indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
ambient conditions must be complied with. The information in the relevant documentation must be observed.
Legal information
Warning notice system
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
Qualified Personnel
The product/system described in this documentation may be operated only by personnel qualified for the specific
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Proper use of Siemens products
Note the following:
documentation. If products and components from other manufacturers are used, these must be recommended
or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
maintenance are required to ensure that the products operate safely and without any problems. The permissible
Trademarks
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
6 Technical data ...................................................................................................................................... 41
6.1 Technical specifications of the SCALANCE W788C-2) .......................................................... 41
Make sure that you read the explanations and instructions in the README.txt file
1.1 Information on the Operating Instructions
Validity of the Operating Instructions
These operating instructions cover the following products:
SCALANCE W788C-2 M12 EEC 6GK5788-2GD00-1TA0
If information relates to all the named products, the term SCALANCE W7x8 will be used.
These operating instructions apply to the following software version:
● SCALANCE W7x8C with firmware as of version 8.31
Purpose of the Operating Instructions
Using the Operating Instructions, you will be able to install and connect the SCALANCE
W7x8 correctly. The configuration and the integration of the device in a WLAN are not
described in these instructions.
Documentation on the accompanying CD
You will find introductory information about configuration in the document "Getting Started
SCALANCE WLC711" on the accompanying SIMATIC NET IWLAN CD under the file name:
GS_SCALANCE-WLC711_76 pdf
-2 M12 EEC devices are detected by the configuration software of the
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is
necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens’ products and solutions constitute one element of such a concept.
Customers are responsible for preventing unauthorized access to their plants, systems,
machines and networks. Such systems, machines and components should only be
connected to an enterprise network or the internet if and to the extent such a connection is
necessary and only when appropriate security measures (e.g. firewalls and/or network
segmentation) are in place.
For additional information on industrial security measures that may be implemented, please
visit (https://www.siemens.com/industrialsecurity)
Siemens’ products and solutions undergo continuous development to make them more
secure. Siemens strongly recommends that product updates are applied as soon as they are
available and that the latest product versions are used. Use of product versions that are no
longer supported, and failure to apply the latest updates may increase customers’ exposure
to cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS
Feed under (https://www.siemens.com/industrialsecurity)
Recycling and disposal
The products are low in pollutants, can be recycled and meet the requirements of the WEEE
directive 2012/19/EU for the disposal of electrical and electronic equipment.
Do not dispose of the products at public disposal sites.
For environmentally friendly recycling and the disposal of your old device contact a certified
disposal company for electronic scrap or your Siemens contact (Product return
(https://support.industry.siemens.com/cs/ww/en/view/109479891)).
Note the different national regulations.
Trademarks
The following and possibly other names not identified by the registered trademark sign ® are
registered trademarks of Siemens AG:
SIMATIC NET, SCALANCE, C-PLUG, RCoax
SCALANCE W788C-2
6Operating Instructions, 07/2019, A5E03692120-14
2
General
To prevent unauthorized access, note the following security recommendations.
● You should make regular checks to make sure that the device meets these
recommendations and/or other security guidelines.
● Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products (https://www.industry.siemens.com/topics/global/en/industrial-
security/pages/default.aspx).
● When the internal and external network are disconnected, an attacker cannot access
internal data from the outside. Therefore operate the device only within a protected
network area.
● For communication via non-secure networks use additional devices with VPN functionality
to encrypt and authenticate the communication.
● Restrict physical access to the device to qualified personnel.
● The memory card or the PLUG (C-PLUG, KEY-PLUG, security PLUG) contains sensitive
data such as certificates, keys etc. that can be read out and modified.
Software (security functions)
● Keep the firmware up to date. Check regularly for security updates of the product.
You will find information on this on the Internet pages "Industrial Security
(https://www.siemens.com/industrialsecurity)".
● Inform yourself regularly about security advisories and bulletins published by Siemens
ProductCERT (https://www.siemens.com/cert/en/cert-security-advisories.htm).
● Only activate protocols that you really require to use the device.
● Use the security functions such as address translation with NAT (Network Address
Translation) or NAPT (Network Address Port Translation) to protect receiving ports from
access by third parties.
● Restrict access to the device with a firewall or rules in an access control list (ACL -
Access Control List).
● If RADIUS authentication is via remote access, make sure that the communication is
within the secured network area or is via a secure channel.
● The option of VLAN structuring provides good protection against DoS attacks and
unauthorized access. Check whether this is practical or useful in your environment.
● Use a central logging server to log changes and access operations. Operate your logging
server within the protected network area and check the logging information regularly.
● Use WPA2/ WPA2-PSK with AES to protect the WLAN. If iPCF or iPCF-MC is used, use
the AES encryption.
Passwords
● Define rules for the use of devices and assignment of passwords.
● Regularly update passwords and keys to increase security.
● Change all default passwords for users before you operate the device.
● Only use passwords with a high password strength. Avoid weak passwords for example
password1, 123456789, abcdefgh.
● Make sure that all passwords are protected and inaccessible to unauthorized personnel.
● Do not use the same password for different users and systems or after it has expired.
Keys and certificates
This section deals with the security keys and certificates you require to set up HTTPS
(HyperText Transfer Protocol Secured Socket Layer).
● We strongly recommend that you create your own HTTPS certificates and make them
available.
There are preset certificates and keys on the device. The preset and automatically
created HTTPS certificates are self-signed.
We recommend that you use HTTPS certificates signed either by a reliable external or by
an internal certification authority. The HTTPS certificate checks the identity of the device
and controls the encrypted data exchange. You can install the HTTPS certificate via the
WBM (System > Load and Save).
● Handle user-defined private keys with great caution if you use user-defined SSH or SSL
keys.
● Use the certification authority including key revocation and management to sign the
certificates.
● Verify certificates and fingerprints on the server and client to avoid "man in the middle"
attacks.
● We recommend that you use certificates with a key length of 2048 bits.
● Change keys and certificates immediately, if there is a suspicion of compromise.
SCALANCE W788C-2
8Operating Instructions, 07/2019, A5E03692120-14
Security recommendations
Secure/non-secure protocols and services
● Avoid and disable non-secure protocols, for example Telnet and TFTP. For historical
reasons, these protocols are still available, however not intended for secure applications.
Use non-secure protocols on the device with caution.
● Check whether use of the following protocols and services is necessary:
– Non-authenticated and unencrypted ports
– LLDP
– Syslog
– DHCP options 66/67
– TFTP
● The following protocols provide secure alternatives:
– SNMPv1/v2 → SNMPv3
Check whether use of SNMPv1 is necessary. SNMPv1 is classified as non-secure.
Use the option of preventing write access. The product provides you with suitable
setting options.
● Use secure protocols when access to the device is not prevented by physical protection
● To prevent unauthorized access to the device or network, take suitable protective
● If you require non-secure protocols and services, operate the device only within a
● Restrict the services and protocols available to the outside to a minimum.
● For the DCP function, enable the "Read Only" mode after commissioning.
Available protocols
The following list provides you with an overview of the open protocol ports.
The table includes the following columns:
●
If SNMP is enabled, change the community names. If no unrestricted access is
necessary, restrict access with SNMP.
The mounting set with the holding plate does not ship with the device, see
(Page
3.3 Components of the product
3.3 Components of the product
The following components are supplied with the product:
● SCALANCE W7x8
● Only with device variant M12 / IP65:
– 2 protective caps for the M12 sockets
● Only with device variant RJ-45 / IP30:
– 4-pin terminal block for the supply voltage
– 4-pin terminal block for the digital input/output
● 2 screws for mounting on an S7-300 standard rail
● SIMATIC NET Industrial Wireless LAN CD
Accessories
15).
Please check that the consignment you have received is complete. If the consignment is
incomplete, contact your supplier or your local Siemens office.
SCALANCE W788C-2
14Operating Instructions, 07/2019, A5E03692120-14
Description
Component
Description
Article number
rail and for mast mounting with additional hose clips
Component
Description
Article number
package
Component
Description
Article number
4 x 2 (24 AWG); 180° cable outlet
package
per package
Component
Description
Article number
Sold by the meter
* Available in different lengths
3.4 Accessories
3.4 Accessories
Technical data subject to change.
You will find further information on the range of accessories in the Industry Mall
(https://mall.industry.siemens.com)
Mounting set
Mounting set Mounting set can only be used in conjunction with
SCALANCE W-786; consisting of holding plate for wall
mounting, for mounting on an S7-300 rail and a DIN
Plug-in connector Industrial Ethernet
For the M12 variants the following plug-in connector is required:
IE FC M12
PLUG PRO
4 x 2
For the RJ-45 variants the following plug-in connector is required:
IE FC RJ45
PLUG 180
4 x 2
Industrial Ethernet FastConnect M12
Plug PRO 4 x 2 M12 plug-in connector with rugged metal housing
and FC connector technology, with
axial cable outlet (X coded)
Industrial Ethernet FastConnect
RJ45 Plug 180 4 x 2, RJ45 plug-in
connector; CAT6A;
(10/100/1000/10000 Mbps) with
rugged metal housing and FC connector technology, for IE FC Cable