indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
Qualified Personnel
personnel qualified
Proper use of Siemens products
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
maintenance are required to ensure that the products operate safely and without any problems. The permissible
ambient conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
Disclaimer of Liability
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
The product/system described in this documentation may be operated only by
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Note the following:
documentation. If products and components from other manufacturers are used, these must be recommended
or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
for the specific
01/2017 Subject to change
Page 3
Preface
Validity of this manual
CP 1542SP-1
6GK7542-6UX00-0XE0
CP 1542SP-1 IRC
6GK7542-6VX00-0XE0
CP 1543SP-1
6GK7543-6WX00-0XE0
This document contains information on the following modules:
●
Article number
Hardware version 1
Firmware version V1.0
Communications processor for connecting a SIMATIC ET 200SP CPU to Industrial
Ethernet
●
Article number
Hardware version 1
Firmware version V1.0
Communications processor for connecting a SIMATIC ET 200SP CPU via Industrial
Ethernet to a control room (TCSB, DNP3, IEC 60870-5-104)
●
Article number
Hardware version 1
Firmware version V1.0
Communications processor for connecting a SIMATIC ET 200SP CPU to Industrial
Ethernet, Security
Figure 1 CP 1542SP-1 with plugged in bus adapter (here 2xRJ-45)
On the front of the module at the right edge, the hardware version is printed as a placeholder
"X". If the printed text is, for example, "X 2 3 4", "X" would be the placeholder for hardware
product version 1.
3
Page 4
Preface
Product names, terms and abbreviations/acronyms
CP
TCSB
Telecontrol server
Purpose of the manual
Required experience
New in this issue
Replaced edition
Directly below, you will find the firmware version of the CP as it shipped.
The MAV address is printed on the front at the bottom left, above the connectors for the
power supply.
Below you will find terms and abbreviations/acronyms used often in this manual.
●
When the property being described is valid in the current context for all three CP types or
if the CP type being used is clear from the context, the abbreviation "CP" will be used
instead of the three following product designations
– CP 1542SP-1
– CP 1542SP-1 IRC
– CP 1543SP-1
If information applies only to a certain product variant. the full module name is specified.
●
Control center software "TeleControl Server Basic"
●
PC with installed software "TeleControl Server Basic"
This manual describes the properties of this module and supports you when installing and
commissioning it.
The required configuration steps are described as an overview and there are explanations of
the relationship between firmware functions and configuration.
You will also find information about the diagnostics options of the device.
To install, commission and operate the CP, you require experience in the following areas:
In this manual there are often cross references to other sections.
To be able to return to the initial page after jumping to a cross reference, some PDF readers
support the command <Alt>+<Left arrow>.
You will find an overview of further reading and references in the Appendix of this manual.
You will find license conditions in the following document on the supplied data medium:
● OSS_CP-ET200SP_86.pdf
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is
necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens’ products and solutions only form one element of such a concept.
Customer is responsible to prevent unauthorized access to its plants, systems, machines
and networks. Systems, machines and components should only be connected to the
enterprise network or the internet if and to the extent necessary and with appropriate security
measures (e.g. use of firewalls and network segmentation) in place.
ions for open source software carefully before using the product.
Additionally, Siemens’ guidance on appropriate security measures should be taken into
account. For more information about industrial security, please visit
Link: (http://www.siemens.com/industrialsecurity)
Siemens’ products and solutions undergo continuous development to make them more
secure. Siemens strongly recommends to apply product updates as soon as available and to
5
Page 6
Preface
Firmware
SIMATIC NET glossary
Training, Service & Support
always use the latest product versions. Use of product versions that are no longer supported,
and failure to apply latest updates may increase customer’s exposure to cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS
Feed under
Link: (http://www.siemens.com/industrialsecurity).
The firmware is signed and encrypted. This ensures that only firmware created by Siemens
can be downloaded to the device.
Explanations of many of the specialist terms used in this documentation can be found in the
SIMATIC NET glossary.
You will find information on training, service and support in the multilanguage document
"DC_support_99.pdf" on the Internet pages of Siemens Industry Online Support:
A Approvals ............................................................................................................................................ 111
B Dimension drawings ............................................................................................................................ 115
C Accessories ........................................................................................................................................ 117
D Documentation references .................................................................................................................. 119
The following components are supplied with the product:
● CP 154xSP-1
● Plug for the socket of the power supply (24VDC) of the CP
● DVD with documentation and license texts
A BusAdapter for the Ethernet connection of the CP does not ship with the product.
The CP is used to connect the ET 200SP to Industrial Ethernet via a copper cable or fiberoptic cable. It can be used as an additional Ethernet interface of the CPU for S7
communication.
For the Ethernet connection, the CP requires a bus adapter that does not ship with the
product.
The three CP variants are intended for the following communication tasks:
●
The CP 1542SP-1 allows the ET 200SP a further Ethernet connection.
●
The CP 1542SP-1 IRC supports telecontrol communication for connecting the ET 200SP
CPU to a control center. The following telecontrol protocols can be used as alternatives:
– TeleControl Basic
For connection of the ET 200SP to a master station with telecontrol server
(TCSB V3 SP3)
– DNP3
For connection of the ET 200SP to a master station with DNP3 masters
– IEC 60870-5-104
For connection of the ET 200SP to a master station with IEC masters
●
The CP 1543SP-1 has Security functions for network security, such as a firewall and
VPN. This makes protected access to the ET 200SP possible.
1.4 Telecontrol communication of the CP 1542SP-1 IRC
In addition to the communications services named above, the CP 1542SP-1 IRC supports
the following telecontrol protocols for communication with a master station:
●
This is a proprietary protocol of Siemens for telecontrol applications. The IP-based
protocol is used to connect the CP to the application TCSB.
TCSB is installed on a PC in the master station, the telecontrol server. Via the OPC-DA or
OPC-UA server of TCSB, an OPC client can access the process data of the CP.
TCSb is supported as of the following version: V3.0 + SP3
For the TCSB manual, see /3/ (Page 120).
●
The CP functions as a DNP3 station (Outstation).
Communication is based on the DNP3 SPECIFICATION Version 2.11 (2007/2009).
You will find a detailed overview of the attributes and properties specified in the DNP3
protocol and supported by the CP in the DNP3 device profile, see Link:
(https://support.industry.siemens.com/cs/ww/en/ps/22143/man).
You will find the supported object groups and variations in the section Datapoint types
(Page 59).
Communications partner (DNP3) can be:
– SIMATIC PCS7 TeleControl
– SIMATIC WinCC TeleControl
– SIMATIC WinCC OA
– A TIM module with DNP3 capability (TIM 3V IE DNP3 / TIM 4R IE DNP3)
For the manual of the TIM module see /5/ (Page 120).
– Third-party systems that support the DNP3 specification named above.
●
The CP functions as a substation (slave).
Communication is based on the specification IEC 60870-5 Part 104 (2006).
You will find a detailed overview of the attributes and properties specified in the IEC
specification and supported by the CP in the IEC device profile, see Link:
(https://support.industry.siemens.com/cs/ww/en/ps/22143/man).
You will find the supported IEC type identifiers as in the section Datapoint types
(Page 59).
– Third-party systems that support the DNP3 specification named above.
●
The process values are configured as data points for the communication. The data points
access PLC tags in the CPU. The data points can be processed one-to-one in the control
system.
●
With configurable events in the process image of the CPU, the CP 1542SP-1 IRC can
send messages as e-mails. The data sent by e-mail is configured using PLC tags.
●
The CP 1542SP-1 IRC can store events of different classes and transfer them together to
the communications partner.
●
Analog values can be preprocessed on the CP 1542SP-1 IRC according to various
methods.
●
– Address types
The CP supports IP addresses according to IPv4 and IPv6.
– Addressing
The IP address, the subnet mask and the address of a gateway can be set manually
in the configuration. As an alternative, the IP address can be obtained using program
blocks.
– DHCP: As an alternative, the IP address can be obtained from a DHCP server.
– DCP (Discovery and Configuration Protocol) is supported.
●
– NTP
On the Ethernet interface, the CP can synchronize its time of day via NTP.
When telecontrol communication is enabled, the CP always obtains its local time of
day as UTC time from the communications partner. The time of day of the CP can be
read by the CPU using a PLC tag. For information on the format of the time stamp of
the data frames, refer to the section Datapoint types (Page 59).
If telecontrol communication is disabled, the CP can synchronize its time of day via
NTP.
– Only CP 1543SP-1
If the Security functions are enabled, the secure method NTP (secure) can be used.
For more information, refer to the section Time-of-day synchronization (Page 43).
●
As SNMP agent, the CP supports queries via SNMPv1.
The CP 1543SP-1 also supports SNMPv3.
For more detailed information, refer to section SNMP (Page 45).
The Security functions described below are enabled in the configuration for the relevant CP.
For information on the Securityfunctions of Open User Communication, refer to the section
Programming (OUC) (Page 95).
●
For secure transfer of information with encrypted e-mails you have the alternative of
using:
– SSL/TLS
– STARTTLS
For information on the configuration, refer to the section Security > E-mail configuration
(Page 86).
Security recommendations (Page 39).
●
For the secure authentication of the communications partners, certificates are used.
The telecontrol protocols provide the following Security functions:
– TeleControl Basic
As an integrated security function, the telecontrol protocol encrypts the data for
transfer between the CP and telecontrol server. The interval for the key exchange
between CP and telecontrol server is set to 1 hour.
The telecontrol password is used to authenticate the CP with the telecontrol server
– DNP3
The CP supports the Security mechanisms listed in the specification.
With Industrial Ethernet Security, individual devices, automation cells or network segments
of an Ethernet network can be protected. The data transfer via the CP 1543SP-1 can be
protected from the following attacks by a combination of different security measures:
● Data espionage
● Data manipulation
● Unauthorized access
Secure underlying networks can be operated via additional Ethernet/PROFINET interfaces of
the CPU.
As a result of using the CP, as a security module, the following security functions are
accessible to the ET 200SP station on the interface to the Ethernet network:
●
The firewall protects the device with:
– IP firewall with stateful packet inspection (layer 3 and 4)
– Firewall also for "non-IP" Ethernet frames according to IEEE 802.3 (layer 2)
– Limitation of the transmission speed ("Bandwidth limitation")
●
For the secure authentication of the communications partners, certificates are used.
●
VPN tunnel communication allows the establishment of secure IPsec tunnels for
communication with one or more security modules. The CP can be put together with
other modules to form VPN groups during configuration. IPsec tunnels (VPN) are created
between all security modules of a VPN group.
●
To allow monitoring, events can be stored in log files that can be read out using the
configuration tool or can be sent automatically to a Syslog server.
●
For secure transfer during time-of-day synchronization
For secure transmission of network analysis information safe from eavesdropping
For information on configuring the security functions, refer to the section Security
configuration(CP 1543SP-1) (Page 86).
You will find further information on the functionality and configuration of the security functions
in the information system of STEP 7 and in the manual /4/ (Page 120).
In each ET 200SP station, up to three special modules can be plugged in and configured;
this allows a maximum of two CP 154xSP-1 modules.
For details of the permitted special modules and the slot rules, refer to section Installing the
CP (Page 32).
Number of connections via Industrial Ethernet in total maximum of 32,
of which:
● S7: Max. 16
● TCP/IP: Max. 32
● ISO-on-TCP: Max. 32
● UDP: Max. 32
● Online connections of the engineering station (STEP 7): Max. 2
● TCP connections for HTTP
For HTTP access upp to 12 TCP connection resources are available that are used by one
or more Web browsers to display data of the CP.
● PG/OP connections (HMI): In total maximum of 16,
of which:
– Connection resources for PG connections: Max. 16
– Connection resources for OP connections: Max. 16
Only CP 1542SP-1 IRC
The CP has a frame memory (send buffer) for the values of data points configured as an
event.
The volume of the send buffer is divided equally among all configured communications
partners.
The size of the send buffer can be configured in STEP 7, refer to the section Communication
with the CPU (Page 56).
The maximum size of the send buffer depends on the telecontrol protocol being used and is
as follows:
● TeleControl Basic
64000 events
● DNP3
100000 events
● IEC 60870-5-104
100000 events
You will find details of how the send buffer works such as storing events as well as the
options for transferring the data in the section Process image, types of transmission, event
classes, triggers (Page 63).
Only CP 1542SP-1 IRC
With telecontrol communication enabled, up to 10 messages can be configured in STEP 7.
The messages are sent as e-mails.
Only CP 1542SP-1 IRC
●
– TeleControl Basic
A connection can be established to a single or redundant telecontrol server.
– DNP3
Connections to up to four masters can be established.
– IEC 60870-5-104
Connections to up to four masters can be established.
●
The data to be transferred by the CP is assigned to various data points in the STEP 7
configuration. The size of the user data per data point depends on the data type of the
relevant data point. You will find details in the section Datapoint types (Page 59).
The maximum number of configurable data points is 500.
In the allocation of the internal CP memory for data points, the length of the data point
name is also included. See also the note in section Configuring the data points (Page 57).
Further parts and modules that are also required to set up the ET 200SP station, such as
rails, I/O modules or cabling are not listed here. See also /2/ (Page 119) for information on
this.
Components required by the communications partners of the CP 1542SP-1 IRC are not
listed here. You will find references to other products (e.g. TCSB) in the list of references in
the appendix of the manual.
To configure the CP, the following configuration tool is required:
● STEP 7 Professional as of version 14.
To use the online functions, the following software is required:
● STEP 7 in the version specified above
To use the CP, a CPU 151xSP with a firmware version ≥ V2.0 is required.
You will find telecontrol protocols supported by the CP in the section Telecontrol
communication of the CP 1542SP-1 IRC (Page 13).
Below you will find configuration examples for the use of the three CP variants.
The CP is used in the ET 200SP to operate lower-level networks separately or to achieve
separation from the higher-level network.
The ET 200SP can be expanded flexibly with further Ethernet interfaces via the CP. The
network separation allows the setting up of identical machines with the same IP address.
The CP takes over the communication and relieves the CPU.
CP 1543SP-1 - Cell protection with Security functions
1.9 Configuration examples
Figure 1-1 Configuration example of an ET 200SP with CP 1542SP-1
The CP communicates encrypted with communications partners in the connected network.
The firewall monitors the access to the ET 200SP and therefore protects lower-level
networks. This avoids data loss, disruptions of production and damage to machines.
Figure 1-2 Configuration example of an ET 200SP with CP 1543SP-1
There is a maintenance request from the CP.
Example:
• End of the firmware update
25
Page 26
LEDs and connectors
LEDs of the bus adapter
LK
(green)
Meaning
2.2
Power supply
External power supply required
2.2 Power supply
Every port of a bus adapter has an LED "LKx" that informs about the connection status with
Ethernet and the frame traffic of the port.
Table 2- 3 Meaning of the LED displays of the bus adapters
No Ethernet connection. Possible causes:
• No physical connection to the network
• Port disabled in the configuration
LED flashing test
There is an Ethernet connection between the port and communications partner.
The connector for the external 24 VDC power supply is located on the front of the CP.
Figure 2-1 Power supply of the CP
Connector X80 is intended for connection to a single or redundant power supply. The power
supply is connected to the CP with the supplied plug-in terminal block. The terminal block is
plugged in to the socket X80 of the CP.
For information on installing and connecting up, refer to the sections Installing the CP
(Page 32) and Connecting the CP (Page 36).
The plug-in terminal block for connector X80 is designed so that it can only be plugged in in
one position. This provides constructional reverse polarity protection.
The connector X80 also has electronic reverse polarity protection.
You will find further data on the power supply in section Technical specifications (Page 109).
For connecting to Ethernet the CP requires a BusAdapter. A BusAdapter does not ship with
the CP.
The slot is on the front of the device:
Figure 2-2 Front of the CP, the slot for the bus adapter is marked gray.
You will find the bus adapters supported by the CP in section BusAdapter (Page 117).
For information on installing and connecting up, refer to the sections Installing the CP
(Page 32) and Connecting the CP (Page 36).
You will find the pinout of the Ethernet interface in section Assignment of the Ethernet
interface of the bus adapter (Page 118). You will find further technical specifications of the
bus adapter in the manual /2/ (Page 119).
Note the following safety notices when setting up and operating the device and during all
associated work such as installation, connecting up or replacing the device.
If power is supplied to the module or station over longer power cables or networks, the
coupling in of strong electromagnetic pulses onto the power supply cables is possible. This
can be caused, for example by lightning strikes or switching of higher loads.
The connector of the external power supply is not protected from strong electromagnetic
pulses. To protect it, an external overvoltage protection module is necessary. The
requirements of EN61000-4-5, surge immunity tests on power supply lines, are met only
when a suitable protective element is used. A suitable device is, for example, the Dehn
Blitzductor BVT AVD 24, article number 918 422 or a comparable protective element.
The equipment is designed for operation with Safety Extra-Low Voltage (SELV) by a
Limited Power Source (LPS).
This means that only SELV / LPS complying with IEC 60950-1 / EN 60950-1 / VDE 0805-1
must be connected to the power supply terminals. The power supply unit for the equipment
power supply must comply with NEC Class 2, as described by the National Electrical Code
(r) (ANSI / NFPA 70).
If the equipment is connected to a redundant power supply (two separate power supplies),
both must meet these requirements.
Do not connect or disconnect cables to or from the device when a flammable or
combustible atmosphere is present.
Replacing components may impair suitability for Class 1, Division 2 or Zone 2.
When used in hazardous environments corresponding to Class I, Division 2 or Class I,
Zone 2, the device must be installed in a cabinet or a suitable enclosure.
In the ATEX and IECEx area of application only the Siemens DIN rail 6ES5 710-8MA11
may be used to mount the modules.
Notes on use in hazardous areas according to ATEX / IECEx
WARNING
Requirements for the cabinet/enclosure
WARNING
WARNING
3.1.3
Notes on use in hazardous areas according to UL HazLoc
WARNING
EXPLOSION HAZARD
3.1 Important notes on using the device
To comply with EU Directive 94/9 (ATEX95), the enclosure or cabinet must meet the
requirements of at least IP54 in compliance with EN 60529.
If the cable or conduit entry point exceeds 70 °C or the branching point of conductors
exceeds 80 °C, special precautions must be taken. If the equipment is operated in an air
ambient in excess of 50 °C, only use cables with admitted maximum operating temperature
of at least 80 °C.
Take measures to prevent transient voltage surges of more than 40% of the rated voltage.
This is the case if you only operate devices with SELV (safety extra-low voltage).
DO NOT DISCONNECT WHILE CIRCUIT IS LIVE UNLESS AREA IS KNOWN TO BE
NON-HAZARDOUS.
This equipment is suitable for use in Class I, Division 2, Groups A, B, C and D or nonhazardous locations only.
This equipment is suitable for use in Class I, Zone 2, Group IIC or non-hazardous locations
only.
General notices on use in hazardous areas according to FM
WARNING
EXPLOSION HAZARD
WARNING
EXPLOSION HAZARD
3.2
Installing the CP
NOTICE
Install and remove the CP only when the power is off
Note
Note the installation guidelines
When installing and connecting up the CP note the instructions in the manual
3.2 Installing the CP
You may only connect or disconnect cables carrying electricity when the power supply is
switched off or when the device is in an area without inflammable gas concentrations.
This equipment is suitable for use in Class I, Division 2, Groups A, B, C and D or nonhazardous locations only.
This equipment is suitable for use in Class I, Zone 2, Group IIC or non-hazardous locations
only.
The equipment is intended to be installed within an ultimate enclosure. The inner service
temperature of the enclosure corresponds to the ambient temperature of the module. Use
installation wiring connections with admitted maximum operating temperature of at least
30 ºC higher than maximum ambient temperature.
Switch off the power supply of the ET 200SP and the CP before you install or remove
modules. Installing and removing modules with the power supply on can lead to damage to
the modules and to loss of data.
Installation location - Dependency of the temperature range
Installation of the rack
Installation position of the CP
Slot rules
3.2 Installing the CP
The module must be installed so that its upper and lower ventilation slits are not covered,
allowing adequate ventilation. Above and below the modules, there must be a clearance of
25 mm to allow air to circulate and prevent overheating.
Note the dependency of the permitted temperature range of the installation location.
• Horizontal installation of the rack (DIN rail) means vertical position of the CP.
• Vertical installation of the rack (DIN rail) means horizontal position of the CP.
You will find the permitted temperature ranges in the section Technical specifications
(Page 109).
Horizontal installation of the rack
Vertical installation of the rack
The CPU always occupies slot 1. In an ET 200SP you can plug in up to three of the following
modules in slots 1 ... 4 (see figure) to the right of the CPU:
● CMs
● CPs
● BusAdapter Send
Of these three modules, up to two CP 154xSP-1 modules can be plugged in. These two CPs
can be of the same type or different.
The securing screw is located at the top left on the front of the bus adapter.
To do this use a screwdriver with 3 to 3.5 mm blade width or a suitable Torx screwdriver
(T15).
The maximum tightening torque is 0.25 Nm.
35
Page 36
Installation and connecting up
Removal from the DIN rail
3.3
Connecting the CP
Order of the work
NOTICE
Connection only with power off
Power supply at connector X80
3.3 Connecting the CP
4. Plug the connector of the connecting cable into the socket of the bus adapter if you use a
bus adapter with plug.
For information on plugging in the bus adapter and fitting cables see also the manual /2/
(Page 119).
Follow the steps below to remove a CP from the DIN rail:
1. Turn off the power supply to the entire station including the CP and CPU.
2. Activate the mounting rail release of the modules to be moved (CPU, CPs) and move
them parallel to the left until they are released from the remaining module group (free
space approx. 16 mm).
Press the locking slide marked "PUSH" on the top of a module down to be able to move
the module in the DIN rail.
3. Activate the mounting rail release on the CP and move it to the right until it is released
from the CPU (free space approx. 8 mm).
4. While holding the mounting rail release on the CP, swing the CP out of the mounting rail.
Connect the CP only when the power is off. Refer to the information in the system manual,
see /2/ (Page 119).
The bus adapter is already connected to the relevant cable, see section Installing the CP
(Page 32).
1. Connect the external power supply to the terminal block of connector X80.
Use the same power supply as the CPU.
2. Turn the power supply on only after the CP has been completely wired and connected.
You will find the location of the connector X80 four the power supply to the CP in section
Power supply (Page 26). There, you will also find notes on reverse polarity protection..
The 2-terminal plug-in terminal block has the following pin assignment for the socket:
1M / 2M Ground
The two terminals 1L+/L2+ and 1M/2m of the terminal block are each bridged internally so
that you can connect either a single or a redundant power supply.
Connectable cable cross-section
● Without wire end ferrule 0.2 .. 2.5 mm
● With wire end ferrule 0.25 .. 1.5 mm
● With TWIN wire end ferrule: 0.5 .. 1.0 mm
2
/ AWG 24 .. 13
2
/ AWG 24 .. 16
2
/ AWG 20 .. 17
You will find information about the power consumption and further technical details of the
connectors in section Technical specifications (Page 109).
Do not connect the PC directly to the Internet. If a connection from the CP to the Internet is
required, arrange for suitable protection before the CP, for example a SCALANCE S with
firewall or use the CP 1543SP-1.
Use the options for security settings in the configuration of the product. These includes
among others:
● Protection levels
Configure a protection level of the CPU.
You will find information on this in the information system of STEP 7.
● Disabling the bus adapter ports
In the configuration disable a port of the bus adapter being used that is not required.
● Security function of the communication
– Enable the Security functions of the CP and set up the firewall.
If you connect to public networks, you should use the firewall. Think about the services
you want to allow access to the station via public networks. By using the "bandwidth
limitation" of the firewall, you can restrict the possibility of flooding and DoS attacks.
– Use the secure protocol variants NTP (secure) and SNMPv3.
– Use the Security functions of the telecontrol protocols. e.g. the DNP3 Security options.
– Use the secure Open User Communication (Secure OUC) via the appropriate program
blocks.
– Leave access to the Web server of the CPU (CPU configuration) and to the Web
server of the CP disabled.
● Protection of the passwords for access to program blocks
Protect the passwords stored in data blocks for the program blocks from being viewed.
You will find information on the procedure in the STEP 7 information system in the topic
"Know-how protection".
● Logging function
Enable the function in the Security configuration and check the logged events regularly
for unauthorized access.
● Define rules for the use of devices and assignment of passwords.
● Regularly update the passwords to increase security.
● Only use passwords with a high password strength. Avoid weak passwords for example
68 (UDP) Closed Open after configuration (while the
102 (TCP) Open Open after configuration No
8448 (TCP) Closed Open after configuration No
20000 (TCP/UDP)
2404 (TCP)
25 (TCP)
587 (TCP)
Closed Open after configuration Yes, when Security is
Closed Open after configuration No
Closed Closed after configuration No
Closed Closed after configuration No
No
enabled.
You configure the modules and networks in SIMATIC STEP 7. You will find the required
version in the section Software requirements (Page 20). You can configure a maximum of
two CP 154xSP-1 for an ET 200SP.
You will find comprehensive information on configuration in the Information system of
STEP 7 and in the following sections.
Follow the steps below when configuring:
1. Create a STEP 7 project.
2. Insert the required SIMATIC stations.
3. Insert the CPs and the required input and output modules in the stations.
If you want to use IPv6 addresses and connect the CP to the Internet, make sure that the
router connected to the Internet and the providers of the Internet services used (e.g. e
also support IPv6 addresses.
4.3.2
Time-of-day synchronization
Procedure for time-of-day synchronization
Note
Recommendation for setting the time
Synchronization with a external clock at intervals of approximately 10 seconds is
recommended. This achieves as small a deviation as possible between the internal time and
the absolute time.
4.3 Ethernet interface
7. Optional: Create the program blocks for the Open User Communication.
8. Save and compile the project.
Here you will find information on individual parameter groups in the following sections. You
will find information on parameters not described in this manual in the information system of
STEP 7.
Details on the parameters of the telecontrol communication of the CP 1542SP-1 IRC can be
found in the section Telecontrol communication (CP 1542SP-1 IRC) (Page 45).
Details on the parameters of the security functions can be found in the section Security
configuration(CP 1543SP-1) (Page 86).
When you load the station, the project data of the station including the configuration data of
the CP is stored on the CPU. You will find information on loading the station in the STEP 7
information system.
You will find information on configuration in the information system of STEP 7.
You will find the parameter group for time-of-day synchronization under the Ethernet
interface.
If the Security functions are enabled, the parameter group is displayed below "Security".
Note
No forwarding of the time of day with NTP / NTP (secure)
Both the CPU and CP can have the time of day synchronized using NTP. If you enable time
of
server to retain a consistent time
NTP
CP 1542SP-1 IRC
Time from partner
Note
No time-of-day synchronization of the CPU when the time is taken from the CP
When the CPU takes the time fr
day synchronization.
CP 1543SP-1
Note
Ensuring a valid time of day
If you use security functions, a valid time of day is extremely important. It is recommended to
use the NTP
NTP
NTP (secure)
See also
4.3 Ethernet interface
-
-day synchronization for both modules, it is recommended that you use the same NTP
-of-day within the station.
The CP supports the following time-of-day synchronization method:
●
You configure the addresses of the NTP server(s), the synchronization interval and the
"Accept time from non-synchronized NTP servers" option
With telecontrol communication enabled (parameter group "Communication types" the time
of day is normally taken from the partner:
●
The CP sets its clock using the time of day that it receives in frames from the
communications partner.
The CP 1542SP-1 IRC provides the CPU with the option of it taking its time from the CP
using a PLC tag. See section Auto-Hotspot for information on this.
om the CP using a PLC tag, disable the CPU's own time-of-
(secure)NTP (secure) method.
The CP supports the following time-of-day synchronization methods:
●
●
The secure method NTP (secure) uses authentication with symmetrical keys according to
the hash algorithms MD5 or SHA-1.
In the global security settings, you can create and manage additional NTP servers also of
the type NTP (secure).
If the security functions are enabled for the CP
"SNMP" in "Security".
Scope of performance of the CPs
CP 1542SP-1, CP 1542SP-1 IRC
CP 1543SP-1
4.5
Telecontrol communication (CP 1542SP-1 IRC)
4.5.1
Configuration
Data points for telecontrol communication
4.4 SNMP
● "
Releases the function of the SNMP agent on the CP.
" parameter group
1543SP-1 you will find the parameter group
The CPs support the following SNMP version:
●
– SNMPv1
●
– SNMPv1
– SNMPv3 (with activated Security functions)
Traps are not supported by the CP.
You will find detailed information about the supported functions in the section Diagnostics
with SNMP (Page 100).
No program blocks need to be programmed for the CP 1542SP-1 IRC to transfer user data
between the station and communications partner.
The data areas in the memory of the CPU intended for communication with the partner are
configured data point-related on the CP. Each data point is linked to a PLC tag or element in
a data block on the CPU.
The individual data points can be transferred to the control system and processed there.
To transfer the process data and for some options of the parameter groups "Partner stations"
and "Communication with the CPU" configured data points are required.
For further information, refer to section Data point configuration (Page 57).
Note
Full telecontrol functionality only when Security functions are enabled
For the following functions, you need to enable the Security functions:
•
•
•
•
Note
Loss of configuration data when changing the telecontrol protocol
If you change the protocol on a configured CP, protocol
for example, the data point configuration, the partner co
mails).
4.5 Telecontrol communication (CP 1542SP-1 IRC)
In this parameter group, you enable the communication types you want to use for the
particular CP..
To minimize the risk of unauthorized access to the station via Ethernet, you need to enable
the communications services that the CP will execute individually.
The Open User Communication does not exist in the parameter group because these
communications services are not configured but programmed using program blocks.
The parameter group does not exist for the CP 1542SP-1, since the communications
services supported by this CP are always enabled.
●
Only with the CP 1542SP-1 IRC
Enables telecontrol communication on the CP. The following protocols can be used as
alternatives:
–
Enables communication with the telecontrol server
–
Enables communication with up to four DNP3 masters
–
Enables communication with up to four IEC masters
Send messages (e-mails) using the telecontrol functionality
Use of the "TeleControl Basic" protocol (general)
Use of the DNP3 Security functions
Use of certificates
-specific configuration data is lost,
nfiguration and the messages (e-
Address and authentication information for telecontrol communication
TeleControl Basic
DNP3
IEC
4.5 Telecontrol communication (CP 1542SP-1 IRC)
●
Enables access to the CPU for the online functions via the CP (diagnostics, loading
project data etc.). If the function is enabled, the engineering station can access the CPU
via the CP.
If the option is disabled, you have no access to the CPU via the CP with the online
functions. Online diagnostics of the CPU with a direct connection to the interface of the
CPU however remains possible.
●
Enables the functions of S7 communication with a SIMATIC S7 and S7 routing on the
CP.
If you configure S7 connections to the relevant station, and these run via the CP, you will
need to enable this option.
Depending on the telecontrol protocol the news, the communications partners of the CP
require the following address and authentication information of the CP that needs to be
configured for the CP:
●
The telecontrol server requires:
– Project number
– Station number
– Telecontrol password (for authentication)
You will find the parameters in the parameter group "CP idenfication" under "Security".
– IP address (in the "Ethernet interface“ parameter group)
Since the CP always establishes the connection to the telecontrol server, the IP
address of the CP does not need to be configured in TCSB.
●
The master requires:
– Station number (in the "CP identification" parameter group)
– IP address (in the "Ethernet interface“ parameter group)
– Port number of the CP
●
The master requires:
– Station number (in the "CP identification" parameter group)
– IP address (in the "Ethernet interface“ parameter group)
You will find information about the address information of the communications partner
required by the CP in section Partner stations (Page 52).
Configure the generally available parameters just as for every other Ethernet interface:
● General data (name etc.)
● Addresses and possibly routers
● Port settings
● Access to the Web server
Below you will find only the description of the specific parameters for telecontrol
communication.
The setting made here applies globally to all TCP connections of the CP. Note the option of
overwriting the value configured here for individual communications partners, see below.
●
If there is no data traffic within the connection monitoring time, the CP sends a keepalive
to the communications partner.
Permitted range: 1 ... 65535 s. Default setting: 180
The monitoring time is configured for the Ethernet interface as the default for all TCP
connections. The default value can be adapted individually for each connection in
"Partner stations", compare section Partner stations (Page 52). The function can only be
disabled by entering 0 (zero) for the partners.
●
After sending a keepalive, the CP expects a reply from the communications partner within
the keepalive monitoring time. If the CP does not receive a reply within the configured
time, it terminates the connection.
Permitted range: 1 ... 65535 s. Default setting: 10
The monitoring time is configured for the Ethernet interface as the default for all TCP
connections. The default value can be adapted individually for each connection in
"Partner stations". The function can only be disabled by entering 0 (zero) for the partners.
Basic value for the wait time until the next connection establishment following an
unsuccessful attempt to establish a connection. After every 3 attempts, the basic value is
doubled up to a maximum of 900 s.
Permitted range: 10 ... 300. Default setting: 10
Example: The basic value 20 results in the following wait times: 3 x 20 s, 3 x 40 s, 3 x
80 s etc. up to max. 3 x 900 s.
●
Time (seconds) for the arrival of the acknowledgment from the communications partner
(Telecontrol server) after sending spontaneous frames. The time is started after sending
an unsolicited frame. If no acknowledgement has been received from the partner when
the connection monitoring time elapses, the frame is repeated up to three times. After
three unsuccessful attempts, the connection is terminated and re-established.
Permitted range: 1 ... 65535. Default setting: 5
●
Here, you enter the interval in hours after which the key is exchanged again between the
CP and the communications partner (TCSB V3). The key is a security function of the
telecontrol protocol used by the CP and TCSB V3.
Permitted range: 0 ... 65535. Default setting: 8
If you enter 0 (zero), the function is disabled.
You will find information on the permitted ranges of the functions and defaults in the tooltips
of STEP 7.
●
The disturbance bit can be used as bit 1.6 (IIN1.6) of the "Internal Indication Bytes" to
indicate to the master when the CPU is in STOP mode.
When configuring the monitoring times t
settings on the master so that there are no unwanted error messages or connection aborts.
Max. time between Select and Operate
Monitoring time for connection establishment (t0)
Frame monitoring time (t1)
4.5 Telecontrol communication (CP 1542SP-1 IRC)
●
Here, for each of the three event classes you specify the number of events after which
the stored events are sent to the communications partner.
Permitted range: 1 ... 255.
●
Here, for each of the three event classes you specify the maximum time in seconds the
events can be stored in the send buffer before they are sent to the communications
partner.
Permitted range: 0 ... 255.
If you enter 0 (zero), the function is disabled.
You will find details of how the send buffer works (storing and sending events) as well as the
options for transferring data in the section Process image, types of transmission, event
classes, triggers (Page 63).
and t2 make sure that you make the corresponding
1
You will find information on the permitted ranges of the functions and defaults in the tooltips
of STEP 7.
●
●
●
Monitoring time for the acknowledgement of frames sent by the CP by the
communications partner. The monitoring time applies to all frames sent by the CP in I, S
and U format.
If the partner does not send an acknowledgment during the monitoring time, the CP
terminates the connection to the partner.
Difference between send sequence number N(S) and receive sequence number N(R)
Max. number of unacknowledged data frames
Acknowledgment mechanism for the IEC protocol
4.5 Telecontrol communication (CP 1542SP-1 IRC)
●
Monitoring time for the acknowledgment of data frames of the master by the CP.
After receiving data from the master, the CP acknowledges the received data
alternatively:
– If the CP sends data to the master itself within t
received from the master during t
at the same time along with the sent data frame (I
2
, it acknowledges the data frames
2
format).
– The CP sends an acknowledgment frame (S format) to the master at the latest when t
elapses.
The value of t
●
should be less than that of t1.
2
Monitoring time during which the CP has not received any frames from the master.
When t
elapses, the CP sends a test/control frame (U format) to the master.
3
This parameter is intended for longer times without data traffic.
●
Maximum number of unacknowledged data frames (I-APDUs) as maximum difference
between send sequence number N(S) and receive sequence number N(R).
When k is reached and t
has not yet elapsed, the CP does not send any frames until all
1
the frames sent have been acknowledged by the master.
When k is reached and t
●
has elapsed, the TCP connection is terminated.
1
Maximum number of received data frames (I-APDUs), after which the oldest frame
received from the master must be acknowledged.
2
With each sent data frame, the CP sends a continuous send sequence number. The data
frame remains initially stored in the send buffer.
When it receives the data frame, the master sends the send sequence number from this or
(if several frames are received) the last frame as an acknowledgement to the CP. The CP
saves the send sequence number returned by the master as a receive sequence number
and uses it as an acknowledgement.
Frames whose send sequence number is equal to or lower than the current receive
sequence number are evaluated as having been successfully transferred and are deleted
from the send buffer of the CP.
Address information of the communications partners
"Partner stations" (only with DNP3 / IEC)
Listener port
"Telecontrol server" / "Partner"
Activate partner
4.5 Telecontrol communication (CP 1542SP-1 IRC)
If you do not want to use both ports of the bus adapter, you can disable one of the two ports.
You will find information on the other parameters in the information system of STEP 7.
The STEP 7 configuration of the communications partners of the CP (telecontrol server,
DNP3 or IEC master) and the connections to the partners is not possible and not necessary.
For the communications partners of the CP, the following information is required during the
configuration of the CP:
● TeleControl Basic
– Partner IP address
See section Auto-Hotspot for information on this.
– Partner port (port number of the listener port of TCSB)
● DNP3 / IEC
– Master station address
Station address specified on the master
With the IEC protocol the Master station address is not evaluated.
– Partner IP address
IP address of the master
For the addressing of redundant partners, see section Addressing of single and
redundant communications partners (Page 55).
– Partner port
●
CP's own listener port
●
Enable the option to be able to use the partners configured later for the communication.
In "TeleControl Basic" the telecontrol server is always enabled as a partner.
The station address of the telecontrol server is assigned automatically by the system if
telecontrol communication is enabled.
You will find information on the permitted ranges and defaults in the tooltips of STEP 7.
●
IP address or host name (FQDN) of the telecontrol server. This can, for example, also be
the FQDN of a DynDNS service.
●
When the function is enabled, the connection to the communications partner is monitored
by sending keepalive frames.
The TCP connection monitoring time is set for all TCP connections of the CP in the
parameter group of the Ethernet interface, see also the section Ethernet interface (X1) >
Advanced options (Page 48). These settings apply to all TCP connections of the CP.
Here in the parameter group "Partner stations" the globally set monitoring time can also
be set separately for this partner. The value set here overwrites the global value for this
partner that was set in the "Ethernet interface (X1) > Advanced options > TCP connection
monitoring" parameter group.
●
Only with TCP: If there is no data traffic within the connection monitoring time, the CP
sends a keepalive to the communications partner.
The monitoring time is configured for the Ethernet interface as the default for all TCP
connections. The default value can be adapted individually for each connection in
"Partner stations" and this overwrites the global value for this partner that was set in the
parameter group "Ethernet interface".
The function can be disabled by entering 0 (zero) for the individual partners.
●
Only with TCP: After sending a keepalive, the CP expects a reply from the
communications partner within the keepalive monitoring time. If the CP does not receive
a reply within the configured time, it terminates the connection.
The monitoring time is configured for the Ethernet interface as the default for all TCP
connections. The default value can be adapted individually for each connection in
"Partner stations".
The function can be disabled by entering 0 (zero) for the individual partners.
●
In the "Permanent" connection mode, there is a permanent connection to the
communications partner.
"Connection to redundant partner" (only with DNP3 / IEC)
Redundancy mode
"Advanced settings"
Partner monitoring time (only with DNP3 / IEC)
Report partner status (connection to partner)
DNP3-specific settings
DNP3 level
Event transmission mode
4.5 Telecontrol communication (CP 1542SP-1 IRC)
●
Specifies the communications partner that establishes the connection (always the CP).
●
Port number of the communications partner
●
Enable the option if the communications partner is a redundant master.
For information on the other parameters see above.
●
If the CP does not receive a sign of life from the communications partner within the
configured time, the CP interprets this as a fault/error on the partner. If you enter 0, the
function is deactivated.
●
If the function is enabled, the CP signals the status of the connection to the
communications partner to the CPU.
– Bit 0 of "PLC tag for partner status" (data type WORD) is set to 1 if the partner can be
reached.
– Bit 1 is set to 1 if all the paths to the remote partner are OK (useful with redundant
paths).
– Bits 2-3 indicate the status of the send buffer (frame memory).
The following values are possible:
- 0: Send buffer OK
- 1: Send buffer threatening to overflow (more than 80 % full).
Addressing of single and redundant communications partners
Addressing the telecontrol server
Addressing of a single telecontrol server
Addressing of the TCSB redundancy group by the stations using one IP address
Addressing redundant DNP3 or IEC masters
4.5.5.3
Partner for inter-station communication
Inter-station communication
Partner
4.5 Telecontrol communication (CP 1542SP-1 IRC)
●
Configure the IP address of the telecontrol server or the DSL router when connecting via
the Internet.
When using a DynDNS service with the host name (FQDN) can be specified.
●
In the LAN in the master station to which the TCSB server PCs and the DSL router (e.g.
SCALANCE M) are connected, the Network Load Balancing (NLB) of the computer
operating system will assign a common virtual IP address to the two server PCs.
This IP address is configured depending on the network setup:
– If a CP without a DSL router is connected, the virtual address assigned by the NLB
must be configured in the CP as the IP address of the telecontrol server.
– If a DSL router is used, only one IP address will be configured to address the
redundant telecontrol server in the stations, the public address of the DSL router.
Set the port forwarding (TCP) on the DSL router so that the public IP address
(external network) is led to the virtual IP address of the TCSB server PCs (internal
network). Only the public IP address is reachable from the Internet. The station does
not therefore receive any information telling it which of the two computers of the
redundancy group it is connected to.
For each master specify the master station address and the IP address being used.
Only when using the "TeleControl Basic" protocol
In this table, you specify the S7 stations and CPs with which the current station will use interstation communication. Connections for inter-station communication run via the telecontrol
server.
The partner number is assigned by the system. It is required during data point configuration
to assign data points to their communications partners.
For inter-station communication, the partner is addressed with the parameters "Project",
"Station" and "Slot".
Here, enter the project number of the CP in the partner station. (Parameter group "Security >
CP identification" on the partner)
Here, enter the station number of the CP in the partner station. (Parameter group "Security >
CP identification" on the partner)
Here, enter the slot number of the CP in the partner station via which the connection will be
established.
When enabled, the frames are stored in the send buffer (frame memory) of the CP if the
connection is disturbed. Note that the capacity of the frame memory is shared by all
communications partners.
If the option is disabled, frames for events are stored in the image memory of the CP; in
other words if there are problems on the connection older values are overwritten by new
values.
The access ID displayed here is formed from the hexadecimal values of project number,
station number and slot. The parameter of the type DWORD is allocated as follows:
● Bits 0 - 7: Slot
● Bits 8 - 20: Station number
● Bits 21 - 31: Project number
Using the first three parameters you specify the CPU access by the CP in the CPU scan
cycle. You will find the structure of the CPU scan cycle in the section Read cycle (Page 70).
The fourth parameter "Frame memory size" decides the size of the send buffer on the CP for
frames of data points that are configured as an event.
●
Wait time between two scan cycles of the CPU memory area
●
Maximum number of write jobs to the CPU memory area within a CPU scan cycle
●
Maximum number of low-priority read jobs from the CPU memory area within a CPU scan
cycle.
●
Here, you set the size of the frame memory for events (send buffer).
The size of the frame memory is divided equally among all configured communications
partners. You will find the size of the frame memory in the section Configuration limits
and performance data (Page 17).
You will find details of how the send buffer works (storing and sending events) as well as
the options for transferring data in the section Process image, types of transmission,
event classes, triggers (Page 63).
●
Via the watchdog bit the CPU can be informed of the status of the telecontrol
communication of the CP.
●
Using this function, the CP can make its time of day available to the CPU.
You will find details in the STEP 7 information system.
You configure the data points and messages in STEP 7 in the editor for the data point and
message configuration. You can find this using the project tree:
Project > directory of the relevant station > Local modules > CP
Requirement for data points: PLC tags and/or data blocks (DBs)
Access to the memory areas of the CPU
4.5 Telecontrol communication (CP 1542SP-1 IRC)
Figure 4-1 Open the data point and message editor
Open the data point and message editor by double-clicking on the entry "Data points" or
"Messages".
PLC tags or DBs must first be created in the CPU program to allow configuration of the data
points.
The PLC tags for data point configuration can be created in the standard tag table or in a
user-defined tag table.
Remember the maximum possible number of PLC tags the can be used for data point
configuration in the section Configuration limits and performance data (Page 17).
The values of the PLC tags or DBs referenced by the data points are read and transferred to
the communications partner by the CP. Data received from the communications partner is
written by the CP to the CPU via the PLC tags or DBs.
The address ranges, formats and S7 data types of the PLC tags that are compatible with the
protocol-specific data point types of the CP can be found in the section Datapoint types
(Page 59).
If you wa
names, CP names and station names that are as short as possible.
Character set for data point names
4.5.7.2
Datapoint types
Supported data point types of the CP 1542SP-1 IRC
TeleControl Basic: Data point types
Format (memory requirements)
Data point type
S7 data types
Address area
Bit
Digital input
Bool
I, Q, M, DB
Digital output
Bool
Q, M, DB
Byte
Digital input
Byte, USInt
I, Q, M, DB
Digital output
Byte, USInt
Q, M, DB
Integer with sign (16 bits)
Analog input
Int
I, Q, M, DB
Analog output
Int
Q, M, DB
Counter (16 bits)
Counter input
Word, UInt
I, Q, M, DB
Integer with sign (32 bits)
Analog input
DInt
Q, M, DB
Analog output
DInt
Q, M, DB
4.5 Telecontrol communication (CP 1542SP-1 IRC)
All PLC tags intended to be used for data point configuration must have the attribute "Visible
in HMI".
nt to use the maximum number of configurable data points, assign data point
When you create a data point, a preset name "DataPoint_n" is adopted. In the data point
table and in the "General" tab of the data point you can change the name of the data point.
When assigning names only ASCII characters from the band 0x20 ... 0x7e may be used with
the exceptions listed below.
The following characters are forbidden since they do not adhere to the syntax rules of TCSB
for OPC items:
Non-permitted characters: . ' [ ] / \ |
period, apostrophe, square brackets, slash, back slash, vertical line (pipe)
During the configuration of the user data to be transferred by the CP 1542SP-1 IRC, each
data point is assigned a protocol-specific data point type. The data point types along with the
compatible S7 data types are listed below. They are grouped according to format (memory
requirements).
Table 4- 1 Supported data point types and compatible S7 data types
For the possible formats of the ARRAY data type, refer to the following section.
Block of data (ARRAY)
Time stamp in UTC format
DNP3: Data point types
Format (memory
requirements)
Data point type
DNP3 object group
[variations]
Direction
S7 data types
Operand area
Bit
Binary Input
1 [1, 2]
in
Bool
I, Q, M, DB
Binary Input Event
2 [1, 2]
in
Bool
I, Q, M, DB
Binary Output 1)
10 [2]
out
Binary Output Event 1)
11 [1, 2]
out
Binary Command
12 [1]
out
Bool
Q, M, DB
Integer (16 bits)
Counter Static
20 [2]
in
UInt, Word
I, Q, M, DB
Frozen Counter 2)
21 [2, 6]
in
Counter Event
22 [2, 6]
in
UInt, Word
I, Q, M, DB
Frozen Counter Event 3)
23 [2, 6]
in
Analog Input
30 [2]
in
Int
I, Q, M, DB
Analog Input Event
32 [2]
in
Int
I, Q, M, DB
Analog Output Status 4)
40 [2]
out
Analog Output
41 [2]
out
Int
Q, M, DB
Analog Output Event 4)
42 [2, 4]
out
4.5 Telecontrol communication (CP 1542SP-1 IRC)
Analog input Real Q, M, DB
With the ARRAY data type, contiguous memory areas up to a size of 64 bytes can be
transferred. The following S7 data types are compatible components of ARRAY:
● Byte, USInt (total of up to 64 per data block)
● Int, UInt, Word (total of up to 32 per data block)
● DInt, UDInt, DWord (total of up to 16 per data block)
Time stamps are transferred in UTC format (48 bits) and contain the time difference in
milliseconds since 01.01.1970.
Table 4- 2 Supported data point types, DNP3 object groups, variants and compatible S7 data types
Explanation of the table footnotes 1), 2), 3), 4): Configuring data points using substitute object
groups
4.5 Telecontrol communication (CP 1542SP-1 IRC)
Frozen Counter 2)
[1, 5] in
Octet String / Octet
[ - ] in, out
5)
DB
5)
This object group can be configured in the Data point editor of STEP 7 using the substitute object group 12.
This object group can be configured in the Data point editor of STEP 7 using the substitute object group 20.
This object group can be configured in the Data point editor of STEP 7 using the substitute object group 22.
This object group can be configured in the Data point editor of STEP 7 using the substitute object group 41.
With these data point types, contiguous memory areas up to a size of 64 bytes can be transferred. All S7 data types with
The initial data point types of the following object groups can be configured using the
substitute object groups listed above:
● 10 [2]
● 11 [1, 2]
● 21 [1, 2, 5, 6]
● 23 [1, 2, 5, 6]
● 40 [1, 2, 3]
● 42 [1, 2, 4, 5, 6, 7, 8]
To configure the DNP3 CP, use the specified substitute object group.
Configuration of the mirroring back for output events (object groups 11 and 42)
Time stamp of the DNP3 CP in UTC format
IEC: Data point types
Format (memory
requirements)
Data point type
IEC type
Direction
S7 data types
Operand area
Bit
Single point information
<1>
in
Bool
I, Q, M, DB
Single command
<45>
out
Bool
Q, M, DB
Byte
Step position information
<5>
in
Byte, USInt
I, Q, M, DB
tag 1)
Integer (16 bits)
Measured value, normalized value
<9>
in
Int
I, Q, M, DB
with time tag 1)
Measured value, scaled value
<11>
in
Int
I, Q, M, DB
time tag 1)
value
Set point command, scaled value
<49>
out
Int
Q, M, DB
4.5 Telecontrol communication (CP 1542SP-1 IRC)
Assign each data point on the master using the configurable data point index in STEP 7. The
data point of the DNP3 CP is then assigned to the corresponding data point on the master.
Example of configuring the data point Binary Output (10 [2])
The data point is configured as follows:
On the DNP3 CP as Binary Command (12 [1])
On the master as Binary Output (10 [2])
With the data point types Binary Output Event (11) and Analog Output Event (42) you also
need to enable mirroring back, refer to the next section.
You first create the data point types Binary Output Event (object group 11) and Analog
Output Event (object group 42) as described above as data points of the object groups 12 or
41.
The local values of these two object groups can be monitored for change and the changes
transferred to the master. Changing a local value can, for example, be caused by manual
operator input on site.
To allow the value resulting from local events or interventions to be transferred to the master,
the data point in question requires a channel for mirroring back. You configure this mirroring
back function using the "Value monitoring" option in data point configuration, General tab.
Remember that to use the mirror back function, you need to interconnect the local values in
the controller with the relevant PLC tag of the data point.
Time stamps are transferred in UTC format (48 bits) and contain milliseconds since
01.01.1970.
Table 4- 3 Supported data point types, IEC types and compatible S7 data types
Process image, types of transmission, event classes, triggers
Saving the data point values
4.5 Telecontrol communication (CP 1542SP-1 IRC)
Bitstring of 32 bits with time tag
<33> in UDInt, DWord I, Q, M, DB
Integrated totals with time tag
Measured value, short floating point
Measured value, short floating point
Set point command, short floating
2)
3)
For the format of the time stamp, see the following section.
For these data point types, create a data block with an array of precisely 2 bool.
With these data point types, contiguous memory areas up to a size of 32 bits can be transferred. Only the S7 Bool data
IEC CP time stamps are transferred according to the IEC specification in the "CP56Time2a"
format. Note that in the frames only the first 3 bytes for milliseconds and minutes are
transferred.
The values of data points are stored in the image memory of the CP and transferred only
when queried by the communications partner.
Events are also stored in the send buffer and can be transferred unsolicited.
63
Page 64
Configuration and operation
Static value (no event)
Event
The image memory, the process image of the CP
The send buffer
4.5 Telecontrol communication (CP 1542SP-1 IRC)
Data points are configured as a static value or as an event using the "Type of transmission"
parameter (see below):
●
Static values are entered in the image memory (process image of the CP).
Static values correspond to the following classes:
– DNP3: Class 0
– IEC: Class 2
●
The values of data points configured as an event are also entered in the image memory
of the CP. The value of the event is sent unsolicited to the communications partner if this
function is enabled by the master.
The values of events are also entered in the send buffer of the CP.
Events correspond to the following classes:
– DNP3: Class 1 / 2 / 3
– IEC: Class 1
All the current values of the configured data points are stored in the image memory. New
values of a data point overwrite the last stored value in the image memory.
The values are sent after being queried by the communications partner. Refer to "Transfer
after call" in the section "Types of transmission".
The send buffer of the CP is the memory for the individual values of data points that are
configured as an event. The maximum number is divided equally among all configured and
enabled communications partners. You configure the size of the send buffer with the
parameter "Frame memory size", see the section Communication with the CPU (Page 56).
If the connection to a communications partner is interrupted, the individual values of the
events are retained in the buffer. When the connection returns, the buffered values are sent.
The frame memory operates chronologically; in other words, the oldest frames are sent first
(FIFO principle).
If a frame was transferred to the communications partner, the transferred value is deleted
from the send buffer.
If frames cannot be transferred for a longer period of time and the send buffer is threatening
to overflow, the response is as follows depending on the protocol being used:
Event classes with the "Triggered" type of transmission
TeleControl Basic
Every value triggered
Current value triggered
4.5 Telecontrol communication (CP 1542SP-1 IRC)
● TeleControl Basic
The forced image mode
If the send buffer reaches a fill level of 80%, the CP changes to the forced image mode.
New values from data points configured as an event are no longer added to the send
buffer but rather they overwrite older existing values in the image memory.
When the connection to the communications partner returns, the CP changes back to the
send buffer mode if the fill level of the send buffer has fallen below 50%.
● DNP3 / IEC
If a send buffer fill level of 100% is reached, the oldest values are overwritten.
When using the DNP3 protocol, additional conditions for sending the events can be
specified:
– A maximum number of events in the send buffer, configurable for each event class.
– A configurable maximum storage period for events in the send buffer.
The following types of transmission are possible:
●
The current value of the data point is entered in the image memory of the CP. New
values of a data point overwrite the last stored value in the image memory.
After being called by the communications partner, the current value at the time is
transferred.
●
The values of data points configured as an event are entered in the image memory and
also in the send buffer of the CP.
The values of events are saved in the following situations:
– The configured trigger conditions are fulfilled (data point configuration > "Trigger" tab,
see below)
– The value of a status bit of the status of the identifiers of the data point changes see
also the section Status IDs of the data points (Page 67).
Depending on the protocol used the following event classes are available:
●
–
Each value change is entered in the send buffer in chronological order.
–
Only the last, current value is entered in the send buffer. It overwrites the value stored
there previously.
The evaluation of the following classification must be handled by the master.
–
Class according to DNP3 protocol: Class 1
Each value change is entered in the send buffer in chronological order.
–
Class according to DNP3 protocol: Class 2
Each value change is entered in the send buffer in chronological order.
–
Class according to DNP3 protocol: Class 3
Only the current value at the time the trigger condition is met is entered in the send
buffer and overwrites the last value stored there.
●
Both of the following event classes correspond to the user data class 1 of the IEC
protocol
–
Each value change is entered in the send buffer in chronological order.
–
Only the current value at the time the trigger condition is met is entered in the send
buffer and overwrites the last value stored there.
Various trigger types are available for event-driven transfer:
●
The value of the data point is transferred when this reaches a certain threshold. The
threshold is calculated as the difference compared with the last stored value, refer to the
section Threshold value trigger (Page 73).
●
The value of the data point is transferred at configurable intervals or at a specific time of
day.
Resetting the trigger tag in the bit memory area / DB:
Transmission time of the frame
TeleControl Basic
Unsolicited
Conditional spontaneous
DNP3 / IEC
4.5.7.4
Status IDs of the data points
Status IDs of data points
Generation of events if a data point status changes
4.5 Telecontrol communication (CP 1542SP-1 IRC)
●
The value of the data point is transferred when a configurable trigger signal is fired. For
the trigger signal, the edge change (0 → 1) of a trigger bit is evaluated that is set by the
user program. When necessary, a separate trigger bit can be configured for each data
point.
If the memory area of the trigger tag is in the bit memory or in a data block, the trigger tag
is reset to zero when the data point value is transferred.
Whether the value of a data point is transferred to the communications partner immediately
after the trigger or after a delay depends on the protocol used and the settings.
●
You specify the time of transmission with the parameter "Transmission mode" in the
"Trigger" tab of the data point:
–
The value is transferred immediately.
–
The value is transferred only when one of the following conditions is fulfilled:
- The telecontrol server queries the station.
- The value of another event with the Transmission mode “Unsolicited" is transferred.
- The fill level of the transmission buffer has reached 80% of its maximum capacity.
●
The spontaneous transmission in these protocols depends on whether spontaneous
sending or asymmetric communication is possible in the network.
The status IDs od the data points listed below are transferred for each data point in each
frame. They differ slightly in the three protocol types.
For the meaning of the status bits, see below. The "Meaning" (2nd table row) relates to the
"bit status" (3rd table row).
With data points that were configured as an event, the change to the status bit of the status
identifiers described below also leads to an event being generated.
Example: If the value of the status "RESTART" of a data point configured as an event
changes form 1 (value not yet updated) to 0 (value updated) when the station starts up, this
causes an event to be generated.
On a CP, data point indexes must be unique within each of the following object groups:
● Binary Input / Binary Input Event
● Binary Output / Binary Command
● Counter / Counter Event
● Analog Input / Analog Input Event
● Analog Output
● Octet String / Octet String Event
Indexes of two data points in different object groups can be identical.
The data point indexes must be unique in a CP.
Data point indexes assigned twice are indicated as errors in the consistency check and
prevent the project being saved.
The cyclic reading of the values of input data points from their assigned PLC tags on the
CPU can be prioritized.
Less important input data points do not need to be read in every CPU scan cycle. Important
input data points, on the other hand, can be prioritized for updating in every CPU scan cycle.
You can prioritize the data points in STEP 7 in the data point configuration in the "General"
tab with the "Read cycle" parameter. There you will find the two following options for input
data points:
● Fast cycle
● Normal cycle
The data points are read according to the method described below.
The cycle (including the pause) with which the CP scans the memory area of the CPU is
made up of the following phases:
●
The values of input data points with the scan priority "High-priority" are read in every scan
cycle.
Saving the value of a data point configured as an event
Threshold value trigger
Time trigger
4.5 Telecontrol communication (CP 1542SP-1 IRC)
●
Some of the values of input data points with the scan priority "Low-priority" are read in
every scan cycle.
The number of values read per cycle is specified for the CP in the "Communication with
the CPU" parameter group with the "Max. number of read jobs" parameter. The values
that exceed this value and can therefore not be read in one cycle are then read in the
next or one of the following cycles.
●
In every cycle, the values of a certain number of unsolicited write jobs are written to the
CPU. The number of values written per cycle is specified for the CP in the
"Communication with the CPU" parameter group with the "Max. number of write jobs"
parameter. The values whose number exceeds this value are then written in the next or
one of the following cycles.
●
This is the waiting time between two scan cycles. It is used to reserve adequate time for
other processes that access the CPU via the backplane bus of the station.
Since no fixed time can be configured for the cycle and since the individual phases cannot
be assigned a fixed number of objects, the duration of the scan cycle is variable and can
change dynamically.
Data points are configured as a static value or as an event using the "Type of transmission"
parameter:
Saving the value of a data point configured as an event in the send buffer (message
memory) can be triggered by various trigger types:
●
The value of the data point is saved when this reaches a certain threshold. The threshold
is calculated as the difference compared with the last stored value, refer to the section
Threshold value trigger (Page 73).
●
The value of the data point is saved at configurable intervals or at a specific time of day.
Resetting the trigger tag in the bit memory area / DB:
Note
Fast setting of triggers
Triggers must not be set faster than a minimum interval of 500 milliseconds. This also
applies to hardware triggers (input area).
Note
Hardware trigger
You need to reset hardw
Transferring the value of a data point configured as an event
Transmission mode
4.5 Telecontrol communication (CP 1542SP-1 IRC)
●
The value of the data point is saved when a configurable trigger signal is fired. For the
trigger signal, the edge change (0 → 1) of a trigger tag is evaluated that is set by the user
program. When necessary, a separate trigger tag can be configured for each data point.
You specify whether the value of a data point is transferred to the communications partner
immediately after the trigger fires or after a delay in the "Transmission mode" parameter.
If the memory area of a trigger tag is in the bit memory or in a data block, the CP resets
the trigger variable itself to 0 (zero) as soon as the value of the data point has been
transferred. This can take up to 500 milliseconds.
are triggers via the user program
The transmission mode of a frame is set in the "Trigger" tab of the data point. With the
option, you specify whether messages of events are sent immediately or following a delay:
● Immediate transfer - Spontaneous
The value is transferred immediately.
● Buffered transfer - Conditionally spontaneous
The value is transferred only when one of the following conditions is fulfilled:
– The communications partner queries the station.
– The value of another event with the transmission mode “Spontaneous" is transferred.
Note
Threshold value trigger: Calculation only after "Analog value preprocessing"
Note that the analog value preproce
threshold value and before calculating the threshold value.
This affects the value that is configured for the threshold value trigger.
Note
No Threshold value trigger if Mean value generation is configured
If mean value generation is configured, no threshold value trigger can be configured for the
analog value event involved.
Threshold value trigger
Function
Absolute method
Integrative method
Absolute method
4.5 Telecontrol communication (CP 1542SP-1 IRC)
For the time sequence of the analog value preprocessing refer to the section Analog value
preprocessing (Page 74).
ssing is performed before the check for a configured
If the process value deviates by the amount of the threshold value, the process value is
saved.
Two methods are used to calculate the threshold value deviation:
●
With binary and counter values as well as with analog values with configured mean value
generation, the absolute method is used to calculate the threshold value deviation.
●
With analog values without configured mean value generation, the integrating method is
used to calculate the threshold value deviation.
In the integration threshold value calculation, it is not the absolute value of the deviation
of the process value from the last stored value that is evaluated but rather the integrated
deviation.
For each binary value a check is made to determine whether the current (possibly smoothed)
value is outside the threshold value band. The current threshold value band results from the
last saved value and the amount of the configured threshold value:
● Upper limit of the threshold value band: Last saved value + threshold value
● Lower limit of the threshold value band: Last saved value - threshold value
As soon as the process value reaches the upper or lower limit of the threshold value band,
the value is saved. The newly saved value serves as the basis for calculating the new
threshold value band.
The integration threshold value calculation works with a cyclic comparison of the integrated
current value with the last stored value. The calculation cycle in which the two values are
compared is 500 milliseconds.
(Note: The calculation cycle must not be confused with the scan cycle of the CPU memory
areas).
The deviations of the current process value are totaled in each calculation cycle. The trigger
is set only when the totaled value reaches the configured value of the threshold value trigger
and a new process value is entered in the send buffer.
The method is explained based on the following example in which a threshold value of 2.0 is
configured.
Table 4- 7 Example of the integration calculation of a threshold value configured with 2.0
0.5 20.3 +0.3 0.3
With the changes in the process value shown in the example, the threshold value trigger
configured with 2.0 fires twice:
● At the time 3.5 s: The value of the integrated deviation is at 2.0. The new process value
stored in the send buffer is 20.5.
● At the time 6.0 s: The value of the integrated deviation is at 2.1. The new process value
stored in the send buffer is 19.9.
In this example, if a deviation of the process value of approximately 0.5 should fire the
trigger, then with the behavior of the process value shown here a threshold value of
approximately 1.5 ... 2.5 would need to be configured.
CPs with data point configuration support analog value preprocessing. For analog value data
points, some or all of the functions described below can be configured.
Page 75
Configuration and operation
Requirements and restrictions
Note
Restrictions due to configured triggers
The analog value preprocessing options "Fault suppression time", "Limit value calculation"
and "smoothing" are not performed if no thres
data point.. In these cases, the read process value of the data point is entered in the image
memory of the CP before the preprocessing cycle of the threshold value calculation (500 ms)
elapses.
4.5 Telecontrol communication (CP 1542SP-1 IRC)
You will find the requirements for the configuration of the preprocessing options and
restrictions in the section relating to the particular function.
Note
Restricted preprocessing options if mean value generation is configured
If you configure mean value generation for an analog value event, the fol
preprocessing options are not available:
•
•
•
Function
Input modules: Overflow range / underflow range
4.5 Telecontrol communication (CP 1542SP-1 IRC)
The 500 millisecond cycle is started by the integrative threshold value calculation. In this
cycle, the values are saved even when the following preprocessing options are enabled:
● Unipolar transfer
● Fault suppression time
● Limit value calculation
● Smoothing
lowing
Unipolar transfer
Fault suppression time
Smoothing
With this parameter, acquired analog values are transferred as mean values.
If mean value generation is active, it makes sense to configure a time trigger..
The current values of an analog data point are read in a 100 millisecond cycle and totaled.
The number of read values per time unit depends on the read cycle of the CPU and the CPU
scan cycle of the CP.
The mean value is calculated from the accumulated values as soon as the transfer is
triggered by a trigger. Following this, the accumulation starts again so that the next mean
value can be calculated.
The mean value can also be calculated if the transmission of the analog value message is
triggered by a request from the communications partner. The duration of the mean value
calculation period is then the time from the last transmission (for example triggered by the
trigger) to the time of the request. Once again, the accumulation restarts so that the next
mean value can be calculated.
As soon as a value is acquired in the overflow or underflow range, mean value generation is
stopped. The value 32767 / 7FFF
or -32768 / 8000h is saved as an invalid mean value for
h
the current mean value calculation period and sent with the next message.
If you have configured an error suppression time and then enable mean value generation,
the value of the error suppression time is grayed out but no l
generation is enabled, the error suppression time is set to 0 (zero) internally.
Unipolar transfer
Restrictions
Function
Fault suppression time
Requirements for the function
Restrictions
Function
4.5 Telecontrol communication (CP 1542SP-1 IRC)
The calculation of a new mean value is then started. If the analog value remains in the
overflow or underflow range, one of the two values named is again saved as an invalid mean
value and sent when the next message is triggered.
onger used. If mean value
Unipolar transfer cannot be configured at the same time as mean value generation. Enabling
unipolar transfer has no effect when mean value generation is activated.
With unipolar transfer, negative values are corrected to zero. This can be desirable if values
from the underrange should not be transferred as real measured values.
Exception: With process data from input modules, the value -32768 / 8000
a live zero input is transferred.
With a software input, on the other hand, all values lower than zero are corrected to zero.
Configuration of the threshold trigger for this data point
The fault suppression time cannot be configured at the same time as mean value generation.
A configured value has no effect when mean value generation is activated.
A typical use case for this parameter is the suppression of peak current values when starting
up powerful motors that would otherwise be signaled to the control center as a disruption.
The transmission of an analog value in the overflow (7FFF
suppressed for the specified time. The value 7FFF
suppression time has elapsed, if it is still pending.
for wire break of
h
) or underflow range (8000h) is
h
or 8000H is only sent after the fault
H
If the value returns to the measuring range before the fault suppression time elapses, the
current value is transferred.
Recommendation for finished values that were preprocessed by the CPU:
Smoothing factor
Requirements for the function
Restrictions
Function
4.5 Telecontrol communication (CP 1542SP-1 IRC)
The suppression is adjusted to analog values that are acquired directly by the S7 analog
input modules as raw values. These modules return the specified values for the overflow or
underflow range for all input ranges (also for live zero inputs).
An analog value in the overflow range (32767 / 7FFF
) or underflow range (-32768 / 8000h)
h
is not transferred for the duration of the fault suppression time. This also applies to live zero
inputs. The value in the overflow/underflow range is only sent after the fault suppression time
has elapsed, if it is still pending.
If the CPU makes preprocessed finished values available in bit memory or in a data block,
suppression is only possible or useful if these finished values also adopt the values listed
above 32767 / 7FFF
or -32768 / 8000h in the overflow or underflow range. If this is not the
h
case, the parameter should not be configured for preprocessed values.
For finished values preprocess in the CPU, the limits for the overflow and underflow can be
freely assigned.
Configuration of the threshold trigger for this data point
The smoothing factor cannot be configured at the same time as mean value generation. A
configured value has no effect when mean value generation is activated.
Analog values that fluctuate quickly can be evened out using the smoothing function.
The smoothing factors are calculated according to the following formula as with S7 analog
input modules.
where
= smoothed value in the current cycle
y
n
= value acquired in the current cycle n
x
n
k = smoothing factor
The following values can be configured for the module as the smoothing factor.
● Configuration of the threshold trigger for this data point
● PLC tag in the bit memory operand area or data area
The analog value data point must be linked to a PLC tag in the bit memory or data area
(data block). For PLC tags of hardware modules (input operand area) limit value
configuration is not possible.
The configuration of limit values is pointless for measured values that have already been
preprocessed on the CPU.
In these two input boxes, you can set a limit value in the direction of the start of the
measuring range or in the direction of the end of the measuring range. You can also
evaluate the limit values, for example as the start or end of the measuring range.
If a limit value is overshot or undershot, the status identifier "OVER_RANGE" of the data
point is set. This status identifiers are described in the section Status IDs of the data points
(Page 67).
The "OVER_RANGE" bit of the status identifier of the data point is set as follows when the
relevant analog value is transferred:
● Limit value 'high':
– If the limit value is exceeded: OVER_RANGE = 1
– If the value falls below the limit value: OVER_RANGE = 0
● Limit value 'low':
– If the value falls below the limit value : OVER_RANGE = 1
– If the value then exceeds the limit value: OVER_RANGE = 0
The limit value is configured as a whole decimal number. The range of values is based on
the range of values of the raw value of analog input modules.
Include value Transfer the value of a PLC tag with a message
4.5 Telecontrol communication (CP 1542SP-1 IRC)
Remember the following requirements in the CP configuration for the transfer of e-mails:
● Enabling telecontrol communication ("Communication types") parameter group
● Configuring the "E-mail configuration" parameter group (see "Security" parameter group)
To do this, you require the following information:
– Access data of the SMTP server: Address, port number, user name, password
– Email address of the recipient
Using the "Trigger" parameter group in the message table, you configure which of the
following events triggers the sending of the e-mail.
● CPU changes to STOP.
● CPU changes to RUN.
● The connection to the partner is interrupted.
● The connection to the partner is re-established.
● A trigger signal is fired.
For the trigger signal to send the e-mail, the edge change (0 → 1) of a trigger bit is
evaluated that is set by the user program. When necessary, a separate trigger bit can be
configured for each e-mail.
If the memory area of the trigger bit is in the bit memory or in a data block, the trigger bit
is reset to zero when the e-mail is sent.
With the "TeleControl Basic" protocol, the following events can be configured as the trigger
of an e-mail:
● Connection establishment to the partner has failed.
● A TeleService session has started.
● A TeleService session has ended.
If you enable the option "Include value" in the "Trigger" parameter group, the CP sends a
value for the placeholder $$ from the memory area of the CPU in the message. To do this
enter "$$" as a placeholder for the value to be sent in the message text.
Select a PLC tag whose value will be integrated in the message. The value is entered in the
message text instead of the placeholder $$.
$$ can be a placeholder for data point types with a simple data type up to a size of 32 bits.
Authentication and key exchange with the DNP3 protocol
4.5 Telecontrol communication (CP 1542SP-1 IRC)
If this option is enabled in STEP 7, a status is output on the CP that provides information
about the processing status of the sent message. The status is written to a PLC tag of the
type DWORD. Select this tag via the "PLC tag for processing status" box.
If there are problems delivering messages, you can determine the status for example via the
Web server of the CPU by displaying the value of the PLC tag there.
For the significance of the individual statuses, refer to the section Processing status of the
telecontrol e-mails (Page 104).
Only valid when using the "TeleControl Basic" protocol.
● Project number
The project number is the same for all telecontrol CPs in a STEP 7 project. TCSB
evaluates project numbers from 1 ... 2000. If you change the project number, this
parameter is changed for all CPs in the STEP 7 project.
● Station number
For each station with a telecontrol CP, an individual station number is configured. TCSB
evaluates station numbers from 1 ... 8000.
● Telecontrol password
Password for the authentication of the CP on the telecontrol server. 8 ... 29 characters of
the ASCII character set 0x20...0x7e. The password can be the same for all CPs of the
STEP 7 project.
The same password is configured in the "TCSB" application for this station.
If the Security functions are enabled, the master and station (CP) authenticate themselves
with a secret key, the pre-shared key.
With the help of the common pre-shared key, after the first connection establishment
between master and DNP CP session keys are agreed that are then renewed cyclically.
Renewal of the session keys is normally initiated by the master. The criteria for renewing the
key are specified in the following parameters.
● Authentication requests before key exchange
● Key exchange interval
As soon as one of these conditions is met, the session key is renewed.
Method with which the CP authenticates itself to the master.
– Disabled
Non-secure authentication. If this option is selected the CP logs on only using its
station address.
– Enabled
Secure authentication. If this option is selected, the CP and master use the DNP3
Security mechanisms. The parameters are configured as follows.
●
Selection of the mode for key exchange (IKE)
– The Main Mode is the default mode.
– The Aggressive Mode is somewhat faster but transfers the identity unencrypted.
●
Specifies whether the statistics of security events are sent to the master. Security events
are authentication requests to the CP. If the option is enabled, authentication requests
with date, time and result are saved on the CP and sent to the master for further
evaluation.
●
Setting to select whether the CP may use the secure hash algorithm SHA-1 if "SHA-256"
was configured as the Secure hash algorithm and the master does not support SHA-256.
Meaning of the options:
– SHA-1 mode allowed
The CP can use SHA-1 if the master does not support SHA-256.
– SHA-1 mode not allowed
The CP may not use SHA-1.
Note: If the master does not support SHA-256, no connection will be established if this
option is selected.
●
Selection of the Secure Hash Algorithm (SHA). Possible selections:
– SHA-1
– SHA-256
●
Selection of the Advanced Encryption Standard (AES). Possible selections:
Enable this option if you want to use the sending of unencrypted e-mails via SMTP port
25.
If your e-mail service provider only supports encrypted transfer, enable this option. Select
the protocol via the port number:
– Port no. 587
When using STARTTLS the CP sends encrypted e-mails.
– Port no. 465
When using SSL/TLS (SMTPS) the CP sends encrypted e-mails.
Ask your e.mail service provider which option is supported.
If you want to use an Internet connection with an IPv6 infrastructure, note the information
in the section IPv6 (Page 43).
Virtual Private Network (VPN) is a technology for secure transportation of confidential data in
public IP networks, for example the Internet. With VPN, a secure connection (tunnel) is set
up and operated between two secure IT systems or networks via a non-secure network.
One of the main features of the VPN tunnel is that it forwards all frames even from protocols
of higher layers (HTTP, FTP etc.).
The data traffic between two network components is transported practically unrestricted
through another network. This allows entire networks to be connected together via a
neighboring or intermediate network.
● VPN forms a logical subnet that is embedded in a neighboring (assigned) network. VPN
uses the usual addressing mechanisms of the assigned network, however in terms of the
data, it transports its own frames and therefore operates independent of the rest of this
network.
● VPN allows communication of the VPN partners with the assigned network.
● VPN is based on tunnel technology and can be individually configured.
● Communication between the VPN partners is protected from eavesdropping or
manipulation by using passwords, public keys or a digital certificate (authentication).
● Local area networks can be connected together securely via the Internet ("site-to-site"
connection).
● Secure access to a company network ("end-to-site" connection)
● Secure access to a server ("end-to-end" connection)
● Communication between two servers without being accessible to third parties (end-to-end
or host-to-host connection)
● Ensuring information security in networked automation systems
● Securing the computer systems including the associated data communication within an
automation network or secure remote access via the Internet
● Secure remote access from a PC/programming device to automation devices or networks
protected by security modules via public networks.
With Industrial Ethernet Security, individual devices or network segments of an Ethernet
network can be protected:
● Access to individual devices and network segments protected by security modules is
allowed.
● Secure connections via non-secure network structures becomes possible.
Due to the combination of different security measures such as firewall, NAT/NAPT routers
and VPN via IPsec tunnels, security modules protect against the following:
Creating a VPN tunnel for S7 communication between stations
Requirements
Note
Communication also possible via an IP router
Communication between the two stations is also possible via an IP router. To use this
communications path, however, you need to make furth
Procedure
Creating a security user
4.6 Security configuration(CP 1543SP-1)
To allow a VPN tunnel to be created for S7 communication between two S7 stations or
between an S7 station and an engineering station with a security CP (for example CP 1628),
the following requirements must be met:
● The two stations have been configured.
● The CPs in both stations must support the security functions.
● The Ethernet interfaces of the two stations are located in the same subnet.
er settings.
To create a VPN tunnel, you need to work through the following steps:
1. Creating a security user
If the security user has already been created: Log on as a user.
2. Select the "Activate security features" check box
3. Creating the VPN group and assigning security modules
4. Configure the properties of the VPN group
5. Configure local VPN properties of the two CPs
You will find a detailed description of the individual steps in the following paragraphs of this
section.
To create a VPN tunnel, you require appropriate configuration rights. To activate the security
functions, you need to create at least one security user.
1. In the local security settings of the CP, click the "User login" button.
Result: A new window opens.
2. Enter the user name, password and confirmation of the password.
3. Click the "Logon" button.
You have created a new security user. The security functions are now available to you.
Creating the VPN group and assigning security modules
Note
Current date and current time on the CP for VPN connections
Normally, to establish a VPN connec
be exchanged, the current date and the current time are required on both stations.
Configure the properties of the VPN group
Note
Specifying the VPN properties of the CPs
You specify the VPN properties of the CPs in the "Security" > "Firewall" > "VPN" parameter
group of the relevant module.
Result
4.6 Security configuration(CP 1543SP-1)
After logging on, you need to select the "Activate security features" check box in the
configuration of both CPs.
You now have the security functions available for both CPs.
1. In the global security settings, select the entry "Firewall" > "VPN groups" > "Add new VPN
group".
2. Double-click on the entry "Add new VPN group", to create a VPN group.
Result: A new VPN group is displayed below the selected entry.
3. In the global security settings, double-click on the entry "VPN groups" > "Assign module
to a VPN group".
4. Assign the security modules between which VPN tunnels will be established to the VPN
group.
1. Double-click on the newly created VPN group.
Result: The properties of the VPN group are displayed under "Authentication".
2. Enter a name for the VPN group. Configure the settings of the VPN group in the
properties.
These properties define the default settings of the VPN group that you can change at any
time.
tion and the associated recognition of the certificates to
You have created a VPN tunnel. The firewalls of the CPs are activated automatically: The
"Activate firewall" check box is selected as default when you create a VPN group. You
cannot deselect the check box.
Download the configuration to all modules that belong to the VPN group.
VPN communication with SOFTNET Security Client (engineering station)
VPN tunnel communication works only if the internal node is disabled
4.6.1.4
Establishment of VPN tunnel communication between the CP and SCALANCE M
4.6.1.5
CP as passive subscriber of VPN connections
Setting permission for VPN connection establishment with passive subscribers
4.6 Security configuration(CP 1543SP-1)
Under certain circumstances the establishment of VPN tunnel communication between
SOFTNET Security ClientSOFTNET Security Client and the CP fails.
SOFTNET Security Client also attempts to establish VPN tunnel communication to a lowerlevel internal node. This communication establishment to a non-existing node prevents the
required communication being established to the CP.
To establish successful VPN tunnel communication to the CP, you need to disable the
internal node.
Use the procedure for disabling the node as explained below only if the described problem
occurs.
Disable the node in the SOFTNET Security Client tunnel overview:
1. Remove the checkmark in the "Enable active learning" check box.
The lower-level node initially disappears from the tunnel list.
2. In the tunnel list, select the required connection to the CP.
3. With the right mouse button, select "Enable all members" in the shortcut menu.
The lower-level node appears again temporarily in the tunnel list.
4. Select the lower-level node in the tunnel list.
5. With the right mouse button, select "Delete entry" in the shortcut menu.
Result: The lower-level node is now fully disabled. VPN tunnel communication to the CP can
be established.
Create a VPN tunnel between the CP and a SCALANCE M router as described for the
stations.
VPN tunnel communication will only be established if you have selected the check box
"Perfect Forward Secrecy" in the global security settings of the created VPN group ("VPN
groups > Authentication").
If the check box is not selected, the CP rejects establishment of the tunnel.
If the CP is connected to another VPN subscriber via a gateway, you need to set the
permission for VPN connection establishment to "Responder".
This is the case in the following typical configuration:
Online diagnostics and downloading to station with the firewall activated
Setting the firewall - steps involved
4.6 Security configuration(CP 1543SP-1)
VPN subscriber (active) ⇔ gateway (dyn. IP address) ⇔ Internet ⇔ gateway (fixed IP
address) ⇔ CP (passive)
Configure the permission for VPN connection establishment for the CP as a passive
subscriber as follows:
1. In STEP 7, go to the devices and network view.
2. Select the CP.
3. Open the parameter group "VPN“ in the local security settings.
4. For each VPN connection with the CP as a passive VPN subscriber, change the default
setting "Initiator/Responder" to the setting "Responder".
Each incoming or outgoing frame initially runs through the MAC firewall (layer 2). If the frame
is discarded at this level, it will not be checked by the IP firewall (layer 3). This means that
with suitable MAC firewall rules, IP communication can be restricted or blocked.
With the security function enabled, follow the steps outlined below:
1. In the global security settings (see project tree), select the entry "Firewall > Services >
Define services for IP rules".
2. Select the "ICMP" tab.
3. Insert a new entry of the type "Echo Reply" and another of the type "Echo Request".
4. Now select the CP in the ET 200SP station.
5. Enable the advanced firewall mode in the local security settings of the CP in the "Security
> Firewall" parameter group.
6. Open the "IP rules" parameter group.
7. In the table, insert a new IP rule for the previously created global services as follows:
– Action: Allow; "From external -> To station " with the globally created "Echo request"
service
– Action: Allow; "From station -> to external" with the globally created "Echo reply"
service
8. For the IP rule for the Echo Request, enter the IP address of the PG/PC in "Source IP
address". This ensures that only PING packets from your PG/PC can pass through the
firewall.
If you specify an address range for the source IP address in the advanced firewall settings of
the CP, make sure that the notation is correct:
● Separate the two IP addresses only using a hyphen.
Correct: 192.168.10.0-192.168.10.255
● Do not enter any other characters between the two IP addresses.
Incorrect: 192.168.10.0 - 192.168.10.255
If you enter the range incorrectly, the firewall rule will not be used.
If you set up configured connections (S7, OUC) with a VPN tunnel between the CP and a
communications partner, you will need to adapt the local firewall settings of the CP:
In advanced firewall mode ("Security > Firewall > IP rules") select the action "Allow*" for both
communications directions of the VPN tunnel.
If the value for filtering the system events is set too high, you may not be able to achieve the
maximum performance for the communication. The high number of output error messages
can delay or prevent the processing of the communications connections.
In "Security > Log settings > Configure system events", set the "Level:" parameter to the
value "3 (Error)" to ensure the reliable establishment of the communications connections.
If the Security functions are enabled, in the STEP 7 project the certificates for all Security
modules involved are generated for example to allow communication via VPN connections.
Certificates generated by STEP 7 such as SSL certificates or VPN group certificates are
automatically assigned to the corresponding modules and do not need to be assigned using
the local security settings.
Certificates that were imported via the certificate manager in the global security settings are
not automatically assigned to the corresponding modules. Imported certificates must be
included in the list of trustworthy partner certificates manually via the entry "Certificate
manager" in the local Security settings. When assigning a CA certificate the module is also
assigned the certificates derived from it.
Via the local certificate manager assign certificates to the CP for certain services (e.g.
secure sending of e-mails).
1. To do this, click the table cell "Add new".
2. Click on the button on a white background "...".
3. In the certificate list that opens, you can either add a new certificate using the "Add"
button or select an existing certificate of the project using the check mark symbol.
You can recognize the properties of the displayed certificates in the global certificate
manager.
For the secure sending of e-mails, import the certificate of the e-mail service provider into the
certificate manager.
Select the following certificate in the CP configuration:
● Table "Trustworthy client certificates":
The certificate of the e-mail service provider
Before certificates can be referenced in the program blocks for Secure Communication,
these certificates must be assigned to the Security module as device certificates via the local
certificate manager.
To be able to assign the CP certificate of a communications partner, you need to first import
the certificates of the partner in the global certificate manager (Global security settings).
To make the assigned certificate known to the partner module, this certificate must be
entered in the list of trustworthy partner certificates after import.
Using the program blocks for Open User Communication (OUC)
Note
Different program block versions
Note that in STEP 7 you cannot use different versions of a program block in a station.
Supported program blocks for OUC
Program blocks for all three CP types
TSEND_C V3.0 / TRCV_C V3.1
TCON V4.0 / TDISCON V2.1
TUSEND V4.0 / TURCV V4.0
TSEND V4.0 / TRCV V4.0
TMAIL_C V4.0
Connections of Open User Communication are not configured.
For TCP / UDP / ISO-on-TCP communication via Ethernet, the blocks of Open User
Communication (OUC) listed below are used. For this, create a suitable program blocks. You
will find details on the program blocks in the information system of STEP 7.
The following instructions in the specified minimum version are available for programming
Open User Communication for all three CP types:
●
Compact blocks for connection establishment/termination and for sending and receiving
data
or
●
Connection establishment / connection termination
●
Sending and receiving data via UDP
●
Sending and receiving data via TCP or ISOonTCP
●
Sending e-mails
The program block can be found in STEP 7 in the "Instructions > Communication > Open
User Communication" window.
Connection descriptions in system data types (SDTs)
Creating an SDT for the data blocks
SDTs for all three CP types
TCON_Param
TADDR_Param
TCON_IP_RFC
TMail_V4
TMail_V6
TMail_FQDN
SDT for CP 1542SP-1 IRC and CP 1543SP-1
TMail_V4_SEC
TMail_QDN_SEC
5.1 Program blocks for OUC
For the connection description, the blocks listed above use the parameter CONNECT (or
MAIL_ADDR_PARAM with TMAIL_C). The connection description is stored in a data block
whose structure is specified by the system data type (SDT).
You create the SDT required for every connection description as a data block. You generate
the SDT type in STEP 7 by entering the name (e.g. "TCON_Param") in the "Data type" box
manually in the declaration table of block instead of selecting an entry from the "Data type"
drop-down list. The corresponding SDT is then created with its parameters.
Depending on the security functions supported, the three CP types support the following
SDTs:
The following SDTs can be used by all three CP types:
●
For transferring frames via TCP
●
For transferring frames via UDP
●
For transferring frames via ISO-on-TCP
●
For transferring e-mails addressing the e-mail server using an IPv4 address
●
For transferring e-mails addressing the e-mail server using an IPv6 address
●
For transferring e-mails addressing the e-mail server using the host name
You will find the description of the SDTs with their parameters in the STEP 7 information
system under the relevant name of the SDT.
These two CP types can use the following SDT for e-mail connections with Security function:
●
For secure transfer of e-mails addressing the e-mail server using an IPv4 address
●
For secure transfer of e-mails addressing the e-mail server using the host name
If an existing connection is aborted by the communications partner or due to disturbances on
the network, the co
you take this into account in your programming.
5.1 Program blocks for OUC
The CP 1543SP-1 can use the following SDT for data transfer with Security function:
●
For the secure transfer of data via TCP
Connections are established using the program block TCON. Note that a separate program
block TCON must be called for each connection.
A separate connection must be established for each communications partner even if
identical blocks of data are being sent.
After a successful transfer of the data, a connection can be terminated. A connection is also
terminated by calling "TDISCON".
nnection must also be terminated by calling TDISCON. Make sure that
STEP 7: The "Diagnostics" tab in the Inspector window
STEP 7: Diagnostics functions in the "Online > Online and diagnostics" menu
Web server of the CPU
SNMP
The following diagnostics options are available.
For information on the LED displays, refer to the section LEDs (Page 25).
Here, you can obtain the following information on the selected module:
● Entries in the diagnostics buffer of the CPU
● Information on the online status of the module
Using the online functions, you can read diagnostics information from the CP from an
engineering station on which the project with the CP is stored. You obtain the following static
information on the selected module:
● General information on the module
● Diagnostics status
● Information on the interfaces of the module
Information on other functions of the module
If you want to operate online diagnostics with the station via the CP, you need to activate the
online functions in the parameter group "Communication types" see the section
Communication types (Page 46).
You will find further information on the diagnostics functions of STEP 7 in the STEP 7
information system.
Via the CP you can access the Web server of the CPU and the information available there.
For access, refer to the section Web server of the CPU (Page 102).
For information on the functions, refer to the section Diagnostics with SNMP (Page 100).