indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
Qualified Personnel
personnel qualified
Proper use of Siemens products
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
maintenance are required to ensure that the products operate safely and without any problems. The permissible
ambient conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
Disclaimer of Liability
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
The product/system described in this documentation may be operated only by
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Note the following:
documentation. If products and components from other manufacturers are used, these must be recommended
or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
for the specific
11/2016 Subject to change
Preface
Introduction
Who is this document intended for?
Purpose of this document
Validity of this document
By using the Industrial Wireless LAN controller SCALANCE WLC711 along with controllerbased access points, it is possible to set up a single wireless infrastructure for the entire
company. This achieves a high degree of flexibility since mobile subscribers (for example a
laptop) move both in the office and in the automation network and can change over
seamlessly between these networks (roaming). This means that data can be accessed from
anywhere in the company over wireless.
Thanks to the use of a centralized security mechanism for each user group, data is protected
from unauthorized access and manipulation.
The controller-based access points SCALANCE W78xC support the WLAN standards IEEE
802.11a/b/g ad 802.11n and are connected to the IWLAN controller SCALANCE WLC via
gigabit Ethernet. The same applies to the access points SCALANCE W786C, with which a
connection via fiber-optic is possible depending on the version. The controller-based access
points SCALANCE W786-2HPW support the WLAN standards IEEE 802.11a/b/g and are
connected to the IWLAN controller SCALANCE WLC via fast Ethernet or fiber-optic cable.
One requirement for operation is always the use of the IWLAN controller SCALANCE WLC
which makes the group configuration of access points possible. This allows a widespread
IWLAN infrastructure to be represented clearly. The central management with the IWLAN
controller also allows the recording of disruptions, monitoring and documentation of
statistics.
The Getting Started is intended for system administrators who want to configure the wireless
LAN controller SCALANCE Industrial Wireless LAN controller WLC711 and the access
points with the Web Based Management (WBM) of the SCALANCE Industrial Wireless LAN
controller and access points.
This document provides you with a general overview of the functions of the WBM
SCALANCE Industrial Wireless LAN controller and access points. The Getting Started will
quickly help you to learn about configuring the devices.
We recommend that you read the Getting Started not selectively but rather from front to
back. You will get to know the important components that can help you during configuration.
This document is valid for the SCALANCE IWLAN controller WLC711 and the controllerbased SCALANCE W78xC access points as of firmware version V 9.21.
3
Preface
SIMATIC NET glossary
Security messages
Note
Siemens offers IT security mechanisms for its automation and drive product portfolio in order
to support the safe operation of the plant/machine. Our products are also continuously
developed further with regard to IT security. We therefore recommend that
check for updates of our products and that you only use the latest versions. You will find
information in:
Here, you can register for a product
For the safe operation of a plant/machine, however, it is also necessary to integrate the
automation components into an overall IT security concept for the entire plant/machine,
whic
Products from
Explanations of many of the specialist terms used in this documentation can be found in the
SIMATIC NET glossary.
3 Getting started ...................................................................................................................................... 17
4 Basic configuration with the wizard ........................................................................................................ 23
Index .................................................................................................................................................... 97
SCALANCE WLC711
6Getting Started, 04/2016, C79000-G8976-C269-07
1
1.1
General information
Note
Note the information in the SCALANCE WLC711 user guide and the compact operating
instructions SCALANCE WLC711.
Notes on secure network design
Use WPA2/ WPA2-PSK with AES
Protect your network against man-in-the-middle attacks
Use SNMPv3
To protect your network from attacks, note the following points:
●
To prevent misuse of a password, use only WPA2/AES. WPA2/ WPA2-PSK with AES
provides the highest security.
●
To protect your network from man-in-the-middle attacks, a network topology is
recommended, that makes it more difficult for an attacker to tap into the communications
path between two end devices.
– You can, for example, protect WLAN devices by arranging so that the management
port is accessible only via a separate management VLAN.
– You can also install a separate HTTPS certificate on a WLAN client / access point.
The HTTPS certificate checks the identity of the device and controls the encrypted
data exchange. You can install the HTTPS certificate via HTTP.
●
SNMPv3 provides you with highest possible security when accessing the WLAN devices
via SNMP.
To prevent unauthorized access, note the following security recommendations.
● You should make regular checks to make sure that the device meets these
recommendations and/or other security guidelines.
● Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products.
● When confidential zones are used, the internal and external network are disconnected, an
attacker cannot access the data from the outside.
● Operate the device only within a protected network area.
● Use additional devices with VPN functionality (e.g. SCALANCE S) to encrypt and
authenticate communication from and to the devices.
● For data transfer via a non-secure network, use an encrypted VPN tunnel (IPsec) by
using additional devices with VPN functionality (e.g. SCALANCE S).
● For operation of the device in a non-secure infrastructure no product liability will be
accepted.
● Separate connections correctly (WBM. Telnet, SSH etc.).
● Restrict physical access to the device to qualified personnel.
● Lock unused physical ports on the device. Unused ports can be used to gain forbidden
access to the plant.
● Keep the software up to date. Check regularly for security updates of the product.
You will find information on this on the Internet pages "Industrial Security
(http://www.siemens.com/industrialsecurity".
● Inform yourself regularly about security advisories and bulletins published by Siemens
ProductCERT (http://www.siemens.com/cert/en/cert-security-advisories.htm).
● Only activate protocols that you really require to use the device.
● Use the security functions such as address translation with NAT (Network Address
Translation) or NAPT (Network Address Port Translation) to protect receiving ports from
access by third parties.
● Restrict access to the device with a firewall or rules in an access control list (ACL -
Access Control List).
● If RADIUS authentication is via remote access, make sure that the communication is
within the secured network area or is via a secure channel.
● The option of VLAN structuring provides good protection against DoS attacks and
unauthorized access. Check whether this is practical or useful in your environment.
SCALANCE WLC711
8Getting Started, 04/2016, C79000-G8976-C269-07
Security recommendations
Passwords
Keys and certificates
1.2 Security recommendations
● Enable logging functions. Use the central logging function to log changes and access
attempts centrally. Check the logging information regularly.
● Configure a Syslog server to forward all logs to a central location.
● Use WPA2/ WPA2-PSK with AES to protect the WLAN.
● Define rules for the use of devices and assignment of passwords.
● Regularly update passwords and keys to increase security.
● Change all default passwords for users before you operate the device.
● Only use passwords with a high password strength. Avoid weak passwords for example
password1, 123456789, abcdefgh.
● Make sure that all passwords are protected and inaccessible to unauthorized personnel.
● Do not use the same password for different users and systems or after it has expired.
This section deals with the security keys and certificates you require to set up HTTPS (
HyperText Transfer Protocol Secured Socket Layer).
● We strongly recommend that you create your own HTTPS certificates and make them
● Handle user-defined private keys with great caution if you use user-defined SSH or SSL
● Use the certification authority including key revocation and management to sign the
● Verify certificates and fingerprints on the server and client to avoid "man in the middle"
● We recommend that you use certificates with a key length of 2048 bits.
● Change keys and certificates immediately, if there is a suspicion of compromise.
available.
There are preset certificates and keys on the device. The preset and automatically
created HTTPS certificates are self-signed.
We recommend that you use HTTPS certificates signed either by a reliable external or by
an internal certification authority. The HTTPS certificate checks the identity of the device
and controls the encrypted data exchange. You can install the HTTPS certificate via the
WBM (System > Load and Save).
● Avoid and disable non-secure protocols, for example Telnet and TFTP. For historical
reasons, these protocols are still available, however not intended for secure applications.
Use non-secure protocols on the device with caution.
● The following protocols provide secure alternatives:
– SNMPv1/v2 → SNMPv3
Check whether use of SNMPv1 is necessary. SNMPv1 is classified as non-secure.
Use the option of preventing write access. The product provides you with suitable
setting options.
If SNMP is enabled, change the community names. If no unrestricted access is
necessary, restrict access with SNMP.
Use SNMPv3 in conjunction with passwords.
– HTTP → HTTPS
– SNTP → NTP
● Use secure protocols when access to the device is not prevented by physical protection
measures.
● To prevent unauthorized access to the device or network, take suitable protective
measures against non-secure protocols.
● If you require non-secure protocols and services, operate the device only within a
protected network area.
● Restrict the services and protocols available to the outside to a minimum.
SCALANCE WLC711
10Getting Started, 04/2016, C79000-G8976-C269-07
Security recommendations
Port list
Component
Protocol
Soruce
Port
Destination Port
Service
Remark
Require
Firewall
to open
Source
Destination
(TCP/UDP)
Ports for AP/Controller Communication
Management and Data Tunnel
Management and Data Tunnel
between AP and Controller
WASSP
AP and Controller
WASSP
AP and Controller
Access Point
Controller
UDP
Any
13907
WASSP
AP Registration to Controller
Yes
Server
for AP
Access Point
Controller
UDP
Any
427
SLP
AP Registration to Controller
Optional
Controller
Access Point
TCP/UDP
Any
69
TFTP
AP image transfer
Yes 1
Access Point
Controller
TCP/UDP
Any
69
TFTP
AP image transfer
Yes 1
Controller
Access Point
TCP/UDP
Any
22
SCP
AP traces
Yes
2003
Any
Access Point
TCP/UDP
Any
22
SSH
Remote AP login (if enabled)
Optional
Ports for Controller Management
Any
Controller
TCP/UDP
Any
5825
HTTPS
Controller GUI access
Yes
Any
Controller
TCP/UDP
Any
161
SNMP
Controller SNMP access
Yes
Trap
Ports for Inter Controller Mobility and Availability
nel
Controller
Controller
TCP
Any
427
SLP
SLP Directory
Yes
Controller
Controller
TCP
Any
20506
Langley
Remote Langley Secure
Yes
Controller
Controller
TCP
Any
60606
Mobility
VN MGR
Yes
Controller
Controller
TCP
Any
123
NTP
Availability time sync
Yes
DA
for SLP DA request
1.2 Security recommendations
The following table provides an overview of the ports through which the IWLAN
controller/access point communicate. Ports may need to be opened for correct working in the
network. Keep this in mind when configuring a firewall.
Controller Access Point UDP Any 13910 WASSP
between AP and Controller
Access Point Controller UDP Any 13910 WASSP
Controller Access Point UDP 4500 Any Secured
Access Point Controller UDP Any 4500 Secured
Access Point Controller UDP Any 67 DHCP
Any Access Point TCP Any 2002,
Any Controller TCP/UDP Any 22 SSH Controller CLI access Yes
RCAPD AP Real Capture (if enabled) Optional
Management Tunnel between
Management Tunnel between
If Controller is DHCP Server
Yes
Yes
Optional
Optional
Optional
Any Controller TCP/UDP Any 162 SNMP
Controller Controller UDP Any 13911 WASSP Mobility and Availability Tun-
Controller DHCP Server UDP Any 67 SLP Asking DHCP Server for SLP
DHCP Server Controller UDP Any 68 SLP Response from DHCP Server
Your configuration data is stored directly on the WLC. It is, however, possible to store this
data as a backup and to transfer it to other WLCs. How to create backups is explained in the
SCALANCE WLC711 User Guide.
All access points connected to a WLC are centrally monitored and managed to achieve
better administrative control. When necessary, each AP can be configured, enabled or
disabled separately. APs can be managed using the WLC. Alarms, traps and reporting
statistics are generated and can be evaluated by the network manager. The APs also send
data about performance, security and use to the WLC that can then be put together in
detailed reports.
With the WBM, you have the following options:
● Central configuration, administration and monitoring of several access points by the
SCALANCE Industrial Wireless LAN controller.
● Configuration of filter functions.
● Making the settings:
– Bridge traffic locally at WLC.
The data coming from the access points is forwarded centrally via the WLC.
– Bridge traffic locally at AP:
The data coming from the access points us forwarded directly by the access points to
the wired network.
SCALANCE WLC711
14Getting Started, 04/2016, C79000-G8976-C269-07
Description
2.2
Requirement for configuration
2.2 Requirement for configuration
To be able to configure the SCALANCE Industrial Wireless LAN controller and the access
points with the WBM, the following conditions must be met:
● Correct connection of the hardware.
● A correct connection between the management port of the SCALANCE WLC711 and a
PC.
You will find information about setting up in the compact operating instructions SCALANCE
WLC711.
This section contains information explaining how the LED displays work. This means you
can make sure that the wireless LAN controller has started up completely.
PWR Power supply OFF
L1 - - L2 Battery display flashing RED
L3 RUN/STOP Flashing
YELLOW
Standby mode
Battery low (remaining life less than 1 month).
Battery empty.
System is starting up.
System running.
The L2 and L3 LEDs each flash at 1 second intervals.
If the L2 and L3 LEDs flash yellow together at an interval of 2 seconds, an upgrade or the
import of a configuration following an upgrade is being performed.
SCALANCE WLC711
16Getting Started, 04/2016, C79000-G8976-C269-07
3
3.1
Sequence
Step 1 - Prior to configuration
Data
Note
PNIO
For complex plants requiring PROFINET IO communication, stand
points with iPCF support are recommended.
Voice
Captive portal
Step 2 - Setting up the network
Below you will find an overview of the best way to configure access points.
Decide which WLAN service you want to use. The following are available:
●
This WLAN service is recommended if your WLAN is used mainly for normal data traffic,
for example intranet. This WLAN service can be suitable for PROFINET IO if WLAN
clients move within the range of one access point (no roaming of WLAN clients between
several access points). Possible topologies for the WLAN service are as follows:
– Bridge at AP (requirement for PNIO)
– Bridge at WLC
– Routed
●
This WLAN service is recommended if your WLAN is used mainly for voice and video
communication, for example VoIP.
Possible topologies for this WLAN type are as follows:
– Bridged at WLC
– Routed
●
With this WLAN service, you can set up a WLAN specifically for guests.
-alone access
Make sure that the external servers such as DHCP and RADIUS are available and
adequately configured. Make sure that the data port between the Industrial Ethernet switch
(IE Switch) and WLC and the IE switch and APs have the identical subnet configuration.
Install the SCALANCE Industrial Wireless LAN controller and the access points. You will find
further information in the compact operating instructions SCALANCE WLC711.
SCALANCE WLC711
18Getting Started, 04/2016, C79000-G8976-C269-07
Getting started
3.2
Logon
Prerequisite
Calling up the logon page
Note
Display of a security message
If a security message is displayed in the Web browser, confirm this to continue the download
of the Web page. The secu
It is possible to install your own certificate. You will find more detailed information in the
SCALANCE WLC711 user guide.
3.2 Logon
To log on with the WBM, a connection must exist between the management port ("admin"
interface) of the WLC and the configuration PC.
To call up the logon page, open a Web browser and enter the default IP address
https://192.168.10.1:5825 in the address line.
rity message results from the pre-installed, self-signed certificate.
This default IP address can be changed using the WBM. The logon page of the WBM
SCALANCE Industrial Wireless LAN controller and access points opens:
Access protection of the system - changing passwords
Entering the wrong user name or password
3.2 Logon
Default user data is set in the factory. When you log on the first time, follow the steps below:
1. Enter the user name
2. Enter the password
admin in the "User Name" input box.
abc123 in the "Password" input box.
3. Click the "Login" button. The page for basic configuration with the wizard opens.
When you have completed the basic configuration the start page of the WBM SCALANCE
Industrial Wireless LAN controller and access points is displayed immediately after a new
logon.
We recommend that you protect the system from unauthorized access. To do this, change
the factory-set default administrator password. The procedure is described during basic
configuration with the wizard.
If you enter an unconfigured user name or an incorrect password, an error message is
displayed.
SCALANCE WLC711
20Getting Started, 04/2016, C79000-G8976-C269-07
Getting started
3.3
Shutting down and turning off
Introduction
Note
Data loss
Remember that data on the hard disk can be lost if you do not shut down the SCALANCE
WLC711 correctly. Make sure that you
"System Maintenance" configuration page
3.3 Shutting down and turning off
To avoid loss of data, it is advisable to shut down and turn off the SCALANCE WLC711
using the operator interfaces.
use the procedure in this section.
To open the configuration page, select the "Wireless Controller > Administration > System
Maintenance" menu command. The following window opens:
To turn off the SCALANCE WLC711 correctly, follow the steps below:
1. Select from the following options in the "System Shutdown" section:
–
The system is shut down and restarted.
–
The system is shut down safely. All services and applications are stopped.
2. To shut down the system with the APs that belong to it and that are connected to it, click
the "Shutdown" button. A warning appears. To confirm the action, click the "Yes to
continue" button.
As an alternative, you can also shut down the WLC with CLI commands. You will find further
information in the manual SCALANCE WLC711 CLI Reference Guide.
SCALANCE WLC711
22Getting Started, 04/2016, C79000-G8976-C269-07
4
Introduction
Note
Reconfiguration of the network topology with the wizard is not possible.
You cannot reconfigure the network topology with the wiza
system reset. You can only modify the network topology later using the "Wireless Controller
> Topologies" menu command.
After you log on the first time, the WBM provides you with a wizard for the basic
configuration of the WLC.
You can call up the wizard at any time using the "Wireless Controller > Installation Wizard"
menu command.
VLAN ID 1 is the default internal VLAN ID of the WLC and can therefore only be used after
conf
VLAN ID and Multicast Support".
4.1 Procedure - "Basic Installation Wizard" page
●
With this option, you set the year, the month, the day, the minutes and the seconds
manually using drop-down lists.
●
If you select this option, the WLC functions as an NTP server and provides other devices
with the opportunity of synchronizing their time with the time of the WLC.
●
If you select this option, an external NTP server is used for time-of-day synchronization.
In this input box, enter the IP address of an NTP time server that has a connection to the
network.
In this section, you configure the physical interface of the WLC that is assigned as data port.
Enter the required values in the input boxes:
Using the assigned logical names, topologies are linked to a VNS (Virtual Network Service).
The wizard proposes the predefined name "Physical 1". On completion of the basic
configuration, you can change the name using the "Wireless Controller > Topologies" menu
command.
A VNS is the logical linking of all components required to operate a WLAN. This includes:
● WLAN service
● Policy
● Class of Service
● Topology
Using the VLAN ID, you assign a broadcast domain to the WLC data port. In this area, the
VLAN ID is configured for the WLC. Make sure that the data port of the WLC, the access
points and the connecting network are assigned to the same broadcast domain. Use the
following range for the VLAN ID: 1 to 4094. Enter the VLAN ID you want to work with in the
"VLAN ID" input box.
iguration. You will find further information in the user guide, section "Setting Up Internal
SCALANCE WLC711
26Getting Started, 04/2016, C79000-G8976-C269-07
Basic configuration with the wizard
Tagged
Untagged
"Port" drop-down list
IP Address
Netmask
4.1 Procedure - "Basic Installation Wizard" page
Select the required option from the drop-down list:
●
If you want to forward tagged packets, select this option. Make sure that your devices are
capable of reading tagged packets.
●
If you want to forward untagged packets, select this option. This is the default selection.
From the drop-down list, select the data port "esa0" of the WLC.
Enter the IP address of the data port "esa0" of the WLC. Use the IP address range of your IP
subnet.
If you require information about obtaining a temporary IP address, click on the link "How to
obtain a temporary IP address".
Enter the netmask of the data port "esa0" of the WLC.
To move to the next page of the wizard, click the "Next" button.
In this section, you configure the management port of the WLC via which the configuration
data is transferred.
If necessary, adapt the factory setting to your network environment:
Shows the IP address of the management port of the WLC.
To separate the range of the network from the range of the hosts, the corresponding subnet
mask of the IP address is displayed. Enter the netmask of the data port "esa0" of the WLC.
SCALANCE WLC711
28Getting Started, 04/2016, C79000-G8976-C269-07
Basic configuration with the wizard
Gateway
Note
Check that the contents are correct
Check that your entries are corre
configuration, it will not be possible to establish the connection to the SCALANCE Industrial
Wireless LAN access point.
SNMP
"Mode" drop-down list
OFF
V2c
V3
Note
In this version, some SNMP objects only have
4.2 Procedure - "Management" page
Shows the standard gateway of the network.
ct before saving the settings. If there are errors in the
In this section, the monitoring, control and error detection of the network components is set
using the "Simple Network Management Protocol".
SNMP is a network protocol with which network components can be monitored and
controlled from a central station. The following settings are available:
Select from the following options:
●
If you select this option, you disable SNMP.
●
If you select this option, you allow SNMP version 2. The following input boxes appear for
SNMP communication:
– Read Community
Enter the password to be used for the read mode of SNMP communication.
– Write Community
Here, enter the password to be used for the write mode of SNMP communication.
– Trap Destination
Enter the IP address of the server you are using that will receive the SNMP messages
as network manager.
●
If you select this option, you allow SNMP version 3. Following the basic installation, you
can create users and configure them manually with the " Wireless Controller > SNMP"
menu command.
Syslog is a protocol used for the transfer of event notification messages via networks.
To use the syslog protocol for the WLC, select the "Enable" check box. The "IP Address"
input box appears in which you enter the IP address of the syslog server.
In this section, you enable the "Open Shortest Path First" protocol. OSPF is a dynamic
routing protocol for medium sized to large IP networks. This protocol allows data streams to
be split up over various routes. If you select OSPF, the WLC uses "Dynamic Route
Selection". This means that subnets are set up.
Select the "Enable" check box. The following options appear:
Click on the topology name of the WLC you want to configure.
Define the area of OSPF. If necessary, adapt the factory setting to your network
environment.
To move to the next page of the wizard, click the "Next" button.
SCALANCE WLC711
30Getting Started, 04/2016, C79000-G8976-C269-07
Loading...
+ 70 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.