background image

Configuring with Web Based Management 

 

5.6 "Interfaces" menu 

 

SCALANCE W780/W740 to IEEE 802.11n Web Based Management 

220

 

Configuration Manual, 03/2015, C79000-G8976-C267-08 

5.6.2.3

 

Antennas 

Overview 

Overview of IWLAN antennas: 

 

The antenna name provides information about the properties of the antennas listed in the 

IWLAN antenna overview: 

 

Summary of Contents for SIMATIC NET SCALANCE W700 Series

Page 1: ...___________________ ___________________ ___________________ SIMATIC NET Industrial Wireless LAN SCALANCE W780 W740 to IEEE 802 11n Web Based Management Configuration Manual 03 2015 C79000 G8976 C267 08 Introduction 1 Description 2 Technical basics 3 Assignment of an IP address 4 Configuring with Web Based Management 5 Upkeep and maintenance 6 Troubleshooting FAQ 7 Appendix A A Appendix B B Appendi...

Page 2: ...ed only by personnel qualified for the specific task in accordance with the relevant documentation in particular its warning notices and safety instructions Qualified personnel are those who based on their training and experience are capable of identifying risks and avoiding potential hazards when working with these products systems Proper use of Siemens products Note the following WARNING Siemens...

Page 3: ...2 11n 24 2 5 Requirements for installation and operation of SCALANCE W700 devices 28 2 6 C PLUG and KEY PLUG 29 2 7 Digital input output 31 2 8 Power over Ethernet PoE 33 3 Technical basics 37 3 1 VLAN 37 3 2 MAC based communication 38 3 3 iPCF iPCF MC 39 3 4 iREF 42 3 5 AeroScout 44 3 6 NAT NAPT 46 3 7 SNMP 47 3 8 Spanning Tree 49 3 8 1 RSTP MSTP CIST 50 4 Assignment of an IP address 53 4 1 Struc...

Page 4: ...erver Settings 84 5 3 1 13 Summary of Settings 85 5 4 Information menu 86 5 4 1 Start Page 86 5 4 2 Versions 91 5 4 3 I M 92 5 4 4 ARP Table 94 5 4 5 Log Tables 95 5 4 5 1 Events 95 5 4 5 2 WLAN Authentication Log 97 5 4 6 Faults 99 5 4 7 Redundancy 100 5 4 8 Ethernet Statistics 104 5 4 8 1 Interface statistics 104 5 4 8 2 Packet Size 105 5 4 8 3 Packet Type 106 5 4 8 4 Packet Error 107 5 4 9 Lear...

Page 5: ...5 8 1 Configuration 160 5 5 8 2 Severity Filter 163 5 5 9 SMTP Client 164 5 5 10 DHCP 166 5 5 10 1 DHCP Client 166 5 5 10 2 DHCP Server 168 5 5 10 3 DHCP Options 170 5 5 10 4 Static Leases 172 5 5 11 SNMP 173 5 5 11 1 General 173 5 5 11 2 Traps 175 5 5 11 3 v3 Groups 176 5 5 11 4 v3 Users 179 5 5 12 System Time 181 5 5 12 1 Manual Setting 181 5 5 12 2 DST Overview 183 5 5 12 3 DST Configuration 18...

Page 6: ...245 5 7 1 2 Port based VLAN 248 5 7 2 Dynamic MAC Aging 250 5 7 3 Spanning Tree 251 5 7 3 1 General 251 5 7 3 2 CIST general 253 5 7 3 3 CIST port 255 5 7 3 4 MST general 259 5 7 3 5 MST Port 260 5 7 4 DCP Forwarding 263 5 7 5 LLDP 264 5 8 Layer 3 menu 266 5 8 1 NAT 266 5 8 1 1 Basic 266 5 8 1 2 NAPT 268 5 9 Security menu 270 5 9 1 Passwords 270 5 9 2 WLAN 271 5 9 2 1 Basic 271 5 9 2 2 AP Communic...

Page 7: ...a WBM or CLI not possible 297 7 2 Disrupted data transmission due to the received power being too high 299 7 3 Compatibility with predecessor products 300 7 4 Instructions for secure network design 301 A Appendix A 303 A 1 MIB files supported by SCALANCE W700 303 B Appendix B 305 B 1 Private MIB variables of the SCALANCE W700 305 C Appendix C 307 C 1 Underlying standards 307 D Appendix D 309 D 1 M...

Page 8: ...Table of contents SCALANCE W780 W740 to IEEE 802 11n Web Based Management 8 Configuration Manual 03 2015 C79000 G8976 C267 08 ...

Page 9: ...6 1 RJ 45 SCALANCE W786 2 RJ 45 SCALANCE W786 2IA RJ 45 SCALANCE W786 2 SFP This Configuration Manual applies to the following software version SCALANCE W700 firmware as of version V 5 1 Note This configuration manual does not apply to the SCALANCE W7xC 2 Purpose of the Configuration Manual This Configuration Manual is intended to provide you with the information you require to install commission ...

Page 10: ...1 Operating Instructions This document contains information on installing and connecting up the following products and their approvals SCALANCE W788 1 RJ 45 SCALANCE W788 1 M12 SCALANCE W788 2 RJ 45 SCALANCE W788 2 M12 SCALANCE W788 2 M12 EEC SCALANCE W748 1 RJ 45 SCALANCE W748 1 M12 SCALANCE W786 Operating Instructions This document contains information on installing and connecting up the followi...

Page 11: ...rch function support automation siemens com http support automation siemens com WW llisapi dll func cslib csinfo2 aktprim 99 la ng en Enter the entry ID of the relevant manual as the search item In the navigation panel on the left hand side in the area Industrial Communication Industrial communication http support automation siemens com WW llisapi dll func cslib csinfo lang de siteid csius aktprim...

Page 12: ...find among other things optical performance data of the communications partners that you require for the installation The SIMATIC NET Industrial Ethernet Network Manual can be found on the Internet pages of Siemens Industry Online Support under the following entry ID 27069465 http support automation siemens com WW view en 27069465 Security information Siemens provides products and solutions with i...

Page 13: ... W788 1 M12 SCALANCE W788 2 M12 SCALANCE W788 2 M12 EEC SCALANCE W788 1 RJ 45 SCALANCE W788 2 RJ 45 Access points IP65 W786 x SCALANCE W786 1 RJ 45 SCALANCE W786 2 RJ 45 SCALANCE W786 2IA RJ 45 SCALANCE W786 2 SFP All SCALANCE W access points W78x SCALANCE W788 1 M12 SCALANCE W788 2 M12 SCALANCE W788 2 M12 EEC SCALANCE W788 1 RJ 45 SCALANCE W788 2 RJ 45 SCALANCE W786 1 RJ 45 SCALANCE W786 2 RJ 45 ...

Page 14: ...is made up of several parts that have the following meaning SIMATIC NET glossary Explanations of many of the specialist terms used in this documentation can be found in the SIMATIC NET glossary You will find the SIMATIC NET glossary here SIMATIC NET Manual Collection or product DVD The DVD ships with certain SIMATIC NET products On the Internet under the following entry ID 50305045 http support au...

Page 15: ...nt mode Standalone configuration with access point This configuration does not require a server and the access point does not have a connection to a wired Ethernet Within its transmission range the access point forwards data from one WLAN node to another The wireless network has a unique name All the devices exchanging data within this network must be configured with this name Figure 2 1 Standalon...

Page 16: ...ork can be connected to a wired network via an access point Span of wireless coverage for the wireless network with several access points The access points are all configured with the same unique SSID network name All nodes that want to communicate over this network must also be configured with this SSID If a mobile station moves from the area covered by one access point to the area covered by ano...

Page 17: ...boring wireless cells each have their own medium available and the delays resulting from time offset transmission no longer occur The channel spacing should be as large as possible a practical value is 25 MHz Even in a multichannel configuration all access points can be configured with the same network name Figure 2 3 Multichannel configuration on channels 1 and 2 with four access points Wireless ...

Page 18: ...l 03 2015 C79000 G8976 C267 08 Figure 2 4 Implementation of WDS with four access points Network access with a client or an access point in client mode The device can be used to integrate wired Ethernet devices for example SIMATIC S7 PLC in a wireless network Figure 2 5 Connecting a SIMATIC S7 PLC to a wireless LAN ...

Page 19: ...ifferent frequencies The SCALANCE W788 supports the protection class IP65 and the protection class IP30 The access points are available in two versions M12 for degree of protection IP65 RJ 45 for the degree of protection IP30 With a SCALANCE W788 with two WLAN interfaces you can also implement a redundant wireless connection to a SCALANCE W78x with two WLAN interfaces Possible applications of the ...

Page 20: ...a WLAN interface This makes the device suitable for the following applications The SCALANCE W748 forwards data within its transmission range from one node to another without a connection to wired Ethernet being necessary The SCALANCE W748 can be used as a gateway from a wired to a wireless network The SCALANCE W748 can be used as a wireless bridge between two networks The device can also connect u...

Page 21: ... 5 47 5 725 GHz to be used in the outdoor area even with higher transmit powers TPC is a method of adapting the transmit power With DFS the access point searches for primary users for 60 seconds before starting communication on the selected channel During this time the access point does not send beacons If signals are found on the channel the channel is blocked for 30 minutes the access point chan...

Page 22: ...o use Industrial Wireless LAN systems and WirelessHART systems in the 2 4 GHz band you will need to plan the use of the channels At all costs avoid parallel use of overlapping frequency ranges The following overlaps exist with Industrial Wireless LAN and WirelessHART IWLAN channel IEEE 802 11 b g n WHART channel IEEE 802 15 4 1 11 16 6 15 20 7 16 21 11 20 25 13 21 25 Note All SCALANCE W700 access ...

Page 23: ...xternal 1 x gigabit Ethernet cop per IP65 6GK5786 2FC00 0AA0 6GK5786 2FC00 0AA0 1 SCALANCE W786 2IA RJ 45 2 Internal 1 x gigabit Ethernet cop per IP65 6GK5786 2HC00 0AA0 6GK5786 2HC00 0AB0 1 SCALANCE W786 2 SFP 2 external 2 x SFP slots IP65 6GK5786 2FE00 0AA0 6GK5 786 2FE00 0AB0 1 SCALANCE W788 1 M12 1 external 1 x gigabit Ethernet cop per IP65 6GK5788 1GD00 0AA0 6GK5788 1GD00 0AB0 1 SCALANCE W788...

Page 24: ...ncy band IEEE 802 11g b or in the 5 GHz frequency band IEEE 802 11a IEEE 802 11n can operate in both frequency band In the IEEE 802 11n standard there are mechanisms implemented in PHY and MAC layers that increase the data throughput and improve the wireless coverage MIMO antenna technology Maximum ratio combining MRC Spatial multiplexing Channel bonding Frame aggregation Accelerated guard interva...

Page 25: ...ristic signals Here each spatial position is different from the neighboring position By characterizing the individual senders the recipient is capable of separating several signals from each other Maximum ratio combining MRC In a multiple antenna system the wireless signals are received by the individual antennas and combined to form one signal The MRC method is used to combine the wireless signal...

Page 26: ... to group together individual data packets to form a single larger packet this is known as frame aggregation There are two types of frame aggregation Aggregated MAC Protocol Data Unit A MPDU and Aggregated MAC Service Data Unit A MSDU The frame aggregation reduces the packet overheads Frame aggregation can only be used if the individual data packets are intended for the same receiving station clie...

Page 27: ... Manual 03 2015 C79000 G8976 C267 08 27 Modulation and coding schemes The IEEE 802 11n standard supports different data rates The data rates are based on the number of spatial streams the modulation method and the channel coding The various combinations are described in modulation and coding schemes ...

Page 28: ...SCALANCE W700 devices Requirements for installation and operation of SCALANCE W700 devices A PG PC with a network connection must be available in order to configure SCALANCE W700 devices If no DHCP server is available a PC on which the Primary Setup Tool PST is installed is necessary for the initial assignment of an IP address to the SCALANCE W700 devices For the other configuration settings a com...

Page 29: ...et using DHCP and the DHCP server has not been reconfigured accordingly A reconfiguration is necessary if you use functions based on MAC addresses Note In terms of the PLUG the SCALANCE devices work in two modes Without PLUG The device stores the configuration in internal memory This mode is active when no PLUG is inserted With PLUG The configuration stored on the PLUG is displayed over the user i...

Page 30: ...E W780 W740 to IEEE 802 11n Web Based Management 30 Configuration Manual 03 2015 C79000 G8976 C267 08 License information on the KEY PLUG In addition to the configuration the KEY PLUG also contains a license that allows the use of the iFeatures ...

Page 31: ...utomated guided transport system Control of the digital output Using CLI and using the private MIB variable snMspsDigitalOutputLevel you can control the digital output DO 1L Note You cannot configure the digital output with Web Based Management WBM If the digital input changes the status an entry is made in the event protocol table OID of the private MIB variable snMspsDigitalOutputLevel iso 1 org...

Page 32: ...InputLevel iso 1 org 3 dod 6 internet 1 private 4 enterprises 1 siemens 4329 industria lComProducts 20 iComPlatforms 1 simaticNet 1 snMsps 1 snMspsCommon 1 snMspsDi gitalIO 39 snMspsDigitalIOObjects 1 snMspsDigitalInputTable 2 snMspsDigitalInpu tEntry 1 snMspsDigitalInputLevel 6 values of the MIB variable 1 Signal 0 at the digital input DI 2 Signal 1 at the digital input DI MIB file The MIB variab...

Page 33: ...and 7 8 are then used to supply power If there are only four wires the voltage is modulated onto wires 1 2 and 3 6 see variant 2 This alternative is suitable for a data transmission rate of 10 100 Mbps This type of power supply is not suitable for 1 Gbps because with gigabit Ethernet all 8 wires are used for the data transmission Variant 2 phantom power With phantom power the power is supplied ove...

Page 34: ...plies complying with NEC class 2 in USA CAN the cabling must meet the requirements of NEC CEC Power load maximum 0 5 A Cable lengths Table 2 1 Permitted cable lengths copper cable Fast Ethernet Cable type Accessory plug outlet TP cord Permitted cable length IE TP torsion cable with IE FC Outlet RJ 45 10 m TP cord 0 to 45 m 10 m TP cord with IE FC RJ 45 Plug 180 0 to 55 m IE FC TP Marine Cable IE F...

Page 35: ...ires 10 100 Mbps only Phantom power 1 Yellow Green white Data Data power 2 Orange Green Data Data power 3 White Orange white Data Data power 6 Blue Orange Data Data power 4 Blue Power unused at 10 100 Mbps 5 Blue white Power unused at 10 100 Mbps 7 Brown white Power unused at 10 100 Mbps 8 Brown Power unused at 10 100 Mbps LEDs for PoE on the SCALANCE W700 device When the device is supplied by PoE...

Page 36: ...Description 2 8 Power over Ethernet PoE SCALANCE W780 W740 to IEEE 802 11n Web Based Management 36 Configuration Manual 03 2015 C79000 G8976 C267 08 ...

Page 37: ...orwarded within the particular VLAN they are also known as broadcast domains The particular advantage of VLANs is the reduced network load for the nodes and network segments of other VLANs To identify which packet belongs to which VLAN the frame is expanded by 4 bytes This expansion includes not only the VLAN ID but also priority information Options for the VLAN assignment There are various option...

Page 38: ...d to the connected devices Maximum possible number of Ethernet nodes with layer 2 communication downstream from the client 1 Notes on the Automatic setting As long as there is no link on the Ethernet interface the device uses the MAC address of the Ethernet interface so that it can be reached in this status In this status the device can be found using the Primary Setup Tool and configured with WBM...

Page 39: ...existing connection to an access point is working problem free This means that if a change to a different access point is necessary this is achieved extremely quickly In contrast to iPCF the handover times for iPCF MC are not dependent on the number of wireless channels being used You configure iPCF MC in iFeatures iPCF MC Page 290 iPCF iPCF MC how it works The access point checks all nodes in the...

Page 40: ...E 802 11n Web Based Management 40 Configuration Manual 03 2015 C79000 G8976 C267 08 Wireless cell of access point 1 Wireless cell of access point 2 Wireless cell of access point 3 Wireless cell of access point 4 Plant Figure 3 1 Configuration example of iPCF MC ...

Page 41: ... and sends a beacon every five milliseconds The other interface transfers the user data The following requirements must be met before you can use iPCF MC Only devices with two WLAN interfaces can be used as access points The data interface WLAN1 and management interface WLAN2 must be operated in the same frequency band and must match in terms of their wireless coverage iPCF MC will not work if the...

Page 42: ...ch individual client is handled via the most suitable antenna Which antenna is most suitable is determined by the access point based on the RSSI values of received packets Taking into account antenna gain and possible cable losses packets are only sent via the antennas with which the maximum signal strength at the client end can be expected During this time the other antennas are inactive and the ...

Page 43: ... 1 x spatial stream is possible iREF cannot be used along with other iFeatures for example iPCF or iPCF MC Advantages Due to the directional data transmission and dynamic deactivation of antennas that do not radiate in the direction of the particular client interference can be reduced The signal strength is improved because the active antenna always has the maximum permitted transmit power availab...

Page 44: ...and material handling engineering represent possible applications for this function Button Regardless of the frames sent cyclically a user can also send a message by pressing a button LED This provides information on the operating status of the tag Note For more detailed information please refer to the AeroScout documentation www aeroscout com How it works The tag sends its data as AeroScout frame...

Page 45: ...ent Configuration Manual 03 2015 C79000 G8976 C267 08 45 Accuracy of localization To achieve optimum precision in the localization of AeroScout Tags we recommend the use of antennas with omnidirectional characteristics if the signals should be received by at least three access points ...

Page 46: ...translated into the same external source IP address To identify the individual source nodes the port of the source device is also stored in the translation list of the NAT gateway and translated for the external address If several local clients send a query to the same external destination IP address over the NAT gateway the gateway enters its own external source IP address in the header of these ...

Page 47: ...f the community string is correct the SNMP agent responds and sends the requested data If the community string is not correct the SNMP agent discards the query Define different community strings for read and write permissions The community strings are transferred in plain text Standard values of the community strings public has only read permissions private has read and write permissions Note Beca...

Page 48: ... assignment data for the relevant device The SNMP agent sends data packets of the following type RESPONSE The agent returns the data requested by the manager TRAP If a certain event occurs the SNMP agent itself sends traps SNMPv1 v2 v3 use UDP User Datagram Protocol and use the UDP ports 161 and 162 The data is described in a Management Information Base MIB SNMPv3 Compared with the previous versio...

Page 49: ...election of the root bridge The computer with the lowest value set for this parameter automatically becomes the root bridge If two computers have the same priority value the computer with the lower MAC address becomes the root bridge Response to changes in the network topology If nodes are added to a network or drop out of the network this may affect the optimum path selection for data packets To ...

Page 50: ... activated immediately after connection establishment If a spanning tree BPDU is received at an edge port the port loses its role as edge port and it takes part in R STP again If no further BPDU is received after a certain time has elapsed 3 x hello time the port returns to the edge port status Point to point direct communication between two neighboring devices By directly linking the devices a st...

Page 51: ...rotocol Among other things it provides the option of operating several RSTP instances within different VLANs or VLAN groups and for example making paths available within the individual VLANs that the single Rapid Spanning Tree Protocol would globally block Note Default setting HTTP is enabled as default on the device Common and internal Spanning Tree CIST CIST identifies the internal instance used...

Page 52: ...Technical basics 3 8 Spanning Tree SCALANCE W780 W740 to IEEE 802 11n Web Based Management 52 Configuration Manual 03 2015 C79000 G8976 C267 08 ...

Page 53: ...24 224 0 0 0 239 255 255 255 Multicast applications D 240 0 0 0 255 255 255 255 Reserved for future applications E An IP address consists of 4 bytes Each byte is represented in decimal with a dot separating it from the previous one This results in the following structure where XXX stands for a number between 0 and 255 XXX XXX XXX XXX The IP address is made up of two parts the network ID and the ho...

Page 54: ...he standard subnet address for class B networks is 255 255 0 0 in other words the last two bytes are available for defining a subnet If 16 subnets must be defined the third byte of the subnet address must be set to 11110000 binary notation In this case this results in the subnet mask 255 255 240 0 To find out whether two IP addresses belong to the same subnet the two IP addresses and the subnet ma...

Page 55: ...quire that an IP address already exists The following options are available to assign an IP address to an unconfigured device currently without an IP address DHCP default Primary Setup Tool STEP 7 NCM PC Note When the product ships and following Restore Factory Defaults and Restart DHCP is enabled If a DHCP server is available in the local area network and this responds to the DHCP request of a SC...

Page 56: ...lways receives the same fixed address in response to its request The parameter with which the DHCP client is identified for the fixed address assignment is set on the DHCP client The address can be assigned via the MAC address the DHCP client ID or the system name You configure the parameter in System DHCP Client Page 166 The following DHCP options are supported DHCP option 6 Assignment of a DNS s...

Page 57: ...le of assigning such an address to unconfigured devices that do not yet have an IP address Requirement The devices can be reached via Ethernet Note For more detailed information refer to the Primary Setup Tool configuration manual You will find the PST at Siemens Industry Automation and Drives Service Support on the Internet under entry ID 19440762 The URL for this entry is http support automation...

Page 58: ... the unconfigured IWLAN device to the controller the controller assigns the configured device name and the IP address to the IWLAN device automatically STEP 7 V5 x and earlier For further information on the assignment of the IP address using STEP 7 V5 x and earlier refer to the documentation Configuring Hardware and Communication Connections STEP 7 in the section Steps for Configuring a PROFINET I...

Page 59: ...to the client PC depending on the user input The user enters the configuration data in the HTML pages sent by the device The device evaluates this information and generates reply pages dynamically The advantage of this method is that only a Web browser is required on the client Note Secure connection WBM also allows you to establish a secure connection via HTTPS Use HTTPS for protected data transm...

Page 60: ...n Under Check for newer versions of stored pages select Automatically If a firewall is used the relevant ports must be opened For access using HTTP Port 80 For access using HTTPS Port 443 The display of the WBM was tested with the following desktop Web browsers MS IE 10 Note Compatibility view In Microsoft Internet Explorer disable the compatibility view to ensure correct display and to allow prob...

Page 61: ...ou can check whether or not a connection exists 2 In the address box of the Internet browser enter the IP address or the URL of the device If there is a problem free connection to the device the logon page of Web Based Management WBM is displayed Logging on using the Internet browser Selecting the language of the WBM 1 From the drop down list at the top right select the language version of the WBM...

Page 62: ...ith this user type you cannot change any of the settings of the device read access to the configuration data 2 Enter your password in the Password input box When you log on for the first time or following a Restore Factory Defaults and Restart enter the standard password in the Password input box admin standard password admin user standard password user 3 Click the Login button or confirm your ent...

Page 63: ...ad and write access to the configuration data user With this user type you cannot change any of the settings of the device read access to the configuration data 4 Enter your password in the Password input box When you log on for the first time or following a Restore Factory Defaults and Restart enter the standard password in the Password input box admin standard password admin user standard passwo...

Page 64: ... For more detailed information refer to the section Assignment of an IP address Page 53 You are logged on in WBM as the admin user For more detailed information refer to the section Login Page 61 Starting the Basic Wizard Click on Wizard Basic Wizard in the navigation area to start the Basic Wizard If you log on the first time or log on after a Restore Factory Defaults and Restart the Basic wizard...

Page 65: ...ic Wizard page you specify the mode of the device After changing the mode a message is displayed If you confirm the message with OK the device restarts with the factory set configuration settings Log on again and start the Basic Wizard to continue the configuration of the device for the selected mode Note Because only access points can work in client mode as well the mode can only be selected for ...

Page 66: ...ored with the exception of the parameters below followed by a restart IP address Subnet mask IP address of the default gateway DHCP client ID DHCP System name System location System contact User names and passwords Mode of the device After restarting the device you will need to log on again and start the Basic wizard again to configure the device Device Mode drop down list Select the mode of the d...

Page 67: ...he data for the specific country the channel division and output power are set by the device according to the country you select Note Locale setting The correct country setting is mandatory for operation complying with the approvals Selecting a country different from the country of use can lead to legal prosecution System Name input box You can enter the name of the device If you configure this bo...

Page 68: ...llowing boxes DHCP Client check box Specify how the IP address will be assigned There are two methods of assigning IP addresses Enabled The device obtains a dynamic IP address from a DHCP Server Disabled You enter the IP settings in the IP Address and Subnet Mask input boxes IP Address input box Enter an IP address that is unique within your network Subnet Mask input box Enter the subnet mask of t...

Page 69: ... Wizard Description The page contains the following boxes Telnet Server check box Enable or disable the Telnet Server service for unencrypted access to the CLI SSH Server check box Enable or disable the SSH Server service for encrypted access to the CLI HTTPS Server only check box Enable or disable access using HTTPS DCP Server drop down list Specify whether or not the device can be accessed with ...

Page 70: ...sible with SNMP versions 1 2c or 3 You can configure other settings in System SNMP General SNMPv3 Access to device parameters is possible with SNMP version 3 You can configure other settings in System SNMP General SNMPv1 v2 Read Only check box Enable or disable write access to SNMP variables with SNMPv1 v2c SINEMA Configuration Interface check box If the SINEMA configuration interface is enabled y...

Page 71: ...R2A1 must be always be connected as soon as the associated WLAN Interface is turned on If no antenna is connected the relevant interface must also be disabled for RX and TX Otherwise there may be transmission disruptions Antenna Gain If you select the User defined entry for the Antenna Type enter the antenna gain manually in the dB unit Antenna Gain 2 4 GHz dBi Here enter the antenna gain the ante...

Page 72: ...nterface Frequency Band Specify the frequency band In client mode dual frequency operation is also possible Note Configuring WLAN interfaces of the W786 2IA RJ 45 for different frequency bands If both WLAN interfaces are configured for the same frequency band on this device there may be mutual influence or interference This applies in particular when there is a high data throughput WLAN Mode Selec...

Page 73: ...r when using antennas to avoid exceeding the maximum legal transmit power Reducing the transmit power effectively reduces cell size Note The maximum possible transmit power varies depending on the channel and data rate For more detailed information on transmit power refer to the documentation Characteristics radio interface Note If both interfaces of access points with two WLAN interfaces are oper...

Page 74: ... W740 to IEEE 802 11n Web Based Management 74 Configuration Manual 03 2015 C79000 G8976 C267 08 5 3 1 7 Access Point Settings Introduction On this Basic Wizard page you specify the configuration for the Access Point Note This page is available only in access point mode ...

Page 75: ... to search for a free channel itself use Auto If you want to use a fixed channel select the required channel from the drop down list HT Channel Width MHz You can specify the channel bandwidth with the IEEE 802 11n transmission standard The following settings are possible 20 Channel bandwidth 20 MHz 40 up Channel bandwidth 40 MHz The configured channel and the neighboring channel above it are used ...

Page 76: ... 802 11n Web Based Management 76 Configuration Manual 03 2015 C79000 G8976 C267 08 5 3 1 8 Client Settings Introduction On this Basic Wizard page you specify the configuration for clients for example the assignment of the MAC address Note This page is only available in client mode ...

Page 77: ... address of the Ethernet interface for the WLAN interface The network is also informed of the MAC addresses connected to the Ethernet interface of the client Up to eight MAC addresses can be used MAC Address Enter the MAC address of the client The input box can only be edited if you have set Manual for the MAC Mode Any SSID Enabled In client mode the device attempts to connect to the network with ...

Page 78: ...on Manual 03 2015 C79000 G8976 C267 08 5 3 1 9 Client Allowed Channel Settings Introduction For communication a specific channel within a frequency band is used On this page you can either set this channel specifically or configure so that the channel is selected automatically Note This page is only available in client mode ...

Page 79: ...de antennas transmit power etc are used Above the tables for the frequency bands you will find the following check box Select Deselect all Enabled If you enable the check box all channels are selected Disabled If you deselect the check box only the first valid channel of the frequency band remains enabled The tables of the frequency bands have the following columns Radio Shows the available WLAN i...

Page 80: ... of authentication and the encryption procedure Note If AUTO or 802 11n or 802 11 n only is set for WLAN Mode AUTO only the authentication types Open System WPA2 RADIUS WPA2 PSK can be set Use WPA2 AES to prevent misuse of a password WPA2 RADIUS WPA2 PSK with AES provides the greatest security You will find further information on security in the configuration manual under Instructions for secure n...

Page 81: ...cation with RADIUS server You configure the access data on the next Basic Wizard page WPA2 PSK WPA2 authentication with WPA2 key Enter the WPA2 key in WPA 2 Pass phrase WPA2 RADIUS WPA2 authentication with RADIUS server You configure the access data on the next Basic Wizard page Cipher Select the encryption method AUTO AES or TKIP is used depending on the capability of the other station TKIP Tempo...

Page 82: ...ent and the access point and is entered by the user at both ends Note The WPA 2 key can be 8 to 63 ASCII characters or exactly 64 hexadecimal characters long It should be selected so that is complex for example consisting of random numbers letters upper lowercase have few repetitions and special characters Do not use known names words or terms that could be guessed If a device is lost or if the ke...

Page 83: ...n configure them after completing the Basic Wizard with Security WLAN Client Radius Supplicant Note This page is only available in client mode Description Table 1 contains the following columns Radio Shows the available WLAN interfaces Dot1x User Name Enter the user name with which the client will log on with the RADIUS server Dot1x User Password Enter the password for the user name selected above...

Page 84: ...er settings for example the number of logon attempts with Security WLAN AP Radius Authenticator Note This page is available only in access point mode Description This table contains the following columns Server Role Shows the role of the server Server IP Address Enter the IP address of the RADIUS server The use of the computer name name resolution using DNS instead of the IP address is not support...

Page 85: ...ion The settings are summarized on this page The content of the page depends on the set parameters and the mode of the device Check the settings before you exit the Basic Wizard with the Set Values button If settings are incorrect go back using the Previous button and change the settings to the required ones Set Values Click the Set Values button to exit the Basic Wizard The WLAN settings are adop...

Page 86: ...enu 5 4 1 Start Page View of the Start page When you enter the IP address of the device the start page is displayed after a successful login You cannot configure anything on this page General layout of the WBM pages The following areas are generally available on every WBM page Selection area 1 Top area Display area 2 Top area Navigation area 3 Left hand area Content area 4 Middle area ...

Page 87: ...Configuring with Web Based Management 5 4 Information menu SCALANCE W780 W740 to IEEE 802 11n Web Based Management Configuration Manual 03 2015 C79000 G8976 C267 08 87 ...

Page 88: ...full title of the currently selected menu item is always displayed Mode Shows whether the device is an access point or a client Printer When you click this button a pop up window opens with a view of the page content optimized for the printer Help When you click this button the help page of the currently selected menu item is opened in a new browser window LED simulation Each component of a device...

Page 89: ...formation is available or with which you can create configurations These pages are always displayed in the content area Content area 4 In the navigation area click a menu to display the pages of the WBM in the content area The following is displayed below the picture of the device PNIO Name of Station PROFINET IO device name System Name System name of the device Device Type The type of the device ...

Page 90: ...ower edge The button only becomes active if you change at least one value on the page Click this button to save the configuration data you have entered on the device Once you have saved the button becomes inactive again Note Changing configuration data is possible only with the admin login Create entries with Create Pages in which you can make new entries have a Create button at the lower edge Cli...

Page 91: ... the versions of the hardware and software of the device You cannot configure anything on this page Description Table 1 has the following columns Hardware Basic Device Shows the basic device Name Shows the name of the device or module Revision Displays the hardware version of the device For the wireless card only one version is then displayed if the WLAN interface is enabled Order ID Shows the ord...

Page 92: ... next restart the downloaded firmware is activated and used Bootloader Shows the version of the boot software stored on the device Firmware_Running Shows the firmware version currently being used on the device Description Shows the short description of the software Version Shows the version number of the software version Date Shows the date on which the software version was created 5 4 3 I M Ident...

Page 93: ... the hardware version Software Revision Shows the software version Revision Counter As of firmware version 4 0 the value 0 is always shown here regardless of the version change Revision Date Revision date Date and time of the last revision Function Tag Shows the function tag plant designation of the device The plant designation HID is created during configuration of the device with HW Config of ST...

Page 94: ...to IP address This assignment is kept by each network node in its own separate ARP table The WBM page shows the ARP table of the device Description The table has the following columns Interface Shows the interface via which the row entry was learnt MAC Address Shows the MAC address of the target device IP Address Shows the IP address of the target device Media Type Shows the type of connection Dyn...

Page 95: ...he page of the System Events menu This for example allows you to record when an authentication attempt failed or when the connection status of a port has changed The content of the events log table is retained even when the device is turned off You cannot configure anything on this page Description Severity Filters You can filter the entries in the table according to severity To display all the en...

Page 96: ...the event occurred Description of the button Clear button Click this button to delete the content of the event log file The display is also cleared The restart counter is only reset after you have restored the device to the factory settings and restarted the device Note The number of entries in this table is restricted to 400 When this number is reached the oldest entries are overwritten The table...

Page 97: ...he following columns Restart Counts the number of restarts since you last reset to factory settings and shows the device restart after which the corresponding event occurred System Up Time Shows the time the device has been running since the last restart when the described fault occurred System Time Shows the time at which the described error occurred Log Message Displays a brief description of th...

Page 98: ...he device to the factory settings and restarted the device Note The number of entries in this table is restricted to 400 When this number is reached the oldest entries are overwritten The table remains permanently in memory Show all button Click this button to display all the entries on the WBM page Note that displaying all messages can take some time Next button Click this button to go to the nex...

Page 99: ...last system start When the system is restarted a new entry with the type of restart is created in the fault memory Description The page contains the following boxes No of Signaled Faults Indicates how often the fault LED lit up and not how many faults occurred Reset Counters button The number is reset with this button The table contains the following columns Fault Time Shows the time the device ha...

Page 100: ...ent information about the Spanning Tree and the settings of the root bridge If Spanning Tree is turned off only the basic information about this device is displayed If Spanning Tree is turned on the information about the status of the instance selected in the Instance ID drop down list is displayed and the information about the configured ports is shown in the table The information shown depends o...

Page 101: ...ddress has the lowest numeric value will become the root bridge Both parameters bridge priority and MAC address together form the bridge identifier Since the root bridge manages all path changes it should be located as centrally as possible due to the delay of the frames The value for the bridge priority is a whole multiple of 4096 with a range of values from 0 to 32768 Bridge Addresse Root Addres...

Page 102: ...port The values are only displayed The parameter depends on the configured protocol The following statuses are possible Discarding The port receives BPDU frames Other incoming or outgoing frames are discarded Listening The port receives and sends BPDU frames The port is involved in the spanning tree algorithm Other outgoing and incoming frames are discarded Learning The port actively learns the to...

Page 103: ...the transmission speed The higher the achievable transmission speed is the lower the value of the path costs Typical values for path costs with rapid spanning tree 10 000 Mbps 2 000 1000 Mbps 20 000 100 Mbps 200 000 10 Mbps 2 000 000 Edge Type Shows the type of the connection The following values are possible Edge Port An edge port is connected to this port No Edge Port There is a spanning tree or...

Page 104: ...ase MIB Figure 5 1 Interface statistics Displayed values The table has the following columns In Octet Shows the number of received bytes Out Octet Shows the number of sent bytes In Unicast Shows the number of received unicast frames In Non Unicast Shows the number of received frames that are not of the type unicast Out Unicast Shows the number of sent unicast frames Out Non Unicast Shows the numbe...

Page 105: ...figure anything on this page Description The table has the following columns Port Shows the available ports Frame lengths The other columns after the port number contain the absolute numbers of incoming frames according to their frame length The following frame lengths are distinguished 64 bytes 65 127 bytes 128 255 bytes 256 511 bytes 512 1023 bytes 1024 max Description of the button Reset Counte...

Page 106: ...ulticast and Broadcast were received at each port You cannot configure anything on this page Description The table has the following columns Port Shows the available ports Unicast Multicast Broadcast The other columns after the port number contain the absolute numbers of the incoming frames according to their frame type Unicast Multicast and Broadcast Description of the button Reset Counter button...

Page 107: ...umbers of the incoming frames according to their error type In the columns of the table a distinction is made according to the following error types CRC Packets whose content does not match the CRC checksum Undersize Packets with a length less than 64 bytes Oversize Packets discarded because they were too long Fragments Packets with a length less than 64 bytes and a bad CRC checksum Jabbers VLAN t...

Page 108: ... 5 4 9 Learning Table Address filtering This WBM page shows the current content of the learning table This table lists the source addresses of unicast address frames Description This table contains the following columns VLAN ID Shows the VLAN ID of the node Note This column appears in the table only if a VLAN is configured MAC Address Shows the MAC address of the node ...

Page 109: ...d from this node Invalid These values are not evaluated Port Shows the port over which the node with the specified address can be reached Frames received by the device whose destination address matches this address will be forwarded to this port Button Show all Click this button to display all the entries on the WBM page Note that displaying all messages can take some time Next button Click this b...

Page 110: ...s in the network based on the MAC address HW Address Shows the MAC address of the DHCP client Allocation Method Show whether the IPv4 address was assigned statically or dynamically You configure the static entries in System DHCP Static Leases Binding State Shows the status of the assignment assigned The assignment is used not assigned The assignment is not used probing The assignment is being chec...

Page 111: ...of the configuration This page shows these settings properties of the WLAN or the WLAN interface Note This tab is available only in access point mode Description Table 1 has the following columns Radio Shows the available WLAN interfaces WLAN mode Shows the transmission standard If DFS is activated the transmission standard 802 11h is not shown additionally but only the configured transmission sta...

Page 112: ...erative Channel Shows the channel of the access point via which the access point communicates HT Channel Width MHz Shows the channel bandwidth 20 Channel bandwidth 20 MHz 40 up Channel bandwidth 40 MHz The configured channel and the neighboring channel above it are used 40 down Channel bandwidth 40 MHz The configured channel and the neighboring channel below it are used Note Channel bandwidth 40 M...

Page 113: ... point SSID Shows the SSID Security Shows which authentication method is used If the authentication method Open System Encryption or Shared Key is used Encrypted WEP AES is displayed for both authentication methods Status Shows the status of the WLAN interface enabled The WLAN interface is enabled disabled The WLAN interface is disabled 5 4 11 2 Client List Logged on clients The page the clients l...

Page 114: ... the client if the client communicates this to the access point Not all clients support this parameter Channel Shows the channel over which the client communicates with the access point Signal Strength dBm Shows the signal strength of the connected client in decibel milliwatts Signal Strength Shows the signal strength of the connected client as a percentage Age s Shows the time that has elapsed si...

Page 115: ...On Off is displayed As default updating is always enabled on the WBM page Note This tab is available only in access point mode This page shows information about the WDS connections of the access point Description The table has the following columns Radio Shows the available WLAN interfaces Port Shows the port BSSID Shows the MAC address of the WDS partner WDS ID Shows the name of the WDS partner C...

Page 116: ... throughput it is important that the set wireless channel is not used by other access points In the 2 4 GHz band 802 11b or 802 11g there is overlapping of the channels so that an access point occupies not only the set channel but also the two or three adjacent channels You should therefore make sure that there is adequate channel spacing to neighboring access points This page shows all access poi...

Page 117: ...nterface SSID Shows the SSID of the access point BSSID Shows the MAC address of the access point System Name displays the system name of the device The entry depends on the access point Not all access points support this parameter Channel Shows the channel over which the client communicates with the access point Signal Strength dBm Shows the signal strength of the client in dBm Signal Strength Sho...

Page 118: ...de Shows how the MAC address is assigned to the interface Automatic The client automatically adopts the source MAC address of the first frame that it receives over the Ethernet interface Manual The address was entered manually Own The client uses the MAC address of the Ethernet interface for the WLAN interface Layer 2 Tunnel The client uses the MAC address of the Ethernet interface for the WLAN in...

Page 119: ...ed channel or on neighboring channels the access point changes the channel bandwidth from 40 MHz to 20 MHz If you set a free channel on the access point the access point uses the channel bandwidth 40 MHz Connected BSSID Shows the MAC address of the access point with which the client is connected Connected SSID Shows the SSID of the access point with which the client is connected Security Shows whi...

Page 120: ...is different Since the client does not run a background scan in this case only the access point with which the client is currently connected is displayed Description The table has the following columns Radio Shows the WLAN interface visible to the access point SSID Shows the SSID of the access point BSSID Shows the MAC address of the access point System Name displays the system name of access poin...

Page 121: ...ccess available for several devices with one client if you use IP mapping This means that you do not need to equip every device with its own WLAN client This is possible only if the connected devices are addressed only by IP frames Communication at MAC address level ISO OSI layer 2 can be established with one component whose MAC address is configured on the client be established with a maximum of ...

Page 122: ... from the WLAN client MAC Mode Frames sent by the client to the access point always have the MAC address of the WLAN client as the source MAC address In the Learning Table of the access point there is therefore only the MAC address of the WLAN client If there are further devices downstream from the client the Automatic option should not be enabled In this case the MAC address would be assigned ind...

Page 123: ...ors table has the following columns Interface Shows the WLAN interface to which the entries apply Error types The other columns after the WLAN interface contain the absolute numbers of the frames sent according to their error type The columns of the table distinguish the following error types Transmission Errors Shows the number of bad frames that were sent Dropped Frames Shows the number of frame...

Page 124: ...umns after the WLAN interface contain the absolute numbers of the frames received according to their error type The columns of the table distinguish the following error types Received Errors Shows the number of bad frames that were received Duplicate Frames Shows the number of frames that were received twice Decryption Errors Shows the number of bad encrypted frames FCS Errors Shows the number of ...

Page 125: ...0 to IEEE 802 11n Web Based Management Configuration Manual 03 2015 C79000 G8976 C267 08 125 5 4 12 2 Management Sent The WBM page shows how many frames in response to logging on or logging off were counted per VAP interface Note This tab is available only in access point mode ...

Page 126: ...esting association frames relevant for a logon Association Responses Shows the number of responding association frames relevant for a logon Disassociation Request Shows the number of requesting disassociation frames relevant for a logoff Authentication Request Shows the number of requesting authentication frames relevant for a logon Authentication Responses Shows the number of responding authentic...

Page 127: ...to IEEE 802 11n Web Based Management Configuration Manual 03 2015 C79000 G8976 C267 08 127 5 4 12 3 Management Received The WBM page shows how many frames in response to logging on or logging off were counted per VAP interface Note This tab is available only in access point mode ...

Page 128: ...esting association frames relevant for a logon Association Responses Shows the number of responding association frames relevant for a logon Disassociation Request Shows the number of requesting disassociation frames relevant for a logoff Authentication Request Shows the number of requesting authentication frames relevant for a logon Authentication Responses Shows the number of responding authentic...

Page 129: ...ed Management 5 4 Information menu SCALANCE W780 W740 to IEEE 802 11n Web Based Management Configuration Manual 03 2015 C79000 G8976 C267 08 129 5 4 12 4 Data Sent The WBM page shows how many frames were sent per VAP interface ...

Page 130: ...ns after the VAP interface contain the absolute numbers of the sent frames according to the frame types In the columns of the table a distinction is made according to the following frame types Data Frames Shows the number of sent data frames Multicast Broadcast Frames Shows the number of sent multicast and broadcast frames Unicast Frames Shows the number of sent unicast frames Average Rate Shows a...

Page 131: ...anagement 5 4 Information menu SCALANCE W780 W740 to IEEE 802 11n Web Based Management Configuration Manual 03 2015 C79000 G8976 C267 08 131 5 4 12 5 Data Received The WBM page shows how many frames were received per VAP interface ...

Page 132: ... of received data frames Multicast Broadcast Frames Shows the number of received multicast and broadcast frames Unicast Frames Shows the number of received unicast frames Average Rate Shows average data rate of the last data frames received Reset Counter button Click this button to reset the counters 5 4 13 WLAN iFeatures 5 4 13 1 iREF Client List The WBM page shows the antenna connector via which...

Page 133: ...nnection ID is unique within a VAP interface If two clients log on at different VAP interfaces both clients can receive the same ID Radio Shows the available WLAN interfaces Port Shows the VAP interface MAC Address Shows the MAC address of the client System Name Shows the system name of the client if the client communicates this to the access point Not all clients support this parameter Tx Chain S...

Page 134: ...lowing KEY PLUG Access point W780 iFeatures MLFB 6GK5 907 8PA00 Description The page contains the following box Connected WDS Partners Shows the number of access points logged on to the access point The table has the following columns Radio Shows the available WLAN interfaces Port Shows the WDS interface BSSID Shows the MAC address of the WDS partner WDS ID Shows the name of the WDS partner Tx Cha...

Page 135: ... tab is available only in access point mode This WBM page can only be configured with the following KEY PLUG Access point W780 iFeatures MLFB 6GK5 907 8PA00 Note The AeroScout function cannot be combined with other iFeatures iPCF iPCF MC iREF AeroScout can only be used in the 2 4 GHz band according to IEEE 802 11g IEEE 802 11n and IEEE 802 11n only For more detailed information please refer to the...

Page 136: ...e This indicates whether AeroScout is enabled or disabled Engine port The IWLAN device expects UDP packets from the management program at port 1144 Response IP The IP address of the computer on which the management program for evaluation of the AeroScout frames is running Multicast address The tag sends frames as multicast This multicast address is configured in the management program and displaye...

Page 137: ...00 Security MLFB 6GK5907 0PA00 The WBM page shows a list of the devices with which the clients are allowed to communicate Description The table has the following columns Radio Shows the available WLAN interfaces to which the settings relate Port Shows the VAP interface to which the settings relate MAC Address Shows the MAC address of the device with which the client may communicate IP Address Show...

Page 138: ... access options of the device Specify the services that access the device With some services there are further configuration pages on which more detailed settings can be made Description The page contains the following boxes Telnet Server check box Enable or disable the Telnet Server service for unencrypted access to the CLI SSH Server check box Enable or disable the SSH Server service for encrypt...

Page 139: ...ng from the drop down list The following settings are possible Manual The system time is set manually You can configure other settings in System Time Manual Setting SIMATIC Time The system time is set using a SIMATIC time transmitter You can configure other settings in System System Time SIMATIC Time Client SNTP Client The system time is set via an SNTP server You can configure other settings in S...

Page 140: ...e Automatic save mode Approximately 1 minute after the last parameter change or when you restart the device the configuration is automatically saved Trial Trial mode In Trial mode although changes are adopted they are not saved in the configuration file startup configuration To save changes in the configuration file use the Write Startup Config button The Write Startup Config button is displayed w...

Page 141: ...em Time Shows the current system time The system time is either set by the user or by a time of day frame either SINEC H1 time of day frame NTP or SNTP readonly System Up Time Shows the running time of the device since the last restart readonly Device Type Shows the type of the device readonly System Name input box You can enter the name of the device The entered name is displayed in the selection...

Page 142: ...ct person responsible for the device in the System Contact input box 2 Enter the identifier for the location at which the device is installed in the System Location input box 3 Enter the name of the device in the System Name input box 4 Click the Set Values button 5 5 2 2 Coordinates Information on geographic coordinates In the Geographic Coordinates window you can enter information on the geograp...

Page 143: ...ric information 49 1 31 67 N Longitude input box Geographical longitude Here you enter the value of the eastern or western longitude of the location of the device The value 8 20 58 73 means that the device is located at 8 degrees 20 minutes and 58 73 seconds east A western longitude is indicated by a preceding minus sign You can also add the letter E easterly longitude or W westerly longitude to t...

Page 144: ...in the IP Address and Subnet Mask input boxes Dynamic DHCP The device obtains a dynamic IP address from a DHCP server IP Address input box Enter the IP address of the device After clicking the Set Values button this IP address is also displayed in the address bar of the Web browser If this does not take place automatically you will need to enter the IP address in the address bar of the Web browser...

Page 145: ...ing the Agent VLAN ID If the configuration PC is connected directly to the device via Ethernet and you change the Agent VLAN ID the device is no longer reachable via Ethernet following the change MAC Address Shows the MAC address of the device The MAC address is linked to the hardware and cannot be modified Procedure 1 In the input boxes enter the IP address subnet mask and the default gateway 2 S...

Page 146: ...supported Description The page contains the following boxes DNS Client check box If the check box is enabled the DNS client function is enabled Used DNS Server drop down list Here you specify which DNS server the device uses public only The device uses only the DNS servers assigned by DHCP manual only The device uses only the manually configured DNS servers The DNS servers must be connected to the...

Page 147: ... an entry in the list Name Server Address The IP address of the DNS server Origin This shows whether the DNS server was configured manually or was assigned by DHCP Procedure Activating DNS 1 Enable the DNS Client check box 2 Click the Set Values button Creating a DNS server 1 Enter the IP address of the DNS server in the Name Server Address box 2 Click the Create button A new entry is created in t...

Page 148: ...following points about restarting a device You can only restart the device with administrator privileges A device should only be restarted with the buttons of this menu or with the appropriate CLI commands and not by a power cycle on the device Any modifications you have made only become active on the device after clicking the Set Values button on the relevant WBM page If the device is in Trial Mo...

Page 149: ...efaults and Restart button Click this button to restore the factory configuration settings with the exception of the following parameters and to restart IP addresses Subnet mask IP address of the default gateway DHCP client ID DHCP System name System location System contact User names and passwords Mode of the device Restore Factory Defaults and Restart button Click this button to restore the fact...

Page 150: ...setting Check the parameters again before you confirm the changes with the Commit Changes button Description The page contains the following boxes Drop down list Commit Mode Select the required setting from the drop down list Automatic Commit Each change in the WLAN settings is adopted and is immediately effective when you click the Set Values button With its default setting the device is set to A...

Page 151: ... from the event log table X MIB Private MSPS MIB file Scalance_w_msps mib X Script CLI script file X StartupInfo Startup log file X Users File with user names and passwords X X WLANAuthlo g File with entries from the WLAN Authentication Log information on successful or failed authentication attempts X WLANCert in client mode only User certificate You can specify a password for the user certificate...

Page 152: ...ble X MIB Private MSPS MIB file Scalance_w_msps mib X Script CLI script file X StartupInfo Startup log file X Users File with user names and passwords X X WLANAuthlog File with entries from the WLAN Authentication Log information on successful or failed authentication attempts X WLANCert in client mode only User certificate You can specify a password for the user certificate on the WBM page Load S...

Page 153: ...ion the configuration data and log files can be lost In this case the device starts up with the factory settings after the firmware has been installed In this situation if a PLUG is inserted in the device following the restart this has the status Not Accepted since the PLUG still has the configuration data of the previous more up to date firmware This allows you to return to the previous more up t...

Page 154: ...you can upload files to the device The button can be enabled if this function is supported by the file type Save With this button you can save files from the device The button can only be enabled if this function is supported by the file type and the file exists on the device Delete With this button you can delete files from the device The button can only be enabled if this function is supported b...

Page 155: ... to select a storage location and a name for the file Or you accept the proposed file name To make the selection use the dialog in your browser After making your selection click the Save button Deleting files using HTTP 1 Start the delete function by clicking the one of the Delete buttons The file will be deleted Reusing configuration data If several devices are to receive the same configuration a...

Page 156: ...ring the installation of a previous version the configuration data and log files can be lost In this case the device starts up with the factory settings after the firmware has been installed In this situation if a PLUG is inserted in the device following the restart this has the status Not Accepted since the PLUG still has the configuration data of the previous more up to date firmware This allows...

Page 157: ...ich data exchange will be handled If necessary you can change the default value 69 to your own requirements The table has the following columns Type Shows the file type Description Shows the short description of the file type Input box Filename Enter a file name Drop down list Actions Select the action from the drop down list The selection depends on the selected file type for example the log file...

Page 158: ...sses are assigned using DHCP the effort for configuration can be reduced by saving and reading in the configuration data Follow the steps below to reuse configuration data 1 Save the configuration data of a configured device on your PC 2 Download this configuration file to all other devices you want to configure 3 If individual settings are necessary for specific devices these must be made online ...

Page 159: ...he password in Password Password Enter the password for the certificate Note When assigning the password you can only use the following readable ASCII characters 0x20 0x7e Password Confirmation Confirm the password Status Shows whether the current settings for the certificate match the device Valid The settings are valid The password matches the certificate Invalid The settings are invalid Procedu...

Page 160: ...nts To enable or disable the options click the relevant check boxes of the columns Description With Table 1 you can enable or disable all check boxes of a column of Table 2 at once Table 1 has the following columns Event Shows that the settings are valid for all events of table 2 E Mail Trap Log Table Syslog Fault Enable or disable the required type of notification for all events If No Change is s...

Page 161: ... the signaling contact or the power supply monitoring Overlap AP Detection Only in access point mode This event is triggered when there is an entry in the overlap AP list WDS Only in access point mode The connection status of a WDS link has changed DFS Only in access point mode This event occurs if a radar signal was received or the DFS scan was started or stopped WLAN General Only in access point...

Page 162: ...ce writes an entry in the event log table Syslog The device writes an entry to the system log server This is only possible if the system log server is set up and the Syslog client function is enabled Fault The device triggers a fault The error LED lights up Procedure Follow the steps below to change entries 1 Select the check box in the row of the required event Select the event in the column unde...

Page 163: ...il Log Table Entry of system events in the log table Syslog Entry of system events in the Syslog file Select the required level from the drop down lists of the second table column You can select from the following values Critical System events are processed as of the severity level Critical Warning System events are processed as of the severity level Warning Info System events are processed as of ...

Page 164: ... allows centralized network monitoring to be set up for networks with few nodes based on an e mail system When an e mail error message is received the WBM can be started by the Internet browser using the identification of the sender to read out further diagnostics information On this page you can configure up to three SMTP servers and the corresponding e mail addresses Description The page contain...

Page 165: ...he IP address or the FQDN name of the SMTP server Receiver Email Address Enter the e mail address to which the device sends an e mail if a fault occurs Procedure 1 Enable the SMTP Client option 2 Enter the IP address of the SMTP server or the FQDN name in the SMTP Server Address input box 3 Click the Create button A new entry is generated in the table 4 In the Receiver Email Address input box ente...

Page 166: ...address in response to its request Description The page contains the following boxes DHCP Client Configuration Request Opt 66 67 check box Select this option if you want the DHCP client to use options 66 and 67 to download and then enable a configuration file DHCP Mode drop down list Select the DHCP mode from the drop down list The following modes are possible via MAC Address Identification is bas...

Page 167: ...ble the DHCP Client option 2 Select the DHCP mode via DHCP Client ID from the DHCP Mode drop down list 3 Enter a character string to identify the device in the enabled DHCP Client ID input box This is then evaluated by the DHCP server 4 Select the Client Configuration Request Opt 66 67 option if you want the DHCP client to use options 66 and 67 to download and then enable a configuration file 5 Cl...

Page 168: ...pecify the IPv4 address band from which the DHCP client receives any IPv4 address You configure the static assignment of the IPv4 addresses in Static Leases Note Maximum number of IP addresses The maximum number of IPv4 addresses that the DHCP server supports is 100 In other words a total of 100 IPv4 addresses dynamic static With the static assignments you can create a maximum of 20 entries Requir...

Page 169: ... the DHCP server sends ICMP echo messages ping to the IPv4 address If no reply is received the DHCP server can assign the IPv4 address Note If there are devices in your network on which the echo service is disabled as default there may be conflicts with the IPv4 addresses To avoid this assign these devices an IPv4 address outside the IPv4 address band The table has the following columns Select Sel...

Page 170: ...ess that specifies the start of the dynamic IPv4 address band The IPv4 address must be within the network address range you configured for Subnet Upper IP Address Enter the IPv4 address that specifies the end of the dynamic IPv4 address band The IPv4 address must be within the network address range you configured for Subnet Lease Time sec Specify for how many seconds the assigned IPv4 address rema...

Page 171: ...rameter Note DHCP options not supported The DHCP options 50 60 and 255 are not supported The table has the following columns Select Select the check box in the row to be deleted Pool ID Shows the number of the IPv4 address band Option Code Shows the number of the DHCP option Use Interface IP Specify whether or not the internal IPv4 address of the device will be used Value Enter the DHCP parameter ...

Page 172: ...address band Hardware Type drop down list Ethernet MAC Identification is based on the MAC address Enter the MAC address in Value A MAC address consists of six byes separated by hyphens in hexadecimal notation e g 00 ab 1d df b4 1d Value input box Enter the MAC address and click the Create button to create the entry Note A maximum of 20 entries are possible The table has the following columns Selec...

Page 173: ...8976 C267 08 173 Value Shows the MAC address to which the IPv4 address is assigned IP Address Specify the IPv4 address The IPv4 address must match the subnet of the IPv4 address band 5 5 11 SNMP 5 5 11 1 General Configuration of SNMP On this page you make the basic settings for SNMP Enable the check boxes according to the function you want to use ...

Page 174: ...ad Community String input box Enter the community string for read access of the SNMP protocol SNMPv1 v2c Read Write Community String input box Enter the community string for read and write access of the SNMP protocol SNMPv1 Traps check box Enable or disable the sending of traps alarm frames On the Trap tab specify the IP addresses of the devices to which SNMP traps will be sent SNMPv1 v2c Trap Com...

Page 175: ...ed in the Events menu occur Note Traps are sent only when the SNMPv1 Traps option was selected in the General or System Confguration tab Description IP Address Enter the IP address or the FQDN name of the station to which the device sends SNMP traps You can specify up to ten different recipients servers The table has the following columns Select Select the row you want to delete IP Address If nece...

Page 176: ...tton to create a new trap entry 3 Select the check box in the required row Trap 4 Click the Set Values button Deleting a trap entry 1 Enable Select in the row to be deleted 2 Click the Delete button The entry is deleted 5 5 11 3 v3 Groups Security settings and assigning permissions SNMP version 3 allows permissions to be assigned authentication and encryption at protocol level The security levels ...

Page 177: ...ncryption enabled Auth Priv Authentication enabled encryption enabled The table has the following columns Select Select the row you want to delete Group Name Shows the defined group names Security Level Shows the configured security level Read Enable or disable read access for the required group Write Enable or disable wite access for the required group Note For write access to work you also need ...

Page 178: ...te rights for the group in Write 6 Click the Set Values button Modifying a group 1 Specify the required read rights for the group in Read 2 Specify the required write rights for the group in Write 3 Click the Set Values button Note Once a group name and the security level have been specified they can no longer be modified after the group is created If you want to change the group name or the secur...

Page 179: ...ery frame This user name and the applicable security settings are checked by both the sender and recipient Description The page contains the following boxes User Name Enter a freely selectable user name After you have entered the data you can no longer modify the name The table has the following columns Select Select the row you want to delete User Name Shows the created users Group Name Select th...

Page 180: ...ned to an SNMPv3 group If the user is not assigned to an SNMPv3 group no automatic saving is triggered and the configured user disappears again after restarting the device Yes The user is assigned to an SNMPv3 group No The user is not assigned to an SNMPv3 group Procedure Create a new user 1 Enter the name of the new user in the User Name input box 2 Click the Create button A new entry is generate...

Page 181: ...on the delete action is canceled The data of the selected rows is retained The selections are removed If you want to repeat the action you will need to reselect the data records to be deleted 5 5 12 System Time There are different methods that can be used to set the system time of the device Only one method can be active at any one time If one method is activated the previously activated method is...

Page 182: ...plays Date time not set Last Synchronization Mechanism This box displays how the last time of day synchronization was performed Not set The system time was not set Manual Manual time setting SNTP Automatic time of day synchronization with SNTP NTP Automatic time of day synchronization with NTP SIMATIC Automatic time of day synchronization using the SIMATIC time frame Daylight Saving Time Shows whe...

Page 183: ...ox 5 5 12 2 DST Overview On this page you can create new entries for the daylight saving time changeover The table provides an overview of the existing entries Settings Figure 5 2 DST Overview Select Select the row you want to delete DST No Shows the number of the entry If you create a new entry a new line with a unique number is created Name Shows the name of the entry Year Shows the year for whi...

Page 184: ...ng an entry 1 Click the Create button A new entry is created in the table 2 Click on the required entry in the DST No column You change to the DST Configuration tab 3 Select the required type in the Type drop down list Depending on the selected type various settings are available 4 Enter a name in the Name box 5 If you have selected the type Date complete the following boxes Year Day for start and...

Page 185: ... date Settings Note The content of this page depends on the selection in the Type box The boxes DST No Type and Name are always displayed DST No Select the type of the entry Type Select how the daylight saving time changeover is made Date You can set a fixed date for the daylight saving time changeover This setting is suitable for regions in which the daylight saving time changeover is not governe...

Page 186: ...ion Date You can set a fixed date for the start and end of daylight saving time Year Enter the year for the daylight saving time changeover Start Date Enter the following values for the start of daylight saving time Day Specify the day Hour Specify the hour Month Specify the month End Date Enter the following values for the end of daylight saving time Day Specify the day Hour Specify the hour Mont...

Page 187: ...Web Based Management 5 5 System menu SCALANCE W780 W740 to IEEE 802 11n Web Based Management Configuration Manual 03 2015 C79000 G8976 C267 08 187 Settings with Recurring selected Figure 5 4 DST Configuration Recurring ...

Page 188: ... following values for the start of daylight saving time Hour Specify the hour Month Specify the month Week Specify the week You can select the first to fifth or the last week of the month Weekday Specify the weekday End Date Enter the following values for the end of daylight saving time Hour Specify the hour Month Specify the month Week Specify the week You can select the first to fifth or the las...

Page 189: ...boxes SNTP Client Enable or disable automatic time of day synchronization using SNTP Current System Time This box shows the current date and current normal time received from the server If you specify a time zone the time information is adapted accordingly Last Synchronization Time This box is read only and shows when the last time of day synchronization took place Last Synchronization Mechanism T...

Page 190: ...ng the time zone continues to be displayed in the Current System Time box inactive offset 0 h The current system time is not changed SNTP Mode Select the synchronization mode from the drop down list The following types of synchronization are possible Poll If you select this protocol type the input boxes SNTP Server Address SNTP Server Port and Poll Interval s are displayed for further configuratio...

Page 191: ... the following options from the SNTP Mode drop down list Poll For this mode you need to configure the following time zone difference step 2 time server step 4 Port step 5 query interval step 6 complete the configuration with step 7 Listen For this mode you need to configure the following time difference to the time sent by the server step 2 complete the configuration with step 7 4 In the SNTP Serv...

Page 192: ...ox to enable automatic time of day synchronization with NTP Current System Time This box shows the current date and current normal time received from the server If you specify a time zone the time information is adapted accordingly Last Synchronization Time This box is read only and shows when the last time of day synchronization took place Last Synchronization Mechanism This box displays how the ...

Page 193: ...as added You can see the current system time at the top right in the selection area of the WBM The normal time including the time zone continues to be displayed in the Current System Time box inactive offset 0 h The current system time is not changed NTP Server Address Enter the IP address or the FQDN name of the NTP server NTP Server Port Enter the port of the NTP server The following ports are p...

Page 194: ...system time Last Synchronization Time This box is read only and shows when the last time of day synchronization took place Last Synchronization Mechanism This box displays how the last time of day synchronization was performed The following methods are possible Not set The system time was not set Manual Manual time setting SNTP Automatic time of day synchronization with SNTP NTP Automatic time of ...

Page 195: ...terminated after the set time check the setting of the keepalive function on the Telnet client If the set time interval is less than the configured time the lower value applies For example you have set 300 seconds for the automatic logout and 120 seconds is set for the keepalive function In this case a packet is sent every 120 seconds that keeps the connection up Procedure 1 Enter a value of 60 36...

Page 196: ... is enabled for the relevant event There is a Syslog server in your network that receives the log entries Since this is a UDP connection there is no acknowledgment to the sender The IP address or the FQDN name of the Syslog server is entered on the device Description The page contains the following boxes Syslog Client Enable or disable the Syslog function Server IP Address Enter the IP address or ...

Page 197: ...the IP address or the FQDN name of the Syslog server on which the log entries will be saved 2 Click the Create button A new row is inserted in the table 3 In the Server Port input box enter the number of the UDP port of the server 4 Click the Set Values button Note The default setting of the server port is 514 Changing the entry 1 Delete the entry 2 Create a new entry Deleting an entry 1 Select th...

Page 198: ...separately for each individual feed in line A fault is then signaled by the message system when there is no power on a monitored line Line 1 Line 2 or PoE or when the applied voltage is too low Note You will find the permitted operating voltage limits in the operating instructions of the device A fault causes the signaling contact to trigger and the fault LED on the device to light up and dependin...

Page 199: ...7 08 199 Monitoring of the redundant power supply by PNIO With the following devices you can also configure which power supply will be monitored by PNIO SCALANCE W788 x RJ 45 variants SCALANCE W748 1 RJ 45 SCALANCE W774 1 RJ 45 and M12 variant SCALANCE W734 1 RJ 45 Procedure 1 Select the required entry from the drop down list 2 Click the Set Values button ...

Page 200: ...d A fault causes the signaling contact to trigger and the fault LED on the device to light up and depending on the configuration can trigger a trap an e mail or an entry in the event log table Description The table has the following columns Port Shows the available ports Setting Select the setting from the drop down list You have the following options Up Error handling is triggered when the port c...

Page 201: ...exists that this has downloaded its configuration data to the device and that the device can send status data to the PROFINET IO controller In this status known as in data exchange the parameters set with the PROFINET IO controller cannot be configured PNIO Name of Station This box displays the PROFINET IO device name according to the configuration in HW Config of STEP 7 Note Devices with two Ethe...

Page 202: ...th GSDML version 2 31 The diagnostics functions can also be used The WLAN interface cannot be configured with STEP 7 PNIO for client devices If a client is to be used as a PNIO device the MAC address of the client must be specified as follows MAC Mode Own In the network beyond the device only IP communication and no PNIO is possible Layer 2 Tunnel The client and the devices downstream from it can ...

Page 203: ...ailed information about the configuration stored on the C PLUG or KEY PLUG It is also possible to reset the PLUG to factory defaults or to load it with new contents Note The action is only executed after you click the Set Values button The action cannot be undone If you decide against executing the function after making your selection click the Refresh button As a result the data of this page is r...

Page 204: ...nd suitable configuration in the device NOT ACCEPTED Invalid or incompatible configuration on the inserted PLUG NOT PRESENT There is no C PLUG or KEY PLUG inserted in the device FACTORY PLUG is inserted and does not contain a configuration This status is also displayed when the PLUG was formatted during operation MISSING There is no PLUG inserted Functions are configured on the device for which a ...

Page 205: ...update to V2 0 with SCALANCE W A downgrade to the previous version of the corresponding software is then a problem The firmware can neither read nor write the C PLUG or KEY PLUG and it is not even possible to Erase PLUG to Factory Default File System Size Byte Displays the maximum storage capacity of the file system on the PLUG File System Usage Byte Displays the memory utilization of the file sys...

Page 206: ...efined error state following the restart With SCALANCE W the available wireless interfaces are deactivated in this case If the device was configured at some time with a PLUG the device can no longer be used without this PLUG To be able to use the device again reset the device to the factory settings Note Incompatibility with previous versions with PLUG inserted During the installation of a previou...

Page 207: ...The following are possible ACCEPTED The KEY PLUG in the device contains a suitable and valid license NOT ACCEPTED The license of the inserted KEY PLUG is not valid NOT PRESENT No KEY PLUG is inserted in the device MISSING There is no KEY PLUG or a C PLUG with the status FACTORY inserted in the device Functions are configured on the device for which a license is required WRONG The inserted KEY PLUG...

Page 208: ...ation and the versions of the hardware and software The displayed software version corresponds to the version in which the configuration was last changed With the NOT ACCEPTED status further information on the cause of the problem is displayed Note When you save the configuration the information about whether or not a KEY PLUG was inserted in the device at the time is also saved This configuration...

Page 209: ...ith the ping function you can check whether a certain IP address is reachable in the network Description The table has the following columns IP Address input box Enter the IP address of the device Repeat input box Enter the number of ping requests Ping button Click this button to start the ping function Ping Output This box shows the output of the ping function Clear button Click this button to em...

Page 210: ...llowing columns Port Shows the configurable ports If you click on the link the corresponding configuration page is opened Port Name Shows the name of the port Status Shows whether the port is on or off Data traffic is possible only over an enabled port Link Shows the connection status to the network With the connection status the following is possible Up The port has a valid link to the network a ...

Page 211: ...h this page you configure the Ethernet ports of the device Note SCALANCE W786 2 SFP The two SFP ports of the SCALANCE W786 2 SFP cannot be assigned parameters or diagnosed individually Description The table has the following rows Port drop down list Select the port to be configured from the drop down list Status drop down list Specify whether the port is enabled or disabled enabled The port is ena...

Page 212: ...n mode Note Before the port and partner port can communicate with each other the settings must match at both ends Note If 10 Mbps is configured as the transmission speed or half duplex HD as the transmission mode this can lead to restrictions in PNIO communication Always select at least 100 Mbps and full duplex FD or Autonegotiation if you want the device to handle PNIO communication Mode Shows th...

Page 213: ...tic functions the device prevents or reduces the effect on other ports and priority classes Class of Service if a port is overloaded This can mean that frames are discarded even when flow control is enabled Port overload occurs when the device receives more frames than it can send for example as the result of different transmission speeds Procedure Follow the steps below to change the settings 1 C...

Page 214: ... 2015 C79000 G8976 C267 08 5 6 2 WLAN 5 6 2 1 Basic Basic settings On this page you make several basic settings for the device for example the country setting and mode Note To configure the WLAN interface you must always specify the Country Code first Some parameters are dependent on the country setting for example the transmission standard ...

Page 215: ...mode of the device This selection is available only for W78x devices following operating modes are possible AP Access point mode Client Client mode Note After changing the mode a message is displayed If you confirm the message with OK the device restarts in the changed mode with the factory set configuration settings If you have restarted the device after changing the mode you will need to log on ...

Page 216: ...ard for the 2 4 GHz frequency band The selection depends on the country setting WLAN Mode 5 GHz Specify the transmission standard for the 5 GHz frequency band The selection depends on the country setting DFS 802 11h Enables or disables the Dynamic Frequency Selection DFS function enabled If the access point discovers a disruption on the current channel for example due to a primary user it automati...

Page 217: ...han 15 dBm Tx Power Check Indicates whether the settings that have been made will violate the permitted transmit power restrictions of the selected country The following parameters influence this calculation max Tx Power Antenna Gain Additional Attenuation The following displays can appear Allowed The channels can be used with the current settings Not allowed Some Channels Among the channels there...

Page 218: ...The DTIM interval 1 15 specifies the number of beacons to be sent before the access point sends the collected packets broadcast unicast multicast to the client If you enter a 1 in this box the access point transmits broadcast unicast and multicast packets directly after each beacon recommended setting for normal network environments If you entered a 5 in this field this would mean that the access ...

Page 219: ...throughput HW Retries Specify the number of hardware retries The hardware repetition is performed by the WLAN chip itself when it tries to repeat an unacknowledged packet immediately If all hardware repetitions were unsuccessful the packet is deleted Force roaming on link down Only in access point mode If the wired Ethernet interface is no longer available cable break connector removed a client co...

Page 220: ...E W780 W740 to IEEE 802 11n Web Based Management 220 Configuration Manual 03 2015 C79000 G8976 C267 08 5 6 2 3 Antennas Overview Overview of IWLAN antennas The antenna name provides information about the properties of the antennas listed in the IWLAN antenna overview ...

Page 221: ...erface must also be disabled for Rx and Tx Otherwise there may be transmission disruptions Description The table has the following columns Connector Shows the name of the relevant antenna connection Antenna Type Select the type of external antenna connected to the device If the type of your external antenna is not available select the entry User defined If you terminate an antenna connection using...

Page 222: ...e possible R1 A1 R2 A1 R1 A2 R2 A2 R1 A3 R2 A3 Rx Tx Rx Tx Rx Tx Rx Tx Rx Tx Rx Rx Tx Rx Rx Rx Tx Rx Tx Tx Rx Tx Tx Tx Rx Tx Rx Tx 1 Rx Tx Tx 1 Rx Tx Rx 1 Rx Tx 1 1 1 Antenna type 50 Ohms Termination Impedance Procedure To configure two antennas follow the steps below 1 For the first antenna connector R1 A1 in the Antenna Type drop down list select the type of antenna 2 In the Cable Length input b...

Page 223: ...on Manual 03 2015 C79000 G8976 C267 08 223 5 6 2 4 Allowed Channels Channel settings For communication a specific channel within a frequency band is used You can either set this channel specifically or configure so that the channel is selected automatically On this page you specify which channels may be used for communication ...

Page 224: ...bles for the frequency bands you will find the following check box Select Deselect all Enabled If you enable the check box all channels are selected Disabled If you deselect the check box the first valid channel of the frequency band remains enabled Enable the required channel The tables of the frequency bands have the following columns Radio Shows the available WLAN interfaces in this column Radi...

Page 225: ...table has the following columns Radio Shows the available WLAN interfaces in this column A MPDU Enables or disables the sending of A MPDU data packets If this check box is disabled A MPDU data packets are received but not sent A MPDU Limit Frames Specify the number of individual data packets grouped together in one AMPDU data packet Range of values 2 64 frames A MPDU Limit Bytes Specify the maximu...

Page 226: ...cess point 1 Enable the A MPDU option 2 Enter the required values in the A MPDU Limit Frames and A MPDU Limit Bytes input boxes 3 Select the required value from the Guard Interval ns drop down list 4 Click the Set Values button Configure 802 11n settings on the client 1 Enable the A MPDU option 2 Enter the required values in the A MPDU Limit Frames and A MPDU Limit Bytes input boxes 3 Click the Se...

Page 227: ...enu SCALANCE W780 W740 to IEEE 802 11n Web Based Management Configuration Manual 03 2015 C79000 G8976 C267 08 227 5 6 2 6 AP Configuration On this page you specify the configuration for the access point Note This tab is available only in access point mode ...

Page 228: ...on the Basic page specify the alternative channel here If you want the access point to search for a free channel itself use Auto If a primary user was detected both on the main and alternative channel the access point automatically searches for a free channel If you want to use a fixed channel select the required channel from the drop down list HT Channel Width MHz You can only specify the channel...

Page 229: ...ble for other devices Only clients that know the SSID of the access point and that are configured with it can connect to the access point The Any SSID option must be disabled on these clients activated The SSID is sent in the Beacon frame of the access point and is visible for other devices This means that clients on which the Any SSID option is enabled can also connect to the access point Note Si...

Page 230: ... port 3 Select the Enabled check box for the relevant WLAN interface and the port 4 Click the Set Values button 5 6 2 7 AP WDS Communication In normal operation the access point is used as an interface to a network and communicates with clients There are however situations in which several access points need to communicate with each other for example to extend wireless coverage or to set up a wire...

Page 231: ...nter the MAC address of the WDS partner WDS ID The WDS ID is used The Partner MAC input box is grayed out In Partner WDS ID enter the WDS ID of the WDS partner Use this option if you want to replace the access point later using the C PLUG or KEY PLUG Partner MAC Enter the MAC address of the WDS partner Partner WDS ID Enter the WDS ID of the WDS partner For the WDS ID the ASCII characters 0x20 to 0...

Page 232: ... primary user is detected by an access point the channel is changed automatically and the existing connection is then terminated Procedure 1 Select the required VAP interface from the Connection over drop down list 2 Select the entry WDS ID from the Partner ID Type drop down list 3 In the WDS ID input box enter the WDS ID of the WDS partner The MAC Address input box is grayed out 4 Click the Set V...

Page 233: ...ing columns Radio Specifies the WLAN interface to which the information relates Use selected data rates only If you select this option you can specify the data transmission speeds for the required WLAN interface If this option is disabled the default values are used As default this option is disabled Drop down list Radio In this drop down list select the WLAN interfaces displayed in Table 3 Data R...

Page 234: ...ion to assign the required data transmission speed to the WLAN interface Note You need to enable at least one data transmission speed Basic Enable the option to declare the required data transmission speed as Basic The Basic parameter specifies that a client must be capable of this speed to be able to connect to the access point The Basic option can only be enabled if an available data transmissio...

Page 235: ...n Note The tab is available only in access point mode The WBM page can only be configured if 802 11n only or 802 11n is set for the WLAN mode The WBM page shows the available data transmission speeds MCS Modulation and Coding Schemes for the WLAN mode 802 11n You can select any combination of these data transmission speeds The access point will then use only the selected data transmission speeds f...

Page 236: ...ed Copy to Table If you click the button the setting is adopted for all entries of table 3 Table 3 MCS Index consists of the following columns Radio Specifies the WLAN interface to which the information relates MCS Index Shows the supported MCS indexes The displayed MCS indexes depend on the settings Antenna Type and Antenna Mode You will find the settings in Interfaces WLAN Antennas If for exampl...

Page 237: ...wn list select the entry WLAN 1 3 Select the corresponding check box in the Enabled column for the selected MCS index 4 Click the Set Values button To reset the selection 1 Click the Default Values button The selection is reset to the default setting Or 1 Disable the Use selected data rates only option in Table 1 2 Click the Set Values button 5 6 2 10 Client Connecting to a network With this menu ...

Page 238: ...he MAC addresses connected to the Ethernet interface of the client Up to eight MAC addresses can be used MAC Address If you have selected Manual for MAC Mode enter the MAC address of the client Any SSID Enabled In client mode the access point attempts to connect to the network with the best transmission quality and that has suitable security settings The clients can only connect to the access poin...

Page 239: ...her access points Background Scan Interval ms Specify the interval at which further access points are scanned Table 2 has the following columns Radio Shows the WLAN interface Scan channels Shows the channels on which the client searches for an access point The display depends on the wireless approvals of the selected country and the settings for Allowed Channels Table 3 has the following columns E...

Page 240: ...able in the client mode The WLAN interface of the device must be enabled otherwise no recording is possible Description This table contains the following columns Radio Shows the WLAN interface to which the information applies Since a client has a WLAN interface there is only ever one row for WLAN 1 in this table Time interval ms The time interval between acquiring two measured values in millisecon...

Page 241: ...in useful measurements with the signal recorder Set a fixed data rate on the access point If you have activated iPCF set as low a cycle time on the access point as possible for the measurements Make sure that there is enough data communication during the measurement because the statistics functions evaluate incoming data frames The measurement path should be traveled 2 to 3 times with the same par...

Page 242: ...e row In the table row WLANSigRec select the Save file entry from the drop down list and click the Set Values button 5 The ZIP file contains two files with the results of the recording A PDF file A CSV file Measurement results PDF file The PDF file contains information on the configuration of the device and detailed information about all individual measurements There is also a graphic representati...

Page 243: ...measured values The maximum data rate The setting of the external antennas The maximum possible transmit power The second area is a table The table contains the following for each measured value Sample The consecutive number of the measurement Timestamp The time stamp BSSID The BSSID Signal The received signal strength in dBm The received signal strength in dBm RSSI The raw value of the RSSI Recei...

Page 244: ...80 W740 to IEEE 802 11n Web Based Management 244 Configuration Manual 03 2015 C79000 G8976 C267 08 Scan Channel The channel on which the client is currently scanning Avg RX Rate The average data rate of the received data packets Figure 5 5 Example of a generated CSV file ...

Page 245: ...evice is no longer reachable via Ethernet following the change Important rules for VLANs Make sure you keep to the following rules when configuring and operating your VLANs Frames with the VLAN ID 0 are handled as untagged frames but retain their priority value As default all ports on the device send frames without a VLAN tag to ensure that the end node can receive these frames With SCALANCE W dev...

Page 246: ...then no longer be changed To make a change the entire data record must be deleted and created again Up to 24 VLANs can be defined Name Enter a name for the VLAN The name only provides information and has no effect on the configuration The length is a maximum of 32 characters Status Shows the status type of the entry in the internal port filter table Here static means that the address was entered a...

Page 247: ...e VLAN ID input box 2 Click the Create button A new entry is generated in the table As default the boxes have entered 3 Enter a name for the VLAN under Name 4 Specify the use of the port in the VLAN If for example you select M the port is a member of the VLAN The frame sent in this VLAN is forwarded with the corresponding VLAN tag 5 Specify the mode of the device 6 Click the Set Values button ...

Page 248: ...menu SCALANCE W780 W740 to IEEE 802 11n Web Based Management 248 Configuration Manual 03 2015 C79000 G8976 C267 08 5 7 1 2 Port based VLAN Processing received frames On this page you specify the configuration of the port properties for receiving frames ...

Page 249: ...e if at least one VLAN is configured Table 2 has the following columns Port Shows the available ports and interfaces Priority From the drop down list select the priority given to untagged frames The CoS priority Class of Service used in the VLAN tag If a frame is received without a tag it will be assigned this priority This priority specifies how the frame is further processed compared with other ...

Page 250: ...Disabled All frames are forwarded Procedure 1 In the row of the port to be configured click on the relevant cell in the table to configure it 2 Enter the values to be set in the input boxes as follows 3 Select the values to be set from the drop down lists 4 Click the Set Values button 5 7 2 Dynamic MAC Aging Protocol settings and switch functionality The device automatically learns the source addr...

Page 251: ...namic MAC Aging check box 2 Enter the time in seconds in the Aging Time s input box 3 Click the Set Values button 5 7 3 Spanning Tree 5 7 3 1 General General settings of spanning tree On this page you configure the settings for MSTP As default Rapid Spanning Tree is enabled that can be set to the MSTP RSTP or STP compatible mode with a switch On the configuration pages of these functions you can m...

Page 252: ... Enable or disable MSTP Drop down list Protocol Compatibility Select the compatibility mode of MSTP for example if you select RSTP MSTP behaves like RSTP The following settings are available STP RSTP MSTP Note If iPCF mode is enabled only the compatibility modes STP and RSTP are supported Procedure 1 Select the MSTP check box 2 From the Protocol Compatibility drop down list select the type of comp...

Page 253: ...Max Hop Count parameter If the device is a root bridge the information on the left and right matches Description The page contains the following boxes Bridge Priority Root Priority input box The Bridge priority decides which device becomes the root bridge The bridge with the highest priority becomes the root bridge The lower the value the higher the priority If several devices in a network have th...

Page 254: ...dges have the required information The default for this parameter is 15 seconds Bridge Max Age Root Max Age input box Bridge Max Age defines the maximum age of a received BPDU for it to be accepted as valid by the switch The default for this parameter is 20 Bridge Max Hop Count input box This parameter specifies how many MSTP nodes a BPDU may pass through If an MSTP BPDU is received and has a hop ...

Page 255: ...required for the configuration in the input boxes 2 Click the Set Values button 5 7 3 3 CIST port MSTP CIST port configuration When the page is called the table displays the current status of the configuration of the port parameters To configure them click the relevant cells in the port table Description Table 1 has the following columns Column 1 Shows that the settings made in this table will be ...

Page 256: ...6 the value is automatically adapted Range of values 0 240 The default is 128 Cost Calc Enter the path cost calculation If you enter the value 0 here the automatically calculated value is displayed in the Path Cost box Path Cost The path costs from this port to the root bridge The path with the lowest value is selected as the path If several ports of a device have the same value the port with the ...

Page 257: ...er of changes from the Discarding status to the Forwarding status Edge Type Specify the type of the edge port You have the following options Edge port is disabled The port is treated as a no EdgePort Admin Select this option when there is always an end device on this port Otherwise a reconfiguration of the network will be triggered each time a connection is changed Auto Select this option if you w...

Page 258: ...n is for example a connection to a hub Point to point is calculated automatically If the port is set to half duplex a point to point link is not assumed P t P Enabled Shows that a point to point link exists Disabled Shows that no point to point link exists Hello Time Enter the interval after which the bridge sends configuration BPDUs As default 2 seconds is set Range of values 1 2 seconds Note The...

Page 259: ...TP instance Permitted values 1 64 You can define up to 16 MSTP instances The table has the following columns Select Select the row you want to delete MSTP Instance ID Shows the number of the MSTP instance Root Address Shows the MAC address of the root bridge Root Priority Shows the priority of the root bridge Bridge Priority Enter the bridge priority in this box The value for the bridge priority i...

Page 260: ... box 4 Enter the priority of the bridge in the Bridge Priority input box 5 Click the Set Values button Deleting entries 1 Use the check box at the beginning of the relevant row to select the entries to be deleted 2 Click the Delete button to delete the selected entries from memory The entries are deleted from the memory of the device and the display on this page is updated 5 7 3 5 MST Port Configu...

Page 261: ...f the port The priority is only evaluated when the path costs are the same The value must be divisible by 16 If the value that cannot be divided by 16 the value is automatically adapted Range of values 0 240 The default is 128 Cost Calc Enter the path cost calculation in the input box If you enter the value 0 here the automatically calculated value is displayed in the next box Path Cost Path Cost ...

Page 262: ...ng The port exchanges MSTP information but is not involved in the data traffic Blocked In the blocking mode BPDU frames are received Forwarding The port receives and sends data frames Fwd Trans Specifies the number of status changes Discarding Forwarding or Forwarding Discarding Procedure 1 In the input cells of the table row enter the values of the port you are configuring 2 From the drop down li...

Page 263: ...configured with the PST Tool or to divide the full network into smaller parts for configuration and diagnostics All the ports of the device are displayed on this WBM page Note Empty table If you have enabled NAT on the device the table is empty or will be emptied Description The table has the following columns Port Shows the available ports Setting Specify whether the port should block or forward ...

Page 264: ... and receives information from connected devices at periodic intervals The received information is stored in the MIB Applications PROFINET uses LLDP for topology diagnostics In the default setting LLDP is enabled for all ports in other words LLDP frames are sent and received on all ports With this function you have the option of enabling or disabling sending and or receiving per port Description T...

Page 265: ...ent 5 7 Layer 2 menu SCALANCE W780 W740 to IEEE 802 11n Web Based Management Configuration Manual 03 2015 C79000 G8976 C267 08 265 Procedure 1 Select the required LLDP functionality from the drop down list 2 Click the Set Values button ...

Page 266: ... interface Check box Enable NAT Enable or disable NAT for the Ethernet interface Can only be enabled if Own is set on the client for MAC Mode Input box TCP Idle Timeout s Enter the required time in seconds If no data exchange takes place the TCP connection is deleted from the translation table when this time has elapsed The range of values is 1 to 4294967295 Default setting 86400 seconds Input box...

Page 267: ...e Ethernet interface This IP address is the gateway address of the local device Input box Local Interface Subnet Mask Enter the subnet mask for the local Ethernet Procedure 1 In the Local Interface IP addresses input box enter the local IP address of the Ethernet interface 2 In the Local Interface Subnet Mask input box enter the subnet mask for the local Ethernet 3 Enable NAT for the Ethernet inte...

Page 268: ...ice has several interfaces Traffic Type drop down list Specify the protocol for which the address assignment is valid TCP and UDP frames must have parameters set separately Global Port input box Enter the global port Incoming frames with this port as the destination port are forwarded If the setting is intended to apply to a port range enter the range with start port end port for example 30 40 Not...

Page 269: ...erface Shows the interface to which the settings relate Traffic Type Shows whether UDP or TCP frames are assigned to the global port Dynamic Global IP Shows whether or not dynamic address conversion is used Global IP Address Shows the global IP address to which the local IP address will be translated Global Port Shows the global port Local IP Address Shows the IP address of the node in the local n...

Page 270: ...nd User 2 Enter the valid administrator password in the Current Admin Password input box 3 Enter the new password for the selected user in the New Password input box The new password must be at least 6 characters long 4 Repeat the new password in the Password Confirmation input box 5 Click the Set Values button Note The factory settings for the passwords when the devices ship are as follows admin ...

Page 271: ...ecure authentication and encryption are used On this page you specify the security settings Note Transmission standard IEEE 802 11 n The transmission standard IEEE 802 11 n with the setting 802 11n or 802 11 n only supports only WPA2 WPA2 PSK with AES in the security settings iPCF or iPCF MC mode activated If iPCF or iPCF MC mode is enabled only Open System with the encryption method AES is suppor...

Page 272: ...ected Access is a method specified by the Wi Fi Alliance to close security gaps in WEP Authentication using a server is stipulated 802 1x The dynamic exchange of keys at each data frame introduces further security WPA PSK WPA Pre Shared Key WPA PSK is a weakened form of WPA In this method authentication is not established by a server but is based on a password This password is configured manually ...

Page 273: ...l stream encryption method with only 40 or 104 bit long keys based on the RC4 algorithm Ron s Code 4 TKIP Temporal Key Integrity Protocol A symmetrical encryption method with the RC4 algorithm Ron s Code 4 In contrast to the weak WEP encryption TKIP uses changing keys derived from a main key TKIP can also recognize corrupted data frames AES Advanced Encryption Standard Strong symmetrical block enc...

Page 274: ...r Encryption key source Open System disabled Open System Enabled WEP Default key Open System Enabled AES1 Default key 128 bit Shared Key Enabled WEP Default key WPA RADIUS Enabled Auto TKIP AES RADIUS Server WPA PSK Enabled Auto TKIP AES WPA 2 pass phrase WPA2 RADIUS Enabled Auto TKIP AES RADIUS Server WPA2 PSK Enabled Auto TKIP AES WPA 2 pass phrase WPA WPA2 AutoPSK Enabled Auto TKIP AES WPA 2 pa...

Page 275: ...40 to IEEE 802 11n Web Based Management Configuration Manual 03 2015 C79000 G8976 C267 08 275 5 9 2 2 AP Communication Communications options On this page you specify the type of communication allowed by the access point Note This tab is available only in access point mode ...

Page 276: ...f table 2 Table 2 has the following columns Radio Shows the available WLAN interfaces Port Shows the VAP interface Within own VAP Enabled Clients logged on to the same VAP interface of an access point can communicate with each other Disabled Option is disabled With other VAPs Enabled Clients logged on to different VAP interfaces of an access point can communicate with each other Disabled Option is...

Page 277: ...the clients are forced to reauthenticate Disabled Reauthentication mode is disabled Server Enables time management on the server Local Enables local time management In Reauthentication Interval specify the time of validity Reauthentication Interval s If time management is local enter the period of validity of the authentication in seconds The minimum time is 1 minute enter 60 the maximum time is 1...

Page 278: ...rocedure Entering a new server To display a new server follow the steps below 1 In the relevant row enter the following data in the input boxes IP address or FQDN name of the RADIUS server Port number of the input port Password Confirmation of the password Maximum number of transmission retries Primary server 2 Click the Set Values button Modifying servers 1 In the relevant row enter the following...

Page 279: ... Here enter the password for the user name selected above The client logs on with the RADIUS server using this combination For password assignment ASCII code 0x20 to 0x7e is used Dot1x User Password Confirmation Confirm the password Dot1x Check Server Certificate Specify whether or not the RADIUS server identifies itself to the client using a certificate Dot1x EAP Types Specify the authentication ...

Page 280: ...ows the available WLAN interfaces Key 1 4 Enter the WEP key or the AES key For the WEP key characters of the ASCII code from 0x20 to 0x7E or hexadecimal characters from 0x00 to 0xFF are permitted If iPCF or iPCF MC mode is enabled only the encryption method AES with 1 28 bit key length is supported You can choose between the following key lengths 5 or 13 ASCII or 10 or 26 hexadecimal characters 40...

Page 281: ... located This ensures that only certain stations within a VLAN have access to the switch You can configure up to 10 access rules Description The page contains the following boxes Management ACL check box Enable or disable the function IP Address input box Enter the IP address or the network address to which the rule will apply If you use the IP address 0 0 0 0 the settings apply to all IP addresse...

Page 282: ...ET Specify whether the station or the IP address accesses the device using the TELNET protocol HTTP Specify whether the station or the IP address accesses the device using the HTTP protocol HTTPS Specify whether the station or the IP address accesses the device using the HTTPS protocol SSH Specify whether the station or the IP address accesses the device using the SSH protocol Px Specify whether t...

Page 283: ... the Subnet Mask input box the corresponding subnet mask 2 Click the Create button to create a new row in the table 3 Configure the entries of the new row 4 Click the Set Values button to transfer the new entry to the device Deleting entries 1 Select the check box in the row to be deleted 2 Repeat this procedure for every entry you want to delete 3 Click the Delete button The entries are deleted a...

Page 284: ...B 6GK5907 0PA00 When should Inter AP blocking be used The clients connected to an access point can normally communicate with all devices of the layer 2 network With inter AP blocking the communication of the clients connected to the access point can be restricted Only the devices whose IP addresses are configured in Allowed Addresses on the access point are accessible to the clients Communication ...

Page 285: ... devices are accessible to the clients in Security Inter AP Blocking Allowed Adresses Block Gratuitous ARP Request When enabled gratuitous ARP packets are not forwarded Block Non IP Frames When enabled there is no exchange of non IP packets for example layer 2 packets between the client and the devices configured on the access point as permitted communications partners 5 9 4 2 Allowed addresses No...

Page 286: ...P interface to which the settings relate IP Address The IP address of the devices accessible to the client If necessary you can change the IP address Resolver IP Address The IP address with which the permitted IP address is resolved The entry is necessary when the management IP address is located in a different subnet If the IP address 0 0 0 0 is configured for Resolve IP Address the management IP...

Page 287: ... 6GK5 907 4PA00 When should iPCF be used The use of iPCF is advisable particularly if you have a large number of nodes and want to implement highly deterministic operation This is necessary for example with PNIO or other cyclic protocols You will find a more detailed description of iPCF in the section Technical basics in the section iPCF iPCF MC Page 39 Note iPCF and iPCF MC are not compatible wit...

Page 288: ... the table has the following columns Radio Specifies the WLAN interface to which the settings relate Enable iPCF Enable or disable iPCF mode For PNIO communication we recommend that you enable the iPCF mode By enabling iPCF the data rates provided by the access point are adapted We strongly recommend that you retain the default setting for the data rates 802 11 a b g 12 Mbps and 802 11n MCS 2 ...

Page 289: ...o the formula 2 ms max number of nodes Scanning Mode The selected setting affects the scanning behavior of the logged on clients The following settings are available All Channels The client scans all permitted channels and selects the access point with the best signal strength and connects to it Next Channel The client scans the next channel from its permitted channel list If an access point is th...

Page 290: ...d with directional antennas that cover different areas The management interfaces of all access points to which a client can change must use the same channel A client scans only this one channel to find accessible access points Transmission based on IEEE801 11h DFS cannot be used for the management interface 801 11h DFS is possible for the data interface The client cannot be operated with Use Allow...

Page 291: ... for the data rates 802 11 a b g 6 9 and 12 Mbps and 802 11n MCS 2 iPCF Cycle Time drop down list only in access point mode Select the PNIO update time configured for the network to which the access point is connected The lowest value for the update time is 32 ms Management Scan Period drop down list only in client mode This parameter specifies the time between two client management channel scans ...

Page 292: ...nfigured with the following KEY PLUG Access point W780 iFeatures MLFB 6GK5 907 8PA00 When should iREF be used With iREF the data can be sent with the highest possible transmit power This applies in particular to use cases in which MIMO cannot be used is of no advantage or when using sector antennas Note Use of iREF with other iFeatures iREF and other iFeatures e g iPCF iPCF MC are not compatible w...

Page 293: ...scription The table has the following columns Radio Specifies the WLAN interface to which the settings relate Enable iREF Enable or disable iREF for the required WLAN interface The result is shown in Information WLAN iFeatures Note To be able to use iREF there must be at least two antennas The antennas are automatically switched to Mode RX TX as soon as iREF is enabled ...

Page 294: ...0 Note The AeroScout function cannot be combined with other iFeatures iPCF iPCF MC iREF AeroScout can only be used in the 2 4 GHz band according to IEEE 802 11g IEEE 802 11n and IEEE 802 11n only For more detailed information please refer to the documentation of the AeroScout company www aeroscout com Description The table has the following columns Radio Specifies the WLAN interface to which the s...

Page 295: ...Click System Load Save in the navigation area Click the TFTP tab 2 Enter the IP address of the TFTP server in the TFTP Server IP Address input box 3 Enter the port of the TFTP server in the TFTP Server Port input box 4 Click the Load file button in the Firmware table row 5 Go to the storage location of the firmware file 6 Click the Open button in the dialog The file is uploaded Result The firmware...

Page 296: ...the factory settings Note When you reset the device parameters all previously changed settings are lost 1 Turn off the power to the device 2 Now press the Reset button and reconnect the power to the device while holding down the button 3 Hold down the button until the red fault LED F stops flashing after approximately 10 seconds and is permanently lit 4 Now release the button and wait until the fa...

Page 297: ...r to the device while holding down the button 3 Hold down the button until the red fault LED F starts to flash after approximately 2 seconds 4 Now release the button The bootloader waits in this state for a new firmware file that you can download by TFTP 5 Connect a PC to the SCALANCE W700 over the Ethernet interface 6 Assign an IP address to the SCALANCE W700 with the Primary Setup Tool 7 Open a ...

Page 298: ... Configuration Manual 03 2015 C79000 G8976 C267 08 Result The firmware is transferred to the device Note Please note that the transfer of the firmware can take several minutes During the transmission the red error LED F flashes Once the firmware has been transferred completely to the device the device is restarted automatically ...

Page 299: ...cation Information about the signal strength in dBm is displayed in WBM on the following tabs Information WLAN Client List Client mode Information WLAN Client List Available AP list The power of the input signal on the IWLAN device is influenced by the following factors Distance between the WLAN partners Reflections of the electromagnetic waves by parts of the building Setting for the Max TX Power...

Page 300: ... AES in the security settings SSID For SSID use only the characters that were supported by the previous products Management only over wired Ethernet interface In the previous products there was a function Management only over wired Ethernet interface In the new devices this function is covered by the Management ACL Page 281 function iPCF The SCALANCE W700 xRR devices support data rates up to 11 Mb...

Page 301: ...r the attacker to access the communications path between two end devices You can for example protect WLAN devices by arranging so that the Agent IP is only accessible via a single management VLAN For more detailed information refer to the section Agent IP Page 144 A further option is to install a separate HTTPS certificate on the WLAN client access point The HTTPS certificate checks the identity o...

Page 302: ...Troubleshooting FAQ 7 4 Instructions for secure network design SCALANCE W780 W740 to IEEE 802 11n Web Based Management 302 Configuration Manual 03 2015 C79000 G8976 C267 08 ...

Page 303: ...1 3 6 1 2 1 2 RFC2233 P BRIDGE MIB 1 3 6 1 2 1 17 4 5 Q BRIDGE MIB 1 3 6 1 2 1 17 7 RADIUS ACC CLIENT MIB 1 3 6 1 2 1 67 2 2 RADIUS AUTH CLIENT MIB 1 3 6 1 2 1 67 1 2 RFC1213 MIB 1 3 6 1 2 1 4 RMON MIB 1 3 6 1 2 1 16 SNMP COMMUNITY MIB 1 3 6 1 6 3 18 SNMP FRAMEWORK MIB 1 3 6 1 6 3 10 2 1 RFC2571 SNMP NOTIFICATION MIB 1 3 6 1 6 3 13 RFC2573 SNMP PROXY MIB 1 3 6 1 6 3 14 SNMP TARGET MIB 1 3 6 1 6 3 ...

Page 304: ...ens 2 1 3 6 1 4 1 4329 20 1 1 1 1 28 Vendor specific SN MSPS RMON MIB Siemens 2 1 3 6 1 4 1 4329 20 1 1 1 1 12 Vendor specific SN MSPS SINEMA MIB Siemens 2 1 3 6 1 4 1 4329 20 1 1 1 1 25 Vendor specific SN MSPS SNMP MIB Siemens 2 1 3 6 1 4 1 4329 20 1 1 1 1 4 Vendor specific SN MSPS SNTP CLIENT MIB Siemens 2 1 3 6 1 4 1 4329 20 1 1 1 1 19 1 Vendor specific SN MSPS STP L2T MIB Siemens 1 3 6 1 4 1 4...

Page 305: ...aded in WBM using System Load Save HTTP MIB and the Save button OID The private MIB variables of the SCALANCE W700 have the following object identifiers iso 1 org 3 dod 6 internet 1 private 4 enterprises 1 siemens 4329 industrialComProducts 20 iComPlatforms 1 simaticNet 1 snMsps 1 snMspsCommon 1 WLAN specific MIB variables The WLAN specific MIB variables can be found in snMspsWlan You will find fu...

Page 306: ...Appendix B B 1 Private MIB variables of the SCALANCE W700 SCALANCE W780 W740 to IEEE 802 11n Web Based Management 306 Configuration Manual 03 2015 C79000 G8976 C267 08 ...

Page 307: ...al Bridged LANs VLAN Tagging Port Based VLANs IEEE 802 1W 2004 Rapid Spanning Tree Protocol RSTP IEEE 802 1X Port Based Network Access Control IEEE 802 3 2002 Ethernet IEEE 802 3af Power over Ethernet PoE IEEE 802 11 Wireless Local Area Network IEEE 802 11a Wireless standard for use of the 5 GHz frequency band IEEE 802 11at PoE IEEE 802 11b g Wireless standard for use of the 2 4 GHz frequency band...

Page 308: ...Appendix C C 1 Underlying standards SCALANCE W780 W740 to IEEE 802 11n Web Based Management 308 Configuration Manual 03 2015 C79000 G8976 C267 08 ...

Page 309: ...ower supply from the signaling sys tem MSTP disabled MSTP enabled Information on the status of the Spanning Tree protocol No Fault states pending after startup Fault state following system start Status of the power supply Alarm Description You enable or disable the Power Change event in System Events Power up on line 1 2 PoE Power supply exists on line 1 line 2 or PoE Power down on line 1 2 PoE Po...

Page 310: ... neighboring channel The channel will be blocked for 30 min The access point changes to the configured alternative channel or to the next free channel on which there is no primary user DFS channel channel number frequency frequency MHz aged out from NOL at WLAN X and can be used again No primary user detected on the channel any longer The channel was removed from the list of blocked channels and c...

Page 311: ...the file using TFTP failed The file name is incorrect or the file does not exist on the server File upload via TFTP file transfer of FileType file type failed Cannot connect to given IP address Loading the file using TFTP failed The TFTP server cannot be reached or the settings are incorrect File download via TFTP file transfer of FileType file type failed Cannot connect to given IP address Saving...

Page 312: ...about message system Messages Description Syslog Server not reachable The configured Syslog server is not accessible Unable to send messages to syslog server Please check syslog socket configuration The syslog server configuration is incomplete Unable to send e mail s because of IP connec tion failure Sending of e mail s failed SMTP server cannot be reached e g net work connection interrupted Unab...

Page 313: ...ration was written successfully to an empty KEY PLUG Startup configuration Internal storage PLUG Factory clean filled with internal con figuration PLUG Configuration accepted The internal configuration was written successfully to an empty C PLUG Startup configuration PLUG storage PLUG Configuration accepted PLUG License accepted The configuration was loaded successfully from the KEY PLUG Startup c...

Page 314: ...ged in successfully on the access point Client MAC address system name disassociated with reason reason description The client was logged off from the access point Messages in client mode Alarm Description Associated successfully to AP MAC address system name at channel channel number frequency fre quency MHz The client has logged in successfully on the access point Disassociated from AP MAC addre...

Page 315: ...h predecessor products 300 Configuration mode 140 C PLUG 29 203 Formatting 205 Saving the configuration 205 CRC 107 D Data transmission speed 232 235 802 11a b g 232 802 11n 235 DCP server 69 139 263 DHCP Client 166 DNS client 146 DST Daylight saving time 183 185 E E Mail function 164 Alarm events 164 Line monitoring 164 Error status 99 Ethernet statistics Interface statistics 104 Event log table ...

Page 316: ...oring 164 LLDP 264 Location 142 Log table WLAN Authentication Log 97 Logging on via HTTP 61 via HTTPS 61 Logout Automatic 195 M Maintenance data 92 Mixed mode 300 MSTP 259 Port 255 Port parameters 260 MSTP instance 261 261 Multichannel configuration 17 Multiple Spanning Tree 255 259 N NAPT 46 Configuration 268 NAT 46 Configuring 266 Negotiation 211 Network access 18 NTP Client 192 O Order number 9...

Page 317: ...ng Tree 50 SSH Server 138 Standalone configuration 15 Start page 86 STEP 7 263 Subnet mask 54 Syslog 196 Client 139 System Configuration 138 General information 141 System event log Agent 196 System events Configuration 160 Severity filter 163 T Telnet Server 138 TFTP Load save 156 Time 139 Time of day Manual setting 182 SIMATIC Time Client 194 SNTP Simple Network Time Protocol 189 System time 181...

Reviews: