Siemens SIMATIC NET SCALANCE W721-1, SIMATIC NET SCALANCE W761-1, SIMATIC NET SCALANCE W760, SIMATIC NET SCALANCE W720, SIMATIC NET SCALANCE W722-1 Configuration Manual
indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
Qualified Personnel
personnel qualified
Proper use of Siemens products
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
maintenance are required to ensure that the products operate safely and without any problems. The permissible
ambient conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
Disclaimer of Liability
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
The product/system described in this documentation may be operated only by
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Note the following:
documentation. If products and components from other manufacturers are used, these must be recommended
or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
5.4.11.1 Overview AP .......................................................................................................................... 84
5.4.11.2 Client List ............................................................................................................................... 86
5.4.11.3 WDS List ................................................................................................................................ 87
5.4.11.4 Overlap AP ............................................................................................................................. 89
5.6.2.6 AP ......................................................................................................................................... 181
5.6.2.7 AP WDS ................................................................................................................................ 184
5.6.2.8 AP 802.11a/b/g Rates ........................................................................................................... 185
5.6.2.9 AP 802.11n Rates ................................................................................................................. 188
A Appendix A .......................................................................................................................................... 241
B Appendix B .......................................................................................................................................... 243
C Appendix C .......................................................................................................................................... 245
D Appendix D .......................................................................................................................................... 247
Index ................................................................................................................................................... 253
This Configuration Manual covers the following products:
● SCALANCE W721-1 RJ-45
● SCALANCE W722-1 RJ-45
● SCALANCE W761-1 RJ-45
This Configuration Manual applies to the following software version:
● SCALANCE W700 firmware as of Version V 5.00
This Configuration Manual is intended to provide you with the information you require to
commission and operate devices correctly. It explains how to configure the devices and how
to integrate them in a WLAN network.
The operating instructions for the corresponding device describe how to install and connect
up the devices correctly.
Apart from the Configuration Manual you are currently reading, the following documentation
is also available from SIMATIC NET on the topic of Industrial Wireless LANs:
● Configuration Manual: SCALANCE W760 / W720 Command Line Interface
This document contains the CLI commands that are supported by SCALANCE W700
devices.
● Performance data 802.11 abgn SCALANCE W760/W720
This document contains information about the frequency, modulation, transmit power and
receiver sensitivity.
This document contains information on installing and connecting up the following
products and their approvals.
– SCALANCE W721-1 RJ-45
– SCALANCE W722-1 RJ-45
– SCALANCE W761-1 RJ-45
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C350-03
7
Introduction
SIMATIC NET manuals
1.1 Information on the Configuration Manual
● System Manual Structure of an Industrial Wireless LAN
Apart from the description of the physical basics and a presentation of the main IEEE
standards, this also contains information on data security and a description of the
industrial applications of wireless LAN.
You should read this manual if you want to set up WLAN networks with a more complex
structure (not simply a connection between two devices).
● System manual RCoax
This system manual contains both an explanation of the fundamental technical aspects
as well as a description of the individual RCoax components and their functionality.
Installation/commissioning and connection of RCoax components and their operating
principle are explained. The possible applications of the various SIMATIC NET
components are described.
● System manual - Passive Network Components IWLAN
This system manual explains the entire IWLAN cabling that you require for your IWLAN
application. For a flexible combination and installation of the individual IWLAN
components both indoors and outdoors, a wide ranging selection of compatible coaxial
accessories are available. The system manual also covers connecting cables as well as a
variety of plug-in connectors, lightning protectors, a power splitter and an attenuator.
You will find SIMATIC NET manuals on the Internet pages of Siemens Industry Online
Support:
The "SIMATIC NET Industrial Ethernet Network Manual" contains information on other
SIMATIC NET products that you can operate along with the devices of this product line in an
Industrial Ethernet network. There, you will find among other things optical performance data
of the communication partners that you require for the installation.
The "SIMATIC NET Industrial Ethernet Network Manual" can be found on the Internet pages
of Siemens Industry Online Support under the following entry ID:
Siemens provides automation and drive products with industrial security functions that
support the secure operation of plants or machines. They are an important component in a
holistic industrial security concept. With this in mind, our products undergo continuous
development. We therefore recommend that you keep yourself informed with respect to our
product updates. Please find further information and newsletters on this subject at:
http://support.automation.siemens.com.
To ensure the secure operation of a plant or machine it is also necessary to take suitable
preventive action (e.g. cell protection concept) and to integrate the automation and drive
components into a state-of-the-art holistic industrial security concept for the entire plant or
machine. Any third-party products that may be in use must also be taken into account.
Please find further information at: http://www.siemens.com/industrialsecurity
The information in the manuals for the SCALANCE W700 product family often applies to
more than one product variant. In such situations, the designations of the products are
shortened to avoid having to list all the type designations. The following table shows how the
abbreviations relate to the product variants.
All SCALANCE W devices W700 SCALANCE W761-1 RJ-45
SCALANCE W721-1 RJ-45
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C350-03
9
Introduction
SIMATIC NET glossary
1.3 Type designations
The type designation of a SCALANCE W700 is made up of several parts that have the
following meaning:
Explanations of many of the specialist terms used in this documentation can be found in the
SIMATIC NET glossary.
The following article deals with the setting up of various network structures using access
points and clients. A client is also an access point in client mode.
This configuration does not require a server and the access point does not have a
connection to a wired Ethernet. Within its transmission range, the access point forwards data
from one WLAN node to another.
The wireless network has a unique name. All the devices exchanging data within this
network must be configured with this name.
Figure 2-1 Standalone configuration of an access point. The gray area symbolizes the wireless
range of the access point.
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C350-03
11
Description
Wireless access to a wired Ethernet network
2.1 Network structures
If one (or more) access points have access to wired Ethernet, the following applications are
possible:
● A single device as gateway:
A wireless network can be connected to a wired network via an access point.
● Span of wireless coverage for the wireless network with several access points:
The access points are all configured with the same unique SSID (network name). All
nodes that want to communicate over this network must also be configured with this
SSID.
If a mobile station moves from the area covered by one access point to the area covered
by another access point, the wireless link is maintained (roaming).
Figure 2-2 Wireless connection of a mobile station over two cells (roaming)
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
If neighboring access points use the same frequency channel, this can lead to longer
response times due to any collisions that may occur. If the configuration shown in the figure
is implemented as a single-channel system, computers A and B cannot communicate at the
same time with the access points in their wireless cells.
If neighboring access points are set up for different frequencies, this leads to a considerable
improvement in performance. As a result, neighboring wireless cells each have their own
medium available and the delays resulting from time-offset transmission no longer occur.
The channel spacing should be as large as possible; a practical value is 25 MHz. Even in a
multichannel configuration, all access points can be configured with the same network name.
Figure 2-3 Multichannel configuration on channels 1 and 2 with four access points
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C350-03
13
Description
Wireless Distribution System (WDS)
2.1 Network structures
WDS allows direct links between access points and or between access points and other
WDS-compliant devices. These are used to create a wireless backbone or to connect an
individual access point to a network that cannot be connected directly to the cable
infrastructure due to its location.
Two alternative configurations are possible. The WDS partner can be configured using the
WDS ID or using its MAC address.
Figure 2-4 Implementation of WDS with four access points
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Network access with a client or an access point in client mode
2.2
Possible applications of SCALANCE W700 devices
Note
The SIMATIC NET WLAN products use OpenSSL.
This is open source code with license conditions
Please refer to the current license conditions.
Since the driver includes encryption software, you should also adhere to the appropriate
regulations for your specific country.
Possible applications of the SCALANCE W761
2.2 Possible applications of SCALANCE W700 devices
The device can be used to integrate wired Ethernet devices (for example SIMATIC S7 PLC)
in a wireless network.
Figure 2-5 Connecting a SIMATIC S7 PLC to a wireless LAN.
The SCALANCE W761 is equipped with an Ethernet interface and a WLAN interface. This
makes the device suitable for the following applications:
(BSD).
● The SCALANCE W761 forwards data within its transmission range from one node to
another without a connection to wired Ethernet being necessary.
● The SCALANCE W761 can be used as a gateway from a wired to a wireless network.
● The SCALANCE W761 supports protection class IP20.
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C350-03
15
Description
Possible applications of the SCALANCE W722
Possible applications of the SCALANCE W721
2.3
Product characteristics
Properties of the SCALANCE W700 devices
2.3 Product characteristics
The SCALANCE W722 is equipped with an Ethernet interface and a WLAN interface. This
makes the device suitable for the following applications:
● The SCALANCE W722 can be used as a gateway from a wired to a wireless network.
● The SCALANCE W722 can be used with iPCF as a client.
● The SCALANCE W722 supports protection class IP20.
The SCALANCE W721 is equipped with two Ethernet interfaces and a WLAN interface. This
makes the device suitable for the following applications:
● The SCALANCE W721 can be used as a gateway from a wired to a wireless network.
● The SCALANCE W721 supports protection class IP20.
● The Ethernet interface supports the following:
– 10 Mbps and 100 Mbps both in full and half duplex
– Autocrossing
– Autopolarity
● Operating the WLAN interface in the frequency bands 2.4 GHz and 5 GHz.
● The WLAN interface is compatible with the standards IEEE 802.11a , IEEE 802.11b , and
IEEE 802.11g. In the 802.11a and 802.11g mode, the gross transmission rate is up to 54
Mbps.
● IEEE 802.11n
High-speed WLAN standard (wireless LAN) and can operate in the 2.4 GHz and in the 5
GHz range.
● IEEE 802.11h - Supplement to IEEE 802.11a
In the 802.11h mode, the methods "Transmit Power Control (TPC)" as well as "Dynamic
Frequency Selection (DFS)" are used in the range 5.25 - 5.35 and 5.47 - 5.75 GHz. In
some countries, this allows the frequency subband of 5.47 - 5.725 GHz to be used in the
outdoor area even with higher transmit powers.
TPC is a method of adapting the transmit power.
With DFS, the access point searches for primary users for 60 seconds before starting
communication on the selected channel. During this time the access point does not send
beacons. If signals are found on the channel, the channel is blocked for 30 minutes, the
access point changes channel and repeats the check. Primary users are also searched
for during operation.
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
The transmission standard IEEE 802.11n
supports only WPA2/WPA2
IWLAN channel
IEEE 802.11 b/g/n
WHART channel
IEEE 802.15.4
6
15 - 20
7
16 - 21
11
20 - 25
13
21 - 25
Note
All SCALANCE W700 access points can be reconfigured for client mode.
2.3 Product characteristics
● Support of the authentication standards WPA, WPA-PSK, WPA2, WPA2-PSK and
IEEE 802.1x and the encryption methods WEP, AES and TKIP.
with the setting "802.11n" or "802.11n only"
-PSK with AES in the security settings.
● For better transmission via WLAN, the function WMM (wireless multimedia) is enabled.
The frames are evaluated according to their priority and sent prioritized via the WLAN
interface.
● Suitable for inclusion of a RADIUS server for authentication.
● Device-related and application-related monitoring of the wireless connection.
● The interoperability of the devices with Wi-Fi devices of other vendors was tested
thoroughly.
● Before commissioning the SCALANCE W700, check the wireless conditions on site. If
you intend to use Industrial Wireless LAN systems and WirelessHART systems in the 2.4
GHz band, you will need to plan the use of the channels. At all costs, avoid parallel use of
overlapping frequency ranges. The following overlaps exist with Industrial Wireless LAN
and WirelessHART:
1 11 - 16
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C350-03
17
Description
Features of the SCALANCE W700
Type
Number of
WLAN
ports
Antennas
Number and
type of Ethernet
interface
Degree of
protection
Order no.
per)
per)
2.4
IEEE 802.11n
Overview
2.4 IEEE 802.11n
SCALANCE W761-1 RJ-45 1 external 1 x 10/100 Mbps
Ethernet (copper)
SCALANCE W722-1 RJ-45 1 external 1 x 10/100 Mbps
Ethernet (cop-
SCALANCE W721-1 RJ-45 1 external 1 x 10/100 Mbps
Ethernet (cop-
(1) US variant
The standard IEEE 802.11n is an expansion of the 802.11 standard and was approved in
2009.
Previous standards worked either in the 2.4 GHz frequency band (IEEE 802.11g /b) or in the
5 GHz frequency band (IEEE 802.11a). IEEE 802.11n can operate in both frequency band.
In the IEEE 802.11n standard, there are mechanisms implemented in PHY and MAC layers
that increase the data throughput and improve the wireless coverage.
IP20 6GK5761-1FC00-0AA0
6GK5761-1FC00-0AB0
IP20 6GK5722-1FC00-0AA0
6GK5722-1FC00-0AB0
IP20 6GK5721-1FC00-0AA0
6GK5721-1FC00-0AB0
(1)
(1)
(1)
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
MIMO (Multiple Input - Multiple Output) is based on an intelligent multiple antenna system.
The transmitter and the receiver have several spatially separate antennas. The spatially
separate antennas transmit the data streams at the same time. Up to four data streams are
possible. The data streams are transmitted over spatially separate paths and return over
different paths due to diffraction, refraction, fading and reflection (multipath propagation).
The multipath propagation means that at the point of reception a complex, space- and timedependent pattern results as a total signal made up of the individual signals sent. MIMO
uses this unique pattern by detecting the spatial position of characteristic signals. Here, each
spatial position is different from the neighboring position. By characterizing the individual
senders, the recipient is capable of separating several signals from each other.
In a multiple antenna system, the wireless signals are received by the individual antennas
and combined to form one signal. The MRC method is used to combine the wireless signals.
The MRC method weights the wireless signals according to their signal-to-noise ratio and
combines the wireless signals to form one signal. The signal-to-noise ratio is improved and
the error rate is reduced.
With spatial multiplexing, different information is sent using the same frequency. The data
stream is distributed over n transmitting antennas; in other words, each antenna sends only
1/n of the data stream. The division of the data stream is restricted by the number of
antennas. At the receiver end, the signal is reconstructed.
Due to the spatial multiplexing, there is a higher signal-to-noise ratio and a higher data
throughput.
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C350-03
19
Description
Channel bonding
Frame aggregation
Accelerated guard interval
2.4 IEEE 802.11n
With IEEE 802.11n, data can be transferred via two directly neighboring channels. The two
20 MHz channels are put together to form one channel with 40 MHz. This allows the channel
bandwidth to be doubled and the data throughput to be increased.
To be able to use channel bonding, the recipient must support 40 MHz transmissions. If the
recipient does not support 40 MHz transmissions, the band is automatically reduced to 20
MHz. This means that IEEE 802.11n can also communicate with IEEE 802.11a/b/g devices.
The channel bonding is set on the "AP" WBM page with the "HT Channel Width [MHz]"
parameter.
With IEEE 802.11n, it is possible to group together individual data packets to form a single
larger packet; this is known as frame aggregation. There are two types of frame aggregation:
Aggregated MAC Protocol Data Unit (A-MPDU) and Aggregated MAC Service Data Unit (AMSDU).
The frame aggregation reduces the packet overheads. Frame aggregation can only be used
if the individual data packets are intended for the same receiving station (client).
The W700 devices support both types of frame aggregation. You specify the settings for the
A-MPDU data packet on the "AP 802.11n" WBM page.
The guard interval prevents different transmissions being mixed together. In
telecommunications, this mixing is also known as intersymbol interference (ISI).
When the send time has elapsed, a send pause (guard interval) must be kept to before the
next transmission begins.
The guard interval of IEEE 802.11a /b/g is 800 ns. IEEE 802.11n can use the reduced guard
interval of 400 ns. You specify the guard interval on the "AP 802.11n" WBM page.
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Requirements for installation and operation of SCALANCE W700 devices
2.5 Requirements for installation and operation
The IEEE 802.11n standard supports different data rates. The data rates are based on the
number of spatial streams, the modulation method and the channel coding. The various
combinations are described in modulation and coding schemes.
A PG/PC with a network connection must be available in order to configure
SCALANCE W700 devices. If no DHCP server is available, a PC on which the Primary
Setup Tool (PST) is installed is necessary for the initial assignment of an IP address to the
SCALANCE W700 devices. For the other configuration settings, a computer with Telnet or a
Web browser is necessary.
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C350-03
21
Description
2.5 Requirements for installation and operation
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Network definition regardless of the spatial location of the nodes
Options for the VLAN assignment
3.2
MAC-based communication
Adopt MAC automatically / Adopt MAC manually
VLAN (Virtual Local Area Network) divides a physical network into several logical networks
that are shielded from each other. Here, devices are grouped together to form logical groups.
Only nodes of the same VLAN can address each other. Since multicast and broadcast
frames are only forwarded within the particular VLAN, they are also known as broadcast
domains.
The particular advantage of VLANs is the reduced network load for the nodes and network
segments of other VLANs.
To identify which packet belongs to which VLAN, the frame is expanded by 4 bytes. This
expansion includes not only the VLAN ID but also priority information.
There are various options for the assignment to VLANs:
● Port-based VLAN
Each port of a device is assigned a VLAN ID. You configure port-based VLAN in "Layer 2
> VLAN (Page 200)".
● Protocol-based VLAN
Each port of a device is assigned a protocol group.
● Subnet-based VLAN
The IP address of the device is assigned a VLAN ID.
Frames in the direction from the client to the access point always have the MAC address of
the WLAN interface as the source MAC address. As a result, the "learning table" at the
access point end always has only the MAC address of the WLAN interface of the client. If the
MAC address of a device connected to the client is adopted, both the MAC-based and the
IP-based frames find their destination in precisely this device.
Communication at the MAC address level (ISO/OSI layer 2) can only be to a subscriber
downstream from the client. With IP Mapping, several subscribers downstream from a client
can be addressed based on the IP protocol.
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C350-03
23
Technical basics
Note
From the moment that the device adopts another MAC address (whether
automatically), the device no longer responds to queries of the Primary Setup Tool when
the query is received over the WLAN interface. Queries of the PST over the Ethernet
interface continue to be replied to.
Adopt Own MAC
Layer 2 Tunnel
3.2 MAC-based communication
The access point checks whether the destination MAC address matches the MAC addresses
of the connected clients. Since a client can only adopt one MAC address, the access point
does not find a match and discards the packets of several nodes.
Maximum possible number of nodes downstream from the client: 1
Notes on the "Automatic" setting:
● As long as there is no link on the Ethernet interface, the device uses the MAC address of
the Ethernet interface so that it can be reached in this status. In this status, the device
can be found using the Primary Setup Tool and configured with WBM or CLI.
● As soon as there is a link on the Ethernet interface, the device adopts the source MAC
address of the first received frame.
manually or
If IP-based frames need to be sent to a device connected downstream from the client, the
default setting "Own" can be retained. The client registers with the MAC address of its
Ethernet adapter. The IP packets are broken down according to an internal table and
forwarded to the connected devices (IP mapping).
Maximum possible number of nodes downstream from the client: 4
With a "Layer 2 Tunnel", the client provides information about the devices downstream from
it when it registers with an access point. This makes it possible to enter the MAC addresses
of these devices in the learning table of the access point. The access point can forward
MAC-based frames for the devices downstream from the client to the appropriate client.
In much the same way as with WDS, a separate port is created for the L2T client over which
the Ethernet frames are sent without changing the destination MAC address.
Maximum possible number of nodes downstream from the client: 4
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
The wireless range of an IWLAN system can be expanded by using multiple access points. If
a client moves from the area covered by one access point to the area covered by another
access point, the wireless link is maintained after a short interruption (roaming).
In an industrial environment, there are applications that require a deterministic response
when there are large numbers of nodes and when roaming to another cell require handover
times of less than 100 milliseconds.
●
(industrial Point Coordination Function)
iPCF ensures that the entire data traffic of a cell is ordered, controlled by the access
point. Even with large numbers of nodes, collisions can also be avoided. iPCF also allows
fast cell changes.
You configure iPCF in "iFeatures > iPCF (Page 232)".
●
iPCF-MC was developed to make the advantages of iPCF available to fully mobile nodes
that communicate without being dependent on RCoax cable or directional antennas. With
iPCF-MC, the client also searches for potentially suitable access points when it receives
iPCF queries from the access point and the existing connection to an access point is
working problem-free. This means that if a change to a different access point is
necessary, this is achieved extremely quickly. In contrast to iPCF, the handover times for
iPCF-MC are not dependent on the number of wireless channels being used.
(industrial Point Coordination Function - Management Channel)
You configure iPCF-MC in "iFeatures > iPCF-MC (Page 232)".
The access point checks all nodes in the wireless cell cyclically. At the same time, the scan
includes the downlink traffic for this node. In the reply, the node sends the uplink data. The
access point scans a new node at least every 5 ms.
The scan of a node is seen by all other nodes in the cell. This allows a client to detect the
quality of the wireless link to the access point even when it is not communicating with the
access point itself. If the client does not receive any frames from the access point for a
certain time, it starts to search for a new access point.
In iPCF mode, both the search for a new access point and the registration with this access
point have been optimized in terms of time. Handover times significantly below 50 ms are
achieved.
Stable PNIO communication is only possible when a WLAN client is in a cell with more than
60 % (-65 dBm) signal strength at all times. This can be checked by activating and
deactivating the various wireless cells.
This does not mean that the client needs to change when there is a signal strength < 60 %
(< -65 dBm). Make sure that access points are available with adequate signal strength.
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C350-03
25
Technical basics
①
Wireless cell of access point 1
②
Wireless cell of access point 2
③
Wireless cell of access point 3
④
Wireless cell of access point 4
⑤
Plant
3.3 iPCF / iPCF-MC
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
● iPCF and iPCF-MC are developments of Siemens AG and function only with nodes on
which iPCF / iPCF-MC is implemented.
● With an access point with several WLAN interfaces, it is possible to use both iPCF as well
as standard WLAN at the same time.
● Access points with a WLAN interface cannot take part in the iPCF-MC procedures, iPCF
is, however, possible.
iPCF-MC uses the two wireless interface of the access point in different ways: One interface
works as the management interface and sends a beacon every five milliseconds. The other
interface transfers the user data.
The following requirements must be met before you can use iPCF-MC:
● Only devices with two WLAN interfaces can be used as access points
● The data interface (WLAN1) and management interface (WLAN2) must be operated in
the same frequency band and must match in terms of their wireless coverage. iPCF-MC
will not work if the two wireless interfaces are equipped with directional antennas that
cover different areas.
● The management interfaces of all access points to which a client can change must use
the same channel. A client scans only this one channel to find accessible access points.
● Transmission based on IEEE 802.11h (DFS) cannot be used for the management
interface. 802.11h (DFS) is possible for the data interface.
● A client must support this feature on its WLAN interface.
iPCF-MC (Page 233)
The use of the layer 3 functions is possible only with the client SCALANCE W722-1 RJ-45.
With Network Address Translation (NAT), the IP address in a data packet is replaced by
another. NAT is normally used on a gateway between a private LAN and an external network
with globally valid IP addresses. A local IP address of the internal LAN is changed to an
external global IP address by a NAT device at the gateway.
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C350-03
27
Technical basics
What is NAPT?
Note
NAT/NAPT is possible only on layer 3 of the ISO/OSI reference model. To use the NAT
function, the networks must use the IP protocol.
When using the ISO protocol that operates at layer 2, it is not possible to use NAT.
3.5
SNMP
Introduction
3.5 SNMP
To translate the internal into the global IP address, the NAT device maintains a translation
list. The address assignment is automatic. You configure the address assignment in "Layer 3
> NAT > Basic".
In "Network Address Port Translation" (NAPT) or "Port Address Translation" (PAT), several
internal source IP addresses are translated into the same external source IP address. To
identify the individual source nodes, the port of the source device is also stored in the
translation list of the NAT gateway and translated for the external address.
If several local clients send a query to the same external destination IP address over the
NAT gateway, the gateway enters its own external source IP address in the header of these
forwarded frames. Since the forwarded frames have the same global source IP address, the
NAT gateway assigns the frames to the clients using different port number.
If a client from the global network wants to use a service in the internal network, the
translation list for the static address assignment needs to be configured. You configure the
translation list for NAPT in "Layer 3 > NAT > NAPT".
With the aid of the Simple Network Management Protocol (SNMP), you monitor and control
network elements from a central station, for example routers or switches. SNMP controls the
communication between the monitored devices and the monitoring station.
Tasks of SNMP:
● Monitoring of network components
● Remote control and remote parameter assignment of network components
● Error detection and error notification
In versions v1 and v2c, SNMP has no security mechanisms. Each user in the network can
access data and also change parameter assignments using suitable software.
For the simple control of access rights without security aspects, community strings are used.
The community string is transferred along with the query. If the community string is correct,
the SNMP agent responds and sends the requested data. If the community string is not
correct, the SNMP agent discards the query. Define different community strings for read and
write permissions. The community strings are transferred in plain text.
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Because the SNMP community strings are used f
standard values "public" or "private". Change these values following the initial
commissioning.
3.5 SNMP
Standard values of the community strings:
● public
has only read permissions
● private
has read and write permissions
or access protection, do not use the
Further simple protection mechanisms at the device level:
● Allowed Host
The IP addresses of the monitoring systems are known to the monitored system.
● Read Only
If you assign "Read Only" to a monitored device, monitoring stations can only read out
data but cannot modify it.
SNMP data packets are not encrypted and can easily be read by others.
The central station is also known as the management station. An SNMP agent is installed on
the devices to be monitored with which the management station exchanges data.
The management station sends data packets of the following type:
● GET
Request for a data record from the agent
● GETNEXT
Calls up the next data record.
● GETBULK (available as of SNMPv2)
Requests multiple data records at one time, for example several rows of a table.
● SET
Contains parameter assignment data for the relevant device.
The SNMP agent sends data packets of the following type:
● RESPONSE
The agent returns the data requested by the manager.
● TRAP
If a certain event occurs, the SNMP agent itself sends traps.
SNMPv1 and SNMPv2 and SNMPv3 use UDP (User Datagram Protocol). The data is
described in a Management Information Base (MIB).
SCALANCE W760/W720 to IEEE 802.11n Web Based Management
Configuration Manual, 11/2014, C79000-G8976-C350-03
29
Technical basics
SNMPv3
3.6
Spanning Tree
Avoiding loops
Root bridge and bridge priority
Response to changes in the network topology
Keeping configuration information up to date
3.6 Spanning Tree
Compared with the previous versions SNMPv1 and SNMPv2. SNMPv3 introduces an
extensive security concept.
SNMPv3 supports:
● Fully encrypted user authentication
● Encryption of the entire data traffic
● Access control of the MIB objects at the user/group level
The Spanning Tree algorithm detects redundant physical network structures and prevents
the formation of loops by disabling redundant paths. It evaluates the distance and
performance of a connection or bases the decisions on settings made by the user. Data is
then exchanged only over the remaining connection paths.
If the preferred data path fails, the Spanning Tree algorithm then searches for the most
efficient path possible with the remaining nodes.
The identification of the most efficient connection is always related to the root bridge, a
network component that can be considered as a root element of a tree-like network
structure. With the "Bridge Priority" parameter, you can influence the selection of the root
bridge. The computer with the lowest value set for this parameter automatically becomes the
root bridge. If two computers have the same priority value, the computer with the lower MAC
address becomes the root bridge.
If nodes are added to a network or drop out of the network, this may affect the optimum path
selection for data packets. To be able to respond to such changes, the root bridge sends
configuration messages (BPDUs) at regular intervals. You can set the interval between two
configuration messages with the "Hello Time" parameter.
With the "Max Age" parameter, you set the maximum age of configuration information. If a
bridge has information that is older than the time set in Max Age, it discards the message
and initiates recalculation of the paths.
New configuration data is not used immediately by a bridge but only after the period
specified in the "Forward Delay" parameter. This ensures that operation is started with the
new topology only after all the bridges have the required information.
SCALANCE W760/W720 to IEEE 802.11n Web Based Management