available in the client mode ...

Page 191: ...he MAC addresses connected to the Ethernet interface of the client Up to eight MAC addresses can be used MAC Address If you have selected Manual for MAC Mode enter the MAC address of the client Any SSID Enabled In client mode the access point attempts to connect to the network with the best transmission quality and that has suitable security settings The clients can only connect to the access poin...

Page 192: ...her access points Background Scan Interval ms Specify the interval at which further access points are scanned Table 2 has the following columns Radio Shows the WLAN interface Scan channels Shows the channels on which the client searches for an access point The display depends on the wireless approvals of the selected country and the settings for Allowed Channels Table 3 has the following columns E...

Page 193: ... available in the client mode The WLAN interface of the device must be enabled otherwise no recording is possible Description This table contains the following columns Radio Shows the WLAN interface to which the information applies Since a client has a WLAN interface there is only ever one row for WLAN 1 in this table Time interval ms The time interval between acquiring two measured values in mill...

Page 194: ... that there is enough data communication during the measurement because the statistics functions evaluate incoming data frames The measurement path should be traveled 2 to 3 times with the same parameters to find out whether losses of signal strength always occur at the same position Selective measurements at a fixed position should be made over a longer period of time Note If you start a new reco...

Page 195: ...ues button 5 The ZIP file contains two files with the results of the recording A PDF file A CSV file Measurement results PDF file The PDF file contains information on the configuration of the device and detailed information about all individual measurements There is also a graphic representation of the curve of the RSSI values in dBm and the data rate If the client changes the access point roaming...

Page 196: ...n of two measured values The maximum data rate The setting of the external antennas The maximum possible transmit power The second area is a table The table contains the following for each measured value The consecutive number of the measurement The time stamp The BSSID The received signal strength in and in dBm The raw value of the RSSI Received Signal Strength Indication The roaming indicator Th...

Page 197: ...Configuring with Web Based Management 5 6 Interfaces menu SCALANCE W760 W720 to IEEE 802 11n Web Based Management Configuration Manual 11 2014 C79000 G8976 C350 03 197 ...

Page 198: ...evice is no longer reachable via Ethernet following the change Important rules for VLANs Make sure you keep to the following rules when configuring and operating your VLANs Frames with the VLAN ID 0 are handled as untagged frames but retain their priority value As default all ports on the device send frames without a VLAN tag to ensure that the end node can receive these frames With SCALANCE W dev...

Page 199: ... can then no longer be changed To make a change the entire data record must be deleted and created again Up to 2 VLANs can be defined Name Enter a name for the VLAN The name only provides information and has no effect on the configuration The length is a maximum of 32 characters Status Shows the status type of the entry in the port filter table Here static means that the address was entered as a s...

Page 200: ... the mode of the device 6 Click the Set Values button 5 7 1 2 Port Based Processing received frames On this page you specify the configuration of the port properties for receiving frames Description Table 1 has the following columns Column 1 All portsshows that the settings made in this table will be adopted for all ports of table 2 after clicking the Copy to Table button Columns Priority Port VID...

Page 201: ...ot have a VLAN tag it has a tag with the VLAN ID specified here added to it and is sent according to the rules at the port Acceptable Frames Specify which types of frames will be accepted The following alternatives are possible Tagged Frames Only The device discards all untagged frames Otherwise the forwarding rules apply according to the configuration All The device forwards all frames Ingress Fi...

Page 202: ...chanism is known as Aging Aging prevents frames being forwarded incorrectly for example when an end device for example a programming device is connected to a different port If the check box is not enabled a device does not delete learnt addresses automatically Description The page contains the following boxes Dynamic MAC Aging check box Enable or disable the function for automatic aging of learned...

Page 203: ...patibility mode you can configure the corresponding function on the relevant configuration page Note Client device not as root Using the configuration of priorities and path costs make sure that a client device can never become the root node If a client device becomes the root node the Rapid Spanning Tree function no longer works Description The page contains the following boxes Check box Spanning...

