indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
Qualified Personnel
personnel qualified
Proper use of Siemens products
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
ambient conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
Disclaimer of Liability
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
The product/system described in this documentation may be operated only by
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Note the following:
documentation. If products and components from other manufacturers are used, these must be recommended
or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
maintenance are required to ensure that the products operate safely and without any problems. The permissible
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
8 Programming via SIMATIC controller .................................................................................................... 87
9 Programming via the OPC UA interface ................................................................................................ 89
10 Service and maintenance ..................................................................................................................... 113
11 Technical data ..................................................................................................................................... 147
A Appendix............................................................................................................................................. 151
B Service & Support ............................................................................................................................... 157
A.1 System planning ................................................................................................................... 151
The information provided in these operating instructions enables you to commission the
RF18xC communications module on a PROFINET IO controller.
These operating instructions assume general knowledge of automation engineering and
identification systems.
These operating instructions are valid for the RF185C, RF186C and RF188C
communications modules as of product version "01" and delivery date as of 10/2018.
The following and possibly other names not identified by the registered trademark sign ® are
registered trademarks of Siemens AG:
In addition to these operating instructions, you require the operating instructions for the S7300, S7-400, S7-1200 or S7-1500 controller used.
If you are using SIMATIC S7, you can find information on programming the module as well
as a complete error description in the description of the FB 45 function block, RFID standard
profile and Ident profile.
You can find information on the readers and optical readers to be connected in the intrinsic
safety manual of the respective product family (RF200, RF300, RF600, MV400 and MV500).
You can find the current versions of the various manuals on the pages of the Siemens
Industry Online Support (https://support.industry.siemens.com/cs/ww/en/ps/14970/man
The following terms/abbreviations are used synonymously in this document:
The products are low in harmful substances, can be recycled and meet the requirements of
the Directive 2012/19/EU for disposal of waste electrical and electronic equipment (WEEE).
Do not dispose of the products at public disposal sites.
For environmentally compliant recycling and disposal of your electronic waste, please
contact a company certified for the disposal of electronic waste or your Siemens
representative.
Adhere to the various country-specific regulations.
To prevent unauthorized access, observe the following security recommendations when
working with the communications module and WBM (Web Based Management).
● Check regularly that the device complies with these recommendations and/or other
internal security policies.
● Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products.
● Do not connect the device directly to the Internet. Operate the device within a protected
network area.
● Restrict physical access to the device to qualified personnel.
● Lock unused physical ports (e.g. Ethernet ports) on the device. Unused ports can be used
to access the system without authorization.
● Keep the software up to date. Keep yourself informed regularly about safety updates for
the product.
You can find information about this at Link (http://www.siemens.com/industrialsecurity
● Activate only protocols that you actually need to use the device.
● Limit access to the device using a firewall or rules in an access control list (ACL).
● The configuration files are available in XML format for simple use. Make sure that the
configuration files outside the device are suitably protected. You can, for example,
encrypt the files, store them at a safe location and transfer them only via secure
communications channels.
● Activate user management and create new user profiles.
● Change all default passwords for users before operating the device.
).
● Only use passwords with high password strength. Avoid weak passwords, e.g.
password1, 123456789, abcdefgh.
● Define rules for using devices and assigning passwords.
● Make sure that all passwords are protected and inaccessible to unauthorized personnel.
● Do not use the same password for different users and systems.
● Update passwords and keys regularly to improve security.
This section deals with the security keys and certificates that you need to set up SSL.
● We urgently recommend creating your own SSL certificates and making them available.
Preset certificates and keys are present in the device.
The preset and automatically created SSL certificates are self-signed. We recommend
using certificates signed either by a reliable external certification authority or an internal
certification authority.
The device has an interface via which you can import certificates and keys.
● We recommend using certificates with a key length of at least 2048 bits.
● If protocols support both certificates and keys, you should favor certificates.
The firmware itself is signed and encrypted. This ensures that only authentic firmware can be
downloaded to the device.
