indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
Qualified Personnel
personnel qualified
Proper use of Siemens products
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
ambient conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
Disclaimer of Liability
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
The product/system described in this documentation may be operated only by
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Note the following:
documentation. If products and components from other manufacturers are used, these must be recommended
or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
maintenance are required to ensure that the products operate safely and without any problems. The permissible
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
for the specific
05/2015 Subject to change
Preface
Validity of the manual
Purpose of the Configuration Manual
Orientation in the documentation
This Configuration Manual covers the following product:
● SCALANCE S615
This Configuration Manual applies to the following software version:
● SCALANCE S615 firmware as of Version V04.00
This Configuration Manual is intended to provide you with the information you require to
install, commission and operate the device. It provides you with the information you require
to configure the devices.
Apart from the Configuration Manual you are currently reading, the following documentation
is also available from on the topic of Remote Network:
● Getting Started SCALANCE S615
Based on examples, this document explains the configuration of the SCALANCE S615.
● Operating Instructions SCALANCE S615
You will find this document on the Internet pages of Siemens Industry Online Support. It
contains information on installation, connecting up and approvals of the SCALANCE
S615.
● Operating Instructions SINEMA RC Server
You will find this document on the Internet pages of Siemens Industry Online Support. It
contains information on the installation, configuration and operation of the application
SINEMA Remote Connect Server.
SCALANCE S615 Web Based Management
Configuration Manual, 05/2015, C79000-G8976-C388-02
3
Preface
SIMATIC NET manuals
SIMATIC NET glossary
Security information
You will find SIMATIC NET manuals on the Internet pages of Siemens Industry Online
Support:
● Using the search function:
Link to Siemens Industry Online Support
(http://support.automation.siemens.com/WW/view/en)
Enter the entry ID of the relevant manual as the search item.
● In the navigation panel on the left-hand side in the area "Industrial Communication":
Link to the area "Industrial Communication"
(http://support.automation.siemens.com/WW/view/en/10805878/130000)
Go to the required product group and make the following settings:
tab "Entry list", Entry type "Manuals"
You will find the documentation for the SIMATIC NET products relevant here on the data
storage medium that ships with some products:
● Product CD / product DVD
● SIMATIC NET Manual Collection
Explanations of many of the specialist terms used in this documentation can be found in the
SIMATIC NET glossary.
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, solutions, machines, equipment and/or networks. They are
important components in a holistic industrial security concept. With this in mind, Siemens’
products and solutions undergo continuous development. Siemens recommends strongly
that you regularly check for product updates.
For the secure operation of Siemens products and solutions, it is necessary to take suitable
preventive action (e.g. cell protection concept) and integrate each component into a holistic,
state-of-the-art industrial security concept. Third-party products that may be in use should
also be considered. For more information about industrial security, visit
http://www.siemens.com/industrialsecurity.
To stay informed about product updates as they occur, sign up for a product-specific
newsletter. For more information, visit http://support.automation.siemens.com.
A power supply with a voltage between 12 VDC and 24 VDC that can provide sufficient
current.
You will find further information on this in the device-specific operating instructions.
In the factory settings, the SCALANCE S615 can be reached as follows for initial
configuration:
Ethernet interface for the configu-
IP address 192.168.1.1
User name admin (cannot be changed)
Password admin
P1 ... P4
The password needs to be changed after the first logon or after a
You will find more information in "Web Based Management (Page 37)" and in "Starting and
logging in (Page 39)".
SCALANCE S615 Web Based Management
Configuration Manual, 05/2015, C79000-G8976-C388-02
13
Description
1.3
Configuration examples
1.3.1
TeleControl with SINEMA RC
1.3 Configuration examples
In this configuration, the remote maintenance master station is a connected to the
Internet/intranet via the SINEMA Remote Connect Server. The stations communicate via
SCALANCE M874 or SCALANCE S615 that establish a VPN tunnel to the SINEMA RC
server. In the master station, the SINEMA RC client establishes a VPN tunnel to the
SINEMA RC server.
The devices must log on to the SINEMA RC server. The VPN tunnel between the device and
the SINEMA RC server is established only after successful authentication. Depending on the
configured communications relations and the security settings, the SINEMA RC server
connects the individual VPN tunnels.
To be able to access a plant via a remote maintenance master station, follow the steps
below:
1. Establish the Ethernet connection between the S615 and the connected Admin PC.
2. Create the devices and node groups on the SINEMA RC Server.
3. Configure the connection to the SINEMA RC server on the device, refer to the section
SINEMA RC (Page 121).
4. Set up the connected applications of the plant for data communication.
SCALANCE S615 Web Based Management
Configuration Manual, 05/2015, C79000-G8976-C388-02
15
Description
1.3.2
Secure access with S615
Secure remote access and network segmentation with SCALANCE S615
1.3 Configuration examples
A secure connection for data exchange between an automation plant and remote stations
will be established via the Internet and mobile wireless network. At the same time, a secure
connection will be established when necessary for service purposes. This connection is,
however, restricted to a specific plant section or a specific machine.
In the automation plant, a SCALANCE S615 is connected to the Internet via the ADSL+
router M812-1. The remote stations will be connected to the Internet via the LTE-CP 1243-7
or the HSPA+ router SCALANCE M874-3.
SCALANCE S615 via which data can be exchanged securely.
When necessary, the service technician connects to the Internet. With the SOFTNET
Security Client, he or she establishes a secure VPN connection to the S615. Various IP
subnets are connected to the S615 between which the integrated firewall checks
communication. This allows the communication of the service technician to be restricted to a
specific IP subnet.
You can control the digital output directly via CLI or SNMP. In WBM and CLI, you can
configure the use of the digital output in "Events". Do not control the digital output direc
when you use this in the WBM and CLI.
Note
If the digital input changes the status, an entry is made in the event protocol table.
1.4 Digital input / output
The devices have a digital input/output.
The connection is made using two 2-pin terminal blocks. You will find information about the
pin assignment in the operating instructions of the devices.
● Digital input e.g. for establishing a VPN connection
● Digital output e.g. to signal existing VPN connections.
Using CLI and using the private MIB variable snMspsDigitalOutputLevel, you can control the
digital output (DO/1L).
tly
● OID of the private MIB variable snMspsDigitalOutputLevel:
IPv4 address, subnet mask and address of the gateway
Range of values for IPv4 address
IPv4 address format - notation
Range of values for subnet mask
The IPv4 address consists of four decimal numbers with the range from 0 to 255, each
number separated by a period; example: 141.80.0.16
An IPv4 address consists of 4 bytes. Each byte is represented in decimal, with a dot
separating it from the previous one.
XXX.XXX.XXX.XXX
XXX stands for a number between 0 and 255
The IPv4 address consists of two parts:
● The address of the (sub) network
● The address of the node (generally also called end node, host or network node)
The subnet mask consists of four decimal numbers with the range from 0 to 255, each
number separated by a period; example: 255.255.0.0
The binary representation of the 4 subnet mask decimal numbers must contain a series of
consecutive 1s from the left and a series of consecutive 0s from the right.
The 1s specify the network number within the IPv4 address. The 0s specify the host address
within the IPv4 address.
Example:
Correct values:
255.255.0.0 D = 1111 1111.1111 1111.0000 0000.0000 0000 B
255.255.128.0 D = 1111 1111.1111 1111.1000 0000.0000 0000 B
255.254.0.0 D = 1111 1111.1111 1110.0000 0000.0000.0000 B
Incorrect value:
255.255.1.0 D = 1111 1111.1111 1111.0000 0001.0000 0000 B
SCALANCE S615 Web Based Management
Configuration Manual, 05/2015, C79000-G8976-C388-02
19
Technical basics
Relationship between the IPv4 address and subnet mask
First decimal number of the IPv4 address
Subnet mask
0 to 127
255.x.x.x
192 to 223
255.255.255.x
Classless Inter-Domain Routing (CIDR)
Example:
Value range for gateway address
Relationship between IPv4 address and gateway address
2.1 IPv4 address, subnet mask and address of the gateway
The first decimal number of the IPv4 address (from the left) determines the structure of the
subnet mask with regard to the number of "1" values (binary) as follows (where "x" is the
host address):
128 to 191 255.255.x.x
CIDR is a method that groups several IPv4 addresses into an address range by representing
an IPv4 address combined with its subnet mask. To do this, a suffix is appended to the IPv4
address that specifies the number of bits of the network mask set to 1. Using the CIDR
notation, routing tables can be reduced in size and the available address ranges put to better
use.
IPv4 address 192.168.0.0 with subnet mask 255.255.255.0
The network part of the address covers 3 x 8 bits in binary representation; in other words 24
bits.
This results in the CIDR notation 192.168.0.0/24.
The host part covers 1 x 8 bits in binary notation. This results in an address range of 2 to the
power 8, in other words 256 possible addresses.
The address consists of four decimal numbers taken from the range 0 to 255, each number
being separated by a period; example: 141.80.0.1
The only positions of the IPv4 address and gateway address that may differ are those in
which "0" appears in the subnet mask.
Example:
You have entered the following: 255.255.255.0 for the subnet mask; 141.30.0.5 for the IPv4
address and 141.30.128.0 for the gateway address. Only the fourth decimal number of the
IPv4 address and gateway address may be different. In the example, however, the 3rd
position is different.
You must, therefore, change one of the following in the example:
Network definition regardless of the spatial location of the nodes
Options for the VLAN assignment
VLAN assignment on the device
device
the device
2.2 VLAN
VLAN (Virtual Local Area Network) divides a physical network into several logical networks
that are shielded from each other. Here, devices are grouped together to form logical groups.
Only nodes of the same VLAN can address each other. Since multicast and broadcast
frames are only forwarded within the particular VLAN, they are also known as broadcast
domains.
The particular advantage of VLANs is the reduced network load for the nodes and network
segments of other VLANs.
To identify which packet belongs to which VLAN, the frame is expanded by 4 bytes, refer to
VLAN tagging (Page 22). This expansion includes not only the VLAN ID but also priority
information.
There are various options for the assignment to VLANs:
● Port-based VLAN
Each port of a device is assigned a VLAN ID. You configure port-based VLAN in "Layer 2
> VLAN > Port-based VLAN (Page 130)".
● Protocol-based VLAN
Each port of a device is assigned a protocol group.
● Subnet-based VLAN
The IP address of the device is assigned a VLAN ID.
In the factory settings, the following assignments are made on the SCALANCE S615:
P1 to P4 vlan1
P5 vlan2
You can change the assignment in "Layer 2 > VLAN > General (Page 128)".
For access from the local network (LAN) to the
For access from the external network (WAN) to
The VLANs are in different IP subnets. To allow these to communicate with each other, the
route and firewall rule must be configured on the device.
SCALANCE S615 Web Based Management
Configuration Manual, 05/2015, C79000-G8976-C388-02
21
Technical basics
2.2.2
VLAN tagging
Expansion of the Ethernet frames by four bytes
Note
The VLAN
With the IE switches, the standard frame size is at least 1536 bytes.
The end nodes on the networks must be checked to find out whether they can process this
length / this fram
sent to these nodes.
Tag protocol identifier (TPID)
2.2 VLAN
For CoS (Class of Service, frame priority) and VLAN (virtual network), the IEEE 802.1 Q
standard defined the expansion of Ethernet frames by adding the VLAN tag.
tag increases the permitted total length of the frame from 1518 to 1522 bytes.
e type. If this is not the case, only frames of the standard length may be
The additional 4 bytes are located in the header of the Ethernet frame between the source
address and the Ethernet type / length field:
Figure 2-1 Structure of the expanded Ethernet frame
The additional bytes contain the tag protocol identifier (TPID) and the tag control information
(TCI).
The first 2 bytes form the Tag Protocol Identifier (TPID) and always have the value 0x8100.
This value specifies that the data packet contains VLAN information or priority information.
address, the least significant bit is transferred first. Standard-setting for Ethernet switches.
1
The format of the MAC address is not canonical.
VLAN ID
VLAN ID
Meaning
VLAN identifier.
ty information.
4095
Reserved
2.2 VLAN
The 2 bytes of the Tag Control Information (TCI) contain the following information:
The tagged frame has 3 bits for the priority that is also known as Class of Service (CoS). The
priority according to IEEE 802.1p is as follows:
001 Normal data traffic (best effort [background])
011 Reserved ( excellent effort )
The prioritization of the data packets is possible only if there is a queue in the components in
which they can buffer data packets with lower priority.
The device has multiple parallel queues in which the frames with different priorities can be
processed. First, the frames with the highest priority ("Strict Priority" method) are processed.
This method ensures that the frames with the highest priority are sent even if there is heavy
data traffic.
The CFI is required for compatibility between Ethernet and the token Ring.
The values have the following meaning:
0 The format of the MAC address is canonical. In the canonical representation of the MAC
In the 12-bit data field, up to 4096 VLAN IDs can be formed. The following conventions
apply:
0 The frame contains only priority information (priority tagged frames) and no valid
1 - 4094 Valid VLAN identifier, the frame is assigned to a VLAN and can also include priori-
SCALANCE S615 Web Based Management
Configuration Manual, 05/2015, C79000-G8976-C388-02
23
Technical basics
2.3
NAT
IP masquerading
NAPT
from
to
Response
port
translation.
a single port
a single port
The frames are translated to the port.
a port range
a single port
The frames from the port range are translated to the same port (n:1).
port range
port translation.
With individual connection, they are normally translated to the first port
used to translate to a free port in the target range.
robin method is used to translate to a free port in the target range.
2.3 NAT
NAT (Network Address Translation) is a method of translating IP addresses in data packets.
With this, two different networks (internal and external) can be connected together.
A distinction is made between source NAT in which the source IP address is translated and
destination NAT in which the destination IP address is translated.
IP masquerading is a simplified source NAT. With each outgoing data packet sent via this
interface, the source IP address is replaced by the IP address of the interface. The adapted
data packet is sent to the destination IP address. For the destination host it appears as if the
queries always came from the same sender. The internal nodes cannot be reached directly
from the external network. By using NAPT, the services of the internal nodes can be made
reachable via the external IP address of the device.
IP masquerading can be used if the internal IP addresses cannot or should not be forwarded
externally, for example because the internal network structure should remain hidden.
You configure masquerading in "Layer 3" > "NAT" > "IP Masquerading (Page 138)".
NAPT (Network Address and Port Translation) is a form of destination NAT and is often
called port forwarding. This allows the services of the internal nodes to be reached from
external that are hidden by IP masquerading or source NAT.
Incoming data packets are translated that come from the external network and are intended
for an external IP address of the device (destination IP address). The destination IP address
is replaced by the IP address of the internal node. In addition to address translation, port
translation is also possible.
The options are available for port translation:
a single port the same
a port range the same
a port range another port
range
If the ports are the same, the frames will be forwarded without port
If the port ranges are the same, the frames will be forwarded without
The frames are translated to any free port from the target range.
in the target range.
If there are connections at the same time, the round robin method is
a single port a port range The frames are translated to any free port from the target range. With
individual connection, they are normally translated to the first port in
the target range. If there are connections at the same time, the round
Port forwarding can be used to allow external nodes access to certain services of the internal
network e.g. FTP, WBM.
You configure NAPT in "Layer 3" > "NAT" > "NAPT (Page 139)".
As in masquerading, in source NAT the source address is translated. In addition to this, the
outgoing data packets can be restricted. These include limitation to certain IP addresses or
IP address ranges and limitation to certain interfaces. These rules can also be applied to
VPN connections.
Source NAT can be used if the internal IP addresses cannot or should not be forwarded
externally, for example because a private address range such as 192.168.x.x is used.
You configure source NAT in "Layer 3" > "NAT" > "Source NAT (Page 141)".
With NETMAP it is possible to translate complex subnets to a different subnet. In this
translation, the subnet part of the IP address is changed and the host part remains. For
translation with NETMAP only one rule is required. NETMAP can translate both the source
IP address and the destination IP address. To perform the translation with destination NAT
and source NAT, numerous rules would be necessary. NETMAP can also be applied to VPN
connections.
You configure 1:1 NAT in "Layer 3" > "NAT" > "NETMAP (Page 143)".
NAPT (Page 139)
SCALANCE S615 Web Based Management
Configuration Manual, 05/2015, C79000-G8976-C388-02
25
Technical basics
2.4
SNMP
Introduction
Note
Because the SNMP community strings are used for access protection, do not use the
standard values "public" or "private". Change these values following the initial
commissioning.
2.4 SNMP
With the aid of the Simple Network Management Protocol (SNMP), you monitor and control
network components from a central station, for example routers or switches. SNMP controls
the communication between the monitored devices and the monitoring station.
Tasks of SNMP:
● Monitoring of network components
● Remote control and remote parameter assignment of network components
● Error detection and error notification
In versions v1 and v2c, SNMP has no security mechanisms. Each user in the network can
access data and also change parameter assignments using suitable software.
For the simple control of access rights without security aspects, community strings are used.
The community string is transferred along with the query. If the community string is correct,
the SNMP agent responds and sends the requested data. If the community string is not
correct, the SNMP agent discards the query. Define different community strings for read and
write permissions. The community strings are transferred in plain text.
Standard values of the community strings:
● public
has only read permissions
● private
has read and write permissions
Further simple protection mechanisms at the device level:
● Allowed Host
The IP addresses of the monitoring systems are known to the monitored system.
● Read Only
If you assign "Read Only" to a monitored device, monitoring stations can only read out
data but cannot modify it.
SNMP data packets are not encrypted and can easily be read by others.
The central station is also known as the management station. An SNMP agent is installed on
the devices to be monitored with which the management station exchanges data.
The management station sends data packets of the following type:
● GET
Request for a data record from the agent
● GETNEXT
Calls up the next data record.
● GETBULK (available as of SNMPv2)
Requests multiple data records at one time, for example several rows of a table.
● SET
Contains parameter assignment data for the relevant device.
The SNMP agent sends data packets of the following type:
● RESPONSE
The agent returns the data requested by the manager.
● TRAP
If a certain event occurs, the SNMP agent itself sends traps.
SNMPv1/v2/v3 use UDP (User Datagram Protocol) and use the UDP ports 161 and 162. The
data is described in a Management Information Base (MIB).
Compared with the previous versions SNMPv1 and SNMPv2. SNMPv3 introduces an
extensive security concept.
SNMPv3 supports:
● Fully encrypted user authentication
● Encryption of the entire data traffic
● Access control of the MIB objects at the user/group level
SCALANCE S615 Web Based Management
Configuration Manual, 05/2015, C79000-G8976-C388-02
27
Technical basics
2.5
Security functions
2.5.1
Firewall
Stateful inspection firewall
2.5 Security functions
The security functions of the device include a stateful inspection firewall. This is a method of
packet filtering or packet checking. The IP packets are checked based on firewall rules in
which the following is specified:
● The permitted protocols
● IP addresses and ports of the permitted sources
● IP addresses and ports of the permitted destinations
If an IP packet fits the specified parameters, it is allowed to pass through the firewall. The
rules also specify what is done with IP packets that are not allowed to pass through the
firewall.
Simple packet filter techniques require two firewall rules per connection.
● One rule for the query direction from the source to the destination.
● A second rule for the response direction from the destination to the source
With a stateful inspection firewall, on the other hand, you only need to specify one firewall
rule for the query direction from the source to the destination. The second rule is added
implicitly. The packet filter recognizes when, for example, computer "A" is communicating
with computer "B" and only then does it allow replies. A query by computer "B" is therefore
not possible without a prior request by computer "A".
You configure the firewall in "Security > Firewall (Page 152)".
The device is capable of establishing up to 20 IPsecVPN connections to a remote network.
You configure the IPsec connections in "Security" > " IPsec VPN (Page 159)".
With IPsecVPN, the frames are transferred in tunnel mode. To allow the device to establish a
VPN tunnel, the remote network must have a VPN gateway as the partner.
For the VPN connections, the device distinguishes two modes:
●
In this mode, the device can only operate as a VPN server. The device can only wait for
VPN connections but cannot establish a VPN tunnel as the active partner. The address of
the partner does not need to be known in this mode. This means that it is also possible to
use a dynamic IP address.
●
In standard mode, the address of the VPN gateway of the partner must be known so that
the VPN connection can be established. The device can either establish the connection
actively as a VPN client or wait passively for connection establishment by the partner.
The device uses the IPsec method in the tunnel mode for the VPN tunnel. Here, the frames
to be transferred are completely encrypted and provided with a new header before they are
sent to the VPN gateway of the partner. The frames received by the partner are decrypted
and forwarded to the recipient.
To provide security, the IPsec protocol suite uses various protocols:
● The IP Authentication Header (
source.
● The Encapsulation Security Payload (
) handles the authentication and identification of the
) encrypts the data.
SCALANCE S615 Web Based Management
Configuration Manual, 05/2015, C79000-G8976-C388-02
29
Technical basics
IKE
Authentication method
Local ID and remote ID
2.5 Security functions
● The Security Association (SA) contains the specifications negotiated between the partner,
e.g. about the lifetime of the key, the encryption algorithm, the period for new
authentication etc.
● Internet Key Exchange (
two phases:
– Phase 1
In this phase, no security services such as encryption, authentication and integrity
checks are available yet since the required keys and the IPsec SA still need to be
created. Phase 1 serves to establish a secure VPN tunnel for phase 2. To achieve
this, the communications partners negotiate an ISAKMP Security Association
(ISAKMP SA) that defines the required security services (algorithms, authentication
methods used). The subsequent messages and phase 2 are therefore secure.
– Phase 2
Phase 2 serves to negotiate the required IPsec SA. Similar to phase 1, exchanging
offers achieves agreement about the authentication methods, the algorithms and the
encryption method to protect the IP packets with IPsec AH and IPsec ESP.
The exchange of messages is protected by the ISAKMP SA negotiated in phase 1.
Due to the ISAKMP SA negotiated in phase 1, the identity of the nodes is known and
the method for the integrity check already exists.
) is a key exchange method. The key exchange takes place in
● CA certificate, device and partner certificate (digital signatures)
The use of certificates is an asymmetrical cryptographic system in which every node
(device) has a pair of keys. Each node has a secret, private key and a public key of the
partner. The private key allows the device to authenticate itself and to generate digital
signatures.
● Pre-shared key
The use of a pre-shared key is a symmetrical cryptographic system. Each node has only
one secret key for decryption and encryption of data packets. The authentication is via a
common password.
The local ID and the remote ID are used by IPsec to uniquely identify the partners (VPN end
point) during establishment of a VPN connection.