Page 204: ...and side of the page shows the configuration of the device The central part shows the configuration of the root bridge that can be derived from the spanning tree frames received by an device The right hand side shows the configuration of the regional root bridge that can be derived from the MSTP frames received by an device The displayed data is only visible if you have enabled MSTP on the General...

Page 205: ...due to the delay of the frames The value for the bridge priority is a whole multiple of 4096 with a range of values from 0 to 61440 Bridge Adresse Root Adresse The bridge address shows the MAC address of the device and the root address shows the MAC address of the root bridge Root Port Shows the port via which the switch communicates with the root bridge Root Cost The path costs from this device t...

Page 206: ...iority Regional Root Address The MAC address of the device Regional Root Cost The path costs from this device to the root bridge Region Name input box Enter the name of the MSTP region to which this device belongs As default the MAC address of the device is entered here This value must be the same on all devices that belong to the same MSTP region Region Version input box Enter the version number ...

Page 207: ... will be adopted for all ports of table 2 after clicking the Copy to Table button Spanning Tree Status In the drop down list select the setting for all ports If No Change is selected the entries of the corresponding column in table 2 remain unchanged Copy to Table If you click the button the settings are adopted for all ports of table 2 Table 2 has the following columns Port Shows all available po...

Page 208: ...ulation of the path costs is largely based on the transmission speed The higher the achievable transmission speed is the lower the value of the path costs Typical values for path costs with rapid spanning tree 1000 Mbps 20 000 100 Mbps 200 000 10 Mbps 2 000 000 The values can however also be set individually State Displays the current status of the port The values are only displayed and cannot be ...

Page 209: ...s established the first time the port is treated as an Edge Port Edge Shows the status of the port Enabled An end device is connected to this port Disabled There is a spanning tree or rapid spanning tree device at this port With an end device a switch can change over the port faster without taking into account spanning tree frames If a spanning tree frame is received despite this setting the port ...

Page 210: ...ion BPDUs As default 2 seconds is set Range of values 1 2 seconds Note The port specific setting of the Hello time is only possible in MSTP compatible mode Procedure 1 In the input cells of the table row enter the values of the port you are configuring 2 From the drop down lists of the cells of the table row select the values of the port you are configuring 3 Click the Set Values button 5 7 3 4 MS...

Page 211: ...his box The value for the bridge priority is a whole multiple of 4096 with a range of values from 0 to 61440 VLAN ID Enter the VLAN ID Here you can also specify ranges with Start ID End ID Several ranges or IDs are separated by Permitted values 1 4094 Procedure Creating a new entry 1 Enter the number of the MSTP instance in the MSTP Instance ID box 2 Click the Create button 3 Enter the identifier ...

Page 212: ...iple spanning tree instances Description Table 1 has the following columns Column 1 Shows that the settings are valid for all ports of table 2 MSTP Status Select the setting for all ports from the drop down list If No Change is selected the entries of the corresponding column in Table 2 remain unchanged Copy to Table If you click the button the setting is adopted for all ports of table 2 The page ...

Page 213: ...h with the lowest value is selected as the path If several ports of a device have the same value the port with the lowest port number is selected If the value in the Cost Calc field is 0 the automatically calculated value is displayed Otherwise the value of the Cost Calc field is displayed The calculation of the path costs is largely based on the transmission speed The higher the achievable transm...

Page 214: ...rwarding Applications The DCP protocol is used by STEP 7 and the PST Tool for configuration and diagnostics When shipped DCP is enabled on all ports in other words DCP frames are forwarded at all ports With this option you can disable the sending of these frames for individual ports for example to prevent individual parts of the network from being configured with the PST Tool or to divide the full...

Page 215: ...re forwarded via this port It is nevertheless still possible to receive via this port Forward The DCP frames are forwarded via this port Procedure 1 Specify whether the port blocks or forwards the DCP frames 2 Click the Set Values button 5 7 5 LLDP Link Layer Discovery Protocol LLDP PROFINET uses the LLDP protocol for topology diagnostics In the factory settings LLDP is activated on the interface ...