● Check whether it is necessary to use SNMPv1. SNMPv1 is classified as non-secure.
Make use of the possibility to prevent write access. The product offers corresponding
settings for this.
● If SNMP is activated, change the community names. If unrestricted access is not
necessary, limit access via SNMP.
● Use secure protocols if access to the device is not protected by means of physical
safeguards.
The following protocols provide secure alternatives:
HTTP → HTTPS
● To prevent unauthorized access to the device or network, set up appropriate safeguards
against non-secure protocols.
● Enable only the services (protocols) that will actually be used on the device. The same
applies to the installed interfaces/ports. Unused ports could be used to access the
network downstream from the device.
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is
necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens’ products and solutions constitute one element of such a concept.
Customers are responsible for preventing unauthorized access to their plants, systems,
machines and networks. Such systems, machines and components should only be
connected to an enterprise network or the internet if and to the extent such a connection is
necessary and only when appropriate security measures (e.g. firewalls and/or network
segmentation) are in place.
Additionally, Siemens’ guidance on appropriate security measures should be taken into
account. For additional information on industrial security measures that may be
implemented, please visit
Link: (http://www.siemens.com/industrialsecurity
Siemens’ products and solutions undergo continuous development to make them more
secure. Siemens strongly recommends that product updates are applied as soon as they are
available and that the latest product versions are used. Use of product versions that are no
longer supported, and failure to apply the latest updates may increase customers’ exposure
to cyber threats.
)
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS
Feed under
Link: (http://www.siemens.com/industrialsecurity
The SIMATIC RF185C, RF186C and RF188C communications modules are designed for
use in all areas of automation. It covers all areas in which SIMATIC Ident RFID readers and
optical readers are operated. The application can run at the field level on a controller, on a
PC or at the IT level. For example, RFID data can be transmitted via the standardized OPC
UA interface to higher-level systems - even parallel to communication with a controller if
required.
Figure 3-1 Communications modules RF185C, RF186C and RF188C
Due to the high degree of protection, mounting without a protective enclosure is possible
directly near the RFID read points. The small mounting surface of the communications
module facilitates installation in confined spaces.
Two connectors each for Ethernet and power supply allow configuration in a line structure in
addition to a star structure. The innovative L-coded M12 connectors for the power supply
allow a high feed-through current in a line structure. In addition to the familiar configuration
types via TIA Portal and GSDML, these communications modules also feature integrated
Web Based Management (WBM), which enables devices to be set via a standard browser.
During commissioning, diagnostics and maintenance, WBM is a very convenient tool and
displays the status of the connected readers and the data of the recorded transponders.
You can find additional information on the various RFID devices and optical readers on the
Internet on the "Siemens Industry Online Support
(https://support.industry.siemens.com/cs/ww/en/ps/14970/man
)" page.
The following features characterize the RF18xC communications modules:
Table 3- 1 Features of the communications modules
Number of connectable
Supported product
families
Interfaces RS422
Ethernet interface 2x M12, switch integrated
Configuration/
Supported SIMATIC
Supported third-party
Source code of the Ident profile available. All controllers with PROFINET
1 2 4
RF200, RF300, MV400, MV500
STEP 7 (TIA Portal), GSDML, WBM (browser)
S7-300, S7-400, S7-1200, S7-1500
Note that the communications modules cannot be operated in VLANs whose ID is ≠ 0.
As described in the previous section, the communications modules are designed for different
environments and requirements.
If you operate the communications modules in an automation environment, they are
configured and programmed from the perspective of an S7 user. If you operate the
communications modules in an OPC UA environment, they are configured and programmed
from the perspective of an OPC UA user.
If you want to adapt the communications modules to your requirements, we recommend the
following user-specific procedure:
1. Connect the hardware
You can find information on this in the section "Connection (Page 23)".
2. Assign the IP address / device name
You can find information on this in the section "Assign the IP address / device name
(Page 43)".
3. Configure communications module
You can find information on this in the section "Configuration via PROFINET IO
(Page 47)" or "Configuring with the WBM (Page 53)".
4. Program reader commands
You can find information on this in the section "Programming via SIMATIC controller
(Page 87)".
1. Connect the hardware
You can find information on this in the section "Connection (Page 23)".
2. Assign the IP address / device name
You can find information on this in the section "Assigning the IP address / device name
with the PST (Page 45)".
3. Configure the communications module
You can find information on this in the section "Configuring with the WBM (Page 53)".
4. Program reader commands
You can find information on this in the section "Programming via the OPC UA interface
(Page 89)".
Note that the time of the device clock corresponds to UTC time and cannot be adj
time zones. Clicking the button transfers the local time stored in your operating system to the
communications module. Because the time synchronized with the PC is lost when the power
supply is terminated, we recommend synchronizing the time with
3.3 Design
usted to
an NTP server.
Later in the document, these symbols will help your orientation and will show you whether
the section is of interest to you or not. Only the sections with user-specific content, in other
words content that is tool/interface-specific, contain these symbols. Sections without these
symbols are general and relevant for both areas of application.
The following figure shows an example of an RF188C connection to an automation system.
Figure 3-3 Configuration graphic RF188C
As of STEP 7 Basic / Professional V15.1, the RF18xC communications modules are
integrated in the TIA Portal. Integration into 3rd-party systems is performed via a GSDML
file. The RF18xC can then be configured via the TIA Portal or another engineering system.
The GSDML file is stored on the communications module and can be downloaded from it
using a Web browser.
Only install the communications module when supply voltage
The RF18xC communications modules are designed for easy installation.
Please note that the communications module needs to be installed in a protected area. In
the case of installation outdoors, make sure that the device is protected from d
precipitation and wind.
The RF18xC communications modules have the following installation dimensions (W × H ×
D): 60 × 165 × 45 mm.
You can mount the communications modules in any mounting position.
When installing the communications modules, keep a minimum distance of 1 cm from an
adjacent device or another device.
You do not have to observe any special rules when installing the communications modules.
If a grounded metal mounting surface is used, the bottom mounting screw of the RF18xC
module already e
separate ground conductor. If you use the fixing screw as grounding connection, the thread
of the fixing screw or the contact facing of the fastening nut on the base must be unpainted.
This ensures a low
Requirements
Screw type
Description
ISO 1207 / DIN EN ISO 1580
ing to DIN EN ISO 4762
4.2 Mounting the communications module
The communications modules are designed for mounting on a flat, solid surface.
Alternatively, you can use the axially symmetrical drill holes of the modules to fasten them to
an aluminum profile using sliding blocks.
stablishes a reliable ground connection. This eliminates the need for a
-resistance connection.
The following table shows and explains the types of screws you need to mount the modules.
Table 4- 1 Recommended screw types
Cylinder head screw M4 according to DIN EN
Cylinder head screw with M4 hex socket accord-
The minimum screw length should be 35 mm.
If you need washers, use washers conforming to
Fasten the communications module with the screws on a solid level surface. The device
must be screwed (≤ 3 Nm) onto the panel at both fastening points (front top and bottom).
Figure 4-1 Mounting the RF18xC communications module
Only use the device for its intended purpose. If unspecified devices are connected to the
RF18xC, the connected device may be destroyed.
You can find detailed information on connecting the RF18xC on PROFINET IO in the
"SIMATIC PROFINET system description
(https://support.industry.siemens.com/cs/ww/en/view/19292127
)".
Modules with PROFINET interfaces may only be operated in LANs (Local Area Networks)
in which all connected devices are equipped with SELV/PELV power supplies (or have
equivalent protection).
A data transfer terminal (modem, for example) is required to access the WAN (Wide Area
Network) in order to ensure compliance with this safety standard.
All supply and signal voltages must be safety extra low voltage (SELV/PELV according to
IEC 61140).
DC 24 V supply: safe (electrical) isolation of extra-low voltage (SELV/PELV according to
EN 61140).
PROFINET IO communication can be structured as a line topology or star topology. Also
note the information in the section "Supply voltage and PROFINET IO loop-through
(Page 39)".
Figure 5-1 Configuration graphic of a line topology
Figure 5-2 Configuration graphic of a star topology
A reader always occupies one M12 socket on the RF18xC. You can connect the reader to
the communications module using a preassembled cable. The connection cable is available
in lengths of 2, 5, 10, 20 and 50 m as standard. If necessary, these can be extended.
Operation of the CM on grounded/ungrounded power supply
Grounded power supply
Supply voltages
Safe electrical isolation (SELV/PELV according to IEC 60364-4-41)
Setting up RF18xC with grounded reference potential
Setting up RF18xC with ungrounded reference potential
5.1 Operation of the CM on grounded/ungrounded power supply
Below, you can find information on the overall configuration of an RF18xC communications
module on a grounded power supply (TN-S network). The specific subjects discussed here
are:
● Supply voltages of the communications module
● Disconnecting devices, short-circuit and overload protection according to IEC 60364
(corresponds to DIN VDE 0100) and IEC 60204 (corresponds to DIN VDE 0113)
● Load voltage supplies and load circuits
For grounded power supplies, the neutral conductor of the supply system is grounded. A
short-circuit to ground of a live conductor, or of a grounded part of the system, trips the
protective devices.
Two supply voltages are available for the communications module:
● 1L+: Power supply
● 2L+: Load voltage
Note that the power supply (1L+) supplies the communications module and the readers with
power. Load voltage (2L+) has no direct effect on the communications module. This voltage
is looped through to further consumers via the plug-in connectors.
Power supply units/power supply modules with safe electrical isolation are required for
operation of the communications module. This protection is referred to as SELV (Safety
Extra Low Voltage) / PELV (Protective Extra Low Voltage) according to IEC 60364-4-41.
When the communications module is set up with grounded reference potential, any
interference currents that occur are diverted to functional ground. The connections must be
connected externally (connection between 1M and FE).
When the communications module is set up with ungrounded reference potential, any
interference currents occurring are conducted to functional ground via an internal RC
network (no external connection between 1M and FE).
5.1 Operation of the CM on grounded/ungrounded power supply
A number of components and protective measures are prescribed for plant installations. The
types of components and the degree to which the protective measures are mandatory
depend on the IEC regulation that applies to your plant setup.
The following table shows the components of the electrical design with reference to the
previous figure and compares the IEC regulations.
Table 5- 1 Components of the electrical design
①
③
Isolation monitoring must be provided in the following cases:
● Design of the communications module with ungrounded reference potential
● If hazardous plant states can be expected as a result of faults.
Disconnecting device for
controller, sensors, and
Short-circuit and overload
protection
Circuit breaker
Main switch Disconnector
Single-pole protection of
circuits.
Protect all power supply
lines with a 24 V DC / 16 A
Protection of cables and
Single-pole protection must
be used for a grounded
secondary circuit.
Note that the power supply (1L+) supplies the communications module and the readers with
power. Load voltage (2L+)
is looped through to further consumers via the plug
5.2 Electrical design of the CM
According to IEC 60364, line protection is required, i.e. the supply lines must always be
protected externally.
All supply voltages must be protected with a UL/IEC approved fuse 24 V DC / 16 A (tripping
characteristic type B or C). At ambient temperatures of 40 °C to 55 °C, the power supplies
must be protected with a UL/IEC approved fuse 24 V DC / 12 A.
Two voltage groups are available for the communications module, 1L+ (supply voltage) and
2L+ (load voltage).
Another power supply may be required in order to supply all communications modules of an
assembly with the required voltage. Another voltage supply of 1L+ and 2L+ may be needed
to form different potential groups, or because the voltage is insufficient for all
communications modules due to the voltage drop. Create a power budget for the selection of
the supply point of the voltage.
has no direct effect on the communications module. This voltage
-in connectors.
The following figure shows a configuration with another voltage supply for the
communications modules. The different potential groups are highlighted in gray.