indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
Qualified Personnel
personnel qualified
Proper use of Siemens products
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
maintenance are required to ensure that the products operate safely and without any problems. The permissible
Trademarks
Disclaimer of Liability
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
The product/system described in this documentation may be operated only by
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Note the following:
documentation. If products and components from other manufacturers are used, these must be recommended
or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
ambient conditions must be complied with. The information in the relevant documentation must be observed.
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
for the specific
05/2017 Sub ject to c hange
Page 3
Preface
Purpose of the documentation
New in this issue
Version history
Replaced edition
Current manual release on the Internet
Sources of information and other documentation
This manual supplements the S7-1500 system manual.
With the information in this manual and the system manual, you will be able to commission
the communications processor.
● Firmware version V2.1 with the following new functions:
– Extended security settings using IP routing via the backplane bus
See section IP routing (Page 35).
Firmware version V2.0 with the following new functions:
● Secure OUC (Open User Communication) via TCP/IP
● Secure Mail: New system data types (SDTs) for transferring e-mails
Alternative: Non secure transfer via port 25 or secure transfer via port 587
● Operation as FTP server: Access to the SIMATIC memory card of the CPU
● IP routing via the backplane bus
Edition 10/2016
You will find the current version of this manual on the Internet pages of Siemens Industry
Online Support:
A notice contains important information on the product described in the documentation,
handling the product or about parts of the documentation you should pay particular attention
to.
See also
License conditions
Note
Open source software
The product contains open source software. Read the license conditions for open source
software carefully before using the product.
Security information
● CP
In this document, the term "CP" is also used instead of the full product name.
● STEP 7
The name STEP 7 is used to mean the STEP 7 Professional configuration tool.
Make sure you read the special notices below:
Program blocks for OUC (Page 44)
Configuring the FTP server function (Page 49)
You will find license conditions in the following document on the supplied data medium:
● OSS_CP15431_86.pdf
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is
necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens’ products and solutions only form one element of such a concept.
Customer is responsible to prevent unauthorized access to its plants, systems, machines
and networks. Systems, machines and components should only be connected to the
enterprise network or the internet if and to the extent necessary and with appropriate security
measures (e.g. use of firewalls and network segmentation) in place.
Additionally, Siemens’ guidance on appropriate security measures should be taken into
account. For more information about industrial security, please visit
Link: (http://www.siemens.com/industrialsecurity)
Siemens’ products and solutions undergo continuous development to make them more
secure. Siemens strongly recommends to apply product updates as soon as available and to
always use the latest product versions. Use of product versions that are no longer supported,
and failure to apply latest updates may increase customer’s exposure to cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS
Feed under
Link: (http://www.siemens.com/industrialsecurity).
The firmware is signed and encrypted. This ensures that only firmware created by Siemens
can be downloaded to the device.
Explanations of many of the specialist terms used in this documentation can be found in the
SIMATIC NET glossary.
You will find the SIMATIC NET glossary on the Internet at the following address:
The product is low in pollutants, can be recycled and meets the requirements of the WEEE
directive 2012/19/EU "Waste Electrical and Electronic Equipment".
Do not dispose of the product at public disposal sites. For environmentally friendly recycling
and the disposal of your old device contact a certified disposal company for electronic scrap
or your Siemens contact.
Keep to the local regulations.
You will find information on returning the product on the Internet pages of Siemens Industry
Online Support:
Link: (https://support.industry.siemens.com/cs/ww/en/view/109479891)
Function Manual: Interference-free installation
of control systems
(https://support.industry.siemens.com/cs/ww/e
n/view/59193566)
Function manual: Cycle and Response Times
(https://support.industry.siemens.com/cs/ww/e
• Ethernet networks
• Network configuration
• Network components
• Basics
• Electromagnetic compatibil-
ity
• Lightning protection
• Housing selection
• Basics
• Calculations
All current manuals for SIMATIC products are available for download free of charge from the
Internet:
Link: (http://www.siemens.com/automation/service&support)
The "SIMATIC NET Manual Collection" DVD contains the device manuals and descriptions
of all SIMATIC NET products current at the time it was created. It is updated at regular
intervals.
The "Version History/Current Downloads for SIMATIC NET S7 CPs (Industrial Ethernet)"
document provides information on all CPs available up to now for SIMATIC S7 (Industrial
Ethernet).
The current versions of the document can be found on the Internet:
Link: (https://support.industry.siemens.com/cs/ww/en/view/109474421)
Address label: Unique MAC address preset for the CP
Application
2.2
Communication services
The CP supports the following communication services:
Open User Communication (OUC)
S7 communication
2.2 Communication services
The CP ships with a default MAC address:
The MAC address is printed on the housing.
If you configure a MAC address (ISO transport connections), we recommend that you use
the MAC address printed on the module for module configuration! This ensures that you
assign a unique MAC address in the subnet!
The CP is intended for operation in an S7-1500 automation system. It allows the S7-1500 to
be connected to Industrial Ethernet.
With a combination of different security measures such as firewall and protocols for data
encryption, the CP protects the S7-1500 or even entire automation cells from unauthorized
access. It also protects the communication between the S7 station and communications
partners from spying and manipulation.
●
Open User Communication supports the following communications services via the CP
using programmed or configured communications connections:
– ISO transport (complying with ISO/IEC 8073)
– TCP (complying with RFC 793), ISO-on-TCP (complying with RFC 1006) and UDP
(complying with RFC 768)
With the interface via TCP connections, the CP supports the socket interface to
TCP/IP available on practically every end system.
– Multicast over UDP connection
The multicast mode is made possible by selecting a suitable IP address when
configuring connections.
– Sending e-mail via SMTP (port 25) or SMTPS (port 587) with "SMTP-Auth" for
authentication on an e-mail server.
●
– PG communication
– Operator control and monitoring functions (HMI communication)
Timeofday synchronization over Industrial Ethernet using the NTP mode (NTP: Network Time
Protocol)
Addressable with the factoryset MAC address
SNMP agent
2.3 Further functions
●
– FTP functions (File Transfer Protocol FTP/FTPS) for file management and access to
data blocks on the CPU (client and server functions).
– For e-mail see above (OUC)
●
– FETCH/WRITE services as server (corresponding to S5 protocol) via ISO transport,
ISO-on-TCP and TCP connections
The S7-1500 with the CP is always the server (passive connection establishment).
The fetch or write access (client function with active connection establishment ) is
performed by a SIMATIC S5 or a third-party device / PC.
The CP sends timeofday queries at regular intervals to an NTP server and synchronizes its
local time of day.
The time is also be forwarded automatically to the CPU modules in the S7 station allowing
the time to be synchronized in the entire S7 station.
Security function: The CP supports the NTP (secure) protocol for secure time-of-day
synchronization and transfer of the time of day.
To assign the IP address to a new CP (direct from the factory), it can be accessed using the
preset MAC address on the interface being used. Online address assignment is made in
STEP 7.
The CP supports data queries over SNMP in version V1 (Simple Network Management
Protocol). It delivers the content of certain MIB objects according to the MIB II standard and
Automation System MIB.
If security is enabled, the CP supports SNMPv3 for transfer of network analytical information
protected from eavesdropping.
The Web server of a SIMATIC S7-1500 station is located in the CPU. For this reason, when
there is secure access (HTTPS) to the Web server of the station using the IP address of the
CP 1543
S5/S7 addressing mode for FETCH/WRITE
2.3 Further functions
The essential features of IP configuration for the CP:
● The CP supports the use of IP addresses according to IPv4 and IPv6.
● You can configure how and with which method the CP is assigned the IP address, the
subnet mask and the address of a gateway.
● The IP configuration and the connection configuration (IPv4) can also be assigned to the
CP by the user program (for program blocks refer to the section Programming (Page 21)).
Note: Does not apply to S7 connections.
The CP supports static IP routing (IPv4) to other CM 1542-1 V2.0 / CP 1543-1 V2.0.
For details, see section IP routing (Page 35).
An IP address according to IPv6 can be used for the following communications services:
● FTP server mode
● FETCH/WRITE access (CP is server)
● FTP client mode with addressing via a program block
● E-mail transfer with addressing via a program block
Via the LAN interface of the CP, you have access to the Web server of the CPU. With the aid
of the Web server of the CPU, you can read out module data from a station.
Note the special description of the Web server; refer to the section Guide to the
documentation (Page 9)
-1, the SSL certificate of the CPU is displayed.
The addressing mode can be configured for FETCH/WRITE access as S7 or S5 addressing
mode. The addressing mode specifies how the position of the start address is identified
during data access (S7 addressing mode applies only to data blocks / DBs).
Read the additional information in the online help of STEP 7.
All-round protection - the task of Industrial Ethernet Security
Security functions of the CP for the S7-1500 station
2.4 Industrial Ethernet Security
With Industrial Ethernet Security, individual devices, automation cells or network segments
of an Ethernet network can be protected. The data transfer from the external network
connected to the CP 1543-1 can be protected by a combination of different security
measures:
● Data espionage (FTPS, HTTPS)
● Data manipulation
● Unauthorized access
Secure underlying networks can be operated via additional Ethernet/PROFINET interfaces
implemented by the CPU or additional CPs.
As result of using the CP, the following security functions are accessible to the S7-1500
station on the interface to the external network:
● Firewall
– IP firewall with stateful packet inspection (layer 3 and 4)
– Firewall also for Ethernet "non-IP" frames according to IEEE 802.3 (layer 2)
– Bandwidth limitation
– Global firewall rules
The firewall protective function can be applied to the operation of single devices, several
devices, or entire network segments.
● Logging
To allow monitoring, events can be stored in log files that can be read out using the
configuration tool or can be sent automatically to a syslog server.
● FTPS (explicit mode)
For encrypted transfer of files.
● NTP (secure)
For secure time-of-day synchronization and transmission
● SMTPS
Foe secure transfer of e-mails via port 587
● SNMPv3
For secure transmission of network analysis information safe from eavesdropping
Observe the information in section Security recommendations (Page 31).
Depending on the CPU type, different numbers of connection resources are available. The
number of connection resources is the decisive factor for the number of configurable
connections. This means that the values that can actually be achieved may be lower
specified in this section describing the CP.
2.5.2
Characteristics for Open User Communication (OUC) and FETCH/WRITE
2.5 Configuration limits and performance data
Total number of freely usable connections on Industrial
Ethernet
Open User Communication (OUC) provides access to communication over TCP, ISO-onTCP, ISO transport and UDP connections.
118
The value applies to the total number of connections of the
Depending on the CPU type, different numbers of connection resources are available. The
number of connection resources is the decisive factor for the number of configurable
connections. This means that the values that can ac
specified in this section describing the CP.
You will find detailed information on the topic of connection resources in the
"Communication" function manual, refer to the section
2.5 Configuration limits and performance data
The following characteristics are important (OUC + FETCH/WRITE):
Number of connections
Maximum data length for program blocks Program blocks allow the transfer of user data in the following lengths:
LAN interface max. data field length generated by CP per protocol data unit(TPDU =
transport protocol data unit)
• Number of configured and programmed +connections in total (ISO
transport + ISO-on-TCP + TCP + UDP + FETCH/WRITE + e-mail):
Max. 118
Of which maximum:
– TCP connections: 1...118
– ISO-on-TCP connections: 1...118
– ISO transport connections: 1...118
– Total number of UDP connections (specified and free) that can be
configured: 1...118
– Connection for e-mail: 1
– Connections for FETCH/WRITE: 1...16
Notes:
1)
Avoid receive overload
The flow control on TCP connections cannot control permanent overload
of the recipient. You should therefore make sure that the processing capabilities of a receiving CP are not permanently exceeded by the sender
• ISO-on-TCP, TCP, ISO transport: 1 to 64 kB
• UDP: 1 to 1452 bytes
• E-mail
– Job header + user data: 1 to 256 bytes
– E-mail attachment: up to 64 kbytes
FTP actions are transferred from the CP over TCP connections. Depending on the mode, the
following characteristic data applies:
● FTP in client mode:
You can use a maximum of 32 FTP sessions. Up to 2 TCP connections are occupied per
activated FTP session (1 control connection and 1 data connection).
● FTP in server mode:
You can operate a maximum of 16 FTP sessions at the same time. Up to 2 TCP
connections are occupied per activated FTP session (1 control connection and 1 data
connection).
For communication, use the FTP program block FTP_CMD.
The block execution time in FTP depends on the reaction times of the partner and the length
of the user data. A generally valid statement is therefore not possible.
VPN tunnel communication allows the establishment of secure IPsec tunnel communication
with one or more security modules.
The maximum number of firewall rules in advanced firewall mode is limited to 256.
The firewall rules are divided up as follows:
● Maximum 226 rules with individual addresses
● Maximum 30 rules with address ranges or network addresses
(e.g. 140.90.120.1 - 140.90.120.20 or 140.90.120.0/16)
● Maximum 128 rules with limitation of the transmission speed ("bandwidth limitation")
19
Page 20
Product overview, functions
2.6
Requirements for use
2.6.1
Configuration limits
Note
Power supply via the CPU adequate or additional power supply modules required
You can operate a
additional power supply. Make sure that you keep to the specified power feed to the
backplane bus for the particular CPU type. Depending on the configuration of the S7
1500 station you may need t
2.6.2
Project engineering
Configuration and downloading the configuration data
STEP 7 version
Functions of the CP
(6GK7 543-1AX00-0XE0) can be configured.
2.6 Requirements for use
When using the CP type described here, the following limits apply:
● The number of CPs that can be operated in a rack depends on the CPU type being used.
By operating several CPs, you can increase the configuration limits listed below for the
station as the whole. The CPU does, however, have set limits for the entire configuration.
The size of the configuration made available by a CP can be increased by using more
than one CP within the framework of the system limits.
Observe the information in the documentation on the CPU; see section Guide to the
documentation (Page 9)
certain number of modules in the S7-1500 station without an
o provide additional power supply modules.
When the configuration data is downloaded to the CPU, the CP is supplied with the relevant
configuration. The configuration data can be downloaded to the CPU via a memory card or
any Ethernet/PROFINET interface of the S7-1500 station.
The following version of STEP 7 is required:
STEP 7 Professional V12 SP1 or higher The full functionality of the CP 1543-1
Meaning of the LED displays of the Ethernet interface: X1 P1
LINK/ACT
Meaning
via the Ethernet interface.
flashing green
interface of your CP and a communications partner.
cations partner on Ethernet.
2.8
Gigabit interface
Ethernet interface with gigabit specification and security access
2.8 Gigabit interface
The LED LINK/ACT (two color green/yellow) is assigned to the port of the Ethernet interface.
The table below shows the LED patterns.
Table 2- 4 Meaning of the "LINK/ACT" LED
No connection to Ethernet
There is no Ethernet connection between the Ethernet
interface of the CP and the communications partner.
At the current time, there is no data being received/sent
The "node flash test" is being performed.
Connection to Ethernet exists.
There is an Ethernet connection between the Ethernet
At the current time, data is being received/sent via the
Ethernet interface of the Ethernet device of a communi-
green off
green on
green on
yellow flickers
yellow off
yellow off
yellow off
The CP has an Ethernet interface according to the gigabit standards IEEE 802.3. The
Ethernet interface supports autocrossing, autonegotiation and autosensing.
The Ethernet interface allows a secure connection to external networks via a firewall. The
CP provides the following protective function:
● Protection of the S7-1500 station in which the CP is operated;
● Protection of the underlying company networks connected to the other interfaces of the
S7-1500 station.
You will find the pin assignment of the sub RJ-45 jack in section Installing and
commissioning the CP 1543-1 (Page 28).
voltage supply system and within a single building. Make sure that the LAN is in an of type
3.1.1
Notes on use in hazardous areas
WARNING
WARNING
EXPLOSION HAZARD
WARNING
EXPLOSION HAZARD
Note the following safety notices when setting up and operating the device and during all
associated work such as installation, connecting up or replacing the device.
A LAN or LAN segment with the attachments belonging to it should be within a single low-
A environment according to IEEE 802.3 or in a type 0 environment according to IEC TR
62101.
Never establish a direct electrical connection to TNV networks (telephone network) or
WANs (Wide Area Network).
The device may only be operated in an environment with pollution degree 1 or 2 (see IEC
60664-1).
Do not connect or disconnect cables to or from the device when a flammable or
combustible atmosphere is present.
Replacing components may impair suitability for Class 1, Division 2 or Zone 2.
Notes on use in hazardous areas according to ATEX / IECEx
WARNING
Requirements for the cabinet/enclosure
WARNING
ambient in excess of 50 °C, only use cables with admitted maximum operating temperature
WARNING
Take measures to prevent transient voltage surges of more than 40% of the rated voltage.
3.1 Important notes on using the device
When used in hazardous environments corresponding to Class I, Division 2 or Class I,
Zone 2, the device must be installed in a cabinet or a suitable enclosure.
In the ATEX and IECEx area of application only the Siemens DIN rail 6ES5 710-8MA11
may be used to mount the modules.
To comply with EU Directive 94/9 (ATEX95), the enclosure or cabinet must meet the
requirements of at least IP54 in compliance with EN 60529.
If the cable or conduit entry point exceeds 70 °C or the branching point of conductors
exceeds 80 °C, special precautions must be taken. If the equipment is operated in an air
of at least 80 °C.
This is the case if you only operate devices with SELV (safety extra-low voltage).
Notes on use in hazardous areas according to UL HazLoc
WARNING
EXPLOSION HAZARD
You may only connect or disconnect cables carrying electricity when the power supply is
3.1.4
General notices on use in hazardous areas according to FM
WARNING
EXPLOSION HAZARD
You may only connect or disconnect cables carrying electricity when the power supply is
WARNING
EXPLOSION HAZARD
The equipment is intended to be installed within an ultimate enclosure. The inner service
temperature of the enclosure corresponds to the ambient temperature of the module. Use
3.1 Important notes on using the device
switched off or when the device is in an area without inflammable gas concentrations.
This equipment is suitable for use in Class I, Division 2, Groups A, B, C and D or nonhazardous locations only.
This equipment is suitable for use in Class I, Zone 2, Group IIC or non-hazardous locations
only.
switched off or when the device is in an area without inflammable gas concentrations.
This equipment is suitable for use in Class I, Division 2, Groups A, B, C and D or nonhazardous locations only.
This equipment is suitable for use in Class I, Zone 2, Group IIC or non-hazardous locations
only.
installation wiring connections with admitted maximum operating temperature of at least
30 ºC higher than maximum ambient temperature.
Read the system manual "S7-1500 Automation System"
Configuration
Procedure for installation and commissioning
Step
Execution
Notes and explanations
1
tomation System".
2
RJ45 jack.
3
Turn on the power supply.
4
them closed during operation.
5
3.2 Installing and commissioning the CP 1543-1
Prior to installation, connecting up and commissioning, read the relevant sections in the
system manual "S7-1500 Automation System" (references to documentation, refer to the
section Guide to the documentation (Page 9)).
Make sure that the power supply is turned off when installing/uninstalling the devices.
Commissioning the CP fully is only possible if the STEP 7 project data is complete.
When installing and connecting up, keep to
the procedures described for installing I/O
modules in the system manual "S7-1500 Au-
Connect the CP to Industrial Ethernet via the
Close the front covers of the module and keep
The remaining steps in commissioning involve
downloading the STEP 7 project data.
Underside of the CP
The STEP 7 project data of the CP is transferred when you
download to the station. To load the station, connect the engineering station on which the project data is located to the
Ethernet interface of the CPU.
You will find more detailed information on loading in the following sections of the STEP 7 online help:
The table below shows the pin assignment of the Ethernet interface (RJ-45 jack). The
assignment corresponds to the Ethernet standard IEEE 802.3.
Table 3- 1 Pin assignment of the Ethernet interface
You will find additional information on the topics of "Connecting up" and "Accessories (RJ-45
plug)" in the system manual:
Link: (https://support.industry.siemens.com/cs/ww/en/view/59191792)
You can change the mode of the CPU between RUN and STOP using the STEP 7
configuration software.
Depending on the operating status of the CPU, the CP behaves as described below.
When the CPU is in STOP mode, the CP remains in RUN and behaves as follows:
● For established connections (ISO transport, ISOonTCP, TCP, UDP connections), the
following applies depending on the configuration:
– Programmed connections are retained.
– Configured connections are terminated.
● The following functions remain enabled:
– The configuration and diagnostics of the CP (system connections for configuration,
diagnostics, and PG channel routing are retained);
Do not connect the PC directly to the Internet. If a connection from the CP to the Internet is
required, arrange for suitable protection before the CP, for example a SCALANCE S with
firewall.
Use the options for security settings in the configuration of the product. These includes
among others:
● Protection levels
Configure access to the CPU under "Protection and Security".
● Security function of the communication
– Enable the security functions of the CP and set up the firewall.
If you connect to public networks, you should use the firewall. Think about the services
you want to allow access to the station via public networks. By using the "bandwidth
restriction" of the firewall, you can restrict the possibility of flooding and DoS attacks.
The FETCH/WRITE functionality allows you to access any data of your PLC. The
FETCH/WRITE functionality should not be used in conjunction with public networks.
– Use the secure protocol variants HTTPS, FTPS, NTP (secure) and SNMPv3.
– Use the program blocks for secure OUC communication (Secure OUC).
– Leave access to the Web server of the CPU (CPU configuration) and to the Web
server of the CP disabled.
● Protection of the passwords for access to program blocks
Protect the passwords stored in data blocks for the program blocks from being viewed.
You will find information on the procedure in the STEP 7 information system under the
keyword "Know-how protection".
● Logging function
Enable the function in the security configuration and check the logged events regularly for
unauthorized access.
● Define rules for the use of devices and assignment of passwords.
● Regularly update the passwords to increase security.
● Only use passwords with a high password strength. Avoid weak passwords for example
"password1", "123456789" or similar.
● Make sure that all passwords are protected and inaccessible to unauthorized personnel.
See also the preceding section for information on this.
● Do not use one password for different users and systems.
● Only activate protocols that you require to use the system.
● Use secure protocols when access to the device is not prevented by physical protection
Configured S7 and OUC connections cannot be operated if the IP address is assigned using DHCP
Note
If you obtain the IP address using DHCP, any S7 and OUC connections you may have
configured will not work. Reason: The configured IP address is replaced by the address
obtained via DHCP during operation.
4.3.2
Restart after detection of a duplicate IP address in the network
Behavior when the CP starts up
4.3.3
IP routing
IP routing via the backplane bus
Configuration
4.3 IP configuration
To save you timeconsuming troubleshooting in the network, during startup the CP detects
double addressing in the network.
If double addressing is detected when the CP starts up, the CP changes to RUN and cannot
be reached via the Ethernet interface. The ERROR LED flashes.
The CP supports static IP routing (IPv4) to other CM 1542-1 / CP 1543-1. You can use IP
routing, for example, for Web server access by lower-level modules.
With IP routing, the data throughput is limited to 1Mbps. Remember this in terms of the
number of modules involved and the expected data traffic via the backplane bus.
You can activate the IP routing in STEP 7 via the function "IP routing between
communication modules". In the security settings, the corresponding function is called "IP
routing via the backplane bus". When you activate the function, additional IP firewall rules
are created which you can modify in the advanced firewall mode of the security settings.
IP routing runs via the configured default router. If you use several CPs in a station, of the
modules in the station only one may be configured as a router.
Note the range and application of the security functions of the CP in the section Industrial
Ethernet Security (Page 15).
For the configuration limits, see section Characteristics security (Page 19).
The security functions are configured in STEP 7.
Virtual Private Network (VPN) is a technology for secure transportation of confidential data in
public IP networks, for example the Internet. With VPN, a secure connection (= tunnel) is set
up and operated between two secure IT systems or networks via a non-secure network.
One of the main characteristics of the VPN tunnel is that it forwards all network packets
regardless of higher protocols (HTTP, FTP).
The data traffic between two network components is transported practically unrestricted
through another network. This allows entire networks to be connected together via a
neighboring network.
● VPN forms a logical subnet that is embedded in a neighboring (assigned) network. VPN
● VPN allows communication of the VPN partners with the assigned network.
● VPN is based on tunnel technology, can be individually configured, is customer-specific
● Communication between the VPN partners is protected from eavesdropping or
● Local area networks can be connected together securely via the Internet ("site-to-site"
● Secure access to a company network ("end-to-site" connection).
uses the usual addressing mechanisms of the assigned network, however in terms of the
data, it transports its own network packets and therefore operates independent of the rest
of this network.
and is self-contained.
manipulation by using passwords, public keys or a digital certificate (= authentication).
connection).
● Secure access to a server ("end-to-end" connection).
● Communication between two servers is possible without being accessible to third parties
("end-to-end" or "host-to-host" connection).
● Ensuring information security in networked automation systems.
Creating VPN tunnel communication between S7-1500 stations
Requirements
Note
Communication also possible via an IP router
Communication between the two S7-1500 stations is also possible via an IP router. To use
this communications path, however, you need to make further settings.
Procedure
4.4 Security
● Securing the computer systems including the associated data communication within an
automation network or secure remote access via the Internet.
● Secure remote access from a PC/programming device to automation devices or networks
protected by security modules is possible via public networks.
With Industrial Ethernet Security, individual devices, automation cells or network segments
of an Ethernet network can be protected:
● The access to individual devices or even to entire automation cells protected by security
modules is allowed.
● Secure connections via non-secure network structures becomes possible.
Due to the combination of different security measures such as firewall, NAT/NAPT routers
and VPN via IPsec tunnels, security modules protect against the following:
● Data espionage
● Data manipulation
● Unwanted access
To create a VPN tunnel between two S7-1500 stations, the following requirements must be
met:
● Two S7-1500 stations have been configured.
● Both CPs are configured with a firmware version ≥ V1.1.
● The Ethernet interfaces of the two stations are located in the same subnet.
To create a VPN tunnel, you need to work through the following steps:
1. Create a security user.
If the security user has already been created: Log on as a user.
2. Select the "Activate security features" check box.
Selecting the "Activate security features" check box
Creating the VPN group and assigning security modules
Note
Current date and current time of day on the security modules
When using secure communication (for example HTTPS, VPN...), make sure that the
security modules involved have the current time of day and the current date. Otherwise the
certificates used will n
4.4 Security
3. Create the VPN group and assign security modules.
4. Configure properties of the VPN group.
Configure local VPN properties of the two CPs.
You will find a detailed description of the individual steps in the following paragraphs of this
section.
To create a VPN tunnel, you require appropriate configuration rights. To activate the security
functions, you need to create at least one security user.
1. In the local security settings of the CP, click the "User logon" button.
Result: A new window opens.
2. Enter the user name, password and confirmation of the password.
3. Click the "User login" button.
You have created a new security user. The security functions are now available to you.
With all further logons, log on as user.
● After logging on, select the "Activate security features" check box for both CPs.
You now have the security functions available for both CPs.
ot be evaluated as valid and the secure communication will not work.
1. In the global security settings, select the entry "Firewall" > "VPN groups" > "Add new VPN
group".
2. Double-click on the entry "Add new VPN group", to create a VPN group.
Result: A new VPN group is displayed below the selected entry.
3. In the global security settings, double-click on the entry "VPN groups" > "Assign module
to a VPN group".
4. Assign the security modules between which VPN tunnels will be established to the VPN
group.
You specify the VPN properties of the required CP in the local properties of the module
("Security" > "Firewall"
Result
4.4.1.2
Successfully establishing VPN tunnel communication between the CP 1543-1 and
SCALANCE M
4.4.1.3
VPN tunnel communication with SOFTNET Security Client
VPN tunnel communication works only if the internal node is disabled
4.4 Security
1. Double-click on the newly created VPN group.
Result: The properties of the VPN group are displayed under "Authentication".
2. Enter a name for the VPN group. Configure the settings of the VPN group in the
properties.
These properties define the default settings of the VPN group that you can change at any
time.
> "VPN")
You have created a VPN tunnel. The firewalls of the CPs are activated automatically: The
"Activate firewall" check box is selected as default when you create a VPN group. You
cannot deselect the check box.
● Download the configuration to all modules that belong to the VPN group.
Creating VPN tunnel communication between the CP 1543-1 and SCALANCE M is the same
as described in Procedure for S7-1500 stations (Page 37).
VPN tunnel communication will only be established if you have selected the check box
"Perfect Forward Secrecy" in the global security settings of the created VPN group ("VPN
groups > Authentication").
If the check box is not selected, the CP 1543-1 rejects establishment of the tunnel.
Creating VPN tunnel communication between the CP SOFTNET Security Client and
CP 1543-1 is the same as described in Procedure for S7-1500 stations (Page 37).
Under certain circumstances the establishment of VPN tunnel communication between
SOFTNET Security Client and the CP 1543-1 fails.
SOFTNET Security Client also attempts to establish VPN tunnel communication to a lowerlevel internal node. This communication establishment to a non-existing node prevents the
required communication establishment to the CP 1543-1.
To establish successful VPN tunnel communication to the CP 1543-1, you need to disable
the internal node.
Firewall sequence when checking incoming and outgoing frames
4.4.2.2
Notation for the source IP address (advanced firewall mode)
4.4.2.3
HTTP and HTTPS not possible with IPv6
4.4.2.4
Firewall settings for connections via a VPN tunnel
IP rules in advanced firewall mode
See also
4.4 Security
Each incoming or outgoing frame initially runs through the MAC firewall (layer 2). If the frame
is discarded at this level, it is not checked by the IP firewall (layer 3). This means that with
suitable MAC firewall rules, IP communication can be restricted or blocked.
If you specify an address range for the source IP address in the advanced firewall settings of
the CP 1543-1, make sure that the notation is correct:
● Separate the two IP addresses only using a hyphen.
Correct: 192.168.10.0-192.168.10.255
● Do not enter any other characters between the two IP addresses.
Incorrect: 192.168.10.0 - 192.168.10.255
If you enter the range incorrectly, the firewall rule will not be used.
It is not possible to use HTTP and HTTPS communication on the Web server of the station
using the IPv6 protocol.
If the firewall is enabled in the local security settings in the entry "Firewall > Predefined IPv6
rules": The selected check boxes "Allow HTTP" and "Allow HTTPS" have no function.
If you have configured connections between CPs, note the following setting if you operate
the CPs in advanced firewall mode.
In the parameter group "Security > Firewall > IP rules" select the setting "Allow" for tunnel
connections.
If you do not enable the option, the VPN connection is terminated and re-established.
This applies to connections between a CP 1543-1 and for example a CP 343-1 Advanced,
CP 443-1 Advanced, CP 1628 or CP 1243-1.
Online diagnostics and downloading to station with the firewall activated (Page 42)
Online diagnostics and downloading to station with the firewall activated
Setting the firewall for online functions
4.4 Security
If you want to perform security diagnostics without opening port 102, follow the steps below:
1. Select the CP in STEP 7.
2. Open the "Online & diagnostics" shortcut menu (right mouse button).
3. In the parameter group "Security > Status" click the "Connect online" button.
In this way you perform the security diagnostics via port 8448.
With the security functions enabled, follow the steps outlined below:
1. In the global security settings (see project tree), select the entry "Firewall > Services >
Define services for IP rules".
2. Select the "ICMP" tab.
3. Insert a new entry of the type "Echo Reply" and another of the type "Echo Request".
4. Now select the CP in the S7 station.
5. Enable the advanced firewall mode in the local security settings of the CP in the "Security
> Firewall" parameter group.
6. Open the "IP rules" parameter group.
7. In the table, insert a new IP rule for the previously created global services as follows:
– Action: Allow; "From external -> To station " with the globally created "Echo request"
service
– Action: Allow; "From station -> to external" with the globally created "Echo reply"
service
8. For the IP rule for the Echo Request, enter the IP address of the engineering station in
"Source IP address". This ensures that only ICMP frames (ping) from your engineering
station can pass through the firewall.
Communications problems if the value for system events is set too high
4.5
Time-of-day synchronization
General rules
Note
Recommendation for setting the time
Synchronization with a external clock at intervals of approximately 10 seconds is
recommended. This achieves as small a deviation as possible between the internal time
and the absolute time.
Note
Special feature of time-of-day synchronization using NTP
If the option "Accept time from non
response is as follows:
If the CP receives a time of day frame from an unsynchronized NTP server with stratum
16, the time of day is not set according to the frame. In this case, none of the NTP
servers is displayed as "NTP master" in the diagnostics; but rather only as being
"re
Security
Note
Ensuring a valid time of day
If you use security functions, a valid time of day is extremely important. If you do not obtain
the time
NTP
4.5 Time-of-day synchronization
If the value for filtering the system events is set too high, you may not be able to achieve the
maximum performance for the communication. The high number of output error messages
can delay or prevent the processing of the communications connections.
In "Security > Log settings > Configure system events", set the "Level:" parameter to the
value "3 (Error)" to ensure the reliable establishment of the communications connections.
The CP supports the following mode for timeofday synchronization:
● NTP mode (NTP: Network Time Protocol)
-synchronized NTP servers" is not selected, the
achable".
In the extended NTP configuration, you can create and manage additional NTP servers.
-of-day from the station (CPU), we therefore recommend that you use the
Note that in STEP 7 you cannot use different versions of a program block in a station.
Supported program blocks for OUC
TSEND_C V3.1 / TRCV_C V3.1
TCON V4.0 / TDISCON V2.1
TUSEND V4.0 / TURCV V4.0
4.6 Program blocks for OUC
For more detailed information on configuration, refer to the STEP 7 online help of the "Timeof-day synchronization" parameter group.
The instructions (program blocks) listed below are required for the following communication
services via Ethernet:
● ISO transport
● TCP
● ISO-on-TCP
● UDP (Multicast)
● E-mail
For this, create suitable program blocks. The program block can be found in STEP 7 in the
"Instructions > Communication > Open user communication" window.
You will find details on the program blocks in the information system of STEP 7.
The following instructions in the specified minimum version are available for programming
Open User Communication:
●
Compact blocks for connection establishment/termination and for sending and receiving
data
If an existing connection is aborted by the communications partner or due to disturbances on
the network, the connection must also be terminated by calling TDISCON. Make sure that
you take this into account in your programming.
Connection descriptions in system data types (SDTs)
Creating an SDT for the data blocks
4.6 Program blocks for OUC
●
Sending and receiving data via TCP or ISOonTCP
●
Sending e-mails
Note the description of TMAIL_C as of version V4.0 in the STEP 7 information system.
Connections are established using the program block TCON. Note that a separate program
block TCON must be called for each connection.
A separate connection must be established for each communications partner even if
identical blocks of data are being sent.
After a successful transfer of the data, a connection can be terminated. A connection is also
terminated by calling "TDISCON".
For the connection description, the blocks listed above use the parameter CONNECT (or
MAIL_ADDR_PARAM with TMAIL_C). The connection description is stored in a data block
whose structure is specified by the system data type (SDT).
You create the SDT required for every connection description as a data block. You generate
the SDT type in STEP 7 by entering the name (e.g. "TCON_IP_V4") in the "Data type" box
manually in the declaration table of block instead of selecting an entry from the "Data type"
drop-down list. The corresponding SDT is then created with its parameters.
You can use the version V2.x of FTP_CMD in a station only in conjunction with a CPU and a
CP V2.x V2.x.
As soon as the station obtains a CPU V1.x or CP V1.x, you must use FTP_CMD in the older
version V1.x (e.g. V1.4). To do this, change the version of the "SIMATIC
V3.4. You can then select an older ver
The table below shows the compatibility.
FTP_CMD
CPU
CP 1543-1
V1.5
V1.x
Any
V1.5
Any
V1.x
V2.0
V2.x
V2.x
Note
FTPS: Comparing certificates
FTPS requires a comparison of the certificates between FTP server and FTP client. If the
FTP server is configured outside the STEP 7 project of the FTP client, the certificate needs
to be imported from the FTP server. Import the certificate of the FTP serv
certificate in the certificate manager.
How it works
4.7 Setting up FTP communication
Using the FTP_CMD instruction, you can establish FTP connections and transfer files from
and to an FTP server.
NET CP" library to
sion of the block.
Table 4- 1 Compatibility of the block FTP_CMD with versions of the CPU and CP
Data transfer is possible using FTP or FTPS (secure SSL connections).
er as a trusted
The FTP_CMD instruction references a job block (ARG) in which the FTP command is
specified. Depending on the type of FTP command (CMD), this job block uses different data
structures for parameter assignment. Suitable data types (UDTs) are available for these
various structures.
The following diagram shows the call structure:
47
Page 48
Configuration, programming
Job blocks
Data transfer in the File_DB
Requirements in the CPU configuration
FTP access using the FTP_CMD instruction - parameters for command types NOOP and QUIT
4.7 Setting up FTP communication
The following data structures are used for the job blocks:
● Connection establishment
Various data structures are available for the connection establishment using the following
types of access:
– FTP_CONNECT_IPV4: Connection establishment with IP addresses according to IPv4
– FTP_CONNECT_IPV6: Connection establishment with IP addresses according to IPv6
– FTP_CONNECT_NAME: Connection establishment with server name (DNS)
● Data transfer
For the data transfer, two different data structures are available:
– FTP_FILENAME: Data structure for access to a complete file
– FTP_FILENAME_PART: Data structure for read access to a data area
The data transfer is achieved using data blocks containing a header for job data and the
area for the user data. The data block is specified in the job buffer.
Use the following settings to allow FTP access:
● For all data blocks being used as file DBs, disable the "Optimized block access" attribute.
● Only when using a CPU V1.x and a CP V1.1.x:
Enable the "Access via PUT/GET communication" option in the configuration data of the
CPU under "Protection & Security" (PUT/GET must be released).
Supply the FTP_CMD with a reference to a job block with the following command types as
well:
Note
Response if the reference to the FTP job block is missing
If this reference is not supplied, the command is not executed. The instruction remains
blocked in an apparent execution
interface.
Evaluating the "LOCKED" and "NEW" status bits from the FTP_CMD program block
Note
Avoiding data inconsistency
Make sure that you do not access the same file DB more than once at the same time.
4.7.2
Configuring the FTP server function
CP configuration
4.7 Setting up FTP communication
CMD = 0 (NOOP)
CMD = 5 (QUIT)
The content of the job block is not evaluated when these command types execute, the type
(UDT) of the specified job block is therefore unimportant.
status without any feedback to the user program on the
● In version 1.2 of the "FTP_CMD" program block, the status bits "LOCKED" and "NEW" of
the FILE_DB_HEADER are not evaluated.
With the functions of the FTP server or when using the same file DB, the possibility of
multiple simultaneous access to the same data area cannot be excluded. This can lead to
data inconsistency.
● As of version 1.5 of the "FTP_CMD" program block, the status bits "LOCKED" and "NEW"
of the FILE_DB_HEADER are set correctly. The two status bits are evaluated. Version 1.5
is available as of STEP 7 Professional V12 SP1.
Configure the FTP server function of the CP in the following parameter group.
● With security functions disabled: "FTP server configuration"
● With security functions enabled: "Security > FTP server configuration"
Requirements in the CPU configuration and programming
S7-1500 CP as FTP server
RAM of the CP
Data blocks of the CPU
SIMATIC memory card of the CPU
Note
FTP access to the SIMATIC memory card of the CPU: CPU STOP possible
Note that the cards have a limited capacity If the memory space of the SIMATIC memory
card is completely occupied due to storage of large amounts of data, the CPU changes to
STOP.
•
•
4.7 Setting up FTP communication
Use the following settings to allow FTP access:
● In the CPU configuration in "Protection & Security > Connection mechanisms":
Disable the option "Access via PUT/GET communication...".
● As file DBs create data blocks of the type "Array of byte".
● For all data blocks being used as file DBs, disable the "Optimized block access" attribute.
The functionality described here allows you to transfer data in the form of files to or from an
S7-1500 station using FTP commands. At the same time, the conventional FTP commands
for reading, writing and managing files can also be used.
Access to the following data of the S7-1500 is possible:
●
Name of the directory:
/ram
●
Name of the directory:
/cpu1 / DBx
"DBx" is the name of the relevant data block e.g. DB10.
●
The function is supported as of CP firmware V2.0 and CPU firmware V2.0.
Name of the directory:
/mmc_cpu1
Access to the following folders of the SIMATIC memory card is possible:
– /DATALOGS
Directory for log files
– /RECIPES
Directory for recipe files
Use a card with adequate storage capacity. Avoid writing large amounts of data often to the SIMATIC memory card using FTP.
To transfer data with FTP via data blocks, create the required DBs in the CPU. Due to their
special structure, these are known as file DBs.
When it receives an FTP command, the CP acting as FTP server queries its assignment
table to find out how the data blocks used for file transfer in the CPU will be mapped to files.
You make the data block assignment in the STEP 7 configuration of the CP (FTP
configuration).
Figure 4-1 S7 CPU with CP 1543-1 as FTP server for the S7 CPU data
The fields of the table in the data block assignment in STEP 7 have the following meaning
and syntax:
Keep to the notation (lower case for "cpu" and no leading spaces at the start of the row).
Otherwise, the files will not be recognized.
FTPS access only with security functions enabled
4.8
IP access protection with programmed communications connections
Restrictions with programmed connections and configured security functions
4.8 IP access protection with programmed communications connections
The following applies to the file name of a file DB:
● The file name begins with "cpuX" (where X=1 for S7-1500).
● Length: maximum 64 characters (including "cpuX")
FTPS access to the S7-1500 station as an FTP server is only possible if a user with suitable
rights has been created in the STEP 7 project. This means that the security functions must
be enabled on the CP. For this, security settings are available in the global user
administration.
In principle, it is possible to set up communications connections program-controlled using the
program block TCON and at the same time by configuring the firewall.
When configuring specified connections (active endpoints) in STEP 7, the IP addresses of
the partners are not entered automatically in the firewall configuration.
The configuration of IP access protection and the aspects of activated security are described
in the online help of STEP 7.
You will find detailed information on SNMP and the Siemens Automation MIB in the manual
"Diagnostics and Configuration with SNMP" that you will find on the Internet:
Link: (https://support.industry.siemens.com/cs/ww/en/ps/15392/man)
The CP supports the following SNMP versions:
● SNMPv1
● SNMPv3 (with activated Security functions)
Traps are not supported by the CP.
The CP supports the following MIBs:
●
The CP supports the following groups of MIB objects:
– System
– Interfaces
– IP
– ICMP
– TCP
– UDP
– SNMP
●
●
Note the rights for writing to the MIB objects, see the next section (SNMPv3).
When setting the ISO protocol, remember that MAC address set previously during
configuration is transferred by the CPU to the new CP module.
Module replacement: Special feature of IP address assignment from a DHCP server (IPv4)
Note
Recommendation: Configuring a client ID
When replacing modules, remember that the factory
different from the previous module. When the factory
sent to the DHCP server, this will return either a different or no
Ideally, you should therefore configure IP as follows:
• Always configure a client ID and configure your DHCP server accordingly. This makes
If, in exceptional situations, you have configured a new MAC address instead of the MAC
address set in the factory, the configured MAC address will always be transferred to the
DHCP server. In this case, the new CP also has the same IP addre
module.
5.3 Replacing a module without a programming device
The configuration data of the CP is stored on the CPU. This makes it possible to replace this
module with a module of the same type (identical article number) without a PG.
During configuration of the CP you can specify the IP configuration in the properties dialog;
one option is to obtain the IP address from a DHCP server.
sure that after replacing the module, you always obtain the same IP address from the
DHCP server.
Note
Issued approvals on the type plate of the device
The specified approvals
been obtained when there is a corresponding mark on the product. You can check which of
the following approvals have been granted for your product by the markings
plate. The approvals for shipbuilding are an exception to this.
Certificates for shipbuilding and national approvals
EC declaration of conformity
2014/34/EU (ATEX explosion protection directive)
2014/30/EU (EMC)
2011/65/EU (RoHS)
- with the exception of the certificates for shipbuilding - have only
on the type
The device certificates for shipbuilding and special national approvals can be found in
Siemens Industry Online Support on the Internet:
Link: (https://support.industry.siemens.com/cs/ww/en/ps/15340/cert)
The product meets the requirements and safety objectives of the following EC directives and
it complies with the harmonized European standards (EN) for programmable logic controllers
which are published in the official documentation of the European Union.
●
Directive of the European Parliament and the Council of 26 February 2014 on the
approximation of the laws of the member states concerning equipment and protective
systems intended for use in potentially explosive atmospheres, official journal of the EU
L96, 29/03/2014, pages. 309-356
●
EMC directive of the European Parliament and of the Council of February 26, 2014 on the
approximation of the laws of the member states relating to electromagnetic compatibility;
official journal of the EU L96, 29/03/2014, pages. 79-106
●
Directive of the European Parliament and of the Council of 8 June 2011 on the restriction
of the use of certain hazardous substances in electrical and electronic equipment
The EC Declaration of Conformity is available for all responsible authorities at:
Siemens Aktiengesellschaft
Division Process Industries and Drives
Process Automation
You will find the EC Declaration of Conformity on the Internet at the following address:
Link: (https://support.industry.siemens.com/cs/ww/en/ps/15340/cert)
The current versions of the standards can be seen in the EC Declaration of Conformity and
in the certificates.
The product meet the requirements of explosion protection according to IECEx.
IECEx classification: Ex nA IIC T4 Gc
The product meets the requirements of the following standards:
● EN 60079-0
Hazardous areas - Part 0: Equipment - General requirements
● EN 60079-15
Explosive atmospheres - Part 15: Equipment protection by type of protection 'n'
You can see the current versions of the standards in the IECEx certificate that you will find
on the Internet at the following address:
Link: (https://support.industry.siemens.com/cs/ww/en/ps/15340/cert)
The conditions must be met for the safe deployment of the product according to the section
Notes on use in hazardous areas according to ATEX / IECEx (Page 26).
You should also note the information in the document "Use of subassemblies/modules in a
Zone 2 Hazardous Area" that you will find on the Internet at the following address:
Link: (https://support.industry.siemens.com/cs/ww/en/view/78381013)
The product meets the requirements of the EC directive:2014/34/EC "Equipment and
Protective Devices for Use in Potentially Explosive Atmospheres".
Applied standards:
● EN 60079-0
Hazardous areas - Part 0: Equipment - General requirements
● EN 60079-15
Explosive atmospheres - Part 15: Equipment protection by type of protection 'n'
The current versions of the standards can be seen in the EC Declaration of Conformity, see
above.
ATEX approval: II 3 G Ex nA IIC T4 Gc
Test number: DEKRA 12 ATEX 0240X
The conditions must be met for the safe deployment of the product according to the section
Notes on use in hazardous areas according to ATEX / IECEx (Page 26).
You should also note the information in the document "Use of subassemblies/modules in a
Zone 2 Hazardous Area" that you will find here:
● In the SIMATIC NET Manual Collection in
"All documents" > "Use of subassemblies/modules in a Zone 2 Hazardous Area"
● On the Internet at the following address:
Link: (https://support.industry.siemens.com/cs/ww/en/view/78381013)
Until 19.04.2016 the product meets the requirements of the EC Directive 2014/30/EU
"Electromagnetic Compatibility” (EMC directive).
Applied standards:
● EN 61000-6-4
Electromagnetic compatibility (EMC) - Part 6-4: Generic standards - Emission standard
for industrial environments
● EN 61000-6-2
Electromagnetic compatibility (EMC) - Part 6-2: Generic standards - Immunity for
industrial environments
The product meets the requirements of the EC directive 2011/65/EU on the restriction of the
use of certain hazardous substances in electrical and electronic equipment.
Applied standard:
● EN 50581:2012
Applied standards:
● Underwriters Laboratories, Inc.: UL 61010-1 (Safety Requirements for Electrical
Equipment for Measurement, Control, and Laboratory Use - Part 1: General
Requirements)
● IEC/UL 61010-2-201 (Safety requirements for electrical equipment for measurement,
control and laboratory use. Particular requirements for control equipment)
● Canadian Standards Association: CSA C22.2 No. 142 (Process Control Equipment)
Report / UL file: E 85972 (NRAG, NRAG7)
Underwriters Laboratories, Inc.: cULus IND. CONT. EQ. FOR HAZ. LOC.
This class A digital device meets the requirements of the Canadian standard ICES-003.
Cet appareil numérique de la classe A est conforme à la norme NMB-003 du Canada.
이 기기는 업무용(A급) 전자파 적합기기로서 판매자 또는 사용자는 이 점을 주의하시기
바라며, 가정 외의 지역에서 사용하는것을 목적으로 합니다.
Note that in terms of the emission of interference, this device corresponds to limit class A.
This device can be used in all areas except for residential environments.
SIMATIC NET products are regularly submitted to the relevant authorities and approval
centers for approvals relating to specific markets and applications.
If you require a list of the current approvals for individual devices, consult your Siemens
contact or check the Internet pages of Siemens Industry Online Support:
Completeness of the STEP 7 project data, 28
Configuration, 28
Configuration and downloading the configuration
data, 20
Configuration of the Ethernet interface, 21
Instruction, 21
Connecting a switch, 34
Connection resources of the CPU, 16
Connections for Web
Data storage of the configuration data of the CP, 56
DHCP server, 56
Diagnostics options, 53
Disposal, 5
Double addressing in the network, 35
Downloading project data, 28
Downloads, 10
Number, 19
ISO, 21
ISO transport (complying with RFC 8073), 12
ISO transport connections, 17
ISO-on-TCP, 21
ISO-on-TCP (acc. to RFC 1006), 12
ISO-on-TCP connections, 17
IT functions, 13