Page 216: ...port can receive and send LLDP frames Disabled This port can neither receive nor send LLDP frames Procedure 1 Select the required LLDP functionality from the drop down list 2 Click the Set Values button 5 8 Layer 3 menu Layer 3 possible only with SCALANCE W722 1 RJ 45 The use of the layer 3 functions is possible only with the client SCALANCE W722 1 RJ 45 5 8 1 NAT 5 8 1 1 Basic Requirements to be ...

Page 217: ...e range of values is 1 to 4294967295 Default setting 86400 seconds Input box UDP Idle Timeout s Enter the required time in seconds If no data exchange takes place the UDP connection is deleted from the translation table when this time has elapsed The range of values is 1 to 4294967295 Default setting 300 seconds Input box Local Interface IP address Enter the local IP address of the Ethernet interf...

Page 218: ...o which the settings relate Can only be selected if the device has several interfaces Traffic Type drop down list Specify the protocol for which the address assignment is valid TCP and UDP frames must have parameters set separately Global Port input box Enter the global port Incoming frames with this port as the destination port are forwarded If the setting is intended to apply to a port range ent...

Page 219: ...erface Shows the interface to which the settings relate Traffic Type Shows whether UDP or TCP frames are assigned to the global port Dynamic Global IP Shows whether or not dynamic address conversion is used Global IP Address Shows the global IP address to which the local IP address will be translated Global Port Shows the global port Local IP Address Shows the IP address of the node in the local n...

Page 220: ...nd User 2 Enter the valid administrator password in the Current Admin Password input box 3 Enter the new password for the selected user in the New Password input box The new password must be at least 6 characters long 4 Repeat the new password in the Password Confirmation input box 5 Click the Set Values button Note The factory settings for the passwords when the devices ship are as follows admin ...

Page 221: ... network secure authentication and encryption are used On this page you specify the security settings Note Transmission standard IEEE 802 11 n The transmission standard IEEE 802 11 n with the setting 802 11n or 802 11n only supports only WPA2 WPA2 PSK with AES in the security settings iPCF or iPCF MC If iPCF or iPCF MC is enabled only Open System with the encryption method AES is supported in the ...

Page 222: ... Access is a method specified by the Wi Fi Alliance to close security gaps in WEP Authentication using a server is stipulated 802 1x The dynamic exchange of keys at each data frame introduces further security WPA PSK WPA Pre Shared Key WPA PSK is a weakened form of WPA In this method authentication is not established by a server but is based on a password This password is configured manually on th...

Page 223: ...lity of the other station WEP WEP Wired Equivalent Privacy A symmetrical stream encryption method with only 40 or 104 bit long keys based on the RC4 algorithm Ron s Code 4 TKIP Temporal Key Integrity Protocol A symmetrical encryption method with the RC4 algorithm Ron s Code 4 In contrast to the weak WEP encryption TKIP uses changing keys derived from a main key TKIP can also recognize corrupted da...

Page 224: ...em enabled AES1 Default key 128 bit Shared Key enabled WEP Default key WPA RADIUS enabled Auto TKIP AES RADIUS Server WPA PSK enabled Auto TKIP AES WPA 2 Pass Phrase WPA2 RADIUS enabled Auto TKIP AES RADIUS Server WPA2 PSK enabled Auto TKIP AES WPA 2 Pass Phrase WPA WPA2 AutoPSK enabled Auto TKIP AES WPA 2 Pass Phrase WPA WPA2 Auto RADIUS enabled Auto TKIP AES RADIUS Server 1 available only with i...

Page 225: ...abled Clients logged on to the same VAP interface of an access point can communicate with each other Disabled Option is disabled with Ethernet Enabled Clients can communicate via the Ethernet interface of the access point Disabled Option is disabled 5 9 2 3 AP RADIUS Authenticator Configuration of the RADIUS server On this page you define the RADIUS servers and the RADIUS authentication of the acc...

Page 226: ...cal enter the period of validity of the authentication in seconds The minimum time is 1 minute enter 60 the maximum time is 12 hours enter 43200 The default is one hour 3 600 seconds The table has the following columns Server IP Address Here enter the IP address or the FQDN name of the RADIUS server Server Port Enter the input port on the RADIUS server Shared Secret Enter the password of the RADIU...

Page 227: ... of the password Maximum number of transmission retries Primary server 2 Click the Set Values button Modifying servers 1 In the relevant row enter the following data in the input boxes Server IP address Port number of the input port Password Confirmation of the password Maximum number of transmission retries Primary server 2 Click the Set Values button Repeat this procedure for every server whose ...

Page 228: ... Specify whether or not the RADIUS server identifies itself to the client using a certificate Dot1x EAP Types Specify the authentication method The following methods are available Auto EAP TLS EAP TTLS or PEAP is used depending on the capability of the other station EAP TLS Client logs on using a certificate EAP TTLS The client logs on with the RADIUS server using the user name and password PEAP T...

Page 229: ...rs 128 bits Note The hexadecimal characters are entered without being preceded by 0x One hexadecimal character codes four bits The entries ABCDE ASCII characters and 4142434445 hexadecimal characters are therefore the same because the ASCII character A has hexadecimal code 0x41 Key 1 4 Confirmation Confirm the WEP key Procedure 1 Enter at least one WEP key 2 Click the Set Values button 5 9 3 Manag...

Page 230: ...ets The table has the following columns Select Select the check box in the row to be deleted Rule Order Shows the number of the rule If you click the Create button a new row with a unique number is created IP Address Shows the IP address Subnet Mask Shows the subnet mask VLANs Allowed Only available if 802 1Q VLAN Bridge is set for Layer 2 VLAN General Enter the number of the VLAN in which the dev...

Page 231: ...er or not the station or the IP address accesses the device via the WDS interface Procedure Changing the entry 1 Configure the data of the entry you want to modify 2 Click the Set Values button to transfer the changes to the device Creating new entry 1 In the IP Address input box enter the IP address of the device and in the Subnet Mask input box the corresponding subnet mask 2 Click the Create bu...

Page 232: ...isable particularly if you have a large number of nodes and want to implement highly deterministic operation This is necessary for example with PNIO or other cyclic protocols You will find a more detailed description of iPCF in the section Technical basics in the section iPCF iPCF MC Page 25 Note iPCF and iPCF MC are not compatible with each other and cannot be used at the same time on a device De...

Page 233: ...s of all access points to which a client can change must use the same channel A client scans only this one channel to find accessible access points Transmission based on IEEE801 11h DFS cannot be used for the management interface 801 11h DFS is possible for the data interface The client cannot be operated with Use Allowed Channel only Force roaming on Ethernet down is automatically mirrored on the...

Page 234: ...ided by the access point are adapted We strongly recommend that you retain the default setting for the data rates 802 11 a b g 6 9 and 12 Mbps and 802 11n MCS 2 Management Scan Period drop down list This parameter specifies the time between two management channel scans specified in iPCF cycles If for example you select two the client runs a management channel scan only in every second iPCF cycle A...

Page 235: ...Click System Load Save in the navigation area Click the TFTP tab 2 Enter the IP address of the TFTP server in the TFTP Server IP Address input box 3 Enter the port of the TFTP server in the TFTP Server Port input box 4 Click the Load file button in the Firmware table row 5 Go to the storage location of the firmware file 6 Click the Open button in the dialog The file is uploaded Result The firmware...

Page 236: ...the factory settings Note When you reset the device parameters all previously changed settings are lost 1 Turn off the power to the device 2 Now press the Reset button and reconnect the power to the device while holding down the button 3 Hold down the button until the red fault LED F stops flashing after approximately 10 seconds and is permanently lit 4 Now release the button and wait until the fa...

Page 237: ...r to the device while holding down the button 3 Hold down the button until the red fault LED F starts to flash after approximately 2 seconds 4 Now release the button The bootloader waits in this state for a new firmware file that you can download by TFTP 5 Connect a PC to the SCALANCE W700 over the Ethernet interface 6 Assign an IP address to the SCALANCE W700 with the Primary Setup Tool 7 Open a ...

Page 238: ...drive can occur on clients and access points If the receive power on the device is greater than 40 dBm this can result in disrupted communication Information about the signal strength in dBm is displayed in WBM on the following tabs Information WLAN Client List Client mode Information WLAN Client List Available AP list The power of the input signal on the IWLAN device is influenced by the followin...

Page 239: ...nsmission standard IEEE 802 11n with the setting 802 11n or 802 11n only only supports WPA2 WPA2 PSK with AES in the security settings SSID For SSID use only the characters that were supported by the previous products Management only over wired Ethernet interface In the previous products there was a function Management only over wired Ethernet interface In the new devices this function is covered ...

Page 240: ...ption is to install a separate HTTPS certificate on the WLAN client access point The HTTPS certificate checks the identity of the device and controls the encrypted data exchange You can install the HTTPS certificate for example using HTTP For more detailed information refer to the section Load Save Page 119 Use SNMPv3 SNMPv3 provides you with highest possible security when accessing the WLAN devic...

Page 241: ...2 1 2 RFC2233 P BRIDGE MIB 1 3 6 1 2 1 17 4 5 Q BRIDGE MIB 1 3 6 1 2 1 17 7 RADIUS ACC CLIENT MIB 1 3 6 1 2 1 67 2 2 RADIUS AUTH CLIENT MIB 1 3 6 1 2 1 67 1 2 RFC1213 MIB 1 3 6 1 2 1 4 RMON MIB 1 3 6 1 2 1 16 SNMP COMMUNITY MIB 1 3 6 1 6 3 18 SNMP FRAMEWORK MIB 1 3 6 1 6 3 10 2 1 RFC2571 SNMP NOTIFICATION MIB 1 3 6 1 6 3 13 RFC2573 SNMP PROXY MIB 1 3 6 1 6 3 14 SNMP TARGET MIB 1 3 6 1 6 3 12 RFC25...

Page 242: ...1 4329 20 1 1 1 1 28 Vendor specific SN MSPS RMON MIB Siemens 2 1 3 6 1 4 1 4329 20 1 1 1 1 12 Vendor specific SN MSPS SINEMA MIB Siemens 2 1 3 6 1 4 1 4329 20 1 1 1 1 25 Vendor specific SN MSPS SNMP MIB Siemens 2 1 3 6 1 4 1 4329 20 1 1 1 1 4 Vendor specific SN MSPS SNTP CLIENT MIB Siemens 2 1 3 6 1 4 1 4329 20 1 1 1 1 19 1 Vendor specific SN MSPS STP L2T MIB Siemens 1 3 6 1 4 1 4329 20 1 1 1 1 4...

Page 243: ... using System Load Save HTTP MIB and the Save button OID The private MIB variables of the SCALANCE W700 have the following object identifiers iso 1 org 3 dod 6 internet 1 private 4 enterprises 1 siemens 4329 industrialComProducts 20 iComPlatforms 1 simaticNet 1 snMsps 1 snMspsCommon 1 WLAN specific MIB variables The WLAN specific MIB variables can be found in snMspsWlan You will find further infor...

Page 244: ...Appendix B B 1 Private MIB variables SCALANCE W760 W720 to IEEE 802 11n Web Based Management 244 Configuration Manual 11 2014 C79000 G8976 C350 03 ...

Page 245: ...Media Access Control MAC bridges IEEE 802 1Q Virtual Bridged LANs VLAN Tagging Port Based VLANs IEEE 802 1W 2004 Rapid Spanning Tree Protocol RSTP IEEE 802 3 2002 Ethernet IEEE 802 11 Wireless Local Area Network IEEE 802 11a Wireless standard for use of the 5 GHz frequency band IEEE 802 11b g Wireless standard for use of the 2 4 GHz frequency band IEEE 802 11e Quality of Service QoS IEEE 802 11 h ...

Page 246: ...Appendix C C 1 Underlying standards SCALANCE W760 W720 to IEEE 802 11n Web Based Management 246 Configuration Manual 11 2014 C79000 G8976 C350 03 ...

Page 247: ...ng after startup Fault state following system start Status of the power supply You enable or disable the Power Change event in System Events Message Description Power up on line 1 Power supply available on line 1 Power down on line 1 Power supply interrupted on line 1 Status of the Ethernet interface You enable or disable the Link Change event in System Events Message Description Link up on P1 A c...

Page 248: ...terference detected on WLAN X at channel channel number frequency frequency MHz No more free channels to use A primary user was found on all available channels There is no free channel available the WLAN interface X will be deactivated until one of the channels becomes available Status of the WLAN interface in client mode only Messages Description Link up on WLAN X The WLAN interface X is enabled ...

Page 249: ...ng TFTP failed The TFTP server cannot be reached or the settings are incorrect Messages error status You configure the events in System Events You configure the monitoring of the power supply and the link on the Ethernet port in System Fault Monitoring Messages Description New fault state fault description fault description Warm start performed Cold start performed Link down on P1 Link up on P1 Po...

Page 250: ...socket configuration The syslog server configuration is incomplete Unable to send e mail s because of IP connec tion failure Sending of e mail s failed SMTP server cannot be reached e g net work connection interrupted Unable to send e mail s because of SMTP au thentication failure Sending of e mail s failed Authentication of the client on the SMTP server incorrect Unable to send e mail s because S...

Page 251: ...ged in successfully on the access point Client MAC address system name disassociated with reason reason description The client was logged off from the access point Messages in client mode Alarm Description Associated successfully to AP MAC address system name at channel channel number frequency fre quency MHz The client has logged in successfully on the access point Disassociated from AP MAC addre...

Page 252: ...Appendix D D 2 Messages in the WLAN authentication log SCALANCE W760 W720 to IEEE 802 11n Web Based Management 252 Configuration Manual 11 2014 C79000 G8976 C350 03 ...

Page 253: ...transmission speed 185 188 802 11a b g 185 802 11n 188 DCP server 46 107 214 DHCP Client 132 DNS client 114 DST Daylight saving time 149 150 E E Mail function 130 Alarm events 130 Line monitoring 130 Error status 72 Ethernet statistics Interface statistics 77 Event log table 68 Events Log table 68 F Fault monitoring Connection status change 163 Forward Delay 206 Fragments 80 G Geographic coordinat...

Page 254: ...nning Tree 207 210 N NAPT 28 Configuring 218 NAT 27 Configuring 217 Negotiation 168 Network access 15 NTP Client 157 O Order number 60 Oversize 80 Overview Access point 84 Available access points 92 Clients 90 Logged on clients 86 Overlap APs 89 Overlapping channels 89 WDS partner 87 P Packet error statistics 80 Password 220 Ping 166 PNIO 164 point to point 31 Port Port configuration 167 169 Port ...

Page 255: ...eneral information 109 System event log Agent 160 System events Configuration 127 Severity filter 129 T Telnet Server 106 TFTP Load save 123 Time 107 Time of day Manual setting 148 SIMATIC Time Client 159 SNTP Simple Network Time Protocol 154 System time 147 Time zone 156 Time of day synchronization 154 UTC time 156 Time setting 107 U Undersize 80 V Vendor 60 Vendor ID 60 VLAN 23 Port VID 201 Prio...

Page 256: ...Index SCALANCE W760 W720 to IEEE 802 11n Web Based Management 256 Configuration Manual 11 2014 C79000 G8976 C350 03 ...

Reviews: