Industrial Wireless LAN
SCALANCE W1780/W1740
according to IEEE 802.11ac
Web Based Management
Configuration Manual
Description
Security recommendations
Technical basics
IP addresses
Configuring with Web Based
Management
Upkeep and maintenance
Troubleshooting/FAQ
2
3
4
5
6
7
8
Appendix A
Appendix B
Appendix C
Appendix D
Appendix E
A
B
C
D
E
11/2019
C79000-G8976-C485-03
Legal information
Warning notice system
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
DANGER
indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will be
used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to property
damage.
Qualified Personnel
The product/system described in this documentation may be operated only by personnel qualified for the specific
task in accordance with the relevant documentation, in particular its warning notices and safety instructions. Qualified
personnel are those who, based on their training and experience, are capable of identifying risks and avoiding
potential hazards when working with these products/systems.
Proper use of Siemens products
Note the following:
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
documentation. If products and components from other manufacturers are used, these must be recommended or
approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
maintenance are required to ensure that the products operate safely and without any problems. The permissible
ambient conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software described.
Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the information in this
publication is reviewed regularly and any necessary corrections are included in subsequent editions.
Siemens AG
Digital Industries
Postfach 48 48
90026 NÜRNBERG
GERMANY
8.1Firmware update via WBM or CLI not possible....................................................................339
8.2Disrupted data transmission due to the received power being too high...............................340
8.3Instructions for secure network design.................................................................................341
AAppendix A ...............................................................................................................................................343
BAppendix B ...............................................................................................................................................345
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C485-037
Table of contents
CAppendix C ...............................................................................................................................................347
DAppendix D ...............................................................................................................................................349
D.1Messages in the event log ...................................................................................................349
D.2Messages in the WLAN Authentication Log.........................................................................353
EAppendix E ...............................................................................................................................................355
E.1Format of the syslog messages ...........................................................................................355
E.2Parameters in Syslog messages..........................................................................................356
This Configuration Manual covers the following products:
SCALANCE W1788-1 M12
●
● SCALANCE W1788-2 M12
● SCALANCE W1788-2 M12 EEC
● SCALANCE W1788-2IA M12
● SCALANCE W1748-1 M12
This Configuration Manual applies to the following software version:
● SCALANCE W1700 firmware as of version V2.0
Purpose of the Configuration Manual
This Configuration Manual is intended to provide you with the information you require to install,
commission and operate devices correctly. It explains how to configure the devices and how to
integrate them in a WLAN network.
1
How you install and connect up the device correctly is described in the operating instructions
of the device.
Orientation in the documentation
Apart from the Configuration Manual you are currently reading, the following documentation is
also available from SIMATIC NET on the topic of Industrial Wireless LANs:
● Configuration Manual: SCALANCE W1780/W1740 Command Line Interface
This document contains the CLI commands that are supported by SCALANCE W1700
devices.
● Performance data 802.11ac
This document contains information about the frequency, modulation, transmit power and
receiver sensitivity of the wireless card.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C485-039
Introduction
1.1 Information on the Configuration Manual
● SCALANCE W1788-x/W1748-1 Operating Instructions
document contains information on installing, connecting, maintaining and servicing the
This
following products:
– SCALANCE W1788-1 M12
– SCALANCE W1788-2 M12
– SCALANCE W1788-2 M12 EEC
– SCALANCE W1788-2IA M12
– SCALANCE W1748-1 M12
● System Manual Structure of an Industrial Wireless LAN
Apart from the description of the physical basics and a presentation of the main IEEE
standards, this also contains information on data security and a description of the industrial
applications of wireless LAN.
You should read this manual if you want to set up WLAN networks with a more complex
structure (not simply a connection between two devices).
● System manual RCoax
This system manual contains both an explanation of the fundamental technical aspects as
well as a description of the individual RCoax components and their functionality. Installation/
commissioning and connection of RCoax components and their operating principle are
explained. The possible applications of the various SIMATIC NET components are
described.
Terms used
● System manual - Passive Network Components IWLAN
This system manual explains the entire IWLAN cabling that you require for your IWLAN
application. For a flexible combination and installation of the individual IWLAN components
both indoors and outdoors, a wide ranging selection of compatible coaxial accessories are
available. The system manual also covers connecting cables as well as a variety of plug-in
connectors, lightning protectors, a power splitter and an attenuator.
The designation . . . stands for . . .
IPv4 address IPv4 address
IPv6 address IPv6 address
IP address IPv4/IPv6 address
IPv4 interfaceInterface that supports IPv4.
IPv6 interfaceInterface that supports IPv6. The interface can have more than one IPv6
address
IP interfaceInterface that supports both IPv4 and IPv6. As default the IPv4 support
is already activated. The IPv6 support needs to be activated extra.
The IPv6 addresses have different ranges (scope), e.g. link local
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
will find SIMATIC NET manuals on the Internet pages of Siemens Industry Online Support:
You
● Using the search function:
Siemens Industry Online Support (
Enter the entry ID of the relevant manual as the search item.
In the navigation panel on the left-hand side in the area "Industrial Communication":
●
Industrial communication (
Go to the required product group and make the following settings:
tab "Entry list", Entry type "Manuals"
Further documentation
The "SIMATIC NET Industrial Ethernet Network Manual" contains information on other
SIMATIC NET products that you can operate along with the devices of this product line in an
Industrial
of the communications partners that you require for the installation.
The "SIMATIC NET Industrial Ethernet Network Manual" can be found on the Internet pages of
Siemens Industry Online Support under the following entry ID:
27069465 (
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is
necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens’ products and solutions constitute one element of such a concept.
Customers are responsible for preventing unauthorized access to their plants, systems,
machines and networks. Such systems, machines and components should only be connected
to an enterprise network or the internet if and to the extent such a connection is necessary and
only when appropriate security measures (e.g. firewalls and/or network segmentation are in
place.
For additional information on industrial security measures that may be implemented, please
visit https://www.siemens.com/industrialsecurity
Siemens’ products and solutions undergo continuous development to make them more
secure. Siemens strongly recommends that product updates are applied as soon as they are
available and that the latest product versions are used. Use of product versions that are no
longer supported, and failure to apply the latest updates may increase customers’ exposure
to cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS
Feed under https://www.siemens.com/industrialsecurity
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C485-0311
Introduction
1.1 Information on the Configuration Manual
Trademarks
The following and possibly other names not identified by the registered trademark sign ® are
registered trademarks of Siemens AG:
SIMATIC NET, SCALANCE, RCoax
Firmware
The firmware is signed and encrypted. This ensures that only firmware created by Siemens can
be downloaded to the device.
SIMATIC NET glossary
Explanations of many of the specialist terms used in this documentation can be found in the
SIMATIC NET glossary.
You will find the SIMATIC NET glossary here:
● SIMATIC NET Manual Collection or product DVD
The DVD ships with certain SIMATIC NET products.
License conditions
● On the Internet under the following address:
50305045 (
Note
Open source software
Read the license conditions for open source software carefully before using the product.
You will find license conditions in the following documents on the supplied data medium:
The information in the manuals for the SCALANCE W1700 product family often applies to more
than one product variant. In such situations, the designations of the products are shortened to
avoid having to list all the type designations. The following table shows how the abbreviations
relate to the product variants.
Introduction
1.2 Type designations
Product groupThe designation . . . stands
SCALANCE W1700 acSCALANCE W1700
Access Points (IP 65)SCALANCE W1780
Client (IP65)SCALANCE W1740
Structure of the type designation
The type designation of the device is made up of several parts that have the following meaning:
Product name
for . . .
● SCALANCE W1788-1 M12
● SCALANCE W1788-2 M12
● SCALANCE W1788-2 M12 EEC
● SCALANCE W1788-2IA M12
● SCALANCE W1748-1 M12
● SCALANCE W1788-1 M12
● SCALANCE W1788-2 M12
● SCALANCE W1788-2 M12 EEC
● SCALANCE W1788-2IA M12
● SCALANCE W1748-1 M12
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C485-0313
Introduction
1.2 Type designations
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
The WLAN communication can be influenced by high frequency interference signals and can
be totally interrupted.
Remember this and take suitable action.
2.1Network structures
The following article deals with the setup of various network structures using access points.
Standalone configuration with access point
This configuration does not require a server and the access point does not have a connection
to a wired Ethernet. Within its transmission range, the access point forwards data from one
WLAN node to another.
2
The wireless network has a unique name. All SCALANCE W devices exchanging data within
this network must be configured with this name.
The gray area in the graphic symbolizes the wireless range of the access point.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C485-0315
Description
2.1 Network structures
Wireless access to a wired Ethernet network
If one (or more) access points have access to wired Ethernet, the following applications are
possible:
● A single device as gateway:
A wireless network can be connected to a wired network via an access point.
● Span of wireless coverage for the wireless network with several access points:
The access points are all configured with the same unique SSID (network name). All nodes
that want to communicate over this network must also be configured with this SSID.
If a mobile station moves from the area covered by one access point to the area covered by
another access point, the wireless link is maintained (roaming).
The following graphic shows the wireless connection of a mobile station over two wireless
cells (roaming).
Multichannel configuration
If neighboring access points use the same frequency channel, this can lead to longer response
times due to any collisions that may occur. If the configuration shown in the figure is
implemented as a single-channel system, computers A and B cannot communicate at the same
time with the access points in their wireless cells.
If neighboring access points are set up for different frequencies, this leads to a considerable
improvement in performance. As a result, neighboring wireless cells each have their own
medium available and the delays resulting from time-offset transmission no longer occur.
The channel spacing should be as large as possible; a practical value is 25 MHz. Even in a
multichannel configuration, all access points can be configured with the same network name.
The following graphic shows a multichannel configuration on channels 1 and 2 with four access
points.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
WDS allows direct links between access points and or between access points and other WDScompliant devices. These are used to create a wireless backbone or to connect an individual
access point to a network that cannot be connected directly to the cable infrastructure due to
its location.
Two alternative configurations are possible. The WDS partner can be configured using the
WDS ID or using its MAC address.
The following graphic shows the implementation of WDS with four access points.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C485-0317
Description
2.2 Possible applications
2.2Possible applications
Note
The SIMATIC NET WLAN products use OpenSSL.
This is open source code with license conditions (BSD).
Please refer to the current license conditions.
Since the driver includes encryption software, you should also adhere to the appropriate
regulations for your specific country.
Possible applications of the SCALANCE W1788
The SCALANCE W1788 is equipped with up to two Ethernet interfaces and up to two WLAN
interfaces. This makes the device suitable for the following applications:
● The SCALANCE W1788 forwards data within its transmission range from one node to
another without a connection to wired Ethernet being necessary.
● The SCALANCE W1788 can be used as a gateway from a wired to a wireless network.
● The SCALANCE W1788 can be used as a wireless bridge between two networks.
● The SCALANCE W1788 can be used as a bridge between two cells operating at different
frequencies.
● The SCALANCE W1788 comes with an integrated switch and can be networked in a variety
of ways over its two managed Ethernet Gigabit ports.
● The SCALANCE W1788 supports degree of protection IP65, which means it is dust-proof
and protected completely against contact and water jets (nozzle) from any direction.
● The SCALANCE W1788 M12 EEC is suitable for use in harsh environments.
With a SCALANCE W1788 with more than one WLAN interface, you can also implement a
redundant wireless connection to a SCALANCE W1788 with a maximum of two WLAN
interfaces.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
– 10 Mbps and 100 Mbps both in full and half duplex
– 1000 Mbps full duplex
– Autocrossing
– Autopolarity
● Operating the WLAN interface in the frequency bands 2.4 GHz and 5 GHz.
● IEEE 802.11ac
High Speed WLAN standard (wireless LAN) with a gross transmission speed of up to 1733
Mbps.
● IEEE 802.11r
Optimization of roaming (Fast BSS Transition)
● The WLAN interface is compatible with the standards IEEE 802.11n.
Description
2.3 Product characteristics
● IEEE 802.11h - Supplement to IEEE 802.11a
In the 802.11h mode, the methods "Transmit Power Control (TPC)" as well as "Dynamic
Frequency Selection (DFS)" are used in the range 5.25 - 5.35 and 5.47 - 5.75 GHz. In some
countries, this allows the frequency subband of 5.47 - 5.725 GHz to be used in the outdoor
area even with higher transmit powers.
TPC is a method of adapting the transmit power.
With DFS, the access point searches for primary users for 60 seconds before starting
communication on the selected channel. During this time the access point does not send
beacons. If signals are found on the channel, the channel is blocked for 30 minutes, the
access point changes channel and repeats the check. Primary users are also searched for
during operation.
● Support of the authentication standards WPA (RADIUS), WPA-PSK, WPA2 (RADIUS),
WPA2-PSK and IEEE 802.1x and the encryption methods WEP, AES and TKIP.
Note
With devices operated in WLAN mode IEEE 802.11n/ac, only WPA2 (WPA2-PSK and
WPA2 Radius) encryption is possible.
● For better transmission via WLAN, the function WMM (wireless multimedia) is enabled. The
frames are evaluated according to their priority and sent prioritized via the WLAN interface.
● Suitable for inclusion of a RADIUS server for authentication.
● Device-related and application-related monitoring of the wireless connection.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C485-0319
Description
2.4 IEEE 802.11n/ac
● The interoperability of the devices with Wi-Fi devices of other vendors was tested
● Before commissioning the SCALANCE W1700, check the wireless conditions on site. If you
thoroughly.
intend to use Industrial Wireless LAN systems and WirelessHART systems in the 2.4 GHz
band, you will need to plan the use of the channels. At all costs, avoid parallel use of
overlapping frequency ranges. The following overlaps exist with Industrial Wireless LAN
and WirelessHART:
IWLAN channel
IEEE 802.11 b/g/n
111 - 16
615 - 20
716 - 21
1120 - 25
1321 - 25
Features of the SCALANCE W1700
TypeNumber of
WLAN ports
SCALANCE W1788-1 M1214 x exter‐
SCALANCE W1788-2 M1228 x exter‐
SCALANCE W1788-2 M12
EEC
SCALANCE W1788-2IA M12 28 x inter‐
SCALANCE W1748-1 M1214 x exter‐
28 x exter‐
Antennas Number and
nal
nal
nal
nal
nal
WHART channel
IEEE 802.15.4
type of Ethernet interface
2 x gigabit Ethernet (copper)
1 x PoE
2 x gigabit Ethernet (copper)
1 x PoE
2 x gigabit Ethernet (copper)
1 x PoE
2 x gigabit Ethernet (copper)
1 x PoE
2 x gigabit Ethernet (copper)
1 x PoE
Degree of
protection
IP656GK5788-1GY01-0AA0
IP656GK5788-2GY01-0AA0
IP656GK5788-2GY01-0TA0
IP656GK5788-2HY01-0AA0
IP656GK5748-1GY01-0AA0
Article number
2.4IEEE 802.11n/ac
Overview
The IEEE 802.11ac standard is a further development of the IEEE 802.11n standard and is
downward compatible with the standards IEEE 802.11a, IEEE 802.11h and IEEE 802.11n. The
mechanisms of the PHY and MAC layer implemented in the IEEE 802.11n standard have been
improved.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
MIMOSingle-User MIMOMulti-User MIMO
Modulation schemeOFDM (BPSK, QPSK, 16-QAM,
MIMO antenna technology
MIMO (Multiple Input - Multiple Output) is based on an intelligent multiple antenna system. The
transmitter and the receiver have several spatially separate antennas. These separated
antennas transmit the data streams (spatial streams) at the same time. Up to four data streams
are possible with IEEE 802.11n and up to eight data streams with IEEE 802.11ac.
The data streams are transmitted over spatially separate paths and return over different paths
due to diffraction, refraction, fading and reflection (multipath propagation). The multipath
propagation means that at the point of reception a complex, space- and time-dependent pattern
results as a total signal made up of the individual signals sent. MIMO uses this unique pattern
by detecting the spatial position of characteristic signals. Here, each spatial position is different
from the neighboring position. The specific characteristics of each sender enable the recipient
to separate several signals from each other.
Single-User MIMO
With Single-User MIMO, the same frame is sent over multiple data streams to a single WLAN
client. A single-user MIMO can operate up to four devices alternately, but only one device at a
time.
Multi-User MIMO
With multi-user MIMO, multiple frames are sent simultaneously to different multi-user MIMO
clients over the same frequency range. A multi-user MIMO therefore supplies up to four multiuser MIMO clients with data simultaneously.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C485-0321
Multi-User
MIMO
Client 2
Client 3
Client 1
Client 4
Description
2.4 IEEE 802.11n/ac
Spatial mutliplexing
Accelerated guard interval
Frame aggregation
With spatial multiplexing, different information is sent using the same frequency. The data
stream is distributed over n transmitting antennas; in other words, each antenna sends only 1/
n of the data stream. The division of the data stream is restricted by the number of antennas.
The signal is reconstructed at the receiver end. Due to the spatial multiplexing, there is a higher
signal-to-noise ratio and a higher data throughput.
The guard interval prevents different transmissions being mixed together. In
telecommunications, this mixing is also known as intersymbol interference (ISI).
When the send time has elapsed, a send pause (guard interval) must be kept to before the next
transmission begins.
The guard interval of IEEE 802.11a /b/g is 800 ns. IEEE 802.11n/ac can use the reduced guard
interval of 400 ns. You specify the guard interval on the WBM page "AP 802.11n/ac
(Page 237)".
With IEEE 802.11n/ac, it is possible to bundle together individual frames to form one larger
frame, a process referred to as frame aggregation. There are two types of frame aggregation:
● Aggregated MAC Service Data Unit (A-MSDU)
Multiple MSDU frames with the same destination address are bundled and sent as one AMSDU. This reduces the network load. Due to their shorter maximum length, A-MSDUs are
mainly suitable for bundling several shorter frames.
● Aggregated MAC Protocol Data Unit (A-MPDU)
Multiple MPDU frames with the same destination address are bundled and sent as one large
A-MPDU. This allows the total throughput to be increased.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
The SCALANCE W devices support both types of frame aggregation. You make the settings on
the WBM page "AP 802.11n/ac (Page 237)".
Maximum ratio combining (MRC)
In a multiple antenna system, the wireless signals are received by the individual antennas and
combined to form one signal. The MRC method is used to combine the wireless signals. The
MRC method weights the wireless signals according to their signal-to-noise ratio and combines
the wireless signals to form one signal. The signal-to-noise ratio is improved and the error rate
is reduced.
2.5IEEE 802.11r
During roaming, the WLAN client roams from one access point to the next. A delay time of
several 100 ms can come about at the connection transition.
The following steps can be executed during this time:
● Client searches for a new access point (scanning)
Description
2.6 Requirements for installation and operation
● Logon at a new access point (authentication and association)
● Allow a data connection via the new access point
Shorter delay times are required for time-critical applications, for example, Voice over IP. The
standard IEEE 802.11r contains amendments which optimize roaming and therefore is also
referred to as Fast BSS Transition (FT).
With FT, the WLAN client must not authenticate every time the access point changes. For this
purpose, the access points are grouped into a mobility domain. The WLAN client receives the
mobility domain ID from the first access point to which it logs on. The log-on information is
buffered within the mobility domain. This logon is valid for all members of the mobility domain.
Based on the ID, the WLAN client recognizes whether the access point is a member of the
same mobility domain and can therefore log on without delay. Only WLAN clients with IEEE
802.11r support can use the improved roaming or handover functions.
Requirement
● The access points are members of the same mobility domain
● Only possible with WPA2 encryption (WPA2-PSK and WPA2 RADIUS)
2.6Requirements for installation and operation
A PG/PC with network connection must be available in order to configure the SCALANCE W
devices. If no DHCP server is available, a PC on which the Primary Setup Tool (PST) is
installed is necessary for the initial assignment of an IP address to the SCALANCE W devices.
For the other configuration settings, a computer with Telnet or a Web browser is necessary.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C485-0323
Description
2.7 Configuration License PLUG (CLP)
2.7Configuration License PLUG (CLP)
The PLUG is available in the following variants:
● PLUG Configuration: The exchangeable storage medium only saves the configuration data
of the device.
How it works
NOTICE
Do not remove or insert the PLUG during operation.
A PLUG may only be removed or inserted when the device is turned off.
The device checks whether a PLUG is inserted at one second intervals. If it is detected that the
PLUG has been removed, the device restarts.
If a valid PLUG was inserted in the device, the device changes to a defined error state
following the restart. With SCALANCE W, the available wireless interfaces are deactivated in
this case.
If the device was configured at one time with a PLUG, the device can no longer be used
without this PLUG. To be able to use the device again, reset the device to the factory settings.
PLUG
Devices with CLP slot support the following operating modes:
● Without PLUG
The device saves the configuration data in the internal memory. This mode is active when
no PLUG is inserted.
● With PLUG
If an empty PLUG (as supplied) is inserted in the device, the device automatically backs up
the configuration data on the PLUG during startup. If the PLUG contains a license,
additional functions are also enabled. Changes to the configuration are stored directly on
the PLUG and in the internal memory.
The configuration stored on the PLUG is displayed over the user interfaces.
When an unconfigured device starts up, it automatically adopts the configuration data of the
inserted, written C-PLUG. The prerequisite for this is that the configuration data was written
by a compatible device type.
One exception to this can be the IP configuration if it is set using DHCP and the DHCP server
has not been reconfigured accordingly. Reconfiguration is necessary if you use functions
based on MAC addresses.
ComponentDescriptionArticle number
CLP
Configuration
License PLUG
Exchangeable storage medium for saving configuration
data
ComponentDescriptionArticle number
CLP iFeaturesExchangeable storage medium for saving configuration
data and enabling iFeatures
SCALANCE CLP 2GB W17806GK5907-8UA00-0AA0
SCALANCE CLP 2GB W17406GK5907-4UA00-0AA0
2.8PRESET PLUG
CLP with preset function (PRESET-PLUG)
With PRESET-PLUG it is possible to install the same configuration and the firmware belonging
to it on several devices.
Note
Using configurations with DHCP
Create a PRESET-PLUG only from device configurations that use DHCP. Otherwise
disruptions will occur in network operation due to multiple identical IP addresses.
Description
2.9 Power over Ethernet (PoE)
You assign fixed IP addresses extra following the basic installation.
In a CLP that was configured as a PRESET-PLUG, the device configuration, user accounts,
certificates and the firmware are stored.
Note
Restore factory defaults and restart with a PRESET PLUG inserted
If you reset a device to the factory defaults, when the device restarts an inserted PRESET
PLUG is formatted and the PRESET PLUG functionality is lost. You then need to create a new
PRESET PLUG.
We recommend that you remove the PRESET PLUG before you reset the device to the factory
settings.
For more detailed information on creating and using a PRESET PLUG refer to the section
Device configuration with PRESET-PLUG (Page 335).
2.9Power over Ethernet (PoE)
General
"Power over Ethernet" (PoE) is a power supply strategy for network components according to
IEEE with 802.3af or 802.3at.
With PoE, power and data transmission takes place over the used Ethernet cables that connect
the individual network components. This makes an additional power cable unnecessary and
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C485-0325
Description
2.9 Power over Ethernet (PoE)
reduces investment and maintenance costs. PoE can be used with all network components that
require little power (max. 12.95 W).
Which Ethernet connectors of a device are capable of PoE can be found in the operating
instructions of the relevant device.
Cable used for the power supply
● Variant 1 (redundant wires)
In Fast Ethernet, the wire pairs 1, 2 and 3, 6 are used to transfer data. Pairs 4, 5 and 7, 8 are
then used to supply power. If there are only four wires available, the voltage is modulated
onto the wires 1, 2 and 3, 6 (see variant 2). This alternative is suitable for a data transmission
rate of 10/100 Mbps. This type of power supply is not suitable for 1 Gbps since with gigabit
all 8 wires are used for data transfer.
● Variant 2 (phantom power)
With phantom power, the power is supplied over the pairs that are used for data transfer, in
other words, the power is modulated onto the data cable. With Gigabit, all eight wires of the
Ethernet cable are used for data transmission and power supply according to IEEE 802.3at.
With 10/100 Mbps, four wires of the Ethernet cable are used for data transmission and
power supply according to IEEE 802.3af.
Endspan
Midspan
With PoE, there are power generators (Power Source Equipment, PSE) and power consumers
(Power Devices, PD).
Whether a device (power consumer) supports variant 1 and variant 2 or only variant 2 can be
found in the operating instructions of the relevant device.
A power generator (PSE) can supply the power consumer (PD) either over:
● Variant 1 or
● Variant 2 or
● Variant 1 and variant 2.
With endspan, the power is supplied via a switch that can reach a device over an Ethernet
cable. The switch must be capable of PoE, for example a SCALANCE X108PoE, SCALANCE
X308-2M POE, SCALANCE XR552‑12M.
Midspan is used when the switch is not PoE-compliant. The power is supplied by an additional
device between the switch and end device. In this case, only data rates of 10/100 Mbps can be
achieved because the power is supplied on redundant wires.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
A Siemens power insert can also be used as the interface for the power input. Since a power
insert supports a power supply of 24 VDC, it does not conform with 802.3af or IEEE 802.3at.
The following restrictions relating to the use of power inserts should be noted:
WARNING
Operate the power insert only when the following conditions apply:
● with extra low voltages SELV, PELV complying with IEC 60364-4-41
● in USA/CAN with power supplies complying with NEC class 2
● in USA/CAN, the cabling must meet the requirements of NEC/CEC
● Only activate protocols that you really require to use the device.
● Use the security functions such as address translation with NAT (Network Address
Translation) or NAPT (Network Address Port Translation) to protect receiving ports from
access by third parties.
● Restrict access to the device with a firewall or rules in an access control list (ACL - Access
Control List).
● If RADIUS authentication is via remote access, make sure that the communication is within
the secured network area or is via a secure channel.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C485-0329
Security recommendations
● The option of VLAN structuring provides good protection against DoS attacks and
unauthorized access. Check whether this is practical or useful in your environment.
● Use a central logging server to log changes and access operations. Operate your logging
server within the protected network area and check the logging information regularly.
● Use WPA2/ WPA2-PSK with AES to protect the WLAN. You can find additional information
on this in the section ""Security" menu".
Passwords
● Define rules for the use of devices and assignment of passwords.
● Regularly update passwords and keys to increase security.
● Change all default passwords for users before you operate the device.
● Only use passwords with a high password strength. Avoid weak passwords for example
password1, 123456789, abcdefgh.
● Make sure that all passwords are protected and inaccessible to unauthorized personnel.
● Do not use the same password for different users and systems or after it has expired.
Certificates and keys
● On the device there is a preset SSL certificate with key. Replace this certificate with a self-
● Use a certification authority including key revocation and management to sign certificates.
● Make sure that user-defined private keys are protected and inaccessible to unauthorized
● It is recommended that you use password-protected certificates in the PKCS #12 format
● Verify certificates and fingerprints on the server and client to prevent "man in the middle"
● It is recommended that you use certificates with a key length of at least 2048 bits.
● Change certificates and keys immediately, if there is a suspicion of compromise.
made certificate with key. We recommend that you use a certificate signed either by a
reliable external or by an internal certification authority.
persons.
attacks.
SCALANCE W1780/W1740 according to IEEE 802.11ac Web Based Management