Siemens SCALANCE-W788_Manual
SIMATIC NET
Operating Instructions
SCALANCE W788-1PRO
(Access Point)
SCALANCE W788-2PRO
(Dual Access Point)
Preface, Contents
Basic Information on
Wireless LAN
Communication
1
Description of the
SCALANCE W788
2
Commissioning
3
Configuration with the
Primary Setup Tool
4
Configuration Using the
Wizards of
Web Based Management
5
Configuration Using Web
Based Management and the
Command Line Interface
6
Technical Specifications
7
Glossary, Index, Certificates
and Approvals, Support
C79000-G8976-C184-03
Release 01/2005
Classification of Safety-Related Notices
This document contains notices which you should observe to ensure your own personal safety, as well as to protect the product and connected equipment. These notices are highlighted in the manual by a warning triangle and are marked as follows
according to the level of danger:
!
Danger
indicates that death or severe personal injury will result if proper precautions are not
taken.
!
Warning
indicates that death or severe personal injury can result if proper precautions are not
taken.
!
Caution
with warning triangle indicates that minor personal injury can result if proper precautions are not taken.
Caution
without warning triangle indicates that damage to property can result if proper precautions are not taken.
Notice
indicates that an undesirable result or status can occur if the relevant notice is ignored.
Note
highlights important information on the product, using the product, or part of the documentation that is of particular importance and that will be of benefit to the user.
© Copyright Siemens AG, 1998 to 2005 - All rights reserved
The reproduction, transmission or use of this document or its
contents is not permitted without express written authority.
Offenders will be liable for damages. All rights, including rights
created by patent grant or registration of a utility model or design,
are reserved.
Siemens AG
Automation and Drives
Industrial Communication
Postfach 4848, D-90327 Nürnberg
2
Siemens Aktiengesellschaft
Disclaimer
We have checked the contents of this manual for agreement with
the hardware and software described. Since deviations cannot be
precluded entirely, we cannot guarantee full agreement. However,
the data in this manual are reviewed regularly and any necessary
corrections included in subsequent editions. Suggestions for
improvement are welcome.
C79000-G8976-C184-03
Technical data subject to change.
Printed in the Federal Republic of Germany
Trademarks
SIMATIC, SIMATIC NET, SINEC, SIMATIC NET Networking for Industry® and
SCALANCE® are registered trademarks of Siemens AG.
Third parties using for their own purposes any other names in this document which refer to trademarks might infringe upon the rights of the trademark owners.
Safety Instructions Regarding your Product
Before you use the product described here, read the safety instructions below thoroughly.
Qualified Personnel
Only qualified personnel should be allowed to install and work on this equipment .
Qualified persons are defined as persons who are authorized to commission, to
ground, and to tag circuits, equipment, and systems in accordance with established
safety practices and standards.
Correct Usage of Hardware Products
Please note the following regarding the correct usage of hardware products:
Caution
This device may only be used for the applications described in the catalog or the technical description, and only in connection with devices or components from other
manufacturers which have been approved or recommended by Siemens.
This product can only function correctly and safely if it is transported, stored, set up,
and installed correctly, and operated and maintained as recommended.
Before you use the supplied sample programs or programs you have written yourself,
make certain that no injury to persons nor damage to equipment can result in your
plant or process.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
3
Correct Usage of Software Products
Please note the following regarding the correct usage of software products:
Caution
This software may only be used for the applications described in the catalog or the
technical description, and only in connection with software products, devices, or components from other manufacturers which have been approved or recommended by
Siemens.
Before you use the supplied sample programs or programs you have written yourself,
make certain that no injury to persons nor damage to equipment can result in your
plant or process.
Prior to Startup
Before putting the product into operation, note the following warning:
Caution
Prior to startup you must observe the instructions in the relevant documentation. For
ordering data of the documentation please refer to the catalogs or contact your local
SIEMENS representative.
4
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Preface
Scope of this Manual
This manual describes the products SCALANCE W788-1PRO and
SCALANCE W788-2PRO. Where the description applies to both products, the
name SCALANCE W788 is used. Where the description applies to a specific product, the full name of the product is used.
This manual applies to the following software versions:
● SCALANCE W788 firmware as of Version 1.0
● Primary Setup Tool as of Version 2.0.10
Purpose of the Manual
This manual is intended to provide you with the information you require to install,
commission and operate the SCALANCE W788 correctly. It explains how to configure the SCALANCE W788 and how to integrate the SCALANCE W788 in a
WLAN network.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
5
Preface
Orientation in the Documentation
Apart from the operating instructions you are currently reading, the following documentation is also available from SIMATIC NET on the topic of Industrial Wireless
LANs:
● Operating Instructions (compact) SCALANCE W788-1PRO /
SCALANCE W788-2PRO
This document is supplied on paper with the device and contains an abridged
version of the most important information required to work with the
SCALANCE W788.
● System Manual Wireless LAN Basics
This includes not only the description of the physical basics and an outline of
the most important IEEE standards but also information on data security and a
description of industrial uses of wireless LAN.
You should read this manual if you want to set up WLAN networks with a more
complex structure (not only connections between two devices).
● Operating Instructions SCALANCE W744-1PRO
This is the comprehensive user documentation on the SCALANCE W744-1PRO
with all the information required for installation, commissioning and operation of
this device.
The SCALANCE W744-1PRO is connected to a PC / PLC by an Ethernet cable
and allows the attachment of these devices to a wireless network; in other
words, it is a gateway from a wired to a wireless network.
● Operating Instructions (compact) SCALANCE W744-1PRO
This document is supplied on paper with the device and contains an abridged
version of the most important information required to work with the
SCALANCE W744-1PRO.
● Operating Instructions CP 7515
The comprehensive user documentation for the CP 7515 communications processor with all the information required to operate this device.
The CP 7515 is inserted in a CardBus / PC-card (32-bit) slot and allows attachment of the PC/PG to a wireless network.
● Operating Instructions (compact) CP 7515
This document is supplied with the device on paper and contains a concise
summary of the most important information required to use the CP 7515.
● Manual CP 1515
The comprehensive user documentation for the CP 1515 communications processor with all the information required to operate this device.
The CP 1515 is inserted in a PC-card slot (Type II) and allows attachment of
the PC/PG to a wireless network.
6
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Preface
Biological Compatibility
With regard to the question of whether electromagnetic fields (for example in association with industrial wireless LANs) can put human health at risk, we refer to a
publication of BITKOM (German Association for information Technology, Telecommunication and New Media e. V.), dated December 2003:
"The same regulations for the protection of health for all other radio applications also apply to WLAN devices. These regulations are based on the protection concept of ICNIRP2 or the corresponding recommendation of the
European Council.
The independent German radiation protection commission (SSK) was commissioned by the federal German ministry of the environment to investigate
the possible dangers - thermal and non-thermal - resulting from electromagnetic fields and came to the following conclusions3:
"The SSK comes to the conclusion that even after evaluation of the latest
scientific literature, there is no new scientific evidence regarding proven adverse effects on health that causes any doubt regarding the scientific
evaluation on which the protection concept of the ICNIRP or the European
Council recommendation."
The SSK also concludes that below the current limit values, these is also no
scientific suspicion of health risks.
This assessment agrees with those of other national and international scientific commissions and of the WHO (www.who.int/emf)
Accordingly and in view of the fact that WLAN devices are significantly below
the scientifically established limit values, there are no health risks from the
electromagnetic fields of WLAN products.
[...]
__________________________
[...]
2
International Council on Non-Ionizing Radiation Protection
3
'Limit Values and Precautionary Measures to Protect the General Public from Electromagnetic
Fields' Recommendation of the Radiation Protection Commission (SSK) with scientific justification, Issue 29, 2001."
You will find further information on this topic under the following URL:
www.bitkom.org
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
7
Preface
8
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Contents
1
Basic Information on Wireless LAN Communication ............................................... 13
1.1
Network Structure .............................................................................................. 13
2
Description of the SCALANCE W788 ......................................................................... 19
3
Commissioning............................................................................................................. 25
4
5
3.1
Lightning Protection, Power Supply, and Grounding ........................................ 25
3.2
Assembly and Connectors................................................................................. 27
3.3
3.3.1
3.3.2
3.3.3
Cabling for Power Supply and Ethernet ............................................................ 29
General Notes.................................................................................................... 29
Assembling IE Hybrid Cable 2x2 + 4x0,34 with an IE IP67 Hybrid Connector . 30
Assembling IE FC TP Standard Cable 4x2 GP or IE FC TP Flexible Cable 4x2
GP with an IE IP67 Hybrid Connector ............................................................... 34
Configuration with the Primary Setup Tool ............................................................... 39
4.1
Introduction ........................................................................................................ 39
4.2
Installing the DLC Protocol ................................................................................ 41
4.3
Installing the Primary Setup Tool....................................................................... 42
4.4
Working with the Primary Setup Tool ................................................................ 42
4.5
Primary Setup Tool via the Command Line....................................................... 46
Configuration Using the Wizards of Web Based Management ............................... 47
5.1
Introduction ........................................................................................................ 47
5.2
Starting Web Based Management and Logging On.......................................... 48
5.3
Selecting the Wizards........................................................................................ 49
5.4
5.4.1
5.4.2
5.4.3
5.4.4
5.4.5
5.4.6
Basic Wizard...................................................................................................... 50
IP Settings ......................................................................................................... 50
Device Name ..................................................................................................... 52
Country Code..................................................................................................... 53
Wireless Settings ............................................................................................... 54
Channel Settings ............................................................................................... 55
Finish ................................................................................................................. 57
5.5
5.5.1
5.5.2
5.5.3
5.5.4
5.5.5
5.5.6
5.5.7
5.5.8
5.5.9
5.5.10
Security Wizard.................................................................................................. 58
Security Settings................................................................................................ 59
Security Settings for Management Interfaces ................................................... 60
Security Settings for SNMP Protocol................................................................. 61
Security Settings for WLAN (Page 1) ................................................................ 62
Security Settings for WLAN (Page 2) ................................................................ 64
Settings for the Security Level Low ................................................................... 66
Settings for the Security Level Middle ............................................................... 67
Settings for the Security Level High .................................................................. 68
Settings for the Security Level Highest ............................................................. 68
Following Settings Were Made.......................................................................... 69
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
9
Contents
5.5.11 Finish ................................................................................................................. 70
6
Configuration Using Web Based Management and the Command Line Interface 71
6.1
10
6.1.1
6.1.2
6.1.3
6.1.4
General Information on Web Based Management and the Command Line
Interface............................................................................................................. 71
Introduction ........................................................................................................ 71
The LED Simulation of Web Based Management............................................. 72
Working with Web Based Management ............................................................ 73
Command Line Interface ................................................................................... 74
6.2
6.2.1
6.2.2
6.2.3
6.2.4
6.2.5
6.2.6
6.2.7
6.2.8
6.2.9
6.2.10
6.2.11
The System Menu.............................................................................................. 76
System Information Menu Command ................................................................ 76
IP Settings Menu Command.............................................................................. 78
Services Menu Command ................................................................................. 79
Restart Menu Command ................................................................................... 80
Event Config Menu Command .......................................................................... 82
E-mail Config Menu Command ......................................................................... 84
SNMP Config Menu Command ......................................................................... 84
SNTP Config Menu Command .......................................................................... 87
Fault State Menu Command.............................................................................. 89
Load & Save Menu Command .......................................................................... 90
C-PLUG Menu Command ................................................................................. 93
6.3
6.3.1
6.3.2
6.3.3
6.3.4
6.3.5
The Interfaces Menu.......................................................................................... 95
Ethernet Menu Command ................................................................................. 95
WLAN Menu Command..................................................................................... 96
Advanced Submenu .......................................................................................... 98
SSID List Submenu Command........................................................................ 102
Advanced G Submenu .................................................................................... 103
6.4
6.4.1
6.4.2
6.4.3
6.4.4
6.4.5
The Security Menu........................................................................................... 106
Basic Wireless Menu Command ..................................................................... 106
Keys Menu Command ..................................................................................... 109
ACL Menu Command ...................................................................................... 110
RADIUS Server Menu Command.................................................................... 112
Access Menu Command ................................................................................. 113
6.5
6.5.1
6.5.2
6.5.3
6.5.4
6.5.5
The Bridge Menu ............................................................................................. 115
WDS Menu Command..................................................................................... 115
Learning Table Menu Command ..................................................................... 117
ARP Table Menu Command............................................................................ 117
Spanning Tree Menu Command ..................................................................... 117
Storm Threshold Menu Command .................................................................. 121
6.6
6.6.1
6.6.2
6.6.3
The Filters Menu.............................................................................................. 122
MAC Filter Menu Command ............................................................................ 122
MAC Dir Filter Menu Command ...................................................................... 123
Protocol Filter Menu Command....................................................................... 123
6.7
6.7.1
6.7.2
6.7.3
6.7.4
The I-Features Menu ....................................................................................... 125
iQoS Menu Command ..................................................................................... 125
Link Check Menu Command ........................................................................... 126
Redundancy Menu Command......................................................................... 127
IP-Alive Menu Command................................................................................. 128
6.8
6.8.1
6.8.2
The Information Menu ..................................................................................... 130
Log Table Menu Command ............................................................................. 130
Auth Log Menu Command............................................................................... 131
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Contents
6.8.3
6.8.4
6.8.5
6.8.6
6.8.7
6.8.8
6.8.9
7
Versions Menu Command ............................................................................... 132
Client List Menu Command ............................................................................. 132
Ethernet Menu Command ............................................................................... 134
WLAN .............................................................................................................. 134
iQoS Menu Command ..................................................................................... 134
Spanning Tree Menu Command ..................................................................... 136
IP, TCP/IP, ICMP, SNMP Menu Command..................................................... 138
Technical Specifications ........................................................................................... 139
Approvals ................................................................................................................................. 143
Appendix
Private MIB Variables of the SCALANCE W788............................................... 149
Glossary ................................................................................................................................... 153
Index
...................................................................................................................................... 157
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
11
Contents
12
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
1
Basic Information on Wireless LAN
Communication
1.1
Network Structure
Ad Hoc Networks
In the ad hoc mode, nodes communicate directly (connections 1 through 3 in Figure 1-1) without involving a SCALANCE W788 or with each other (connection 4).
The nodes access common resources (files or even devices, for example a printer)
of the server. This is, of course, only possible when the nodes are within the wireless range of the server or within each other's range.
2
1
4
3
Figure 1-1
Ad Hoc Network without SCALANCE W788
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
13
Basic Information on Wireless LAN Communication
Standalone Configuration with the SCALANCE W788
This configuration does not require a server and the SCALANCE W788 does not
have a connection to a wired Ethernet. Within its transmission range, the
SCALANCE W788 forwards data from one WLAN node to another.
The wireless network has a unique name. All the devices exchanging data within
this network must be configured with this name.
Figure 1-2
14
Standalone Configuration of a SCALANCE W788. The gray area indicates
the wireless transmission range of the SCALANCE W788.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Basic Information on Wireless LAN Communication
Wireless Access to a Wired Ethernet Network
If one (or more) SCALANCE W788 access points have access to wired Ethernet,
the following applications are possible:
● A single SCALANCE W788 as gateway:
A computer equipped only with an Ethernet adapter can be integrated in the client mode in a wireless network over the SCALANCE W788.
A wireless network can be connected with a wired network over a SCALANCE
W788.
● Span of wireless coverage for the wireless network with several
SCALANCE W788 access points:
The SCALANCE W788 access points are all configured with the same unique
SSID (network name). All nodes that want to communicate over this network
must also be configured with this SSID.
If a mobile station moves from the coverage range (cell) of one
SCALANCE W788 to the coverage range (cell) of another SCALANCE W788,
the wireless connection is maintained (this is called roaming).
Figure 1-3
Connecting Two SCALANCE W788 Access Points to a Wired Ethernet
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
15
Basic Information on Wireless LAN Communication
Multichannel Configuration
If neighboring SCALANCE W788 access points use the same frequency channel,
the response times are longer due to the collisions that occur. If the configuration
shown in Figure 1-4 is implemented as a single-channel system, computers A and
B cannot communicate at the same time with the SCALANCE W788-1PRO access
points in their cells.
If neighboring SCALANCE W788 access points are set up for different frequencies,
this leads to a considerable improvement in performance. As a result, neighboring
cells each have their own medium and the delays resulting from time-offset transmission no longer occur.
Channel spacing should be as large as possible; a practical value would be 25
MHz (five channels). Even in a multichannel configuration, all SCALANCE W788
access points can be configured with the same network name.
1
7
A
B
1
7
Figure 1-4
16
Multichannel Configuration on Channels 1 and 7 with four
SCALANCE W788 Access Points
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Basic Information on Wireless LAN Communication
Wireless Distribution System (WDS)
WDS allows direct connections between SCALANCE W788 devices and or between SCALANCE W788 and other WDS-compliant devices. These are used to
create a wireless backbone or to connect an individual SCALANCE W788 to a network that cannot be connected directly to the cable infrastructure due to its location.
Two alternative configurations are possible. The WDS partner can be configured
both using its name and its MAC address.
1
1
A
B
1
1
Figure 1-5
Implementation of WDS with four SCALANCE W788 Access Points
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
17
Basic Information on Wireless LAN Communication
Redundant Wireless LAN (RWlan)
RWlan allows redundant, wireless connection between two SCALANCE W7882PRO devices. This is used to set up a redundant wireless backbone that cannot
be implemented as a wired network due to its location but nevertheless has high
demands in terms of availability.
Two alternative configurations are possible. The RWlan partner can be configured
both using its name and its MAC address.
B
A
Figure 1-6
18
Implementation of RWlan with two SCALANCE W788-2PRO Devices.
As an alternative, data transfer is possible over one of the two wireless
adapters.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Description of the SCALANCE W788
2
Components of the Product
The following components are supplied with the SCALANCE W788:
● SCALANCE W788-1PRO or SCALANCE W788-2PRO
● 2 OMNI antennas
● 1 IE IP67 hybrid connector
● 1 dummy plug for the M12 socket
● 2 (or 4 for the SCALANCE W788-2PRO) dummy plugs for the R-SMA sockets
● 1 SIMATIC NET Industrial Wireless LAN CD with these Operating Instructions
for the SCALANCE W788
Please check that the consignment you have received is complete. If it is not complete, please contact your supplier or your local Siemens office.
Requirements for Installation and Operation
A PG/PC with a network attachment must be available to configure the
SCALANCE W788. If no DHCP server is available, a PC on which the Primary
Setup Tool (PST) is installed is necessary for the initial assignment of an IP address to the SCALANCE W788. For the other configuration settings, a computer
with Telnet or an Internet browser is necessary.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
19
Description of the SCALANCE W788
Possible Applications of the SCALANCE W788
The SCALANCE W788 is equipped with an Ethernet interface and a wireless LAN
interface (SCALANCE W788-2PRO: two WLAN interfaces). This makes the device
suitable for the following applications:
● The SCALANCE W788 forwards data within its transmission range from one
node to another without a connection to wired Ethernet being necessary.
● The SCALANCE W788 can be used as a gateway from a wired to a wireless
network.
● The SCALANCE W788 can be used as a wireless bridge between two networks.
● The SCALANCE W788 can be used as a bridge between two different frequencies.
Due to its second WLAN interface, the SCALANCE W788-2PRO can also be used
to implement a redundant wireless connection between two SCALANCE W7882PRO devices.
Properties of the SCALANCE W788
● The Ethernet interface supports 10 Mbps and 100 Mbps, both in full and half
duplex as well as autocrossing and autopolarity.
● The wireless interface is compatible with the IEEE 802.11a,
IEEE 802.11b, and IEEE 802.11g standards. In the 802.1a- and 802.1g mode,
the total transmission rate is up to 54 Mbps. In the turbo mode, the transmission
rate is up to 108 Mbps (not permitted in all countries and modes).
● Operation in the 2.4 GHz and 5 GHz frequency bands.
● Support of the authentication standards WPA, WPA-PSK and
IEEE 802.1x and WEP, AES and TKIP encryption schemes.
● Suitable for inclusion of a RADIUS server for authentication.
● Device-related and application-related monitoring of the wireless connection.
● The interoperability of SCALANCE W788 devices with WiFi devices of other
vendors was tested thoroughly.
20
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Description of the SCALANCE W788
Ports
The SCALANCE W788 has the following ports:
● RJ-45 hybrid connector on the front panel of the housing consisting of an RJ-45
jack and 4-pin power socket. The RJ-45 connector supports the use of switches
capable of power-over-Ethernet according to 802.3af. The 4-pin power socket
allows power of 24-48 VDC to be supplied.
● An M12 connector as optional power supply. (24-48 VDC)
● Two R-SMA plugs (four R-SMA plugs on the SCALANCE W788-2PRO) for the
attachment of antennas on the sides of the device.
LED Display
On the front of the housing, several LEDs provide information on the operating
status of the SCALANCE W788:
L 1
F
L 2
P 1
R 1
S C A L A N C E W 7 8 8 -1 P R O
Figure 2-1
F
L 1
R 2
L 2
P 1
R 1
S C A L A N C E W 7 8 8 -2 P R O
The LEDs of the SCALANCE W788
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
21
Description of the SCALANCE W788
The LEDs have the following significance:
LED
P1
Color
Meaning
Yellow
Data transfer over the Ethernet interface (traffic).
Green
There is a connection over the Ethernet interface. (Link)
L2
Green
Power supply over hybrid connector X1. (PoE or power contacts)
R1
Yellow
Data transfer over the first WLAN interface.
Green
Access Point Mode:
The WLAN interface is initialized and ready for operation.
Client Mode:
There is a connection over the first WLAN interface.
R1
Green flashing
Access Point Mode:
The channels are scanned.
Client Mode:
The client is searching for a connection to an access point
or ad hoc network.
R2
Green flashing
quickly
Client Mode Only:
The client is waiting for the adopt MAC address.
Yellow
Access Point Mode:
Data transfer over the second WLAN interface.
Client Mode:
The LED is always off, since the 2nd interface is not available in client mode.
Green
Access Point Mode:
The WLAN interface is initialized and ready for operation.
Client Mode:
The LED is always off, since the 2nd interface is not available in client mode.
Green flashing
Access Point Mode:
The channels are scanned.
Client Mode:
The LED is always off, since the 2nd interface is not available in client mode.
L1
Green
Power supply over the M12 connector. (X2)
F
Red
An error occurred during operation with the
SCALANCE W788.
Note
If the LED for the WLAN interface is not green when the device starts up, although
it is activated, initialization of the interface has failed.
The main reason for this is may be that the operating temperature has not yet
been reached. If SCALANCE W700 products are started up at temperatures below
zero, wait times of up to 15 minutes can occur.
22
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Description of the SCALANCE W788
Configuration Information on the C Plug
The C Plug is used to transfer the configuration of the old device to the new device
when a device is replaced. When the new device starts up, it continues with exactly the same configuration as the old device. One exception to this can be the IP
configuration if it is set over DHCP and the DHCP server has not been reconfigured accordingly.
Reconfiguration is necessary if you use WDS or redundancy and use the MAC addresses and not the SysNames. These functions are then based on the MAC address that inevitably changes if a device is replaced.
Replacing the C Plug
Follow the steps below to replace a C Plug in a SCALANCE W788:
1.
Remove the old SCALANCE W788 from its mounting and open the sealing
screw on the rear with a coin or broad screwdriver.
2.
Remove the C Plug.
3.
Open the sealing screw of the new device in the same way and insert the C
Plug of the old device.
4.
Replace the sealing screws of both devices.
If a new C Plug is inserted in a SCALANCE W788-1PRO, the configuration stored
locally on the SCALANCE W788-1PRO is saved to the C Plug. If an incorrect C
Plug (for example from another device or a damaged plug) is inserted, the
SCALANCE W788 signals an error with the red LED. The user then has the choice
of either removing the C Plug again or selecting the option to reformat the C Plug
and use it.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
23
Description of the SCALANCE W788
Reset Button
The reset button is located directly beside the C plug and has several functions:
● Restarting the device.
To restart the device, press the Reset button.
● Downloading new firmware
(if the normal procedure for downloading firmware does not work)
Follow the steps below to download new firmware:
1. Turn off the power to the device.
2. Now press the Reset button and reconnect the power to the device while
holding down the button.
3. Hold down the button until the red fault LED (F) starts to flash after approximately 2 seconds.
4. Now release the button. The bootloader waits in this state for a new firmware file that you can download by FTP.
5. Assign an IP address with the Primary Setup Tool.
6. Connect a PC to the SCALANCE W788 over the Ethernet interface.
7. Then enter the command "ftp <ip address>“ in a DOS box or use a different
FTP client. The new firmware should be located in the same folder as the
DOS box.
8. For the login and password, enter "siemens“. You can now transfer the new
firmware with the "put <firmware>“ command.
● Restoring the default parameters (factory default)
Caution: All previously made settings are lost!
First, turn off the power to the device. Then press the Reset button and reconnect the power to the device while holding down the button. Hold down the button until the red fault LED (F) stops flashing after approximately 10 seconds and
is permanently lit. Now release the button and wait until the error LED (F)
goes off. The device now starts automatically with the default parameters.
24
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Commissioning
3.1
3
Lightning Protection, Power Supply, and Grounding
Notes on Lightning Protection
!
Warning
Antennas installed outdoors must be within the area covered by a lightning protection system. Make sure that all conducting systems entering from outdoors can be
protected by a lightning protection potential equalization system.
When implementing your lightning protection concept, make sure you adhere to
the VDE 0182 or IEC 62305 standard.
A suitable lightning conductor is available in the range of accessories of SIMATIC
NET Industrial WLAN:
Lightning Protector LP798-1PRO (order no. 6GK5798-1LP00-0AA6)
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
25
Commissioning
Notes on Power Supply and Grounding
!
Warning
The SCALANCE W788-1PRO and SCALANCE W788-2PRO devices are designed
for operation with safety extra-low voltage (SELV). Therefore only safety extra-low
voltage (SELV) with limited power source (LPS) complying with
IEC950/EN60950/VDE0805 may be connected to the power supply terminals.
The power supply unit to supply the SCALANCE W788 must comply with NEC
Class 2 (voltage range 18 - 32 V, current requirement 1 A)
The device may only be supplied by a power supply unit that meets the requirements of class 2 power sources of the "National Electrical Code, table 11 (b)". If
the power supply is designed redundantly (two separate power supplies), both
must meet these requirements.
Exceptions:
Power supply with PELV (according to VDE 0100-410) is also possible if the
generated rated voltage does not exceed the voltage limits 25 V AC or 60 V
DC.
Power supply by a SELV power source (according to IEC 60950) or PELV
power source (according to VDE 0100-410) without limited power is also permitted if suitable fire protection measures are taken by:
-
Installation in a cabinet or suitable enclosure
-
Installation is a suitably equipped, closed room
Caution
There must be no potential difference between the following parts otherwise there
is a risk that the device will be destroyed:
• Ground potential of the power supply and ground potential of the antenna
ground.
• Ground potential of the power supply and a grounded housing.
• Ground potential of the power supply and the ground potential of the device
connected to Industrial Ethernet (for example PC, AS-300, AS-400 etc.)
Connect both grounds to the same foundation earth or use an equipotential bonding cable.
26
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Commissioning
3.2
Assembly and Connectors
Securing the Housing
There are two ways of securing the housing:
● Use the holes in the housing to screw the device to the wall or on a horizontal
surface.
● Install the SCALANCE W788 on a 90 mm long, vertically mounted piece of
standard rail (S7-300). In this case, the standard rail serves as an
adapter between the wall and SCALANCE W788. If you want to install the
SCALANCE W788 along with a PS791-1PRO, a 150 mm long standard rail is
necessary.
Connectors for the Power Supply and for Ethernet
The SCALANCE W788 is attached to Ethernet via a hybrid socket on the front of
the housing (position A in Figure 3.1). This port also has contacts for the operating
voltage.
Note
If you do not use the hybrid socket, this must be covered with a protective cap,
otherwise IP65 protection is lost. A suitable protective cap is available as an accessory. If you do not use the M12 connector, the supplied protective cap must be
fitted to retain IP65 protection.
D
A
B
Figure 3-1
C
Connectors of the SCALANCE W788
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
27
Commissioning
As an alternative or in addition to this, you can also use the M12 plug for the power
supply (position B in Figure 3.1).
You can fit additional antennas to the sides of the SCALANCE W788-2PRO with
an antenna cable (position C in Figure 3.1). If you install the SCALANCE W788 in
a cabinet, the antennas (position D in Figure 3.1) must be unscrewed and fitted
outside the cabinet. SIMATIC NET offers the IWLAN FRNC antenna extension cable for the connection between the SCALANCE W788 and antenna. To avoid violating the approvals, only antennas released for this product can be used.
Note
The distance between a pair of antennas for the first and second WLAN interface
must be at least 0.5 m.
28
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Commissioning
3.3
Cabling for Power Supply and Ethernet
3.3.1
General Notes
Suitable Cables
The following cable variants are available to connect a SCALANCE W-700 to the
power supply and to Ethernet:
● IE hybrid cable 2x2 + 4x0,34 (order no. 6XV1870-2J)
The two data wire pairs are separately shielded. This cable is particularly suitable for assembly with the IE IP67 hybrid connector.
● IE FC TP standard cable 4x2 GP (order no. 6XV1870-2E)
IE FC TP flexible cable 4x2 GP (order no. 6XV1870-2H)
In these cable types, two wires are twisted. All for pairs of wires are inside a
common shield.
Cable Selection and Interference Exposure
A decisive factor in the selection of a cable type is the electromagnetic interference
to which the current lines between the power supply and the FC RJ-45 modular
outlet are subjected. Due to the separate shielding of the data wires, such interference has less effect on the data transmission on a hybrid cable than on TP standard cable or TP flexible cable.
A
Figure 3-2
B
C
Cabling a SCALANCE W700 with electromagnetic interference injection
between the power supply and modular outlet
A Power supply
B FC RJ-45 modular outlet with power insert
C SCALANCE 788 / 744
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
29
Commissioning
3.3.2
Assembling IE Hybrid Cable 2x2 + 4x0,34 with an IE IP67 Hybrid
Connector
Remove the two inner shells of the universal sealing ring to adapt it to the diameter of
the hybrid cable.
Push the bushing, washer, adapted universal sealing ring and the housing over the
cable jacket.
Remove the following lengths of cable jacket
and shield braid:
25 mm for the power leads.
30 mm jacket for the data leads (shorten
the braid by 11 mm).
Cut off the filler at the height of the cable
jacket.
Arrange the data leads according to the
color codes on the splice element. The following table shows the assignment of the
data leads.
Contact and color assignment of the splice
element.
30
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Commissioning
Wire color code (standard)
white
Blue
Yellow
Orange
Connector color code
(Siemens IE)
White
Blue
Yellow
Orange
Siemens IE FC RJ-45
socket (reference)
3
6
1
2
Insert the all the data leads at the same
time into the spice element is far as they
will go.
Close the splice element and RJ-45 data
module until they lock together.
Insert the data module and the spice element into the supplied IDC assembly tool.
Press the data module and the IDC assembly tool together to establish the installation
piercing connection.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
31
Commissioning
Remove the assembled data module from
the IDC assembly tool.
Position the top shield plate and press it
over the cable shield.
Position the lower shield place and press it
and the upper shield plate together until
they lock together with an audible "click".
Arrange the power leads and insert them as
far as they will go into the hinge elements of
the isolation body.
The following table shows the assignment
of the power leads.
Wire color code (standard)
Power supply insert
module
32
Brown
Brown
Black
Black
24 V
24 V
Ground
Ground
1
2
3
4
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Commissioning
Press each individual hinge element together with the integrated IDC contact.
Recommendation: Use a small slotted
screwdriver (max. 3.5 mm) as a lever.
Push the housing over the assembled data
module and the insulator body until they
lock together (there should be an audible
click).
Tighten the cable gland. We recommend an
open ring key with a size of 21 mm.
Pinout of the M12 Connector:
X2 Socket
PIN 1
24 V DC
PIN 2
--
PIN 3
Ground
PIN 4
--
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
33
Commissioning
3.3.3
Assembling IE FC TP Standard Cable 4x2 GP or IE FC TP Flexible
Cable 4x2 GP with an IE IP67 Hybrid Connector
Remove the two inner shells of the universal sealing ring to adapt it to the diameter
of the hybrid cable.
Push the bushing, washer, adapted universal sealing ring and the housing over
the cable jacket.
Remove the following lengths of cable
jacket and shield braid:
25 mm for the power leads.
30 mm for the data leads
(to achieve good shielding, the shield
braid should be at least 30 mm long).
Arrange the data leads according to the
color codes on the splice element. The following table shows the assignment of the
data leads.
Wind the shield braid around the data
leads. As a result, the shielding of the cable has contact to the shield plate of the
splice element that will be fitted later.
Contact and color assignment of the splice
element.
34
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Commissioning
Color Coding of the
Standard Cable
White /
orange *
Orange
White /
Green *
Green
Connector color code
(Siemens IE)
White
Blue
Yellow
Orange
Siemens IE FC RJ-45
socket (reference)
3
6
1
2
* White wire of the particular pair.
Insert the all the data leads at the same
time into the spice element is far as they
will go.
Close the splice element and RJ-45 data
module until they lock together.
Insert the data module and the spice element into the supplied IDC assembly tool.
Press the data module and the IDC assembly tool together to establish the installation piercing connection.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
35
Commissioning
Remove the assembled data module from
the IDC assembly tool.
Position the top shield plate and press it
over the cable shield.
Position the lower shield place and press it
and the upper shield plate together until
they lock together with an audible "click".
Arrange the power leads and insert them
as far as they will go into the hinge elements of the isolation body.
The following table shows the assignment
of the power leads.
Wire color code (standard)
Power supply insert
module
36
White /
Blue *
Blue
White brown
*
Brown
24 V
24 V
Ground
Ground
1
2
3
4
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Commissioning
Press each individual hinge element together with the integrated IDC contact.
Recommendation: Use a small slotted
screwdriver (max. 3.5 mm) as a lever.
Push the housing over the assembled
data module and the insulator body until
they lock together (there should be an audible click).
Tighten the cable gland. We recommend
an open ring key with a size of 21 mm.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
37
Commissioning
38
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration with the Primary Setup Tool
4.1
4
Introduction
Initial Assignment of an IP Address
An initial IP address for the SCALANCE W788 cannot be assigned using Web
Based Management or the Command Line Interface because these configuration
tools require that an IP address already exists.
The initial IP address can be obtained over DHCP or assigned using the Primary
Setup Tool. The Primary Setup Tool is capable of assigning such an address to
unconfigured devices without an IP address. The only condition is that the devices
can be reached over Ethernet.
Operating Systems Supported
The Primary Setup Tool can be installed and used with the following operating systems:
● Windows XP Professional
● Windows 2000 Professional SP2
DLC Protocol
The Primary Setup Tool uses the DLC protocol for communication with the modules. This protocol is not supplied with Windows XP and must be installed extra for
this operating system.
Follow the steps below to check whether or not the DLC protocol exists on your
computer:
1.
Select the menu command Start > Settings > Control Panel >Network and
Dial-Up Connections.
2.
Select the connection to your Ethernet communication module.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
39
Configuration with the Primary Setup Tool
3.
Right-click to open the context menu and select Properties. The General tab
lists all protocols and services. The DLC protocol should be listed and selected:
If the DLC protocol is listed, you can skip to the next but one section "Installing the
Primary Setup Tool". If there is no entry for the DLC protocol, install it as described
in the next section.
40
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration with the Primary Setup Tool
4.2
Installing the DLC Protocol
Extracting the Archive File
The files for installing the DLC protocol are in the self-extracting ZIP archive
pst_xp_install.exe. Follow the steps below to extract the files from the archive:
1.
Double-click on the file name pst_xp_install.exe in the Windows Explorer or
start the program using the Windows menu command Start > Run.
2.
In the dialog box of the extraction program, select the folder into which you
want to extract the files and click on the Unzip button.
installation
Follow the steps below to install the DLC protocol on your computer:
1.
Select the menu command Start > Settings > Control Panel >Network and
Dial-Up Connections.
2.
Select the connection to your Ethernet communication module.
3.
Right-click to open the context menu and select Properties.
4.
Click on the Install... button in the General tab.
5.
In the Select Network Component Type dialog, select the entry Protocol and
click the Add... button.
6.
In the Network Protocol dialog, click the Have Disk... button.
7.
In the Install from Disk dialog, click the Browse... button.
8.
In the file list box, change to the folder with the extracted installation files, select the netdlc.inf file and click the Open button.
9.
In the Install from Disk dialog, click OK. The protocol is installed; the list box in
the properties dialog of the communication module now includes the entry
DLC Protocol (Windows 2000/XP) for Siemens Primary Setup Tool.
10. Close the properties dialog by clicking the OK button.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
41
Configuration with the Primary Setup Tool
4.3
Installing the Primary Setup Tool
Procedure
The files of the Primary Setup Tools are in the self-extracting ZIP archive
pst_install.exe. Follow the steps below to install the files of the archive:
4.4
1.
Double-click on the file name pst_install.exe in the Windows Explorer or start
the program using the Windows menu command Start > Run.
2.
In the dialog box of the extraction program, select the folder into which you
want to extract the files; the default is c:\siemens\pst.
3.
Click the Unzip button. After extraction, the folder you selected contains several files including s7wnpstx.exe. Start the Primary Setup Tool by doubleclicking on this file.
Working with the Primary Setup Tool
Selecting the Language
After starting the Primary Setup Tool, a dialog opens in which you select the language for the program. You can also set the language in the Settings > Language
menu.
Selecting the Network Adapter
If there is more than one network adapter in your computer, you can open the Settings > Network Adapter menu and specify which adapter is used by the Primary
Setup Tool. This menu displays a maximum of four network adapters, however
only those for which the DLC protocol is activated are shown.
42
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration with the Primary Setup Tool
Browsing the Network
Before you assign IP addresses with the PST, you must first locate the configurable devices in the network. Start this search with the steps outlined below:
● Select the Network > Browse menu command.
● Click on the magnifier icon in the toolbar below the menu bar.
While the Primary Setup Tool browses the network, the Browse Network dialog is
displayed with a progress bar. On completion of the search, the Primary Setup
Tool displays a list with all the devices it has found in the left-hand pane.
Configuring a Module
If you click an entry in the list, the Primary Setup Tool displays information on the
selected device in the right-hand pane.
Follow the steps below to configure a device:
1.
Click on the plus symbol in front of the device symbol or double-click on the
device symbol to display all interfaces of the device.
2.
Click on the interface you want to configure. The Primary Setup Tool displays
the input dialog for the configuration data in the right-hand pane of the program window. Depending on the selected settings, some text boxes or check
boxes may be disabled. The MAC address box is always disabled because
this address is a property of the device that cannot be modified. The Client ID
parameter and DNS is also not supported by the SCALANCE W788.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
43
Configuration with the Primary Setup Tool
3.
Decide how the device will obtain its IP address:
● Dynamically from a DHCP server:
Select the Obtain IP address from DHCP server option button.
● Manual assignment by the user:
Select the Assign IP parameters option button.
4.
Make the following entries if you have decided to assign the IP address manually:
● Enter the IP address for the device in the IP Address box. In each part of
the address separated by the periods, you can enter a number between 0
and 255; the program does not accept any other numbers.
● Enter the subnet mask in the Subnet Mask box.
● If necessary, select the Use router check box and enter the IP address of
the router in the text box. Router information is necessary if the computer
on which you are creating the configuration is not in the same subnet as
the SCALANCE W788.
Downloading to the Module
Follow the steps below to transfer the configuration data to the device:
1.
Select the module to which you will download the configuration data in the lefthand pane of the program window. As long as an interface is selected and the
input dialog for the configuration data is displayed, no download is possible.
2.
Start the download with the steps outlined below:
● Select the Module > Download menu command.
● Click the second icon from the left in the toolbar (S7 modules with yellow
arrow).
44
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration with the Primary Setup Tool
Starting Web Based Management
INCs (Industrial Network Components) such as the SCALANCE W788 include
Web Based Management. Select the device you want to configure with Web Based
Management and follow the steps below to start Web Based Management:
● Select the menu command Module -> Start INC Browser.
● Click on the third icon from the left in the toolbar (module with four blue
wires).
If the Module > Start INC Browser and the module icon are disabled, there is no
Web Based Management for the selected module.
Removing a Module
You can remove a module from the list in the left-hand part of the program window
by selecting the Module > Remove Module menu command. Using this menu
command has no effect on the existence of a module in the network; if you browse
the network again, all modules are displayed again.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
45
Configuration with the Primary Setup Tool
4.5
Primary Setup Tool via the Command Line
Syntax
You can also use the Primary Setup Tool from the command line of a DOS prompt.
The syntax is as follows; optional parameters are shown in square brackets:
s7wnpstx MAC address -DHCP[=client ID]
s7wnpstx MAC address -RESET
s7wnpstx MAC address IP address subnet mask [router address]
The following table explains the parameters:
Command
Description
MAC address
The MAC address of the module to
be configured.
-DHCP
Specifies that the IP address is obtained from a DHCP server.
client ID
A unique identifier for the device. If
this parameter is not specified, the
Primary Setup Tool uses the MAC
address as the ID.
-RESET
IP address
Sets the IP address to 0.0.0.0 .
subnet mask
The new subnet mask of the module
to be configured.
Router address
The new IP address of the default
router.
46
Comment
Optional.
The new IP address of the module to
be configured.
Optional.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using the Wizards of
Web Based Management
5.1
5
Introduction
Principle of Web Based Management
The SCALANCE W788 has an integrated HTTP server for Web Based Management. If the SCALANCE W788 is accessed by an Internet browser, it returns HTML
pages to the client computer depending on user input.
Users enter the configuration data in the HTML pages sent by the
SCALANCE W788. The SCALANCE W788 evaluates this information and generates response pages dynamically.
The great advantage of this method is that apart from a Web browser, no special
software is required on the client.
Requirements for Web Based Management
Once you have assigned an IP address with the Primary Setup Tool, you can continue to configure the device with Web Based Management.
To use Web Based Management, you should ideally have a wired network connection between the SCALANCE W788 and the client computer. In principle, it is possible to use Web Based Management over a wireless network, however the
SCALANCE W788 can be set so that access over a wireless network is disabled.
We recommend that you use the Microsoft Internet Explorer Version 5.5 or higher
or Netscape Navigator Version 6.1 or higher.
All the pages of Web Based Management require JavaScript. Make sure that your
browser settings allow this.
Web Based Management is HTTP-based, so you must also enable access to port
80 if you have a firewall installed.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
47
Configuration Using the Wizards of Web Based Management
5.2
Starting Web Based Management and Logging On
Procedure
1. In the address box of the Web browser, enter the IP address or the URL of the
SCALANCE W788. If there is a problem-free connection to the SCALANCE W788,
the Logon dialog of Web Based Management is displayed:
2. In the "User Name" list box, select the "Admin" entry if you want to change settings of the SCALANCE W788 (read and write access). If you select the "User" entry, you only have read access to the configuration data of the SCALANCE W788.
3. Enter your password. If you have not yet set a password, the default passwords
as shipped apply: Enter admin if you selected "admin" as the user name or user if
you selected "user".
4. Click on the "Log On" button to start the logon.
48
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using the Wizards of Web Based Management
5.3
Selecting the Wizards
Basic Wizard and Security Wizard
Web Based Management provides two wizards that allow straightforward commissioning without detailed knowledge of wireless technology. A wizard consists of a
series of dialogs in which you enter the basic configuration data.
There is a wizard for general settings and a second wizard for configuring security
settings. When you have worked through the two wizards, the basic functionality of
the SCALANCE W788 is available and the security settings match your input.
Wizard Status
After selecting the "Wizards" menu on the left-hand side of the dialog, the status of
the wizards is displayed. If you have worked through a wizard completely, Done is
displayed as the status. If you have worked through both wizards, the Wizards entry moves to the bottom end of the menu.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
49
Configuration Using the Wizards of Web Based Management
5.4
Basic Wizard
Note
The Basic Wizard menu is available only when you use the SCALANCE W788 in
the Access Point mode. You can specify the mode in the System menu.
5.4.1
IP Settings
Description
One of the basic steps in configuration of an Ethernet device is setting the IP address. The IP address identifies a device in the network uniquely. On this page,
you enter the information for IP configuration of the SCALANCE W788.
50
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using the Wizards of Web Based Management
Specified IP Address / DHCP Server Option Buttons
There are two methods of assigning IP addresses to devices: The IP address can
be set as a fixed permanent address or can be obtained dynamically from a DHCP
server. Select "Specified IP Address" if you do not use a DHCP server.
IP Address Input Box
The IP address of the SCALANCE W788. Here, you enter an address that is
unique within the network.
Subnet Mask Input Box
The subnet mask specifies the range of addresses within which communication
can take place.
The four numbers of an IP address separated by periods are interpreted as a bit
pattern. If a one is set at a bit position within the subnet mask, this means that only
devices with an IP address the matches the IP address of the SCALANCE W788 at
this bit position can communicate with the SCALANCE W788.
Example
Let us assume that the IP address of the SCALANCE W788 is set to
192.168.147.189 and the subnet mask is set to 255.255.255.0. The bit pattern for
255 is 1111 1111. This means that the bit pattern of the first number of the IP address of a communication partner must match the bit pattern of the SCALANCE
W788 exactly at this point. The same applies to the second and third parts of the IP
address. The IP address of a communication partner must therefore start with
192.168.147. The bit pattern for 0 is 0000 0000. This means that the bit pattern of
the last part of the IP address of the partner device does not need to match the address of the SCALANCE W788 at any point; in other words, it can be any number.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
51
Configuration Using the Wizards of Web Based Management
5.4.2
Device Name
Description
The device name also identifies a network node but means more to the user than
the IP address.
Device Name Text Box
In this box, you enter the device name for your SCALANCE W788. This parameter
corresponds to the sysName SNMP parameter. The device name can be up to a
maximum of 255 characters long. If you also want to use this parameter for WDS
or redundancy, the maximum length is 32 characters.
52
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using the Wizards of Web Based Management
5.4.3
Country Code
Note
The correct country setting is mandatory for operation complying with the approvals. Selecting a country different from the country of use can lead to legal prosecution!
Description
Some countries have different frequency band divisions for WLAN communication.
The regulations for maximum output power also differ from country to country.
When you configure the SCALANCE W788, you must specify which local regulations are relevant for your location. You do this with the Country code parameter.
Country code List Box
In this list box, you select the country in which the SCALANCE W788 will be operated. You do not need to know the data for the specific country, the channel division and output power are set by the SCALANCE W788 according to the country
you select.
Note
In the version for USA/Canada, you cannot select a country. The frequency bands
for these countries are already preset.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
53
Configuration Using the Wizards of Web Based Management
5.4.4
Wireless Settings
Description
On this page, you specify the configuration of the wireless network. This includes
the network name and the transmission mode. If you are configuring the
SCALANCE W788-2PRO model, this page appears a second time to allow you to
configure the second wireless adapter. You can make different settings for
"WLAN1" and "WLAN2".
SSID Text Box
Enter the name of your network in this box. The SCALANCE W788 allows all characters except the percent character for the SSID. To ensure compatibility with partner devices, you should, however, not use any characters that are peculiar to a
particular language (for example special German characters ä, ö etc.). The string
for SSID can be a maximum of 32 characters long.
Wireless Mode List Box
Select a wireless mode that is supported by all partner devices. On the
SCALANCE W788-2PRO, it may be a practical to set a different transmission
mode for each wireless adapter to allow optimum support of different clients. The
effect of the 802.11.b + g setting is that all the settings in the Advanced G menu
are taken into account as far as possible but that compatibility with devices conforming to IEEE 802.11 b guaranteed.
54
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using the Wizards of Web Based Management
5.4.5
Channel Settings
Description
The SCALANCE W788 uses a specific channel within the frequency band for
communication. You can either set this channel specifically or configure the
SCALANCE W788 so that the channel is selected automatically. A specific channel
must be set, for example, in the following situations:
● Communication suffers from interference from another device (for example microwaves) or another wireless network.
● Use of the redundancy function. In this case, two well spaced channels or two
different frequency bands must be selected.
● Use of WDS. In this case, select a problem-free channel that is also used by the
WDS partner.
Auto Channel Select Check Box
Select this check box if you do not have any particular requirements regarding
channel selection.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
55
Configuration Using the Wizards of Web Based Management
Radio Channel List Box
Here, you select a channel suitable for your application. You can only select from
this list if the Auto Channel Select check box is not selected. The entries in the list
box depend on the previous selection made in the Country code box and on the
mode (IEEE 802.11.a, IEEE 802.11b, IEEE 802.11g).
Note
If your SCALANCE W788 has a second wireless adapter (model name
SCALANCE W788-2PRO), this adapter is deactivated when the device is shipped.
You can use the second wireless adapter after you have selected the channels.
56
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using the Wizards of Web Based Management
5.4.6
Finish
Description
This page displays the parameters you have selected when you have completed
all the entries for the basic configuration.
Finish Button
Click this button to close the Basic Wizard and to log on again with the modified IP
address. Alternatively, click on the Security Wizard link to change to the security
settings.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
57
Configuration Using the Wizards of Web Based Management
5.5
Security Wizard
Note
The Security Wizard menu is available only when you use the SCALANCE W788
in the Access Point mode. You can specify the mode in the System menu.
Introduction
With the Security Wizard, you can specify security-related parameters without detailed knowledge of security technology in wireless networks.
Note
The SCALANCE W788 can be operated even if you do not set the security parameters. Depending on the properties of your network, there is then, however, an
increased risk of unauthorized access. You should therefore work through all the
pages of the Security Wizard, so that you have at least basic security functions.
58
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using the Wizards of Web Based Management
5.5.1
Security Settings
Password
First, set a new admin password. Enter the string twice in the text boxes of this
page. The password can be up to a maximum of 31 characters long.
Until you set a password, the defaults set in the factory apply: The default password for the admin user is admin. You can use the wizards only if you log on as
administrator.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
59
Configuration Using the Wizards of Web Based Management
5.5.2
Security Settings for Management Interfaces
Protocols for Configuration
In this page, you specify the protocols with which you can access the configuration
of the SCALANCE W788. All protocols with a selected check box can be used for
configuration. You should only select protocols that you actually use.
The protocol settings only take effect after exiting the Security Wizard and restarting. Even after selecting the Web Based Management entry, you still have the option of returning to earlier pages or exiting the wizard.
Specifying the Network Type for Configuration
It is easier to restrict access to a wired network than to a wireless network. Web
Based Management allows access to the SCALANCE W788 for configuration to be
restricted to computers linked to the SCALANCE W788 with a cable. If you require
this, check the box at the bottom of the page.
60
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using the Wizards of Web Based Management
5.5.3
Security Settings for SNMP Protocol
Access Permissions using the SNMP Protocol
When using the SNMP protocol, you specify access permissions by means of
community strings. A community string effectively combines the function of user
name and password in one string; different community strings are defined for read
and write permissions. More complex and more secure authentications are possible only in some SNMPv2 variants and in SNMPv3.
To preserve security, you should not use the default values public or private.
Write Community String Text Box
Here, you enter the write community string (maximum of 63 characters) for the
SNMP protocol.
SNMP Read Only Check Box
If you select this check box, only read access is possible with the SNMP protocol
V1 or V2c.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
61
Configuration Using the Wizards of Web Based Management
5.5.4
Security Settings for WLAN (Page 1)
Description
On this page, you make the security settings, including, for example, the authentication and encryption. If you are configuring the SCALANCE W788-2PRO model,
these pages appear a second time to allow you to configure the second wireless
adapter. You can make different settings for WLAN1 and WLAN2.
Network-Specific Security Settings
On the first page of the security settings, you select settings that apply regardless
of protocol-specific restrictions. The basic measures for securing a network against
unauthorized access involve
● allowing only certain clients (those that have enter the network name (SSID) of
the AP) to communicate with the SCALANCE W788.
● excluding clients that communicate over wireless connections from the wired
part of the network.
62
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using the Wizards of Web Based Management
SSID Text Box
Enter the name of your network in this box (maximum of 255 characters, 32 characters if you use the redundancy function). To avoid any possible conflicts with settings for a specific locale on the computer, the name should not include any special
German characters (ö, ä etc.).
Close Wireless System Check Box
An entry in this check box means that the SSID is not visible for other device. As a
result, only stations for which the same network name was configured as for the
SCALANCE W788 can connect to the SCALANCE W788.
Intracell mode Selection or Check Box
In intracell mode, clients connected to the network over a radio link cannot communicate with the wired network. For the SCALANCE W4788-1PRO with one wireless adapter, the intracell mode can be activated by selecting the corresponding
check box. For the SCALANCE W4788-2PRO with two wireless adapters, you
have the following options that can be set differently for each adapter:
● Enable through both WLANs
All clients connected over one of the two wireless adapters can communicate
with each other. Data exchange with devices of the Ethernet interface is, however, not possible.
● Enable only this WLAN
Only clients of the wireless adapter in question can communicate with each
other.
● Disabled
Communication between wireless and wired clients is possible without restriction.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
63
Configuration Using the Wizards of Web Based Management
5.5.5
Security Settings for WLAN (Page 2)
Predefined Security Levels
Authentication and encryption are tried and tested methods for increasing security
in networks. Web Based Management provides five predefined security levels that
specify suitable methods. The following table indicates what the various security
levels involve.
Level
Authentication
Encryption
Type of Encryption
Encryption key
source
None
without
disabled
without
not applicable
Low
Shared Key
enabled
AUTO
local
Middle
802.1x
enabled
WEP
Server
High
WPA (preshared
key)
enabled
TKIP
local
Highest
WPA (Radius)
enabled
TKIP
Server
Authentication
Authentication basically means that some form of identification is required. In the
case of network communications, authentication methods include those listed below:
64
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using the Wizards of Web Based Management
● Shared Key
A key must be specified for authentication.
● Authentication according to IEEE 802.1x
The authentication information is stored on an external authentication server,
for example on a RADIUS server.
● WPA-PSK (Wi-Fi Protected Access - PreShared Key)
This method is based on a dynamic exchange of keys with the authentication
information being provided by the keywords used.
● WPA (Radius)
Implementation of the WPA method for use of an external radius server.
Encryption
The following schemes are used for data encryption:
● WEP (Wired Equivalent Privacy)
Symmetrical stream cipher (same key for encryption and decryption) with 40 or
104 bit long keys. Modification of the key must be done manually.
● AES (Advanced Encryption Standard)
Symmetrical block encryption scheme with 128, 192 or 256 bit long keys.
● TKIP (Temporal Key Integrity Protocol)
Symmetrical scheme in which new keys are generated cyclically.
Encryption key source
The encryption key source indicates whether the key is configured locally and fixed
(local) or whether it is negotiated by a higher protocol and an authentication server
(server).
Security Level for WLAN List Box
Select a security level that is supported by all clients. The content of the next page
depends on the selected security level. If you select the security level None, there
is no following page since neither encryption nor authentication will be used.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
65
Configuration Using the Wizards of Web Based Management
5.5.6
Settings for the Security Level Low
WEP Key List Box
Select the WEP key you want to define.
Key Text Box
Enter the character string for the key here. The key can be entered as ASCII characters or alternatively as hexadecimal digits (0 – F). If the key was entered in
ASCII format, this is later displayed in quotes.
Length List Box
Select the key length you want to use here. If the length of the stream in the Key
text box is longer than the selected key length, an error message is displayed. The
following key lengths are possible:
● 40 bits (5 ASCII characters or 10 hexadecimal numbers)
● 104 bits (13 ASCII characters or 26 hexadecimal numbers)
● 128 bits (16 ASCII characters or 32 hexadecimal numbers)
With the Auto setting, the maximum key length is also 128 bits.
66
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using the Wizards of Web Based Management
5.5.7
Settings for the Security Level Middle
Authorization Lifetime Text Box
Enter the period of validity of the authentication in seconds. The minimum time is 1
minute (enter 60), the maximum time is 12 hours (enter 43200). The default is 1
hour (3,600 seconds).
RADIUS Server Table
You can enter the data for two RADIUS servers; the information in the Backup column is used if the server defined in the Primary column is not available.
In addition to the IP address and the port, you must also specify a password
(maximum 128 characters) and confirm it in a second box. In the Maximum Retransmissions text box, you enter the maximum number of transmission attempts.
The maximum possible value is 5, the default is 2.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
67
Configuration Using the Wizards of Web Based Management
5.5.8
Settings for the Security Level High
Pass Phrase for WLAN Text Box
Here, you enter a WPA key. The key must be at least 8 characters long, the maximum length is 63 ASCII characters or 64 hexadecimal characters. This initialization
key must be known on both the client and the SCALANCE W788 and is entered by
the user at both ends.
5.5.9
Settings for the Security Level Highest
The options you can set correspond to those of the Middle security level.
68
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using the Wizards of Web Based Management
5.5.10 Following Settings Were Made
Overview of the Selected Settings
This page contains an overview of the selected security settings. If you want to
change a setting, you can click on the Previous button to return to a previous page
where you can enter a different value or make a different selection.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
69
Configuration Using the Wizards of Web Based Management
5.5.11 Finish
Exiting the Wizard
The last page of the wizard indicates other security measures that you can take. If
you still want to make final modifications, you can open the relevant pages by clicking on the texts highlighted in blue:
● IP Filter
opens the Security > Access page.
● Access Control List for WLAN 1 (WLAN 2)
opens the Security > ACL page for wireless adapter 1 or 2.
● To apply changes perform restart
opens the System > Restart page.
Finish Button
Click the Finish button to exit the Wizard. Your settings only take effect after you
have restarted (System > Restart menu).
70
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based
Management and the Command Line
Interface
6
6.1
General Information on Web Based Management and the
Command Line Interface
6.1.1
Introduction
Contents of this Chapter
Web Based Management provides you with configuration options way beyond
those described in the previous chapter. This chapter explains the possible settings for the SCALANCE W788. For a detailed description of the individual elements of a page, refer to the online help.
As an alternative, you can also configure the device using the Command Line Interface (CLI). This allows remote configuration over Telnet.
This chapter describes both configuration methods together because the menu
structure of Web Based Management is the same as the structure of the CLI commands.
Note
You should only use the command line interface if you are an experienced user.
Even commands that bring about fundamental changes to the configuration are
normally executed without a prompt for confirmation
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
71
Configuration Using Web Based Management and the Command Line Interface
Note on Login User
If you log on as user, you will only have restricted use of WEB and Telnet. Since
you only have read access, some commands do not exist in Telnet and some areas cannot be selected.
Required Experience
To be able to use the information in this chapter effectively, you should have a
thorough knowledge of network technology and WLANs.
6.1.2
The LED Simulation of Web Based Management
Display of the Operating State
The SCALANCE W788 has one or more LEDs that provide information on the operating state of the device (see Chapter 2). Depending on its location, direct access to the SCALANCE W788 may not always be possible. Web Based Management therefore displays simulated LEDs.
Activating the Simulation
There is an HTML-based simulation of the LED status. Click on the green icon below the Console link to activate the simulation:
72
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
6.1.3 Working with Web Based Management
Navigation Bar
The upper menu bar of WBM contains the following links:
● Console
This link opens a console window in which you can enter CLI commands.
● Support
When you click this link, you open a SIEMENS AG support page.
● Logout
Close the current Web Based Management session by clicking on this link. The
logon dialog is then displayed again.
● Help
Clicking on this link opens the online help of Web Based Management in a
separate browser window.
Updating the Display with Refresh
Web Based Management pages that display current parameters have a Refresh
button at the lower edge of the page. Click this button to request up-to-date information from the SCALANCE W788.
Saving Entries with Set Values
Pages in which you can make configuration settings have a Set Value button at the
lower edge. Click this button to save the configuration data you have entered on
the SCALANCE W788.
Creating entries with NEW
Pages in which you can create lists have the New button at the lower edge. Click
this button to create a new entry in the list.
Recessing Encounter with Reset Statistics
With this button, you can reset the relevant counters.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
73
Configuration Using Web Based Management and the Command Line Interface
6.1.4
Command Line Interface
Starting the CLI in a Windows Console
Follow the steps outlined below to start the Command Line Interface in a Windows
console:
1.
Open a Windows console and type in the command telnet followed by the IP
address of the SCALANCE W788:
C:\>telnet <IP address>
2.
Enter your login and password.
As an alternative, you can also enter the command telnet followed by the IP address of the SCALANCE W788 in the Start > Execute menu.
Starting the CLI in Web Based Management
Click on the Console entry in the upper menu bar of Web Based Management. A
console opens in which you can log on with your login and password. The IP address is adopted by Web Based Management.
Shortcuts for Commands
As an alternative, instead of entering full CLI commands, you can simply enter the
first letter or the first few letters of the command and then press the Tab key. The
Command Line Interface then displays a command starting with the letter or letters
you typed in. If the command displayed is not the command you require, press the
Tab key again to display the next command.
Directory Structure
Before you can enter a command in the Command Line Interface, you must first
open the required menu or submenu. This section lists the commands of each
menu in a separate table. The menu itself is shown above the table on a gray
background. The table lists only the commands themselves.
74
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Symbols for Representing CLI Commands
CLI commands generally have one or more parameters that are represented in the
syntax description as follows:
● Mandatory parameters are shown in pointed brackets.
Example:
<IP address>
● Optional parameters are shown in square brackets.
Example:
[E|D]
If you omit an optional parameter, most commands output the currently set
value.
● Alternative input values are separated by the pipe character. In this case, you
specify one of the listed values as the parameter.
Example:
[E|D]
You must enter either E or D.
● If a numeric value is required as a mandatory parameter, you can also specify a
range of values:
Example:
<0 ... 255>
You must enter a value between 0 and 255.
Cross-menu Commands
You can use the commands in the following table in any menu.
CLI\ ... >
Command
Description
Comment
/
Moves you one menu level higher.
?
Displays the commands and submenus
available in the menu.
exit
Closes the CLI/TELNET session.
Cannot be called using the command
shortcuts.
trace [Mod] [+|-][Level]
Enables / disables the trace function.
For troubleshooting
IQoS, errors, and
statistics
restart
Restarts the SCALANCE W788
Cannot be called using the command
shortcuts.
info
Displays information on the current
menu item.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
75
Configuration Using Web Based Management and the Command Line Interface
6.2
The System Menu
6.2.1
System Information Menu Command
Mode and Locale Setting
On this page, you make several basic settings for the SCALANCE W788, for example, the country and mode for the device (as SCALANCE W744-1PRO or
SCALANCE W788).
If you switch to client mode and back, all the parameters are deleted except for:
● IP address
● Subnet mask
● Gateway address
● SSID
● IP address of the default router
● DHCP flag
● System name
● System location
● System contact
● Device mode
● Country code
● User and Admin IDs
76
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Syntax of the Command Line Interface
CLI\SYSTEM>
Command
apmode [E|D]
Description
This specifies the mode for the
SCALANCE W788:
E
D
country [AT|AU|BE|CA|CH|
CL|CZ|DE|DK|ES|FI|FR|GB|
GR|HK|HU|IE|IS|IT|JP|KR|
KW|LI|LU|NL|NO|PT|SE|SG|
TR| US|ZA]
Access Point
Client
Specifies properties for specific
countries. The country codes comply
with ISO 3166, however the
SCALANCE W788 supports only the
codes listed in the left-hand column.
AT
AU
BE
CA
CH
CL
CZ
DE
DK
ES
FI
FR
GB
GR
HK
HU
IE
IS
IT
JP
KR
KW
LI
LU
NL
NO
PT
SE
SG
TR
US
ZA
Comment
Not available for the
SCALANCE W7441PRO.
This command is not
available in the version for
USA / Canada.
Austria
Australia
Belgium
Canada
Switzerland
Chile
Czech Republic
Germany
Denmark
Spain
Finland
France
Great Britain
Greece
Hong Kong
Hungary
Ireland
Iceland
Italy
Japan
Korea
Kuwait
Lichtenstein
Luxembourg
Netherlands
Norway
Portugal
Sweden
Singapore
Turkey
United States of America
South Africa
name [device name]
Assigns a value to the sysName MIB
variable.
Maximum of 255 characters. If you want to use
the name in WDS or redundancy, the maximum
length is 32 characters.
location [location]
Assigns a value to the sysLocation
MIB variable.
Maximum of 255 characters.
contact [name]
Assigns a value to the sysContact
MIB variable.
Maximum of 255 characters.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
77
Configuration Using Web Based Management and the Command Line Interface
Command
ping [-c N] <IP|name>
Description
For connection test to partner.
Comment
Telnet only
-c (counter) for the number of IGMPs
password [admin|user]
[password]
6.2.2
Specifies a password for access to
the SCALANCE W788.
Maximum of 31 characters.
IP Settings Menu Command
Configuration
Here, you decide whether you will use a DHCP server or whether you want to assign a fixed IP address to the SCALANCE W788. You can also set the IP address
of a router and the default TTL. The TTL (time to live) parameter specifies the
maximum number of routers passed through by a data packet before it is discarded.
Syntax of the Command Line Interface
CLI\SYSTEM\IP>
Command
Description
dhcp [E|D]
ip [IP address]
Enable / disable DHCP server.
subnet [subnet mask]
gateway [IP address]
Specifies the subnet mask.
ttl [TTL value]
Sets the TTL (Time To Live) parameter.
78
Specifies the IP address for the
SCALANCE W788.
Comment
When you enter a valid IP
address, enabled DHCP
is automatically disabled.
Specifies the IP address of the
router.
Default value: 64
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
6.2.3
Services Menu Command
Configuration
Here, you select the services with which access to the SCALANCE W788 will be
possible. If, for example, the SNMP Enabled check box is not selected, neither
write nor read access is possible using the SNMP protocol (v1,v2c,v3). If the
SNMP protocol is not permitted, it is not possible to send SNMP traps.
To improve security, you should only enable the services that you actually use.
Notice
Over SNMP, it is possible to disable all services and to allow read access only
over SNMP. Following this, no further configuration of the SCALANCE W788 is
possible.
Notes on WEB Enabled in the WEB Interface
The check box for the WEB Enabled entry is selected and inactive because configuration with Web Based Management is no longer possible without the option of
access with HTTP.
If you want to deactivate the option of configuration with Web Based Management,
you can do this in the Security Wizard over Telnet and SNMP. Settings made using
the Security Wizard only take effect after a restart on the SCALANCE W788.
Syntax of the Command Line Interface
CLI\SYSTEM\SERVICES>
Command
Description
telnet [E|D]
Enable / disable configuration of the
SCALANCE W788 over Telnet.
ttimeout [E|D]
Enables / disables the time restriction for a Telnet session.
ttimeout [time in s]
Specifies the time after which a Telnet section is closed if there is no
further input.
snmp [E|D]
Enable / disable SNMP.
mail [E|D]
Enable / disable E-mail.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Comment
Only WEB and SNMP
79
Configuration Using Web Based Management and the Command Line Interface
Command
Description
web [E|D]
Enable / disable configuration of the
SCALANCE W788 over Web Based
Management.
psu [E|D]
Enable / disable access to the
SCALANCE W788 with the Primary
Setup Tool. If this access option is
deactivated, configuration data can
only be read with the Primary Setup
Tool.
6.2.4
Comment
Restart Menu Command
Restart Button
Click this button to restart the SCALANCE W788. During a restart, the
SCALANCE W788 is reinitialized, the internal firmware is reloaded, and the
SCALANCE W788 runs a self-test. The entries that have been learned in the address table of the SCALANCE W788 are deleted. You can leave the browser window open while the SCALANCE W788 restarts.
Restore Memory Defaults Button
Click this button to reset the configuration. The following parameters (protected defaults) are not restored:
● IP address
● Subnet mask
● Gateway address
● SSID
● IP address of the default router
● DHCP flag
● System name
● System location
● System contact
● Device mode
● Country code
80
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
There is no automatic restart. This allows you to enter data using Web Based Management before the restart. The changes take effect only after a restart.
In User mode, this button is not visible.
Restore Factory Defaults and Restart Button
Click on this button to restore the factory configuration settings. The protected defaults (see above) are also reset. The C-PLUG here is also reinitialized and formatted if it exists. An automatic restart is triggered.
Note
By resetting all the defaults, the IP address is also lost. The SCALANCE W788 can
then only be accessed using the Primary Setup Tool unless the IP address is obtained over DHCP.
In User mode, this button is not visible.
Syntax of the Command Line Interface
CLI\SYSTEM\RESTARTS>
Command
Description
restart
Restarts the SCALANCE W788.
memreset
Resets the factory settings and triggers a restart (the protected settings
are not deleted).
defaults
Resets the factory settings (the protected settings are also deleted).
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Comment
The restart command can
be called from all menus,
however not using the
shortcut commands.
81
Configuration Using Web Based Management and the Command Line Interface
6.2.5
Event Config Menu Command
System Events of the SCALANCE W788
On this page, you specify how the SCALANCE W788 reacts to system events. You
can configure the reaction of the SCALANCE W788
-1PRO to the following events:
● Startup of the SCALANCE W788
● Change in the Ethernet status Link up / Link down.
● Error in authentication.
● Changing the power supply of the SCALANCE W788.
Evaluation of this event is only useful when using a redundant power supply.
● Change in the error status
If you use the SCALANCE W788 as an Access Point, you can configure additional
system events:
● IP-Alive state change (application-specific connection monitoring)
● Link Check state change (device-specific connection monitoring)
● Events related to bandwidth reservation iQoS
● Authentication of the client
With a SCALANCE W788-2PRO, there is also the status of the redundant connection (redundant, not redundant, interrupted) as system event.
Reaction to System Events
The following alternatives are possible:
● The SCALANCE W788 sends an E-mail.
● The SCALANCE W788 triggers an SNMP trap.
● The SCALANCE W788 writes an entry in the log file.
● The SCALANCE W788 indicates an error (the error LED lights up).
By selecting the appropriate check boxes, you specify which events trigger which
reactions on the SCALANCE W788. With the check box in the Functions enabled
row, you enable or disable the sending of E-mails or triggering of SNMP traps.
82
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Syntax of the Command Line Interface
For each of the four possible reactions E-mail, trap, log and fault, either E (Enabled, setting is enabled) or D (Disabled, setting is disabled) must be entered as
the parameter. If, for example, an E-mail is sent when the SCALANCE W788 restarts (first parameter "CW") and an entry is made in the log table but neither a trap
nor an error is generated, the following command must be entered:
setec CW E D E D
CLI\SYSTEM\EVENT>
Command
Description
setec CW <E|D>
<E|D>
setec LU <E|D>
<E|D>
<E|D>
<E|D>
<E|D>
<E|D>
Reactions when the
SCALANCE W788 restarts.
setec LD <E|D>
<E|D>
setec AF <E|D>
<E|D>
<E|D>
<E|D>
<E|D>
<E|D>
Reaction to the Link Up event on the
Ethernet interface.
setec PM <E|D>
<E|D>
setec PE <E|D>
<E|D>
setec FC <E|D>
<E|D>
setec IS <E|D>
<E|D>
<E|D>
<E|D>
<E|D>
<E|D>
<E|D>
<E|D>
<E|D>
<E|D>
Reaction to a change of power supply over the M12 power connection.
Reaction to the Link Down event on
the Ethernet interface.
Reaction to a bad authentication
over Web Based Management, CLI,
or SNMP.
Comment
If the error status was
triggered only due to a
link down event, the error
states is cleared and the
error LED goes off.
The SNMP trap AuthFault
is sent only if there is a
bad SNMP authentication.
Reaction to a change of power supply over Ethernet.
Reaction to a change in the error
status.
Reaction to a change in the connection status on a client for which the
IP-alive monitoring is activated.
If the connection status
changes, an event is triggered. If the connection
no longer exists, the error
state is triggered and the
error LED is lit.
This command is not
available in the client
mode.
setec LI <E|D> <E|D>
<E|D> <E|D>
Reaction when establishing a connection monitored with the Link
Check function.
This command is not
available in the client
mode.
setec IQ <E|D> <E|D>
<E|D> <E|D>
Reaction to a change in the iQoS
status.
This command is not
available in the client
mode.
setec CA <E|D> <E|D>
<E|D>
Reaction to a change in the client
authentication status.
This command is not
available in the client
mode.
setec RD <E|D> <E|D>
<E|D> <E|D>
Reaction to a change in the redundancy event status.
This command is not
available in the client
mode.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
83
Configuration Using Web Based Management and the Command Line Interface
6.2.6
E-mail Config Menu Command
Sender and Recipient of an E-mail
Here, you specify who the SCALANCE W788 sends an E-mail to as a reaction to
configured events. You can also enter a sender. This allows you to recognize
which device is involved and sent the E-mail. If you do not make an entry in the
From box, the SCALANCE W788 uses the following sender: [email protected]<IP
address>
Syntax of the Command Line Interface
CLI\SYSTEM\EMAIL>
Command
Description
mail [E|D]
Enable/disable the E-mail service
email [E-mail address]
Specifies the address(es) to which
the SCALANCE W788 sense Emails.
smtp <IP address>
[:port number]
from [text for sender
field]
Specifies the IP address and the
port number of the SMTP server.
6.2.7
Comment
Several E-mail addresses
can be entered separated
by semicolons.
Specifies the sender of E-mails from
SCALANCE W788.
SNMP Config Menu Command
Configuration
Select the check boxes of the entries according to the SNMP functionality you want
to use. SNMP version 3 allows permissions to be assigned and protocol level, authentication, and encryption. You specify groups and users in the Groups and Users submenus. You can also make entries there if the
SNMPv3 enabled check box is not selected, however the entries are not applied.
Notice
When using SNMP version 3, you should disable SNMP V1 and V2 because the
security settings of SNMP V3 can be bypassed by access over SNMP V1 or V2.
84
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Trap Submenu
Here, you enter the IP addresses of up to 10 trap receivers. The
SCALANCE W788 sends a trap to all the addresses you enter if their Enable trap
check boxes are selected.
Note
During a warm or cold restart with a wireless connection ( AP client, WDS, or
WRED), there is no guarantee that the recipient can be reached at the time when
the trap is sent. This leads to a loss of the message.
Groups Submenu
This page displays the SNMPv3 groups. You can create a new group by clicking
the New button and specifying the group name, the security level, and the write or
read permissions.
You can delete a group by selecting the check box in the Del column and clicking
the Set Values button. If members are already entered in the group, you cannot delete the group nor is it possible to change the security level of the group.
There are three SNMPv3 security levels:
Security Level
Special Features
Comment
None
No authentication, no encryption.
Auth/No Priv
Authentication with the MD5
or SHA algorithm, no encryption.
To display the members of
the group, you must enter
the authentication password
(maximum of 63 characters).
Auth/Priv
Authentication with the MD5
or SHA algorithm, encryption with the DES3 algorithm.
To display the members of
the group, you must enter
the authentication password
(maximum of 63 characters).
Users Submenu
This page displays the SNMPv3 users. You can create a new user by clicking the
New button and specifying the user name and the group to which the user will belong. If necessary, you must also enter the passwords for the authentication and
for the encryption.
You can delete a user by selecting the check box in the Del column and clicking
the Set Values button.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
85
Configuration Using Web Based Management and the Command Line Interface
Syntax of the Command Line Interface
CLI\SYSTEM\SNMP>
Command
Description
Comment
snmp [E|D]
Enables / disables SNMP.
Enables / disables
SNMPv1, v2c, v3 and
Traps.
snmpv1 [E|D]
Enables / disables SNMPv1/v2c.
Enables / disables
SNMPv1, v2 and Traps.
snmpv3 [E|D]
Enables / disables SNMPv3.
The special features of
SNMPv3 undertake effect
after you disable
SNMPv1. Enabling
SNMPv3 does not automatically disable
SNMPv1.
snmpro [E|D]
Enables / disables SNMPv1/v2c
read only.
getcomm [Read community
string]
Specifies the Read community
string, maximum length 63 characters.
The default is public.
setcomm [Write community
string]
Specifies the Write community
string, maximum length 63 characters.
The default is private.
traps [E|D]
Enables / disables SNMPv1 traps.
Traps are then enabled, if
SNMP v1, v2c is also enabled.
CLI\SYSTEM\SNMP\GROUP>
Command
add <Name>
[NOAUTH|AUTH|PRIV]
[R|W]
Description
Comment
Adds an SNMPv3 group. NOAUTH – Write access without read
access is not possible.
No authentication, no encryption;
AUTH - Authentication with MD5 or
SHA algorithm, no encryption.
PRIV - Authentication with MD5 or
SHA algorithm and encryption with
the DES3 algorithm.
R – Read access;
W - Write access
edit <Index>
[NOAUTH|AUTH|PRIV]
[RE|RD |WE|WD]
Changes the security level of the
group and sets the access rights.
You can view of the index of the
group with the "info“ command.
You cannot edit the authentication and encryption settings unless the
group is empty.
RE – allows read access;
Preventing read access
also prevents write access.
RD – denies read access;
WE – allows write access;
WD – denies write access;
Permitting write access
also permits read access.
delete <Index>
Deletes the SNMPv3 group from the
group list at the index position.
Is only possible to delete
a group if it is empty.
clearall
Clears all SNMP groups that are
empty.
86
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
CLI\SYSTEM\SNMP\USER>
Command
add <user name>
<group name>
[NONE|MD5|SHA]
[authentication ID]
[Encryption ID]
Description
Assigns an SNMPv3 user to a
group.
If authentication is necessary for the
group, the algorithm must be specified as a parameter (MD5 or SHA).
Comment
The authentication password and the encryption
password can be a maximum of 63 characters
long.
If authentication is necessary for the
group, the authentication password
must be specified as a parameter.
If encryption is necessary for the
group, the encryption password must
be specified as a parameter.
edit <index>
<group name>
[NONE|MD5|SHA]
[authentication ID]
[Encryption ID]
delete <Index>
Changes the group assignment, the
authentication algorithm, and the
encryption password of the SNMPv3
user.
clearall
Deletes all SNMPv3 users.
Deletes an SNMPv3 user from the
list at the point identified by the index.
CLI\SYSTEM\SNMP\TRAP>
Command
Description
traps [E|D]
Enables / disables SNMP traps.
settrap <entry>
<IP address>
<E|D>
Specifies the IP address of the trap
recipient entry (entry between 1 and
10) and enables / disables the sending of traps to this recipient.
6.2.8
Comment
Traps are then enabled, if
SNMP v1, v2c is also enabled.
SNTP Config Menu Command
Time-of-Day for Synchronization in the Network
SNTP is the acronym for Simple Network Time Protocol. An SNTP server uses this
protocol to provide a uniform time throughout the entire network. Clients can synchronize themselves with this time.
If you enter the IP address of an SNTP server here and select the time zone of the
SCALANCE W788, the SCALANCE W788 uses the time information from the
server. The SCALANCE W788 adopts this time information without any further
conversion regarding daylight-saving or standard time.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
87
Configuration Using Web Based Management and the Command Line Interface
Syntax of the Command Line Interface
CLI\SYSTEM\SNTP>
Command
Description
server [IP address]
Specifies the IP address of the
SNTP server.
tzone [hours]
Specifies the deviation of the time
zone of the SCALANCE W788 according to UTC (Universal Time
Conversion) in hours.
88
Comment
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
6.2.9
Fault State Menu Command
This page displays information on faults/errors that have occurred. You can delete
this information if you click on the Remove Fault State button.
If you operate the SCALANCE W788 as an access point, texts (for example Link
with some safe-ip client(s) is/was broken ) are also displayed here for the IP Alive
and Link Check functions. After clicking on the text, the SCALANCE W788 displays
a list with the individual error messages. You acknowledge each error message by
clicking on it. Acknowledged messages are cleared from the list. You can acknowledge all messages at once by clicking on the text Acknowledge all errors.
CLI\SYSTEM\FAULT>
Command
Description
Comment
fault [OFF]
Display the fault status and cause of
the fault.
You can reset the LED
and the fault status with
the command: "fault
OFF“. Ideally, however,
the cause of the problem
should be eliminated.
ipacknow [Index|All]
Displays or acknowledges (clears)
the IP Alive messages requiring acknowledgment.
The fault state remains
active until all the fault
messages have been
acknowledged. The fault
state and the Fault LED
are cleared if the reason
was only an IP Alive error
message. The command
is not visible in the client
mode.
linkack [Index|All]
Displays or acknowledges (clears)
the Link Check messages requiring
acknowledgment.
The fault state remains
active until all the fault
messages have been
acknowledged. The fault
state and the Fault LED
are cleared if the reason
was only a Link Check
error message. The
command is not visible in
the client mode.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
89
Configuration Using Web Based Management and the Command Line Interface
6.2.10 Load & Save Menu Command
Saving and Loading Device Data
Clicking the Load & Save menu command first opens a page with the current firmware version. The HTTP and TFTP submenus allow you to save device data in external files or to transfer data from external files to the SCALANCE W788.
You can save the following device data in external files:
● the configuration data of the SCALANCE W788
● the content of the log table
● the firmware of the SCALANCE W788
You can transfer the following data from external files to the SCALANCE W788:
● the configuration data of the SCALANCE W788
● the firmware of the SCALANCE W788
For a SCALANCE W788 operated in the client mode, certificates for the client and
for the server can also be downloaded and stored. For further information on certificates, please refer to the System Manual Basics of Industrial Wireless LAN.
When you download the configuration data to the SCALANCE W788, a restart is
performed so that the new data is adopted correctly. Please remember that if there
was a different IP address in the configuration data, the device will no longer be
available using the old IP address. (The restart takes place during the loading of
HTTP and TFTP.)
Note
When you download the configuration data to a SCALANCE W788, a restart is
performed so that the new data is adopted correctly. The device can no longer be
reached using the old IP address if the downloaded configuration data contains a
new IP address.
90
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Reusing Configuration Data
Saving and reading in configuration data reduces the effort if several SCALANCE
W788 devices have the same configuration and when IP addresses are obtained
over DHCP. Save the configuration data on a PC after you have configured a
SCALANCE W788. Download this file to all other SCALANCE W788 devices you
want to configure. If necessary, you may need to assign an IP address to this
SCALANCE W788 first using the Primary Setup Tool.
How to Load or Save Data over HTTP
1. Specify the name of the file from which the data will be taken or where the data
will be saved in the relevant text box for the configuration data or firmware.
As an alternative, you can also use a file selection dialog that opens after you
click the Browse... button.
2. Start the save function by clicking the Save button. Start the load from file function by clicking the Load button.
How to Load or Save Data over TFTP
1. Enter the IP address of the FTP server in the TFTP Server IP text box.
2. Enter the port of the FTP server in the Port text box in the default value does
not meet your requirements.
3. Click on the Set Values button before you enter any further information for saving the data.
4. Specify the name of the file (maximum 32 characters) from which the data will
be taken or where the data will be saved in the relevant text box for the configuration data or firmware.
5. Start the save function by clicking the Save button. Start the load from file function by clicking the Load button.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
91
Configuration Using Web Based Management and the Command Line Interface
Syntax of the Command Line Interface
CLI\SYSTEM\LOADSAVE>
Command
Description
Comment
fwname [file name]
Specifies the name of a file from
which the firmware will be loaded or
in which the firmware will be saved.
This name can be a maximum of 32
characters long.
fwload
fwsave
cfgname [file name]
Loads the firmware from a file.
cfgload
Loads the configuration data from
the file
cfgsave
Saves the configuration data in a
file.
logname [file name]
Specifies the name of a file in which
the log table will be saved.
logsave
server [IP address]
:[port number]
cltcert <certificate>
Saves the log table in a file.
Specifies the name of the certificate
for the client.
In client mode only.
cltpass <password>
cltload
Authorizes use of the certificate,
In client mode only.
Downloads the client certificate from
a file.
In client mode only.
cltsave
srvcert <certificate>
Saves the client certificate in a file.
In client mode only.
Specifies the name of the certificate
for the server.
In client mode only.
srvload
Downloads a server certificate from
a file.
In client mode only.
srvsave
Saves the server certificate in a file.
In client mode only.
92
Saves the firmware in a file.
Specifies the name of a file from
which the configuration data will be
loaded or in which the configuration
data will be saved.
Specifies the IP address and the
port of the TFTP server.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
6.2.11 C-PLUG Menu Command
C-PLUG Error Message
If the SCALANCE W788 detects a C-PLUG error during startup, a message is displayed by Web Based Management. C-PLUG errors can have two causes:
● The C-PLUG contains bad data or data for a different device type.
● There is no C-PLUG in the SCALANCE W788 although a C-PLUG was present
prior to the last shutdown of the device.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
93
Configuration Using Web Based Management and the Command Line Interface
Syntax of the Command Line Interface
CLI\SYSTEM\CPLUG>
Description
Comment
initdef
Command
Reinitializes the C-PLUG and copies
the default configuration to it.
All information is deleted.
initmem
Reinitializes the C-PLUG and copies
the configuration currently stored
internally to it.
All information is deleted.
bootfrom [MEMORY]
Displays the source medium from
which the configuration is currently
being read: C-PLUG or MEMORY.
If the C-PLUG was removed, you must specify
that the configuration
must be read from internal memory.
The restart is performed automatically.
If a C-PLUG is inserted,
the system or as attempts
to read the configuration
from it. The bootfrom
[MEMORY] command
then has no effect.
94
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
6.3
The Interfaces Menu
Introduction
The SCALANCE W788 has one Ethernet interface and up to two WLAN interfaces
that can be configured separately. In the pages of this menu, you can configure
both the wired Ethernet interface and the WLAN interface.
6.3.1
Ethernet Menu Command
Transmission Speed and Mode
For a wired Ethernet interface, you only to specify the transmission speed / mode
parameters and the crossing over of the Ethernet connection. When you select the
entry Auto in the Speed / Mode list box, the SCALANCE W788 sets a suitable
speed and mode depending on the other network nodes and crosses over the
Ethernet connection.
If you select an entry other than Auto in the Speed / Mode list box, you must specify the crossing over of the Ethernet connection manually with Ethernet crossing.
Note
If you specify the mode, you must make the same settings on the partner device.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
95
Configuration Using Web Based Management and the Command Line Interface
Syntax of the Command Line Interface
CLI\INTERFACES\ETHERNET>
Command
ethspeed [A|100F|100H|
10F|10H]
Description
A
100F
100H
10F
10H
ethcross [E|D]
6.3.2
Comment
Specifies the transmission speed
and mode of the Ethernet interface:
automatic selection
by the SCALANCE W
788
100 Mbps full duplex
100 Mbps half duplex
10 Mbps full duplex
10 Mbps half duplex
Manual selection of Ethernet interface crossover. Possible only when
ethspeed is not set to auto.
WLAN Menu Command
Enabling the Interface
Enabling interface by selecting Enable Interface.
Network name (only in access point mode)
Enter the network name of the wireless network in the SSID text box. If you have
used the Basic Wizard, a value is already entered here.
Infrastructure / Ad Hoc (only in client mode)
Select Infrastructure to connect to an access point. Ad hoc is used to connect clients with each other without an access point. This is only possible when ad hoc is
set on all clients.
Transmission Mode
Specify the transmission mode in the Wireless Mode list box. If you have used the
Basic Wizard, a value is already entered here.
96
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Channel Selection
Select the Auto Channel Select check box if you want the SCALANCE W788 to
search for a free channel itself. If you want to specify a specific channel, make sure
that Auto Channel Select is not selected. You can specify a suitable channel in the
Radio Channel list box.
Auto Channel Select does not exist in the client mode. You can only set a channel
in the ad hoc mode.
MAC Address of the Client (only in client mode)
To allow the device connected to the client to be available over the wireless network, the client must adopt the MAC address of this device. This can be done
automatically by the client adopting the MAC address of the first frame that it receives over the Ethernet interface. If this is required, Auto find Adopt MAC must be
selected. If this is not selected or no selection is possible, Lee MAC address of the
device connected to the client over Ethernet must be entered in the Adopt MAC
text box.
Shortened Preamble with 802.11b
The 802.11b standard allows the use of shortened preambles in the wireless
transmission of data packets. This increases the amount of user data.
Note
If you are using the CP 1515 and CP 7515 communications processors in one
wireless cell at the same time, the shortened preamble should not be used otherwise the CP 1515 can only handle a significantly reduced amount of data traffic
when there is heavy load on the network.
Syntax of the Command Line Interface
CLI\INTERFACES\WLAN1>
or for the second wireless adapter (if it exists)
CLI\INTERFACES\WLAN2>
Command
port [E|D]
ssid [network name]
Description
Comment
Enable / disable wireless port.
Assigns a network name (SSID).
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Available only in the access point mode.
97
Configuration Using Web Based Management and the Command Line Interface
Selects the transmission standard:
Mode [A|B|G|T|X]
A
B
G
T
X
802.11a
802.11b
802.11g
802.11a Turbo
802.11g Turbo
Depending on the country
code, some settings are
not possible and will then
be rejected.
802.11a Turbo cannot be
set in all countries.
autoch [E|D]
Enable / disable the channel selection by the SCALANCE W788.
channel [1...13]
adopt [MAC address]
Specifies the wireless channel.
MAC address of the device connected to the client over Ethernet.
Available only in the client
mode.
Autoadopt [E|D]
Automatic adoption of the MAC address of the device connected to the
client over Ethernet. Note: This
function is available only in conjunction with S7 devices.
Available only in the client
mode.
adhoc [E|D]
Select ad hoc or infrastructure
mode.
Available only in the client
mode.
anyssid <E|D>
With ANY SSID, the client connects
to the best access point in the environment in which it is permitted to
connect.
Available only in the client
mode.
6.3.3
Available only in the access point mode.
Advanced Submenu
Configuring Transmission Characteristics
On this page, you can specify details of the transmission characteristics. You only
need to adapt the parameters on this page if the SCALANCE W788 cannot be
used as it is intended with the default settings.
Data Rate (only in access point mode)
As default, Data Rate is set to best. The best possible data rate permitted by the
wireless connection is then used. If the wireless link is bad, a lower data rate is
used.
If you set a fixed data rate, only this data rate is used. It is possible that a connection will abort if the set data rate cannot be achieved on a bad wireless connection.
98
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Transmit Power
In the Transmit Power list box, you can specify the output power of the
SCALANCE W788. It may be necessary to reduce the transmit power when using
antennas to avoid exceeding the maximum legal transmit power. Reducing the
transmit power effectively reduces cell size.
Beacons
Beacons are packets that are sent cyclically by a SCALANCE W788 to inform clients of its existence. In the Beacon Interval text box, you specify the interval at
which the SCALANCE W788 sends beacons.
Only in the access point mode and with the client in the ad hoc mode
The Beacon Rate list box specifies the data rate of beacons. The higher the data
rate, the shorter the transmission range.
Only in the access point mode
The Data Beacon Rate DTIM (Delivery Traffic Indication Map) parameter specifies
how often the SCALANCE W788 sends broadcast and multicast packets over the
wireless interface. If you enter 1 in this box, the SCALANCE W788 transmits
broadcast and multicast packets directly after each beacon (recommended setting
for normal network environments). The value 5 would mean that the SCALANCE
W788 collects the broadcast and multicast packets and sends them after every fifth
beacon.
Increasing this value allows a longer sleep mode for the clients but means a
greater delay for broadcast and multicast packets.
RTS/CTS
RTS/CTS (Ready To Send/Clear To Send) is a method of avoiding collisions
based on an exchange of status information prior to sending the actual data. To
minimize network load resulting from the additional protocol exchange, this method
is used only when a packet size that you select with the RTS/CTS Threshold is exceeded.
Fragmentation
The Fragmentation Length Threshold parameter specifies the maximum package
size transferred on the radio link. Large packets are divided up into small packets
prior to transmission and then reassembled into the original size after they have
been received. This can be beneficial if the transmission quality is poor because
larger packets are more difficult to transmit. This does, however, result in a poorer
data throughput.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
99
Configuration Using Web Based Management and the Command Line Interface
Repetitions
There are two situations in which packets are repeated. The hardware repetition is
performed by the WLAN chip itself when it tries to repeat an unacknowledged
packet immediately. The number of attempted repetitions is specified with the HW
Retry number parameter.
If the number of retries is reached without success, the packet is temporarily withdrawn and all other packets in the buffer are sent first. Following this, transmission
of the packet is attempted again. The number of such repetitions is specified with
the SW Retry number parameter.
Using Use SW Retry, the software repetition mechanism can be disabled.
Antennas
The Antenna Mode list box specifies the use of antennas. The Diversity setting
takes the best of the two antennas for the data transmission. For each WLAN interface, both antennas must be connected. If only one antenna is connected, this
must be selected here. The second antenna socket must also have a 50 Ω terminator fitted.
Scanning for Access Points (client mode only)
While the client is connected to an access point, it scans for other access points in
the background with which it connects when necessary. There are three modes for
scanning access points that can be selected in the Background scan mode list box.
If you set Disable, there is no scan for access points while the client is connected.
If you set Scan if Idle, there is a scan for access points when no data transfer takes
place for a certain time.
If you set Scan Always, access points are scanned continuously.
The Background scan interval parameter specifies the interval at which further access points are scanned.
To optimize the scanning for further access points, you can specify channels for
the client on which other access points can be found. To allow this, the Background Scan Ch.Select check box must be set and the channels of the other access point is entered in the Background Scan Channels text box. Enter the channels separated by blanks.
If the client finds a better access point, it attempts to connect to it. Before it
changes, the new access point must be better than the current access point by a
certain value. The threshold at which the client changes to the new access point
can be specified with the Roaming threshold parameter.
100
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Roaming when there is no Ethernet Interface (only in access point mode)
If the wired Ethernet interface is no longer available (cable break, connector removed), a client connected over the wireless network is not aware of this. The
SCALANCE W788 can then force the logged on WLAN clients to roam by deactivating its WLAN interface. The client then attempts to log on at a different
SCALANCE W788. You enable this feature by selecting the Force roaming if link
down on ethernet interface check box.
Syntax of the Command Line Interface
CLI\INTERFACES\WLAN1\ADVANCED>
Command
datarate [rate]
Description
Specifies the data rate:
best Best data rate
1
1 Mbps
2
2 Mbps
5.5
5.5 Mbps
power [0...4]
Comment
Available only in the access point mode.
Specifies by how many dB the
transmit power will be reduced compared with full power:
0
1
2
3
4
Full power
-3 dB
-6 dB
-9 dB
Minimum power
beacon [20 ... 1000]
Specifies the beacon interval in milliseconds.
dtim [1 ... 255]
Specifies the data beacon rate.
rtsthr [1 ... 2346]
Specifies the packet size as of which
RTS/CTS is used.
fragthr [256 ... 2346]
Specifies the size as of which packets are fragmented.
bkscan [D|I|A]
Specifies the mode in which the client stands for further access points.
Available only in the client
mode.
bkscanint [200...60000]
Interval at which the client scans for
further access points.
Available only in the client
mode.
bkchannel [channels]
Selection of channels on which the
client scans for further access
points.
The channels are entered separated
by blanks.
Available only in the client
mode.
bkchsel [E|D]
Enables / disables scanning for further access points to specific channels.
Available only in the client
mode.
force [E|D]
Enables / disables roaming if the
connection is lost on Ethernet interface.
Available only in the access point mode.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Available only in the access point mode.
101
Configuration Using Web Based Management and the Command Line Interface
Command
Description
swretry [E|D]
Enables / disables the software retry
functionality.
swretno [0 ... 15]
Specifies the number of software
retries.
hwretno [0 ... 15]
Specifies the number of hardware
retries.
caltime <0 ... 65535>
Specifies the time in seconds after
which the chipset is calibrated.
preamb <E|D>
Enables / disables the short preamble.
antenna <A|B|D>
Specifies which antennas are used:
A
B
D
basic11b [E|D]
6.3.4
Comment
only antenna A
only antenna B
both antennas (diversity)
When this is enabled, a client supports only the basic rates of 1 and 2
Mbps. when this is disabled, a client
must support 1, 2, 5.5, and 11 Mbps.
Available only in the access point mode.
SSID List Submenu Command
Note
The SSID List menu is available only when you use the SCALANCE W788 in the
Client mode. You can specify the mode in the System menu.
Network Attachment of the Client
With this men command, you can specify how the SCALANCE W788 connects to a
network as client:
● If the Connect to ANY SSID check box is selected, the SCALANCE W788 attempts to connect to the network with the best transmission quality and with
suitable security settings. If the Closed Wireless System setting is made for an
access point, the SCALANCE W788 cannot log on there with the ANY SSID.
● If this check box is not selected, the SCALANCE W788 attempts to connect to
the network from the SSID list that has the best transmission quality.
An SSID is absolutely necessary in ad hoc networks.
102
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Syntax of the Command Line Interface
CLI\INTERFACES\WLAN1\SSID>
Command
Description
Comment
add <network name>
Adds a network name (SSID) to the
SSID list.
Available only in the client
mode.
edit <index> <network
name>
Changes the network name (SSID)
at the index location in the SSID list.
Available only in the client
mode.
delete <Index>
Deletes the network name (SSID)
from the SSID list at the index location.
Available only in the client
mode.
6.3.5
Advanced G Submenu
Properties of the 802.11g Standard
The IEEE 802.11g is upwards compatible with IEEE 802.11b, both use the 2.4
GHz band. In contrast to 802.11b that specifies data rates up to 11 Mbps, 802.11g
provides for data rates up to 54 Mbps. The 802.11g standard also uses the OFDM
modulation scheme.
Special Options for 802.11g Settings
The options you can set in the Advanced G submenu relate to the way in which
management and control data (RTS/CTS frames, beacons) are sent in the 802.11g
mode. You can also specify that the SCALANCE W788 only supports 802.11gcompatible devices.
Handling 802.11b Clients
The access point automatically detects whether 802.11b clients exist in the environment. To avoid 802.11g packets colliding with 802.11b packets, the access
point can use the RTS/CTS method.
With the 802.11g CTS Mode list box, you specify the use of RTS/CTS (only in the
access point mode).
0 do not use RTS/CTS.
1 always use RTS/CTS with 802.11g packets.
2 only use RTS/CTS when there are 802.11b clients in environment.
You can set the data rate for RTS/CTS frames in the 802.11g CTS Rate list box.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
103
Configuration Using Web Based Management and the Command Line Interface
With the 802.11g CTS Type list box, you specify whether a CTS or RTS/CTS is
sent.
802.11g Expansions
With the 802.11g Short Slot Time parameter, you specify whether or not the short
slot time is used. This short slot time should be supported by all
newer clients.
The 802.11g Basic Rate list box specifies the minimum data rate that must be supported by clients before they can connect to the access point (only in the access
point mode).
With the 802.11g Only Mode parameter, you can specify that only 802.11g clients
can log on at the access point and also that only 802.11g rates are permitted (only
in the access point mode).
Syntax of the Command Line Interface
CLI\INTERFACES\WLAN1\802.11G>
or for the second wireless adapter (if it exists)
CLI\INTERFACES\WLAN2\802.11G >
Command
ctsmode [0|1|2]
Description
Specifies whether the RTS/CTS
method is used for 802.11g packets:
Comment
Available only in the access point mode.
0
Do not use CTS.
1
Always use CTS.
2
CTS depending on whether
802.11b
clients exist.
ctsrate [0|1|2|3]
Specifies the data rate for 802.11g
CTS frames:
0
1
2
3
ctstype [0|1]
1 Mbps
2 Mbps
5.5 Mbps
11 Mbps
Specifies the method for avoiding
802.11g packet collisions:
0
1
CTS only
RTS/CTS
sslot [E|D]
Enables / disables short slot times
between data packets.
basic [0|1|2|3|4]
Minimum requirements for the clients:
0
1
2
3
104
Available only in the access point mode.
802.11 (min. 2 Mbps)
802.11b (min. 11 Mbps)
802.11g (min. 24 Mbps)
OFDM (min. 24 Mbps)
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Command
Description
Comment
only11g [E|D]
When this is enabled, only the
OFDM modulation technique is supported.
Available only in the access point mode.
overlap [E|D]
If this is enabled, 802.11b are also
search for on overlapping channels.
Available only in the access point mode.
draft5 [E|D]
Enables / disables Draft 5compatibility of the
SCALANCE W788.
Available only in the access point mode.
Optimize [1...4]
Specifies the optimization level for
detection of 802.11b clients:
Available only in the access point mode.
1
2...4
IEEE standard method
proprietary
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
105
Configuration Using Web Based Management and the Command Line Interface
6.4
The Security Menu
Introduction
In this menu, you configure the security settings with which you want to operate
your SCALANCE W788. Apart from selecting the authentication and encryption
scheme, this also includes the decision as to whether or not an external Radius
server is used and whether access is restricted based on MAC addresses (ACL).
Syntax of the Command Line Interface
CLI\SECURITY>
Command
mgmteth [E|D]
6.4.1
Description
Comment
It is only possible to configure the
SCALANCE W788 over the wired
Ethernet interface (E) or over all interfaces (D).
Basic Wireless Menu Command
Authentication
You can set the following options in the Authentication Type box:
● Open System
There is no authentication.
● Shared Key
WEP authentication with keys stored on the device. In this case, you must
specify a key in the Keys menu.
● WPA (Radius)
WPA authentication over an external RADIUS server (802.1x).
To use this scheme, you must provide information on the authentication server
in the RADIUS Server menu.
● WPA-PSK
WPA authentication without Radius server.
106
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
● 802.1x
Port-related access control with a Radius server. With this method, the client
must authenticate itself with a RADIUS server based on certificates. If the authentication is successful, the ES server generates a pair of keys that is used
for encryption of communication.
To use this scheme, you must provide information on the authentication server
in the RADIUS Server menu.
Encryption
You can only disable encryption (deselect the Encryption check box) if you have
selected Open System or 802.1 with Mixed Mode for the authentication. All other
security methods include both authentication and encryption.
Encryption Methods for WPA
If you have selected WPA authentication (both PSK and Radius), you have the following alternatives in the Cipher box:
● AES (Advanced Encryption Standard)
Encryption according to the Rijndael algorithm.
● TKIP
Use of dynamic keys. Starting from an initialization key, a new key is generated
for each data packet.
Additional Entries for WPA-PSK
To use the WPA-PSK scheme, you must enter a string in the Pass Phrase box that
is used by the SCALANCE W788 to initialize dynamic key generation. In the Group
Key Update Interval box, you specify the time after which a new key is generated.
Closed Wireless System
In a closed wireless system, the SCALANCE W788 is only accessible to clients
that know its SSID. This method is used to protect the SCALANCE W788 from unauthorized access.
Intracell Mode
In the intracell mode, clients connected over a wireless interface cannot communicate with clients on wired Ethernet.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
107
Configuration Using Web Based Management and the Command Line Interface
Intracell Blocking
If intracell blocking is enabled, clients connected over a wireless interface cannot
communicate with other wireless clients in the same radio cell but only with partners in other radio cells or on the wired network.
With a SCALANCE W788-2PRO, it is possible to make difference settings for the
two wireless adapters; in particular, it is possible to prevent access to the other radio cell or its nodes.
Syntax of the Command Line Interface
CLI\SECURITY\BASIC\WLAN1>
or for the second wireless adapter (if it exists)
CLI\SECURITY\BASIC\WLAN2>
Command
authent [0|1|2|3|4]
Description
Specifies the authentication type.
For the parameter n, enter a number
between 0 and 4 for the type authentication:
0
1
2
3
4
Open System
Shared Key
WPA (RADIUS)
WPA-PSK
802.1x (RADIUS)
encrypt [E|D]
cipher [AUTO|WEP|AES|
TKIP]
keysrc [0..2]
Encryption enabled / disabled.
defkey [0|1|2|3]
wpaphrase [WPA password]
Selects the default WEP key.
grkint [interval]
Specifies the "Group Key Update
Intervals" in WPA-PSK.
supssid [E|D]
Enable / disable Close Wireless System functionality.
intracell [E|D|A]
Enable / disable Enable Intracell
mode functionality or permit communication over both wireless interfaces.
username [name]
Specifies the user name for the
RADIUS server.
108
Comment
Specifies the encryption scheme.
Select the key source.
Enter 0 as the parameter if the key is
managed by the server. Enter 1 in
the key will be provided by a
RADIUS server. Enter 2 if mixed
operation is required.
Enter the WPA-PSK password.
The password must be at
least 8 characters long,
the maximum length is 63
ASCII characters or 64
hexadecimal characters.
In client mode only.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Command
Description
Comment
password [password]
Specifies the password for the
RADIUS server.
In client mode only.
chkserver [E|D]
Enables / disables authentication of
the server.
In client mode only.
6.4.2
Keys Menu Command
Specifying the WEP/AES Key
To allow you to enable the encryption for the Open System and Shared Key authentication methods, you must first enter at least one key in the key table.
You can also create keys for WDS Redundancy and ACL Private (these are not
supported by all clients for ACL).
Note
When operating the CP 7515, note the following when configuring the keys on the
SCALANCE W788:
The ACL key and the WEP key must be of the same length since the CP 7515 only
allows a uniform key length. If the Windows-specific program Zero-Config is used
even the keys must be the same.
Syntax of the Command Line Interface
CLI\SECURITY\KEYS\WLAN1>
or for the second wireless adapter (if it exists)
CLI\SECURITY\KEYS\WLAN2>
Command
Description
add <Len> <Key> [index]
Adds at a key at the end or at the
specified Index of the table.
edit <Index> <Len> <Key>
Changes the key at the Index location.
delete <Index>
Deletes the key at the Index location.
clearall
Deletes all keys.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Comment
Indexes from 5 onwards
are private keys
109
Configuration Using Web Based Management and the Command Line Interface
6.4.3
ACL Menu Command
Note
The ACL menu is available only when you use the SCALANCE W788 in the Access Point mode. You can specify the mode in the System menu.
Access Rights for Individual Clients
The access control list (ACL) is and assignment of MAC addresses and access
rights.
If ACL is enabled, prior to data transfer, the SCALANCE W788 checks whether the
necessary permissions for the communication partner (identified by the MAC address) are entered in the ACL table
Enabling the ACL
In Web Based Management, there is a list box for the use of ACL.
To enable ACL, you must set the global release to either Enabled or Strict:
Enabled
All clients entered in the ACL are handled according to the ACL entry. Clients not
entered in the ACL have access to the access point. This setting can be used to
deny access by certain clients.
Strict
All clients entered in the ACL are handled according to the ACL entry. Clients not
entered in the ACL have no access to the access point. This setting can be used to
allow access by certain clients.
Disabled
The access control this is not used.
Changing an Entry in the ACL
Click the relevant MAC address to change the entry in the ACL. With the Sel check
box, you decide whether or not an ACL entry is used. The Del check box is used to
delete an entry from the ACL.
110
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
New Entry in the ACL
Click the New button to create a new entry in the ACL. A page appears on which
you can make the necessary settings. Enter the MAC address of the client in the
MAC Address text box. You specify the access permissions of the client in the
Permission list box:
Allow
The client has access to the access point.
Deny
The client does not have access to the access point.
Default Key
The client only has access to the access point when it uses the default key for encryption of the data. To allow this, you must specify a valid default key for the
SCALANCE W788 (for example in the WBM Security menu) that is also used by
the client.
Private Key
With this setting, you can use different keys for different clients. You must first create the private keys with the Keys menu command. You can select one of these
keys in the Key number list box. The client only has access to the access point
when it uses this private key. For this function, the client must support private keys.
Syntax of the Command Line Interface
CLI\SECURITY\ACL\WLAN1>
or for the second wireless adapter (if it exists)
CLI\SECURITY\ACL\WLAN2>
Command
Description
Comment
aclmode [E|D|S]
Global release of ACL:
E
Enable
D
Disable
S
Strict
Only in the access point
mode
add <MAC> [A|Y|K|P][key]
Create a new entry in the ACL:
MAC MAC address of the client
Only in the access point
mode
A
Y
K
P
Allow
Deny
Default Key
Private Key
Key
Key index for private key
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
111
Configuration Using Web Based Management and the Command Line Interface
Command
edit <index> [E|D]
[A|Y|K|P] [key]
Description
Change an existing ACL entry:
index Number of the ACL entry
E
D
Enable
Disable
A
Y
K
P
Allow
Deny
Default Key
Private Key
Key
Key index for private key
Comment
Only in the access point
mode
delete <Index>
Delete an existing ACL entry:
index Number of the ACL entry
Only in the access point
mode
clearall
Deletes all ACL entries.
Only in the access point
mode
6.4.4
RADIUS Server Menu Command
Note
The RADIUS menu command is available only when you use the SCALANCE
W788 in the Access Point mode. You can specify the mode in the System menu.
Authentication over an External Server
The concept of RADIUS is based on an external authentication server. A client can
only access the network after the SCALANCE W788 has verified the logon data of
the client with the authentication server. Both the client and the authentication
server must support the EAP protocol (Extensive Authentification Protocol).
Syntax of the Command Line Interface
CLI\SECURITY\RADIUS>
Command
Description
server [IP address]
Specifies the IP address of the primary RADIUS server.
server B [IP address]
Specifies the IP address of the
backup RADIUS server.
port [port]
Specifies the port of the primary
RADIUS server.
port B [port]
Specifies the port of the backup
RADIUS server.
112
Comment
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Command
Description
Secret [password]
Specifies the password for the primary RADIUS server.
secret B [password]
Specifies the password for the
backup RADIUS server.
maxreq [max. number]
Maximum number of queries to the
RADIUS server.
maxreq B [max. number]
Maximum number of queries to the
RADIUS server. (backup server)
authprd [time in s]
Period for repeating authentication.
6.4.5
Comment
The default is 3600 s.
Access Menu Command
Access Permissions for IP Addresses
In this menu, you specify the access permissions for IP addresses. You can specify whether management access (SNMP, Telnet, WBM) is possible with the defined
addresses:
● Management access is possible only with the defined addresses.
● Management access is possible with all IP addresses not included in the list.
Note
The defined access rights also apply to the PC used for configuration. If you have
not entered the local IP address and have set the ACL mode to Accessed, no further access to the SCALANCE W788 is possible
You should also note that the IP address of the client can change if you use DHCP
without reservation.
Syntax of the Command Line Interface
CLI\SECURITY\ACCESS>
Command
Description
access [E|D]
statmgmt [A|D]
Enable / disable access control list.
add <IP>
Adds a new IP address
Comment
It is possible to access or not possible to access the IP addresses of
the access control list (Accessed /
Denied).
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
113
Configuration Using Web Based Management and the Command Line Interface
edit <Index|IP> [E|D]
Enables / disables the entry in the
table specified by the index or IP
address.
delete <Index|IP>
clearall
Deletes the entry.
114
Clears the access control list.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
6.5
The Bridge Menu
Introduction
A bridge is a network component that connects two networks. A bridge is not dependent on the protocol; management of the data packages is based on the physical address of the network nodes (MAC address).
The SCALANCE W788 provides bridge functionality because it handles data exchange between wired and wireless Ethernet. The following sections describe the
functions that are available and how you configure and use them.
Deleting Aged Bridge Information
The SCALANCE W788 saves the information about which MAC address can be
reached over which port in a learning table. Entries in this list are deleted automatically when there is no further data transfer for the corresponding MAC addresses. You can decide the length of time after which addresses are deleted if no
data is sent using the Aging Time parameter on the start page of the Bridge menu.
Syntax of the Command Line Interface
CLI\BRIDGE\>
Command
aging [E|D|aging time]
6.5.1
Description
Enables / disables automatic deletion of information on the assignment of MAC addresses and ports.
With the Aging time parameter, you
can change the time.
Comment
Aging time can be from
10 sec through 1.000.000
sec.
The default is 300 sec (5
min)
WDS Menu Command
Note
The WDS menu command is available only when you use the SCALANCE W788
in the Access Point mode. You can specify the mode in the System menu.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
115
Configuration Using Web Based Management and the Command Line Interface
Communication between SCALANCE W788 Devices
In normal operation, the SCALANCE W788 is used as an interface to a network
and communicates with clients. There are, however, situations in which several
SCALANCE W788 devices need to communicate with each other, for example to
extend wireless coverage or to set up a wireless backbone. This mode is possible
with WDS (Wireless Distributed System).
Configuration
In the MAC / sysName column, enter the MAC address or the sysName parameter
of the SCALANCE W788 with which you want to communicate. If you select the
Enc check box, encryption is used.
Note
In WDS mode, the following restrictions apply:
●
All SCALANCE W788 devices that will communicate with each other must use
the same channel.
●
You can only use the encryption schemes WEP and AES.
●
If you want to attach a different access point from the SCALANCE W788 over
WDS, you must configure the MAC address. Detection using the sysName
parameter does not work in this situation.
To enable the entry, you must select the Sel check box.
Syntax of the Command Line Interface
CLI\BRIDGE\WDS\WLAN1>
or for the second wireless adapter (if it exists)
CLI\BRIDGE\WDS\WLAN2>
Command
Description
add <MAC|Name>
[SE|SD][Key]
Adds a new WDS connection. Enter
either a MAC address or a Sysname. With the SE or SD parameters, you can enable or disable encryption. If encryption is enabled, the
key must also be specified.
edit <Index> [E|D]
[SE|SD] [Key]
Changes the WDS connection specified by Index. With [E|D], you can
enable / disable the connection.
116
Comment
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Command
Description
delete <Index>
Deletes the connection with the
specified index.
clearall
Deletes all WDS connections.
6.5.2
Comment
Learning Table Menu Command
Assignment of MAC Address and Port
The learning table contains the information about whether a MAC address can be
reached over the wired Ethernet interface or over the wireless interfaces. The
SCALANCE W788 obtains this information from the active data exchange.
6.5.3
ARP Table Menu Command
Assignment of MAC Address and IP Address
The ARP protocol (Address Resolution Protocol) obtains the corresponding MAC
address of a known IP address. The page of this menu command also indicates
the interface over which an address can be reached. The last column indicates
how the information was obtained (for example dynamic if it was obtained during
operation or static if it was configured).
6.5.4
Spanning Tree Menu Command
Note
The Spanning Tree menu command is available only when you use the
SCALANCE W788 in the Access Point mode. You can specify the mode in the
System menu.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
117
Configuration Using Web Based Management and the Command Line Interface
Avoiding Loops
The Spanning Tree protocol identifies physically redundant network structures and
prevents loops occurring by turning off redundant paths. It does this by evaluating
the distance and performance of a connection or by evaluating user settings. Data
is then only exchanged on the remaining connection paths.
If the preferred data path fails, the Spanning Tree algorithm looks for the most efficient path possible with the remaining network nodes.
Root Bridge and Bridge Priority
The identification of the most efficient connection is always related to the root
bridge, a network component that can be considered as a root element of a treelike network structure. With the Bridge Priority parameter, you can influence the selection of the root bridge. The computer with the lowest value for this parameter
automatically becomes the root bridge. If two computers have the same priority
value, the computer with the lower MAC address becomes the root bridge.
Response to Changes in the Network Topology
If nodes are added to a network or removed from it, this can influence the selection
of the optimum path for the data packets. To keep on top of this situation, the root
bridge sends configuration messages at regular intervals. You can set the interval
between two configuration messages with the Hello Time parameter.
Age of the Configuration Information
With the Max Age parameter, you specify the maximum age of configuration information. If a bridge receives configuration information older than specified in Max
Age, it discards the message and starts a new calculation of the paths.
New configuration data is not used immediately by a bridge but only after the period specified in the Forward Delay parameter. This ensures that operation is only
started with the new topology after all the bridges have the required information.
Configuration
Select the Enable Spanning Tree check box if you want to use the spanning tree
algorithm. If necessary, modify the following parameters to specify how the spanning tree algorithm operates:
● Bridge Priority
You can enter a value between 0 and 65535; the basic setting is 32768. You
can assign the same priority to several computers, however, such network
components do not normally become the root bridge.
118
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
● Hello Time
A valid value is between 1 and 10 seconds. A time of 2 seconds is recommended. Shortening this time speeds up the switchover of a redundant connection. If the Hello Time is set to higher values, this reduces the effort required for
the algorithm because configuration packets are sent less frequently.
● Max Age
A valid value is between 6 and 40 seconds. A time of 20 seconds is recommended. If the value for Max Age is set too low, the paths are recalculated unnecessarily when there are temporary breaks on connections.
● Forward Delay
A valid value is between 4 and 30 seconds. A time of 15 seconds is recommended. If the value is too low, some bridges do not yet have up-to-date configuration information and this leads to a recalculation of the topology. A higher
value leads to longer pauses following reconfiguration.
● Priority
With this parameter, you specify the priority of the ports of a bridge. With the
SCALANCE W788, you can specify the priority of the Ethernet interface and the
wireless interface. You can specify values between 0 and 255. The default is
128.
● PathCost
This parameter is used to specify the preferred data paths between the root
bridge and other bridges and the value should be based on the transmission
speed. The faster a connection, the lower the value for PathCost should be.
You can specify values between 0 and 65535. The default is 100. The spanning
tree algorithm selects the transmission path for which the sum of all individual
values is the lowest.
Syntax of the Command Line Interface
CLI\BRIDGE\SPANNING>
Command
Description
spanning [E|D]
Enable / disable spanning tree functionality.
bridge [0 ... 65535]
Specify bridge priority of the
SCALANCE W788.
maxage [6 ... 40]
Specify the maximum age of the
configuration information.
hellotm [1 ... 10]
Specify the interval between configuration information.
fwd_delay [4 ... 30]
enable_e [E|D]
Specify the Forward Delay period.
port_eth [0 ... 255]
Specify the port priority for the
Ethernet interface.
cost_eth [0 ... 65535]
Specify the Path Cost parameter for
the Ethernet interface.
Comment
Enable / disable the spanning tree
algorithm for the Ethernet interface.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
119
Configuration Using Web Based Management and the Command Line Interface
Command
Description
Comment
Enable / disable the spanning tree
algorithm for the first or second wireless interface.
enable_w1 [E|D]
enable_w2 [E|D]
Specify the port priority for the first
or second wireless interface.
port_w1 [0 ... 255]
port_w2 [0 ... 255]
cost_w1 [0 ... 65535]
Specify Path Cost for the first or
second wireless interface.
cost_w2 [0 ... 65535]
enable_red [E|D]
Enables / disables the spanning tree
algorithm for the redundant connection.
port_red [0 ... 255]
Specifies the port priority of the redundant connection.
cost_red [1 ... 65535[
Specifies the Path Cost parameter of
the redundant connection.
CLI\BRIDGE\SPANNING\WDS>
or for the second wireless adapter (if it exists)
CLI\BRIDGE\SPANNING\WDS2>
Command
Description
enblwds1 <n> [E|D]
enblwds2 <n> [E|D]
Enable / disable the WDS port n
(between 1 and 8) of the first or second wireless adapter.
portwds1 <n> [0 ... 255]
portwds2 <n> [0 ... 255]
Specifies the priority of the WDS
port n (between 1 and 8) of the first
or second wireless adapter.
costwds1 <n>
[1 ... 65535]
costwds2 <n>
[1 ... 65535]
Specifies the Path Cost parameter of
the WDS port n (between 1 and 8) of
the first or second wireless adapter.
120
Comment
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
6.5.5
Storm Threshold Menu Command
Note
The Storm Threshold menu command is available only when you use the
SCALANCE W788 in the Access Point mode. You can specify the mode in the
System menu.
Limitation of Broadcast and Multicast Frames
Storm Threshold is the maximum number of broadcast or multicast frames per
second forwarded by the SCALANCE W788. If this limit is exceeded, the
SCALANCE W788 stops processing such frames for 30 seconds.
Syntax of the Command Line Interface
CLI\BRIDGE\STORMTHR>
Command
Description
stromthr <E|D>
Enables / disables the storm threshold function.
broadcast <limit value>
Specifies the maximum number of
broadcast packets per second from
the same address.
multicast <limit value>
Specifies the maximum number multicast packets per second from the
same address.
broad_eth <limit value>
Specifies the maximum number of
broadcast packets per second for
the Ethernet interface.
multi_eth <limit value>
Specifies the maximum number of
multicast packets per second for the
Ethernet interface.
broad_1 <limit value>
broad_2 <limit value>
Specifies the maximum number of
broadcast packets per second for
the first or second wireless interface.
multi_1 <limit value>
multi_2 <limit value>
Specifies the maximum number of
multicast packets per second for the
first or second wireless interface.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Comment
121
Configuration Using Web Based Management and the Command Line Interface
6.6
The Filters Menu
Note
The Filter menu and the corresponding menu commands are available only available when you operate the SCALANCE W788 in the Access Point mode. You can
specify the mode in the System menu.
6.6.1
MAC Filter Menu Command
If the MAC filter is activated, communication with clients on the Ethernet side is
possible only when their source MAC addresses are entered in the table. As an alternative, it is possible to make a setting in which access is denied for all specified
MAC addresses.
Syntax of the Command Line Interface
CLI\BRIDGE\ MAC1FLT>
Command
Description
fltmac1 <E|D>
statmac1 [F|B]
Enables / disables the filter.
add <MAC addr.>
[description]
Adds a new address to the filter list.
The optional description has no influence on the list and simply serves
as information for the user.
edit <Number|MAC> [E|D]
[description]
delete <Number|MAC>
clearall
Changes the specified value.
122
Comment
If the value is set to F (forwarding),
only packets with a source address
contained in the table are forwarded.
In mode B (blocking), these packets
are blocked and all others are forwarded.
Deletes the entry from the list.
Deletes all entries from the list.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
6.6.2
MAC Dir Filter Menu Command
Blocking the Data Traffic between MAC Addresses
For communication partners that use the SCALANCE W788 as a bridge, it is possible to filter according to their MAC address. This filter is used to permit a specified MAC address access only to other specified MAC addresses. After making this
entry, the destination address can only communicate with the associated source
address. You can makes several entries for the source address. If a destination
address is not entered in the filter, it is not subjected to any restrictions.
Syntax of the Command Line Interface
CLI\FILTERS\MAC2FLT>
Command
Description
fltmac2 <E|D>
add <SourceMAC> <DestMAC>
Enables / disables the MAC filter.
edit <Index> [E|D]
[SourceMAC]
[DestMAC]
Changes the entry specified by
Index. With [E|D], you can enable /
disable the entry.
delete <Index>
Deletes the entry at the specified
index position.
clearall
Deletes all entries for the MAC
filter.
6.6.3
Comment
Adds a new entry with source and
destination address to the filter.
Protocol Filter Menu Command
Protocol Selection
Without protocol filtering, the SCALANCE W788 processes all data packets regardless of the protocol being used. To increase data security and to reduce load,
it can nevertheless be useful to prevent communication using certain protocols.
Here, you are not restricted to the protocols included in the list in this menu. If necessary, you can add your own entries to this list.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
123
Configuration Using Web Based Management and the Command Line Interface
Syntax of the Command Line Interface
CLI\FILTERS\PROTO>
Command
Description
clearall
Deletes all entries for the protocol
filter.
statprot <F|B>
The selected protocols are forwarded / not forwarded.
fltprot <E|D>
add <Pattern>
[description]
Enables / disables the protocol filter.
edit <Index> [E|D]
[pattern]
[description]
delete <Index>
clearall
124
Comment
Adds a new entry. A value in hexadecimal is expected for the Pattern
value. The user can enter a short
note for this protocol as the description.
Changes of enables / disables the
filter entry.
Deletes the filter entry.
Deletes all entries from the table.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
6.7
The I-Features Menu
Note
The I-Features menu and the corresponding menu commands are available only
available when you operate the SCALANCE W788 in the Access Point mode. You
can specify the mode in the System menu.
6.7.1
iQoS Menu Command
Client-Specific Bandwidth Reservation
iQoS (Quality of Service) is technique with which clients are assigned a certain
bandwidth. Due to this assignment, there is a high probability that data transmission to these clients will be within a defined period. This technique can be useful
when response times must be guaranteed.
Note
If the user reserves data for critical clients, this data rate also includes the frame
header (in other words, 802.11, MAC, IP, TCP, and S7 header). A SIMATIC user
must therefore take into account not only the net data during configuration but also
the headers.
Response Time
In the Response Time text box, you enter the required response time of the
SCALANCE W788 over the wireless interface. Remember that this value represents the transmission time for the data from the SCALANCE W788 to the client.
The data transmission rate for nodes not included in the list is reduced according
the values specified.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
125
Configuration Using Web Based Management and the Command Line Interface
Syntax of the Command Line Interface
CLI\IFEATURES\IQOS\WLAN1>
or for the second wireless adapter (if it exists)
CLI\IFEATURES\IQOS\WLAN2>
Command
Description
iqos [E|D]
Enables / disables iQOS functionality.
static [E|D]
Enables / disables the calculation of
the minimum transmission rate.
response [response time]
Specifies the response time for a
client with bandwidth reservation.
add <MAC> <Max_BW> <E|D>
Creates a critical client.
edit <Index> <Max_BW>
<E|D>
delete <Index>
Changes the setting of a client
clearall
Deletes all critical clients
6.7.2
Comment
15 – 1000 ms, default
50 ms
Deletes a critical client
Link Check Menu Command
Device-Related Connection Monitoring
The Link Check function provides device-related connection monitoring for a maximum of ten wireless nodes logged on at the SCALANCE W788. This service can
be compared with the link on a wired connection. The function monitors whether
the node is available over the wireless medium. If no packet is received from the
node or sent successfully after half of the configured monitoring time, the
SCALANCE W788 attempts to send a test packet to the node.
Note: Use this function only with WLAN clients, not in conjunction with redundancy
and WDS.
System Event for Connection Abort
You can specify how the SCALANCE W788 reacts to a connection abort (or to the
reestablishment of a connection) in the System > Event Config menu.
126
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Syntax of the Command Line Interface
CLI\IFEATURES\LINKCHECK>
Command
Description
linkchk [E|D]
Enable / disable device-related connection monitoring.
add <MAC> [timeout]
Adds a new MAC address for connection monitoring and specifies the
monitoring time. No time is specified,
the default is 500 ms.
edit <Index|MAC> [E|D]
[timeout]
delete
<Index|MAC>
Modifies, enables, or disables an
entry.
clearall
Deletes all entries for connection
monitoring.
acknow [Index|all]
Displays or acknowledges (clears)
the Link Check messages requiring
acknowledgment.
6.7.3
Comment
Deletes the specified entry from the
list.
The fault state remains
active until all the fault
messages have been
acknowledged. Default
status and the LED are
cleared if the reason for
default status was only a
link check error message.
Redundancy Menu Command
Note
The redundancy function described here is available only for the
SCALANCE W788 with two wireless adapters (model name SCALANCE W7882PRO).
You can only use the encryption schemes WEP and AES.
Redundant Connection between two SCALANCE W788-2PRO Devices
Two SCALANCE W788 devices each with two wireless interfaces can be configured so that there is a redundant wireless connection. The redundancy function
causes an automatic failover to the second wireless interface is no data transfer is
possible on the first wireless interface. The user is informed of the status of the redundant connection with the statuses not connected, connected, or error (communication error).
Instead of the MAC addresses, you can also configured the redundant partners
with the sysName parameter. Beacons contain this parameter which is why the redundant device is detected using beacons.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
127
Configuration Using Web Based Management and the Command Line Interface
Note
If 802.1x or WPA is used, a private key must be selected for the redundant connection.
Syntax of the Command Line Interface
CLI\IFEATURES\REDUNDANCY>
Command
Description
redun [E|D]
Enables / disables the redundancy
function
wep [E|D]
mac1 <MAC address>
Enables / disables encryption.
mac2 <MAC address>
Specifies the device that will be operated redundantly along with the
second wireless adapter.
name [system name]
Instead of the MAC addresses, you
can also specify the sysName of the
device.
wepkey1 [key index]
Specifies the WEP key of the device
that will be operated redundantly
along with the first wireless adapter.
wepkey2 [key index]
Specifies the WEP key of the device
that will be operated redundantly
along with the second wireless
adapter.
6.7.4
Comment
Specifies the device that will be operated redundantly along with the
first wireless adapter.
IP-Alive Menu Command
Application-Related Connection Monitoring
The IP-Alive function provides application-related connection monitoring of the
wireless link.
It is useful to use IP-Alive on IP connections when it is known that they are used to
send data cyclically. With IP-Alive, you specify a monitoring time for an IP address
and a port. In contrast to the Link Check, the SCALANCE W788 does not start any
checks until the monitoring time has elapsed. The SCALANCE W788 checks passively whether communication took place during the specified monitoring period.
As with Link Check, you can also enter up to ten connections here.
128
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
System Event for Connection Abort
You can specify how the SCALANCE W788 reacts to change in the IP-Alive status
in the System > Event Config menu.
Syntax of the Command Line Interface
CLI\IFEATURES\IP_ALIVE>
Command
Description
ipalive <E|D>
Enables / disables applicationrelated connection monitoring.
add <E|D> <IP address>
<:Port> <Timeout>
Adds a new IP address to the connection monitoring and enables /
disables monitoring for this IP address.
edit <Index|IP addr.>
[:Port] [E|D]
[Timeout]
Modifies, enables, or disables the
entry specified by the index or IP
address.
delete <Index|IP addr.>
clearall
Deletes the node to be monitored.
acknow [Index|all]
Displays or acknowledges (clears)
the IP Alive messages requiring acknowledgment.
Comment
Deletes all entries for connection
monitoring.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
The fault state remains
active until all the fault
messages have been
acknowledged. The fault
state and the Fault LED
are cleared if the reason
was only an IP Alive error
message. The command
is not visible in the client
mode.
129
Configuration Using Web Based Management and the Command Line Interface
6.8
The Information Menu
System Events and Information on the Protocols
The pages of this menu display tables contain information on system events and
on the behavior of the protocols (IP, TCP, UDP, and ICMP, SNMP).
Updating the Display
Most pages have the Refresh button at the bottom edge with which you can update
the display. The Client List menu command also allows you to update automatically. To activate this, select the Update check box.
Syntax of the Command Line Interface
CLI\ ... >
Command
Displays information on the current
menu item.
Info
6.8.1
Description
Comment
This can be called in
every submenu.
Log Table Menu Command
Logging System Events
This page lists system events and the time at which they occurred. You can specify
which events are included here in the System > Events menu.
Syntax of the Command Line Interface
CLI\INFORM\LOG>
Command
Description
events <show|clear>
Displays or deletes the log table.
addevent <Text>
Adds an event to the log table.
eventmax [Max. count]
Sets the maximum number of log
entries.
130
Comment
The default is 400.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
6.8.2
Auth Log Menu Command
Logging Authentication
The pages of this menu contain a table with information on successful or failed authentication attempts.
Syntax of the Command Line Interface
CLI\INFORM\LOG>
Command
show [0...8]
Description
Displays the authentication entries.
By specifying a parameter, the display can be limited to specific information:
0
1
2
3
4
5
6
7
8
clear
Comment
All
Good
All errors
802.11 errors
ACL errors
RADIUS errors
(request denied, password
denied etc.)
802.1x errors
(timeout, no response from
RADIUS or WPA server)
Deauthenticated errors
Deassociated errors
Deletes all entries.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
131
Configuration Using Web Based Management and the Command Line Interface
6.8.3
Versions Menu Command
Version Information
This page displays the version numbers of hardware and software.
Syntax of the Command Line Interface
CLI>
Command
Comment
Displays the version information.
info
6.8.4
Description
Client List Menu Command
Note
This menu command is available only in the access point mode.
Logged on Clients
All the clients logged on at the SCALANCE W788 along with certain additional information (wireless channel, status etc.) are displayed here.
MAC address
The MAC address of the client.
If#
This specifies the wireless interface over which the client is connected.
Signal
The signal strength of the client. The higher the value, the better the signal.
Sec
This indicates which encryption is active.
Channel.
The current channel over which the client communicates with the SCALANCE
W788.
State
The current state of the clients. Associated means that the client is logged on.
132
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
By selecting the Update check box, the list is updated automatically every 2 seconds. If you click on the MAC address of a client, you will receive additional information on this client.
Syntax of the Command Line Interface
CLI\INFORM\WLAN1>
CLI\INFORM\WLAN2>
Command
Description
Station
Displays information on the connected stations.
resetStats
Resets the statistics that are displayed with the Station command.
Apinfo
Displays information on the access
point.
Scan
Displays all the access points in the
area.
Noise
Shows disturbances on the individual channels.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Comment
(only in access point
mode)
133
Configuration Using Web Based Management and the Command Line Interface
6.8.5
Ethernet Menu Command
Information on the Ethernet Interfaces
This menu command provides information on the current settings of the Ethernet
interface. The current operating data is also displayed here.
Syntax of the Command Line Interface
There are no CLI commands for this menu command.
6.8.6
WLAN
Information on the WLAN Interface
This menu command provides information on the current settings of the WLAN interface. The current operating data is also displayed here. With the SCALANCE
W788-2PRO, there are two menu commands WLAN1 and WLAN2.
6.8.7
iQoS Menu Command
Information on Bandwidth Reservation
The pages of this menu provide information on iQoS. The clients are grouped as
follows:
Critical Compliant (CC)
This involves clients that were defined as critical and that are currently meeting the
requirements you set for the bandwidth and response time.
Critical Non-Compliant (CNC)
The CNC clients are also clients with strict requirements regarding the response
time and bandwidth. In contrast to the CC clients, however, these clients are not
currently meeting these requirements.
Non-Critical Satisfied (NCS)
These clients do not have fixed requirements regarding the response time and
minimum bandwidth. Their communication is not currently restricted by iQoS.
134
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Non-Critical Regulated (NCR)
These clients are also non-critical clients whose communication is, however, currently being restricted by iQoS in favor of critical clients.
Non-Critical Non-Responsive (NCNR)
Some clients that require no acknowledgment whatsoever for their communication
(for example UDP traffic) cannot be regulated by iQoS. These are classified as
NCNR.
Syntax of the Command Line Interface
CLI\IFEATURES\IQOS\WLAN1>
CLI\IFEATURES\IQOS\WLAN2>
Command
info
Description
Comment
Displays information on iQos.
The CLI also supplies detailed information on iQoS. In this view, the first part displays the current configuration, in other words whether iQoS is enabled, , whether
the calculations and reservations are based on the static worst-case assumptions
(static = enabled) or the current situation (static = disabled). The number of configured critical clients is also displayed.
The Traffic statistics table shows how many clients are currently in each status and
how many packets of a particular class were sent for each of these classes.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
135
Configuration Using Web Based Management and the Command Line Interface
The third table provides an overview of all clients, their current classification, and
the volume of sent and receive data. The shaper interval (SI) is also is displayed
for each client. The shaper interval is the minimum spacing between two packets
of a client set by iQoS. For NCS clients, the SI is selected so that their bandwidth is
twice the size of the current bandwidth.
6.8.8
Spanning Tree Menu Command
Status of the Spanning Tree Protocol
The upper part of the page shows the RootID and the BridgeID. Both IDs are made
up of their priority and their MAC address. Together, this results in the 16 character
long ID. The RootID is the ID of the bridge that is currently the root bridge. The
BridgeID shows the ID of the local device.
136
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Configuration Using Web Based Management and the Command Line Interface
Below this, you will see the following port-related information:
Port Name
Name of the port in plain language, for example, Ethernet or Wireless1 WDS 1.
Enabled
Indicates whether the STP is enabled for this port. If the port is not enabled, no further frames are forwarded over this port.
Cost
Indicates the path costs for the port.
Priority
Indicates the current priority of the port.
Port State
With the STP, a port can adopt five states:
● Disabled
Not frames are forwarded from or to this port. The port has been disabled by
the user.
● Listening
The port receives packets but does not forward them.
● Learning
The port receives packets in the same way as when listening, but does not forward them. The MAC addresses are also entered in the Learning Bridge.
● Forwarding
The port is fully enabled. Frames can be received and sent.
● Blocking
The port is changed to this state when a redundant path is detected. No packets can be received and forwarded.
State
Here, the state of the port in relation to the root bridge is displayed. The ROOT
state means that the port is connected directly with the root bridge. DESIGNATED
identifies all ports that are not directly at the root but that are enabled. Ports that
are blocked are in the BLOCKED state.
Syntax of the Command Line Interface
In the command line interface, the information on the Spanning Tree protocol is not
called in CLI\INFORM but directly in CLI\BRIDGE\SPANNING using info.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
137
Configuration Using Web Based Management and the Command Line Interface
6.8.9
IP, TCP/IP, ICMP, SNMP Menu Command
Information on Protocols
The pages of this menu show information on the IP, TCP, UDP, ICMP, and SNMP
protocols in the form of tables.
There are no CLI commands for this menu command.
138
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
7
Technical Specifications
Data Transmission
Transmission rate for Ethernet
10/100 Mbps
Transmission rate for wireless
1 ... 54 Mbps (108 Mbps)
Supported standards for wireless
802.11a, 802.11b, 802.11g
Supported standards for energy supply
802.3 af (Power over Ethernet)
Interfaces
Energy
Data
•
M12 connector
(24...48 V DC)
•
Power contacts in the hybrid connector
(24...48 V DC)
•
RJ-45 jack power-over-Ethernet
(48 V DC)
2 DC 24V power supplies (18 through 32 V
DC) safety extra-low voltage (SELV).
Power supply voltage connected over high
resistance with housing (not electrically isolated).
IE IP67 hybrid connector
R-SMA antenna sockets
(2 x or 4 x with the 788-2pro)
Electrical Data
Power supply
20 ... 57 V DC voltage
90 ... 265 V AC
(only when using PS 791-1PRO)
Power consumption
< 10 W
Construction
Dimensions without antennas (W x H x L)
125 mm x 88 mm x 108 mm
Weight
approx. 1050 g
Permitted ambient conditions
Operating temperature
-20° ... 60° C
Transport and storage temperature
-40° ... 70° C
Humidity no condensation
95%
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
139
Technical Specifications
Technical Specifications ANT795-4MR
Mechanical Properties
Connector
R-SMA male for connection to
SCALANCE W788 or
SCALANCE W744
Cover material
Polycarbonate
Silicone-free
Electrical Properties
140
Frequency range
2.4 ~ 2.4835 GHz
5.15 ~ 5.35 GHz
5.725 ~ 5.85 GHz
Impedance
50 Ohms
Voltage standing wave
ratio
≤ 2,0
Return loss
≤ -10 dB
Gain at 2.45 GHz
3 dBi
Gain at 5.25 GHz
5 dBi
Polarization
Vertical
Operating temperature
- 20 °C.... + 60 °C
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Technical Specifications
Dimension Drawing
6
1 4 8
2 1 ,2
3 4 ,6
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
1 3
141
Technical Specifications
142
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Approvals
CE Conformity
The products
SIMATIC NET SCALANCE W788-1PRO
SIMATIC NET SCALANCE W788-2PRO
SIMATIC NET SCALANCE W744-1PRO
in the version put into circulation by Siemens A&D conform to the regulations of the
following European directive:
99/5/EC
Directive of the European Parliament and of the Council relating to Radio Equipment and Telecommunications Terminal Equipment and the Mutual Recognition of
their Conformity.
Conformity with the essential requirements of the directive is attested by adherence to the following standards:
EN 60950
Safety of Information Technology Equipment
EN 301 489-1
Electromagnetic Compatibility for Radio Equipment and Services
EN 301 489-17
Specific Conditions for Wideband Transmission Systems and High-Performance
Radio Local Area Network (HIPERLAN) Equipment
EN 300 328
Electromagnetic Compatibility and Radio Spectrum Matters
EN 301 893
Broadband Radio Access Networks (BRAN) - 5-GHz high-performance RLAN
EN 50371
Generic standard to demonstrate the compliance of low power electronic and electrical apparatus with the basic restrictions related to human exposure to electromagnetic fields (10 MHz to 300 GHz)
1999/519/EC
Council recommendation on the limitation of exposure of the general public to electromagnetic fields (0 Hz to 300 GHz)
Devices connected to the system must meet the relevant safety regulations.
The EU declaration of conformity is available for the responsible authorities according to the above-mentioned EU directive at the following address:
Siemens Aktiengesellschaft
Bereich Automatisierungs- und Antriebstechnik
Industrielle Kommunikation (A&D PT2)
Postfach 4848
D-90327 Nuernberg
This declaration certifies compliance with the directives named above, but does not
guarantee any specific properties.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
143
Approvals
144
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Approvals
ATEX, cULus and FM Approvals
The products
SIMATIC NET SCALANCE W788-1PRO
SIMATIC NET SCALANCE W788-2PRO
has the following approvals
EN50021
UL 60950-1
FM Hazardous (Classified) Location Electrical Equipment:
Non Incendive / Class I / Division 2 / Groups A,B,C,D / T* and
Non Incendive / Class I / Zone 2 / Group IIC / T*
(T* = For concrete information on the temperature class, refer to the type
plate)
!
Warning
When used under hazardous conditions (Zone 2), the SCALANCE W788 product
must be installed in an enclosure. To comply with EN 50021, this enclosure must
meet the requirements of at least IP54 in compliance with EN 60529.
DO NOT CONNECT OR DISCONNECT EQUIPMENT UNLESS AREA IS KNOWN
TO BE NONHAZARDOUS.
Note
The specified approvals apply only when the corresponding mark is printed on the
product.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
145
Approvals
FCC Approval
This device complies with Part 15 of the FCC Rules and with RSS-210 of Industry Canada.
Operation is subject to the following two conditions:
(1) this device may not cause harmful interference, and
(2) this device must accept any interference received, including interference that may cause
undesired operation.
Notice
Changes or modifications made to this equipment not expressly approved by SIEMENS may
void the FCC authorization to operate this equipment.
This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable
protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this
equipment does cause harmful interference to radio or television reception, which can be
determined by turning the equipment off and on, the user is encouraged to try to correct the
interference by one or more of the following measures:
•
Reorient or relocate the receiving antenna.
•
Increase the separation between the equipment and receiver.
•
Connect the equipment into an outlet on a circuit different from that to which the receiver
is connected.
Consult the dealer or an experienced radio/TV technician for help.
Notice
FCC Radiation Exposure Statement:
This equipment complies with FCC radiation exposure limits set forth for an uncontrolled
environment. This equipment should be installed and operated with minimum distance 20cm
between the radiator and your body.
This transmitter must not be co-located or operating in conjunction with any other antenna or
transmitter.
146
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Approvals
National Approvals
Austria
0 6 8 2
Indoor
only
0 6 8 2
Indoor
only
0 6 8 2
Spain
Finland
France 5)
Greece
Great Britain
IEEE 802.11b/g
11/13/14 channels
2.4 - 2.4835 GHz
IEEE 802.11a
4 / 5 channels
Indoor
only
0 6 8 2
0 6 8 2
0 6 8 2
Indoor
only
Indoor
only
•
•
Indoor
only
Indoor
only
0 6 8
0 6 8
0 6 8
0 6 8
2
Indoor
only
2
Indoor
only
•
•
2
Indoor
only
2
Indoor
only
•
Hungary
Iceland
Indoor
only
•
Hong Kong
Ireland 6)
•
Indoor
only
Czech Republic 2)
Denmark 4)
••
•
•
•
•
Indoor
only
Chile
Germany 3)
•
Indoor
only
Canada
Switzerland
IEEE 802.11a
Indoor
only
Australia
Belgium 1)
4 channels
Mark
5.15 - 5.25 GHz
Country
5.725 - 5.850 GHz
The products SCALANCE W788-1PRO and SCALANCE W788-2PRO are approved in the following countries:
Indoor
only
0 6 8 2
Indoor
only
Indoor
only
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
•
•
•
•
•
•
147
Italy 7)
0 6 8 2
Indoor
only
•
Korea
Kuwait
0 6 8 2
Luxembourg 9)
0 6 8
0 6 8
0 6 8
0 6 8
0 6 8
Norway
Portugal 10)
Sweden
Singapore
Turkey
United States of
America
South Africa
IEEE 802.11b/g
11/13/14 channels
•
802.11b
Liechtenstein
Netherlands
2.4 - 2.4835 GHz
•
•
Indoor
only
Japan 8)
IEEE 802.11a
4 / 5 channels
IEEE 802.11a
4 channels
Mark
5.15 - 5.25 GHz
Country
5.725 - 5.850 GHz
Approvals
•
•
Indoor
only
Indoor
only
•
•
•
•
•
•
•
•
•
•
Indoor
only
•
•
Indoor
only
Indoor
only
2
Indoor
only
2
2
Indoor
only
2
Indoor
only
2
Indoor
only
1) 5 GHz use only within buildings, maximum transmit power 60 mW.
2) 5 GHz use only within buildings.
3) In Germany, the radio systems may only be operated by private users if the conditions of regulation
35/2002 are met fully.
4) 5 GHz maximum transmit power 50 mW.
5) 2./5 GHz use only within buildings.
6), 7) ad 10) 5 GHz maximum transmit power 30 mW.
8) The use of the 5 GHz band without DFS is permitted only for the client (SCALANCE W744). The
SCALANCE W788 is released only for the 2.4 GHz band.
9) In the 5, 15-5, 35 GHz bands, 60 mW EIRP are permitted.
148
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Appendix
Private MIB Variables of the
SCALANCE W788
Downloading the MIB of the SCALANCE W788
Using the URL http://<IP_address>/snScalanceW.mib, you display the login window if you are not yet logged on. After logging on, you have access to the private
MIB of the SCALANCE W. To save this on your PC, the source view should be activated.
OID
The private MIB variables of the SCALANCE W788 have the following object identifiers:
iso(1).org(3).dod(6).internet(1).private(4).
enterprises(1).ad(4196).adProductMibs(1).simaticNet(1).
iScalanceW(4)
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
149
Appendix
Variables
The following table shows the private MIB variables of the SCALANCE W788:
Name
OID
Description
Number of
Objects
snDownload
1.3.6.1.4.1.4196.1.1.4.100.1.5
Download information and
control variables for image,
configuration file, events table.
15
snNvLog
1.3.6.1.4.1.4196.1.1.4.100.1.6
Log for events.
8
snTrapInfo
1.3.6.1.4.1.4196.1.1.4.100.1.7
Information on traps.
6
snGen
1.3.6.1.4.1.4196.1.1.4.100.1.8
General information, not conforming with MIB-2.
22
snTcpip
1.3.6.1.4.1.4196.1.1.4.100.1.10
IP address, Subnet mask,
Default gateway, DHCP
status…
5
snScalanceWCommon
1.3.6.1.4.1.4196.1.1.4.100.2.1
SCALANCE W - specific settings.
24
snScalanceWFilter
1.3.6.1.4.1.4196.1.1.4.100.2.4
Protocol filters and storm
threshold settings
18
snScalanceWStats
1.3.6.1.4.1.4196.1.1.4.100.2.5
Information on WLAN 1 and
WLAN 2 interfaces.
62
snScalanceWClients
1.3.6.1.4.1.4196.1.1.4.100.2.6
AP mode: List of all clients
currently "associated“ or connected and information on
them.
56
Client mode: The list of devices to which the client is
currently connected.
snScalanceWScan
1.3.6.1.4.1.4196.1.1.4.100.2.7 Client mode: The list of
11
reachable WLANs and
whether they are accessible.
150
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Appendix
Traps
Name
Specific
Index
Variables
Description
snScalanceWPowerLineDown
31
snScalanceWChangedPowerLine - The power line where the
last power down occurred. 1M12, 2-Ethernet Power
This is generated if there is a
power down on M12 or the
Ethernet power connector.
snScalanceWPowerLineUp
32
snScalanceWChangedPowerLine - The power line where the
last power up occurred. 1-M12,
2-Ethernet Power
This is generated at the power
up at M12 or Ethernet power
connector
snScalanceWFault
41
snScalanceWFaultValue -
This is generated if the snScalanceWFaultValue variable is
changed.
Fault value:
0 = no fault,
bit 0 = power M12 is off,
bit 1 = link down,
bit 2 = internal error,
bit 19 = Link Check error,
bit 20 = IP Alive broken,
bit 21 = power ethernet is off,
bit 22 = Cold/warm start,
bit 23 = C-PLUG error,
bit 24 = iQoS error,
bit 25 = Redundancy error"
snScalanceWIQOS
51
snScalanceWIQOSValue - Description of the last snScalanceWIQOS trap
snScalanceWLinkCheckOff
81
snScalanceWLinkCheckValue Description of the last snScalanceWLinkCheckOff Trap
This is generated if a timeout
occurs with a client monitored
with Link Check.
snScalanceWLinkIntegrityOn
82
snScalanceWLinkCheckValue Description of the last snScalanceWLinkCheckOn trap
This is generated if a client
monitored with Link Check logs
on again at the AP following a
timeout.
snScalanceWClientAuthenticated
85
SnScalanceWClientsIndex - An
index of the client in the
snScalanceWClients table
This is generated when a client
logs on at the AP.
snScalanceWClientDeAuthenticated
86
SnScalanceWClientsIndex - An
index of the client in the
snScalanceWClients table
This is generated when a client
logs off from the AP.
snScalanceWRedundancy
53
SnScalanceWRedundancyValue- Description of the last
redundancy trap.
This is generated if the status of
the redundant connection
changes, for example when the
connection of wireless interface
A aborts.
SnScalanceWRedundancyState- Status of redundancy connection
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
151
Appendix
152
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Glossary
ACL
Access Control List with MAC addresses with the right to access the
wireless network
Ad hoc network
Wireless network between individual devices (point-to-point)
AES
Advanced Encryption Standard, Encryption according to the Rijndael
algorithm.
EAP
Extensive Authentification Protocol. Authentication protocol.
Hidden node problem
Two nodes are arranged in a wireless cell so that they are outside
their own transmission range. If they both access the medium at the
same time, collisions result.
IEEE
Institute of Electrical and Electronics Engineers
IEEE 802.11
Standard for wireless networks in the 2.4 GHz range with transmission rates of up to 2 Mbps.
IEEE 802.11a
Standard for wireless networks in the 5 GHz range with transmission
rates of up to 54 Mbps.
IEEE 802.11b
Standard for wireless networks in the 2.4 GHz range with transmission rates of up to 11 Mbps.
IEEE 802.11g
Standard for wireless networks in the 2.4 GHz range with transmission rates of up to 54 Mbps.
IEEE 802.11h
The IEEE 802.11a standard expanded by TPC and DFS.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
153
Glossary
IEEE 802.1x
The heart of the standard is the use of a Radius server as the authentication server. In addition to this, in IEEE 802.1x, the entire communication is encrypted.
RADIUS
Remote Authentication Dial - In User Service for secure communication networks
Roaming
Free movement of wireless LAN nodes even beyond the boundaries
of an access point's cell. The nodes and can move from one cell to
the next without any noticeable interruption.
RTS/CTS
Request to send/Clear to send. Scheme for avoidance of collisions.
SNMP
Simple Network Management Protocol. Standardized protocol for
transporting network management information.
TKIP
Temporal Key Integrity Protocol. Scheme for cyclic changing of keys
in WLANs.
WBM
Web Based Management. HTTP-based configuration method in which
an HTTP server is used in the SCALANCE W788.
WDS
Wireless Distribution System. Radio links for connecting the access
points for an extended service set (ESS)
WEP
WEP (Wired Equivalence Privacy) is an optional part of the IEEE
802.11 standard. WEP specifies methods of authentication and encryption working with fixed keys stored on the device. All devices that
want to access a network in which WEP is used must first be supplied
with the same keys. The keys can only be changed manually.
Wi-Fi
Wireless Fidelity. Specification for wireless networks.
WPA
WPA (Wi-Fi Protected Access) is a method specified by the Wi-Fi
Alliance to close security gaps in WEP. Authentication using a server
is stipulated (802.1x). The dynamic exchange of keys at each frame
introduces further security. The type of encryption can be TKIP or
AES.
154
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Glossary
WPA-PSK
WPA-PSK is a weakened form of WPA. In this method, authentication
is not established by a server but is based on a password. This password must be configured manually on the client and server. Wherever
possible, you should change to the WPA method to achieve greater
security.
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
155
Glossary
156
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
Index
A
ACL........................................................ 110
Ad Hoc networks ..................................... 13
ARP table .............................................. 117
Auth Log ................................................ 131
Authentication.................................. 64, 106
B
Basic Wizard ........................................... 50
Beacon .................................................... 99
Bridge .................................................... 115
C
C Plug...................................................... 23
CLI commands
shortcuts for commands .....................74
symbolic representation......................75
Client List............................................... 132
Command Line Interface ......................... 74
D
DHCP server ........................................... 78
DLC protocol ........................................... 39
installation ...........................................41
E
E-mail ...................................................... 84
Encryption........................................ 65, 107
H
Help function ........................................... 73
I
IEEE 802.11g ........................................ 103
IP address ............................................... 39
IP, TCP/IP, ICMP, SNMP ...................... 138
IP-Alive .................................................. 128
iQoS....................................................... 134
iQoS....................................................... 125
L
Learn table............................................. 117
LED simulation ........................................ 72
Link Check .............................................126
Locale setting...........................................76
Log table ................................................130
M
Multichannel configuration .......................16
N
New..........................................................73
P
Power supply ...........................................27
Primary Setup Tool ..................................39
installation .......................................... 42
via command line ............................... 46
R
RADIUS .................................................112
Redundant connection...........................127
Refresh ....................................................73
RTS/CTS..........................................99, 100
S
Security settings.......................................62
Security Wizard........................................58
Set values ................................................73
SNMP.......................................................84
SNTP .......................................................88
Spanning Tree .......................................136
Spanning Tree .......................................117
Standalone configuration .........................14
Storm threshold......................................121
T
Transmit power ........................................99
TTL...........................................................78
V
Versions .................................................132
W
WDS.......................................................115
Web Based Management ........................47
Wireless access.......................................15
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
157
Index
158
Operating Instructions SCALANCE W 788-1PRO / SCALANCE W 788-2PRO
C79000-G8976-C184-03
A&D Technical Support
Worldwide, available 24 hours a day:
Nuernberg
Beijing
Johnson City
Worldwide (Nuernberg)
Technical Support
24 hours a day, 365 days a year
Phone:
+49 (0) 180 5050-222
Fax:
+49 (0) 180 5050-223
E-Mail:
[email protected]
siemens.com
GMT:
+1:00
Europe / Africa (Nuernberg)
United States (Johnson City)
Asia / Australia (Beijing)
Authorization
Technical Support and
Authorization
Technical Support and
Authorization
Local time: Mon.-Fri. 8:00 to 17:00
Local time: Mon.-Fri. 8:00 to 17:00
Local time: Mon.-Fri. 8:00 to 17:00
Phone:
+49 (0) 180 5050-222
Phone:
+1 (423) 262 2522
Phone:
Fax:
+49 (0) 180 5050-223
Fax:
+1 (423) 262 2289
Fax:
+86 10 64 74 74 74
E-Mail:
[email protected]
siemens.com
E-Mail:
[email protected]
E-Mail:
[email protected]
GMT:
+1:00
GMT:
sea.siemens.com
-5:00
+86 10 64 75 75 75
siemens.com
GMT:
+8:00
The languages of the SIMATIC Hotlines and the authorization hotline are generally German and English.
A&D Technical Support
Service & Support on the Internet
In addition to our documentation, we offer our Know-how online on the internet at:
http://www.siemens.com/automation/service&support
where you will find the following:
•
The newsletter, which constantly provides you with up-to-date information on
your products.
•
The right documents via our Search function in Service & Support.
•
A forum, where users and experts from all over the world exchange their
experiences.
•
Your local representative for Automation & Drives via our representatives
database.
•
Information on field service, repairs, spare parts and more under "Services".
A&D Technical Support
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement