Scalance W788
Scalance W788
Scalance W788
Operating Instructions
Preface, Contents
Basic Information on
Wireless LAN
Communication
SCALANCE W788-2PRO
(Dual Access Point)
Description of the
SCALANCE W78x
SCALANCE W788-1RR
(Access Point iPCF)
Commissioning
SCALANCE W788-2RR
(Dual Access Point iPCF)
Technical Specifications
SCALANCE W788-1PRO
(Access Point)
C79000-G8976-C184-07
Release 10/2006
Danger
indicates that death or severe personal injury will result if proper precautions are not
taken.
Warning
indicates that death or severe personal injury can result if proper precautions are not
taken.
Caution
with warning triangle indicates that minor personal injury can result if proper
precautions are not taken.
Caution
without warning triangle indicates that damage to property can result if proper
precautions are not taken.
Notice
indicates that an undesirable result or status can occur if the relevant notice is
ignored.
Note
highlights important information on the product, using the product, or part of the
documentation that is of particular importance and that will be of benefit to the user.
Disclaimer
We have checked the contents of this manual for agreement with the
hardware and software described. Since deviations cannot be precluded
entirely, we cannot guarantee full agreement. However, the data in this
manual are reviewed regularly and any necessary corrections included in
subsequent editions. Suggestions for improvement are welcome.
C79000-G8976-C184-07
Technical data subject to change.
Printed in the Federal Republic of Germany
Trademarks
SIMATIC, SIMATIC NET, SINEC, SIMATIC NET Networking for Industry and
SCALANCE are registered trademarks of Siemens AG.
Third parties using for their own purposes any other names in this document which
refer to trademarks might infringe upon the rights of the trademark owners.
Caution
This device may only be used for the applications described in the catalog or the
technical description, and only in connection with devices or components from other
manufacturers which have been approved or recommended by Siemens.
This product can only function correctly and safely if it is transported, stored, set up,
and installed correctly, and operated and maintained as recommended.
Before you use the supplied sample programs or programs you have written yourself,
make certain that no injury to persons nor damage to equipment can result in your
plant or process.
Prior to Startup
Before putting the product into operation, note the following warning:
Caution
Prior to startup you must observe the instructions in the relevant documentation. For
ordering data of the documentation please refer to the catalogs or contact your local
SIEMENS representative.
Preface
Validity of the Operating Instructions
These Operating Instructions cover the following products:
SCALANCE W788-1PRO
SCALANCE W788-2PRO
SCALANCE W788-1RR
SCALANCE W788-2RR
Where the description applies to all products, the name SCALANCE W78x is used.
Where the description applies to a specific product, the full name of the product is
used.
These operating instructions apply to the following software versions:
Preface
Preface
Manual CP 1515
The comprehensive user documentation for the CP 1515 communications
processor with all the information required to operate this device.
The CP 1515 is inserted in a PC-card slot (Type II) and allows attachment of
the PC/PG to a wireless network.
Preface
Biological Compatibility
With regard to the question of whether electromagnetic fields (for example in
association with industrial wireless LANs) can put human health at risk, we refer to
a publication of BITKOM (German Association for information Technology,
Telecommunication and New Media e. V.), dated December 2003:
"The same regulations for the protection of health for all other radio
applications also apply to WLAN devices. These regulations are based on
the protection concept of ICNIRP2 or the corresponding recommendation of
the European Council.
The independent German radiation protection commission (SSK) was
commissioned by the federal German ministry of the environment to
investigate the possible dangers - thermal and non-thermal - resulting from
electromagnetic fields and came to the following conclusions3:
"The SSK comes to the conclusion that even after evaluation of the latest
scientific literature, there is no new scientific evidence regarding proven
adverse effects on health that causes any doubt regarding the scientific
evaluation on which the protection concept of the ICNIRP or the European
Council recommendation."
The SSK also concludes that below the current limit values, these is also no
scientific suspicion of health risks.
This assessment agrees with those of other national and international
scientific commissions and of the WHO (www.who.int/emf).
Accordingly and in view of the fact that WLAN devices are significantly below
the scientifically established limit values, there are no health risks from the
electromagnetic fields of WLAN products.
2
'Limit Values and Precautionary Measures to Protect the General Public from Electromagnetic
Fields' Recommendation of the Radiation Protection Commission (SSK) with scientific
justification, Issue 29, 2001."
You will find further information on this topic under the following URL:
www.bitkom.org
Contents
1
1.2
1.2.1
1.2.2
Commissioning............................................................................................................. 31
3.1
3.2
3.3
3.3.1
3.3.2
3.3.4
3.4
3.3.3
Introduction ........................................................................................................ 47
4.2
4.3
4.4
4.5
4.5.1
Introduction ........................................................................................................ 57
5.2
5.2.1
5.3
5.4
5.4.1
5.4.2
5.4.3
5.4.4
5.4.5
5.4.6
Basic Wizard...................................................................................................... 63
IP Settings ......................................................................................................... 63
System name..................................................................................................... 65
Country Code..................................................................................................... 66
Wireless Settings in Access Point Mode ........................................................... 67
Wireless Settings in Client Mode....................................................................... 68
Adopt MAC Address Settings (Client Mode only).............................................. 69
Contents
5.4.7
5.4.8
5.5
5.5.1
5.5.2
5.5.3
5.5.4
5.5.5
5.5.6
5.5.7
5.5.8
5.5.9
5.5.10
5.5.11
5.5.12
Security Wizard.................................................................................................. 75
Security Settings................................................................................................ 76
Security Settings for Management Interfaces ................................................... 77
Security Settings for SNMP Protocol................................................................. 78
Security Settings for WLAN (Page 1, only in access point mode) .................... 79
Security Settings for WLAN (Page 2) ................................................................ 83
Settings for the Security Level Low ................................................................... 87
Settings for the Security Level Medium in Access Point Mode ......................... 88
Settings for Security Level Medium in Client Mode........................................... 89
Settings for the Security Level High .................................................................. 90
Settings for the Security Level Highest.............................................................. 91
The Following Settings Were Made................................................................... 91
Finish ................................................................................................................. 92
5.6
5.6.1
5.6.2
5.6.3
5.6.4
iPCF Wizard....................................................................................................... 93
i Point Coordination Function Settings .............................................................. 93
Security Settings for WLAN ............................................................................... 96
Public Security Key for WLAN ........................................................................... 97
Finish ................................................................................................................. 98
Configuration Using Web Based Management and the Command Line Interface 99
6.1
6.1.1
6.1.2
6.1.3
6.1.4
6.2
6.2.1
6.2.2
6.2.3
6.2.4
6.2.5
6.2.6
6.2.7
6.2.8
6.2.9
6.2.10
6.2.11
6.2.12
6.3
6.3.1
6.3.2
10
Contents
6.3.3
6.3.4
6.3.5
6.3.6
6.3.7
6.4
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
6.5
6.5.1
6.5.2
6.5.3
6.5.4
6.5.5
6.5.6
6.5.7
6.5.8
6.6
6.6.1
6.6.2
6.6.3
6.7
6.7.1
6.7.2
6.7.3
6.7.4
6.7.5
6.7.6
6.8
6.8.1
6.8.2
6.8.3
6.8.4
6.8.5
6.8.6
6.8.7
6.8.8
6.8.9
6.8.10
11
Contents
...................................................................................................................................... 273
12
1.1
Network Structure
Figure 1-1
13
Ad Hoc Networks
In the ad hoc mode, nodes communicate directly (connections 1 through 3 in
Figure 1-2) without involving a SCALANCE W78x with each other (connection 4).
The nodes access common resources (files or even devices, for example a printer)
of the server. This is, of course, only possible when the nodes are within the
wireless range of the server or within each other's range.
2
1
4
3
Figure 1-2
14
Figure 1-3
15
Multichannel Configuration
If neighboring SCALANCE W78x access points use the same frequency channel,
the response times are longer due to the collisions that occur. If the configuration
shown in Figure 1-4 is implemented as a single-channel system, computers A and
B cannot communicate at the same time with the SCALANCE W78x access points
in their cells.
If neighboring SCALANCE W78x access points are set up for different frequencies,
this leads to a considerable improvement in performance. As a result, neighboring
cells each have their own medium and the delays resulting from time-offset
transmission no longer occur.
Channel spacing should be as large as possible; a practical value would be 25
MHz. Even in a multichannel configuration, all SCALANCE W78x access points
can be configured with the same network name.
1
7
A
1
7
Figure 1-4
16
1
1
A
1
1
Figure 1-5
17
A
Figure 1-6
18
1.2
WLAN Communication
1.2.1
MAC-based Communication
As long as there is no link on the Ethernet interface, the device uses the MAC
address of the Ethernet interface so that it can be reached in this status. In this
status, the device can be found using the Primary Setup Tool.
As soon as there is a link on the Ethernet interface, the device adopts the
source MAC address of the first received frame.
Note
From the moment that the device adopts another MAC address (whether manually
or automatically), the device no longer responds to queries of the Primary Setup
Tool when the query is received over the WLAN interface. Queries of the PST over
the Ethernet interface continue to be replied to.
19
Communication at the MAC address level (ISO/OSI layer 2) is then only possible
with a component downstream from the client if its MAC address was adopted by
the client.
Maximum possible number of MAC nodes downstream from the client: 0
1.2.2
IP-based Communication
20
SCALANCE W78x
2 OMNI antennas
Please check that the consignment you have received is complete. If it is not
complete, please contact your supplier or your local Siemens office.
21
The SCALANCE W78x forwards data within its transmission range from one
node to another without a connection to wired Ethernet being necessary.
Over and above this, due to the second interface of the SCALANCE W788-2PRO
and the SCALANCE W788-2RR, a redundant wireless link can also be
implemented between two SCALANCE W788-2xx modules.
22
The Ethernet interface supports 10 Mbps and 100 Mbps, both in full and half
duplex as well as autocrossing and autonegotiation.
Operating the wireless interface in the frequency bands 2.4 GHz and 5 GHz.
Note
If the SCALANCE W78x is operated in turbo mode (A, G or H turbo), remember
that the channels adjacent to the set transmission channel are also used for
communication. Disturbances can therefore occur on these channels when there
are neighboring wireless systems. The data throughput can also be reduced if
there is competition for use of these channels.
23
Note
In the client mode, you can use a SCALANCE W788-xRR as SCALANCE W7471RR and a SCALANCE W788-xPRO as SCALANCE W746-1PRO.
Note
For PNIO communication, we always recommend that you enable the iPCF mode.
The following table illustrates the differences between the various variants of the
SCALANCE W78x:
Type
No. of WLAN
interfaces
1
W7881PRO
W788-2RR
W7882PRO
W788-1RR
No. of
supported IP
nodes (3)
several
No. of supported
MAC nodes (3)
1
iPCF
mode (1)
Order no.
several
6GK57881ST00-2AA6
6GK57881ST00-2AB6 (2)
6GK57882ST00-2AA6
6GK57882ST00-2AB6 (2)
6GK57881SR00-2AA6
6GK57881SR00-2AB6 (2)
6GK57882SR00-2AA6
6GK57882SR00-2AB6 (2)
(1) The iPCF mode provides an optimized data throughput and minimum handover times.
(2) US variant
(3) In client mode.
In the SCALANCE W78x HELP function, you will find further information on the
configuration parameters of the relevant device.
24
Ports
The SCALANCE W78x has the following ports:
RJ-45 hybrid connector on the front panel of the housing consisting of an RJ45 jack and 4-pin power socket. The RJ-45 connector supports the use of
switches capable of power-over-Ethernet according to 802.3af. The 4-pin
power socket allows power of 18 - 32 V DC.
Two R-SMA plugs (four R-SMA plugs on the SCALANCE W788-2PRO and
SCALANCE W788-2RR) for the attachment of antennas on the sides of the
device.
LED Display
On the front of the housing, several LEDs provide information on the operating
status of the SCALANCE W78x:
L 1
L 2
P 1
R 1
S C A L A N C E W 7 8 8 -1 x x
Figure 2-1
L 1
R 2
L 2
P 1
R 1
S C A L A N C E W 7 8 8 -2 x x
25
Color
Meaning
Yellow
Green
Yellow flashing
PRESET-PLUG detected.
Yellow/green
Green flashing
L2
Green
R1
Yellow
Green
Green flashing
Green flashing
quickly
Yellow flashing
PRESET-PLUG detected.
Green
3x fast,
1x long
flashing
Client Mode:
The client waits for the adopt MAC address due to the setting
<Auto Find Adopt MAC> and is connected to an access point.
Yellow/green
LED
R2
Color
Meaning
Yellow
Green
Green flashing
26
LED
Color
Meaning
Green flashing
quickly
Yellow flashing
PRESET-PLUG detected.
Yellow/green
L1
Green
Red
Note
If the LED for the WLAN interface is not green when the device starts up, although
it is activated, the interface is not ready for operation (interface not initialized).
The main reason for this is usually that during commissioning of the
SCALANCE W78x products, a waiting time of up to 15 minutes can occur when the
ambient temperature is below zero. The device is ready for operation at the
specified ambient temperature as soon as the LED for the WLAN interface is lit
green.
27
Remove the old SCALANCE W78x from its mounting and open the sealing
screw on the rear with a coin or broad screwdriver.
Open the sealing screw of the new device in the same way and insert the CPLUG of the old device.
Note
It is necessary that the configuration on the C-PLUG was generated with a
firmware version the firmware version on the destination device.
Example: A C-PLUG with version V3.0 cannot be used for a SCALANCE W78x
with firmware version V2.4.
28
Reset Button
The reset button is on the rear of the device directly beside the C-PLUG receptacle
and has several functions:
29
30
Commissioning
Commissioning
3.1
Warning
Antennas installed outdoors must be within the area covered by a lightning
protection system. Make sure that all conducting systems entering from outdoors
can be protected by a lightning protection potential equalization system.
When implementing your lightning protection concept, make sure you adhere to the
VDE 0182 or IEC 62305 standard.
A suitable lightning conductor is available in the range of accessories of SIMATIC
NET Industrial WLAN:
Lightning Protector LP798-1PRO (order no. 6GK5798-1LP00-0AA6)
Warning
Installing this lightning protector between an antenna and a SCALANCE W788 is
not adequate protection against a lightning strike. The LP798-1PRO lightening
protector only works within the framework of a comprehensive lightning protection
concept. If you have questions, ask a qualified specialist company.
Note
The requirements of EN61000-4-5, surge test on power supply lines are met only
when a Blitzductor VT AD 24V type no. 918 402 is used
Manufacturer: DEHN+SHNE GmbH+Co.KG Hans Dehn Str.1 Postfach 1640 D92306 Neumarkt, Germany
31
Warning
The SCALANCE W78x devices are designed for operation with safety extra-low
voltage (SELV). Therefore only safety extra-low voltage (SELV) with limited power
source (LPS) complying with IEC950/EN60950/VDE0805 may be connected to the
power supply terminals.
The power supply unit to supply the SCALANCE W78x must comply with NEC
Class 2 (voltage range 18 - 32 V, current requirement 1 A)
The device may only be supplied by a power supply unit that meets the
requirements of class 2 power sources of the "National Electrical Code, table 11
(b)". If the power supply is designed redundantly (two separate power supplies),
both must meet these requirements.
Exceptions:
Power supply with PELV (according to VDE 0100-410) is also possible if the
generated rated voltage does not exceed the voltage limits 25 V AC or 60 V DC.
Power supply by a SELV power source (according to IEC 60950) or PELV
power source (according to VDE 0100-410) without limited power is also
permitted if suitable fire protection measures are taken by:
-
Grounding
Caution
There must be no potential difference between the following parts otherwise there
is a risk that the device will be destroyed:
Ground potential of the power supply and ground potential of the antenna
ground.
Ground potential of the power supply and a grounded housing.
Ground potential of the power supply and the ground potential of the device
connected to Industrial Ethernet (for example PC, AS-300, AS-400 etc.)
Connect both grounds to the same foundation earth or use an equipotential
bonding cable.
32
3.2
Use the holes in the housing to screw the device to the wall or on a horizontal
surface.
Make sure that there is suitable strain relief for the connecting cable.
Note
We recommend that you protect the device from direct sunlight with a suitable
shade. This avoids unwanted heating of the device and prevents premature ageing
of the device and cabling. When operating the SCALANCE W outdoors, make sure
that it is installed so that it is protected from UV and that the device is not exposed
to rain (installed under a roof).
Note
The minimum distance to fluorescent lamps should be 0.5 m. For cabinet
installation, we recommend that you do not install relays on the same or on directly
neighboring mounting rails.
33
A
B
Figure 3-1
As an alternative or in addition to this, you can also use the M12 plug for the power
supply (position B in Figure 3.1).
You can fit additional antennas to the sides of the SCALANCE W788-2PRO and
SCALANCE W788-2RR with an antenna cable (position C in Figure 3.1). If you
install the SCALANCE W78x in a cabinet, the antenna (position D in Figure 3.1)
must be unscrewed due to the restricted communication. In this case, the
connection is over detached antennas in store outside the cabinet. On the front
panel, there is also an identifier for the antenna connectors. The A connectors are
on the right-hand side and B connectors B on the left-hand side.
SIMATIC NET offers the IWLAN FRNC antenna extension cable for the connection
between the SCALANCE W78x and detached antenna. To avoid violating the
approvals, only antennas released for this product can be used.
Note
The distance between a pair of antennas for the first and second WLAN interface
must be at least 0.5 m.
34
3.3
3.3.1
General Notes
Suitable Cables
The following cable variants are available to connect a SCALANCE W78x to the
power supply and to Ethernet:
Figure 3-2
Power supply
FC RJ-45 modular outlet with power insert
SCALANCE W78x
35
3.3.2
36
White
Blue
Yellow
Orange
Connector color
code (Siemens IE)
White
Blue
Yellow
Orange
37
Brown
Brown
Black
Black
24 V
24 V
Ground
Ground
38
39
3.3.3
40
White /
Orange *
Orange
White /
Green *
Green
Connector color
code (Siemens IE)
White
Blue
Yellow
Orange
41
White /
Blue *
Blue
White
brown *
Brown
24 V
24 V
Ground
Ground
42
3.3.4
24 V DC
PIN 2
--
PIN 3
Ground
PIN 4
--
43
3.4
How It Works
With the PRESET PLUG, it is simple to assign a configuration to WLAN devices
such as access points, ECMs or IWLAN/PB links. You transfer an existing
configuration to any number of other devices using the PRESET PLUG. This
procedure is particularly useful when commissioning a lot of WLAN clients with the
same parameter settings because you do not need to set parameters for each
client manually.
Note
To avoid duplicating IP addresses, the IP parameters are not changed but are
retained when you use the PRESET PLUG.
If the PRESET PLUG is inserted, the WLAN interface of the device is deactivated.
WLAN operation with a PRESET PLUG insert it is not possible.
Note
With a version V3.0 AP or older, it is not possible to create a PRESET-PLUG for
the IWLAN/PB-Link version V1.1. Please use a version V2.4 AP or older. If you
update the IWLAN/PB Link to firmware V1.2, the configuration is available again on
a PRESET PLUG (created with V3.1).
Insert the PRESET PLUG in the C-PLUG slot of a powered-down device with
the required configuration and then turn on the device.
2.
Start Web Based Management and select the System > C-PLUG menu.
3.
In the Modify C-PLUG list box, select the Create PRESET-PLUG entry.
44
4.
In the PRESET PLUG for box, specify the device for which you want to create
the PRESET PLUG.
Note
A PRESET PLUG for configuring a SCALANCE W78x in Access Point mode
must be created with a SCALANCE W78x because a SCALANCE W74x does
not have all the configuration settings required for the W78x.
5.
Click on the Modify button to transfer the configuration of the device to the
PRESET PLUG.
6.
45
Start Web Based Management, there you will see the current settings of the
PRESET PLUG. Make the required changes to the configuration.
3.
In the Modify C-PLUG list box, select the Create PRESET-PLUG entry.
4.
In the PRESET PLUG for box, specify the device for which you want to create
the PRESET PLUG.
5.
Click on the Modify button to transfer the configuration of the device to the
PRESET PLUG.
6.
Insert the PRESET PLUG in the C-PLUG slot of the device to which you want
to assign a configuration.
2.
3.
Press the reset button beside the C-PLUG briefly to save the settings of the
PRESET PLUG on the device.
4.
When all the data has been transferred from the PRESET PLUG to the
device, the LEDs stop flashing and are permanently lit.
5.
Note
The next time the device starts up, it uses the settings from the PRESET PLUG
and the previous IP configuration.
46
4.1
Introduction
Note
On the CD and on the Internet, you will find the latest version of the Primary Setup
Tool (at the time of release of this document, Version 3.1). Make sure that you use
the version V3.1 or higher for the SCALANCE W78x.
Windows XP Professional
47
DLC Protocol
The Primary Setup Tool uses the DLC protocol for communication with the
modules. Depending on the operating system you are using, you must work
through the following steps before you can use the DLC protocol:
Windows XP Professional
The DLC protocol is not supplied with Windows XP and must be installed and
activated separately.
Note
The sections on installing the DLC protocol are relevant only for older firmware
versions < V2.3.
48
4.2
2.
In the dialog box of the extraction program, select the folder into which you
want to extract the files and click on the Extract button.
Installation
Follow the steps below to install the DLC protocol on your computer:
1.
2.
In the Choose Setup Language dialog, select the language you want to use.
3.
In the next dialog, select the folder in which you want to install the program
and click on the Next button to confirm your selection.
5.
Close the last dialog of the installation program by clicking on the Finish
button.
49
4.3
Select the menu command Start > Settings > Control Panel >Network and
Dial-Up Connections.
2.
3.
4.
5.
In the Select Network Component Type dialog, select the entry Protocol and
click the Add... button.
6.
In the Network Protocols window, select the entry DLC Protocol and confirm
by clicking OK.
7.
50
4.4
Procedure
Follow the steps below to install the Primary Setup Tool on your computer:
1. Double-click on the file name setup.exe in the Windows Explorer or start the
program using the Windows menu command Start > Run.
2. In the Choose Setup Language dialog box, select the language in which you
want to run the installation.
3. The first dialog box of the Installation Wizard opens. Click on the Next button.
4. The dialog box for selecting the installation folder opens. Click on the Next
button if you want to accept the default C:\Program Files\Siemens\Primary
Setup Tool\. If you want to use a different folder, you can open a dialog box to
select the folder by clicking the Browse button.
Start the installation by clicking the Next button.
5. If the DLC protocol is not installed on your computer, the Information dialog
opens referring you to the ReadMe file. Confirm the dialog with OK and install
the DLC protocol later as described in the ReadMe file.
6. A final dialog box informs you that the installation was successful. Click on the
Finish button to close this dialog box.
After installation of PST V3.1, start the tool with Start > SIMATIC > Primary Setup
Tool.
51
4.5
Click on the magnifier icon in the toolbar below the menu bar.
While the Primary Setup Tool browses the network, the Browse Network dialog is
displayed with a progress bar. On completion of the search, the Primary Setup Tool
displays a list with all the devices it has found in the left-hand pane.
52
Configuring a Module
If you click an entry in the list, the Primary Setup Tool displays information on the
selected device in the right-hand pane.
Follow the steps below to configure a device:
1.
Click on the plus symbol in front of the device symbol or double-click on the
device symbol to display all interfaces of the device.
2.
Click on the interface you want to configure. The Primary Setup Tool displays
the input dialog for the configuration data in the right-hand pane of the
program window. Depending on the selected settings, some text boxes or
check boxes may be disabled. The MAC address box is always disabled
because this address is a property of the device that cannot be modified.
Moreover, the Client-ID and DNS parameters are not supported by the
SCALANCE W7xx.
3.
53
4.
Make the following entries if you have decided to assign the IP address
manually:
Enter the IP address for the device in the IP Address box. In each part of
the address separated by the periods, you can enter a number between 0
and 255; the program does not accept any other numbers.
If necessary, select the Use router check box and enter the IP address of
the router in the text box. Router information is necessary if the computer
on which you are creating the configuration is not in the same subnet as
the device to be configured.
Select the module you want to configure in the left pane of the program
window. As long as an interface is selected and the input dialog for the
configuration data is displayed, no download of the configuration data is
possible.
2.
54
If the Module > Start INC Browser and the module icon are disabled, there is no
Web Based Management for the selected module.
Removing a Module
You can remove a module from the list in the left-hand pane of the program
window by selecting the Module > Remove Module menu command. Using this
menu command has no effect on the existence of a module in the network; if you
browse the network again, all modules are displayed again.
55
4.5.1
Syntax
You can also use the Primary Setup Tool from the command line of a DOS prompt.
The syntax is as follows; optional parameters are shown in square brackets:
s7wnpstx MAC address -DHCP[=client ID]
s7wnpstx MAC address -RESET
s7wnpstx MAC address IP address subnet mask [router address]
s7wnpstx -NAME=station name [index network adapter][INC]
The following table explains the parameters:
Command
Description
Comment
MAC address
-DHCP
client ID
-RESET
IP address
subnet mask
Router address
-NAME
station name
Optional.
INC
Optional.
Optional.
Optional.
56
5.1
Introduction
57
Note
The screenshots in this section were created using the Microsoft Internet Explorer
version 6.0. If you use a different browser (for example Mozilla), the appearance of
the menus may differ.
58
5.2
Procedure
1. In the address box of the Web browser, enter the IP address or the URL of the
SCALANCE W78x. If there is a problem-free connection to the
SCALANCE W78x, the Logon dialog of Web Based Management is displayed:
2. In the "User Name" list box, select the "Admin" entry if you want to change
settings of the SCALANCE W78x (read and write access). If you select the
"User" entry, you only have read access to the configuration data of the
SCALANCE W78x.
3. Enter your password. If you have not yet set a password, the default passwords
as shipped apply: Enter admin if you selected "admin" as the user name or user
if you selected "user".
4. Click on the "Log On" button to start the logon.
59
5.2.1
Description
Web Based Management also allows you to connect to the device over the secure
connection of the HTTPS protocol.
Enter https:// in the address field of the Internet browser and the IP address of the
SCALANCE W7xx and confirm with Enter. The warning Security Alert is displayed
and asks you whether you want to continue the action. Confirm with YES. The
Login dialog of Web Based Management opens.
60
5.3
Wizard Status
After selecting the "Wizards" menu on the left-hand side of the dialog, the status of
the wizards is displayed. If you have worked through a wizard completely, Done is
displayed as the status. If you have worked through all wizards, the Wizards entry
moves to the bottom end of the menu.
61
Note
Some pages of the Wizards have a different content in access point mode and
client mode. In this case, there is a separate description for the alternatives.
You can specify the mode in the System menu.
62
5.4
Basic Wizard
5.4.1
IP Settings
Description
One of the basic steps in configuration of an Ethernet device is setting the IP
address. The IP address identifies a device in the network uniquely. On this page,
you enter the information for IP configuration of the SCALANCE W78x.
63
64
5.4.2
System name
Description
The device name also identifies a network node but means more to the user than
the IP address.
65
5.4.3
Country Code
Note
The correct country setting is mandatory for operation complying with the
approvals. Selecting a country different from the country of use can lead to legal
prosecution!
Description
Some countries have different frequency band divisions for WLAN communication.
The regulations for maximum output power also differ from country to country.
When you configure the SCALANCE W78x, you must specify which local
regulations are relevant for your location. You do this with the Country code
parameter.
66
5.4.4
Description
On this page, you specify the configuration of the wireless network. This includes
the network name and the transmission mode. If you are configuring the
SCALANCE W788-2PRO and SCALANCE W788-2RR models, this page appears
a second time to allow you to configure the second wireless adapter. You can
make different settings for "WLAN1" and "WLAN2".
67
5.4.5
Description
In the Client mode, there is also the check box Connect to ANY SSID. The other
settings correspond to those of the access point mode.
68
5.4.6
If there is precisely one MAC address to be served downstream from the client,
there are two ways of doing this:
Automatically, the client adopts the source MAC address of the first frame
that it receives over the Ethernet interface.
Manual entry by the user.
These settings have no effect on communication with standard Wi-Fi devices.
Note
The layer 2 tunneling setting is available only with the following model variants:
SCALANCE W78x in client mode
SCALANCE W746-1PRO
SCALANCE W747-1RR
The SCALANCE W746-1PRO and SCALANCE W747-1RR devices can also
provide access to a wireless network for several Ethernet devices (IP mapping).
For an access point with MAC filtering, only one MAC address is visible to the
SCALANCE W78x client, there can be no filtering according to the MAC addresses
of the Ethernet devices.
69
70
71
5.4.7
Description
The SCALANCE W78x uses a specific channel within the frequency band for
communication. You can either set this channel specifically or configure the
SCALANCE W78x so that the channel is selected automatically. A specific channel
must be set, for example, in the following situations:
Use of the redundancy function. In this case, two well spaced channels or two
different frequency bands must be selected.
Use of WDS. In this case, select a problem-free channel that is also used by
the WDS partner.
72
Notice
When operating a second wireless adapter, make sure that there is adequate
channel spacing.
73
5.4.8
Finish
Description
This page displays the parameters you have selected when you have completed all
the entries for the basic configuration. The setting Adopt MAC Address and the
note on the iPCF Wizard is displayed only in client mode.
If you use a SCALANCE W788-1RR or SCALANCE W788-2RR in client mode and
want to operate it in a iPCF network, you can enter the necessary settings using
the iPCF Wizard link.
Finish button
Click this button to close the Basic Wizard and to log on again with the modified IP
address. Alternatively, click on the Security Wizard link to change to the security
settings.
74
5.5
Security Wizard
Introduction
With the Security Wizard, you can specify security-related parameters without
detailed knowledge of security technology in wireless networks.
Note
The SCALANCE W78x can be operated even if you do not set the security
parameters. Depending on the properties of your network, there is then, however,
an increased risk of unauthorized access. You should therefore work through all
the pages of the Security Wizard, so that you have at least basic security functions.
75
5.5.1
Security Settings
Password
First, set a new admin password. Enter the string twice in the text boxes of this
page. The password can be up to a maximum of 31 characters long.
Until you set a password, the defaults set in the factory apply: The default
password for the admin user is admin. You can use the wizards only if you log on
as administrator.
76
5.5.2
77
5.5.3
78
5.5.4
Description
On this page, you make the security settings, including, for example, the
authentication and encryption. If you are configuring the SCALANCE W788-2PRO
or SCALANCE W788-2RR models, these pages appear a second time to allow you
to configure the second wireless adapter. You can make different settings for
WLAN1 and WLAN2.
allowing only certain clients (those that have enter the network name (SSID) of
the AP) to communicate with the SCALANCE W78x.
excluding clients that communicate over wireless connections from the wired
part of the network.
79
80
Note
Since no encryption is used for the SSID transfer, this function can only provide
basic protection against unauthorized access. The use of an authentication method
(for example WPA (RADIUS) or WPA-PSK if this is not possible) provides higher
security. You must also expect that certain end devices may have problems with
access to a hidden SSID.
Example 1:
Example 2:
Note
On a SCALANCE W788-2xx, the Inter SSID communication function must be
enabled on both WLAN interfaces or on all VAPs to allow communication between
the clients with different SSIDs.
Note
If VLANs are configured for the SSIDs, this setting can prevent communication
between the SSIDs according to the VLAN rules.
Intracell blocking
This setting prevents WLAN client communication within an SSID.
Ethernet blocking
This setting prevents WLAN client communication over the Ethernet interface
of the access point.
Disabled
This setting enables both WLAN client communication within an SSID as well
as WLAN client communication over the Ethernet interface.
To illustrate the situation, there is an overview of the effects of the Inter SSID
Communication and Intracell Communication settings below.
81
Settings
Inter SSID
communication
Intracell
Communication
Possible Communication
within
an SSID
Enabled
Disabled
Enabled
Intracell
blocking
Enabled
Ethernet
blocking
Disabled
Disabled
Disabled
Intracell
blocking
Disabled
Ethernet
blocking
with
another
SSID
to the Ethernet
network
x
x
x
82
5.5.5
83
The following table indicates what the various security levels involve.
Visible in Level
Wizard
Authentication
Encryption
Type of
Encryption
Encryptio
n key
source
None
Open System
disabled
without
not
applicabl
e
None
Open System
local
Low
Shared Key
enabled
WEP / AES
local
enabled
WEP
Server
High
WPA-PSK
(preshared Key)
enabled
TKIP / AES
local
Highest
WPA (Radius)
enabled
TKIP / AES
Server
High
WPA2-PSK
(preshared Key)
enabled
TKIP / AES
local
Highest
WPA2 (Radius)
enabled
TKIP / AES
Server
High
WPA-Auto-PSK
(preshared Key)
enabled
TKIP / AES
local
Highest
WPA-Auto
(Radius)
enabled
TKIP / AES
Server
Authentication
Authentication basically means that some form of identification is required.
Authentication therefore protects the network from unwanted access. In the
Security Level box, you can choose between the following types of authentication:
84
High (WPA2-PSK)
WPA2-PSK is based on the WPA2 standard, WPA authentication, however,
operates without a RADIUS server. Instead of this, a key (pass phrase) is
stored on every client and access point and this is used for authentication and
further encryption. AES or TKIP is used as the encryption method, AES
represents the standard method.
Highest (WPA2)
WPA2 (Wi-Fi Protected Access 2) is a further development of WPA and
implements the functions of the IEEE 802.11i security standard. WPA2 uses
the additional encryption protocol CCMP that allows fast roaming in mobile ad
hoc networks with its preauthentication. A client can log on in advance and
several access points so that the normal authentication can be omitted.
A RADIUS server is used to authenticate the client with an access point. The
client logs on at a RADIUS server based on a certificate (EAP-TLS) or a
combination of user name and password (EAP-PEAP or EAP-TTLS / internal
authentication method MSCHAPv2). As an option, the RADIUS server then
identifies itself to the client using a certificate. Following successful
authentication, the client and RADIUS server generate key material that is
used for data encryption. AES or TKIP is used as the encryption method, AES
represents the standard method.
High (WPA-Auto-PSK)
Setting with which an access point can process both the WPA-PSK as well as
WPA2-PSK type of authentication. This is necessary when the access point
communicates with different clients, some using WPA-PSK and others WPA2PSK. The same encryption method must be set on the clients.
Highest (WPA-Auto)
Setting with which an access point can process both the WPA and WPA2 type
of authentication. This is necessary when the access point communicates with
different clients, some using WPA and others WPA2. The same encryption
method must be set on the clients.
85
Encryption
Encryption protects the transferred data from eavesdropping and corruption. You
can only disable encryption in the Encryption check box if you have selected Open
System for authentication in the Basic WLAN menu. All other security methods
include both authentication and encryption. Various schemes are used for
encryption:
86
5.5.6
87
With the Auto setting, the maximum key length is also 128 bits.
5.5.7
88
5.5.8
89
5.5.9
Note
The key can be 8 to 63 ASCII characters or exactly 64 hexadecimal characters
long. It should be selected so that is complex for example consisting of random
numbers, letters (upper-/lowercase), have few repetitions and special characters).
Do not use known names, words or terms that could be guessed. If a device is lost
or if the key becomes known, the key should be changed on all devices to maintain
security.
90
91
5.5.12 Finish
Exiting the Wizard
The last page of the wizard indicates other security measures that you can take. If
you still want to make final modifications, you can open the relevant pages by
clicking on the texts highlighted in blue:
IP Filter
opens the Security > Access page.
Finish button
Click the Finish button to exit the Wizard. Your settings only take effect after you
have restarted (System > Restart menu).
92
5.6
iPCF Wizard
Note
The iPCF Wizard is available only in client mode of the SCALANCE W788-1RR or
SCALANCE W788-2RR.
Note
The iPCF wizard also includes pages for specifying security settings. If you use
iPCF, you do not therefore need to work through the Security Wizard.
5.6.1
93
Note
When using iPCF, the following maximum data rates must be taken into account
when setting the access point:
Wireless standard Max. data rate
IEEE 802.11a/h 12 Mbps
IEEE 802.11b
11 Mbps
IEEE 802.11g
12 Mbps
94
Note
If only one antenna is connected, the connected antenna must be set permanently.
The second antenna socket must also have a 50 terminator fitted.
95
5.6.2
Med (encryption)
Static keys are used. This is the recommended setting and you should use a
128-bit AES key.
96
5.6.3
97
With the Auto setting, the maximum key length is also 128 bits.
5.6.4
Finish
Finish button
Click the Finish button to exit the iPCF Wizard. Your settings only take effect after
you have restarted (System > Restart menu).
98
6.1
6.1.1
Introduction
Note
You should only use the command line interface if you are an experienced user.
Even commands that bring about fundamental changes to the configuration are
normally executed without a prompt for confirmation.
99
Configuration Using Web Based Management and the Command Line Interface
Required Experience
To be able to use the information in this chapter effectively, you should have a
thorough knowledge of network technology and WLANs.
6.1.2
100
Configuration Using Web Based Management and the Command Line Interface
6.1.3
Navigation Bar
You will find the following links in the upper menu bar of Web Based Management
(WBM):
Console
This link opens a console window in which you can enter CLI commands.
Support
When you click this link, you open a SIEMENS AG support page in the
Internet.
Logout
Close the current Web Based Management session by clicking on this link. The
logon dialog is then displayed again.
Help
Clicking on this link opens the online help of Web Based Management in a
separate browser window.
101
Configuration Using Web Based Management and the Command Line Interface
6.1.4
Open a Windows console and type in the command telnet followed by the IP
address of the SCALANCE W78x:
C:\>telnet <IP address>
2.
As an alternative, you can also enter the command telnet followed by the IP
address of the SCALANCE W78x in the Start > Execute menu.
Directory Structure
Before you can enter a command in the Command Line Interface, you must first
open the required menu or submenu. This section lists the commands of each
menu in a separate table. The menu itself is shown above the table on a gray
background. The table lists only the commands themselves.
102
Configuration Using Web Based Management and the Command Line Interface
Alternative input values are separated by the pipe character. In this case, you
specify one of the listed values as the parameter.
Example:
[E|D]
You must enter either E or D.
Cross-menu Commands
You can use the commands in the following table in any menu.
Description
Comment
exit
Cannot be called
using the command
shortcuts.
restart
Cannot be called
using the command
shortcuts.
info
103
Configuration Using Web Based Management and the Command Line Interface
6.2
6.2.1
IP address
Subnet mask
Gateway address
DHCP flag
System name
System location
System contact
Device mode
Country code
104
Configuration Using Web Based Management and the Command Line Interface
After logging in, you then obtain the Country List with the following headers:
---------------------------------------------------------------------------------------------------COUNTRY
| MODE
| CH | MHz | PWR(EIRP) | USAGE
---------------------------------------------------------------------------------------------------The table lists the permitted wireless modes and channels along with the
corresponding channel frequencies for every possible country setting. The
PWR(EIRP) rubric contains the permitted limit values for the transmit power,
measured at the antenna. These values include the transmit power of the access
point and the antenna gain of the antenna being used.
Note
In the version for USA/Canada, you cannot select a country. The frequency bands
for these countries are already preset.
105
Configuration Using Web Based Management and the Command Line Interface
Notice
After changing to the HiPath Access Point mode, the access point is returned to its
default status; in other words, the configuration is lost.
If your access point was already configured and you want to use the configuration
later, save it before you change over as described in Section 6.2.11, Load & Save.
Follow the steps outlined below to change the SCALANCE W788-2RR to the
HiPath Access Point mode:
106
Configuration Using Web Based Management and the Command Line Interface
1. Connect the access point with the HiPath Wireless Controller and with the
configuration computer over the Ethernet interface.
2. If the access point is brand new, assign an IP address.
If a DHCP server is visible, the access point is assigned an IP address
automatically. Otherwise, assign the access point an IP address using the
Primary Setup Tool (PST) (see Section 4, Configuring the IP Address with the
Primary Setup Tool).
3. Connect your configuration computer with the access point in the Web browser
and open Web Based Management (WBM) to the System Information page
with W788-2RR > System (see Sections 5.1 and Fehler! Verweisquelle
konnte nicht gefunden werden.).
4. In the Device Mode list, select HiPath Access Point and confirm this with Set
Values. During configuration make sure that the SCALANCE W78x is assigned
an IP address suitable for the HiPath Wireless Controller.
5. A blue message "Restart to apply changes" appears above the System
Information WBM page.
Click on the blue message. The Restart window opens.
Confirm the restart by clicking on the Restart button.
The access point runs a restart.
107
Configuration Using Web Based Management and the Command Line Interface
6. During the restart, the access point connects to the HiPath Wireless Controller.
7. The access point loads the current HiPath firmware for the W788 from the
HiPath Wireless Controller and runs a restart.
The HiPath firmware is retained in the RAM of the AP when there is a restart
due to reconfiguring with the HiPath Wireless Controller.
The HiPath firmware for the SCALANCE W788 has the following name
W788-<Version>.img,
where <Version> stands for the current version number.
Note
After starting up with the HiPath firmware, the access point can no longer be found
with the PST.
Note
Operating SCALANCE W client modules (W74x or W788 in client mode) on a
HiPath access point or SCALANCE W access point in HiPath Access Point mode
involves the following restrictions:
The IP configuration of the WLAN client module (WBM page System > IP
Settings) must not be set on to DHCP server. It may be necessary to reserve
a range of IP addresses for the fixed IP settings of the WLAN client modules.
The MAC Mode parameter on the WBM page Interfaces > WLAN must not be
set to Adopt own MAC (see Section 6.3.2, WLAN).
The WBM and Telnet of the WLAN client module can only be reached over
Ethernet.
After loading the HiPath firmware, the R1 and R2 LEDs indicate the enabled
antenna ports:
R1 lit
The upper antenna connectors A1 and B1 are enabled (transmission standard
IEEE 802.11a).
R2 lit
The lower antenna connectors A2 and B2 are enabled (transmission standard
IEEE 802.11b/g).
Note
In HiPath Access Point mode, the LEDs of the SCALANCE W788 have a different
significance compared with that in the Access Point or Client mode.
108
Configuration Using Web Based Management and the Command Line Interface
Note
In HiPath Access Point mode, the following restrictions apply
The following table shows the significance of the LEDs of the HiPath access point
AP2600 and the SCALANCE W788-2RR in the HiPath Access Point mode:
HiPath AP2600
SCALANCE W788-2RR in
HiPath Access Point mode
LED
(meaning)
Color
---
P1
(Ethernet port)
Yellow/green
---
L2
(power supply Ethernet)
Green
LED
Color
5 GHz
Green
R1
Green
2.4 GHz
Green
R2
Green
Middle
Yellow
R1 + R2
Yellow
L1
(power supply M12)
Green
F
(fault)
Red
--Middle
Red
For the arrangement of the LEDs on the device, refer to Figure 2-1 "The LEDs of
the SCALANCE W78x".
For information on the other steps in configuration, refer to the manual HiPath
Wireless Controller, Access Points and Convergence Software - User Guide.
109
Configuration Using Web Based Management and the Command Line Interface
Note
Please note that if you install the SCALANCE W788 outdoors, some of the
channels used indoors may not be used.
The approval of indoor and outdoor channels is country-specific. If the SCALANCE
W is operated outdoors, make sure that the device is not exposed to rain (installed
under a roof) and is not exposed to direct sunlight (installed with UV protection).
You will find more detailed information on HiPath Wireless, at
http://www.siemens.com/hipath
apmode [E|D|H]
Description
Comment
110
Configuration Using Web Based Management and the Command Line Interface
Command
country
[AR|AT|AU|BE|BR|BG|CA|
CH|CL|CN|CZ|DE|DK|ES|
FI|FR|GB|GR|HK|HU|IE|
IN|IS|IT|JP|J3|KR|KW|
LI|LU|NL|NO|PO|PT|RU|
SE|SG|TR|US|ZA]
Description
Specifies properties for specific countries.
The country codes comply with ISO 3166,
however the SCALANCE W78x supports
only the codes listed in the left-hand
column.
AR
Argentina
AT
Austria
AU
Australia
BE
Belgium
BR
Brazil
BG
Bulgaria
CA
Canada
CH
Switzerland
CL
Chile
CN
China
CZ
Czech Republic
DE
Germany
DK
Denmark
ES
Spain
FI
Finland
FR
France
GB
Great Britain
GR
Greece
HK
Hong Kong
HU
Hungary
IE
Ireland
IN
India
IS
Iceland
IT
Italy
JP
Japan
J3
Japan Old
KR
Korea
KW
Kuwait
LI
Liechtenstein
LU
Luxembourg
NL
Netherlands
NO
Norway
PO
Poland
PT
Portugal
RU
Russia
SE
Sweden
SG
Singapore
TR
Turkey
US
United States of America
ZA
South Africa
Comment
This command is not
available in the version
for USA / Canada.
111
Configuration Using Web Based Management and the Command Line Interface
Command
Description
Comment
Maximum of 255
characters. If you want
to use the name in WDS
or redundancy, the
maximum length is 32
characters.
location [location]
Maximum of 255
characters.
contact [name]
Maximum of 255
characters.
Telnet only
password [admin|user]
[password]
Maximum of 31
characters.
6.2.2
Configuration
Here, you decide whether you will use a DHCP server or whether you want to
assign a fixed IP address to the SCALANCE W78x. You can also set the IP
address of a router and the default TTL. The TTL (time to live) parameter specifies
the maximum number of routers passed through by a data packet before it is
discarded.
Note
If you use a Radius server for authentication, this must the accessible over the
management VLAN.
112
Configuration Using Web Based Management and the Command Line Interface
Description
dhcp [E|D]
dhcptype [M|N|C]
clientid
ip [IP address]
Comment
Default value: 64
113
Configuration Using Web Based Management and the Command Line Interface
6.2.3
Configuration
Here, you select the services with which access to the SCALANCE W78x will be
possible. If, for example, the SNMP Enabled check box is not selected, neither
write nor read access is possible using the SNMP protocol (v1,v2c,v3). If the
SNMP protocol is not permitted, it is not possible to send SNMP traps.
To improve security, you should only enable the services that you actually use.
Notice
Over SNMP, it is possible to disable all services and to allow read access only over
SNMP. Following this, no further configuration of the SCALANCE W78x is possible.
If you only want to enable secure access over HTTPS when configuring the device,
select the HTTPS only check box.
If you want to enable the response of the device to Ping signals, select the Ping
enabled check box.
With the integrated SSH server, you have secure access to the CLI. In contrast to
Telnet, the entire communication including user authentication is encrypted.
114
Configuration Using Web Based Management and the Command Line Interface
Description
telnet [E|D]
ttimeout [E|D]
ttimeout [time in s]
snmp [E|D]
mail [E|D]
web [E|D]
https [E|D]
ping [E|D]
psu [E|D]
ssh [E|D]
Comment
Only WEB and SNMP
115
Configuration Using Web Based Management and the Command Line Interface
6.2.4
Restart button
Click this button to restart the SCALANCE W78x. During a restart, the
SCALANCE W78x is reinitialized, the internal firmware is reloaded, and the
SCALANCE W78x runs a self-test. The entries that have been learned in the
address table of the SCALANCE W78x are deleted. You can leave the browser
window open while the SCALANCE W78x restarts.
IP address
Subnet mask
Gateway address
SSID
DHCP flag
System name
System location
System contact
Device mode
Country code
There is no automatic restart. This allows you to enter data using Web Based
Management before the restart. The changes take effect only after a restart.
If you are logged on as user, the Restore Memory Defaults button is not visible.
116
Configuration Using Web Based Management and the Command Line Interface
Description
restart
memreset
defaults
Comment
The restart command can
be called from all menus,
however not using the
shortcut commands.
117
Configuration Using Web Based Management and the Command Line Interface
6.2.5
Error in authentication.
Changing the power supply of the SCALANCE W78x. Evaluation of this event
is only useful when using a redundant power supply.
If you use the SCALANCE W78x as an Access Point, you can configure additional
system events:
118
Configuration Using Web Based Management and the Command Line Interface
The SCALANCE W78x indicates an error (the error LED lights up).
By selecting the appropriate check boxes, you specify which events trigger which
reactions on the SCALANCE W78x. With the check box in the Functions enabled
row, you enable or disable the sending of E-mails or triggering of SNMP traps.
CLI\SYSTEM\EVENT>
Command
Description
Comment
119
Configuration Using Web Based Management and the Command Line Interface
Command
Description
Comment
This command is
available only on the
SCALANCE W788-1RR
and SCALANCE W7882RR models but not in
client mode.
This command is
available only on the
SCALANCE W788-1RR
and SCALANCE W7882RR models but not in
client mode.
120
Configuration Using Web Based Management and the Command Line Interface
6.2.6
Description
mail [E|D]
Comment
Several E-mail addresses
can be entered separated
by semicolons.
121
Configuration Using Web Based Management and the Command Line Interface
6.2.7
Configuration
Select the check boxes of the entries according to the SNMP functionality you want
to use. SNMP version 3 allows permissions to be assigned and protocol level,
authentication, and encryption. You specify groups and users in the Groups and
Users submenus. You can also make entries there if the
SNMPv3 enabled check box is not selected, however the entries are not applied.
Notice
When using SNMP version 3, you should disable SNMP V1 and V2c because the
security settings of SNMP V3 can be bypassed by access over SNMP V1 or V2c.
Trap Submenu
Here, you enter the IP addresses of up to 10 trap receivers. The SCALANCE W78x
sends a trap to all the addresses you enter if their Enable trap check boxes are
selected.
Note
During a warm or cold restart with a wireless connection ( AP client, WDS, or
WRED), there is no guarantee that the recipient can be reached at the time when
the trap is sent. This leads to a loss of the message.
Groups Submenu
This page displays the SNMPv3 groups. You can create a new group by clicking
the New button and specifying the group name, the security level, and the write or
read permissions.
You can delete a group by selecting the check box in the Del column and clicking
the Set Values button. If members are already entered in the group, you cannot
delete the group nor is it possible to change the security level of the group.
122
Configuration Using Web Based Management and the Command Line Interface
Security Level
Special Features
Comment
None
No authentication, no
encryption.
Auth/No Priv
Auth/Priv
Users Submenu
This page displays the SNMPv3 users. You can create a new user by clicking the
New button and specifying the user name and the group to which the user will
belong. If necessary, you must also enter the passwords for the authentication and
for the encryption.
You can delete a user by selecting the check box in the Del column and clicking
the Set Values button.
123
Configuration Using Web Based Management and the Command Line Interface
Description
Comment
snmp [E|D]
Enables / disables
SNMPv1, v2c, v3 and
Traps.
snmpv1 [E|D]
Enables / disables
SNMPv1, v2c and traps.
snmpv3 [E|D]
snmpro [E|D]
getcomm
[Read community string]
setcomm
[Write community string]
traps [E|D]
124
Configuration Using Web Based Management and the Command Line Interface
CLI\SYSTEM\SNMP\GROUP>
Command
Description
Comment
add <Name>
[NOAUTH|AUTH|PRIV]
[R|W]
edit <Index>
[NOAUTH|AUTH|PRIV]
[RE|RD|WE|WD]
delete <Index>
clearall
125
Configuration Using Web Based Management and the Command Line Interface
CLI\SYSTEM\SNMP\USER>
Command
Description
Comment
The authentication
password and the
encryption password can
be a maximum of 63
characters long.
edit <index>
<group name>
[NONE|MD5|SHA]
[authentication ID]
[Encryption ID]
delete <Index>
clearall
CLI\SYSTEM\SNMP\TRAP>
Command
Description
traps [E|D]
settrap <entry>
<IP address>
<E|D>
Comment
Traps are then enabled, if
SNMP v1, v2c is also
enabled.
126
Configuration Using Web Based Management and the Command Line Interface
6.2.8
127
Configuration Using Web Based Management and the Command Line Interface
128
Configuration Using Web Based Management and the Command Line Interface
Description
Comment
info
logs
auths
[D|E]
[D|E]
129
Configuration Using Web Based Management and the Command Line Interface
6.2.9
Description
tzone [hours]
Comment
130
Configuration Using Web Based Management and the Command Line Interface
CLI\SYSTEM\FAULT>
Command
Description
Comment
fault [OFF]
ipacknow [Index|All]
linkack [Index|All]
131
Configuration Using Web Based Management and the Command Line Interface
You can transfer the following data from external files to the SCALANCE W78x:
Note
When you download the configuration data to a SCALANCE W78x, a restart is
performed so that the new data is adopted correctly. The restart takes place
automatically during the loading of HTTP and TFTP. The device can no longer be
reached using the old IP address if the downloaded configuration data contains a
new IP address.
132
Configuration Using Web Based Management and the Command Line Interface
Note
As of firmware version V3.0, the file with the configuration data of the AP also
includes the following information
Order number (MLFB) of the device with which the configuration file was
created
It is necessary that the configuration on the C-PLUG was generated with a
firmware version the firmware version on the destination device.
Example:
Configuration files generated with a device with firmware version V2.4 or older, can
be loaded on devices with firmware version V3.0 without causing problems.
Configuration files generated with a device with firmware version V3.0, cannot,
however, be loaded on devices with firmware version V2.4 or older.
133
Configuration Using Web Based Management and the Command Line Interface
4. Specify the name of the file (maximum 32 characters) from which the data will
be taken or where the data will be saved in the relevant text box for the
configuration data or firmware.
5 Start the save function by clicking the Save button. Start the load from file
function by clicking the Load button.
Configuration Package
If security certificates for the client and/or server are installed on a client, when the
configuration is saved, the client provides the option of saving the configuration file
with the certificates as a configuration package. With the aid of the configuration
package, clients can be replicated simply; in other words, identical settings AND
certificates are transferred to the clients in one step. Just as when you download
the configuration file, this is followed by a restart. No special measures are
necessary when downloading the configuration because the SCALANCE W
automatically recognizes the type of configuration file. As a result, it is only possible
to assign one common name for the configuration file or configuration package.
Description
Comment
fwload
fwsave
cfgload
cfgsave
logsave
server
[IP address]:[port number]
cltcert <certificate>
cltpass <password>
cltload
134
Configuration Using Web Based Management and the Command Line Interface
Command
Description
Comment
cltsave
srvcert <certificate>
srvload
srvsave
cltdel
srvdel
pkgsave
Note
The functionality can be controlled over SNMP with the OID
1.3.6.1.4.1.4196.1.1.4.100.1.5.1.19 (snDownloadEcmCfgPackageControl).
Working with this function is analogous to working with the other OIDs in this
group.
135
Configuration Using Web Based Management and the Command Line Interface
ACCEPTED
A C-PLUG with a valid and suitable content is inserted in the device.
136
Configuration Using Web Based Management and the Command Line Interface
NOT ACCEPTED
C-PLUG missing or invalid or incompatible content of an inserted CPLUG. The status is also displayed when the C-PLUG was formatted
during operation.
NOT PRESENT
No C-PLUG is inserted in the device.
137
Configuration Using Web Based Management and the Command Line Interface
After making your selection, start the function by clicking the Modify button.
138
Configuration Using Web Based Management and the Command Line Interface
The C-PLUG contains bad data or data for a different device type.
139
Configuration Using Web Based Management and the Command Line Interface
Description
Comment
initdef
initmem
bootfrom [MEMORY]
preplug <dev>
140
Configuration Using Web Based Management and the Command Line Interface
6.3
Interfaces Menu
Introduction
The SCALANCE W78x has one Ethernet interface and up to two WLAN interfaces
that can be configured separately. In the pages of this menu, you can configure
both the wired Ethernet interface and the WLAN interface.
With the menu command Interfaces > WLAN12 > Virtual AP count in the Access
Point mode, you can also configure up to eight virtual access points (VAP0
VAP7) per wireless interface.
Note
VAPs are visible only after an AP count > 0.
6.3.1
Note
If you specify the mode, you must make the same settings on the partner device.
141
Configuration Using Web Based Management and the Command Line Interface
Description
ethspeed [A|100F|100H|
10F|10H]
ethcross [E|D]
Comment
142
Configuration Using Web Based Management and the Command Line Interface
6.3.2
Transmission Mode
Specify the transmission mode in the Wireless Mode list box. If you have used the
Basic Wizard, a value is already entered here.
Note
IEEE 802.11h transmission (only in Access Point mode):
It is not possible to select the 802.11h protocol in all country settings. It is specified
by the configuration of Country code on the System page.
If the 802.11h protocol is selected, after applying the configuration with Set Values,
the comment (DFS is active for this country code appears behind the Enable
Interface check box.
With the automatically enabled Dynamic Frequency Selection function (DFS), prior
to communication, the access point checks whether configured or selected channel
(see Auto Channel Select) is free of signals from a primary user (for example
radar).
143
Configuration Using Web Based Management and the Command Line Interface
If signals of a primary user are found on the configured or selected channel, the
access point follows the procedure outlined below:
Communication with clients is started only when no primary user has been
discovered on the selected channel for one minute.
Outdoor AP mode (Access Point mode) / Outdoor Client mode (Client mode)
The SCALANCE W78x can be operated either in the indoor or outdoor AP mode.
In indoor AP mode, all the country-dependent permitted channels and transmit
power settings are available for operation in a building. In outdoor AP mode, the
selection of country-dependent channels and the transmit power for operation are
restricted for outdoor use. If the SCALANCE W is operated outdoors, make sure
that the device is not exposed to rain (installed under a roof) and is not exposed to
direct sunlight (installed with UV protection).
You enable this mode by selecting Outdoor AP mode.
Channel Selection
Select the Auto Channel Select check box if you want the SCALANCE W78x to
search for a free channel itself. If you want to specify a specific channel, make sure
that Auto Channel Select is not selected. You can specify a suitable channel in the
Radio Channel list box.
Auto Channel Select does not exist in the client mode. You can only set a channel
in the ad hoc mode.
IEEE 802.11h transmission:
If you have selected the 802.11h protocol for transmission in access point mode
and Auto Channel Select is not selected, the Alt. radio channel input box is
displayed below Radio channel. Here, you can select the alternative channel in
case signals of a primary user are found on the main channel.
Make sure that the alternative channel is not being used by other access points.
In the IEEE 802.11h transmission mode, it is not practical to select the WDS mode
at the same time. In WDS mode, all SCALANCE W78x devices must use the same
channel. If a signal from a primary user is detected by an AP, the channel is
changed automatically and the existing connection is then terminated.
144
Configuration Using Web Based Management and the Command Line Interface
Note
The layer 2 tunneling functionality is supported by SCALANCE W 788 access
points as of firmware version V3.1. This setting meets the requirements of
industrial applications in which MAC address-based communication with several
devices downstream from the client is required. Clients with this setting cannot
connect to standard Wi-Fi devices and SCALANCE W access points with firmware
V3.0 or older.
145
Configuration Using Web Based Management and the Command Line Interface
Set values
Apply the configuration by clicking Set Values.
If you have configured virtual access points (Virtual AP count > 0), in access point
mode, you will be requested to run a restart on the SCALANCE W78x after
clicking Set Values.
146
Configuration Using Web Based Management and the Command Line Interface
Description
Comment
port [E|D]
mode [A|B|G|H|T|U|X]
autoch [E|D]
channel [1...167]
altchan [channel]
autoadopt [E|D|OWN|L2T]
adhoc [E|D]
anyssid [E|D]
vapno [0...7]
outdoor [E|D]
802.11 g
ADVANCED
DATARATES
VAP1
147
Configuration Using Web Based Management and the Command Line Interface
Command
Description
Comment
VAP2
VAP3
VAP4
VAP5
VAP6
VAP7
148
Configuration Using Web Based Management and the Command Line Interface
6.3.3
Advanced Submenu
Transmit Power
In the Transmit Power list box, you can specify the output power of the
SCALANCE W78x. It may be necessary to reduce the transmit power when using
antennas to avoid exceeding the maximum legal transmit power. Reducing the
transmit power effectively reduces cell size.
Beacons
Beacons are packets that are sent cyclically by a SCALANCE W78x to inform
clients of its existence. In the Beacon Interval text box, you specify the interval at
which the SCALANCE W78x sends beacons.
Only in the access point mode and with the client in the ad hoc mode
The Beacon Rate list box specifies the data rate of beacons. The higher the data
rate, the shorter the transmission range.
Only in access point mode
The Data Beacon Rate DTIM (Delivery Traffic Indication Map) parameter specifies
how often the SCALANCE W78x sends broadcast and multicast packets over the
wireless interface. If you enter 1 in this box, the SCALANCE W78x transmits
broadcast and multicast packets directly after each beacon (recommended setting
for normal network environments). The value 5 would mean that the SCALANCE
W78x collects the broadcast and multicast packets and sends them after every fifth
beacon.
Increasing this value allows a longer sleep mode for the clients but means a
greater delay for broadcast and multicast packets.
RTS/CTS
RTS/CTS (Request To Send/Clear To Send) is a method for avoiding collisions
based on the exchange of status information before sending the actual data
(Hidden node problem). To minimize network load resulting from the additional
protocol exchange, this method is used only when a packet size that you select
with the RTS/CTS Threshold is exceeded.
149
Configuration Using Web Based Management and the Command Line Interface
Fragmentation
The Fragmentation Length Threshold parameter specifies the maximum package
size transferred on the radio link. Large packets are divided up into small packets
prior to transmission and then reassembled into the original size after they have
been received. This can be beneficial if the transmission quality is poor because
larger packets are more difficult to transmit. However fragmentation into smaller
packets means a poorer throughput.
Repetitions
There are two situations in which packets are repeated. The hardware repetition is
performed by the WLAN chip itself when it tries to repeat an unacknowledged
packet immediately. The number of attempted repetitions is specified with the HW
Retry number parameter.
If the number of retries is reached without success, the packet is temporarily
withdrawn and all other packets in the buffer are sent first. Following this,
transmission of the packet is attempted again. The number of such repetitions is
specified with the SW Retry number parameter.
Using Use SW Retry, the software repetition mechanism can be enabled or
disabled.
Antenna Gain
The Antenna Gain parameter describes the antenna gain in dBi of an antenna
connected to a SCALANCE W.
There are now two boxes that can be selected: "Antenna Gain" and "Antenna
Type". If "Antenna Type" is set to "User Defined", any antenna gain can be entered
in Antenna Gain. Otherwise, the preconfigured value of the selected "Antenna
Type" is displayed.
It is necessary to set a specific value to make sure that the regulations of the
national authorities are adhered to. The national authorities, for example, specify all
usable channels, the corresponding maximum transmit power and other conditions
of use. You will find more detailed information on the regulations in your country
using the countrylist.log.
150
Configuration Using Web Based Management and the Command Line Interface
Based on the settings for antenna gain and transmit power, the SCALANCE W
automatically selects the permitted channels. Under some circumstances, there
may be fewer permitted channels available for antennas with a higher antenna gain
than for antennas with a lower antenna gain.
The entries for the Siemens antenna models are supported in the Web interface by
an < Antenna type> selection list that automatically enters the correct value in the
input box. The values entered automatically take into account the different lengths
of the antenna connecting cables shown in the selection list following the type
name.
Note
If you select User defined, you have the option of entering dBi values as integers
for the antenna gain in the range from 0 through 30 dBi. Please remember to take
the losses of the antenna connecting cable into account.
Antennas
The Antenna Mode list box specifies the use of antennas.
The Diversity setting takes the best of the two antennas for the data
transmission. For each WLAN interface, both antennas must be connected.
Both antennas should also be of the same type and they should also illuminate
approximately the same space. If an access point is operated with the diversity
setting and the two antennas span different cells, this can have negative
effects.
151
Configuration Using Web Based Management and the Command Line Interface
W A
E X
D O
U N
N O
G :
IO N
C O N
A R E
A R D
H A
N
A
O
Z A R D .
E C T E Q U IP M E N T
IS K N O W N T O B E
U S
A 2
X 1
L 2
P 1 F O R L A N
L 2 D C 2 4 V
A 2
O N L Y
S IE M E N S
Figure 6-1
R N IN
P L O S
N O T
L E S S
N H A Z
A 1
A 1
X 2
L 1 2 4 V D C
A N T E N N A
4 4 -7 2 -2 2
S V P J M
B 2
7 8 8 -1 S T 0 0 -2 A A 6
N E C C la s s 2
D C 2 4 V 0 ,3 A
1 2 3
B 1
S C A L A N C E W 7 8 8 -2 P R O
152
Configuration Using Web Based Management and the Command Line Interface
Description
802.1d
Tags
Highest priority
Allows multiple concurrent VoIP calls, with low
latency and toll voice quality
7, 6
5, 4
0, 3
WMM background
priority
2, 1
153
Configuration Using Web Based Management and the Command Line Interface
Description
Comment
power [0...4]
bkscan [D|I|A]
bkscanint [200...60000]
bkchannel [channels]
bkchsel [E|D]
force [E|D]
roamthr
154
Configuration Using Web Based Management and the Command Line Interface
Command
Description
Comment
swretry [E|D]
preamb [E|D]
antenna [A|B|SA|SB|D]
noise [A|L|M|H]
wmm [E|D]
antgain [0...30
anttype [0...n]
155
Configuration Using Web Based Management and the Command Line Interface
6.3.4
Note
The SSID List menu is available only when you use the SCALANCE W78x in Client
mode. You can specify the mode in the System menu.
If the Connect to ANY SSID check box is selected, the SCALANCE W78x in
client mode attempts to connect to the network with the best transmission
quality and with suitable security settings. If the Suppress SSID broadcasting
setting is made for an access point, the SCALANCE W78x cannot log on there
with the ANY SSID.
If this check box is not selected, the SCALANCE W78x attempts to connect to
the network from the SSID list that has the best transmission quality.
156
Configuration Using Web Based Management and the Command Line Interface
Description
Comment
edit <index>
<network name>
delete <Index>
6.3.5
Advanced G Submenu
157
Configuration Using Web Based Management and the Command Line Interface
802.11g Expansions
With the 802.11g Short Slot Time parameter, you specify whether or not the short
slot time is used. This short slot time should be supported by all
newer clients.
With the 802.11g Only Mode parameter, you can specify that only 802.11g clients
can log on at the access point and also that only 802.11g rates are permitted (only
in the access point mode). In this mode, only the OFDM modulation method is
used. This prevents 802.11b devices from registering. If 802.11g Only mode is
disabled, both 802.11b devices and 802.11.g devices can register with the access
point.
158
Configuration Using Web Based Management and the Command Line Interface
Description
Comment
Available only in the
access point mode.
ctsmode [0|1|2]
ctsrate [0|1|2|3]
ctstype [0|1]
sslot [E|D]
only11g [E|D]
overlap [E|D]
Optimize [1...4]
159
Configuration Using Web Based Management and the Command Line Interface
6.3.6
Figure 6-2
"edit" Screenshot:
160
Configuration Using Web Based Management and the Command Line Interface
Description
Comment
info
default
Rate
1
2
5.5
6
9
11
12
18
24
36
48
54
Example:
The command
"edit 5.5 d d"
disables the data rate 5.5
Mbps. The screenshot
shows the default setting
for the 802.11g mode.
X
X
X
X
X
X
X
X
X
X
X
X
|
|
|
|
|
|
|
|
|
|
|
|
X
X
X
X
161
Configuration Using Web Based Management and the Command Line Interface
6.3.7
Description
You can only complete the pages of the virtual access points VAP1...VAP7 if you
have configured virtual access points at the higher level Interfaces > WLAN (Virtual
AP count > 0).
On this page, you can assign a separate SSID to the virtual access points; in other
words, the access point operates in multiple SSID mode.
SSID
Enter the SSID of the VLAN here.
Make sure that you also store the SSID of this VLAN in the configuration of the
client that you assign to this VLAN.
Note
You can configure separate security settings for each virtual access point (see
Section 6.4.1, WBM menu Security > Basic WLAN > WLAN1/2 > VAP1...7).
The security settings of the VAPs must meet those of the relevant VLANs.
Description
vap [E|D]
Comment
162
Configuration Using Web Based Management and the Command Line Interface
6.4
Introduction
In this menu, you configure the security settings with which you want to operate
your SCALANCE W78x. Apart from selecting the authentication and encryption
scheme, this also includes the decision as to whether or not an external Radius
server is used and whether access is restricted based on MAC addresses (ACL).
Comment
mgmteth [E|D]
6.4.1
Description
Authentication
Authentication protects the network from unwanted access.
In the Authentication Type box, you can choose between the following types of
authentication:
Open System
There is no authentication. Encryption with a fixed key can be selected as an
option. You can choose between WEP or AES based on the key length (see
Section 6.4.2).
Note
With the SCALANCE W78x in iPCF mode, only this setting is possible.
163
Configuration Using Web Based Management and the Command Line Interface
Shared Key
In Shared Key authentication, a fixed key is stored on the client and access
point. This is then used for authentication and encryption. Once again, you can
choose between WEP or AES based on the key length (see Section 6.4.2).
Note
When using an open system with encryption or shared key in conjunction with
ACL lists, note the information in Section 6.4.3 ACL menu command..
WPA
Secure WPA/RADIUS authentication uses an external RADIUS server (IEEE
802.1x). With this method, the client logs on at a RADIUS server based on a
certificate (EAP-TLS) or a combination of user name and password (EAPPEAP or EAP-TTLS / internal authentication method MSCHAPv2). As an
option, the RADIUS server then identifies itself to the client using a certificate.
Following successful authentication, the client and RADIUS server generate
key material that is used for data encryption. AES or TKIP can be used as a
secure encryption method.
WPA-PSK
WPA authentication works without a RADIUS server (IEEE 802.1x). A fixed key
(Pre-Shared Key) is stored on every client and access point and is used for
authentication and further encryption. AES or TKIP can be used as a secure
encryption method.
Note
The key can be 8 to 63 ASCII characters or exactly 64 hexadecimal characters
long. It should be selected so that is complex for example consisting of random
numbers, letters (upper-/lowercase), have few repetitions and special
characters). Do not use known names, words or terms that could be guessed. If
a device is lost or if the key becomes known, the key should be changed on all
devices to maintain security.
802.1x (Radius)
Port-related access check over an external RADIUS server (IEEE 802.1x). With
this method, the client logs on at a RADIUS server based on a certificate (EAPTLS) or a combination of user name and password (EAP-PEAP or EAP-TTLS /
internal authentication method MSCHAPv2). As an option, the RADIUS server
then identifies itself to the client using a certificate. Following successful
authentication, the client and RADIUS server generate key material that is
used for data encryption. WEP is used as a weak encryption method.
164
Configuration Using Web Based Management and the Command Line Interface
WPA2-PSK
WPA2-PSK is based on the WPA2 standard, WPA authentication, however,
operates without a RADIUS server. Instead of this, a key (pass phrase) is
stored on every client
and access point and this is used for authentication and further encryption.
AES or TKIP is used as the encryption method, AES represents the standard
method.
WPA2
WPA2 (Wi-Fi Protected Access 2) is a further development of WPA and
implements the functions of the IEEE 802.11i security standard. WPA2 uses
the additional encryption protocol CCMP that allows fast roaming in mobile ad
hoc networks with its preauthentication. A client can log on in advance and
several access points so that the normal authentication can be omitted.
A RADIUS server is used to authenticate the client with an access point. The
client logs on at a RADIUS server based on a certificate (EAP-TLS) or a
combination of user name and password (EAP-PEAP or EAP-TTLS / internal
authentication method MSCHAPv2). As an option, the RADIUS server then
identifies itself to the client using a certificate. Following successful
authentication, the client and RADIUS server generate key material that is
used for data encryption. AES or TKIP is used as the encryption method, AES
represents the standard method.
WPA-Auto-PSK
Setting with which an access point can process both the WPA-PSK as well as
WPA2-PSK type of authentication. This is necessary when the access point
communicates with different clients, some using WPA-PSK and others WPA2PSK. The same encryption method must be set on the clients.
WPA-Auto
Setting with which an access point can process both the WPA and WPA2 type
of authentication. This is necessary when the access point communicates with
different clients, some using WPA and others WPA2. The same encryption
method must be set on the clients.
Encryption
Encryption protects the transferred data from eavesdropping and corruption. You
can only disable encryption if you have selected Open System for authentication.
All other security methods include both authentication and encryption.
165
Configuration Using Web Based Management and the Command Line Interface
Encryption Methods
If you have selected Open System including encryption or Shared Key as the
authentication, you will need to define a key in the Keys menu (see Section 6.4.2).
166
Configuration Using Web Based Management and the Command Line Interface
EAP TLS
Extensible Authentication Protocol - Transport Layer Security.
Uses certificates for authentication
EAP TTLS
Extensible Authentication Protocol - Tunnel Transport Layer
Security. After setting up the TLS tunnel, MS-CHAPv2 is used for internal
authentication.
PEAP
Protected Extensible Authentication Protocol. Alternative draft
protocol of IETF for EAP-TTLS
Note
Since no encryption is used for the SSID transfer, this function can only provide
basic protection against unauthorized access. The use of an authentication method
(for example WPA (RADIUS) or WPA-PSK if this is not possible) provides higher
security.
You must also expect that certain end devices may have problems with access to a
hidden SSID.
167
Configuration Using Web Based Management and the Command Line Interface
Example 1:
Example 2:
Note
On a SCALANCE W788-2xx, the Inter SSID communication function must be
enabled on both WLAN interfaces or on all VAPs to allow communication between
the clients with different SSIDs.
Note
If VLANs are configured for the SSIDs, this setting can prevent communication
between the SSIDs according to the VLAN rules.
Intracell blocking
This setting prevents WLAN client communication within an SSID.
Ethernet blocking
This setting prevents WLAN client communication over the Ethernet interface
of the access point.
Disabled
This setting enables both WLAN client communication within an SSID as well
as WLAN client communication over the Ethernet interface.
To illustrate the situation, there is an overview of the effects of the Inter SSID
Communication and Intracell Communication settings below.
168
Configuration Using Web Based Management and the Command Line Interface
Settings
Inter SSID
communication
Possible Communication
Intracell
Communication
within
an SSID
Enabled
Disabled
Enabled
Intracell
blocking
Enabled
Ethernet
blocking
Disabled
Disabled
Disabled
Intracell
blocking
Disabled
Ethernet
blocking
with
another
SSID
to the Ethernet
network
x
x
x
Description
Comment
authent
[0|1|2|3|4|5|6|7|8]
encrypt [E|D]
cipher [OFF|AUTO|WEP|
AES|TKIP]
keysrc [0..2]
defkey [1|2|3|4]
169
Configuration Using Web Based Management and the Command Line Interface
Command
Description
Comment
grkint [interval]
Interval in seconds,
(0; 3636000), 0 = OFF
supssid [E|D]
Intracell communication
intracom [D|I|E]
username [name]
password [password]
chkserver [E|D]
radauth [type]
VAP
For each virtual access point VAP1 to VAP7, you configure the following security
settings described earlier:
170
Configuration Using Web Based Management and the Command Line Interface
Authentication
Enable encryption
Encryption method
Where they apply, all other security parameters are adopted from the Security >
Basic > WLAN1 or WLAN2 page.
171
Configuration Using Web Based Management and the Command Line Interface
Description
Comment
authent
[0|1|2|3|4|5|6|7|8]
encrypt [E|D]
cipher [OFF|AUTO|WEP|
AES|TKIP]
defkey [1|2|3|4]
grkint [interval]
Interval in seconds,
(0; 3636000), 0 = OFF
supssid [E|D]
172
Configuration Using Web Based Management and the Command Line Interface
6.4.2
Description
delete <Index>
clearall
Comment
Indexes from 5 onwards
are private keys
173
Configuration Using Web Based Management and the Command Line Interface
6.4.3
Note
The ACL menu is available only when you use the SCALANCE W78x in the access
point mode. You can specify the mode in the System menu.
Note
Since no encryption is used for MAC address transfer, this function can only
provide basic protection against unauthorized access. The use of an authentication
method (for example WPA (RADIUS) or WPA-PSK if this is not possible) provides
higher security.
174
Configuration Using Web Based Management and the Command Line Interface
Note
The private key set in the ACL must also be available in the key list on the client.
The client must also use this private key for communication in Security->Basic>WLAN (the key must be set),if an open system with encryption or shared key is
used.
The private key is used on this connection for the transferred unicast packets
intended for the wireless client.
All multicast and broadcast packets are transferred with the public key set on the
access point. The wireless client entered in the ACL list must therefore also enter
this public key at the same location in its key list as the access point.
175
Configuration Using Web Based Management and the Command Line Interface
Example
In its cell, an access point uses the setting shared key with a 128-bit public key
(default key 1) for encryption of the data traffic.
All wireless clients that register at this access point, require this public key at
position 1 in their key list for communication.
If access for certain wireless clients is now restricted by the ACL list of the access
point on the basis of a private key, the private key must first be stored in the key list
of the access point and the client to be restricted.
The next activity is to enter the MAC addresses of these wireless clients in the ACL
list of the access point and to give it the private key. If these wireless clients are
intended to continue communication, the private key must be set on the wireless
client directly under Security->Basic->WLAN and used for the encryption.
Otherwise the clients could receive broadband or multicast packets, but no longer
be addressed directly with unicast packets.
176
Configuration Using Web Based Management and the Command Line Interface
Description
Comment
aclmode [E|D|S]
A
Y
K
P
Allow
Deny
Default Key
Private Key
Key
Enable
Disable
A
Y
K
P
Allow
Deny
Default Key
Private Key
Key
delete <Index>
clearall
177
Configuration Using Web Based Management and the Command Line Interface
6.4.4
Note
The RADIUS menu command is available only when you use the SCALANCE
W78x in access point mode. You can specify the mode in the System menu.
Description
port [port]
port B [port]
Secret [password]
secret B [password]
authprd [time in s]
Comment
178
Configuration Using Web Based Management and the Command Line Interface
6.4.5
Or:
Management access is possible with all IP addresses not included in the list.
Note
The defined access rights also apply to the PC used for configuration. If you have
not entered the local IP address and have set the ACL mode to Accessed, no
further access to the SCALANCE W78x is possible.
You should also note that the IP address of the client can change if you use DHCP
without reservation.
Description
access [E|D]
statmgmt [A|D]
add <IP>
delete <Index|IP>
clearall
Comment
179
Configuration Using Web Based Management and the Command Line Interface
6.5
Introduction
A bridge is a network component that connects two networks. A bridge is not
dependent on the protocol; management of the data packages is based on the
physical address of the network nodes (MAC address).
The SCALANCE W78x provides bridge functionality because it handles data
exchange between wired and wireless Ethernet. The following sections describe
the functions that are available and how you configure and use them.
Description
Comment
180
Configuration Using Web Based Management and the Command Line Interface
6.5.1
Note
With the firmware update to V3.0, the SCALANCE W78x-xRR devices need to be
reconfigured if you use WDS or redundancy and use the MAC address and not the
sysName.
These functions are then based on the MAC address that changed with the
introduction of VAPs with V3.0.
Configuration
In the MAC / sysName column, enter the MAC address or the system name of the
SCALANCE W78x with which you want to communicate. If you select the Enc
check box, encryption is used.
181
Configuration Using Web Based Management and the Command Line Interface
Note
In WDS mode, the following restrictions apply:
All SCALANCE W78x devices that will communicate with each other must use
the same channel.
You can only use the encryption schemes WEP and AES.
If you want to attach a different access point from the SCALANCE W78x over
WDS, you must configure the MAC address. Detection using the sysName
parameter does not work in this situation.
In the IEEE 802.11h transmission mode, it is not practical to select the WDS
mode at the same time. In WDS mode, all SCALANCE W78x devices must
use the same channel. If a signal from a primary user is detected by an AP,
the channel is changed automatically and the existing connection is then
terminated.
To enable the entry, you must select the Sel check box.
Description
add <MAC|Name>
[SE|SD][Key]
delete <Index>
clearall
Comment
182
Configuration Using Web Based Management and the Command Line Interface
6.5.2
Note
The Ethernet interface does not remove VLAN tags from outgoing frames.
If the VLAN is active, the WLAN interfaces always remove all VLAN tags from the
outgoing frames.
Member List
Meaning
183
Configuration Using Web Based Management and the Command Line Interface
184
Configuration Using Web Based Management and the Command Line Interface
VLAN ID Settings
The VLAN ID box allows you to enter a new VID as long as no port is assigned
explicitly as member. Otherwise, the VID can no longer be modified.
Representat
ion
Settings
Meaning
185
Configuration Using Web Based Management and the Command Line Interface
Ports
Port: Overview of the ports in the form of a table.
SSID: SSID for WLAN interface, no entry for WDS or management and
redundancy.
Priority: Configured priority of the port.
Port VID: VLAN ID directly assigned to the port.
Member: The VLAN membership assigned to the port.
Enabled: VLAN support can then be enabled / disabled directly.
Clicking on a port opens the VLAN Settings configuration page.
Note
If you use a Radius server for authentication, this must the accessible over the
management VLAN. Among other things, the management port also handles the
functions: HTTP, HTTPS, WBM, Telnet, SSH, Ping, DHCP, TFTP, SNMP, SNTP
and Syslog.
Note
The IP and MAC-based nodes downstream from a client with enabled layer 2
tunneling function ( L2T client) adopt the same VLAN properties as the client.
186
Configuration Using Web Based Management and the Command Line Interface
Example: An L2T client is connected to the access point over the WLAN1 VAP3
interface. WLAN1 VAP3 is a member of the VLAN ID 33 that is assigned priority 6.
For the L2T port, this means that the devices connected downstream from the L2T
client and the client itself are also members VLAN ID 33 with priority 6.
187
Configuration Using Web Based Management and the Command Line Interface
VLAN Settings
VLAN enabled: VLAN support can then be enabled / disabled directly.
User Priority: Prioritization of the data traffic over the port. Untagged frames are
given this priority.
Port VLAN ID: Entry of the VLAN ID.
VLAN Membership
All VIDs: Automatic setting of the port as member of all configured VIDs.
Specific VIDs only: Member of up to eight, freely assignable configured VIDs per
port.
188
Configuration Using Web Based Management and the Command Line Interface
Note
The priority generally increases with the ascending numbers. The exception is
priority 0, that has a higher priority than priority classes 1 and 2 and has the same
priority as class 3.
1 - Background (BK)
non time-critical data traffic
2 - Spare (--)
this priority is reserved
Note
Both voice over IP and PNIO have priority 6.
189
Configuration Using Web Based Management and the Command Line Interface
all
The VAP is member of all VLANs.
only
The VAP is member only of the VLANs entered below.
Here, enter the VLAN ID (VID) of up to 8 VLANs in which the VAP will be a
member.
190
Configuration Using Web Based Management and the Command Line Interface
Description
info
edit <VLAN-ID>
[- [Ports],]
[u [Ports],]
delete <VLAN-ID>
CLI\BRIDGE\VLAN\PORTS>
Command
Description
info
191
Configuration Using Web Based Management and the Command Line Interface
6.5.3
6.5.4
6.5.5
192
Configuration Using Web Based Management and the Command Line Interface
Edge ports
A port defined as an edge port is activated after the hello time (the time
between two configuration frames). When the hello time has elapsed, the
station can be certain that no further configuration frame will arrive and that this
port is an edge port. If the user wants to avoid the hello time, spanning tree can
be disabled at this port.
Filter table
In rapid spanning tree, ports affected by a reconfiguration are immediately
deleted from the filter table. With spanning tree, on the other hand, the point at
which a port is deleted is decided by the time when the port was entered in the
filter table.
Reaction to events
Rapid spanning tree reacts to events, for example an aborted connection,
without delay. There is no waiting for timers as in spanning tree.
In principle, therefore with rapid spanning tree, alternatives for many parameters
are preconfigured and certain properties of the network structure taken into
account to reduce the reconfiguration time.
193
Configuration Using Web Based Management and the Command Line Interface
If necessary, modify the following parameters to specify how the (rapid) spanning
tree algorithm operates:
Enable (R)STP Check Box
Select the Enable Spanning Tree check box if you want to use the (rapid)
spanning tree algorithm. If the check mark is not set, all ports are
automatically in the 'Forwarding' status.
Version list box
The version decides whether the Rapid Spanning Tree protocol (RSTP) is
used or whether the device is operated in compatibility mode of the
Spanning Tree protocol (STP).
Bridge Priority text box
The identification of the most efficient connection is always related to the
root bridge, a network component that can be considered as a root element
of a tree-like network structure. With the Bridge Priority parameter, you can
influence the selection of the root bridge.
194
Configuration Using Web Based Management and the Command Line Interface
The bridge with the highest priority (in other words, with the lowest value for
this parameter) becomes the root bridge. If several network components in a
network have the same priority, the station whose MAC address has the
lowest numeric value will become the root bridge. Both parameters, bridge
priority and MAC address together form the Bridge Identifier. Since the root
bridge manages all path changes, it should be located as centrally as
possible due to the propagation time of the frames. The value for the bridge
priority is a whole multiple of 4096 with a range of values from 0 through
61440.
Max Age text box
Max Age is the time that a bridge waits for a configuration frame (BPDU).
When this time has elapsed, the bridge attempts to reconfigure the network.
The default for this parameter is 20 seconds.
Hello Time text box
Each bridge regularly sends configuration frames (BPDUs). The interval
between two such frames is the Hello Time. The default for this parameter is
2 seconds.
Forward Delay text box
New configuration data is not used immediately by a bridge but only after the
period specified in the Forward Delay parameter. This ensures that operation
is only started with the new topology after all the bridges have the required
information. The default for this parameter is 11 seconds.
Description
Comment
info
spanning [E|D]
version [R | S]
Default value: 2 s
Default value: 11 s
Default value: 20 s
195
Configuration Using Web Based Management and the Command Line Interface
The eight columns of the port table show the following information:
Port
Specifies the ports to which the information relates. Wireless 1_2, for
example, relates to the virtual access point VAP2 on the first WLAN
interface.
Priority
With this parameter, you specify the priority of the ports of a bridge.
If the path calculated by spanning tree is possible over several ports of a
station, the port with the highest priority (in other words the lowest value for
this parameter) is selected. A value from 0 through 255 can be specified for
the priority; the default is 128.
196
Configuration Using Web Based Management and the Command Line Interface
100 Mbps
19
200.000
54 Mbps
33
370.370
48 Mbps
36
416.667
36 Mbps
43
555.556
24 Mbps
53
833.333
18 Mbps
58
1.111.111
12 Mbps
83
1.666.667
11 Mbps
90
1.818.182
10 Mbps
100
2.000.000
9 Mbps
111
2.222.222
6 Mbps
166
3.333.333
5.5 Mbps
181
3.636.364
2 Mbps
500
10.000.000
1 Mbps
1000
20.000.000
197
Configuration Using Web Based Management and the Command Line Interface
Note
If clients with the layer 2 tunneling function enabled connect to the access point, a
separate port is opened for each of these clients. These ports cannot, however, be
configured for Rapid Spanning Tree. The settings (for example, priority and path
costs etc.) of the cell over which the client is connected to the access point are
adopted.
Example: An L2T client is connected to the access point over the WLAN1 VAP3
(Wireless 1_3) interface. The settings for WLAN1 VAP3 are: priority 128, path
costs for STP of 100, path costs for RSTP of 0 and the setting EdgePort enabled
(in other words, there is an end device on this port). These settings are adopted for
the L2T port with one exception.
The Edge-Port enabled setting is not adopted because layer 2 tunneling clients
and the ports downstream from the client can never be edge ports.
P.t.P.
There is a point-to-point link when two RSTP-compliant network components
are connected together over this port. There are three possible statuses :
ForceTrue
Even with half duplex, a direct link is assumed.
ForceFalse
Despite a full duplex connection, a point-to-point link is not assumed.
Auto
Point-to-point is detected automatically. If the port is set to half duplex
(shared media connection), a direct link is not assumed.
198
Configuration Using Web Based Management and the Command Line Interface
199
Configuration Using Web Based Management and the Command Line Interface
If you enter a zero for the RSTP value, the value for the path costs is
calculated automatically.
Admin Edge Port check box
Enable this check box if an end device is connected to this port, otherwise a
reconfiguration of the network will be triggered by every link change.
Admin Point to Point Status check boxes
Here, there are three possible settings:
Shared media Connection is selected:
This corresponds to the entry ForceFalse in the port table.
Point to Point Connection is selected:
This corresponds to the entry ForceTrue in the port table.
Point to Point Connection and Shared Media Connection are not
selected:
This corresponds to the entry Auto in the port table.
Note
Point-to-point means a direct connection between two stations. A shared media
connection would, for example, be a connection from the Ethernet port to a hub or
a WDS connection between two access points.
Description
Comment
info
portprio <Port>
[0 ... 255]
stp_cost <Port>
[1 ... 65535]
200
Configuration Using Web Based Management and the Command Line Interface
Command
Description
rstp_cost <Port>
[0 ... 200000000]
Comment
Default value: 0
201
Configuration Using Web Based Management and the Command Line Interface
6.5.6
Note
Storm Threshold is available in access point and in the client mode. The function
can only be used in client mode if NAT is disabled.
Description
stormthr <E|D>
Comment
202
Configuration Using Web Based Management and the Command Line Interface
6.5.7
What is NAT?
With Network Address Translation (NAT), the IP address in a data packet is
replaced by another. NAT is normally used on a gateway between a private LAN
and an external network with globally valid IP addresses. A local IP address of the
internal LAN is changed to an external global IP address by a NAT device at the
gateway.
To translate the internal into the global IP address, the NAT device maintains a
translation list.
What is NAPT?
In Network Address Port Translation (NAPT) or Port Address Translation (PAT),
several internal source IP addresses are translated into the same external source
IP address. To identify the individual source nodes, the port of the source device is
also stored in the translation list of the NAT gateway and translated for the external
address.
If several local clients send a query to the same external destination IP address
over the NAT gateway, the gateway enters its own external source IP address in
the header of these forwarded frames. Since the forwarded frames have the same
global source IP address, the NAT gateway assigns the frames to the clients using
different port number.
203
Configuration Using Web Based Management and the Command Line Interface
Note
NAT/NAPT is possible only on layer 3 of the ISO/OSI reference model. To use the
NAT function, the networks must use the IP protocol.
When using the ISO protocol that operates at layer 2, it is not possible to use NAT.
204
Configuration Using Web Based Management and the Command Line Interface
Configuration
Set the configuration on the IP Network Address Translation page with the
following settings:
Enable NAT
Click the check box Enable if you want to enable NAT.
Caution: The change is adopted only after a restart!
Local IP
Here, you enter the local IP address for the Ethernet port of the WLAN client.
Subnet Mask
Enter a subnet mask for the local Ethernet network here, if applicable.
Del
Select the Delete check box if you want to delete the previous entries on this
page.
Sel
Select the Select check box if you want to enable the current entries.
Type
Here, you select the assignment TCP or UDP for the following global port. TCP
and UDP frames must have their parameters set separately.
Global Port
Enter the number of the global port (for TCP or UDP).
Note
If the port is already occupied by a local service (for example Telnet), a warning is
displayed. In this case, avoid using port 23 (Telnet) and port 80 (http: availability of
the client with the WBM) as global port.
205
Configuration Using Web Based Management and the Command Line Interface
Local Address
Here, you enter the local address of the Ethernet device.
Local Port
Here, you enter the number of the local port of the Ethernet device.
Note
The following instructions apply only to the IP parameter assignment using the PST
tool.
When the module is accessed with PST by a configuration computer, the address
assignment differs depending on the interface:
PST over the wireless interface:
The global address is changed.
PST over the Ethernet interface:
The local address is changed.
206
Configuration Using Web Based Management and the Command Line Interface
Description
Comment
nat [E|D]
Enables/disables NAT
ip [IP address]
static
CLI\BRIDGE\NAT>subnet
Command
Description
Comment
CLI\BRIDGE\NAT>STATIC
Command
Description
Comment
delete <Index>
clearall
CLI\BRIDGE\NAT\STATIC>info
Index
Enabled
Type
Global Port
Local IP
Local Port
TCP
21
172.27.138.2
1026
207
Configuration Using Web Based Management and the Command Line Interface
6.5.8
MAC Mode
IP frames in the direction from the client to the access point always have the MAC
address of the WLAN interface as the source MAC address. As a result, the ARP
tables at the access point end always contain only the MAC address of the WLAN
interface of the clients.
If there are further devices downstream from the client, the Auto Find 'Adopt MAC'
option should not be enabled. In this case, the MAC address would be assigned
indiscriminately to the first device that signals over Ethernet.
If there is only IP communication between the access point and the client, the
default setting AdoptOwnMAC can be retained. If MAC address-based frames also
need to be sent by devices downstream from the client, you will need to select the
settings Adopt MAC manually, Autofind Adopt MAC or layer 2 tunneling.
For further information, refer to Section 5.4.6.
208
Configuration Using Web Based Management and the Command Line Interface
209
Configuration Using Web Based Management and the Command Line Interface
6.6
6.6.1
Description
fltmac1 <E|D>
statmac1 [F|B]
delete <Number|MAC>
clearall
Comment
210
Configuration Using Web Based Management and the Command Line Interface
6.6.2
Description
fltmac2 <E|D>
delete <Index>
clearall
Comment
211
Configuration Using Web Based Management and the Command Line Interface
6.6.3
Protocol Selection
Without protocol filtering, the SCALANCE W78x processes all data packets
regardless of the protocol being used. To increase data security and to reduce
load, it can nevertheless be useful to prevent communication using certain
protocols.
Here, you are not restricted to the protocols included in the list in this menu. If
necessary, you can add your own entries to this list. You can specify a maximum of
50 Ethernet II protocols for which filtering is required.
Description
clearall
statprot <F|B>
fltprot <E|D>
add <pattern>
[description]
delete <Index>
clearall
Comment
212
Configuration Using Web Based Management and the Command Line Interface
6.7
6.7.1
Note
If the user reserves data for critical clients, this data rate also includes the frame
header (in other words, 802.11, MAC, IP, TCP, and S7 header). A SIMATIC user
must therefore take into account not only the net data during configuration but also
the headers.
Response Time
In the Response Time text box, you enter the required response time of the
SCALANCE W78x over the wireless interface. Remember that this value
represents the transmission time for the data from the SCALANCE W78x to the
client. The data transmission rate for nodes not included in the list is reduced
according the values specified.
213
Configuration Using Web Based Management and the Command Line Interface
Description
iqos [E|D]
static [E|D]
delete <Index>
clearall
Comment
214
Configuration Using Web Based Management and the Command Line Interface
6.7.2
Notice
With the SCALANCE W788-2RR, iPCF may only be enabled for one of the two
WLAN interfaces.
SCALANCE W747-1RR
IWLAN/PB Link
iPCF ensures that the entire data traffic of a cell is ordered, controlled by the
access point. By avoiding collisions, the throughput can be optimized even with
large numbers of nodes. iPCF also allows fast cell changes.
Note
For PNIO communication, we always recommend that you enable the iPCF mode.
The signal strength must not fall below 60% or -65 dBm for reliable operation.
215
Configuration Using Web Based Management and the Command Line Interface
216
Configuration Using Web Based Management and the Command Line Interface
Configuration
Select the iPCF Enabled check box to enable the iPCF mode.
With the SCALANCE W788-xRR models, you can also set optimized support of
PNIO if you select the PNIO support enabled check box. In this case, you must
also set the PNIO update time. The PNIO update time must match the configured
PNIO update time.
217
Configuration Using Web Based Management and the Command Line Interface
Description
Comment
ipcf [E|D]
pnio [E|D]
Only on SCALANCE
W788-xRR models
(access point).
update [time]
Only on SCALANCE
W788-xRR models
(access point).
218
Configuration Using Web Based Management and the Command Line Interface
6.7.3
Functional Description
Forced Roaming on IP down monitors the connection to a specific IP address
cyclically. This is achieved using ICMP packets (Echo Request/Reply or Ping). If
the IP connection aborts; in other words, no ping reply from the other end, a
deauthentication frame is sent to all WLAN clients. The relevant WLAN interface is
then disabled.
The IP connection continues to be monitored and the WLAN interface is enabled
again as soon as the access point has received a ping reply from the pinged
station.
The mechanism makes it possible, for example, to monitor a connection between
wireless clients and a server. If the server can no longer be reached over the
access point, the clients are deauthenticated and the WLAN interface of the access
point is disabled. The clients roam and then connect to a different access point
from which the server can be reached. As soon as the first access point can reach
the server again, it re-enables its WLAN interfaces.
Description
froam [E|D]
ip [IP address]
lostpkts [1 - 5]
Comment
Note
Forced roaming on IP Down cannot be used in conjunction with iPCF or WDS on
the same WLAN interface.
219
Configuration Using Web Based Management and the Command Line Interface
6.7.4
Note
With the Link Check function, you can only monitor connections to WLAN clients;
use along with redundancy or WDS is not possible.
220
Configuration Using Web Based Management and the Command Line Interface
Description
linkchk [E|D]
edit <Index|MAC>
[timeout]
[E|D]
delete <Index|MAC>
clearall
acknow [Index|all]
Comment
221
Configuration Using Web Based Management and the Command Line Interface
6.7.5
222
Configuration Using Web Based Management and the Command Line Interface
Description
redun [E|D]
wep [E|D]
Comment
223
Configuration Using Web Based Management and the Command Line Interface
6.7.6
Note
The IP-Alive function is not available in iPCF mode.
224
Configuration Using Web Based Management and the Command Line Interface
Description
ipalive <E|D>
clearall
acknow [Index|all]
Comment
225
Configuration Using Web Based Management and the Command Line Interface
6.8
info
Description
Displays information on the current
menu item.
Comment
This can be called in
every submenu.
226
Configuration Using Web Based Management and the Command Line Interface
6.8.1
Description
addevent <Text>
Comment
227
Configuration Using Web Based Management and the Command Line Interface
6.8.2
Logging Authentication
The pages of this menu contain a table with information on successful or failed
authentication attempts.
Description
show [0...8]
clear
Comment
228
Configuration Using Web Based Management and the Command Line Interface
6.8.3
229
Configuration Using Web Based Management and the Command Line Interface
6.8.4
Logged on Clients
All the clients logged on at the SCALANCE W78x along with certain additional
information (wireless channel, status etc.) are displayed here.
MAC address
The MAC address of the client.
If#
This specifies the wireless interface over which the client is connected.
Signal
The signal strength of the client. The higher the value, the better the signal. The
user can choose between percentage and dBm.
Age
Displays the time that has elapsed since the last client activity was detected.
Sec
This indicates which encryption is active.
Channel.
The current channel over which the client communicates with the SCALANCE
W78x.
State
The current state of the clients. Associated means that the client is logged on.
230
Configuration Using Web Based Management and the Command Line Interface
By selecting the Update check box, the list is updated automatically every 2
seconds. If you click on the MAC address of a client, you will receive additional
information on this client.
Description
Station
resetStats
Apinfo
Scan
Noise
Comment
231
Configuration Using Web Based Management and the Command Line Interface
6.8.5
6.8.6
Traffic
Statistics of the data to be transmitted are displayed here.
232
Configuration Using Web Based Management and the Command Line Interface
Signal strength
The signal strength is displayed as an average of the last received frames or at
the sending end of the last received Acknowledge frames.
Frame count
Counter for all successfully received or sent frames.
Management frames
Counts all received or sent management frames.
RTS frames
Is incremented when a CTS frame is received in response to an RTS frame.
Rate
Displays an average data rate of the most recently received or sent data
frames.
233
Configuration Using Web Based Management and the Command Line Interface
Errors
This page displays statistics of the transmission errors that have occurred. A high
error rate indicates a bad connection.
Receive Errors:
ACL discarded frames
Displays all client registration attempts that were blocked by the Access Control
List.
234
Configuration Using Web Based Management and the Command Line Interface
Fragmentation errors
Sum of all failed fragmentations. One of the fragments was not received or
received too late.
Encryption errors
Is incremented if a frame is received in which the WEP bit is set and the device
operates without encryption, or the reverse situation when a packet is received
without a WEP bit and encryption is enabled.
Duplicate frames
Sum of all frames received twice.
FCS errors
Sum of all packets received in which the checksum was incorrect.
Header CRC error
Sum of all packets received in which the header checksum was incorrect.
Decrypt CRC error
Sum of all packets received in which the checksum of the encrypted data buffer
was incorrect.
Transmit Errors
Transmission errors
Is incremented when a frame cannot be sent successfully despite hardware
retries.
Dropped frames
Number of packages that were dropped either when the packet was not sent
despite all retries or packets that had not been sent when a node deregistered.
Acknowledged errors
Sum of all packets sent that were not confirmed by an acknowledge.
RTS errors
Sum of all sent RTS frames that were not acknowledged by a CTS.
Retry count
Sum of all frames sent successfully that required one or more retries.
One retry count
Sum of all frames sent successfully that required exactly one retry.
Multiple retry count
Sum of all frames sent successfully that required more than one retry.
Note
The percentages shown following the errors relate to the entire received/sent
frames.
235
Configuration Using Web Based Management and the Command Line Interface
Overlap AP
Note
This menu command is available only in the access point mode.
For optimum data throughput, it is important that the set wireless channel is not
used by other access points. In the 2.4 GHz band (802.11b or 802.11g), there is
overlapping of the wireless channels so that an access point occupies not only the
set channel but also the two or three adjacent channels. You should therefore
make sure that there is adequate channel spacing to neighboring access points.
The Overlap AP page shows all access points that are visible on the set or
adjacent channels (at 2.4 GHz). If entries exist here, the maximum data throughput
of the access point will be restricted.
Type
Shows the type of connection. The types AP (infrastructure mode) and AdHoc
exist.
MAC address
The MAC address of the wireless devices.
Channel
The channel on which the found wireless device transmits.
Signal
Shows the signal strength with which the other wireless devices are received at the
AP. The stronger the signal, the greater the probability that they interfere with each
other. There is also the possibility that they interfere with each other even at low
signal strengths.
Age
Shows when the last activity was detected by the wireless device.
SSID
Shows the SSID of the other wireless device.
236
Configuration Using Web Based Management and the Command Line Interface
Description
overlap
over_age [1..7200]
Comment
VLAN
This page displays information on the configured virtual LANs with the following
information on each virtual access point (VAP):
Port Name
The configured port name. Here, you see a list of the configured virtual access
points (VAP), the WDS connections and the management and the redundancy
VLAN if applicable.
VLAN
The status of the relevant VLAN (E = enabled, D = disabled)
VLAN ID
The configured VLAN ID
SSID
The SSID of the relevant VLAN
Member
Shows the virtual access point (VAP) as member of other VLANs:
all = VAP is member of all VLANs
only = VAP is member of only certain VLANs
Priority
The configured frame prioritization
237
Configuration Using Web Based Management and the Command Line Interface
6.8.7
info
Description
Comment
The CLI also supplies detailed information on iQoS. In this view, the first part
displays the current configuration, in other words whether iQoS is enabled, ,
whether the calculations and reservations are based on the static worst-case
assumptions (static = enabled) or the current situation (static = disabled). The
number of configured critical clients is also displayed.
238
Configuration Using Web Based Management and the Command Line Interface
The Traffic statistics table shows how many clients are currently in each status and
how many packets of a particular class were sent for each of these classes.
The Associated Clients table provides an overview of all clients, their current
classification, and the volume of sent and receive data. The shaper interval (SI) is
also is displayed for each client. The shaper interval is the minimum spacing
between two packets of a client set by iQoS. For NCS clients, the SI is selected so
that their bandwidth is twice the size of the current bandwidth.
239
Configuration Using Web Based Management and the Command Line Interface
6.8.8
240
Configuration Using Web Based Management and the Command Line Interface
Enabled
Indicates whether the (R)STP is enabled for this port. If the port is not enabled, no
further frames are forwarded over this port.
Cost
Indicates the path costs for the port.
Priority
Indicates the current priority of the port.
Edge
Shows whether or not the port is an edge port.
P.t.P.
Shows whether or not the AP is connected directly to another (R)STP device
Port State
With STP, a port can adopt three states:
Discarding
No frames are forwarded from or to this port. The port has been disable by the
user or the protocol (for example, when a redundant path has been detected).
Learning
The port receives packets in the same way as in listening mode, but does not
forward them. The MAC addresses are also entered in the Learning Bridge.
Forwarding
The port is fully enabled. Frames can be received and sent.
Disabled
The port is not currently in use.
State
Here, the state of the port in relation to the root bridge is displayed. The ROOT
state means that the port is connected directly with the root bridge. DESIGNATED
identifies all ports that are not directly at the root but that are enabled. Ports that
are blocked are in the BLOCKED state.
241
Configuration Using Web Based Management and the Command Line Interface
6.8.9
Information on Protocols
The pages of this menu show information on the IP, TCP, UDP, ICMP, and SNMP
protocols in the form of tables.
There are no CLI commands for this menu command.
242
Configuration Using Web Based Management and the Command Line Interface
The signal recorder itself does not cause any significant load in the network that
could affect other processes.
Both parts of the signal recorder can be operated independently.
243
Configuration Using Web Based Management and the Command Line Interface
Below, you will find a few tips that will help you to obtain useful measurements with
the signal recorder:
Where possible, the ipcf mode with as low an update time as possible should
be set for the measurements.
Make sure that there is enough data communication during the measurement
because the statistics functions evaluate incoming frames.
The measurement setup should be run through 2-3 times with the same
parameters to find out whether losses of signal strength always occur at the
same position.
Figure 6-3
244
Configuration Using Web Based Management and the Command Line Interface
Roaming indicator
This value appears when the client connects to another or to no AP and the MAC
address of the AP changes as a result.
Bandwidth/data rate
The bandwidth/data rate is not displayed over the entire screen since it could
overlap the signal level.
Noise floor
The noise floor represents the lower end of the technically possible transmission of
the device. This means that when the noise floor is exceeded (the useful signal is
louder than the noise floor), this is where the system dynamics begins. For this
reason, this level is visible only when the client has no connection to an AP
(indicated in the figure above by the MAC address 00-00-00-00-00-00).
Legend
BW bandwidth in Mbps
RSS received signal strength in dBm
245
Configuration Using Web Based Management and the Command Line Interface
Figure 6-4
246
Configuration Using Web Based Management and the Command Line Interface
Description
Comment
recstart <interval>
[quantity recording points]
recstop
dispstart [interval]
dispstop
exit
info
247
Data Transmission
Transmission rate for Ethernet
10/100 Mbps
Interfaces
Energy
Data
M12 connector
(18 to 32 V DC)
Power contacts in the hybrid connector
(18 to 32 V DC)
RJ-45 jack power-over-Ethernet
(48 V DC)
2 DC 24V power supplies
(18 to 32 V DC) safety extra-low voltage
(SELV).
Power supply voltage connected over high
resistance with housing (not electrically
isolated).
Electrical Data
Power consumption
< 10 W
Construction
Dimensions without antennas
(W x H x L)
125 mm x 88 mm x 108 mm
Weight
approx. 1050 g
Degree of protection
Tested to IP65
248
MTBF
SCALANCE W78x
67 years
1 2 5
1 1 5
9 0
8 0
249
Cover material
Polycarbonate
Silicone-free
Electrical Properties
Frequency range
Impedance
50 Ohms
2,0
Return loss
-10 dB
3 dBi
5 dBi
Polarization
Vertical
Operating temperature
- 20 C.... + 60 C
250
Dimension Drawing
1 4 8
2 1 ,2
3 4 ,6
1 3
251
Approvals
CE Conformity
The products
SIMATIC NET SCALANCE W788-1PRO
SIMATIC NET SCALANCE W788-2PRO
SIMATIC NET SCALANCE W788-1RR
SIMATIC NET SCALANCE W788-2RR
in the version put into circulation by Siemens A&D conform to the
regulations of the following European directive:
99/5/EC
Directive of the European Parliament and of the Council relating to
Radio Equipment and Telecommunications Terminal Equipment and
the Mutual Recognition of their Conformity.
Conformity with the essential requirements of the directive is attested
by adherence to the following standards:
EN 60950
Safety of Information Technology Equipment
EN 301 489-1
Electromagnetic Compatibility for Radio Equipment and Services
EN 301 489-17
Specific Conditions for Wideband Transmission Systems and HighPerformance Radio Local Area Network (HIPERLAN) Equipment
EN 300 328
Electromagnetic Compatibility and Radio Spectrum Matters
EN 301 893
Broadband Radio Access Networks (BRAN) - 5-GHz highperformance RLAN
EN 50371
Generic standard to demonstrate the compliance of low power
electronic and electrical apparatus with the basic restrictions related
to human exposure to electromagnetic fields (10 MHz to 300 GHz)
1999/519/EC
Council recommendation on the limitation of exposure of the general
public to electromagnetic fields (0 Hz to 300 GHz)
Devices connected to the system must meet the relevant safety
regulations.
252
Approvals
253
Approvals
254
Approvals
Warning
When used under hazardous conditions (Zone 2), the SCALANCE W78x product
must be installed in an enclosure. To comply with EN 50021, this enclosure must
meet the requirements of at least IP 54 in compliance with EN 60529.
DO NOT CONNECT OR DISCONNECT EQUIPMENT UNLESS AREA IS KNOWN
TO BE NONHAZARDOUS.
Note
The specified approvals apply only when the corresponding mark is printed on the
product.
255
Approvals
FCC Approval
This device complies with Part 15 of the FCC Rules and with RSS-210 of Industry
Canada.
Operation is subject to the following two conditions:
(1) this device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that
may cause undesired operation.
Notice
Changes or modifications made to this equipment not expressly approved by
SIEMENS may void the FCC authorization to operate this equipment.
This equipment has been tested and found to comply with the limits for a Class B
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this
equipment does cause harmful interference to radio or television reception, which
can be determined by turning the equipment off and on, the user is encouraged to
try to correct the interference by one or more of the following measures:
Connect the equipment into an outlet on a circuit different from that to which
the receiver is connected.
Notice
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an
uncontrolled environment. This equipment should be installed and operated with
minimum distance 20 cm between the radiator and your body.
This transmitter must not be co-located or operating in conjunction with any other
antenna or transmitter.
256
Appendix
OID
The private MIB variables of the SCALANCE W78x have the following object
identifiers:
iso(1).org(3).dod(6).internet(1).private(4).
enterprises(1).ad(4196).adProductMibs(1).simaticNet(1).
iScalanceW(4)
257
Appendix
Variables
The following table shows the private MIB variables of the SCALANCE W78x:
Name
snDownload
OID
1.3.6.1.4.1.4196.1.1.4.100.1.5
Description
Download information and
control variables for image,
configuration file, events
table.
Number of
Objects
17
snNvLog
1.3.6.1.4.1.4196.1.1.4.100.1.6
snTrapInfo
1.3.6.1.4.1.4196.1.1.4.100.1.7
Information on traps.
snGen
1.3.6.1.4.1.4196.1.1.4.100.1.8
23
snTcpip
1.3.6.1.4.1.4196.1.1.4.100.1.10
snScalanceWCommon
1.3.6.1.4.1.4196.1.1.4.100.2.1
SCALANCE W - specific
settings.
24
snScalanceWFilter
1.3.6.1.4.1.4196.1.1.4.100.2.4
18
snScalanceWStats
1.3.6.1.4.1.4196.1.1.4.100.2.5
62
snScalanceWDevices
1.3.6.1.4.1.4196.1.1.4.100.2.6
49
snScalanceWScan
1.3.6.1.4.1.4196.1.1.4.100.2.7
11
snScalanceWAcl
1.3.6.1.4.1.4196.1.1.4.100.2.8
snScalanceWAccess
1.3.6.1.4.1.4196.1.1.4.100.2.9
snScalanceWVirtualAp
1.3.6.1.4.1.4196.1.1.4.100.2.10
17
258
Appendix
Traps
Name
Specific
Index
Variable
snScalanceWPowerLi
neDown
31
snScalanceWChangedPowerLin
e - The power line where the
last power down occurred. 1M12, 2-Ethernet Power
snScalanceWPowerLi
neUp
32
snScalanceWChangedPowerLin
e - The power line where the
last power up occurred. 1-M12,
2-Ethernet Power
snScalanceWFault
41
snScalanceWIQOS
51
snScalanceWLinkChe
ckOff
81
snScalanceWLinkInte
grityOn
82
snScalanceWClientAu
thenticated
85
SnScalanceWClientsIndex - An
index of the client in the
snScalanceWClients table
snScalanceWClientDe
Authenticated
86
SnScalanceWClientsIndex - An
index of the client in the
snScalanceWClients table
snScalanceWRedund
ancy
53
SnScalanceWRedundancyValu
e- Description of the last
redundancy trap.
SnScalanceWRedundancyState
- Status of redundancy
connection
snScalanceWOverlap
AP
101
snScalanceWOverlapAPValue
- Description of the last
OverlapAP trap.
Description
259
Appendix
snScalanceWiPCFPNI
OmaxSTAs
111
snScalanceWiPCFPNI
OCycleTime
112
snScalanceWForcedR
oamingVapStateChan
ged
121
snScalanceWVirtualApIndex
- Index of the VAP
snScalanceWVirtualApState
- Current State of the VAP
unknown (0)
authenticated (1)
associated (2)
powersafe (3)
adhoc (4)
joined (5)
vap-is-up (6)
vap-starting (7)
vap-is-down (8)
locked (9)
vap-connected (10)
260
Appendix
Calculating in Decibels
Decibels as a Logarithmic Unit of Measure
In wireless technology, most calculations are made in decibels (dB). Decibel
means the logarithm of a ratio. Formulated mathematically, this can be shown by
the following equation:
Decibel value = 10 * log (ratio)
Using sample calculations, the following decibel values are obtained:
Ratio
0.001
0.1
0.2
0.4
0.5
1
2
4
Decibel Value
-30 dB
-10 dB
-7 dB
-4 dB
-3 dB
0 dB
3 dB
6 dB
As can be seen in the example, halving a value reduces the decibel value by 3 dB.
This remains true regardless of the selected reference variable because only the
ratio counts. Which reference variable is used can be recognized by the additional
letters or numbers following the dimension dB. In acoustics, for example, the
threshold of audibility is the reference variable for a value in dB(A).
261
Appendix
Power Specifications
Specifying Power in dBm
A commonly used reference variable in wireless technology is a power of 1 mW.
Power can then be specified in the decibel milliwatt unit (dBm). The following
formula is used:
P [dBm] = 10 * log (P [mW] / 1 mW)
This results in the following power specifications in dBm:
0.5 mW
1 mW
2 mW
4 mW
10 mW
100 mW
200 mW
1W
-3 dBm
0 dBm
3 dBm
6 dBm
10 dBm
20 dBm
23 dBm
30 dBm
IWLAN/PB Link
P0 [dBm]
18
18
18
18
2
5.5
11
262
Appendix
P0 [dBm]
17
17
12
17
18
17
24
17
36
13
48
11
54
10
P0 [dBm]
17
17
12
17
18
17
24
17
36
13
48
11
54
10
263
Appendix
rc
The values for the RCoax cable can be found in the technical specifications in
Chapter 7.
Note
The formula is valid only for the 2.4 GHz RCoax cable.
264
Appendix
IEC 61196-4
Values for coupling losses according to IEC 61196-4 already include spatial
attenuation of 2 m. To calculate the actual coupling loss, a spatial attenuation for
the distance of 2 m must be deducted from this value. The coupling loss for a
specified distance between the RCoax cable and the antenna of the
communication partner is therefore calculated according to the following formula:
cd = c95 - 20 * log(4 * 2m / ) + 20 * log(4d / )
cd
c95
Coupling loss of the cable in dB for a specified distance between cable and
antenna.
c95 value of the coupling loss (specified in the data sheet of the cable)
Wavelength of the electromagnetic oscillation in m; at a frequency of 2.4
GHz, the wavelength is 0.125 m.
Distance between cable and antenna in m.
For a frequency of 2.4 GHz, you can also calculate with the following equation in
which you must specify the distance d in meters:
cd 2.4 GHz = c95 - 46 dB + 20 * log(100 * d)
For a SIEMENS SIMATIC NET IWLAN RCoax Cable PE 1/2'' 2.4 GHz (c95 = 69
dB at 2.4 GHz), for example, this results in the following coupling losses:
Distance
1m
2m
5m
10 m
100 m
U
Coupling loss
63 dB
69 dB
77 dB
83 dB
103 dB
U
Note
The formula is valid only for the 2.4 GHz RCoax cable.
265
Appendix
Receiver Sensitivity
The receiver sensitivity is the minimum power that must be fed to a receiver to
allow communication to take place. The receiver sensitivity is a device-specific
property and depends on the transmission technique and data rate. The
information in the following tables applies to the following SIMATIC NET products:
CP 7515, CP 1515
IWLAN/PB Link
Pe [dBm]
-90
-90
-90
-84
2
5.5
11
Pe [dBm]
-87
-86
12
-85
18
-83
24
-80
36
-76
48
-71
54
-66
266
Appendix
Pe [dBm]
-87
-86
12
-85
18
-83
24
-80
36
-76
48
-71
54
-66
72 [*]
-73
96 [*]
-68
108 [*]
-63
P0
arc
cd
Coupling loss for the distance between RCoax cable and communication
partner (see Section 0)
aps
267
Appendix
fr
268
Glossary
ACL
Access Control List. List with MAC addresses with the right to access
the wireless network
Ad hoc network
AES
ARP
DFS
DHCP
EAP
ECM
Ethernet-Client-Module
Hidden node
problem
Two nodes are arranged in a wireless cell so that they are outside the
transmission range of the other station. If they both access the
medium at the same time, collisions result.
269
Glossary
IEEE
IEEE 802.11
Standard for wireless networks in the 2.4 GHz range with transmission
rates of up to 2 Mbps.
IEEE 802.11a
IEEE 802.11b
Standard for wireless networks in the 2.4 GHz range with transmission
rates of up to 11 Mbps.
IEEE 802.11g
Standard for wireless networks in the 2.4 GHz range with transmission
rates of up to 54 Mbps.
IEEE 802.11h
IEEE 802.11i
Among other things, the standard describes the WPA2 method, the
TKIP procedure and the AES encryption algorithm. IEEE 802.11i
removes a series of weak points in the WEP security mechanism.
IEEE 802.1x
iPCF
PST
RADIUS
Roaming
RTS/CTS
270
Glossary
SSID
SNMP
TKIP
TPC
VAP
WBM
WDS
WEP
Wi-Fi
271
Glossary
Wi-Fi Multimedia
WPA
WPA-PSK
272
Index
A
ACL........................................................ 174
Ad Hoc networks ..................................... 14
Adopt MAC Address................................ 69
Antennas ......................................... 34, 151
ARP table .............................................. 192
Auth Log ................................................ 228
Authentication.................................. 84, 163
B
Bandwidth reservation........................... 213
Basic Wizard...................................... 61, 63
Beacon .................................................. 149
Bridge .................................................... 180
C
Channel Selection ................................... 72
CLI commands
shortcuts for commands .................... 102
symbolic representation..................... 103
Client List............................................... 230
Command Line Interface ....................... 102
C-PLUG ........................................... 28, 136
D
Decibel................................................... 261
DHCP server ......................................... 112
DLC protocol............................................ 48
installation ............................................ 49
E
E-mail .................................................... 121
Encryption........................................ 86, 165
IEEE 802.11b...........................................23
IEEE 802.11g...................................23, 157
IEEE 802.11h...........................................23
IP address................................................63
IP, TCP/IP, ICMP, SNMP ......................242
IP-Alive...................................................224
iPCF .................................................93, 215
iPCF Wizard.......................................61, 93
iQoS .......................................................238
iQoS .......................................................213
L
Learning Table .......................................192
LED simulation.......................................100
Lightning Protection .................................31
Link Check .............................................220
Locale setting.........................................104
Log table ................................................227
Losses....................................................264
M
MAC filter ...............................................210
Max Age.................................................195
Multichannel configuration .......................16
N
NAT ........................................................203
New ........................................................101
O
Overlap AP.............................................236
H
Hello Time ............................................. 195
Help function.......................................... 101
HiPath.................................................... 106
HTTPS..................................................... 60
Hybrid cable............................................. 35
P
Password .................................................76
Path cost ................................................197
Power specifications ..............................262
Power Supply...........................................33
PRESET PLUG........................................44
Primary Setup Tool
Installation ............................................51
via command line .................................56
Priority....................................................196
Protocol filter ..........................................212
I
IEEE 802.11a .......................................... 23
R
RADIUS ...........................................88, 178
F
Forward delay........................................ 195
273
Index
274