Ba Scalance w788 Xpro RR w74x 1pro RR en

Download as pdf or txt
Download as pdf or txt
You are on page 1of 276

Introduction

1
Description

2
Mounting

3
Connecting up

4
Configuration / project
engineering

5
Upkeep and maintenance

6
Troubleshooting/FAQ

7
Technical specifications

8
Dimension drawings

9
Appendix

A
SIMATIC NET

SCALANCE W788-xPRO/RR /
SCALANCE W74x-1PRO/RR
Operating Instructions
Release 07/2008
C79000-G8976-C184-09




Safety Guidelines
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
DANGER
indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
with a safety alert symbol, indicates that minor personal injury can result if proper precautions are not taken.
CAUTION
without a safety alert symbol, indicates that property damage can result if proper precautions are not taken.
NOTICE
indicates that an unintended result or situation can occur if the corresponding information is not taken into
account.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
Qualified Personnel
The device/system may only be set up and used in conjunction with this documentation. Commissioning and
operation of a device/system may only be performed by qualified personnel. Within the context of the safety notes
in this documentation qualified persons are defined as persons who are authorized to commission, ground and
label devices, systems and circuits in accordance with established safety practices and standards.
Prescribed Usage
Note the following:
WARNING
This device may only be used for the applications described in the catalog or the technical description and only
in connection with devices or components from other manufacturers which have been approved or
recommended by Siemens. Correct, reliable operation of the product requires proper transport, storage,
positioning and assembly as well as careful operation and maintenance.
Trademarks
All names identified by are registered trademarks of the Siemens AG. The remaining trademarks in this
publication may be trademarks whose use by third parties for their own purposes could violate the rights of the
owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.

Siemens AG
Industry Sector
Postfach 48 48
90327 NRNBERG
GERMANY
Ordernumber: C79000-G8976-C184-09
07/2008
Copyright Siemens AG 2008.
Technical data subject to change

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 3
Table of contents
1 Introduction................................................................................................................................................ 9
1.1 Information on the Operating Instructions SCALANCE W788-xPRO/RR and W74x-
1PRO/RR.......................................................................................................................................9
1.2 Type designations........................................................................................................................11
2 Description............................................................................................................................................... 13
2.1 Network structures.......................................................................................................................13
2.2 Components of the product..........................................................................................................20
2.3 Product properties........................................................................................................................21
2.4 Different properties for devices with other hardware...................................................................24
2.5 LED displays ................................................................................................................................29
2.6 C-PLUG........................................................................................................................................32
2.7 Reset button.................................................................................................................................33
2.8 Biological compatibility.................................................................................................................34
3 Mounting.................................................................................................................................................. 35
3.1 Securing the housing ...................................................................................................................35
4 Connecting up ......................................................................................................................................... 37
4.1 Cabling for power supply and Ethernet........................................................................................37
4.2 Lightning protection, power supply, and grounding.....................................................................38
4.3 Suitable antenna cables and antennas for SCALANCE W-700 ..................................................41
4.4 Connectors for external antennas and power supply ..................................................................43
4.5 Assembling an IE hybrid cable 2 x 2 + 4 x 0.34 with an IE IP 67 hybrid connector ....................46
4.6 Fitting the IE FC TP standard cable 4 x 2 GP to an IE IP 67 hybrid connector...........................50
4.7 Pinning of the M12 male connector .............................................................................................54
5 Configuration / project engineering.......................................................................................................... 55
5.1 Technical basics ..........................................................................................................................55
5.1.1 Spanning Tree .............................................................................................................................55
5.1.2 iQoS.............................................................................................................................................56
5.1.3 iPCF .............................................................................................................................................56
5.1.4 Forced Roaming on IP Down.......................................................................................................57
5.1.5 Link Check ...................................................................................................................................57
5.1.6 Redundancy.................................................................................................................................57
5.1.7 IP-Alive.........................................................................................................................................58
5.1.8 MAC-based communication.........................................................................................................58
5.1.9 IP-based communication .............................................................................................................59
5.1.10 AeroScout ....................................................................................................................................59
Table of contents

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
4 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.2 Assignment of an IP address ...................................................................................................... 61
5.2.1 Structure of an IP address .......................................................................................................... 61
5.2.2 Initial assignment of an IP address............................................................................................. 62
5.2.3 Address assignment with DHCP................................................................................................. 62
5.2.4 Address assignment with the Primary Setup Tool ...................................................................... 63
5.3 The wizards of Web Based Management ................................................................................... 64
5.3.1 Introduction ................................................................................................................................. 64
5.3.2 Starting Web Based Management and logging on ..................................................................... 64
5.3.3 Selecting the wizards .................................................................................................................. 66
5.4 Basic Wizard ............................................................................................................................... 68
5.4.1 IP settings.................................................................................................................................... 68
5.4.2 System name .............................................................................................................................. 69
5.4.3 Country code............................................................................................................................... 70
5.4.4 Wireless settings......................................................................................................................... 71
5.4.5 Adopt MAC Address settings (only for clients or access points in client mode) ......................... 72
5.4.6 Channel settings (in access point mode only) ............................................................................ 74
5.4.7 Closing the Basic Wizard ............................................................................................................ 76
5.5 Security Wizard........................................................................................................................... 78
5.5.1 Introduction ................................................................................................................................. 78
5.5.2 Security settings.......................................................................................................................... 79
5.5.3 Security settings for the management interfaces........................................................................ 80
5.5.4 Security settings for the SNMP protocol ..................................................................................... 81
5.5.5 Security settings for WLAN (page 1, only in access point mode) ............................................... 82
5.5.6 Security settings for WLAN (page 2)........................................................................................... 85
5.5.7 Settings for the Low security level .............................................................................................. 88
5.5.8 Settings for the Medium security level ........................................................................................ 89
5.5.9 Settings for the High security level in access point mode........................................................... 90
5.5.10 Settings for the High security level in "Client" mode................................................................... 91
5.5.11 Overview of the selected settings ............................................................................................... 92
5.5.12 Exiting the Security Wizard ......................................................................................................... 93
5.6 iPCF Wizard................................................................................................................................ 95
5.6.1 Notes on the iPCF Wizard........................................................................................................... 95
5.6.2 industrial Point Coordination Function settings........................................................................... 95
5.6.3 Security settings for the WLAN................................................................................................... 97
5.6.4 Public Security Key for WLAN .................................................................................................... 98
5.6.5 Closing the iPCF Wizard........................................................................................................... 100
5.7 Configuration with Web Based Management............................................................................ 101
5.7.1 General information on Web Based Management.................................................................... 101
5.7.2 The LED simulation of Web Based Management ..................................................................... 102
5.7.3 The System menu..................................................................................................................... 102
5.7.3.1 System Information menu command ........................................................................................ 102
5.7.3.2 System Identification & Maintenance menu.............................................................................. 104
5.7.3.3 IP Settings menu command...................................................................................................... 104
5.7.3.4 Services menu command.......................................................................................................... 104
5.7.3.5 Restart menu command............................................................................................................ 106
5.7.3.6 Event Config menu command................................................................................................... 107
5.7.3.7 E-mail Config menu command.................................................................................................. 108
5.7.3.8 SNMP Config menu command ................................................................................................. 108
5.7.3.9 SSyslog menu command .......................................................................................................... 109
5.7.3.10 SNTP Config menu command .................................................................................................. 110
5.7.3.11 Fault State menu command...................................................................................................... 110
5.7.3.12 Load & Save menu command................................................................................................... 110
5.7.3.13 PNIO menu ............................................................................................................................... 112
Table of contents

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 5
5.7.3.14 C-PLUG menu command...........................................................................................................113
5.7.4 The Interfaces menu..................................................................................................................117
5.7.4.1 Interfaces menu command ........................................................................................................117
5.7.4.2 Ethernet menu command...........................................................................................................118
5.7.4.3 WLAN menu command..............................................................................................................118
5.7.4.4 Advanced menu command ........................................................................................................121
5.7.4.5 SSID List menu command .........................................................................................................124
5.7.4.6 Advanced G menu command ....................................................................................................125
5.7.4.7 Data Rates menu command ......................................................................................................126
5.7.4.8 VAP menu command.................................................................................................................127
5.7.5 The Security menu.....................................................................................................................128
5.7.5.1 Security menu command ...........................................................................................................128
5.7.5.2 Basic Wireless menu command.................................................................................................128
5.7.5.3 Keys menu command ................................................................................................................132
5.7.5.4 ACL menu command .................................................................................................................133
5.7.5.5 RADIUS Server menu command...............................................................................................135
5.7.5.6 Access menu command.............................................................................................................135
5.7.6 The Bridge menu .......................................................................................................................136
5.7.6.1 Bridge menu command..............................................................................................................136
5.7.6.2 WDS menu command................................................................................................................136
5.7.6.3 VLAN menu command...............................................................................................................138
5.7.6.4 Learning Table menu command................................................................................................145
5.7.6.5 ARP Table menu command.......................................................................................................145
5.7.6.6 Spanning Tree menu command.................................................................................................145
5.7.6.7 Storm Threshold menu command..............................................................................................152
5.7.6.8 NAT menu command.................................................................................................................152
5.7.6.9 IP Mapping Table menu command............................................................................................155
5.7.7 The Filters menu........................................................................................................................156
5.7.7.1 Filters menu command ..............................................................................................................156
5.7.7.2 MAC Filters menu command .....................................................................................................156
5.7.7.3 MAC Dir Filter menu command..................................................................................................157
5.7.7.4 Protocol Filter menu command..................................................................................................157
5.7.8 The I-Features menu .................................................................................................................157
5.7.8.1 I-Features menu command........................................................................................................157
5.7.8.2 iQoS menu command (in access point mode only) ...................................................................158
5.7.8.3 iPCF menu command ................................................................................................................158
5.7.8.4 Forced Roaming on IP Down menu command (in access point mode only).............................161
5.7.8.5 Link Check menu command (in access point mode only) .........................................................161
5.7.8.6 Redundancy menu command (in access point mode only).......................................................162
5.7.8.7 IP Alive menu command (in access point mode only)...............................................................162
5.7.8.8 AeroScout menu ........................................................................................................................163
5.7.9 The Information menu................................................................................................................164
5.7.9.1 Information menu command ......................................................................................................164
5.7.9.2 Log Table menu command ........................................................................................................164
5.7.9.3 Auth Log menu command..........................................................................................................165
5.7.9.4 Versions menu command ..........................................................................................................165
5.7.9.5 Client List menu command ........................................................................................................166
5.7.9.6 Available WLAN menu command..............................................................................................168
5.7.9.7 Ethernet menu command...........................................................................................................169
5.7.9.8 WLAN menu command..............................................................................................................170
5.7.9.9 iQoS menu command ................................................................................................................174
5.7.9.10 Spanning Tree menu command.................................................................................................174
5.7.9.11 IP, TCP/IP, ICMP, SNMP menu command................................................................................176
5.7.9.12 Signal Recorder menu command ..............................................................................................176
5.8 Configuration with the Command Line Interface........................................................................181
Table of contents

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
6 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.8.1 General information on the Command Line Interface............................................................... 181
5.8.2 The CLI\SYSTEM menu............................................................................................................ 183
5.8.2.1 CLI\SYSTEM menu command.................................................................................................. 183
5.8.2.2 CLI\SYSTEM\IM menu command............................................................................................. 184
5.8.2.3 CLI\SYSTEM\IP menu command ............................................................................................. 184
5.8.2.4 CLI\SYSTEM\SERVICES menu command............................................................................... 185
5.8.2.5 CLI\SYSTEM\RESTARTS menu command.............................................................................. 186
5.8.2.6 CLI\SYSTEM\EVENT menu command..................................................................................... 186
5.8.2.7 CLI\SYSTEM\EMAIL menu command...................................................................................... 189
5.8.2.8 CLI\SYSTEM\SNMP menu command ...................................................................................... 190
5.8.2.9 CLI\SYSTEM\SNMP\GROUP menu command........................................................................ 190
5.8.2.10 CLI\SYSTEM\SNMP\USER menu command ........................................................................... 191
5.8.2.11 CLI\SYSTEM\SNMP\TRAP menu command............................................................................ 192
5.8.2.12 CLI\SYSTEM\SYSLOG menu command.................................................................................. 193
5.8.2.13 CLI\SYSTEM\SNTP menu command ....................................................................................... 193
5.8.2.14 CLI\SYSTEM\FAULT menu command ..................................................................................... 194
5.8.2.15 CLI\SYSTEM\LOADSAVE menu command ............................................................................. 194
5.8.2.16 CLI\SYSTEM\PNIO menu command........................................................................................ 196
5.8.2.17 CLI\SYSTEM\CPLUG menu command .................................................................................... 196
5.8.3 The CLI\INTERFACES menu.................................................................................................... 197
5.8.3.1 CLI\INTERFACES\ETHERNET menu command ..................................................................... 197
5.8.3.2 CLI\INTERFACES\WLAN1 (or \WLAN2 or \WLAN3) menu command..................................... 198
5.8.3.3 CLI\INTERFACES\WLAN1\ADVANCED (or \WLAN2\ADVANCED or
\WLAN3\ADVANCED) menu command.................................................................................... 200
5.8.3.4 CLI\INTERFACES\WLAN1\SSID (or \WLAN2\SSID or \WLAN3\SSID) menu command........ 203
5.8.3.5 CLI\INTERFACES\WLAN1\802.11G (or \WLAN2\802.11G or \WLAN3\802.11G) menu
command................................................................................................................................... 203
5.8.3.6 CLI\INTERFACES\WLAN1\DATARATES (or \WLAN2\DATARATES or
\WLAN3\DATARATES) menu command.................................................................................. 204
5.8.3.7 CLI\INTERFACES\WLAN1\VAP1..7 (or \WLAN2\VAP1..7 or \WLAN3\VAP1..7) menu
command................................................................................................................................... 205
5.8.4 The CLI\SECURITY menu ........................................................................................................ 206
5.8.4.1 CLI\SECURITY menu command .............................................................................................. 206
5.8.4.2 CLI\SECURITY\BASIC\WLAN1 (or \WLAN2 or \WLAN3) menu command ............................. 206
5.8.4.3 CLI\SECURITY\BASIC\WLAN1\VAP1..7 (or \WLAN2\VAP1..7 or \WLAN3\VAP1..7) menu
command................................................................................................................................... 208
5.8.4.4 CLI\SECURITY\KEYS\WLAN1 (or \WLAN2 or \WLAN3) menu command .............................. 209
5.8.4.5 CLI\SECURITY\ACL\WLAN1 (or \WLAN2 or \WLAN3) menu command................................. 209
5.8.4.6 CLI\SECURITY\RADIUS menu command................................................................................ 210
5.8.4.7 CLI\SECURITY\ACCESS menu command............................................................................... 211
5.8.5 The CLI\BRIDGE menu............................................................................................................. 212
5.8.5.1 CLI\BRIDGE menu command................................................................................................... 212
5.8.5.2 CLI\BRIDGE\WDS\WLAN1 (or \WLAN2 or \WLAN3) menu command.................................... 212
5.8.5.3 CLI\BRIDGE\VLAN\VLAN_ID menu command......................................................................... 213
5.8.5.4 CLI\BRIDGE\VLAN\PORTS menu command........................................................................... 213
5.8.5.5 CLI\BRIDGE\SPANNING menu command............................................................................... 214
5.8.5.6 CLI\BRIDGE\SPANNING\PORTS menu command ................................................................. 215
5.8.5.7 CLI\BRIDGE\STORMTHR menu command ............................................................................. 216
5.8.5.8 CLI\BRIDGE\NAT menu command........................................................................................... 216
5.8.5.9 CLI\BRIDGE\NAT\STATIC menu command............................................................................. 217
5.8.6 The CLI\FILTERS menu............................................................................................................ 218
5.8.6.1 CLI\FILTERS\MAC1FLT menu command ................................................................................ 218
5.8.6.2 CLI\FILTERS\MAC2FLT menu command ................................................................................ 218
5.8.6.3 CLI\FILTERS\PROTO menu command.................................................................................... 219
5.8.7 The CLI\IFEATURES menu ...................................................................................................... 220
Table of contents

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 7
5.8.7.1 CLI\IFEATURES\IQOS\WLAN1 (or \WLAN2 or \WLAN3) menu command..............................220
5.8.7.2 CLI\IFEATURES\IPCF\WLAN1 (or \WLAN2 or \WLAN3) menu command...............................221
5.8.7.3 CLI\IFEATURES\FORCED_ROAM\WLAN1 (or \WLAN2 or \WLAN3) menu command...........222
5.8.7.4 CLI\IFEATURES\LINKCHECK menu command........................................................................222
5.8.7.5 CLI\IFEATURES\REDUNDANCY menu command...................................................................223
5.8.7.6 CLI\IFEATURES\IP_ALIVE menu command.............................................................................224
5.8.7.7 CLI\IFEATURES\AEROSCOUT\WLAN1 (or WLAN2 or WLAN3) menu command..................225
5.8.8 The CLI\INFORM menu.............................................................................................................225
5.8.8.1 CLI\INFORM menu command ...................................................................................................225
5.8.8.2 CLI\INFORM\LOG menu command...........................................................................................226
5.8.8.3 CLI\INFORM\AUTHLOG menu command.................................................................................226
5.8.8.4 CLI\INFORM\WLAN1 (or \WLAN2 or \WLAN3) menu command..............................................227
5.8.8.5 CLI\INFORM\ETHERNET menu command...............................................................................228
5.8.8.6 CLI\INFORM\IQOS\WLAN1 (or \WLAN2 or \WLAN3) menu command....................................228
5.8.8.7 CLI\INFORM\SIGNAL menu command.....................................................................................229
5.9 Configuring with the PRESET PLUG.........................................................................................231
5.9.1 How the PRESET-PLUG works.................................................................................................231
5.9.2 Creating a Configuration with a new PRESET PLUG ...............................................................231
5.9.3 Changing a PRESET PLUG that already contains configuration data ......................................233
5.9.4 Putting a device into operation with a PRESET PLUG..............................................................233
5.10 PROFINET IO functionality........................................................................................................234
5.10.1 Configuring with PROFINET IO.................................................................................................234
5.10.2 Settings in HW Config................................................................................................................240
5.10.3 Access options over PROFINET IO...........................................................................................244
6 Upkeep and maintenance...................................................................................................................... 249
6.1 Replacing the C-PLUG ..............................................................................................................249
6.2 Loading new firmware over FTP................................................................................................250
6.3 Restoring the default parameter settings...................................................................................251
7 Troubleshooting/FAQ............................................................................................................................. 253
7.1 Disrupted data transmission due to the received power being too high....................................253
7.2 Changing from MLFB 6GK57xx-xSx00-2Ax6 to MLFB 6GK57xx-xAA60-xAx0 ........................254
8 Technical specifications......................................................................................................................... 255
8.1 Technical specifications for the SCALANCE W788-xPRO/RR and W74x-1PRO/RR...............255
8.2 Technical specifications ANT795-4MR......................................................................................259
9 Dimension drawings .............................................................................................................................. 261
9.1 Drilling template for the SCALANCE W788-xPRO/RR and SCALANCE W74x-1PRO/RR.......261
9.2 Dimension drawing ANT795-4MR .............................................................................................262
A Appendix................................................................................................................................................ 263
A.1 Private MIB variables of the SCALANCE W78x / W74x............................................................263
Glossary ................................................................................................................................................ 267
Index...................................................................................................................................................... 275

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 9
Introduction
1
1.1 Information on the Operating Instructions SCALANCE W788-
xPRO/RR and W74x-1PRO/RR
Scope of the operating instructions
These Operating Instructions cover the following products:
SCALANCE W788-1PRO
SCALANCE W788-2PRO
SCALANCE W788-1RR
SCALANCE W788-2RR
SCALANCE W744-1 PRO
SCALANCE W746-1 PRO
SCALANCE W747-1RR
These Operating Instructions apply to the following software version:
SCALANCE W788-xPRO/RR and W74x-1PRO/RR with firmware as of version 4.0
Purpose of the Operating Instructions
Based on the Operating Instructions, you will be able to install and connect up the device
correctly. They explain how to configure the device and how to integrate it in a WLAN
network.
Orientation in the documentation
Apart from the operating instructions you are currently reading, the following documentation
is also available from SIMATIC NET on the topic of Industrial Wireless LANs:
Operating Instructions SCALANCE W784-1xx / SCALANCE W74x-1
The comprehensive documentation for the following products:
SCALANCE W784-1
SCALANCE W784-1RR
SCALANCE W744-1
SCALANCE W746-1
SCALANCE W747-1
Introduction
1.1 Information on the Operating Instructions SCALANCE W788-xPRO/RR and W74x-1PRO/RR
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
10 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
The document contains all the information for the setup, commissioning and operation of
these devices.
Operating Instructions SCALANCE W786-xPRO/RR
The detailed user documentation for the following products:
SCALANCE W786-1PRO
SCALANCE W786-2PRO
SCALANCE W786-3PRO
SCALANCE W786-2RR
The document contains all the information for the setup, commissioning and operation of
these devices.
System Manual Structure of an Industrial Wireless LAN
Apart from the description of the physical basics and a presentation of the main IEEE
standards, this also contains information on data security and a description of the
industrial applications of wireless LAN.
You should read this manual if you want to set up WLAN networks with a more complex
structure (not simply a connection between two devices).
System manual RCoax
This system manual contains both an explanation of the technical basis of leaky feeder
cables as well as a description of the SIMATIC NET RCoax components and their
functionality. The installation / commissioning and connection of RCoax components is
explained.
Manual Gateway IWLAN/PB LINK PNIO for Industrial Ethernet
The user documentation for the IWLAN/PB LINK. This device is a gateway between
IWLAN and PROFIBUS.
Introduction
1.2 Type designations
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 11
1.2 Type designations
Abbreviations used
The information in the manuals for the SCALANCE W-700 product family often applies to
more than one product variant. In such situations, the designations of the products are
shortened to avoid having to list all the type designations. The following table shows how the
abbreviations relate to the product variants.

Product group The designation . . . stands
for . . .
Product name
Ethernet client modules (IP30, cabinet
installation)
W74x-1 W744-1
W746-1
W747-1
Ethernet client modules (IP65, installed
outside a cabinet)
W74x-1PRO/RR W744-1PRO
W746-1PRO
W747-1RR
All Ethernet client modules SCALANCE
W
W74x W744-1
W746-1
W747-1
W744-1PRO
W746-1PRO
W747-1RR
Access points (IP30, cabinet installation) W784-1xx W784-1
W784-1RR
Access points (IP65, installed outside a
cabinet, extreme climatic requirements)
W786-xPRO/RR W786-1PRO
W786-2PRO
W786-3PRO
W786-2RR
Access points (IP65, installed outside a
cabinet)
W788-xPRO/RR W788-1PRO
W788-2PRO
W788-1RR
W788-2RR
Access points with the "RR" range of
functions
W-78x-xRR W784-1RR
W786-2RR
W788-1RR
W788-2RR
All SCALANCE W access points W78x W788-1PRO
W788-2PRO
W788-1RR
W788-2RR
W786-1PRO
W786-2PRO
W786-3PRO
W786-2RR
W784-1
W784-1RR
Introduction
1.2 Type designations
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
12 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Product group The designation . . . stands
for . . .
Product name
All SCALANCE W devices W -700 W788-1PRO
W788-2PRO
W788-1RR
W788-2RR
W744-1PRO
W746-1PRO
W747-1RR
W786-1PRO
W786-2PRO
W786-3PRO
W786-2RR
W784-1
W784-1RR
W744-1
W746-1
W747-1


SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 13
Description
2
2.1 Network structures
Standalone configuration with the SCALANCE W access point
This configuration does not require a server and the SCALANCE W access point does not
have a connection to a wired Ethernet. Within its transmission range, the SCALANCE W78x
forwards data from one WLAN node to another.
The wireless network has a unique name. All the devices exchanging data within this
network must be configured with this name.

Figure 2-1 Standalone configuration of a SCALANCE W access point. The gray area symbolizes
the wireless range of the SCALANCE W78x.
Description
2.1 Network structures
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
14 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Ad hoc networks
In ad hoc mode, nodes communicate with each other directly (connection 4) without
involving a SCALANCE W access point. The nodes access common resources (files or even
devices, for example printers) of the server (connections 1 to 3 in the figure). This is, of
course, only possible when the nodes are within the wireless range of the server or within
each other's range.
1
2
3
4

Figure 2-2 Ad hoc network without SCALANCE W access point
Description
2.1 Network structures
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 15
Wireless access to a wired Ethernet network
If one (or more) SCALANCE W access points have access to wired Ethernet, the following
applications are possible:
A single SCALANCE W as gateway:
A wireless network can be connected with a wired network over a SCALANCE W78x.
Span of wireless coverage for the wireless network with several SCALANCE W78x
access points:
The SCALANCE W78x access points are all configured with the same unique SSID
(network name). All nodes that want to communicate over this network must also be
configured with this SSID.
If a mobile station moves from the coverage range (cell) of one SCALANCE W78x to the
coverage range (cell) of another SCALANCE W78x, the wireless connection is
maintained (this is called roaming).

Figure 2-3 Wireless connection of a mobile station over two cells (roaming)
Description
2.1 Network structures
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
16 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Multichannel configuration
If neighboring SCALANCE W access points use the same frequency channel, the response
times are longer due to the collisions that occur. If the configuration shown in the figure is
implemented as a single-channel system, computers A and B cannot communicate at the
same time with the SCALANCE W access points in their cells.
If neighboring SCALANCE W access points are set up for different frequencies, this leads to
a considerable improvement in performance. As a result, neighboring cells each have their
own medium available and the delays resulting from time-offset transmission no longer
occur.
Channel spacing should be as large as possible; a practical value would be 25 MHz (five
channels). Even in a multichannel configuration, all SCALANCE W access points can be
configured with the same network name.
1
1
2
2
A
B

Figure 2-4 Multichannel configuration on channels 1 and 7 with four SCALANCE W access points
Description
2.1 Network structures
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 17
Wireless Distribution System (WDS)
WDS allows direct connections between SCALANCE W access points and or between
SCALANCE W and other WDS-compliant devices. These are used to create a wireless
backbone or to connect an individual SCALANCE W to a network that cannot be connected
directly to the cable infrastructure due to its location.
Two alternative configurations are possible. The WDS partner can be configured both using
its name and its MAC address.
1
1
1
1
A
B

Figure 2-5 Implementation of WDS with four SCALANCE W access points
Description
2.1 Network structures
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
18 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Redundant Wireless LAN (RWLAN)
RWLAN allows a redundant, wireless connection between two SCALANCE W access points
with at least two WLAN interfaces. This is used to set up a redundant wireless backbone that
cannot be implemented as a wired network due to its location but nevertheless has high
demands in terms of availability.
Two alternative configurations are possible. The RWLAN partner can be configured both
using its name and its MAC address.
A
B

Figure 2-6 Implementing RWLAN with two SCALANCE W access points with at least two WLAN
interfaces. As an alternative, data transfer is possible over one of the two wireless
adapters.
Description
2.1 Network structures
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 19
Network access with a SCALANCE W74x or SCALANCE W78x in client mode
The device can be used to integrate wired Ethernet devices (for example SIMATIC S7 PLC)
in a wireless network.
SCALANCE W744
SCALANCE W788

Figure 2-7 Connecting a SIMATIC S7 PLC to a wireless LAN using a SCALANCE W744.
Description
2.2 Components of the product
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
20 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
2.2 Components of the product
The following parts belong to the consignment of the SCALANCE W788-xPRO/RR or W74x-
1PRO/RR:
SCALANCE W788-xPRO/RR or W74x-1PRO/RR
2 OMNI antennas ANT795-4MR
1 IE IP 67 hybrid plug-in connector
1 protective cap for the M12 socket
2 (or 4 with SCALANCE W788-2PRO or SCALANCE W788-2RR) sealing plugs for the R-
SMA sockets
1 SIMATIC NET Industrial Wireless LAN CD with the Operating Instructions for the
SCALANCE W788-xPRO/RR and W74x-1PRO/RR
1 Operating Instructions (compact) SCALANCE W788-xPRO/RR or W74x-1PRO/RR in
printed form
Please check that the consignment you have received is complete. If it is not complete,
please contact your supplier or your local Siemens office.
Description
2.3 Product properties
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 21
2.3 Product properties

Note
The SIMATIC NET WLAN products use OpenSSL.
This involves "Open Source Code" with license conditions (BSD).
Please note and adhere to the current license conditions.
Since the driver includes encryption software, you should also adhere to the appropriate
regulations for your specific country.

Potential uses of the SCALANCE W788-xPRO / W788-xRR
The SCALANCE W788-xPRO / W788-xRR is equipped with an Ethernet port and one or two
wireless LAN ports. This makes the device suitable for the following applications:
The SCALANCE W788-xPRO / W788-xRR forwards data within its transmission range
from one node to another without a connection to wired Ethernet being necessary.
The SCALANCE W788-xPRO / W788-xRR can be used as a gateway from a wired to a
wireless network.
The SCALANCE W788-xPRO / W788-xRR can be used as a wireless bridge between
two networks.
The SCALANCE W788-xPRO / W788-xRR can be used as a bridge between two
different frequencies.
Possible applications of the SCALANCE W744-1PRO
The SCALANCE W744-1PRO is equipped with an Ethernet port and a wireless LAN port.
This makes the device suitable for the following applications:
The SCALANCE W744-1PRO is used to connect a device with an Ethernet port (for
example, a SIMATIC PLC with Industrial Ethernet communications processor) to a
WLAN.
The SCALANCE W744-1PRO can be used as a gateway from a wired to a wireless
network. One node in the wired network is supported.
Possible applications of the SCALANCE W746-1PRO
The SCALANCE W746-1PRO provides the same functionality as the SCALANCE W744-
1PRO. The device can also connect up to 8 stations with IP communication on the Ethernet
port to a wireless cell.
Possible applications of the SCALANCE W747-1RR
The SCALANCE W747-1RR provides the same functionality as the SCALANCE W746-
1PRO. The device is also capable of optimized data transfer and handover times in iPCF
mode.
Description
2.3 Product properties
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
22 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

Note
For PNIO communication, we always recommend that you enable the iPCF mode.

Properties of the SCALANCE W788-xx / W74x-1xx
The Ethernet interface supports 10 Mbps and 100 Mbps, both in full and half duplex as
well as autocrossing and autopolarity.
Operating the wireless interface in the frequency bands 2.4 GHz and 5 GHz.
The wireless interface is compatible with the standards IEEE 802.11a,
IEEE 802.11b, and IEEE 802.11g. In the 802.11a- and 802.11g mode, the gross
transmission rate is up to 54 Mbps. In turbo mode, the transmission rate is up to 108
Mbps (not permitted in all countries and modes).



Note
If the SCALANCE W788-xPRO / W788-xRR is operated in turbo mode (A, G or H turbo),
remember that the channels adjacent to the set transmission channel are also used for
communication. Disturbances can therefore occur on these channels when there are
neighboring wireless systems. The data throughput can also be reduced if there is
competition for use of these channels.
As an expansion of the 802.11a mode, it is also possible to operated according to the
IEEE 802.11h standard. In 802.11h mode, the procedures "Transmit Power Control"
(TPC) and "Dynamic Frequency Selection" (DFS) are used in the range 5.25 - 5.35 and
5.47 - 5.75 GHz. In some countries, this allows the frequency subband of 5.47 -
5.725 GHz to be used outdoors even with a higher transmit power.
TPC is a technique of controlling the transmit power and can reduce it to the strength
actually required. With dynamic frequency selection (DFS), the access point searches for
primary users (for example radar) on a randomly selected channel before starting
communication. If signals are found on the channel, this channel is disabled for 30
minutes and the availability check is repeated on another channel.
The gross transmission rate is up to 54 Mbps in 802.11h mode.
Support of the authentication standards WPA, WPA-PSK, WPA2, WPA2-PSK and
IEEE 802.1x and the encryption methods WEP, AES and TKIP.
Suitable for inclusion of a RADIUS server for authentication.
Device-related and application-related monitoring of the wireless connection.
The interoperability of the devices with Wi-Fi devices of other vendors was tested
thoroughly.



Note
All SCALANCE W-700 access points can be reconfigured for client mode.


Note
For PNIO communication, we always recommend that you enable the iPCF mode.
The following table shows the characteristics of the various model variants of the
SCALANCE W788-xPRO/RR or W74x-1PRO/RR
Description
2.3 Product properties
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 23


Type Number of
WLAN ports
Number of
supported IP nodes
(3)
Number of
supported MAC
nodes (3)
iPCF mode (1) Order No.
W788-1PRO 1 several several No 6GK5788-1AA60-2AA0
6GK5788-1AA60-2AB0 (2)
W788-2PRO 2 several several No 6GK5788-2AA60-2AA0
6GK5788-2AA60-2AB0 (2)
W788-1RR 1 several several Yes 6GK5788-1AA60-6AA0
6GK5788-1AA60-6AB0 (2)
W788-2RR 2 several several Yes 6GK5788-2AA60-6AA0
6GK5788-2AA60-6AB0 (2)
W744-1PRO 1 1 1 No 6GK5744-1AA60-2AA0
6GK5744-1AA60-2AB0 (2)
W746-1PRO 1 several several No 6GK5746-1AA60-4AA0
6GK5746-1AA60-4AB0 (2)
W747-1RR 1 several several Yes 6GK5747-1AA60-6AA0
6GK5747-1AA60-6AB0 (2)

(1) The iPCF mode provides an optimized data throughput and minimum handover times.
(2) US variant
(3) In client mode.
Requirements for installation and operation
To configure the SCALANCE W788-xPRO/RR or W74x-1PRO/RR, you require a PG/PC
connected to a network. If no DHCP server is available, a PC on which the Primary Setup
Tool (PST) is installed is necessary for the initial assignment of an IP address to the
SCALANCE W788-xPRO/RR or W74x-1PRO/RR. For the other configuration settings, a
computer with Telnet or an Internet browser is necessary.
Description
2.4 Different properties for devices with other hardware
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
24 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
2.4 Different properties for devices with other hardware
Which devices have different properties?
The information in this section applies to devices with the following order numbers:

Type Order no. Order no. US variant
W788-1PRO 6GK5788-1ST00-2AA6 6GK5788-1ST00-2AB6
W788-2PRO 6GK5788-2ST00-2AA6 6GK5788-2ST00-2AB6
W788-1RR 6GK5788-1SR00-2AA6 6GK5788-1SR00-2AB6
W788-2RR 6GK5788-2SR00-2AA6 6GK5788-2SR00-2AB6
W744-1PRO 6GK5744-1ST00-2AA6 6GK5744-1ST00-2AB6
W746-1PRO 6GK5746-1ST00-2AA6 6GK5746-1ST00-2AB6
W747-1RR 6GK5747-1SR00-2AA6 6GK5747-1SR00-2AB6

Power over Ethernet
The power supply is not electrically isolated from the housing.
Hybrid connector
When replacing a device having one of the order numbers listed above with a device with of
the new series, a previously used hybrid connector can continue to be used unchanged.
Multiple SSID
You can only assign an SSID to virtual access points with the types W788-1RR and W788-
2RR. Multiple SSID operation is therefore only possible with these two devices.
Antennas
The following antennas are approved for use with the SCALANCE devices listed above. You
can select an antenna in Web Based Management or in the Command Line Interface.
CLI menu: CLI\INTERFACES\WLAN1\ADVANCED> (or \WLAN2\ADVANCED)

Command Description Comment
Specify an antenna type.
0 User-defined
1 ANT795-4MR (default
antenna) - gain: 3 dBi (2.4
GHz) 5 dBi (5 GHz)
anttype [0...n]
2 ANT795-6MR (incl. 5 m cable)
- gain: 3 dBi (2.4 GHz) 4 dBi (5
GHz)
To display the list, enter
"anttype ?".
Description
2.4 Different properties for devices with other hardware
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 25
Command Description Comment
3 ANT792-8DR with 5 m cable -
gain: 10 dBi (2.4 GHz)
4 ANT792-8DR with 10 m cable
- gain: 6 dBi (2.4 GHz)
5 ANT792-8DR with 15 m cable
- gain: 3 dBi (2.4 GHz)
6 ANT793-8DR with 5 m cable -
gain: 14 dBi (5 GHz)
7 ANT792-4DN (RCoax
antenna) - gain: 4 dBi (2.4
GHz)
8 ANT793-4MN (RCoax
antenna) - gain: 6 dBi (5 GHz)
9 RCoax cable - gain: 0 dBi (2.4
GHz) 0 dBi (5 GHz)

Compatibility
You can also use configuration data of one of the devices listed above for a SCALANCE
W788-xPRO/RR or W74x-1PRO/RR with a different order number from that shown in the
table above.
Continued use of existing configurations
When changing from products (access points and Ethernet clients) from MLFB 6GK5788-
xSx00-2xx6 (access points) to MLFB 6GK5788-xAA60-xAx0 (redesigned access points), or
MLFB 6GK574x-1Sx00-2xx6 (Ethernet clients) to MLFB 6GK574x-1AA60-xAx0 (redesigned
Ethernet clients), the old configurations on C-PLUG, Preset Plug and in the config.cfg
configuration file can, in principle, continue to be used. However, note the points listed
below.
The devices use IWLAN cards with different wireless properties. When adopting the
configuration, created with previous hardware, the displayed parameter for the transmit
power is adapted without resulting in changes to the transmit power.
For example, a device with MLFB 6GK5746-1AA60-4AA0 (new redesigned hardware) at
the setting "Half, 1/2 (-3 dBm)" has a maximum transmit power of 17 dBm when using
antennas that ship with it. A device with MLFB 6GK5746-1ST00-2AA6 (previous
hardware) with the "Transmit Power" parameter set to "Full (-0 dB)" also has a maximum
transmit power of 17 dBm. The parameters for other transmit power settings are also
adapted analogously.
"Antennas" menu in the Web interface
When adopting a configuration, created with previous hardware, the antenna type is
automatically adapted to the value "User Defined". The value set previously for the
antenna gain parameter is adopted.
For example, the value "ANT795-6MR, 5m cable" is automatically converted to "User
defined" with the appropriate antenna gain. This conversion is handled by the new device
automatically when it is restarted after adopting the old configuration.
Description
2.4 Different properties for devices with other hardware
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
26 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Wherever possible, the parameters are adapted/transferred automatically. There are,
however, some configurations that can cause problems and cannot be be handled
automatically by the firmware:
Selecting channels in frequency bands with different limit values for transmit power
When adopting a configuration created with previous hardware, it is possible that the list
of selectable channels is restricted due to the different wireless properties.
This may mean that devices can no longer be reached via the wireless interface! When
replacing devices having MLFB 6GK57xx-xSx00-2Ax6 with MLFB 6GK57xx-xAA60-xAx0,
we therefore strongly recommend that these are checked in a test environment to make
sure that they adopt the channel selection unchanged. The channel selection is, for
example dependent on the set transmit power and can be influenced by modifications to
the relevant parameters.
Once a device with MLFB 6GK57xx-xAA60-xAx0 (redesigned hardware) has been
assigned parameters with a configuration file from an older device, all the parameters
relating to national approvals are checked (as usual). You will find information on the
transmit power of the devices in the supplied documentation.
Miscellaneous
During a transitional period, it is possible that some national approvals are not yet
available for the new devices with MLFB 6GK57xx-xAA60-xAx0. This is because the
certification process can take longer in some countries. You should therefore make sure
that the devices are approved for your application by checking the following Internet
page: http://www.siemens.com/simatic-net/ik-info
Operation of the new devices with MLFB 6GK5788-2AA60-6Ax0 as thin access points
with HiPath WLAN controller (as familiar with 6GK5788-2SR00-2Ax6, W788-2RR) is still
being clarified and is not currently supported. For this application with a HiPath Wireless
Controller, users could try out the devices of the type Scalance W786-2HPW.
Admin password for the USA variant
The default password is also "admin" for the USA variant if you have selected "admin" as the
user name.
Assignment of the power wires with a hybrid cable 2 x 2 + 4 x 0.34

Wire color code (standard) Brown Brown Black Black
Function 24 V 24 V Ground Ground
Power supply insert module 1 2 3 4
Assignment of the power wires with an IE FC TP standard cable 4 x 2 GP

Wire color code (standard) White / blue
(1)
Blue White / brown
(1)
Brown
Function 24 V 24 V Ground Ground
Power supply insert module 1 2 3 4
(1)
White wire of the pair
Description
2.4 Different properties for devices with other hardware
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 27
Grounding
CAUTION
Damage to the device due to potential differences
There must be no potential difference between the following parts otherwise there is a risk
that the device will be destroyed:
Ground potential of the power supply and ground potential of the antenna ground.
Ground potential of the power supply and a grounded housing.
Ground potential of the power supply and the ground potential of the device connected
to Industrial Ethernet (for example PC, AS-300, AS-400 etc.).
Connect both grounds to the same foundation earth or use an equipotential bonding cable.

Transmit power
Table 2-1 Transmit power in IEEE 802.11b mode (2.4 GHz)
Data rate [Mbps] P0 [dBm]
1 18
2 18
5,5 18
11 18
Table 2-2 Transmit power in IEEE 802.11g mode (2.4 GHz)
Data rate [Mbps] P0 [dBm]
6 17
9 17
12 17
18 17
24 17
36 13
48 11
54 10
Table 2-3 Transmit power in IEEE 802.11a/h mode (5 GHz)
Data rate [Mbps] P0 [dBm]
6 17
9 17
12 17
18 17
24 17
36 13
Description
2.4 Different properties for devices with other hardware
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
28 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Data rate [Mbps] P0 [dBm]
48 11
54 10
Receiver sensitivity
Table 2-4 Receiver sensitivity in IEEE 802.11b mode (2.4 GHz)
Data rate [Mbps] Pe [dBm]
1 -90
2 -90
5,5 -90
11 -84
Table 2-5 Receiver sensitivity in IEEE 802.11g mode (2.4 GHz)
Data rate [Mbps] Pe [dBm]
6 -87
9 -86
12 -85
18 -83
24 -80
36 -76
48 -71
54 -66
Table 2-6 Receiver sensitivity in IEEE 802.11a/h mode (5 GHz)
Data rate [Mbps] Pe [dBm]
6 -87
9 -86
12 -85
18 -83
24 -80
36 -76
48 -71
54 -66
72 [*] -73
96 [*] -68
108 [*] -63
[*] Turbo mode
Description
2.5 LED displays
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 29
2.5 LED displays
Information on the operating status and data transfer of the SCALANCE W-788-xPRO/RR or W74x-
1PRO/RR
There are several LEDs on the front of the SCALANCE W788-xPRO/RR or W74x-1PRO/RR
that provide information its operating status:

Note
If the LED for the WLAN port is not green when the device starts up, although it is activated,
the port is not ready for operation (interface not initialized).
The main reason for this is usually that during commissioning of a SCALANCE W788-
xPRO/RR or W74x-1PRO/RR products, a waiting time of up to 15 minutes can occur when
the ambient temperature is below zero. The device is ready for operation at the specified
ambient temperature as soon as the LED for the WLAN interface is lit green.

P
1
L
2
R
1
R
2
L
1
F
P
1
L
2
R
1
L
1
F
P
1
L
2
R
1
L
1
F
SCALANCE W788-1xx
SCALANCE W74x-1xx
SCALANCE W788-2xx

Figure 2-8 LEDs of the SCALANCE W788-xPRO/RR or W74x-1PRO/RR
Description
2.5 LED displays
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
30 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

LED Color Meaning
Yellow Data transfer over the Ethernet interface (traffic).
Green There is a connection over the Ethernet port. (Link)
Flashing yellow PRESET-PLUG detected.
Yellow/green PRESET function completed successfully.
P1
Flashing green "Flashing" enabled over PST.
L2 Green Power supply over the hybrid connector X1 (PoE or
energy contacts).
Yellow Data transfer over the first WLAN interface.
Green W788-xPRO/RR in access point mode:
The WLAN interface is initialized and ready for operation.
W788-xPRO/RR in client mode or W74x-1PRO/RR:
There is a connection over the first WLAN interface.
Flashing green W788-xPRO/RR in access point mode:
The channels are being scanned.
W788-xPRO/RR in client mode or W74x-1PRO/RR:
The client is searching for a connection to an access point or ad hoc
network.
Green flashing
quickly
W788-xPRO/RR in access point mode:
With 802.11h, the channel is scanned for one minute for primary users
before the channel can be used for data traffic.
W788-xPRO/RR in client mode or W74x-1PRO/RR:
The client waits for the adopt MAC address due to the setting <Auto Find
Adopt MAC> and is connected to no access point.
Green 3 x fast ,1
x long flashing
W788-xPRO/RR in client mode or W74x-1PRO/RR:
The client waits for the adopt MAC address due to the setting <Auto Find
Adopt MAC> and is connected to an access point.
Flashing yellow PRESET-PLUG detected.
R1
Yellow/green PRESET function completed successfully.
Yellow W788-xPRO/RR in access point mode:
Data transfer over the second WLAN port.
W788-xPRO/RR in client mode or W74x-1PRO/RR:
The LED is always off because the 2nd interface is not available in client
mode.
Green W788-xPRO/RR in access point mode:
The WLAN interface is initialized and ready for operation.
W788-xPRO/RR in client mode or W74x-1PRO/RR:
The LED is always off because the 2nd interface is not available in client
mode.
R2
Flashing green W788-xPRO/RR in access point mode:
The channels are being scanned.
W788-xPRO/RR in client mode or W74x-1PRO/RR:
The LED is always off because the 2nd interface is not available in client
mode.
Description
2.5 LED displays
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 31
LED Color Meaning
Green flashing
quickly
W788-xPRO/RR in access point mode:
With 802.11h, the channel is scanned for one minute for primary users
before the channel can be used for data traffic.
W788-xPRO/RR in client mode or W74x-1PRO/RR:
The LED is always off because the 2nd interface is not available in client
mode.
Flashing yellow PRESET-PLUG detected.
Yellow/green PRESET function completed successfully.
L1 Green Power supply over the M12 connector (X2).
F Red An error has occurred during operation of the SCALANCE W788-
xPRO/RR or W74x-1PRO/RR.

Description
2.6 C-PLUG
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
32 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
2.6 C-PLUG
Configuration information on the C-PLUG
The C-PLUG is used to transfer the configuration of the old device to the new device when a
device is replaced. When the new device starts up with the C-PLUG, it then continues
automatically with exactly the same configuration as the old device. One exception to this
can be the IP configuration if it is set over DHCP and the DHCP server has not been
reconfigured accordingly.
Reconfiguration is necessary if you use WDS or redundancy with devices with more than
one WLAN interface and use the MAC addresses and not the sysNames. These functions
are then based on the MAC address that inevitably changes if a device is replaced.

Note
In terms of the C-PLUG, the SCALANCE W-700 devices work in two modes:
Without C-PLUG
The device stores the configuration in internal memory. This mode is active when no C-
PLUG is inserted.
With C-PLUG
The configuration stored on the C-PLUG is displayed over the user interfaces. In this
mode, the internal memory is neither read nor written. If changes are made to the
configuration, the device stores the configuration directly on the C-PLUG. This mode is
active when no C-PLUG is inserted. As soon as the device is started with a C-PLUG
inserted, the SCALANCE W-700 starts up with the configuration data on the C-PLUG.


Description
2.7 Reset button
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 33
2.7 Reset button
Functions of the reset button
The reset button is on the rear of the device below the sealing screw directly beside the C-
PLUG and has several functions:
Restart of the device
To restart the device, press the Reset button.
Loading new firmware
If the normal procedure with the Load & Save menu of Web Based Management does not
work, the reset button can be used to load new firmware. This situation can occur if there
was a power outage during the normal firmware update.
Restoring the default parameters (factory defaults)
Adopting the configuration data from the PRESET PLUG.

Description
2.8 Biological compatibility
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
34 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
2.8 Biological compatibility
Electromagnetic fields and health
With regard to the question of whether electromagnetic fields (for example in association
with industrial wireless LANs) can put human health at risk, we refer to a publication of
BITKOM (German Association for information Technology, Telecommunication and New
Media e. V.), dated December 2003:
"The same health guidelines apply to WLAN devices as to all other radio applications. These
regulations are based on the protection concept of ICNIRP
1
or the corresponding
recommendation of the European Council.
The independent German radiation protection commission (SSK) was commissioned by the
federal German ministry of the environment to investigate the possible dangers - thermal and
non-thermal - resulting from electromagnetic fields and came to the following conclusions
2
:
'The German Commission on Radiological Protection concludes that according to the latest
scientific literature no new scientific research is available with respect to proven health
hazards which would throw doubt upon the scientific evaluation which serves as the basis for
the ICNIRP safety concepts and the recommendations of the EU commission.'
The SSK also concludes that below the current limit values, these is also no scientific
suspicion of health risks.
This assessment agrees with those of other national and international scientific commissions
and of the WHO (www.who.int/emf).
Accordingly and in view of the fact that WLAN devices are significantly below the
scientifically established limit values, there are no health risks from the electromagnetic fields
of WLAN products.
1
International Council on Non-Ionizing Radiation Protection
2
'Limit Values and Precautionary Measures to Protect the General Public from
Electromagnetic Fields' Recommendation of the Radiation Protection Commission (SSK)
with scientific justification, Issue 29, 2001."
You will find further information on this topic under the following URL:
www.bitkom.org

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 35
Mounting
3
3.1 Securing the housing
Wall mounting or standard rail
There are two ways of securing the housing:
Wall mounting
Use the holes in the housing to screw the device to the wall or on a horizontal surface.
Standard rail mounting
Mount the SCALANCE W788-xPRO/RR or W74x-1PRO/RR on a 90 mm long, vertically
mounted section of standard rail (S7-300). In this case, the standard rail serves as an
adapter between the wall and SCALANCE W788-xPRO/RR or W74x-1PRO/RR. If you
want to mount the SCALANCE W788-xPRO/RR or W74x-1PRO/RR along with a PS791-
1PRO, you will require a 150 mm long standard rail.
Make sure that there is suitable strain relief for the connecting cable.

CAUTION
Premature aging of the device and cables due to UV radiation
Provide suitable shade to protect the device against direct sunlight. This avoids unwanted
heating of the device and prevents premature aging of the device and cabling. When
operating the SCALANCE W outdoors, it must be mounted so that it is protected from UV.
UV radiation can discolor the front panel of the SCALANCE W788-xPRO/RR or W74x-
1PRO/RR. Discoloring of the front panel does not impair the mechanical stability of the
device. The device must also not be subjected to long periods of rain (provide cover to
protect from rain). The cover should be made of a synthetic material since metal impairs the
radiation of radio waves.

Note
The minimum distance to fluorescent lamps should be 0.5 m. When installed in a cabinet, we
recommend that you do not install relays on the same or on directly neighboring mounting
rails.



SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 37
Connecting up
4
4.1 Cabling for power supply and Ethernet
Suitable cables
The following cables are available for connecting a SCALANCE W788-xPRO/RR or
SCALANCE W74x-1PRO/RR to the power supply and Ethernet:
IE hybrid cable 2 x 2 + 4 x 0.34 (order no. 6XV1870-2J)
The two data wire pairs are separately shielded. This cable is particularly suitable for
assembly with the IE IP 67 hybrid connector.
IE FC TP standard cable 4 x 2 GP (order no. 6XV1870-2E)
In these cable types, two wires are twisted. All four pairs of wires are inside a common
shield.
2 x 2 IE cable, the optional power supply (18 - 48 V DC) is over M12 connectors.
Cable selection and interference exposure
A decisive factor in the selection of a cable type is the electromagnetic interference to which
the current lines between the power supply and the FC RJ-45 modular outlet are subjected.
Due to the separate shielding of the data wires, such interference has less effect on the data
transmission on a hybrid cable than on TP standard cable or TP flexible cable.
A B C

Figure 4-1 Wiring a SCALANCE W788-xPRO/RR with electromagnetic interference between the
power supply and modular outlet
A power supply
B FC RJ-45 modular outlet with power insert
C SCALANCE W788-xPRO/RR
Connecting up
4.2 Lightning protection, power supply, and grounding
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
38 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
4.2 Lightning protection, power supply, and grounding
Notes on lightning protection
WARNING

Danger due to lightning strikes
Antennas installed outdoors must be within the area covered by a lightning protection
system. Make sure that all conducting systems entering from outdoors can be protected by
a lightning protection potential equalization system.
When implementing your lightning protection concept, make sure you adhere to the VDE
0182 or IEC 62305 standard.

A suitable lightning conductor is available in the range of accessories of SIMATIC NET
Industrial WLAN:
Lightning protector LP798-1N (order no. 6GK5798-2LP00-2AA6)

WARNING

Danger due to lightning strikes
Installing this lightning protector between an antenna and a SCALANCE W-700 is not
adequate protection against a lightning strike. The LP798-1N lightening protector only
works within the framework of a comprehensive lightning protection concept. If you have
questions, ask a qualified specialist company.



Note
The requirements of EN61000-4-5, surge immunity tests on power supply lines, are met only
when a Blitzductor is used with 12 - 24 V DC and 48 V DC:
12 - 24 V DC: VT AD 24V type no. 918 402
48 V DC:
BXT ML2 BD S48, Part no. 920245
BXT BAS, Part no. 920300 (base)
Manufacturer: DEHN+SHNE GmbH+Co.KG, Hans Dehn Str. 1, Postfach 1640, D-92306
Neumarkt, Germany



NOTICE
48 V lightning protector
When using the 48 V DC lightning protector, the power supply must be fused with 1 A.

Connecting up
4.2 Lightning protection, power supply, and grounding
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 39
Safety extra low voltage
WARNING

Danger to life from overvoltage, fire hazard
SCALANCE W-700 devices are designed for operation with a directly connectable safety
extra-low voltage or with the power supply adapters available as accessories (available
only for the SCALANCE W786-xPRO device). Therefore only safety extra-low voltage
(SELV) with limited power source (LPS) complying with IEC950/EN60950/VDE0805 may
be connected to the power supply terminals (exception: Power supply adapter for 100 - 240
V AC for the SCALANCE W786-xPRO).
Take measures to prevent transient voltage surges of more than 40% of the rated voltage.
This is the case if you only operate devices with SELV (safety extra-low voltage).
The power supply unit to supply the SCALANCE W-700 must comply with NEC Class 2
(requirements of class 2 for power supply units of the "National Electrical Code, table 11
(b)") or SELV with LPS (Limited Power Source) EN 60950-1. If the power supply is
designed redundantly (two separate power supplies), both power supplies must meet these
requirements.
Exceptions:
Power supply with PELV (according to VDE 0100-410 or IEC 60364-4-41) is also
possible if the generated rated voltage does not exceed the voltage limits 25 V AC or 60
V DC.

Redundant power supply
CAUTION
Setup with redundant power supply (Power over Ethernet + 24 V DC or 48 V DC)
To use a redundant 24 V power supply (or 48 V with SCALANCE W786) and Power over
Ethernet (PoE), a separate floating 24 V source (or 48 V source for W786) must be
available for each SCALANCE W-700. Otherwise there is no longer isolation of the input
voltages of different devices required for the PoE function and functionality may be
disturbed.

Connecting up
4.2 Lightning protection, power supply, and grounding
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
40 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Grounding
CAUTION
Damage to the device due to potential differences
To avoid the influence of electromagnetic interference, the device should be grounded.
There must be no potential difference between the following parts, otherwise the device or
other connected device could be severely damaged:
Housing of the SCALANCE W-700 and the ground potential of the antenna.
Housing of the SCALANCE W-700 and the ground potential of a device connected over
Ethernet.
Housing of the SCALANCE W-700 and the shield contact of the connected Ethernet
cable.
Connect both grounds to the same foundation earth or use an equipotential bonding cable.

Interruption of the power supply
CAUTION
Damage to the Ethernet interface
Repeated fast removal and insertion of the Ethernet cable when using Power-over-Ethernet
and when there is a redundant power supply can cause damage to the Ethernet interface.
Avoid repeatedly removing and inserting the Ethernet cable when using Power-over-
Ethernet and a redundant power supply.

FM warning notice
When operated in potential hazardous areas:
WARNING - SUBSTITUTION OF COMPONENTS MAY IMPAIR SUITABILITY FOR
DIVISION 2
WARNING - DO NOT OPEN WHEN ENERGIZED
WARNING - DO NOT DISCONNECT EQUIPMENT WHEN A FLAMMABE OR
COMBUSTIBLE ATMOSPHERE IS PRESENT

Connecting up
4.3 Suitable antenna cables and antennas for SCALANCE W-700
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 41
4.3 Suitable antenna cables and antennas for SCALANCE W-700
Antenna connector: N-Connect/R-SMA connecting cable
The N-Connect/R-SMA male/male flexible connecting cable is available as an accessory for
direct connection of an antenna to a SCALANCE W-700.

Length in m Order number
1
2
5
10
6XV1875-5CH10
6XV1875-5CH20
6XV1875-5CH50
6XV1875-5CN10
Antenna connector: N-Connect/ N-Connect connecting cable
The N-Connect/N-Connect male/male flexible connecting cable is available as an accessory
for connecting an antenna to the lightning protector LP798-1N.

Length in m Order number
1
2
5
10
6XV1875-5CH10
6XV1875-5CH20
6XV1875-5CH50
6XV1875-5CN10
There is a control cabinet feedthrough available for IWLAN devices located in a control
cabinet. You will find detailed information in the catalog IK PI.
Antennas
The following antennas have been approved for use with a SCALANCE W-700:

Type Properties Order no.
ANT795-6MN Omni antenna 2.4 / 5 GHz,
ceiling mounted
6GK5795-6MN00-0AA6
ANT792-6MN Omni antenna 2.4 GHz,
wall mounted
6GK5792-6MN00-0AA6
ANT793-6MN Omni antenna 5 GHz,
wall mounted
6GK5793-6MN00-0AA6
ANT792-8DN Directional antenna 2.4 GHz,
wall mounted
6GK5792-8DN00-0AA6
ANT793-8DN Directional antenna 5 GHz,
wall mounted
6GK5793-8DN00-0AA6
ANT795-6DN Directional antenna 2.4 / 5 GHz,
wall mounted
6GK5795-6DN00-0AA6
ANT795-4MR Omni antenna 2.4 / 5 GHz,
mounted directly on a
SCALANCE W788-xPRO/RR or
W74x-1PRO/RR
6GK5795-4MR00-0AA6
Connecting up
4.3 Suitable antenna cables and antennas for SCALANCE W-700
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
42 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Type Properties Order no.
ANT795-4MS Omni antenna 2.4 / 5 GHz,
mounted directly on a
SCALANCE W788-xPRO/RR or
W784-1xx or W74x-1PRO/RR
or W74x-1
6GK5795-4MS00-0AA6
ANT792-4DN RCoax antenna 2.4 GHz 6GK5792-4DN00-0AA6
ANT793-4MN RCoax antenna 5 GHz 6GK5793-4MN00-0AA6


CAUTION
ANT 795-4MS
The ANT 795-4MS has degree of protection IP30 and is therefore suitable for a dry
environment.

Connecting up
4.4 Connectors for external antennas and power supply
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 43
4.4 Connectors for external antennas and power supply
Hybrid female connector and M12 male connector
The SCALANCE W788-xPRO / W788-xRR / W74x-1xx is attached to Ethernet via a hybrid
socket on the front of the housing (position A in the figure). This port also has contacts for
the operating voltage.

CAUTION
PoE with power source equipment
Note the following if you use PoE with a PSE (Power Source Equipment):
The chassis of an additional 24 V power supply must not be grounded!

CAUTION
Strain relief for the hybrid cable
Make sure that there is strain relief for the hybrid cable socket in both directions (along the
cable axis and transverse). Forces can be exerted on the socket simply from the weight of
the hybrid cable, for example when the SCALANCE W is installed high up.



Note
Protective cap for the hybrid socket
If you do not use the hybrid socket, this must be covered with a protective cap, otherwise IP
65 protection is lost. A suitable protective cap is available as an accessory (order no.
6ES7194-1JB10-0XA0). If you do not use the M12 connector, the supplied protective cap
must also be fitted to retain the IP65 degree of protection.

Connecting up
4.4 Connectors for external antennas and power supply
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
44 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
A
B
C
D

Figure 4-2 Connectors of the SCALANCE W788-xPRO/RR or W74x-1PRO/RR. The additional
antenna connectors (position C) only exist for the types W788-2PRO and W788-2RR.
As an alternative or in addition to this, you can also use the M12 plug for the power supply
(position B in the previous figure).
You can fit additional antennas to the sides of the SCALANCE W788-2PRO and
SCALANCE W788-2RR with an antenna cable (position C in the previous figure). If you
install the SCALANCE W788-xPRO/RR or W74x-1PRO/RR in a cabinet, you will need to
unscrew the antennas due to the restricted communication (position D in the figure). In this
case, the connection is over detached antennas installed outside the cabinet. On the front
panel, there is also an identifier for the antenna connectors. The A connectors are on the
right-hand side and B connectors B on the left-hand side.
Suitable connecting cable for a connection between SCALANCE W788-xPRO/RR or W74x-
1PRO/RR and a detached antenna are available from SIMATIC NET. You will find detailed
information in the section "Suitable antenna cables and antennas for the SCALANCE W-
700".
Arrangement of interfaces and connectors
Note
The distance between a pair of antennas for the first and second WLAN interface must be at
least 0.5 m.

NOTICE
Terminating resistor
Each WLAN interface has two antenna connectors. If you use only one connector, make
sure that you connect a terminating resistor to the second connector to ensure trouble-free
operation of the SCALANCE W788-xPRO/RR or W74x-1PRO/RR.

Connecting up
4.4 Connectors for external antennas and power supply
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 45
The following figure shows the location of the sockets for the individual interfaces:
SIEMENS
A2
A1
SCALANCE W788-2PRO
S

V
P

J
M

1
2
3



















4
4
-
7
2
-
2
2
M L2
X1
P1 FOR LAN ONLY
L2 DC 24V
WARNING:
EXPLOSION HAZARD.
DO NOT CONNECT EQUIPMENT
UNLESS AREA IS KNOWN TO BE
NONHAZARDOUS
M
X2
L1 24VDC
788-1ST00-2AA6
A
2


A
N
T
E
N
N
A


A
1
B2
B1

Figure 4-3 Antenna connectors of the SCALANCE W788-xPRO/RR or W74x-1PRO/RR. The
antenna connectors A2 and B2 only exist for the types W788-2PRO and W788-2RR.

Connecting up
4.5 Assembling an IE hybrid cable 2 x 2 + 4 x 0.34 with an IE IP 67 hybrid connector
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
46 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
4.5 Assembling an IE hybrid cable 2 x 2 + 4 x 0.34 with an IE IP 67 hybrid
connector
Procedure

Remove the two inner shells of the universal sealing ring
to adapt it to the diameter of the hybrid cable.
Push the bushing, washer, adapted universal sealing
ring and the housing over the cable jacket.
25 mm
19 mm 11 mm
Remove the following lengths of cable jacket and shield
braid:
25 mm for the power leads.
30 mm jacket for the data leads (shorten the braid by
11 mm).
Cut off the filler at the height of the cable jacket.
Arrange the data leads according to the color codes on
the splice element. The following table shows the
assignment of the data leads.
Contact 6
(Blue)
Contact 1
(Yellow)
Contact 2
(Orange)
Contact 3
(White)
Contact and color assignment of the splice element.
Connecting up
4.5 Assembling an IE hybrid cable 2 x 2 + 4 x 0.34 with an IE IP 67 hybrid connector
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 47

Wire color code (standard) White Blue Yellow Orange
Connector color code (Siemens IE) White Blue Yellow Orange
Siemens IE FC RJ-45 socket (reference) 3 6 1 2


Insert the all the data leads at the same time into the
splice element is far as they will go.
Close the splice element and RJ-45 data module until
they lock together.
Insert the data module and the splice element into the
supplied IDC assembly tool.
Press the data module and the IDC assembly tool
together to establish the installation piercing
connection.
Connecting up
4.5 Assembling an IE hybrid cable 2 x 2 + 4 x 0.34 with an IE IP 67 hybrid connector
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
48 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Remove the assembled data module from the IDC
assembly tool.
Position the top shield plate and press it over the cable
shield.
Position the lower shield plate and press it and the
upper shield plate together until they lock together with
an audible "click".
Arrange the power leads and insert them as far as they
will go into the hinge elements of the isolation body.
The following table shows the assignment of the power
leads.


Wire color code (standard) Brown Brown Black Black
Function 24 V 48 V PoE Ground Chassis
PoE
Power supply insert module 1 2 3 4


Connecting up
4.5 Assembling an IE hybrid cable 2 x 2 + 4 x 0.34 with an IE IP 67 hybrid connector
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 49
Press each individual hinge element together with the
integrated IDC contact.

Push the housing over the assembled data module and
the insulator body until they lock together (there should
be an audible click).
Tighten the cable gland. We recommend an open key
with a size of 21 mm.

Connecting up
4.6 Fitting the IE FC TP standard cable 4 x 2 GP to an IE IP 67 hybrid connector
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
50 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
4.6 Fitting the IE FC TP standard cable 4 x 2 GP to an IE IP 67 hybrid
connector
Procedure

Remove the two inner shells of the universal sealing ring
to adapt it to the diameter of the hybrid cable.
Push the bushing, washer, adapted universal sealing
ring and the housing over the cable jacket.
25 mm
30 mm Remove the following lengths of cable jacket and shield
braid:
25 mm for the power leads
30 mm for the data leads
To achieve good shielding, the shield braid must be alt
least 30 mm long.
Arrange the data leads according to the color codes on
the splice element. The following table shows the
assignment of the data leads.
Wind the shield braid around the data leads. As a result,
the shielding of the cable has contact to the shield plate
of the splice element that will be fitted later.
Connecting up
4.6 Fitting the IE FC TP standard cable 4 x 2 GP to an IE IP 67 hybrid connector
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 51
Contact 6
(Blue)
Contact 1
(Yellow)
Contact 2
(Orange)
Contact 3
(White)
Contact and color assignment of the splice element.


Color coding of the standard cable White /
orange
*

Orange White /
green
*

Green
Connector color code (Siemens IE) White Blue Yellow Orange
Siemens IE FC RJ-45 socket (reference) 3 6 1 2
*
White wire of the pair.

Insert the all the data leads at the same time into the
splice element is far as they will go.
Close the splice element and RJ-45 data module until
they lock together.
Insert the data module and the splice element into the
supplied IDC assembly tool.
Connecting up
4.6 Fitting the IE FC TP standard cable 4 x 2 GP to an IE IP 67 hybrid connector
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
52 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Press the data module and the IDC assembly tool
together to establish the installation piercing connection.
Remove the assembled data module from the IDC
assembly tool.
Position the top shield plate and press it over the cable
shield.
Position the lower shield plate and press it and the upper
shield plate together until they lock together with an
audible "click".
Arrange the power leads and insert them as far as they
will go into the hinge elements of the isolation body.
The following table shows the assignment of the power
leads.



Connecting up
4.6 Fitting the IE FC TP standard cable 4 x 2 GP to an IE IP 67 hybrid connector
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 53
Wire color code (standard) White /
blue *
Blue White /
brown *
Brown
Function 24 V 48 V PoE Ground Chassis
PoE
Power supply insert module 1 2 3 4
*
White wire of the pair.

Press each individual hinge element together with the
integrated IDC contact.
Recommendation: Use a small slotted screwdriver (max.
3.5 mm) as a lever.

Push the housing over the assembled data module and
the insulator body until they lock together (there should
be an audible click).
Tighten the cable gland. We recommend an open key
with a size of 21 mm.

Connecting up
4.7 Pinning of the M12 male connector
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
54 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
4.7 Pinning of the M12 male connector
Power supply over the M12 connector
The M12 male connector on the front of the SCALANCE W7xx has the following pinning:

Pin Function
Pin 1 24 V DC
Pin 2 --
Pin 3 Ground
Pin 4 --


SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 55
Configuration / project engineering
5
5.1 Technical basics
5.1.1 Spanning Tree
Avoiding loops
The Spanning Tree algorithm detects redundant physical network structures and prevents
the formation of loops by disabling redundant paths. It evaluates the distance and
performance of a connection or bases the decisions on settings made by the user. Data is
then exchanged only over the remaining connection paths.
If the preferred data path fails, the Spanning Tree algorithm then searches for the most
efficient path possible with the remaining nodes.
Root bridge and bridge priority
The identification of the most efficient connection is always related to the root bridge, a
network component that can be considered as a root element of a tree-like network
structure. With the "Bridge Priority" parameter, you can influence the selection of the root
bridge. The computer with the lowest value set for this parameter automatically becomes the
root bridge. If two computers have the same priority value, the computer with the lower MAC
address becomes the root bridge.
Response to changes in the network topology
If nodes are added to a network or drop out of the network, this may affect the optimum path
selection for data packets. To be able to respond to such changes, the root bridge sends
configuration messages at regular intervals. You can set the interval between two
configuration messages with the "Hello Time" parameter.
Keeping configuration information up to date
With the "Max Age" parameter, you set the maximum age of configuration information. If a
bridge has information that is older than the time set in Max Age, it discards the message
and initiates recalculation of the paths.
New configuration data is not used immediately by a bridge but only after the period
specified in the "Forward Delay" parameter. This ensures that operation is started with the
new topology only after all the bridges have the required information.
Configuration / project engineering
5.1 Technical basics
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
56 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.1.2 iQoS
Client-specific bandwidth reservation
iQoS (Quality of Service) is technique with which clients are assigned a certain bandwidth.
Due to this assignment, there is a high probability that data transmission to these clients will
be within a defined period. This technique can be useful when response times must be
guaranteed.
5.1.3 iPCF
Restrictions of the 802.11 standard
With wireless LAN complying with IEEE 802.11, the maximum data throughput cannot be
achieved in a cell when there is a higher number of nodes due to the resulting collisions. A
further restriction are the handover times that can be achieved with 802.11 standard
mechanisms. With normal commercially available WLAN products, these are of the order of
several hundred milliseconds.
New possibilities with iPCF
In an industrial environment, there are applications that require a deterministic response
when there are large numbers of nodes and a high data throughput in a cell. A deterministic
behavior is also required when changing cells with handover times of under 100
milliseconds.
To meet these requirements, the iPCF expansion (industrial Point Coordination Function)
was developed. iPCF is available with the following products:
SCALANCE W78x-xRR
SCALANCE 784-1RR
SCALANCE W747-1RR
SCALANCE W747-1
IWLAN/PB Link
iPCF ensures that the entire data traffic of a cell is ordered, controlled by the access point.
By avoiding collisions, the throughput can be optimized even with large numbers of nodes.
iPCF also allows fast cell changes.
How iPCF works
The basic principle of iPCF is that the access point scans all nodes in the cell cyclically. The
same time, the scan includes the downlink traffic for this node. In the reply, the node sends
the uplink data. The access point scans a new node at least every 5 ms.
The scan of a node can be seen by all other nodes in the cell. This allows a client to detect
the quality of the link to the access point even when it is not communicating with the access
point itself. If it does not receive a frame from the access point for a certain time, it starts to
search for a new access point.
Configuration / project engineering
5.1 Technical basics
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 57
In iPCF mode, both the search for a new access point and the registration with this new
access point have been optimized in terms of time. Handover times significantly below 50 ms
are achieved.
5.1.4 Forced Roaming on IP Down
Functional description
"Forced Roaming on IP down" monitors the connection to a specific IP address cyclically.
This is achieved using ICMP packets (Echo Request/Reply or Ping). If the IP connection
aborts; in other words, there is no ping reply from the other end, a deauthentication frame is
sent to all WLAN clients. The relevant WLAN interface is then disabled.
The IP connection continues to be monitored and the WLAN interface is enabled again as
soon as the access point has received a ping reply from the pinged station.
The mechanism makes it possible, for example, to monitor a connection between wireless
clients and a server. If the server can no longer be reached over the access point, the clients
are deauthenticated and the WLAN interface of the access point is disabled. The clients
roam and then connect to a different access point from which the server can be reached. As
soon as the first access point can reach the server again, it re-enables its WLAN interfaces.
5.1.5 Link Check
Device-related connection monitoring
The Link Check function provides device-related connection monitoring for a maximum of ten
wireless nodes logged on at the SCALANCE W78x. This service can be compared with the
link on a wired connection. The function monitors whether the node is available over the
wireless medium. If no packet is received from the node or sent successfully after half of the
configured monitoring time, the SCALANCE W78x attempts to send a test packet to the
node.
5.1.6 Redundancy
Redundant connection between two SCALANCE W78x devices
You can configure two SCALANCE W78x devices with two wireless interfaces so that there
is a redundant wireless connection. The redundancy function causes an automatic failover to
the second wireless interface if no data transfer is possible on the first wireless interface.
The user is informed of the status of the redundant connection with the statuses "not
connected", "connected", or "error" (communication error).
Configuration / project engineering
5.1 Technical basics
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
58 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.1.7 IP-Alive
Application-related connection monitoring
The IP-Alive function provides application-related connection monitoring of the wireless link.
It is useful to use IP-Alive on IP connections when it is known that they are used to send
data cyclically. With IP-Alive, you specify a monitoring time for an IP address and a port. If
you do not want to monitor a particular port but rather only the data traffic from a particular IP
address, simply enter 0 in Port. This resets the monitoring with each frame from this IP
address.
In contrast to the Link Check, the SCALANCE W78x does not start any checks until the
monitoring time has elapsed. The SCALANCE W78x checks passively whether
communication took place during the specified monitoring period. As with Link Check, you
can also enter up to ten connections here.
5.1.8 MAC-based communication
Auto Find Adopt MAC / Adopt MAC manually
Frames in the direction from the client to the access point always have the MAC address of
the WLAN interface as the source MAC address. As a result, the learning table at the access
point end always has only the MAC address of the WLAN interface of the client. If the MAC
address of a device connected to the client is adopted, both the MAC-based and the IP-
based frames find their destination in precisely this device.
Other nodes located downstream from the client cannot be reached. The access point
checks whether the destination MAC address matches the MAC addresses of the connected
clients. Since a client can only adopt one MAC address, the access point does not find a
match and discards the packets of several nodes.
Maximum possible number of MAC nodes downstream from the client: 1
Notes on the "Auto Find Adopt MAC" setting:
As long as there is no link on the Ethernet interface, the device uses the MAC address of
the Ethernet interface so that it can be reached in this status. In this status, the device
can be found using the Primary Setup Tool.
As soon as there is a link on the Ethernet interface, the device adopts the source MAC
address of the first received frame.



Note
From the moment that the device adopts another MAC address (whether manually or
automatically), the device no longer responds to queries of the Primary Setup Tool when
the query is received over the WLAN interface. Queries of the PST over the Ethernet
interface continue to be replied to.
Configuration / project engineering
5.1 Technical basics
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 59
Adopt Own MAC (only for W746-1 and W747-1 or W746-1PRO and W747-1RR and W78x in client
mode)
If IP-based frames need to be sent to a device connected downstream from the client, the
default setting Adopt Own Mac can be retained. The client registers with the MAC address of
its Ethernet adapter. The IP packets are broken down according to an internal table and
forwarded to the connected devices (IP mapping).
Communication at the MAC address level (ISO/OSI layer 2) is then only possible with a
component downstream from the client if its MAC address was adopted by the client.
Maximum possible number of MAC nodes downstream from the client: 1
Layer 2 tunneling (only for W746-1 and W747-1 or W746-1PRO and W747-1RR and W78x in client
mode)
With layer 2 tunneling, the client provides information about the devices downstream from it
when it registers with an access point. This makes it possible to enter the MAC addresses of
these devices in the learning table of the access point. The access point can forward MAC-
based frames for the devices downstream from the client to the appropriate client.
In much the same way as with WDS, a separate port is created for the L2T client over which
the Ethernet frames are sent without changing the destination MAC address.
Maximum possible number of MAC nodes downstream from the client: 8
5.1.9 IP-based communication
IP mapping (only for W746-1 and W747-1 or W746-1PRO and W747-1RR and W78x in client mode)
If there is more than one device connected downstream from the client and these should
only be addressed with IP frames, you can implement WLAN access for several devices with
one client. With IP mapping, the client maintains a table with the assignment of MAC
address and IP address to forward incoming IP frames to the correct MAC address.
Maximum possible number of IP nodes downstream from the client: 8
5.1.10 AeroScout
Introduction
SCALANCE W700 devices support tags of the AeroScout company. Tags are battery-
operated sensor nodes that send out WLAN frames cyclically as multicast frames. There are
numerous uses for these devices. In a WLAN installation with at least three access points,
for example, the location of the tag can be detected.
Hardware and function of an AeroScout tag
Among other things, AeroScout tags have the following features:
Configuration / project engineering
5.1 Technical basics
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
60 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Ambient temperature sensor
If a tag is fitted to a device or material, it is possible to monitor whether a selected
ambient temperature is being maintained.
Motion sensor
Here, a tag can also supply information indicating whether it is in motion or stationary.
Areas of material flow and material handling engineering represent possible applications
for this function.
Button
Regardless of the frames sent cyclically, a user can also send information by pressing a
button.
LED
This provides information on the operating state of the tag.



Note
For more detailed information, please refer to the AeroScout documentation of
(www.aeroscout.com).
Forwarding frames by the SCALANCE W-700
If the wireless interface of a SCALANCE W-700 receives an AeroScout frame, this is
converted to a UDP packet and forwarded along with information on the signal strength
(RSSI) via the backbone (either the Ethernet interface or a WDS connection). The
SCALANCE W-700 does not process the data. This is done only by the target computer that
receives and evaluates the UDP packet.

Note
Our recommendation is not to use PNIO communication and AeroScout together on one
wireless interface.

Antenna configuration
To achieve optimum accuracy in the localization of AeroScout tags, we recommend the use
of antennas with omindirectional characteristics.

Configuration / project engineering
5.2 Assignment of an IP address
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 61
5.2 Assignment of an IP address
5.2.1 Structure of an IP address
Address classes to RFC 1518 and RFC 1519

IP address range Max. number of networks Max. number of
hosts/network
Class CIDR
1.x.x.x through 126.x.x.x 126 16777214 A /8
128.0.x.x through 191.255.x.x 16383 65534 B /16
192.0.0.x through 223.255.255.x 2097151 254 C /24
Multicast groups D
Reserved for experiments E
An IP address consists of 4 bytes. Each byte is represented in decimal, with a dot separating
it from the previous one. This results in the following structure, where XXX stands for a
number between 0 and 255:
XXX.XXX.XXX.XXX
The IP address is made up of two parts, the network ID and the host ID. This allows different
subnets to be created. Depending on the bytes of the IP address used as the network ID and
those used for the host ID, the IP address can be assigned to a specific address class.
Subnet mask
The bits of the host ID can be used to create subnets. The leading bits represent the address
of the subnet and the remaining bits the address of the host in the subnet.
A subnet is defined by the subnet mask. The structure of the subnet mask corresponds to
that of an IP address. If a "1" is used at a bit position in the subnet mask, the bit belongs to
the corresponding position in the IP address of the subnet address, otherwise to the address
of the computer.
Example of a class B network:
The standard subnet address for class B networks is 255.255.0.0; in other words, the last
two bytes are available for defining a subnet. If 16 subnets must be defined, the 3rd byte of
the subnet address must be set to 11110000 (binary notation). In this case, this results in the
subnet mask 255.255.240.0.
To find out whether two IP addresses belong to the same subnet, the two IP addresses and
the subnet mask are ANDed bit by bit. If both logic operations have the save result, both IP
addresses belong to the same subnet, for example, 141.120.246.210 and 141.120.252.108.
Outside the local area network, the distinction between network ID and host ID is of no
significance, in this case packets are delivered based on the entire IP address.

Note
In the bit representation of the subnet mask, the "ones" must be set left-justified (there must
be no "zeros" between the "ones").
Configuration / project engineering
5.2 Assignment of an IP address
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
62 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.2.2 Initial assignment of an IP address
Configuration options
An initial IP address for a SCALANCE W-700 cannot be assigned using Web Based
Management or the Command Line Interface over Telnet because these configuration tools
require that an IP address already exists.
The following options are available to assign an IP address to an unconfigured device
currently without an IP address:
DHCP (default)
STEP 7
NCM PC
Primary Setup Tool


Note
DHCP is enabled as default and following "Restore Factory Defaults and Restart". If a DHCP
server is available in the local area network, and this responds to the DHCP request of a
SCALANCE W-700, the IP address, subnet mask and gateway are assigned automatically
when the device first starts up. "Reset to Memory Defaults" does not delete an IP address
assigned either by DHCP or by the user.

5.2.3 Address assignment with DHCP
Properties of DHCP
DHCP (Dynamic Host Configuration Protocol) is a method for automatic assignment of IP
addresses. It has the following characteristics:
DHCP can be used both when a device starts up and during operation.
The assigned IP address remains valid only for a particular time known as the lease time.
Once this period has elapsed, the client must either request a new IP address or extend
the lease time of the existing IP address.
There is normally no fixed address assignment; in other words, when a client requests an
IP address again, it normally receives a different address from the previous address. It is,
however possible, to configure the DHCP server so that it assigns a fixed address.
Configuration / project engineering
5.2 Assignment of an IP address
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 63



Note
DHCP uses a mechanism with which the IP address is assigned for only a short time
(lease time). If the device does not reach the DHCP server with a new request on expiry
of the lease time, the assigned IP address, the subnet mask and the gateway are
changed to static entries.
The device therefore remains accessible under the last assigned IP address even without
a DHCP server. This is not the standard behavior of office devices but is necessary for
problem-free operation of the plant.
Since the DHCP client also sends a RELEASE to the server, the server can assign this
address to a further device so that inconsistencies can occur within the network.
Remedy:
After disabling DHCP, you should therefore
change the IP address of the device to an address not assigned by DHCP
or
remove the IP address assigned to the device from the address pool of the DHCP
server.
Working with a mixture of dynamic address assignment and statically assigned
addresses is not advisable.
5.2.4 Address assignment with the Primary Setup Tool
Introduction
The PST (Primary Setup Tool) is capable of assigning such an address to unconfigured
devices without an IP address.
Prerequisite
This is possible only when the devices have a default Ethernet (MAC) address and are
reachable online in the network.

Note
For more detailed information, refer to the Primary Setup Tool configuration manual.
You will find the PST at Siemens Automation and Drives Service & Support on the Internet
under entry ID 19440762. The URL for this entry is:
http://support.automation.siemens.com/WW/view/en/19440762

Configuration / project engineering
5.3 The wizards of Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
64 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.3 The wizards of Web Based Management
5.3.1 Introduction
Principle of Web Based Management
The SCALANCE W-700 has an integrated HTTP server for Web Based Management. If the
SCALANCE W-700 is accessed by an Internet browser, it returns HTML pages to the client
computer as specified by the selections made by the user.
Users enter the configuration data in the HTML pages sent by the SCALANCE W-700. The
SCALANCE W-700 evaluates this information and generates response pages dynamically.
The great advantage of this method is that apart from a Web browser, no special software is
required on the client.
Requirements for Web Based Management
Once you have assigned an IP address with the Primary Setup Tool, you can continue to
configure the device with Web Based Management.
To use Web Based Management, you should ideally have a wired network connection
between the SCALANCE W-700 and the client computer. In principle, it is also possible to
use Web Based Management over a wireless network, however the SCALANCE W-700 can
be set so that access over a wireless network is disabled.
We recommend that you use the Microsoft Internet Explorer Version 5.5 or higher or Mozilla
Firefox Version 1.5 or higher.
All the pages of Web Based Management require JavaScript. Make sure that your browser
settings allow this.
Since Web Based Management is HTTP-based, you will have to allow access to Port 80 or
Port 443 for HTTPS if you have a firewall installed.

Note
The screenshots in this section were created using the Microsoft Internet Explorer version
6.0. If you use a different browser (for example Mozilla), the appearance of the menus may
differ.

5.3.2 Starting Web Based Management and logging on
Procedure
Follow the steps below to establish a connection to a device using a Web browser:
1. Enter the IP address or the URL of the SCALANCE W-700 in the address box of the Web
browser. If there is a problem-free connection to the SCALANCE W-700, the Logon
dialog of Web Based Management is displayed:
Configuration / project engineering
5.3 The wizards of Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 65


2. Open the "User name" drop-down list box and select the "Admin" entry if you want to
change settings of the SCALANCE W-700 (read and write access). If you select the
"User" entry, you will only have read access to the configuration data of the
SCALANCE W-700.
3. Enter your password. If you have not yet set a password, the default passwords as
shipped apply: Enter admin if you selected "Admin" as the user name or user if you
selected "User".
4. Click the "Log On" button to start the logon.



Note
For the US variant of the SCALANCE W-700, the password for the "admin" user has
been changed; it can, however, be obtained from Siemens Support by specialists for
professional WLAN installation.
Connection over HTTPS
Web Based Management also allows you to connect to the device over the secure
connection of the HTTPS protocol.
Use the "Logon using a secure HTTPS connection" link in the logon screen (see figure
above) or enter "https://" and the IP address of the SCALANCE W7xx in the address box of
the Web browser and confirm with Enter. The "Security Alert" warning is displayed and asks
you whether you want to continue the action. Confirm with "YES". The Login dialog of Web
Based Management opens.
Configuration / project engineering
5.3 The wizards of Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
66 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.3.3 Selecting the wizards
Basic Wizard, Security Wizard and iPCF-Wizard
Web Based Management provides several wizards that allow straightforward commissioning
without detailed knowledge of wireless technology. A wizard consists of a series of screens
in which you enter the basic configuration data.
The following wizards are available:
Basic Wizard
For general settings to ensure the basic functionality of the device.
Security Wizard
The wizard for the security settings supports you when setting security-related
parameters.
iPCF Wizard
This wizard is available for configuring iPCF (industrial Point Coordination Function).



Note
The iPCF Wizard is available only for the following devices:
SCALANCE W78x-xRR
SCALANCE W747-1
SCALANCE W747-1RR
Wizard status
After selecting the "Wizards" menu on the left-hand side of the dialog, the status of the
wizards is displayed. When you have worked through a wizard completely, "Done" is
displayed as the status. When you have worked through all the wizards, the "Wizards" entry
also moves to the bottom end of the menu.

Configuration / project engineering
5.3 The wizards of Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 67

Note
Some pages of the wizards have a different content in access point mode and "Client" mode.
In this case, there is a separate description for the alternatives.
You can specify the mode in the "System" menu.

Configuration / project engineering
5.4 Basic Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
68 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.4 Basic Wizard
5.4.1 IP settings
Description
One of the basic steps in configuration of an Ethernet device is setting the IP address. The
IP address identifies a device in the network uniquely. On this page, you enter the
information for the IP configuration of the SCALANCE W-700.


Specified IP address / DHCP server check boxes
There are two methods of assigning IP addresses to devices: The IP address can be set as
a fixed permanent address or can be obtained dynamically from a DHCP server. Select
"Specified IP Address" if you do not use a DHCP server.
IP address input box
The IP address of the SCALANCE W-700. Here, you enter an address that is unique within
the network.
Subnet mask input box
The subnet mask specifies the range of addresses within which communication can take
place.
Configuration / project engineering
5.4 Basic Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 69
The four numbers of an IP address separated by periods are interpreted as a bit pattern. If a
one is set at a bit position within the subnet mask, this means that only devices with an IP
address that matches the IP address of the SCALANCE W-700 at this bit position can
communicate with the SCALANCE W-700 management agent.
Example
Let us assume that the IP address of the SCALANCE W-700 is set to 192.168.147.189 and
the subnet mask is set to 255.255.255.0. The bit pattern for 255 is 1111 1111. This means
that the bit pattern of the first number of the IP address of a communication partner must
match the bit pattern of the SCALANCE W-700 exactly at this point. The same applies to the
second and third parts of the IP address. The IP address of a communication partner must
therefore start with 192.168.147. The bit pattern of 0 is 0000 0000. This means that the bit
pattern of the last part of the IP address of the partner device does not need to match the
address of the SCALANCE W-700 at any point; in other words, it can be any number.
5.4.2 System name
Description
The system name identifies a network node but means more to the user than the IP address.


System name input box
In this box, you enter the system name for your SCALANCE W-700. This parameter
corresponds to the "sysName" SNMP parameter. The system name can be up to a
maximum of 255 characters long. If you also want to use this parameter for WDS or
redundancy, the maximum length is 30 characters.
Configuration / project engineering
5.4 Basic Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
70 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.4.3 Country code

NOTICE
The correct country setting is mandatory for operation complying with the approvals.
Selecting a country different from the country of use can lead to legal prosecution!


Description
Some countries have different frequency band divisions for WLAN communication. The
regulations for maximum output power also differ from country to country. When you
configure the SCALANCE W-700, you specify which local regulations are relevant for your
location. You do this with the "Country Code" parameter.



Country Code drop-down list box
In this list box, you select the country in which the SCALANCE W-700 will be operated. You
do not need to know the data for the specific country, the correct channel division and
transmit power are set by the SCALANCE W-700 according to the country you select.
Configuration / project engineering
5.4 Basic Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 71
5.4.4 Wireless settings
Description
On this page, you specify the configuration of the wireless network. This includes the
network name and the transmission mode.

Note
The "Connect to ANY SSID" check box is available only for SCALANCE W74x clients or
SCALANCE W78x access points operated in client mode.

Connect to ANY SSID check box
When this check box is selected, the client connects to the access point that allows the best
possible data transfer and to which a connection is permitted based on the security settings.
SSID input box
Enter the name of your network in this box. The SCALANCE W-700 allows all characters
except the percent character for the SSID. To ensure compatibility with partner devices, you
should, however, not use any characters that are peculiar to a particular language (for
example special German characters , etc.) or special characters in general. The string for
SSID can be a maximum of 32 characters long.
Wireless Mode drop-down list box
Select a wireless mode that is supported by all partner devices.
Configuration / project engineering
5.4 Basic Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
72 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
With access points having more than one wireless interface, it is sometimes an advantage if
you set a different transmission mode for each wireless interface. This provides ideal support
for different clients. The effect of the 802.11.b + g setting is that all the settings in the
Advanced G menu are taken into account as far as possible but that compatibility with
devices conforming to IEEE 802.11 b guaranteed.
5.4.5 Adopt MAC Address settings (only for clients or access points in client mode)
Assigning the MAC address
A MAC address must be specified for the device connected to the Ethernet port of the
SCALANCE W-700 client before it can be reached. This MAC address is used by the client
for wireless communication with the access point.
There are several ways in which this can be done:
If there is precisely one MAC address to be served downstream from the client, there are
two ways of doing this:
Automatically
The client adopts the source MAC address of the first frame that it receives over the
Ethernet interface.
Manual entry by the user.
If there are up to eight MAC addresses to be served downstream from the client, "Layer 2
Tunneling" can be used:
This setting meets the requirements of industrial applications in which MAC address-based
communication is required with several devices downstream from the client. Clients with this
setting cannot connect to standard Wi-Fi devices and SCALANCE W700 access points with
firmware V3.0 or older.

Note
The layer 2 tunneling setting is available only with the following model variants:
SCALANCE W78x in client mode
SCALANCE W746-1PRO
SCALANCE W746-1
SCALANCE W747-1RR
SCALANCE W747-1

Note
IP mapping table
If layer 2 tunneling is configured for a client, the IP mapping table is not displayed.

The SCALANCE W746-1PRO or W746-1 and SCALANCE W747-1RR or W747-1 devices as
well as SCALANCE W78x devices operating in client mode can provide access to a wireless
network for several Ethernet devices (IP mapping). For an access point with MAC filtering,
only one MAC address is visible to the SCALANCE W700 client, there can be no filtering
according to the MAC addresses of the Ethernet devices.
Configuration / project engineering
5.4 Basic Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 73

Note
Configuration limits
Several MAC nodes (for example PROFINET IO devices) are connected to the Ethernet
interface of a client module and the "AdoptMAC" parameter is set to "Layer 2 tunneling". The
following configuration limits apply for reliable communication:
No more than 8 nodes may be connected downstream from the L2T client.
When transferring cyclic PROFINET IO data in iPCF mode, remember that the sum of the
user data of all nodes connected to the client must not exceed a value of 2,300 bytes per
cycle. This also includes the frame header. A SIMATIC user must therefore take into
account not only the net data during configuration but also the headers.

MAC mode drop-down list box
Here, select how the SCALANCE W700 client obtains a MAC address. The following are
possible:
Auto find 'Adopt MAC'
The SCALANCE W700 client automatically adopts the source MAC address of the first
frame that it receives over the Ethernet interface.
Set 'Adopt MAC' manually
You enter the MAC address manually.
Adopt own MAC (not for SCALANCE W744-1PRO / W744-1)
As a client, the SCALANCE W700 uses the MAC address of the Ethernet interface for the
WLAN interface.
Layer 2 Tunneling (not for SCALANCE W744 1PRO / W744-1)
As a client, the SCALANCE W700 uses the MAC address of the Ethernet interface for the
WLAN interface. The network is also informed of the MAC addresses connected to the
Ethernet interface of the SCALANCE W700 client.

Configuration / project engineering
5.4 Basic Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
74 Operating Instructions, Release 07/2008, C79000-G8976-C184-09


Adopt MAC input box
If you have selected the "Set 'Adopt MAC' manually" check box, here you will need to enter
the MAC address of the device connected over Ethernet to the SCALANCE W700 operating
in client mode.
If you do not want layer 2 communication to be handled over the SCALANCE W700
operating in client mode, but only want higher-layer IP-based frames sent to one or more
connected devices, you can also leave the default setting "Adopt Own Mac". In this mode,
the client registers with the MAC address of its Ethernet adapter. The IP packets are broken
down according to an internal table and forwarded to the connected devices.
The "Adopt MAC" box is hidden in the "Auto find 'Adopt MAC' " and "Layer 2 Tunneling"
modes.
5.4.6 Channel settings (in access point mode only)
Description
The SCALANCE W78x uses a specific channel within the frequency band for
communication. You can either set this channel specifically or configure the
SCALANCE W78x so that the channel is selected automatically. A specific channel must be
set, for example, in the following situations:
Communication suffers from interference from another device (for example microwaves)
or another wireless network.
Use of the redundancy function. In this case, two well spaced channels or two different
frequency bands must be selected.
Configuration / project engineering
5.4 Basic Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 75
Use of WDS. In this case, select a problem-free channel that is also used by the WDS
partner.


Outdoor AP mode check box
Select this check box to enable the outdoor AP mode.
Auto Channel Select check box
Select this check box if you do not have any particular requirements regarding channel
selection.
Radio Channel drop-down list box
Here, you select a channel suitable for your application. You can only select from this list if
the "Auto Channel Select" check box is not selected. The entries in the list box depend on
the previous selection made in the "Country code" box and on the mode (IEEE 802.11a,
IEEE 802.11b, IEEE 802.11g, IEEE 802.11h).
Configuration / project engineering
5.4 Basic Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
76 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Antenna Type drop-down list box (only for devices with external antennas)
Select the type of external antenna connected to the device.
Antenna gain (in dBi) input box (only for devices with external antennas)
If you selected the "User defined" entry in the "Antenna Type" drop-down list box, you can
enter the antenna gain manually in the unit "dBi".
Antenna cable length (in meters) input box (only for devices with external antennas)
Enter the cable length between the device and the external antenna in meters.


Note
When the devices are supplied, the WLAN interfaces are deactivated (exception IWLAN/PB-
Link PN IO). You can use these interfaces after you have worked through the Basic Wizard.



NOTICE
If you use a second or third WLAN interface, make sure that you have adequate channel
spacing.

5.4.7 Closing the Basic Wizard
Description
This page displays the parameters you have selected when you have completed all the
entries for the basic configuration. "Adopt MAC Address" is displayed only for an access
point in client mode.

Configuration / project engineering
5.4 Basic Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 77

Finish button
Click this button to close the Basic Wizard and to log on again with the modified IP address.
Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
78 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.5 Security Wizard
5.5.1 Introduction
With the Security Wizard, you can specify security-related parameters without detailed
knowledge of security technology in wireless networks.

Note
The SCALANCE W700 can be operated even if you do not set the security parameters.
Depending on the properties of your network, there is then, however, an increased risk of
unauthorized access. You should therefore work through all the pages of the Security
Wizard, so that you have at least basic security functions.

Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 79
5.5.2 Security settings
Password
First, set a new admin password. Enter the string twice in the text boxes of this page. The
password can be up to a maximum of 31 characters long.
When assigning the password, ASCII code 0x20 to 0x7e is used. The following characters
are supported:
Numbers 0...9
Letters abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ
Special characters !"#$%&'()*+,-./:;<=>?@[\]^_`{|}~ and the blank
Until you set a password, the defaults set in the factory apply: The default password for the
"admin" user is "admin". You can use the wizards only if you log on as administrator.

Note
For the US variant of the SCALANCE W-700, the password for the "admin" user has been
changed; it can, however, be obtained from Siemens Support by specialists for professional
WLAN installation.



Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
80 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.5.3 Security settings for the management interfaces
Protocols for configuration
On this page, you specify the protocols with which you access the configuration of the
SCALANCE W700. All protocols with a selected check box can be used for configuration.
You should only select protocols that you actually use.
The protocol settings only take effect after exiting the Security Wizard and restarting. Even
after selecting the "Web Based Management" entry, you still have the option of returning to
earlier pages or exiting the wizard.
Specifying the network type for configuration
It is easier to restrict access to a wired network than to a wireless network. Web Based
Management allows access to the SCALANCE W700 for configuration to be restricted to
computers linked to the SCALANCE W700 by a cable. If you require this, check the box at
the bottom of the page.


Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 81
5.5.4 Security settings for the SNMP protocol
Access permissions when using the SNMP protocol
When using the SNMP protocol, you specify access permissions by means of the community
string. A community string effectively combines the function of user name and password in
one string; different community strings are defined for read and write permissions. More
complex and more secure authentications are possible only in some SNMPv2 variants and in
SNMPv3.
To preserve security, you should not use the default values "public" or "private".


Write Community String input box
Here, you enter the write community string (maximum of 63 characters) for the SNMP
protocol.
Read Only check box
If you select this check box, only read access is possible with the SNMP protocol V1 or V2c.
Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
82 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.5.5 Security settings for WLAN (page 1, only in access point mode)
Description
On this page, you make the security settings, including, for example, the authentication and
encryption. If you configure a model with several wireless adapters, this page appears for
each adapter. You can make different settings for each wireless adapter.
Network-specific security settings
On the first page of the security settings, you select settings that apply regardless of
protocol-specific restrictions. The basic measures for securing a network against
unauthorized access involve
allowing only certain clients (those that have entered the network name (SSID) of the AP)
to communicate with the SCALANCE W78x.
excluding clients that communicate over wireless connections from the wired part of the
network.
Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 83


SSID input box for WLAN 1
Enter the name of your network in this box (maximum of 255 characters, 32 characters if you
use the redundancy function). To avoid any possible conflicts with settings for a specific
locale on the computer, the name should not include any special German characters (,
etc.).
Enable 'Suppress SSID broadcasting' feature for WLAN 1
Selecting this option means that the SSID is not visible for other devices. As a result, only
stations for which the same network name was configured as for the SCALANCE W78x can
connect to the SCALANCE W78x.
Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
84 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

Note
Since no encryption is used for the SSID transfer, this function can only provide basic
protection against unauthorized access. The use of an authentication method (for example
WPA (RADIUS) or WPA-PSK if this is not possible) provides higher security. You must also
expect that certain end devices may have problems with access to a hidden SSID.

Enable 'Inter SSID communication' option for WLAN 1
Selecting this option allows communication between WLAN clients registered at different
SSIDs of an access point.

Example 1 A SCALANCE W786-3PRO was defined with different SSIDs.
Example 2 A SCALANCE W788-1PRO is used with multiple SSIDs.


Note
On a SCALANCE W78x-2/3xx, the Inter SSID Communication function must be enabled on
all WLAN interfaces or on all VAPs to allow communication between the clients with different
SSIDs.

Note
If VLANs are configured for the SSIDs, this setting can prevent communication between the
SSIDs according to the VLAN rules.

Enable 'Intracell communication' list box
Intracell blocking
This setting prevents WLAN client communication within an SSID.
Ethernet blocking
This setting prevents WLAN client communication over the Ethernet interface of the
access point.
Disabled
This setting enables both WLAN client communication within an SSID as well as WLAN
client communication over the Ethernet interface.
Overview of the communication options
To illustrate the situation, there is an overview of the effects of the "Inter SSID
communication" and "Intracell communication" settings below.

Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 85
Settings Possible communication
Inter SSID
communication
Intracell
communication
within
an SSID
with another SSID to the Ethernet
network
Enabled Allowed x x x
Enabled Intracell
blocking
x x
Enabled Ethernet
blocking
x x
Disabled Allowed x x
Disabled Intracell
blocking
x
Disabled Ethernet
blocking
x

5.5.6 Security settings for WLAN (page 2)
Predefined security levels
Authentication and encryption are tried and tested methods for increasing security in
networks. Web Based Management provides four predefined security levels that specify
suitable methods.

Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
86 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

The following table indicates what the various security levels involve.

Visible in
wizard
Security level Authentication Encryption Type of encryption Encryption key
source
x None Open System disabled without not applicable
None Open System enabled as option WEP local
x Low Shared Key enabled WEP local
x Medium WPA2-PSK
(preshared Key)
enabled TKIP / AES / AUTO local
x High WPA2 (RADIUS) enabled TKIP / AES / AUTO Server
Medium WPA-Auto-PSK
(preshared Key)
enabled TKIP / AES / AUTO local
High WPA-Auto
(RADIUS)
enabled TKIP / AES / AUTO Server
Authentication
Authentication basically means that some form of identification is required. Authentication
therefore protects the network from unwanted access. In the "Security Level" box, you can
choose between the following types of authentication:
None (Open System)
There is no authentication. Encryption with a fixed (unchanging) key can be selected as
an option. To do this, define a key in the "Keys" menu. 5 or 13 ASCII or 10 or 26
hexadecimal characters specify a weaker key (40/104 bits). 16 ASCII or 32 hexadecimal
Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 87
characters, on the other hand, define a strong key (128 bits). Then select "Encryption" in
the "Basic WLAN" menu.
Low (Shared Key)
In Shared Key authentication, a fixed key is stored on the client and access point. This is
then used for authentication and encryption. In this case, you will have to store a WEP
key after selecting "Low (Shared Key)".
Medium (WPA2-PSK)
WPA2-PSK is based on the WPA2 standard, WPA authentication, but operates without a
RADIUS server. Instead of this, a key (pass phrase) is stored on every client and access
point and this is used for authentication and further encryption. AES or TKIP is used as
the encryption method, AES represents the standard method.
High (WPA2)
WPA2 (Wi-Fi Protected Access 2) is a further development of WPA and implements the
functions of the IEEE 802.11i security standard. WPA2 uses the additional encryption
protocol CCMP with preauthentication that allows fast roaming in mobile ad hoc
networks. A client can log on in advance at several access points so that the normal
authentication can be omitted.
A RADIUS server is used to authenticate the client with an access point. The client logs
on at a RADIUS server based on a certificate (EAP-TLS) or a combination of user name
and password (EAP-PEAP or EAP-TTLS / internal authentication method MSCHAPv2).
As an option, the RADIUS server then identifies itself to the client using a certificate.
Following successful authentication, the client and RADIUS server generate key material
that is used for data encryption. AES or TKIP is used as the encryption method, AES
represents the standard method.
Medium with WPA compatibility (WPA-Auto-PSK)
Select the "Medium" security level and check the "WPA compatibility"
box so that an access point can process both "WPA-PSK" authentication as well as
"WPA2-PSK". This is necessary when the access point communicates with different
clients, some using "WPA-PSK" and others "WPA2-PSK". The same encryption method
must be set on the clients.
High with WPA compatibility (WPA-Auto)
Select the "High" security level and check the "WPA compatibility"
box so that an access point can process both "WPA" authentication as well as "WPA2".
This is necessary when the access point communicates with different clients, some using
"WPA" and others "WPA2". The same encryption method must be set on the clients.
Encryption
Encryption protects the transferred data from eavesdropping and corruption. You can only
disable encryption in the "Encryption" check box if you have selected "Open System" for
authentication in the "Basic WLAN" menu. All other security methods include both
authentication and encryption. Various schemes are used for encryption:
WEP (Wired Equivalent Privacy)
A weak, symmetrical stream encryption method with only 40- or 104-bit long keys based
on the RC4 algorithm (Rons Code 4).
TKIP (Temporal Key Integrity Protocol)
A symmetrical stream encryption method with the RC4 algorithm (Rons Code 4). In
contrast to the weak WEP encryption, TKIP uses changing keys derived from a main key.
TKIP can also recognize corrupted packets.
Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
88 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
AES (Advanced Encryption Standard)
Strong symmetrical block encryption method based on the Rijndael algorithm that further
improves the functions of TKIP.
AUTO
TKIP or AES is used depending on the capability of the other station.
Encryption key source
The encryption key source indicates whether the key is configured locally and fixed (local) or
whether it is negotiated by a higher protocol and an authentication server (server).
Security Level for WLAN drop-down list box
Select a security level that is supported by all clients. The content of the next page depends
on the selected security level. If you select the security level "None", there is no following
page since neither encryption nor authentication will be used.

5.5.7 Settings for the Low security level


Default key drop-down list box
Select the key you want to specify.
Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 89
Key input box
Enter the character string for the key here. The key can be entered as ASCII characters or
alternatively as hexadecimal digits (0 F). If the key was entered in ASCII format, this is later
displayed in quotes.
Length drop-down list box
Select the key length you want to use here. If the length of the string in the Key input box is
longer or shorter than the selected key length, an error message is displayed. The following
key lengths are possible:
40 bits (5 ASCII characters or 10 hexadecimal numbers)
104 bits (13 ASCII characters or 26 hexadecimal numbers)
128 bits (16 ASCII characters or 32 hexadecimal numbers)
With the "AUTO" setting, the maximum key length is also 128 bits.
5.5.8 Settings for the Medium security level


Pass phrase input box
Here, you enter a WPA2 key. The key can be 8 to 63 ASCII characters or exactly 64
hexadecimal characters long. This initialization key must be known on both the client and the
SCALANCE W78x and is entered by the user at both ends.
Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
90 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Pass phrase confirmation input box
Here, you confirm the entered WPA2 key.

Note
The key can be 8 to 63 ASCII characters or exactly 64 hexadecimal characters long. It
should be selected so that is complex for example consisting of random numbers, letters
(upper-/lowercase), have few repetitions and special characters). Do not use known names,
words or terms that could be guessed. If a device is lost or if the key becomes known, the
key should be changed on all devices to maintain security.


5.5.9 Settings for the High security level in access point mode

Reauthentication input box
Here, you decide whether the access point initiates a reauthentication for the clients. You
can also select who sets the time after which the clients are forced to a reauthentication. If
time management is local, enter the period of validity of the authentication in seconds. The
minimum time is 1 minute (enter 60), the maximum time is 12 hours (enter 43200). The
default is 1 hour (3,600 seconds).
Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 91
RADIUS Server input box
You can enter the data for two RADIUS servers; the information in the "Backup" column is
used if the server defined in the "Primary" column is not available.
5.5.10 Settings for the High security level in "Client" mode

Note
The following information applies only to SCALANCE W74x clients or SCALANCE W78x
access points operating in client mode.



Dot1x user name input box
Here, enter the user name with which you want to register over the RADIUS server.
Dot1x user password input box
Here, enter the password for the above user name. The client logs on with the RADIUS
server using this combination when a logon with a certificate was not possible.
Password confirmation input box
Confirm the password here.
Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
92 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.5.11 Overview of the selected settings
Settings after working through the Security Wizard
This page contains an overview of the selected security settings. If you want to change a
setting, you can click the "Back" button to return to a previous page where you can enter a
different value or make a different selection. The content of this page depends on whether
the Wizard was used for an access point or a client or for an access point in client mode.
Security settings for an access point

Figure 5-1 Overview page for an access point
Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 93
Security settings for a client or an access point in client mode

Figure 5-2 Overview page for a client or an access point in client mode
5.5.12 Exiting the Security Wizard
Further security settings
The last page of the wizard indicates other security measures that you can take. If you still
want to make final modifications, you can open the relevant pages by clicking on the
highlighted texts. The content of this page depends on whether the Wizard was used for an
access point or a client or for an access point in client mode.
"Finish" button
Click the Finish button to exit the Wizard. Your settings only take effect after you have
restarted (System > Restart menu).
Configuration / project engineering
5.5 Security Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
94 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Finishing the Wizard for an access point

Figure 5-3 Page for an access point
ACCESS IP LIST
opens the Security > Access page.
ACCESS CONTROL LIST
opens the System > ACL page.
Closing the Wizard for a client or for an access point in client mode

Figure 5-4 Dialog box for a client
Access IP List
opens the Security > Access page.
Configuration / project engineering
5.6 iPCF Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 95
Restart to apply changes
opens the System > Restart page.

5.6 iPCF Wizard
5.6.1 Notes on the iPCF Wizard

Note
The iPCF Wizard is available only for the following devices:
SCALANCE W747-1
SCALANCE W747-1RR
SCALANCE W784-1RR in client mode
SCALANCE W786-2RR in client mode
SCALANCE W788-1RR in client mode
SCALANCE W788-2RR in client mode



Note
The iPCF Wizard also includes pages for specifying security settings. If you use iPCF, you
do not therefore need to work through the Security Wizard.


5.6.2 industrial Point Coordination Function settings
Channel selection and transmit power
On this page, you make the setting is necessary for iPCF. The main advantage of suitable
settings is that you can improve roaming times and reduce the interference affecting other
systems or segments.

Configuration / project engineering
5.6 iPCF Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
96 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

Note
When using iPCF, the following maximum data rates must be taken into account when
setting the access point:
Wireless standard maximum data rate
IEEE 802.11a/h: 12 Mbps
IEEE 802.11b: 11 Mbps
IEEE 802.11g: 12 Mbps

Background scan ch. select option
To enable the "iPCF" function, select the Background scan ch. select option. This restricts
the number of channels on which the client scans for an access point. This reduces
handover times and reduces the risk of real-time violation.
If you select the Background scan ch. select option, you also need to enter the channels on
which access points in iPCF mode are within range in the next input box Background scan
channels. If you do not define the channels, the node runs a time-intensive scan throughout
the entire band.
Configuration / project engineering
5.6 iPCF Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 97
Background scan channels input box
Here, enter the channels on which access points operating in iPCF mode can be reached by
the client. If you enter more than one channel, each channel must be separated by a blank.
Transmit power list box
When using antennas, it may be necessary to reduce the transmit power to avoid exceeding
the legal maximum transmit power or to restrict the visibility of the radio link. If necessary,
select the required reduction in transmit power here.
A reduction of transmit power may also necessary to avoid interfering with other cells
because a reduced transmit power means a reduction in the span of the cell.
Antenna Mode list box
This list box specifies the use of the antennas.
If "Diversity" is set, the SCALANCE W78x uses the only antenna that allows the best
possible data transmission. For each WLAN interface, both antennas must be connected.
Both antennas should also be of the same type and they should also illuminate
approximately the same space. If an access point is operated with the diversity setting and
the two antennas span different cells, this can have negative effects.
Otherwise, you will need to select the connected antenna. Select "Antenna A" for the
IWLAN/PB LINK.

Note
If only one antenna is connected, the connected antenna must be set permanently. The
second antenna socket must also have a 50 terminator fitted.

5.6.3 Security settings for the WLAN
Security settings with iPCF
On this page, you specify the security level for the client. iPCF is a proprietary standard
optimized for fast roaming and deterministic data transfer. With the current security
mechanisms 802.1x and WPA, keys are negotiated using relatively time-consuming
mechanisms, and they are therefore not available with iPCF.

Configuration / project engineering
5.6 iPCF Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
98 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

Security level list box
Select the security level you require for your wireless network in this box. The following are
possible:
None (no encryption)
An open system without encryption.
Med (encryption)
Static keys are used. This is the recommended setting and you should use a 128-bit key.
AES-CCM encryption
You can only use the AES-CCM encryption method in iPCF mode. Make sure that a 128-bit
WEP key is defined in the "Security > Keys" menu. When you have selected the "Strong
AES-CCM encryption" check box, the display in the "Security > Keys" menu changes to "128
bit AES" and the device uses AES-CCM.
5.6.4 Public Security Key for WLAN
Specifying the key
If you have selected the security level "Med", you must specify the key on this page.
Configuration / project engineering
5.6 iPCF Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 99


Default key drop-down list box
Select the WEP key you want to specify.
Key input box
Enter the character string for the key here. The key can be entered as ASCII characters or
alternatively as hexadecimal digits (0 F). If the key was entered in ASCII format, this is later
displayed in quotes.

Note
For the key, you can use characters 0x20 to 0x7e from the ASCII code. Below, there is a list
of all supported characters starting with a space:
!"#$%&'()*+,-./0123456789:;<=>?@
ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`
abcdefghijklmnopqrstuvwxyz{|}~

Configuration / project engineering
5.6 iPCF Wizard
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
100 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Length drop-down list box
Select the key length you want to use here. If the length of the string in the "Key" input box is
longer or shorter than the selected key length, an error message is displayed. The following
key lengths are possible:
40 bits (5 ASCII characters or 10 hexadecimal numbers)
104 bits (13 ASCII characters or 26 hexadecimal numbers)
128 bits (16 ASCII characters or 32 hexadecimal numbers)
With the "Auto" setting, the maximum key length is also 128 bits.
5.6.5 Closing the iPCF Wizard
Closing the wizard
The last page of the iPCF Wizard shows you all the settings you have made so that you can
make a final check.

Finish button
Click the Finish button to exit the iPCF Wizard. Your settings only take effect after you have
restarted (System > Restart menu).
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 101
5.7 Configuration with Web Based Management
5.7.1 General information on Web Based Management
Navigation bar
You will find the following links in the upper menu bar of Web Based Management (WBM):
Console
This link opens a console window in which you can enter CLI commands.
Support
When you click this link, you open a SIEMENS AG support page in the Internet.
Logout
Close the current Web Based Management session by clicking on this link. The logon
dialog is then displayed again.
Help
Clicking on this link opens the online help of Web Based Management in a separate
browser window.
Updating the Display with Refresh
Web Based Management pages that display current parameters have a "Refresh" button at
the lower edge of the page. Click this button to request up-to-date information from the
device for the current page.
Saving entries with Set Values
Pages in which you can make configuration settings have a "Set Value" button at the lower
edge. Click this button to save the configuration data you have entered on the device.
Creating entries with NEW
Pages in which you can create lists have the "New" button at the lower edge. Click this
button to create a new entry in the list.
Resetting a counter with Reset Statistics
With this button, you can reset the relevant counters.
Note on Login User
If you log on as user, you will only have restricted use of WEB and Telnet. Since you only
have read access, some commands do not exist in Telnet and some areas cannot be
selected.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
102 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
RRequired experience
To be able to use the information in this chapter effectively, you should have a thorough
knowledge of network technology and WLANs.
5.7.2 The LED simulation of Web Based Management
Display of the operating state
The SCALANCE W-700 has one or more LEDs that provide information on the operating
state of the device. Depending on its location, direct access to the SCALANCE W-700 may
not always be possible. Web Based Management therefore displays simulated LEDs.
Activating the simulation
There is an HTML-based simulation of the LED status. Click on the green icon below the
Console link to activate the simulation.

Figure 5-5 Example: LED display of a SCALANCE W788-2PRO. Other device variants have a
different LED display.

5.7.3 The System menu
5.7.3.1 System Information menu command
Mode and locale setting
On this page, you make several basic settings for the SCALANCE W-700, for example, the
country and mode (access point or client).
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 103
Changing the mode of access points
When the mode changes from access point mode to client mode and back, all the
parameters are cleared except:
IP address
Subnet mask
Gateway address
SSID (only in access point mode)
IP address of the default router
DHCP flag
System name
System location
System contact
Device mode
Country code
User and Admin passwords
The "Current system time" output box informs you about the system time. The "System up
time" output box informs you about the time that has elapsed since the last restart.
Reading out the country list
In the address field of the Internet browser, enter
https://<IP address of the SCALANCE W-700>/countrylist.log
and confirm with "Enter".
After logging in, you then obtain the country list with the following headers:
-----------------------------------------------------------------
COUNTRY | MODE | CH | MHz | PWR(EIRP) | USAGE
-----------------------------------------------------------------
The table lists the permitted wireless modes and channels along with the corresponding
channel frequencies for every possible country setting. The PWR(EIRP) rubric contains the
permitted limit values for the transmit power, measured at the antenna. The limit values
relate to the transmit power of the access point and the gain of the antenna being used.

Note
In the version for USA, you cannot select a country. The frequency bands for this country are
already preset.

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
104 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.7.3.2 System Identification & Maintenance menu
Device information and device identification
The first part of this page shows information on the device, for example the order number
and the firmware version. These text boxes cannot be edited. In the second part, you can
enter your own identifiers for the device.
Function Tag
Here, you enter information relating to the function of the device.
Location Tag
Here, you enter information on the location of the device.
5.7.3.3 IP Settings menu command
Configuration
Here, you decide whether you will use a DHCP server or whether you want to assign a fixed
IP address to the SCALANCE W-700. You can also set the IP address of a router and the
default TTL. The TTL (time to live) parameter specifies the maximum number of routers
passed through by a data packet before it is discarded.

Note
If you use a Radius server for authentication, this must the accessible over the management
VLAN.


5.7.3.4 Services menu command
Configuration
Here, you select the services with which access to the device will be possible. If, for
example, the "SNMP Enabled" check box is not selected, neither write nor read access is
possible using the SNMP protocol (v1,v2c,v3). If the SNMP protocol is not permitted, it is not
possible to send SNMP traps.
To improve security, you should only enable the services that you actually use.

NOTICE
Over SNMP, it is possible to disable all services and to allow read access only over SNMP.
Following this, no further configuration of the device is possible.


If you only want to enable secure access over HTTPS when configuring the device,
select the "HTTPS only" check box.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 105
If you want to enable the response of the device to Ping signals, select the "Ping enabled"
check box.
With the integrated SSH server, you have secure access to the CLI. In contrast to Telnet, the
entire communication including user authentication is encrypted.
Notes on WEB Enabled in the WEB interface
The check box for the "WEB Enabled" entry is selected and inactive because configuration
with Web Based Management is no longer possible without the option of access with HTTP.
If you want to deactivate the option of configuration with Web Based Management, you can
do this in the Security Wizard over Telnet and SNMP. Settings made using the Security
Wizard only take effect after a restart on the device.
LLDP enabled
You can specify how the device handles LLDP data (Link Layer Discovery Protocol). You
can make the following settings:
TX only
The device sends LLDP information.
RX only
The device receives LLDP information.
TX and RX
The device sends and receives LLDP information.
Disabled
LLDP information is neither sent nor received. In this case, the device does not appear in
the STEP 7 topology browser.
Primary Setup Unit (DCP)
Here, you decide whether or not the device can be accessed with DCP (Discovery and
Configuration Protocol):
Enabled
Device data can be both read and set with DCP.
Disabled
Device data can be neither read nor set.
Read only
Device data can be read with DCP but cannot be modified.



Note
The "Disabled" and "Read only" settings can cause disruption of PNIO activity. Select
"Enabled" if you want the device to handle PNIO communication.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
106 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.7.3.5 Restart menu command
Restart button
Click this button to restart the device. During a restart, the device is reinitialized, the internal
firmware is reloaded, and the device runs a self-test. The learned entries in the address table
are deleted. You can leave the browser window open while the device restarts.
Restore Memory Defaults button
Click this button to reset the configuration. The following parameters (protected defaults) are
not reset:
IP address
Subnet mask
Gateway address
SSID
IP address of the default router
DHCP flag
System name
System location
System contact
Device mode
Country code
There is no automatic restart. This allows you to enter data using Web Based Management
before the restart. The changes take effect only after a restart.
If you are logged on as user, the "Restore Memory Defaults" button is not visible.
Restore Factory Defaults and restart button
Click on this button to restore the factory configuration settings. The protected defaults (see
above) are also reset. The C-PLUG is reinitialized and formatted if it exists. An automatic
restart is triggered.

Note
By resetting all the defaults, the IP address is also lost. The device can then only be
accessed using the Primary Setup Tool unless the IP address is obtained over DHCP.

If you are logged on as user, the "Restore Factory Defaults" button is not visible.

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 107
5.7.3.6 Event Config menu command
System events of the device
On this page, you specify how the device reacts to system events. You can configure the
reaction of the SCALANCE W-700 to the following events:
Starting the device
Change in the Ethernet status Link up / Link down
Error when a user logs in
Change in the power supply of the device (evaluating this event only makes sense when
there is a redundant power supply).
Change in the error status (error LED)
Additional system events for access points
If you use a SCALANCE W78x in access point mode, you can configure additional system
events:
Events associated with a client logging on and off
IP-Alive state change (application-specific connection monitoring)
Link Check state change (device-specific connection monitoring)
Events related to bandwidth reservation iQoS
Detection of access points on own or an overlapping wireless channel
Topology changes in Rapid Spanning Tree
Events related to iPCF with the device variants SCALANCE W78x-xRR
Events in conjunction with the Forced Roaming on IP down function
Change in the WDS connection status Link up / Link down
With the device models that have more than one WLAN interface, the status of a redundant
connection (redundant, not redundant, interrupted) is also a system event.
Reaction to system events
The following alternatives are available when the device reacts to a system event:
The device sends an E-mail.
The device sends an SNMP trap.
The device writes an entry in the log file.
The device indicates an error (the error LED lights up).
By selecting the appropriate check boxes, you specify which events trigger which reactions
on the device. With the check box in the "Functions enabled" row, you enable or disable the
sending of E-mails or triggering of SNMP traps.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
108 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.7.3.7 E-mail Config menu command
Sender and recipient of an E-mail
Here, you specify who the device sends an E-mail to as a reaction to configured events. You
can also enter a sender. This allows you to recognize which device is involved and sent the
E-mail. If you do not make an entry in the "From" box, the device uses the following sender:
SCALANCE_W@<IP address>
5.7.3.8 SNMP Config menu command
Configuration
Select the check boxes of the entries according to the SNMP functionality you want to use.
SNMP version 3 allows permissions to be assigned and protocol level, authentication, and
encryption. You specify groups and users in the Groups and Users submenus. You can also
make entries there if the SNMPv3 enabled check box is not selected, however the entries
are not applied.

NOTICE
When using SNMP version 3, you should disable SNMP V1 and V2c because the security
settings of SNMP V3 can be bypassed by access over SNMP V1 or V2c.

Trap submenu
Here, you enter the IP addresses of up to 10 trap receivers. The device sends a trap to all
the addresses you enter if their Enable trap check boxes are selected.

Note
During a warm or cold restart with a wireless connection ( AP client, WDS, or WRED), there
is no guarantee that the recipient can be reached at the time when the trap is sent. This
leads to a loss of the message.

Groups submenu
This page displays the SNMPv3 groups. You can create a new group by clicking the "New"
button and specifying the group name, the security level, and the write or read permissions.
You can delete a group by selecting the check box in the "Del" column and clicking the "Set
Values" button. If members are already entered in the group, you cannot delete the group
nor is it possible to change the security level of the group.
There are three SNMPv3 security levels:

Security level Special features Comment
None No authentication, no encryption.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 109
Security level Special features Comment
Auth/No Priv Authentication with the MD5 or
SHA algorithm, no encryption.
To display the members of the group, you
must enter the authentication password
(maximum of 63 characters).
Auth/Priv Authentication with the MD5 or
SHA algorithm, encryption with the
DES3 algorithm.
To display the members of the group, you
must enter the authentication password
(maximum of 63 characters).
Users submenu
This page displays the SNMPv3 users. You can create a new user by clicking the "New"
button and specifying the user name and the group to which the user will belong. If
necessary, you must also enter the passwords for the authentication and for the encryption.
You can delete a user by selecting the check box in the "Del" column and clicking the "Set
Values" button.

5.7.3.9 SSyslog menu command
Syslog according to RFC 3164 is used for transferring short, unencrypted text messages
over UDP in the IP network. This requires a standard Syslog server.
Syslog Configuration with the SCALANCE W-700
The parameters used for the Syslog protocol are displayed and set in the System -> Syslog
menu. The meaning of the parameters is as follows:
Syslog Server input box
The server address decides the IP address to which the Syslog messages are sent. If no IP
address is entered in this box, no Syslog messages are sent. If the Syslog server is not in
the same network as the SCALANCE W, an automatic attempt is made to establish a
connection over the default gateway.
log table check box
This check box decides whether all entries made in the log table are also sent as Syslog
messages.
auth log check box
This check box decides whether all entries made in the authentication log are also sent as
Syslog messages.

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
110 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.7.3.10 SNTP Config menu command
Time-of-day synchronization in the network
SNTP is the acronym for Simple Network Time Protocol. A server uses this protocol to
provide a uniform time throughout the entire network. Clients can synchronize themselves
with this time.
If you enter the IP address of an SNTP server in the "SNTP server" text box and select the
time zone of the SCALANCE W-700 in the "Time zone offset" list box, the SCALANCE W-
700 uses the time information of this server. The SCALANCE W-700 adopts this time
information without any further conversion relating to daylight-saving or standard time.
In the "Update interval" text box, you enter the cycle time in seconds after which the
SCALANCE W-700 calls up the time information from the SNTP server. With the "Refresh
SNTP" button, you can synchronize with the SNTP server regardless of the selected update
time.
5.7.3.11 Fault State menu command
Information on errors/faults
This page displays information on faults/errors that have occurred. You can delete this
information if you click the "Remove Fault State" button.

5.7.3.12 Load & Save menu command
Saving and loading device data
Clicking the Load & Save menu command first opens a page with the current firmware
version. The "HTTP" and "TFTP" submenus allow you to save device data in external files or
to transfer data from external files to the device. If the device is operated with a C-PLUG, the
data from the loaded configuration file is stored on the C-PLUG. As long as the C-PLUG is
inserted, the device works with the configuration on the C-PLUG.
You can save the following device data in external files:
The configuration data of the device
The private MIB file of the device (only via HTTP)
the content of the log table
The firmware of the device
The client certificate (only for clients and access points in client mode)
The server certificate (only for clients and access points in client mode)
You can transfer the following data from external files to the device:
The configuration data of the device
The firmware of the device
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 111
The client certificate (only for clients and access points in client mode)
The server certificate (only for clients and access points in client mode)
For information on certificates, please refer to the "System Manual Basics of Industrial
Wireless LAN".

Note
When you download the configuration data to the device, it is restarted so that the new data
is adopted correctly. The restart takes place automatically during the loading of HTTP and
TFTP. The device can no longer be reached using the old IP address if the downloaded
configuration data contains a new IP address.



Note
For SCALANCE W788-xPRO/RR and W74x-1PRO/RR only
As of firmware version V3.0, the file with the configuration data of the AP also includes the
following information
Version of the configuration file
Firmware version with which this configuration file was created
Order number (MLFB) of the device with which the configuration file was created
It is essential that the configuration on the C-PLUG was generated with a firmware version
the firmware version on the destination device.
Example:
Configuration files created with a device with firmware V2.4 or older can be loaded without
problems on devices with firmware version V3.0 (or V3.2 on the W786-xPRO and V3.3 on
the W784-1xx/W74x-1). Configuration files generated with a device with firmware version
V3.0 (or 3.2 or 3.3), cannot, however, be loaded on devices with firmware version V2.4 or
older.


Reusing configuration data
Saving and reading in configuration data reduces the effort if several devices have the same
configuration and when IP addresses are obtained over DHCP. Save the configuration data
on a PC after you have configured a SCALANCE W-700. Download this file to all other
devices you want to configure. If necessary, you may need to assign an IP address to these
devices first using the Primary Setup Tool.

How to load or save data over HTTPS
1. To load or save configuration data or the firmware, enter the name of the file from which
the data will be taken and in which the data will be saved in the relevant input box.
As an alternative, you can also use a file selection dialog that opens after you click the
"Browse..." button.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
112 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
2. Start the save function by clicking the Save button. Start the load from file function by
clicking the "Load" button.
How to load or save data over TFTP
1. Enter the IP address of the TFTP server in the TFTP Server IP input box.
2. Enter the port of the TFTP server in the Port text box if the default value does not meet
your requirements.
3. Click the Set Values button before you enter any further information for saving the data.
4. Specify the name of the file (maximum 32 characters) from which the data will be taken or
where the data will be saved in the relevant input box for the configuration data or
firmware.
5. Start the save function by clicking the Save button. Start the load from file function by
clicking the Load button.
Configuration package
If security certificates for the client and/or server are installed on a client, when the
configuration is saved, the client provides the option of saving the configuration file with the
certificates as a configuration package. With the aid of the configuration package, clients can
be replicated simply; in other words, identical settings AND certificates are transferred to the
clients in one step. Just as when you download the configuration file, this is followed by a
restart. No special measures are necessary when downloading the configuration because
the SCALANCE W-700 automatically recognizes the type of configuration file.
5.7.3.13 PNIO menu
Introduction
PROFINET IO, abbreviated to PNIO, allows communication with distributed IO devices on
the basis of Ethernet. The main feature of PROFINET IO is the cyclic data traffic between IO
controller and field device. SCALANCE W-700 devices can also handle PNIO
communication via their Ethernet interface.
SCALANCE W-700 and STEP 7
SCALANCE W-700 devices are included in the hardware catalog of STEP 7 as of version
V5.4.4. The Ethernet interface can be configured in STEP 7 where the diagnostics functions
can also be used. The WLAN interface cannot be configured with STEP 7.
PNIO for client devices
If you want to use a client as a PNIO device, there are two ways of configuring the MAC-
based communication:
Adopt Own MAC
In the network beyond the device, only IP communication and no PNIO is possible.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 113
Layer 2 Tunneling
The SCALANCE W-700 client and the devices behind it can be used as PNIO devices.



Note
If "(Auto) Adopt MAC" or "Set 'Adopt MAC' manually" is set for a client, this device cannot
be used as a PNIO device.
PNIO configuration
PNIO AR Status
AR is the acronym for Application Relation. This identifies a PNIO connection to a controller.
When data is being exchanged cyclically between a SCALANCE W-700 and a controller,
"Online" is displayed here, otherwise "Offline".
PNIO Device Name
Enter the PNIO device name here.
Clear PNIO Fault State
Clears the PNIO fault state and sets the device to INC mode (in other words, PNIO mode is
disabled).
5.7.3.14 C-PLUG menu command
Information on the content of the C-PLUG
This menu command provides you with detailed information on the C-PLUG. You can also
format the C-PLUG or provide it with new content. As soon as the device is started with a C-
PLUG inserted, the SCALANCE W starts up with the configuration data on the C-PLUG.
Changes to parameters are stored on the C-PLUG and displayed over the Web and CLI.
The data in the memory of the device only becomes accessible when the device restarts
without a C-PLUG using the <Restart without C-PLUG> function.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
114 Operating Instructions, Release 07/2008, C79000-G8976-C184-09




Note
In terms of the C-PLUG, the SCALANCE W-700 devices work in two modes:
Without C-PLUG
The device stores the configuration in internal memory. This mode is active when no C-
PLUG is inserted.
With C-PLUG
The configuration stored on the C-PLUG is displayed over the user interfaces. In this
mode, the internal memory is neither read nor written. If changes are made to the
configuration, the device stores the configuration directly on the C-PLUG. This mode is
active when no C-PLUG is inserted. As soon as the device is started with a C-PLUG
inserted, the SCALANCE W-700 starts up with the configuration data on the C-PLUG.

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 115
C-PLUG State input box
This displays the status of the C-PLUG. The following are possible:
ACCEPTED
There is a C-PLUG with a valid and matching content inserted in the device.
NOT ACCEPTED
No C-PLUG or C-PLUG inserted but invalid or incompatible content. The status is also
displayed when the C-PLUG was formatted during operation.
NOT ACCEPTED, HEADER CRC ERROR
A C-PLUG with bad content is inserted.
NOT PRESENT
There is no C-PLUG inserted in the device.
C-PLUG Device Group input box
Indicates the SIMATIC NET product line that used the C-PLUG previously.
C-PLUG Device Type input box
Indicates the device type within the product line that used the C-PLUG previously.
Configuration Revision input box
The version of the configuration structure. This information relates to the configuration
options supported by the device and has nothing to do with the concrete hardware
configuration. This revision information does not therefore change if you add or remove
modules or extenders, it can, however, change if you update the firmware.
File System input box
Displays the type of file system on the C-PLUG.
File System Size input box
Displays the maximum storage capacity of the file system on the C-PLUG.
File System Usage input box
DDisplays the memory utilization of the file system of the C-PLUG.
C-PLUG Info String input box
Here, you will see all the additional information about the device that used the C-PLUG
previously, for example, order number, type designation, and the versions of the hardware
and software.
Modify C-PLUG drop-down list box, Modify button
You can only make settings in this box if you are logged on as "Admin". Here, you decide
how you want to change the content of the C-PLUG. The following alternatives are possible:
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
116 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Copy internal Configuration to C-PLUG and Restart
The configuration in the internal flash memory of the SCALANCE W700 is copied to the
C-PLUG; this is followed by a restart.
This function is required in the following important use case: The device has started up
with a C-PLUG containing a bad configuration or a configuration different from the device.
If you have not yet made any configuration changes after starting up the device, you can
use this function to overwrite the content of the C-PLUG with the original device
configuration from memory.
Load default Configuration to C-PLUG and Restart
A configuration with all the factory default values is stored on the C-PLUG. This is
followed by a restart in which the device starts up with these default values.
Clean C-PLUG (Low Level Format, Configuration lost)
Deletes all data on the C-PLUG and starts a low-level formatting function. There is no
automatic restart.
Create PRESET PLUG
Writes configuration data to a PRESET PLUG. For detailed information on this topic, refer
to the section "Configuring with the PRESET-PLUG".
After making your selection, start the function by clicking the "Modify" button.
C-PLUG error message
If the device detects a C-PLUG error during startup, a message is displayed by Web Based
Management. C-PLUG errors can have two causes:
The C-PLUG contains bad data or data for a different device type.
There is no C-PLUG in the device although a C-PLUG was present prior to the last
shutdown of the device.
If there is a C-PLUG problem, the device starts up with a minimum configuration to allow the
user to eliminate the problem.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 117

5.7.4 The Interfaces menu
5.7.4.1 Interfaces menu command
Introduction
The SCALANCE W-700 has one Ethernet interface and one or more WLAN interfaces that
can be configured separately. In the pages of this menu, you can configure both the wired
Ethernet interface and the WLAN interface.
With the menu command Interfaces > WLAN13 > Virtual AP count in the Access Point
mode, you can also configure up to eight virtual access points (VAP0 VAP7) per wireless
interface.

Note
VAPs are visible only after an AP count > 0.


Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
118 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.7.4.2 Ethernet menu command
TTransmission speed and mode
For a wired Ethernet interface with an RJ-45 connector, you only specify the transmission
speed / mode parameters and the crossing over of the Ethernet connection. When you
select the Auto entry in the "Speed / Mode" drop-down list box, the device sets a suitable
speed and mode depending on the other network nodes and crosses over the Ethernet
connection.
If you select an entry other than Auto in the "Speed / Mode" drop-down list box, you must
specify the crossing over of the Ethernet connection manually with "Ethernet crossing".

Note
If you specify the mode, you must make the same settings on the partner device.

There is no parameter assignment for devices with ST duplex multimode fiber-optic
connectors. The Ethernet MAC address and the current transmission speed/mode are
displayed.

Note
If 10 Mbps is configured as the transmission speed or half duplex as the transmission mode,
this can lead to restrictions in PNIO communication. Always select 100 Mbps and full duplex
or "Auto" if you want the device to handle PNIO communication.

5.7.4.3 WLAN menu command
Enabling the interface
Enable the interface by selecting "Enable Interface".
Network name (in access point mode only)
Enter the network name of the wireless network in the "SSID" input box. If you have used the
Basic Wizard, a value is already entered here.
Infrastructure / Ad-Hoc (only for clients or access points in client mode)
Select Infrastructure to connect to an access point. "Ad hoc" is used to connect clients with
each other without an access point. This is only possible when "Ad hoc" is set on all clients.
Transmission mode
Specify the transmission mode in the "Wireless Mode" list box. If you have used the Basic
Wizard, a value is already entered here.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 119

Note
IEEE 802.11h transmission
It is not possible to select the 802.11h protocol in all country settings. It is specified by the
configuration of Country code on the System page.
If the 802.11h protocol is selected, after applying the configuration with Set Values, the
comment (DFS is active for this country code) appears behind the Enable Interface check
box.
With the automatically enabled Dynamic Frequency Selection function (DFS), prior to
communication, the access point checks whether the configured or selected channel (see
Auto Channel Select) is free of signals from a primary user (for example radar).
If signals of a primary user are found on the configured or selected channel, the access point
follows the procedure outlined below:
Auto channel select = enabled
With automatic channel select, the access point changes to a different channel and
repeats the availability check for this channel.
"Auto channel select" = disabled
If there is a fixed configured channel, the access point changes to the configured
alternative channel and repeats the availability check for this channel. If a primary user (for
example radar) is discovered on the alternative channel, a further channel is selected at
random.
Communication with clients is started only when no primary user has been discovered on the
selected channel for one minute.
When operating PNIO systems with wireless standard 802.11h, make sure that no radar
signals occur in the vicinity of the system. Due to the DFS strategy in 802.11h, there is a
channel change if radar signals are detected.

Outdoor AP mode (only in access point mode) / Outdoor Client mode (only for clients or access point
in client mode)
The device can be operated either in the indoor or outdoor mode. In indoor mode, all the
country-dependent permitted channels and transmit power settings are available for
operation in a building. In outdoor mode, the selection of country-dependent channels and
the transmit power for operation are restricted for outdoor use. You enable this mode by
selecting "Outdoor AP mode" or "Outdoor Client mode".
Channel Selection
On clients or access points in client mode, you can only set a channel in ad hod mode.
For access points, you have the following options: Select the "Auto Channel Select" check
box if you want the access point to search for a free channel itself. If you want to specify a
specific channel, make sure that "Auto Channel Select" is not selected. You can specify a
suitable channel in the "Radio Channel" drop-down list box.
IEEE 802.11h transmission:
If you have selected the 802.11h protocol for transmission in access point mode and "Auto
Channel Select" is not selected, the "Alt. radio channel" input box is displayed below
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
120 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
"Radio channel". Here, you can select the alternative channel in case signals of a primary
user are found on the main channel.
Make sure that the alternative channel is not being used by other access points.
In the IEEE 802.11h transmission mode, it is not practical to select the WDS mode. In WDS
mode, all access points must use the same channel. If a signal from a primary user is
detected by an access point, the channel is changed automatically and the existing
connection is then terminated.
MAC address of the client (only for clients or access points in client mode)
A MAC address must be specified for the devices connected to the Ethernet port of the client
before it can be reached. This MAC address is used by the client for wireless communication
with the access point. This can be done automatically by the client adopting the MAC
address of the first frame that it receives over the Ethernet interface. If this is required, "Auto
find Adopt MAC" must be selected.
As long as the client is waiting for an Ethernet frame, it registers with the access point using
its own MAC address. As soon as the first Ethernet frame is received, the client deregisters
from the access point and immediately registers again with the MAC address from the
Ethernet frame. If there is now a link-down on the Ethernet port, the client deregisters from
the access point and registers again with its own MAC address.
If several devices are connected to the client, you should not select this setting.
You also have the option of specifying the MAC address of the connected device manually.
To use this option, select "Set 'Adopt MAC' manually" and enter the MAC address of the
device connected to the client in the "Adopt MAC" input box.
To be able to address an entire network of devices downstream from the client, "Adopt own
MAC" must be selected. In this case, only layer 3 connections (TCP/IP) are possible. This is,
however, not possible with the SCALANCE W744-1PRO and SCALANCE W744-1.
If up to eight MAC addresses need to be served downstream from the client, the "Layer 2
Tunneling" setting must be selected for the client.

Note
The layer 2 tunneling functionality is supported by SCALANCE W-700 access points as of
firmware version V3.1. This setting meets the requirements of industrial applications in which
MAC address-based communication with several devices downstream from the client is
required. Clients with this setting cannot connect to standard Wi-Fi devices and SCALANCE
W-700 access points with firmware V3.0 or older.

Virtual AP count (only in access point mode)
If you want to configure virtual access points (VAPs) on this AP, set the number of virtual
access points using the "Virtual AP count" drop-down list box. If "Virtual AP count = 0 and
VLAN/Prio Tag" are disabled, no VAPs are created.
You can define up to a maximum of 8 VAPs. The settings of VAP0 are made directly in
"Interfaces/WLAN", the settings for VAP1...7 can be found in the
"Interfaces/WLAN/VAP1...7" submenus.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 121
By using virtual access points, various SSIDs (maximum of 8 per WLAN interface) can be
configured with different security settings. You can assign each virtual AP to a particular
VLAN.
Set Values
Apply the configuration by clicking "Set Values".
If you have configured virtual access points ("Virtual AP count > 0"), in "access point" mode,
you will be requested to run a restart on the SCALANCE W78x after clicking "Set Values".
5.7.4.4 Advanced menu command
Configuring transmission characteristics
On this page, you can specify details of the transmission characteristics. You only need to
adapt the parameters on this page if the device cannot be used as it is intended with the
default settings.
Transmit power
In the Transmit Power list box, you can specify the output power of the device. It may be
necessary to reduce the transmit power when using antennas to avoid exceeding the
maximum legal transmit power. Reducing the transmit power effectively reduces cell size.
Beacons
Beacons are packets that are sent cyclically by an access point to inform clients of its
existence. In the "Beacon Interval" input box, you specify the interval at which the device
sends beacons.
In access point mode only
The "Data Beacon Rate DTIM" parameter (Delivery Traffic Indication Map) specifies how
often the access point sends broadcast and multicast packets over the wireless interface. If
you enter 1 in this box, the access point transmits broadcast and multicast packets directly
after each beacon (recommended setting for normal network environments). The value 5
would mean that the access point collects the broadcast and multicast packets and sends
them after every fifth beacon.
Increasing this value allows a longer sleep mode for the clients but means a greater delay for
broadcast and multicast packets.

Note
The lowest basic rate in the INTERFACE\WLAN\DATARATES menu is used as the "Beacon
Rate". The higher the data rate of the beacon, the shorter the range of the beacon.

RTS/CTS
RTS/CTS (Request To Send/Clear To Send) is a method for avoiding collisions based on the
exchange of status information before sending the actual data (hidden node problem). To
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
122 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
minimize network load resulting from the additional protocol exchange, this method is used
only when a packet size that you select with the "RTS/CTS Threshold" is exceeded.
Fragmentation
The "Fragmentation Length Threshold" parameter specifies the maximum package size
transferred on the wireless link. Large packets are divided up into small packets prior to
transmission and then reassembled into the original size after they have been received. This
can be beneficial if the transmission quality is poor because larger packets are more difficult
to transmit. However fragmentation into smaller packets means a poorer throughput.
Repetitions
There are two situations in which packets are repeated. The hardware repetition is
performed by the WLAN chip itself when it tries to repeat an unacknowledged packet
immediately. The number of attempted repetitions is specified with the "HW Retry number"
parameter.
If all hardware repetitions were unsuccessful, the packet is withdrawn and all other packets
in the buffer are sent first. Following this, transmission of the packet is attempted again. The
number of such repetitions is specified with the "SW Retry number" parameter.
The software repetition mechanism can be enabled or disabled with "Use SW Retry".
Shortened preamble with 802.11b
The 802.11b standard allows the use of shortened preambles in the wireless transmission of
data packets. This increases the amount of user data.
Antenna Gain
The "Antenna Gain" parameter describes the antenna gain in dBi of an antenna connected
to a SCALANCE W-700.
You can set values for the following parameters:
"Antenna Type"
"Antenna Gain"
"Antenna cable length (in meters)"
If "Antenna Type" is set to "User Defined", you can enter any value in the "Antenna Gain"
box for the antenna gain. Otherwise, the preconfigured value of the selected "Antenna Type"
is displayed. In the "Antenna cable length (in meters)" box, you enter the length of the
connecting cable between the device and the antenna.
It is necessary to set a specific value to make sure that the regulations of the national
authorities are adhered to. The national authorities, for example, specify all usable channels,
the corresponding maximum transmit power and other conditions of use. You will find more
detailed information on the regulations in your country using the countrylist.log.
Based on the settings for antenna gain and transmit power, the SCALANCE W-700
automatically selects the permitted channels. Under some circumstances, there may be
fewer permitted channels available for antennas with a higher antenna gain than for
antennas with a lower antenna gain.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 123

Note
If you select "User defined", you have the option of entering dBi values as integers for the
antenna gain in the range from 0 through 30 dBi. Please remember to take the losses of the
antenna connecting cable into account.



NOTICE
The correct antenna setting is mandatory for operation complying with the approvals. A
false antenna gain entry can lead to legal proceedings!

Antennas
The "Antenna Mode" list box specifies the use of antennas.
The Diversity setting takes the better of the two antennas for the data transmission. For
each WLAN interface, both antennas must be connected. Both antennas should also be
of the same type and they should also illuminate approximately the same space. If an
access point is operated with the diversity setting and the two antennas span different
cells, this can have negative effects.
With the setting "Tx on A, Rx on B", antenna A is used to send and antenna B to receive.
With the setting "Tx on B, Rx on A" antenna B is used to send and antenna A to receive.
With the settings "Diversity, Tx on A, Rx on B" and "Tx on B, Rx on A", both antennas must
be connected on each WLAN interface. If only one antenna is connected, the connected
antenna must be set permanently. The second antenna socket must also have a 50
terminator fitted.

Note
For information on the location of the antenna sockets, refer to the section "Connectors for
external antennas".

Scan for access points (only for clients and access points in client mode)
While the client is connected to an access point, it scans for other access points in the
background with which it can connect when necessary. There are three modes for scanning
access points that can be selected in the "Background scan mode" drop-down list box.
If you set "Disable", there is no scan for access points while the client is connected.
If you set "Scan if Idle", there is a scan for access points when no data transfer takes place
for a certain time.
If you set "Scan Always", access points are scanned continuously.
The "Background scan interval" parameter specifies the interval at which further access
points are scanned.
To optimize the scanning for further access points, you can specify channels for the client on
which other access points can be found. To allow this, the "Background Scan Ch.Select"
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
124 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
check box must be set and the channels of the other access points entered in the
"Background Scan Channels" text box. Enter the channels separated by blanks.
If the client finds a better access point, it attempts to connect to it. Before it changes, the new
access point must be better than the current access point by a certain value. The threshold
at which the client changes to the new access point can be specified with the "Roaming
threshold" parameter.
Roaming when there is no Ethernet interface (access point mode only)
If the wired Ethernet interface is no longer available (cable break, connector removed), a
client connected over the wireless network is not aware of this. The access point can then
force the logged-on WLAN clients to roam by deactivating its WLAN interface. The client
then attempts to log on at a different access point. You enable this feature by selecting the
"Force roaming if link down on the Ethernet interface" check box.
Enable WMM
With wireless multimedia, multimedia frames are transferred according to the IEEE 802.11e
standard with a higher priority.
Select the Enable WMM option if you want frames evaluated according to their priority and
sent prioritized over the WLAN interface.
According to the Wi-Fi standard, prioritized frames are classified as follows:

Access Category Description 802.1d Tags
WMM voice priority Highest priority
Allows multiple concurrent VoIP calls, with low latency
and toll voice quality
7, 6
WMM Video priority Prioritize video traffic above other data traffic.
One 802.11g or 802.11a channel can support 3-4
SDTV streams or 1 HDTV streams.
5, 4
WMM best effort priority Traffic from legacy devices, or traffic from applications
or devices that lack QoS capabilities.
Traffic less sensitive to latency, but affected by long
delays, such as Internet surfing.
0, 3
WMM background priority Low priority traffic (file downloads, print jobs) that
does not have strict latency and throughput
requirements.
2, 1

5.7.4.5 SSID List menu command

Note
The "SSID List" submenu is only available for clients and access points in client mode. You
can specify the mode in the "System" menu.

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 125
How the client connects to the network
With this menu command, you can specify how the device connects to a network as client:
If the Connect to ANY SSID check box is selected, the device in client mode attempts to
connect to the network with the best transmission quality and with suitable security
settings. If the "Suppress SSID broadcasting" setting is made for an access point, the
client cannot log on there with the ANY SSID.
If this check box is not selected, the client attempts to connect to the network from the
SSID list that has the best transmission quality.
An SSID is absolutely necessary in ad hoc networks and iPCF. The maximum number of
SSIDs in the SSID list is restricted to 32.
5.7.4.6 Advanced G menu command
Properties of the 802.11g standard
The IEEE 802.11g is upwards compatible with IEEE 802.11b, both use the 2.4 GHz band. In
contrast to 802.11b that specifies data rates up to 11 Mbps, 802.11g provides for data rates
up to 54 Mbps. The 802.11g standard also uses the OFDM modulation scheme. This
technology divides a data packet into several smaller packets that are transmitted at the
same time at different frequencies.
Special options for 802.11g settings
The options you can set in the Advanced G submenu relate to the way in which
management and control data (RTS/CTS frames, beacons) are sent in the 802.11g mode.
You can also specify that the SCALANCE W-700 only supports 802.11g-compatible devices.
Handling 802.11b clients
The access point automatically detects whether 802.11b clients exist in the area. To avoid
802.11g packets colliding with 802.11b packets, the access point can use the RTS/CTS
method.
Using RTS/CTS (in access point mode only)
With the "802.11g CTS Mode" drop-down list box, you specify the use of RTS/CTS:

None Do not use RTS/CTS.
Always Always use RTS/CTS with 802.11g packets.
Auto Only use RTS/CTS when there are 802.11b clients in area.
You can set the data rate for RTS/CTS frames in the "802.11g CTS Rate" drop-down list
box.
With the "802.11g CTS Type" drop-down list box, you specify whether only a CTS or
RTS/CTS is sent.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
126 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
802.11g enhancements
With the "802.11g Short Slot Time" parameter, you specify whether or not the short slot time
is used. This short slot time should be supported by all newer clients.
With the "802.11g Only Mode" parameter, you can specify that only 802.11g clients can log
on at the access point and also that only 802.11g rates are permitted (in access point mode
only). In this mode, only the OFDM modulation method is used. This prevents 802.11b
devices from registering. If 802.11g Only mode is disabled, both 802.11b devices and
802.11.g devices can register with the access point.
5.7.4.7 Data Rates menu command

Note
The "Data Rates" submenu is available only in access point mode.

Variable setting of the transmission rates
From the table showing all available data rates for the current WLAN mode (802.11b, g, a
etc.), you can select any combination of these data rates. The access point will then use only
the selected transmission rates for communication with the clients.
The "Basic Rate" parameter specifies that a client must be capable of this data rate to be
able to connect to the access point.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 127



5.7.4.8 VAP menu command

Note
The "VAP" submenu is available only in access point mode.

Description
You can only complete the pages of the virtual access points VAP1...VAP7 if you have
configured virtual access points ("Virtual AP count > 0") at the higher level "Interfaces >
WLAN".
On this page, you can assign a separate SSID to the virtual access points; in other words,
the access point operates in multiple SSID mode.
SSID
Enter the SSID of the VLAN here.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
128 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Make sure that you also store the SSID of this VLAN in the configuration of the client that
you assign to this VLAN.

Note
You can configure separate security settings for each virtual access point (see section "Basic
Wireless menu command")
The security settings of the VAPs must meet those of the relevant VLANs.

5.7.5 The Security menu
5.7.5.1 Security menu command
Introduction
In this menu, you configure the security settings with which you want to operate your device.
Apart from selecting the authentication and encryption scheme, this also includes the
decision as to whether or not an external Radius server is used and whether access is
restricted based on MAC addresses (ACL).
5.7.5.2 Basic Wireless menu command
Authentication
Authentication basically means that some form of identification is required. Authentication
therefore protects the network from unwanted access. In the "Security Level" box, you can
choose between the following types of authentication:
Open System
There is no authentication. Encryption with a fixed (unchanging) key can be selected as
an option. To do this, define a key in the "Keys" menu. 5 or 13 ASCII or 10 or 26
hexadecimal characters specify a weaker key (40/104 bits). 16 ASCII or 32 hexadecimal
characters, on the other hand, define a strong key (128 bits). Then select "Encryption" in
the "Basic WLAN" menu.



Note
With the following devices in iPCF mode, only this setting is possible:
SCALANCE W788-xRR in client mode
SCALANCE W786-2RR in client mode
SCALANCE W784-xRR in client mode
SCALANCE W747-1
SCALANCE W747-1RR
IWLAN/PB-Link PNIO
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 129
Shared Key
In Shared Key authentication, a fixed key is stored on the client and access point. This is
then used for authentication and encryption. In this case, you will have to store a WEP
key after selecting "Low (Shared Key)".



Note
Only in access point mode:
When using an open system with encryption or shared key in conjunction with ACL lists,
note the information in Section "ACL menu command".
WPA2-PSK
WPA2-PSK is based on the WPA2 standard, WPA authentication, however, operates
without a RADIUS server. Instead of this, a key (pass phrase) is stored on every client
and access point and this is used for authentication and further encryption. AES or TKIP
is used as the encryption method, AES represents the standard method.



Note
The key can be 8 to 63 ASCII characters or exactly 64 hexadecimal characters long. It
should be selected so that is complex, (for example consisting of random numbers,
letters (upper-/lowercase), have few repetitions and special characters). Do not use
known names, words and terms that could be guessed. If a device is lost or if the key
becomes known, the key should be changed on all devices to maintain security.
WPA2
WPA2 (Wi-Fi Protected Access 2) is a further development of WPA and implements the
functions of the IEEE 802.11i security standard. WPA2 uses the additional encryption
protocol CCMP with preauthentication that allows fast roaming in mobile ad hoc
networks. A client can log on in advance at several access points so that the normal
authentication can be omitted.
A RADIUS server is used to authenticate the client with an access point. The client logs
on at a RADIUS server based on a certificate (EAP-TLS) or a combination of user name
and password (EAP-PEAP or EAP-TTLS / internal authentication method MSCHAPv2).
As an option, the RADIUS server then identifies itself to the client using a certificate.
Following successful authentication, the client and RADIUS server generate key material
that is used for data encryption. AES or TKIP is used as the encryption method, AES
represents the standard method.
WPA-Auto-PSK
Setting with which an access point can process both the "WPA-PSK" as well as the
"WPA2-PSK" type of authentication. This is necessary when the access point
communicates with different clients, some using "WPA-PSK" and others "WPA2-PSK".
The same encryption method must be set on the clients.
WPA-Auto
Setting with which an access point can process both the "WPA" as well as the "WPA2"
type of authentication. This is necessary when the access point communicates with
different clients, some using "WPA" and others "WPA2". The same encryption method
must be set on the clients.
Encryption
Encryption protects the transferred data from eavesdropping and corruption. You can only
disable encryption if you have selected "Open System" for authentication. All other security
methods include both authentication and encryption.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
130 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Encryption methods
If you have selected Open System including encryption or "Shared Key" for authentication,
you will need to define a key in the "Keys" menu (see section "Keys menu command").
WEP (Wired Equivalent Privacy)
A weak, symmetrical stream encryption method with only 40- or 104-bit long keys based
on the RC4 algorithm (Rons Code 4).
If you have selected WPA-PSK or WPA (RADIUS) as the authentication, the following
alternatives are available in the "Cipher" box:
TKIP (Temporal Key Integrity Protocol)
A symmetrical stream encryption method with the RC4 algorithm (Rons Code 4). In
contrast to the weak WEP encryption, TKIP uses changing keys derived from a main key.
TKIP can also recognize corrupted packets.
AES (Advanced Encryption Standard)
Strong symmetrical block encryption method based on the Rijndael algorithm that further
improves the functions of TKIP.
AUTO
AES or TKIP is used depending on the capability of the other station.
RADIUS Authentication Method (only for clients and access points in client mode)
If a client is authenticated over an external RADIUS server, you can use the "RADIUS
authentication type" selection list to specify a method for external authentication. As default,
the "Auto" value is selected so that the client provides a RADIUS server with all supported
methods. Any other selection restricts the support by the client to this one method. This step
may be necessary because some RADIUS servers do not evaluate the response of the client
completely or correctly.
The following options are available:
EAP TLS - Extensible Authentication Protocol - Transport Layer Security. Uses
certificates for authentication
EAP TTLS - Extensible Authentication Protocol - Tunnel Transport Layer Security. After
setting up the TLS tunnel, MS-CHAPv2 is used for internal authentication.
PEAP - Protected Extensible Authentication Protocol. Alternative draft protocol of IETF
for EAP-TTLS
Additional Entries for WPA-PSK and WPA2-PSK
To use the WPA-PSK scheme, you must enter a string in the Pass Phrase box that is used
by the SCALANCE W74x to initialize dynamic key generation.
Suppress SSID broadcasting (only in access point mode)
With the Suppress SSID broadcasting setting, the SCALANCE W78x is only ever accessible
to clients that know its SSID. This method can be used to protect the SCALANCE W78x from
unauthorized access.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 131

Note
Since no encryption is used for the SSID transfer, this function can only provide basic
protection against unauthorized access. The use of an authentication method (for example
WPA (RADIUS) or WPA-PSK if this is not possible) provides higher security.
You must also expect that certain end devices may have problems with access to a hidden
SSID.


Inter SSID communication check box (only in access point mode)
Selecting this check box allows communication between WLAN clients registered at different
SSIDs of an access point.

Example 1: A SCALANCE W78x-2xx or W786-3PRO was defined with different SSIDs.
Example 2: A SCALANCE W78x-1xx is used with multiple SSIDs.


Note
On a SCALANCE W78x-2xx or W786-3PRO, the Inter SSID communication function must
be enabled on all WLAN interfaces or on all VAPs to allow communication between the
clients with different SSIDs.



Note
If VLANs are configured for the SSIDs, this setting can prevent communication between the
SSIDs according to the VLAN rules.


Intracell communication list box (only in access point mode)
Intracell blocking
This setting prevents WLAN client communication within an SSID.
Ethernet blocking
This setting prevents WLAN client communication over the Ethernet interface of the
access point.
Disabled
This setting enables both WLAN client communication within an SSID as well as WLAN
client communication over the Ethernet interface.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
132 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Overview of the communication options (in access point mode only)
To illustrate the situation, there is an overview of the effects of the "Inter SSID
communication" and "Intracell communication" settings below.

Settings Possible communication
Inter SSID
communication
Intracell
communication
within
an SSID
with another SSID to the Ethernet
network
Enabled Allowed X X X
Enabled Intracell
blocking
X X
Enabled Ethernet
blocking
X X
Disabled Allowed X X
Disabled Intracell
blocking
X
Disabled Ethernet
blocking
X

VAP (in access point mode only)
For each virtual access point VAP1 to VAP7, you configure the following security settings
described earlier:
Authentication
Enable encryption
Encryption method
Select the default WEP key
Enter the WPA-PSK password
Specifies the "Group Key Update Intervals" in WPA-PSK
Enable "Suppress SSID broadcasting"
Where they apply, all other security parameters are adopted from the Security > Basic >
WLAN1 or WLAN2 or WLAN3 page.
5.7.5.3 Keys menu command
Specifying the WEP key
To allow you to enable the encryption for the Open System and Shared Key authentication
methods, you must first enter at least one key in the key table. You can choose between
several key lengths. 5 or 13 ASCII or 10 or 26 hexadecimal characters specify a weaker key
(40/104 bits). 16 ASCII or 32 hexadecimal characters, on the other hand, define a strong key
(128 bits).
You can also create keys for WDS Redundancy and ACL Private (these are not supported
by all clients for ACL).
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 133

Note
For the key, you can use characters 0x20 to 0x7e from the ASCII code. Below, there is a list
of all supported characters starting with a space:
!"#$%&'()*+,-./0123456789:;<=>?@
ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`
abcdefghijklmnopqrstuvwxyz{|}~


5.7.5.4 ACL menu command

Note
The "ACL" menu is available only in access point mode.

Access rights for individual clients
The access control list (ACL) is and assignment of MAC addresses and access rights.
If ACL is enabled, prior to data transfer, the access point checks whether the necessary
permissions for the communication partner (identified by the MAC address) are entered in
the ACL table

Note
Since no encryption is used for MAC address transfer, this function can only provide basic
protection against unauthorized access. The use of an authentication method (for example
WPA (RADIUS) or WPA-PSK if this is not possible) provides higher security.


Enabling the ACL
In Web Based Management, there is a drop-down list box for the use of ACL.
To enable ACL, set the global share to either "Enabled" or "Strict":
Enabled
All clients entered in the ACL are handled according to the ACL entry. Clients not entered
in the ACL have access to the access point. This setting can be used to deny access by
certain clients.
Strict
All clients entered in the ACL are handled according to the ACL entry. Clients not entered
in the ACL have no access to the access point. This setting can be used to allow access
by certain clients.
Disabled
The access control list is not used.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
134 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Changing an entry in the ACL
Click the relevant MAC address to change the entry in the ACL. With the "Sel" check box,
you decide whether or not an ACL entry is used. The "Del" check box is used to delete an
entry from the ACL.
New entry in the ACL
Click the New button to create a new entry in the ACL. A page appears on which you can
make the necessary settings. Enter the "MAC address" of the client in the "MAC Address"
text box. You specify the access permissions of the client in the "Permission" drop-down list
box:
Allow
The client has access to the access point.
Deny
The client does not have access to the access point.
Default Key
The client only has access to the access point when it uses the default key for encryption
of the data. To allow this, you must specify a valid default key for the SCALANCE W78x
(for example in the WBM "Security" menu) that is also used by the client.
Private Key
With this setting, you can use different keys for different clients. You first create the
private keys with the "Keys" menu command. You can select one of these keys in the
"Key number" drop-down list box. The client only has access to the access point when it
uses this private key. For this function, the client must support private keys.




Note
The private key set in the ACL must also be available in the key list on the client. The
client must also use this private key for communication in Security->Basic->WLAN (the
key must be set),if an open system with encryption or shared key is used.
The private key is used on this connection for the transferred unicast packets intended for
the wireless client.
All multicast and broadcast packets are transferred with the public key set on the access
point. The wireless client entered in the ACL list must therefore also enter this public key
at the same location in its key list as the access point.

Example
In its cell, an access point uses the shared key setting with a 128-bit public key (default key
1) for encryption of the data traffic.
All wireless clients that register at this access point, require this public key at position 1 in
their key list for communication.
If access for certain wireless clients is now restricted by the ACL list of the access point on
the basis of a private key, the private key must first be stored in the key list of the access
point and the appropriate wireless clients.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 135
The next step is to enter the MAC addresses of these wireless clients in the ACL list of the
access point and to assign the private key. If it is intended that these wireless clients should
continue communication, the private key must be set on the wireless client directly under
Security->Basic->WLAN and used for the encryption. Otherwise the clients could receive
broadband or multicast packets, but no longer be addressed directly with unicast packets.

5.7.5.5 RADIUS Server menu command

Note
The "RADIUS" menu command is available only in access point mode.

Authentication over an external server
The concept of RADIUS is based on an external authentication server. A client can only
access the network after the access point has verified the logon data of the client with the
authentication server. Both the client and the authentication server must support the EAP
protocol (Extensive Authentication Protocol). The SCALANCE W-700 supports the external
authentication mechanisms EAP-TLS, EAP-TTLS and PEAP.
5.7.5.6 Access menu command
Access permissions for IP addresses
In this menu, you specify the access permissions for IP addresses. You can specify whether
management access (SNMP, Telnet, WBM) is possible with the defined addresses:
Management access is possible only with the defined addresses.
Or:
Management access is possible with all IP addresses not included in the list.



Note
The defined access rights also apply to the PC used for configuration. If you have not
entered the local IP address and have set the ACL mode to "Accessed", no further
access to the SCALANCE W-700 is possible.
You should also note that the IP address of the client can change if you use DHCP
without reservation.

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
136 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.7.6 The Bridge menu
5.7.6.1 Bridge menu command
Introduction
A bridge is a network component that connects two networks. A bridge is not dependent on
the protocol; management of the data packages is based on the physical address of the
network nodes (MAC address).
The SCALANCE W-700 provides bridge functionality because it handles data exchange
between wired and wireless Ethernet. The following sections describe the functions that are
available and how you configure and use them.
Deleting aged bridge information
The SCALANCE W-700 saves the information about which MAC address can be reached
over which port in a learning table. Entries in this list are deleted automatically when there is
no further data transfer for the corresponding MAC addresses. You can decide the length of
time after which addresses are deleted if no data is sent using the "Aging Time" parameter
on the start page of the "Bridge" menu.
5.7.6.2 WDS menu command

Note
The WDS menu command is available only in access point mode and when iPCF is not
enabled.

Communication between access points
In normal operation, the SCALANCE W78x is used as an interface to a network and
communicates with clients. There are, however, situations in which several access points
need to communicate with each other, for example to extend wireless coverage or to set up
a wireless backbone. This mode is possible with WDS (Wireless Distributed System).

Note
For SCALANCE W788-xPRO/RR and W74x-1PRO/RR only
With the firmware update to V3.0, the SCALANCE W78x-xRR devices need to be
reconfigured if you use WDS or redundancy and use the MAC address and not the
sysName.
These functions are then based on the MAC address that changed with the introduction of
VAPs with V3.0.

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 137
Configuration
In the "MAC / sysName" column, enter the MAC address or the system name of the access
point with which you want to communicate. If you select the "Enc" check box, encryption is
used.

Note
In WDS mode, the following restrictions apply:
All access points that will communicate with each other must use the same channel.
You can select either WEP or WPA(2)_PSK as the encryption method.
If you want to use WPA_PSK or WPA2_PSK as the encryption method, you will need to
set the WPA_PSK, WPA2_PSK or WPA/WPA2-AUTOPSK mode in the security settings
and the WPA pass phrase on the relevant interface (VAP0). If a different security level is
selected, you cannot use WPA(2)-PSK with WDS.
To activate WPA(2)-PSK, select the "WPA_PSK" entry instead of a key.
Once you have selected WPA-PSK or WPA2-PSK for a connection, all WDS connections
must be protected by at least a WEP key.
If you want to attach a different access point from the SCALANCE W78x over WDS, you
must configure the MAC address. Detection using the "sysName" parameter does not
work in this situation.
In the IEEE 802.11h transmission mode, it is not practical to select the WDS mode. In
WDS mode, all SCALANCE W78x devices must use the same channel. If a signal from a
primary user is detected by an access point, the channel is changed automatically and
the existing connection is then terminated.
As soon as you use the same channel for more than one WLAN interface, you will have
to set WDS addressing using MAC addresses. Configuration with "sysName" can lead to
registering with the wrong interface and probable impairment of communication.

To enable the entry, you select the "Sel" check box.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
138 Operating Instructions, Release 07/2008, C79000-G8976-C184-09


5.7.6.3 VLAN menu command

Note
The "VLAN" menu command is available only in access point mode of a SCALANCE W78x.

Assignment and management of the VLAN IDs
The "Current VLAN Configuration" dialog displays a table with an overview of the configured
VLAN IDs (VID). The assignment of the configured ports of the access point is also
displayed as a member of these VLANs.
The "Name" is used to identify an entry within the current table. "Member List" displays 'U' for
untagged member of a VLANs or '' if a port is not member of a VLAN. The sequence is
sorted from left to right in ascending order; in other words, according to the ID of the
interface (WLAN 1, WLAN 1 VAP 1, WLAN 2 VAP 2 or WLAN 1 WDS 1, WLAN 1 WDS
2...).
Entries in red, indicate members in the table, entries in black indicate the configured port
VLAN IDs.
If an interface is member of a VLAN ID, that is not the same as the port VID, frames arriving
from Ethernet with this VLAN ID are accepted. Outgoing frames, however, always have the
port VLAN ID.
Click on "VID" or "Name" to open the configuration page for VLAN IDs. With "New", you
create a new VLAN ID, with "Refresh", you can update the table.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 139

Note
The Ethernet interface does not remove VLAN tags from outgoing frames.
If the VLAN is active, the WLAN interfaces always remove all VLAN tags from the outgoing
frames.



Member List Description
U If VID equals port VID; in other words untagged frames from WLAN are given this
VID.
U If the port is a member of the VID; in other words, tagged frames from Ethernet are
forwarded on this port.
If the port is not a member of the VID; in other words, all the frames coming from
Ethernet are blocked / discarded with the corresponding VLAN ID. Frames containing
unconfigured VIDs and untagged frames are always blocked if the VLAN is active.




VLAN ID settings
The VLAN ID box allows you to enter a new VID as long as no port is assigned explicitly as
member. Otherwise, the VID can no longer be modified.

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
140 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Representati
on
Settings Description
1



Field can be edited.
If all editable boxes are displayed in this way and if the VID is not
configured as port VID, the VID is deleted when you exit this page.
Clicking on the field changes to depiction 2.
2

Field can be edited.
Clicking on the field changes to depiction 1.
3

Field cannot be edited.
Al entries for VLAN membership are being used.
4

Field cannot be edited.
VID corresponds to the port VID
5

Field cannot be edited.
Corresponding port is set to "all VIDs",
6



Field cannot be edited.
Corresponding port is not configured so no VID can be assigned.

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 141


Ports
Port: Overview of the ports in the form of a table.
"SSID": SSID for WLAN interface, no entry for WDS or management and redundancy.
"Priority": Configured priority of the port.
"Port VID": VLAN ID directly assigned to the port.
"Member": The VLAN membership assigned to the port.
"Enabled": VLAN support can then be enabled / disabled directly.
Clicking on a port opens the VLAN Settings configuration page.

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
142 Operating Instructions, Release 07/2008, C79000-G8976-C184-09




Note
If you use a Radius server for authentication, this must the accessible over the management
VLAN. Among other things, the management port also handles the functions: HTTP, HTTPS,
WBM, Telnet, SSH, Ping, DHCP, TFTP, SNMP, SNTP and Syslog.



Note
The IP and MAC-based nodes downstream from a client with enabled layer 2 tunneling
function ( L2T client) adopt the same VLAN properties as the client.

Example:An L2T client is connected to the access point over the WLAN1 VAP3 interface.
WLAN1 VAP3 is a member of the VLAN ID 33 that is assigned priority 6. For the L2T port,
this means that the devices connected downstream from the L2T client and the client itself
are also members VLAN ID 33 with priority 6.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 143
VLAN settings
"VLAN enabled": VLAN support can then be enabled / disabled directly.
"User Priority": Prioritizing the data traffic via the port. Untagged frames are given this
priority.
"Port VLAN ID": Entry of the VLAN ID.
"VLAN Membership"
"All VIDs": Automatic setting of the port as member of all configured VIDs.
"Specific VIDs only": Member of up to eight, freely assignable configured VIDs per port.




VLAN enable
Select the "VLAN enable" option if you want to enable the VLAN function. If "VLAN enable"
is selected, all frames of this VAP are given a VLAN tag.
User priority
Specify the priority of the frames of this VAP with the "User priority" drop-down list box. The
priority is evaluated by the connected VLAN-compliant switches (for example,
SCALANCE X-400) of the network. The priority rises with the ascending numbers:
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
144 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

Note
The priority generally increases with the ascending numbers. The exception is priority 0, that
has a higher priority than priority classes 1 and 2 and has the same priority as class 3.

"0 - Best Effort (BE)"
Normal data traffic.
"1 - Background (BK)"
Non time-critical data traffic.
"2 - Spare (--)"
This priority is reserved
"3 - Excellent Effort (EE)"
Data traffic with highest priority
"4 - Controlled Load (CL)"
"5 - Voice (VI), < 100 ms latency and jitter"
Video/multimedia
"6 - Voice (VO), < 10 ms latency and jitter"
Voice over IP
PNIO
"7 - Network Control (NC)"
Internal network control frames
Default is 0 - Best Effort (BE).

Note
Both voice over IP and PNIO have priority 6.

Port VLAN ID
Here, you enter the VLAN ID (VID) of the VLAN on which the virtual access point will
communicate.
The individual VLANs are configured in the VLAN-compliant Industrial Ethernet switches (for
example SCALANCE X-400). The VID of a VLAN is in the range from 1 to 4094.
VLAN membership
Here, you specify the VLANs for which the virtual access point will be a member or which
other VLANs the port VLAN ID (VID) entered above will be assigned to.
The following alternatives in the assignment are possible:
"all"
The VAP is member of all VLANs.
"only"
The VAP is member only of the VLANs entered below.
Here, enter the VLAN ID (VID) of up to 8 VLANs in which the VAP will be a member.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 145
5.7.6.4 Learning Table menu command
Assignment of MAC address and port
The learning table contains the information about whether a MAC address can be reached
over the wired Ethernet interface or over the wireless interfaces. The SCALANCE W-700
obtains this information from the active data exchange. The learning table also contains
information on clients and on up to 8 devices connected downstream from it operating in the
layer 2 tunneling mode.
5.7.6.5 ARP Table menu command
Assignment of MAC address and IP address
The ARP protocol (Address Resolution Protocol) obtains the corresponding MAC address of
a known IP address. The page of this menu command also indicates the interface over
which an address can be reached. The last column indicates how the information was
obtained (for example "dynamic" if it was obtained during operation or "static" if it was
configured).
5.7.6.6 Spanning Tree menu command

Note
The "Spanning tree" menu command is available only when you use the SCALANCE W78x
in access point mode.

Avoiding loops on redundant connections
The spanning tree algorithm allows network structures to be created in which there are
several connections between two stations. Spanning tree prevents loops being formed in the
network by allowing only one path and deactivating the other (redundant) ports for data
traffic. If there is an interruption, the data can be sent over an alternative path. The
functionality of the spanning tree algorithm is based on the exchange of configuration and
topology change frames.
Definition of the network topology using the configuration frames
Network components exchange configuration frames known as BPDUs (Bridge Protocol
Data Unit) with each other to calculate the topology. The root bridge is selected and the
network topology created using these frames. The root bridge is the bridge that controls the
spanning tree algorithm for all involved components. BPDUs also bring about the status
change of the bridge ports.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
146 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Rapid Spanning Tree
The rapid spanning tree algorithm is based on the spanning tree algorithm. This was
optimized in terms of the reconfiguration time. Typical reconfiguration times for Spanning
Tree are between 20 and 30 seconds. With rapid spanning tree, the reconfiguration times
are around 1 second. This was achieved by the following measures:
Edge ports
A port defined as an edge port is activated after the hello time (the time between two
configuration frames). When the hello time has elapsed, the station can be certain that no
further configuration frame will arrive and that this port is an edge port. If the user wants
to avoid the hello time, spanning tree can be disabled at this port.
Point to Point (direct communication between two neighboring stations)
By directly linking network components, a status change (reconfiguration of the ports) can
be made without any delays. A point-to-point connection can, for example, be a WDS
connection between two access points.
Alternate port (substitute for the root port)
A substitute for the root port is configured. If the connection to the root bridge is lost, the
station can establish a connection over the alternate port without any delay by
reconfiguring.
Filter table
In rapid spanning tree, ports affected by a reconfiguration are immediately deleted from
the filter table. With spanning tree, on the other hand, the point at which a port is deleted
is decided by the time when the port was entered in the filter table.
Reaction to events
Rapid spanning tree reacts to events, for example an aborted connection, without delay.
There is no waiting for timers as in spanning tree.
In principle, therefore with rapid spanning tree, alternatives for many parameters are
preconfigured and certain properties of the network structure taken into account to reduce
the reconfiguration time.
(Rapid) Spanning Tree configuration
The parameters used for the (Rapid) Spanning Tree protocol are displayed in the "(Rapid)
Spanning Tree Properties" menu.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 147


If necessary, modify the following parameters to specify how the (rapid) spanning tree
algorithm operates:
Enable (R)STP check box
Select the Enable Spanning Tree check box if you want to use the (rapid) spanning tree
algorithm. If the check mark is not set, all ports are automatically in the 'Forwarding'
status.
Version drop-down list box
The version decides whether the Rapid Spanning Tree protocol (RSTP) is used or
whether the device is operated in compatibility mode of the Spanning Tree protocol
(STP).
Bridge Priority input box
The identification of the most efficient connection is always related to the root bridge, a
network component that can be considered as a root element of a tree-like network
structure. With the "Bridge Priority" parameter you can influence the selection of the root
bridge.
The bridge with the highest priority (in other words, with the lowest value for this
parameter) becomes the root bridge. If several network components in a network have
the same priority, the station whose MAC address has the lowest numeric value will
become the root bridge. Both parameters, bridge priority and MAC address together form
the Bridge Identifier. Since the root bridge manages all path changes, it should be located
as centrally as possible due to the propagation time of the frames. The value for the
bridge priority is a whole multiple of 4096 with a range of values from 0 through 61440.
Max Age input box
Max Age is the time that a bridge waits for a configuration frame (BPDU). When this time
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
148 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
has elapsed, the bridge attempts to reconfigure the network. The default for this
parameter is 20 seconds.
Hello Time input box
Each bridge regularly sends configuration frames (BPDUs). The interval between two
such frames is the "Hello time". The default for this parameter is 2 seconds.
Forward Delay input box
New configuration data is not used immediately by a bridge but only after the period
specified in the Forward Delay parameter. This ensures that operation is started with the
new topology only after all the bridges have the required information. The default for this
parameter is 15 seconds.
Spanning Tree Port settings
Port-specific parameters
This page displays the current port parameters. The settings are made either using the
automatic function of the SCALANCE W-700 or by the user.



Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 149
The eight columns of the port table show the following information:
Port
Specifies the ports to which the information relates. WLAN1 VAP2, for example, relates to
the virtual access point VAP2 on the first WLAN interface.
Priority
You set the priority of the ports of a bridge with this parameter.
If the path calculated by spanning tree is possible over several ports of a switch, the port
with the highest priority (in other words the lowest value for this parameter) is selected. A
value from 0 through 240 can be specified for the priority; the default is 128.
STP Cost & RSTP
These parameters are used to calculate the path that will be selected. The lower the
value, the greater the probability that the corresponding path will be used. If several ports
of a bridge have the same value, the port with the lowest port number will be selected.
Depending on whether STP or RSTP was selected as the version, the value of STP Cost
or RSTP Cost will be used.
The calculation of the path costs is based mainly on the transmission speed. The higher
the achievable transmission speed, the lower the value for Path Cost should be.
Typical values for spanning tree and rapid spanning tree are as follows:
(The values can, however, also be set individually.)

Data rate Path costs STP Path costs RSTP
100 Mbps 19 200.000
54 Mbps 33 370.370
48 Mbps 36 416.667
36 Mbps 43 555.556
24 Mbps 53 833.333
18 Mbps 58 1.111.111
12 Mbps 83 1.666.667
11 Mbps 90 1.818.182
10 Mbps 100 2.000.000
9 Mbps 111 2.222.222
6 Mbps 166 3.333.333
5.5 Mbps 181 3.636.364
2 Mbps 500 10.000.000
1 Mbps 1000 20.000.000
Edge
The following entries are possible in the this column.
yes There is an end device on this port.
no There is a spanning tree or rapid spanning tree device on this port.
If an end device is connected, a SCALANCE X-700 can switch over the port more quickly
without taking into account spanning tree frames. If a spanning tree frame is received
despite this setting, the port automatically changes to the no setting for further stations.



Note
If clients with the layer 2 tunneling function enabled connect to the access point, a
separate port is opened for each of these clients. These ports cannot, however, be
configured for Rapid Spanning Tree. The settings (for example, priority and path costs
etc.) of the cell over which the client is connected to the access point are adopted.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
150 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Example:An L2T client is connected to the access point over the WLAN1 VAP3 interface.
The settings for WLAN1 VAP3 are: priority 128, path costs for STP of 100, path costs for
RSTP of 0 and the setting EdgePort enabled (in other words, there is an end device on this
port). These settings are adopted for the L2T port with one exception.
The Edge-Port enabled setting is not adopted because layer 2 tunneling clients and the ports
downstream from the client can never be edge ports.
P.t.P.
There is a point-to-point link when two RSTP-compliant network components are
connected together over this port. There are three possible statuses :
ForceTrue
Even with half duplex, a direct link is assumed.
ForceFalse
Despite a full duplex connection, a point-to-point link is not assumed.
Auto
Point-to-point is detected automatically. If the port is set to half duplex (shared media
connection), a direct link is not assumed.
Example: A WDS connection between access points is always a half duplex
connection. With the setting ForceTrue, a direct connection is assumed. With Auto, a
direct connection is not assumed.
Enabled
Shows whether spanning tree is enabled or disabled for the port.
Configuration of a port for (Rapid) Spanning Tree
If you click on a port name in the first column, you open the "(Rapid) Spanning Tree Port
Properties" page:
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 151


"Enable (R)STP" check box
Enable this check box, if you want the port to use the (rapid) spanning tree protocol.
Priority input box
Enter a value here for the port priority between 0 and 240.
"Admin Path Cost" input box
Here, you can enter a value for the STP or RSTP Path Cost parameter. The relevant
value is then used depending on the selected version.
If you enter a zero for the RSTP value, the value for the path costs is calculated
automatically.
"Admin Edge Port" check box
Enable this check box if an end device is connected to this port, otherwise a
reconfiguration of the network will be triggered by every link change.
"Admin Point to Point Status" drop-down list box
There are three possible settings:
Shared media Connection is selected:
This corresponds to "ForceFalse" in the port table.
Point to Point Connection is selected:
This corresponds to "ForceTrue" in the port table.
Point to Point Connection and Shared Media Connection are selected:
This corresponds to "Auto" in the port table.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
152 Operating Instructions, Release 07/2008, C79000-G8976-C184-09



Note
Point-to-point means a direct connection between two stations. A shared media
connection would, for example, be a connection from the Ethernet port to a hub or a
WDS connection between two access points.

5.7.6.7 Storm Threshold menu command

Note
The "Storm Threshold" menu command is available in access point and in client mode. The
function can only be used in client mode if NAT is disabled.

Limitation of broadcast and multicast frames
Storm Threshold is the maximum number of broadcast or multicast frames per second
forwarded by the SCALANCE W-700. If this limit is exceeded, the SCALANCE W-700 stops
processing such frames for 30 seconds.

5.7.6.8 NAT menu command

Note
This menu command is available only with the following variants:
SCALANCE W746-1PRO
SCALANCE W746-1
SCALANCE W747-1RR
SCALANCE W747-1
SCALANCE W78x (client mode only)

What is NAT?
With Network Address Translation (NAT), the IP address in a data packet is replaced by
another. NAT is normally used on a gateway between a private LAN and an external network
with globally valid IP addresses. A local IP address of the internal LAN is changed to an
external global IP address by a NAT device at the gateway.
To translate the internal into the global IP address, the NAT device maintains a translation
list.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 153
What is NAPT?
In "Network Address Port Translation" (NAPT) or "Port Address Translation" (PAT), several
internal source IP addresses are translated into the same external source IP address. To
identify the individual source nodes, the port of the source device is also stored in the
translation list of the NAT gateway and translated for the external address.
If several local clients send a query to the same external destination IP address over the
NAT gateway, the gateway enters its own external source IP address in the header of these
forwarded frames. Since the forwarded frames have the same global source IP address, the
NAT gateway assigns the frames to the clients using different port number.




Note
NAT/NAPT is possible only on layer 3 of the ISO/OSI reference model. To use the NAT
function, the networks must use the IP protocol.
When using the ISO protocol that operates at layer 2, it is not possible to use NAT.


Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
154 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
NAT properties of the SCALANCE devices
When using the following WLAN clients as a NAT gateway, the WLAN clients must be
connected with the local Ethernet devices over the Ethernet port:
SCALANCE W746-1PRO
SCALANCE W746-1
SCALANCE W747-1RR
SCALANCE W747-1
W78x (in client mode)
The local IP address of the WLAN client on the Ethernet devices must be entered as the
gateway address.
The address assignment differs depending on the communication direction:
From Ethernet device to access point: "Dynamic" address assignment (NAT)
The continuous address assignment is made automatically.
From Access point to Ethernet device: "Static" address assignment (NAPT)
The address assignment is fixed and must be set as a parameter.
32 entries can be set as NAT gateways per WLAN client.
Configuration
Set the configuration on the IP Network Address Translation page with the following settings:
Enable NAT
Click the "Enable" check box if you want to enable NAT.
Caution: The change is adopted only after a restart!
Local IP
Here, you enter the local IP address for the Ethernet port of the WLAN client.
Subnet Mask
Enter a subnet mask for the local Ethernet network here, if applicable.
Del
Select the "Delete" check box if you want to delete the previous entries on this page.
Sel
Select the "Select" check box if you want to enable the current entries.
Type
Here, you select the assignment TCP or UDP for the following global port. Parameters for
TCP and UDP frames are set separately.
Global Port
Enter the number of the global port (for TCP or UDP).



Note
If the port is already occupied by a local service (for example Telnet), a warning is
displayed. In this case, avoid using port 23 (Telnet), port 22 (SSH) and ports 80/443
(http/https: availability of the client with the WBM) as global port.
Local Address
Here, you enter the local address of the Ethernet device.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 155
Local Port
Here, you enter the number of the local port of the Ethernet device.



Note
The following instructions apply only to the IP parameter assignment using the PST tool.
When the module is accessed with PST by a configuration computer, the address
assignment differs depending on the interface:
PST over the wireless interface:
The "global" address is changed.
PST over the Ethernet interface:
The "local" address is changed.

5.7.6.9 IP Mapping Table menu command

Note
This menu command is available only with the following variants:
SCALANCE W746-1PRO
SCALANCE W746-1
SCALANCE W747-1RR
SCALANCE W747-1
SCALANCE W78x in client mode



Note
IP mapping table
If layer 2 tunneling is configured for a client, the IP mapping table is not displayed.


WLAN access by several devices over a client
With the devices listed in the first paragraph, you can provide access to the WLAN for
several devices with one client. This means that you do not need to equip every device with
its own wireless client.
This so-called IP mapping is possible only if the connected devices are addressed only by IP
frames. Communication at MAC address level (ISO/OSI layer 2) can
be established with one component whose MAC address is configured on the client,
be established with a maximum of eight components if the layer 2 tunneling function is
selected.
The layer 2 tunneling setting meets the requirements of industrial applications in which MAC
address-based communication takes place with several devices downstream from the client.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
156 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Clients with this setting cannot connect to standard Wi-Fi devices and access points with
firmware V3.0 or older.
MAC Mode
IP frames in the direction from the client to the access point always have the MAC address
of the WLAN interface as the source MAC address. As a result, the ARP tables at the access
point end always contain only the MAC address of the WLAN interface of the clients.
If there are further devices downstream from the client, the Auto Find 'Adopt MAC' option
should not be enabled. In this case, the MAC address would be assigned indiscriminately to
the first device that signals over Ethernet.
If there is only IP communication between the access point and the client, the default setting
"AdoptOwnMAC" can be retained. If you also want MAC address-based frames to be sent by
devices behind the client, select the settings Adopt MAC manually, Autofind Adopt MAC or
Layer 2 Tunneling.
MAC address/IP address assignment
The client maintains a table with the assignment of MAC address and IP address to be able
to send incoming IP frames to the correct MAC address. The "IP Mapping Table" menu
command displays this table. In principle, any number of device is can be reached
downstream from a client using IP. The client can manage up to eight devices. When a new
device is added, the oldest entry is deleted from the table to make space is for the new entry.
Since the data throughput of a wireless connection cannot be increased indefinitely, a
maximum of the devices should be managed by one client.

5.7.7 The Filters menu
5.7.7.1 Filters menu command

Note
The "Filters" menu and the corresponding menu commands are available only when you
operate the SCALANCE W78x in the access point mode. You can specify the mode in the
"System" menu.


5.7.7.2 MAC Filters menu command
MAC filter
If the MAC filter is activated, communication with clients on the Ethernet side is possible only
when their source MAC addresses are entered in the table. As an alternative, there is a
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 157
possible setting with which access is denied for all specified MAC addresses. You can enter
a maximum of 50 MAC addresses in the table.
With IP mapping of a SCALANCE W78x in client mode, only the MAC address assigned to
this device is relevant, the MAC addresses of the devices downstream from it on the
Ethernet side are irrelevant for filtering.
If the "WDS" check box is selected, there is also filtering over the WDS ports.
5.7.7.3 MAC Dir Filter menu command
Restriction of the data traffic between MAC addresses
It is possible to filter the data traffic intended for wireless clients linked to the access point.
This filter is used to permit a specified MAC address access only to other specified MAC
addresses. You can specify several source addresses or entries for one destination address.
The communication of the destination address is then restricted to these entries. If a
destination address is not entered in the filter, it is not subjected to any restrictions.
5.7.7.4 Protocol Filter menu command
Protocol selection
Without protocol filtering, the SCALANCE W78x processes all data packets regardless of the
protocol being used. To increase data security and to reduce load, it can nevertheless be
useful to prevent communication using certain protocols.
Here, you are not restricted to the protocols included in the list in this menu. If necessary,
you can add your own entries to this list. You can specify a maximum of 50 Ethernet II
protocols for which filtering is required.
5.7.8 The I-Features menu
5.7.8.1 I-Features menu command

Note
The "I-Features" menu and the corresponding menu commands are available only when you
operate the SCALANCE W78x in the access point mode. You can specify the mode in the
"System" menu.
The iPCF menu command is available only for a SCALANCE W747-1RR, SCALANCE
W747-1 and an IWLAN/PB LINK.


Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
158 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.7.8.2 iQoS menu command (in access point mode only)

Note
This function is not available in iPCF mode.

Client-specific bandwidth reservation
iQoS (Quality of Service) is technique with which clients are assigned a certain bandwidth.
Due to this assignment, there is a high probability that data transmission to these clients will
be within a defined period. This technique can be useful when response times must be
guaranteed. If non-iQoS-clients put too much load on the network, they can be logged off
from the AP to guarantee data traffic for iQoS clients.

Note
To ensure problem-free functioning of the iQoS mode, the number of clients with bandwidth
reservation is restricted to four.



Note
If the user reserves data for critical clients, this data rate also includes the frame header (in
other words, 802.11, MAC, IP, TCP, and S7 header). A SIMATIC user must therefore take
into account not only the net data during configuration but also the headers.

Response Time
In the "Response Time" input box, you enter the required response time of the
SCALANCE W78x over the wireless interface. Remember that this value represents the
transmission time for the data from the SCALANCE W78x to the client. The data
transmission rate for nodes not included in the list is reduced according the values specified.
5.7.8.3 iPCF menu command

Note
The iPCF menu command is available only for the following devices:
SCALANCE W78x-xRR
SCALANCE W747-1RR
SCALANCE W747-1
IWLAN/PB Link


Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 159

NOTICE
With SCALANCE W78x-xRR devices, iPCF may only be enabled for one WLAN interface.

When should iPCF be used?
iPCF can be recommended, in particular, when a high data throughput is required despite a
large number of nodes or when extremely short handover times are required.
With PNIO data traffic (ProfiNET IO), the iPCF mechanism was further optimized by handling
PNIO traffic with high priority.

Note
For PNIO communication, we always recommend that you enable the iPCF mode.
Stable PNIO communication is only possible when it is guaranteed that a WLAN client is in a
cell with more than 60% signal strength at all times. This can be checked by activating and
deactivating the various segments.
This does not mean that the client needs to change when there is a signal strength less than
60%. It is only necessary to make sure that a segment with adequate signal strength would
be available.

What restrictions result from using iPCF?
The iPCF mechanism is a development of Siemens AG and functions only with nodes on
which iPCF is implemented. With an access point with two WLAN interfaces, it is, however,
possible to set both iPCF and standard WLAN at the same time. iPCF was optimized for the
use of RCoax cable at the access point and achieves optimum performance only with this
configuration.
Configuration
Select the "iPCF Enabled" check box to enable the iPCF mode.
With the SCALANCE W78x-xRR models, you can also set optimized support of PNIO if you
select the "PNIO support enabled" check box. In this case, you must also set the "PNIO
update time". The PNIO update time must match the configured PNIO update time.
AES-CCM encryption
You can only use the AES-CCM encryption method in iPCF mode. Make sure that a 128-bit
WEP key is defined in the "Security > Keys" menu. When you have selected the "Strong
AES-CCM encryption" check box, the display in the "Security > Keys" menu changes to "128
bit AES" and the device uses AES-CCM.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
160 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Optimization for omnidirectional antennas in conjunction with iPCF
Up to the SCALANCE W firmware version V3.0, the use of the iPCF function is optimized for
applications in which the RCoax cable is used as the antenna or directional antennas are
used. In such applications, the client can always establish an optimum wireless connection
to an access point.
As of firmware V3.1, the "Antenna Pattern" function has been introduced that optimizes its
use for cells with omnidirectional antennas. Due to the grater mobility of the clients in the
illuminated space and the greater overlapping of cells, large fluctuations is signal strength
are possible in this application. This makes it very difficult for the client to find an time to
roam and to connect to the "correct" access point. On the one hand, the need to change
must be detected as early as possible, while on the other, stable communication should not
be delayed by roaming to often. This situation is now alleviated by an additional setting for
omnidirectional antennas.
You should, however, bear in mind that the illumination of the RF field by RCoax or
directional antennas is always more stable than by omnidirectional antennas. With "free
space" wireless applications, the PROFINET IO cycle times must be adapted to the
generally poorer wireless conditions.
Antenna Pattern text box
With the "Antenna Pattern" function, you can select one of the settings "Leaky/Directional
Antenna" and "Omni-Antenna". The function is activated over the Web interface of the
access point and affects the scan behavior of the logged-on clients. When the function is
enabled, the data rates provided by the access point are also adapted to the application. We
strongly recommend that you retain this default setting for the data rates.
PNIO update times
When setting the update time, make sure that you note the following situations otherwise
there is a risk that you will not be able to establish stable communication:
Case a: Your system operates in a single cell; in other words the clients (IWLAN/PB links,
SCALANCE W74x) do not need to support roaming to another cell.
In this case, update times >= 8 ms are supported.
Case b: Your system operates with two cells on two different channels.
In this case, update times >= 16 ms are supported.
Case c: Your system operates with several cells and with more than 2 channels and the
clients roam between cells.
In this case, the PNIO update time should be set higher than 16 ms.

Note
Roaming time for "free space" applications with omnidirectional antennas
Adapting the scan behavior to free space conditions, significantly increases the time required
for roaming and has a detrimental effect on the PROFINET IO cycle time. The increase in
roaming time is proportional to the number of channels to be scanned.
If you are using two cells that are operated with the Omni "Antenna-Pattern" setting, and
when all clients have entered these two channels as "bkchannel", PNIO update times of 64
ms can be achieved.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 161

Note
We strongly advise that you check the local wireless characteristics prior to commissioning.

5.7.8.4 Forced Roaming on IP Down menu command (in access point mode only)

Note
Forced roaming on IP Down cannot be used in conjunction with iPCF or WDS on the same
WLAN interface.


Configuration
After selecting the "Forced Roaming on IP Down" check box, you can configure the following
parameters:
Destination IP address
The IP address of the device for which a connection will be monitored.
Interval (100 - 5000 ms)
Cycle time in milliseconds after which the IP connection will be checked.
Maximum lost packets (1 - 5)
Maximum number of consecutive lost packets after which the WLAN interface is
deactivated.
5.7.8.5 Link Check menu command (in access point mode only)

Note
This function is not available in iPCF mode.



Note
With the Link Check function, you can only monitor connections to WLAN clients; use along
with redundancy or WDS is not possible.

Table of monitored devices
In the drop-down list box of the "Link Check" title line, you decide whether connection
monitoring is enabled or disabled. Only connections to devices for which the check box in
the "Sel" column is selected will be monitored.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
162 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
You can delete entries in the table by selecting the relevant check box in the "Del" column
and clicking the "Set Values" button. You can create new list entries after clicking the "New"
button. You can then enter the MAC address and the monitoring time.
System event for connection abort
You can specify how the SCALANCE W78x reacts to a connection abort (or to the
reestablishment of a connection) in the System > Events menu.

5.7.8.6 Redundancy menu command (in access point mode only)

Note
The redundancy function described here is available only for SCALANCE W78x devices that
have more than one wireless adapter and that are not operated in iPCF mode.
You can use the WEP encryption method.

Configuration with sysName
Instead of the MAC addresses, you can also configure the redundant partners with the
"sysName" parameter. Beacons contain this parameter which is why the redundant device is
detected using beacons.

Note
With the firmware update to to V3.0, the SCALANCE W78x-xRR devices need to be
reconfigured if you use WDS or redundancy and use the MAC address and not the
sysName.
These functions are then based on the MAC address that changes with the introduction of
VAPs with V3.0.

Note
If IEEE 802.1x or WPA is used, a "private key" must be selected for the redundant
connection.


5.7.8.7 IP Alive menu command (in access point mode only)
Table of monitored devices
In the "IP Alive" drop-down list box, you decide whether connection monitoring is enabled or
disabled. Only connections to IP addresses for which the check box in the "Sel" column is
selected will be monitored.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 163
You can delete entries in the table by selecting the relevant check box in the "Del" column
and clicking the "Set Values" button. You can create new list entries after clicking the "New"
button. You can then enter the MAC address and the monitoring time.
Monitoring independent of the port
With IP-Alive, you specify a monitoring time for an IP address and a port. If you do not want
to monitor a particular port but rather only the data traffic from a particular IP address, simply
enter 0 in Port. This resets the monitoring with each frame from this IP address.
System event for connection abort
You can specify how the SCALANCE W78x reacts to change in the IP-Alive status in the
System > Events menu.

Note
The IP-Alive function is not available in iPCF mode.

Note
If the IP Alive function does not detect any data traffic for the specified time, the status of the
IP address is set to "Offline" and the error status activated. The error status must be
confirmed before the IP Alive function sets the status for active data traffic back to "Online".

5.7.8.8 AeroScout menu
Information on AeroScout
This page shows a table with information on forwarding AeroScout frames:
Tag Information forwarding
In the management program that evaluates the AeroScout frames, you can specify whether
or not a SCALANCE W-700 will forward frames. Here, you can see which setting was made
in the management program.
AeroScout module
For each WLAN interface of the SCALANCE W-700, you can specify how the AeroScout
frames are handled. If you have enabled forwarding, "Enabled" is displayed here, otherwise
"Disabled".
Engine port
The SCALANCE W-700 expects UDP packets from the management program at port 1144.
Response port
The SCALANCE W-700 forwards received AeroScout frames to the port specified here.
Response IP
The IP address of the computer on which the management program for evaluation of the
AeroScout frames is running.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
164 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Multicast address
The tag sends frames as multicast. This multicast address is configured in the management
program and displayed here.
Acknowledgements sent
The number of acknowledgments sent by the SCALANCE W-700 reflects the number of
received UDP frames.
Messages dropped
The number of frames not forwarded. If, for example, an AeroScout tag is configured so that
it sends on channel 1, the SCALANCE W-700 does not forward a frame received on channel
6.
Whether or not the SCALANCE W-700 forwards AeroScout frames can be set separately for
each WLAN channel.
AeroScout tags enabled
The SCALANCE W-700 forwards AeroScout frames when the check box is selected.

Note
The AeroScout function is not available in iPCF mode.

5.7.9 The Information menu
5.7.9.1 Information menu command
System events and information on the protocols
The pages of this menu display tables contain information on system events and on the
behavior of the protocols (IP, TCP, UDP, and ICMP, SNMP).
Updating the display
Most pages have the "Refresh" button at the bottom edge with which you can update the
display. The "Client List" menu command also allows you to update automatically. To
activate this, select the "Update" check box.
5.7.9.2 Log Table menu command
Logging system events
This page lists system events and the time at which they occurred. You can specify which
events are included here in the System > Events menu.
If you position the mouse pointer over a time value, the system time and date are displayed.

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 165
5.7.9.3 Auth Log menu command
Logging authentication
The pages of this menu contain a table with information on successful or failed
authentication attempts.

5.7.9.4 Versions menu command
Current versions and order numbers
1. Hardware version
2. Order number (MLFB)
3. Boot software version
4. Firmware version
5. Ethernet MAC address
6. Type of network attachment (RJ-45 electric/ST optical)
7. Antenna mounting (internal/external)

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
166 Operating Instructions, Release 07/2008, C79000-G8976-C184-09


5.7.9.5 Client List menu command

Note
This menu command is available only in access point mode.

Logged-on clients
All the clients logged on at the SCALANCE W78x along with certain additional information
(wireless channel, status etc.) are displayed here.
MAC Address
the MAC address of the client.
If#
This specifies the wireless interface over which the client is connected.
Signal
The signal strength of the client. The higher the value, the better the signal. The user can
choose between percentage and dBm.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 167
Age
Displays the time that has elapsed since the last client activity was detected.
Sec
This indicates which encryption is active.
Channel.
The current channel over which the client communicates with the SCALANCE W78x.
State
The current state of the clients. Associated means that the client is logged on.




By selecting the "Update" check box, the list is updated automatically every 3 seconds. If you
click on the MAC address of a client, you will receive additional information on this client.

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
168 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.7.9.6 Available WLAN menu command

Note
The "Available WLAN" menu command is only available for clients and access points in
client mode.

Available access points
This displays all access points to which the device can establish a wireless connection.

Note
If the iPCF mode is enabled on a SCALANCE W747-1RR or the IWLAN/PB-Link, the display
is different. Since the client does not run a background scan in this case, the only APs
displayed are those to which the client had already established a connection.


Following the background scan (iPCF mode disabled), the APs with which the client could
connect are displayed. If, for example, the security settings do not match up, the AP would
not be shown in the list.
MAC Address
The MAC address of the access point.
Signal
The signal strength of the access point. The higher the value, the better the signal.
Age
Displays the time that has elapsed since the last client activity was detected.
Sec
This indicates which encryption is active.
Channel
The current channel over which the access point communicates with the device.
State
The current state of the access point. AP connected means that a connection exists to
this access point.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 169


By selecting the "Update" check box, the list is updated automatically every 2 seconds. If you
click on the MAC address of an access point, you will receive additional information on this
access point.

5.7.9.7 Ethernet menu command
Information on the Ethernet interfaces
This menu command provides information on the current settings of the Ethernet interface.
The current operating data is also displayed here.

Note
There are no CLI commands for this menu command.


Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
170 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.7.9.8 WLAN menu command
Information on the WLAN interface
This menu command provides information on the current settings of the WLAN interface.
The current operating data is also displayed here. There is a separate menu for each
wireless interface when the model has more than one wireless interface.
Traffic
Statistics of the data to be transmitted are displayed here.



Association / Authentication Frames
The frames relevant for registration are counted. A distinction is made between the
registration frames Association and Authentication and the deregistration frames
Disassociation and Deauthentication.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 171
Signal strength
The signal strength is displayed as an average of the last received frames or at the
sending end of the last received acknowledge frames.
Frame count
Counter for all successfully received or sent frames.
Management frames
Counts all received or sent management frames.
RTS frames
Is incremented when a CTS frame is received in response to an RTS frame.
Rate
Displays an average data rate of the most recently received or sent data frames.
Data frame count
Counts all received or sent data packets.
Data bytes count
Displays the sum of all received or sent bytes in a data frame.
Unicast
Sum of all received or sent data unicasts.
Multicast
Sum of all received or sent data multicasts.
Broadcast
Sum of all received or sent data broadcasts.
Errors
This page displays statistics of the transmission errors that have occurred. A high error rate
indicates a bad connection.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
172 Operating Instructions, Release 07/2008, C79000-G8976-C184-09



Receive Errors
ACL discarded frames
Displays all client registration attempts that were blocked by the Access Control List.
Fragmentation errors
Sum of all failed fragmentations. One of the fragments was not received or received too
late.
Encryption errors
Is incremented if a frame is received in which the WEP bit is set and the device operates
without encryption, or the reverse situation when a packet is received without a WEP bit
and encryption is enabled.
Duplicate frames
Sum of all frames received twice.
FCS errors
Sum of all packets received in which the checksum was incorrect.
Header CRC error
Sum of all packets received in which the header checksum was incorrect.
Decrypt CRC error
Sum of all packets received in which the checksum of the encrypted data buffer was
incorrect.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 173
Transmit Errors
Transmission errors
Is incremented when a frame cannot be sent successfully despite hardware retries.
Dropped frames
Number of packages that were dropped either when the packet was not sent despite all
retries or packets that had not been sent when a node deregistered.
Acknowledged errors
Sum of all packets sent that were not confirmed by an acknowledge.
RTS errors
Sum of all sent RTS frames that were not acknowledged by a CTS.
Retry count
Sum of all frames sent successfully that required one or more retries.
One retry count
Sum of all frames sent successfully that required exactly one retry.
Multiple retry count
Sum of all frames sent successfully that required more than one retry.



Note
The percentages shown following the errors relate to the total number of received / sent
frames.

Overlap AP
Note
This menu command is available only in access point mode.

For optimum data throughput, it is important that the set wireless channel is not used by
other access points. In the 2.4 GHz band (802.11b or 802.11g), there is overlapping of the
wireless channels so that an access point occupies not only the set channel but also the two
or three adjacent channels. You should therefore make sure that there is adequate channel
spacing to neighboring access points.
The "Overlap AP" page shows all access points that are visible on the set or adjacent
channels (at 2.4 GHz). If entries exist here, the maximum data throughput of the access
point will be restricted.
Type
Shows the type of connection. The types AP (infrastructure mode) and AdHoc exist.
MAC address
The MAC address of the wireless devices.
Channel
The channel on which the found wireless device transmits.
Signal
Shows the signal strength with which the other wireless devices are received at the AP.
The stronger the signal, the greater the probability that they interfere with each other.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
174 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
There is also the possibility that they interfere with each other even at low signal
strengths.
Age
Shows when the last activity was detected by the wireless device.
SSID
Shows the SSID of the other wireless device.

5.7.9.9 iQoS menu command
Information on bandwidth reservation
The pages of this menu provide information on iQoS. The clients are grouped as follows:
Critical Compliant (CC)
This involves clients that were defined as critical and that are currently meeting the
requirements you set for the bandwidth and response time.
Critical Non-Compliant (CNC)
The CNC clients are also clients with strict requirements regarding the response time and
bandwidth. In contrast to the CC clients, however, these clients are not currently meeting
these requirements.
Non-Critical Satisfied (NCS)
These clients do not have fixed requirements regarding the response time and minimum
bandwidth. Their communication is not currently restricted by iQoS.
Non-Critical Regulated (NCR)
These clients are also non-critical clients whose communication is, however, currently
being restricted by iQoS in favor of critical clients.
Non-Critical Non-Responsive (NCNR)
Some clients that require no acknowledgment whatsoever for their communication (for
example UDP traffic) cannot be regulated by iQoS. These are classified as NCNR.

5.7.9.10 Spanning Tree menu command
Status of the Spanning Tree protocol
The upper part of the page shows the "RootID" and the "BridgeID". Both IDs are made up of
their priority and their MAC address. Together, this results in the 16 character long ID. The
RootID is the ID of the bridge that is currently the root bridge. The BridgeID shows the ID of
the local device.
Below this, you can see values for the Topology Change event. The first value is a counter
indicating how often the tree structure has changed since restarting. The value beside this,
shows the time since the last switchover event.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 175


Below this, you will see the following port-related information:
Port Name
Plain language name of the port, for example Ethernet or WLAN1 WDS1.
Enabled
Indicates whether the (R)STP is enabled for this port. If the port is not enabled, no further
frames are forwarded over this port.
Cost
Indicates the path costs for the port.
Priority
Indicates the current priority of the port.
Edge
Shows whether or not the port is an edge port.
P.t.P.
Shows whether or not the AP is connected directly to another (R)STP device
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
176 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Port State
With STP, a port can adopt three states:
Discarding
No frames are forwarded from or to this port. The port has been disable by the user or
the protocol (for example, when a redundant path has been detected).
Learning
The port receives packets in the same way as in listening mode, but does not forward
them. The MAC addresses are also entered in the "Learning Bridge".
Forwarding
The port is fully enabled. Frames can be received and sent.
Disabled
The port is not currently in use.
State
Here, the state of the port in relation to the root bridge is displayed. The "ROOT" state
means that the port is connected directly with the root bridge. "DESIGNATED" identifies
all ports that are not directly at the root but that are enabled. Ports that are blocked are in
the "BLOCKED" state.

5.7.9.11 IP, TCP/IP, ICMP, SNMP menu command
Information on protocols
The pages of this menu show information on the IP, TCP, UDP, ICMP, and SNMP protocols
in the form of tables.

Note
There are no CLI commands for this menu command.


5.7.9.12 Signal Recorder menu command

Note
The signal recorder is available only for clients and access points in client mode and the
IWLAN/PB-Link PN IO.

Signal strength indicators
The Signal Recorder can record or display the signal strength of the connected access point.
Using this data, you can locate areas with an inadequate signal strength. The Signal
Recorder can be particularly advantageous when the client moves along a fixed path (for
example suspension track).
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 177
Procedure for SCALANCE W-700 clients:
Using the URL
http://<IP address>/Signal.txt
or the URL
http://<IP address>/Signal.log
you can download the generated signal file. If you are not yet logged in, this opens the
login window in which you must log in.
Procedure for IWLAN/PB LINK PNIO:
1. Enable the FTP server
2. Enter ftp <ip address> in a DOS box.
3. Log in as admin (default password admin)
4. Enter the command get signal.txt.
The signal.txt file is then stored in the directory from which the ftp command (point 2)
originated.
Displaying the instantaneous value
The upper half of the window contains an instrument for displaying the graphic
representation of the currently calculated dBm value in real time. Depending on your browser
and the network load, the display is updated approximately every 500 ms. Apart from the
graphic display, the current dBm value is also displayed in plain language. The MAC address
of the AP with which the ECM is currently connected along with the frequency, channel and
transmission rate are also displayed and updated. You can start or stop the graphic display
with the "Start display" and "Stop display" buttons.

Note
Working with the graphic display can cause a not insignificant network load that can disturb
time- and throughput-critical processes (PNIO).


Recording a series of measurements
The lower half of the window includes not only the operator controls for graphic display of the
instantaneous value but also the controls for the actual signal recorder. You can set the
interval between the acquisition of two measuring points as well as the total number of
measuring points. The recorder is controlled by the "Start recording" and "Stop recording"
buttons.
As soon as measuring points have been recorded successfully and the recorder has been
stopped, the "Save recorder file" and "Display recorder file" buttons are enabled. With the
"Save" button, the measured values can be loaded directly from the ECM as a file in CSV
format and imported into a suitable evaluation program.
The CSV file contains the MAC address of the AP for every measuring point, the current
number of the measurement, the raw value of the RSSI, the dBm value and its
corresponding percentage value, a roaming indicator, the channel and the transmission rate.
The "Display record file" button opens a pop-up window in which the measured values over
time is already available in graphic form. The dBm values are shown over time. If the ECM
roams during the measurement, blue bars indicate the event. If you move the mouse pointer
over such a bar or over the flag at the top of the bar, a tooltip with the MAC addresses of the
two access points appears.
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
178 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
With the "Print graph" button, it is easy to print the table. You will, however, need to make
certain settings in the browser.
Mozilla Firefox 1.5:
In the "File" => "Page setup..." dialog, make sure that the "Print Background (colors &
images) check box is enabled in the "Options" group box.
Microsoft Internet Explorer 6.0:
In "Tools" => "Internet Options" => "Advanced", the "Print background colors and images"
check box must be enabled under "Printing".
The signal recorder itself does not cause any significant load in the network that could affect
other processes.
Both parts of the signal recorder can be operated independently.
Below, you will find a few tips that will help you to obtain useful measurements with the
signal recorder:
Use a fixed data rate in the configuration.
Where possible, the ipcf mode with as low an update time as possible should be set for
the measurements.
Make sure that there is enough data communication during the measurement because
the statistics functions evaluate incoming frames.
The measurement setup should be run through 2-3 times with the same parameters to
find out whether losses of signal strength always occur at the same position.
Selective measurements at a fixed position should be made over a certain time.

Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 179
Legend Roaming indicator
Tooltip
Bandwidth/data rate Signal level
Noise floor

Figure 5-6 Screen display of the measured values
Roaming indicator
This value appears when the client connects to another or to no AP and the MAC address of
the AP changes as a result.
Bandwidth/data rate
The bandwidth/data rate is not displayed over the entire screen since it could overlap the
signal level.
Noise floor
The noise floor represents the lower end of the technically possible transmission of the
device. This means that when the noise floor is exceeded (the useful signal is louder than
the noise floor), this is where the system dynamics begins. For this reason, this level is
visible only when the client has no connection to an AP (indicated in the figure above by the
MAC address 00-00-00-00-00-00).
Legend
BW bandwidth in Mbps
RSS received signal strength in dBm
Configuration / project engineering
5.7 Configuration with Web Based Management
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
180 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

Figure 5-7 Comparison of the measured value display as a percentage and in dBm

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 181
5.8 Configuration with the Command Line Interface
5.8.1 General information on the Command Line Interface
Introduction
With the Command Line Interface (CLI), you can configure all the settings of a
SCALANCE W-700 and an IWLAN/PB Link. The CLI therefore provides the same options as
Web Based Management. You should read the detailed explanations of the parameters in
the section "Configuration with Web Based Management".
The CLI also allows remote configuration over Telnet.

Note
You should only use the command line interface if you are an experienced user. Even
commands that bring about fundamental changes to the configuration are normally executed
without a prompt for confirmation.

Configuring an IWLAN/PB Link with the CLI
The IWLAN/PB LINK only uses configuration over CLI. The "Comment" column in the
following table shows which command is available for which device.
Starting the CLI in a Windows console
Follow the steps outlined below to start the Command Line Interface in a Windows console:
1. Open a Windows console and type in the command "telnet" followed by the IP address of
the SCALANCE W7xx:
C:\>telnet <IP address>
2. Enter your login and password.
As an alternative, you can also enter the command "telnet" followed by the IP address of
the SCALANCE W-700 in the Start > Run menu.
Starting the CLI in Web Based Management
You can also call the CLI from Web Based Management. Click on the Console entry in the
upper menu bar of Web Based Management. A console opens in which you can log on with
your login and password. The IP address is adopted by Web Based Management.

Note
This function is not available in the Internet Explorer as of version 7.

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
182 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Shortcuts for commands
As an alternative, instead of entering full CLI commands, you can simply enter the first letter
or the first few letters of the command and then press the Tab key. The Command Line
Interface then displays a command starting with the letter or letters you typed in. If the
command displayed is not the command you require, press the Tab key again to display the
next command.
Directory structure
Before you can enter a command in the Command Line Interface, you must first open the
required menu or submenu. The following tables contain the commands of a menu and a
description of them. The menu containing the commands is shown before the table. The
table lists only the commands themselves.
Symbols for representing CLI commands
CLI commands generally have one or more parameters that are represented in the syntax
description as follows:
Mandatory parameters are shown in pointed brackets.
Example: <IP address>
Optional parameters are shown in square brackets.
Example: [E|D]
If you omit an optional parameter, the commands output the currently set value.
Alternative input values are separated by the pipe character. In this case, you specify one
of the listed values as the parameter.
Example: [E|D]
you enter either "E" or "D".
If a numeric value is required as a mandatory parameter, you can also specify a range of
values:
Example: <0 ... 255>
You enter a value between 0 and 255.
Cross-menu commands
You can use the commands in the following table in any menu.
CLI\ ... >

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x W78x
RR
/
Moves you one menu level higher.
?
Displays the commands and submenus
available in the menu.

Cannot be called using the command shortcuts.
exit
Closes the CLI/Telnet session.

restart
Restarts the SCALANCE W7xx Cannot be called using the command shortcuts.
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 183
Comment

info
Displays information on the current
menu item.


5.8.2 The CLI\SYSTEM menu
5.8.2.1 CLI\SYSTEM menu command
Mode and locale setting
With the commands in this menu, you set the locale and mode (access point or client).
CLI\SYSTEM>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR


E
Access Point
D Client
apmode [E|D|H]
H HiPath Access Point
(only available for
SCALANCE W788-2RR)

This command is not available in the version for USA.
country [xx|?]
Specifies properties for specific
countries. The country codes
("xx") correspond to ISO 3166.
You can see which countries you
can set after entering the "country
?" command. A list of countries
appears with the corresponding 2-
digit code.

Maximum of 255 characters. If you want to use the
name in WDS or redundancy, the maximum length is
32 characters.
name [system name]
Assigns a value to the sysName
MIB variable.

Maximum of 255 characters.
location [location]
Assigns a value to the sysLocation
MIB variable.

Maximum of 255 characters.
contact [name]
Assigns a value to the sysContact
MIB variable.

ping [-c n | -s]
For connection test to partner. Telnet only
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
184 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Comment
<IP|Name>
-c (counter) for the number n of
ICMPs
-s stops the connection test for all
devices

Maximum of 31 characters.
password [admin|user]
[password]
Specifies a password for access
to the device.


5.8.2.2 CLI\SYSTEM\IM menu command
Information on the device
With the commands in this menu, you can specify information on the function and the
location of the device.
CLI\SYSTEM\IM>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
functag [function
information]
Sets the information on the
function of the device

loctag [location
information]
Sets the information on the
location of the device


5.8.2.3 CLI\SYSTEM\IP menu command
IP address assignment
With the commands in this menu, you specify how the device obtains its IP address.
CLI\SYSTEM\IP>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
dhcp [E|D]
Enable / disable DHCP server.
Specifies how a device will be
identified:
M MAC address
dhcptype [M|N|C]
N Device name

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 185
Comment
C Client ID
clientid
Specifies a client-ID for the
device.

When you enter a valid IP address, enabled DHCP is
automatically disabled.
ip [IP address]
Specifies the IP address for the
SCALANCE W7xx.

subnet [subnet mask]
Specifies the subnet mask.
gateway [IP address]
Specifies the IP address of the
router.

Default value: 64
ttl [TTL value]
Sets the TTL (Time To Live)
parameter.


5.8.2.4 CLI\SYSTEM\SERVICES menu command
Configuration options
With the commands in this menu, you select the services (SNMP, Web Based Management
etc.) with which access to the device will be possible.
CLI\SYSTEM\SERVICES>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Only WEB and SNMP
telnet [E|D]
Enable / disable configuration of the
device over Telnet.

ttimeout
[E|D|timeout in s]
Enables / disables the time
restriction for a Telnet session or
sets the time.

ssh [E|D]
Enables / disables configuration of
the device over secure Telnet.

snmp [E|D]
Enable / disable SNMP.
mail [E|D]
Enable / disable E-mail.
web [E|D]
Enable / disable configuration of the
device over Web Based
Management.

httpsonly [E|D]
Enable / disable access for
configuring only over HTTPS.

ping [E|D]
Enable / disable response of the
device to Ping.

Configuration of the Link Layer
Discovery Protocol:
lldp [T|R|E|D]
T The device sends LLDP
information.

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
186 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Comment
R The device receives LLDP
information.
E The device sends and
receives LLDP information.
D LLDP information is neither
sent nor received.
psu [E|D|RO]
Enable / disable access to the
device with the Primary Setup Tool
or allow read only access.

ftpserv [E|D]
Enable / disable the FTP server on
the device. Required for
downloading the Signal.TXT file
generated by the Signal Recorder.


5.8.2.5 CLI\SYSTEM\RESTARTS menu command
Default settings and restart
With the commands in this menu, you can restore the factory settings of the device and
restart the device.
CLI\SYSTEM\RESTARTS>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
This command can be called from all menus, however
not using the shortcut commands.
restart
Restart the device.

After restoring the factory settings, restart manually.
memreset
Resets the factory settings and
triggers a restart (the protected
settings are not deleted).

defaults
Resets to the factory settings (the
protected settings are also
deleted).


5.8.2.6 CLI\SYSTEM\EVENT menu command
Syntax of the Command Line Interface
For each of the four possible reactions E-mail, trap, log and fault, either "E" (Enabled =
setting is enabled) or "D" (Disabled = setting is disabled) must be entered as the parameter.
If, for example, an E-mail is sent when the device restarts (first parameter "CW") and an
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 187
entry is made in the log table but neither a trap nor an error is generated, the following
command must be entered:
setec CW E D E D (for SCALANCE W-700)
setec CW D E D (for IWLAN/PB LINK)

Note
The IWLAN/PB LINK does not support E-mail. As a result, the second parameter for
enabling/disabling the E-mail option is omitted.

CLI\SYSTEM\EVENT>
Commands available only for access points and client modules (not for IWLAN/PB LINK):

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x W78x
RR
setec CW <E|D> <E|D>
<E|D> <E|D>
Reactions when the
SCALANCE W-700 restarts.

If the error status was triggered only due to a link down
event, the error states is cleared and the error LED goes
off.
setec LU <E|D> <E|D>
<E|D>
Reaction to the "Link Up"
event on the Ethernet
interface.

setec LD <E|D> <E|D>
<E|D>
Reaction to the "Link Down"
event on the Ethernet
interface.

The SNMP trap "AuthFault" is sent only if there is a bad
SNMP authentication.
setec AF <E|D> <E|D>
<E|D>
Reaction to a bad
authentication over Web
Based Management, CLI, or
SNMP.

setec PM <E|D> <E|D>
<E|D> <E|D>
Reaction to a change of
power supply over the M12
power connection.

setec PE <E|D> <E|D>
<E|D> <E|D>
Reaction to a change of
power supply over Ethernet.

setec FC <E|D> <E|D>
<E|D>
Reaction to a change in the
error status.


Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
188 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Commands available only for access points (not for access points in client mode, clients, IWLAN/PB
LINK):

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x W78x
RR
setec AP <E|D> <E|D>
<E|D> <E|D>
Reaction to detection of an
access point on own or an
overlapping wireless channel.

This command is available only with the following
models:
SCALANCE W788-1RR
SCALANCE W788-2RR
SCALANCE W784-1RR
setec MS <E|D> <E|D>
<E|D> <E|D>
Reaction when the update time
in iPCF mode with PNIO support
cannot be kept to due to an
additional client.

This command is available only with the following
models:
SCALANCE W788-1RR
SCALANCE W788-2RR
SCALANCE W784-1RR
setec CT <E|D> <E|D>
<E|D> <E|D>
Reaction when the specified
update time in iPCF mode with
PNIO support cannot be kept to.

If the connection status changes, an event is triggered.
If the connection no longer exists, the error state is
triggered and the error LED is lit.
setec IS <E|D> <E|D>
<E|D> <E|D>
Reaction to a change in the
connection status on a client for
which the IP-alive monitoring is
activated.

setec LI <E|D> <E|D>
<E|D> <E|D>
Reaction when establishing a
connection monitored with the
Link Check function.

setec IQ <E|D> <E|D>
<E|D> <E|D>
Reaction to a change in the
iQoS status.

setec RD <E|D> <E|D>
<E|D> <E|D>
Reaction to a change in the
redundancy event status.

setec CA <E|D> <E|D>
<E|D>
Reaction when a client logs on.
setec CD <E|D> <E|D>
<E|D>
Reaction when a client logs off.
setec FR <E|D> <E|D>
<E|D>
Reaction to the forced roaming
on IP down function.

setec ST <E|D> <E|D>
<E|D>
Reaction to a topology change
by (rapid) spanning tree.

setec WD <E|D> <E|D>
<E|D>
Reaction to the connection
status of WDS.

setec CP <E|D> <E|D>
<E|D>
Reaction when the cycle time in
iPCF mode with PNIO support
could not be kept to.


Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 189
Commands available only for the IWLAN/PB LINK (not for access points and clients):

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
setec CW <E|D> <E|D>
<E|D>
Reactions to a IWLAN/PB
LINK restart

setec P1 <E|D> <E|D>
<E|D>
Reaction to a change of power
supply over power connection
1.

setec P2 <E|D> <E|D>
<E|D>
Reaction to a change of power
supply over power connection
2.

setec FC <E|D> <E|D>
Reaction to a change in the
error status.


5.8.2.7 CLI\SYSTEM\EMAIL menu command
Sender and recipient of an E-mail
With the commands in this menu, you specify that the device sends an E-mail when certain
events occur. You can also set a sender address.
CLI\SYSTEM\EMAIL

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
mail [E|D]
Enable / disable the E-mail
service.

Several E-mail addresses can be entered separated by
semicolons.
email [E-mail address]
Specifies the address(es) to
which the SCALANCE W-700
sends E-mails.

smtp <IP address>
[:port number]
Specifies the IP address and
the port number of the SMTP
server.

from [text for sender
field]
Specifies the sender of E-
mails from SCALANCE W-
700.


Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
190 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.8.2.8 CLI\SYSTEM\SNMP menu command
Enabling SNMP
With the commands in this menu, you configure general SNMP parameters (enabling SNMP,
traps and community strings)
CLI\SYSTEM\SNMP>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Enables / disables SNMPv1, v2c, v3 and traps.
snmp [E|D]
Enables / disables SNMP.

Enables / disables SNMPv1, v2c and traps.
snmpv1 [E|D]
Enables / disables
SNMPv1/v2c.

The special features of SNMPv3 undertake effect after
you disable SNMPv1. Enabling SNMPv3 does not
automatically disable SNMPv1.
snmpv3 [E|D]
Enables / disables SNMPv3.

snmpro [E|D]
Enables / disables
SNMPv1/v2c read only.

The default is "public".
getcomm [read
community string]
Specifies the read community
string, maximum length 63
characters

The default is "private".
setcomm [write
community string]
Specifies the write community
string, maximum length 63
characters.

The default is "public".
trapcomm [trap
community string]
Specifies the trap community
string, maximum length 63
characters.

Traps are then enabled, if SNMP v1, v2c is also enabled.
traps [E|D]
Enables / disables SNMPv1
traps


5.8.2.9 CLI\SYSTEM\SNMP\GROUP menu command
Managing SNMP groups
With the commands in this menu, you manage SNMP groups (creating, deleting etc.).
CLI\SYSTEM\SNMP\GROUP>

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 191
Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Write access without read access is not possible. Adds an SNMPv3 group with the
following security settings
NOAUTH No authentication,
no encryption
AUTH Authentication with
MD5 or SHA
algorithm, no
encryption
PRIV Authentication with
MD5 or SHA
algorithm and
encryption with the
DES3 algorithm
Write and read access can also be
set for the group:
R Read access
add <Name>
[NOAUTH|AUTH|PRIV]
[R|W]
W Write access

You cannot edit the authentication and encryption
settings unless the group is empty.
Preventing read access also prevents write access.
Permitting write access also permits read access.
Changes the security level of the
group and sets the access rights.
You can display the index of the
group with the "info command.
RE Enables read access
RD Disables read access
WE Enables write access
edit <Index>
[NOAUTH|AUTH|PRIV]
[RE|RD|WE|WD]
WD Disables write access

Is only possible to delete a group if it is empty.
delete <Index>
Deletes the SNMPv3 group from the
group list at the index position.

clearall
Clears all SNMP groups that are
empty.


5.8.2.10 CLI\SYSTEM\SNMP\USER menu command
Managing SNMP users
With the commands in this menu, you manage SNMP users (creating, deleting etc.).
CLI\SYSTEM\SNMP\USER>

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
192 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
The authentication password and the encryption
password can be a maximum of 63 characters long.
add <user name> <group
name> [NONE|MD5|SHA]
[authentication pw]
[encryption pw]
Assigns an SNMPv3 user
to a group.
If authentication is
necessary for the group,
the algorithm must be
specified as a parameter
(MD5 or SHA).
If encryption is necessary
for the group, the
encryption password must
be specified as a
parameter.

edit <index> <group name>
[NONE|MD5|SHA]
[authentication pw]
[encryption pw]
Changes the group
assignment, the
authentication algorithm,
and the encryption
password of the SNMPv3
user.

delete <Index>
Deletes an SNMPv3 user
from the list at the point
identified by the index.

clearall
Deletes all SNMPv3 users.

5.8.2.11 CLI\SYSTEM\SNMP\TRAP menu command
Enabling SNMP traps, specifying trap recipients
With the commands of this menu, you configure SNMP traps.
CLI\SYSTEM\SNMP\TRAP>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Traps are then enabled, if SNMP v1, v2c is also enabled.
traps [E|D]
Enables / disables SNMP
traps.

settrap <entry>
<IP address>
<E|D>
Specifies the IP address of the
trap recipient "entry" ("entry"
between 1 and 10) and
enables / disables the sending
of traps to this recipient.

clearall
Deletes all entries from the
trap configuration table.


Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 193
5.8.2.12 CLI\SYSTEM\SYSLOG menu command
Time-of-day synchronization in the network
CLI\SYSTEM\SYSLOG>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Can only be changed with Admin rights.
server [IP address]
Specifies the IP address of the
Syslog server.

Can only be changed with Admin rights.
logs [ D | E ]
Specifies whether the log
entries are also sent to the
Syslog server.

Can only be changed with Admin rights.
auths [ D | E ]
Specifies whether the
authentication log entries are
also sent to the Syslog server.


5.8.2.13 CLI\SYSTEM\SNTP menu command
Time-of-day synchronization in the network
With the commands in this menu, you specify the SNTP server and the time zone.
CLI\SYSTEM\SNTP>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
server [IP address]
Specifies the IP address of the
SNTP server.

tzone [hours]
Specifies the deviation of the
time zone of the SCALANCE W-
700 according to UTC (Universal
Time Conversion) in hours.

tzonemin [0|15|30|45]
Minutes specified for the time
zone.


Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
194 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.8.2.14 CLI\SYSTEM\FAULT menu command
Information on errors/faults
With the command in this menu, you display information on errors/faults that have occurred.
CLI\SYSTEM\FAULT>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
You can reset the LED and the fault status with the
command: "fault OFF". Ideally, however, the cause of the
problem should be eliminated.
fault [OFF]
Display the fault status and
cause of the fault. The
"OFF" parameter resets the
fault LED and the fault
status. Ideally, however, the
cause of the problem should
be eliminated.

The fault state remains active until all the fault messages
have been acknowledged. The fault state and the Fault
LED are cleared if the only reason was an IP Alive error
message.
The command cannot be executed in client mode.
ipacknow [Index|All]
Displays or acknowledges
(clears) the IP Alive
messages requiring
acknowledgment.

The fault state remains active until all the fault messages
have been acknowledged. The fault state and the Fault
LED are cleared if the only reason was a Link Check error
message.
The command cannot be executed in client mode.
linkack [Index|All]
Displays or acknowledges
(clears) the Link Check
messages requiring
acknowledgment.


5.8.2.15 CLI\SYSTEM\LOADSAVE menu command
Saving and loading device data
With the commands in this menu, you can save data from the device or load data to the
device (configuration data, firmware, authentication data etc.).
CLI\SYSTEM\LOADSAVE>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
server [IP address]
:[port number]
Specifies the IP address and
the port of the TFTP server.

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 195
Comment
fwname [file name]
Specifies the name of a file
from which the firmware will
be loaded or in which the
firmware will be saved. This
name can be a maximum of
32 characters long.

fwload
Loads the firmware from a file.
fwsave
Saves the firmware in a file.
cfgname [file name]
Specifies the name of a file
from which the configuration
data will be loaded or in which
the configuration data will be
saved.

cfgload
Loads the configuration data
from a file

cfgsave
Saves the configuration data
in a file.

logname [file name]
Specifies the name of a file in
which the log table will be
saved.

logsave
Saves the log table in a file.
Available only for clients or access points in client mode.
cltcert <certificate>
Specifies the name of the
certificate for the client.

Available only for clients or access points in client mode.
cltpass <password>
Authorizes use of the
certificate.

Available only for clients or access points in client mode.
cltload
Downloads the client
certificate from a file.

Available only for clients or access points in client mode.
cltsave
Saves the client certificate in a
file.

Available only for clients or access points in client mode.
srvcert <certificate>
Specifies the name of the
certificate for the server.

Available only for clients or access points in client mode.
srvload
Downloads a server certificate
from a file.

Available only for clients or access points in client mode.
srvsave
Saves the server certificate in
a file.

Available only for clients or access points in client mode.
cltdel
Deletes the client certificate.

Available only for clients or access points in client mode.
srvdel
Deletes the server certificate.

Available only for clients or access points in client mode.
Is visible only if a certificate is loaded on the client.
pkgsave
Saves the Configuration
Package in a file over a TFTP
server.


Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
196 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

Note
The functionality can be controlled over SNMP with the OID
1.3.6.1.4.1.4196.1.1.4.100.1.5.1.19 (snDownloadEcmCfgPackageControl). Working with this
function is analogous to working with the other OIDs in this group.

5.8.2.16 CLI\SYSTEM\PNIO menu command
PNIO functionality for SCALANCE W-700 devices
With the commands of this menu, you configure the PNIO functionality.
CLI\SYSTEM\PNIO>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x W78x
RR
devname <device
name>
Specifies the PNIO device
name.

allowdex [Y|N]
Specified whether or not PNIO
communication can take place.

clear
Clears the PNIO fault state and
sets the device to the INC mode.


5.8.2.17 CLI\SYSTEM\CPLUG menu command
Changing the data on a C-PLUG
With the commands in this menu, you write configuration data to a C-PLUG.
CLI\SYSTEM\CPLUG>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
All information is deleted.
initdef
Reinitializes the C-PLUG and
copies the default
configuration to the C-PLUG.

All information is deleted.
initmem
Reinitializes the C-PLUG and
copies the configuration
currently stored on the device
to the C-PLUG.

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 197
Comment
If the C-PLUG was removed, you specify that the
configuration should be read from internal memory.
If a C-PLUG is inserted, the device always attempts to
read the configuration from the C-PLUG. The "bootfrom
[MEMORY]" command then has no effect.
bootfrom [MEMORY]
Displays the source medium
from which the configuration is
currently being read: C-PLUG
or MEMORY.
The restart is performed
automatically.

cleanplug
Erases the C-PLUG.
Writes the configuration data
to a PRESET PLUG. The
"dev" parameter specifies the
device for which the PRESET
PLUG will be suitable:
1 SCALANCE W788-
1PRO
2 SCALANCE W788-
2PRO
3 SCALANCE W788-
1RR
4 SCALANCE W788-
2RR
5 SCALANCE W744-
1PRO
6 SCALANCE W746-
1PRO
7 SCALANCE W747-
1RR
preplug <dev>
8 IWLAN/PB Link


5.8.3 The CLI\INTERFACES menu
5.8.3.1 CLI\INTERFACES\ETHERNET menu command
Settings for WLAN and Ethernet
With the commands of this menu, you configure the Ethernet interface.
CLI\INTERFACES\ETHERNET>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
ethspeed
Specifies the transmission speed
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
198 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Comment
and mode of the Ethernet
interface:
O Automatic selection by
the device
100F 100 Mbps full duplex
100H 100 Mbps half duplex
10F 10 Mbps full duplex
[A|100F|100H|10F|10H]
10H 10 Mbps half duplex
This command is available only on devices with an RJ-
45 connector.
Specifies whether or not a
crossover cable is used on the
Ethernet interface:
D Standard cable not
crossover
ethcross [E|D]


E
Crossover cable
This command is possible only when the transmission
speed is not set automatically by the device
("etherspeed" command with parameter "A").
This command is available only on devices with an RJ-
45 connector.

5.8.3.2 CLI\INTERFACES\WLAN1 (or \WLAN2 or \WLAN3) menu command
Network name, transmission mode and channel selection
With the commands in this menu, you set the network to which the device belongs and
select the channels.
CLI\INTERFACES\WLAN1> (or \WLAN2 or \WLAN3)

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
port [E|D]
Enable / disable wireless port.
Only available in access point mode.
ssid [network name]
Assigns a network name (SSID).

Selects the transmission
standard:

O 802.11a
B 802.11b
G 802.11g
H 802.11h
C 802.11a Turbo
U 802.11h Turbo
mode [A|B|G|H|T|U|X]
x 802.11g Turbo
Depending on the locale setting, some settings may
not be possible and will then be rejected.
802.11a/g/h Turbo cannot be set in all countries.
autoch [E|D]
Enable / disable the channel Only available in access point mode.
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 199
Comment
selection by the
SCALANCE W78x.

channel [1 ... 167]
Specifies the wireless channel.
Possible only in 802.11h transmission.
altchan [channel]
Enters the channel number of
the alternative DFS channel.

Available only in the client mode.
adopt [MAC address]
MAC address of the device
connected to the client over
Ethernet.

Available only in the client mode.
autoadopt [E|D|OWN]
Automatic adoption of the MAC
address of the device connected
to the client over Ethernet.
The OWN parameter means that
the client registers with the
access point with its own
Ethernet MAC address. With this
setting, however, only IP data
traffic is possible.

Available only in the client mode.
Not with iPCF.
adhoc [E|D]
Select ad hoc or infrastructure
mode.

Available only in the client mode.
Not with iPCF.
anyssid [E|D]
With ANY SSID, the client
connects to the best access
point in the environment in which
it is permitted to connect.

vapno [0 ... 7]
Specifies the number of virtual
access points.

outdoor [E|D]
Enable / disable outdoor AP
mode.

802.11G
Opens the "ADVANCED G"
menu (802.11g).

ADVANCED
Opens the "ADVANCED" menu.
DATARATES
Opens the "DATARATES"
menu.

Displayed only when vapno > 0.
VAP1
Opens the "VAP1" menu.

Displayed only when vapno > 1.
VAP2
Opens the "VAP2" menu.

Displayed only when vapno > 2.
VAP3
Opens the "VAP3" menu.

Displayed only when vapno > 3.
VAP4
Opens the "VAP4" menu.

Displayed only when vapno > 4.
VAP5
Opens the "VAP5" menu.

Displayed only when vapno > 5.
VAP6
Opens the "VAP6" menu.

Displayed only when vapno > 6.
VAP7
Opens the "VAP7" menu.

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
200 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

5.8.3.3 CLI\INTERFACES\WLAN1\ADVANCED (or \WLAN2\ADVANCED or
\WLAN3\ADVANCED) menu command
Configuring transmission characteristics
With the commands in this menu, you specify the parameters for the transmission
characteristics such as the size at which a packet is fragmented or the antenna(s) to be
used.
CLI\INTERFACES\WLAN1\ADVANCED> (or \WLAN2\ADVANCED or \WLAN3\ADVANCED) menu
command

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Specifies by how many dB the
transmit power will be reduced
compared with full power:
0 Full power
1 -3 dB, half
2 -6 dB, quarter
3 -9 dB, eighth
power [0...4]
4 Minimum power, -12
dB

beacon [20 ...
Sets the beacon interval in
milliseconds.

Only available in access point mode.
dtim [1 ... 255
Sets the data beacon rate.

rtsthr [1 ...
Specifies the packet size as of
which RTS/CTS is used.

Not with iPCF
fragthr [256 ...
Specifies the size as of which
packets are fragmented.

Specifies the mode in which the
client scans for further access
points.

D Disabled
I Scan if idle
bkscan [D|I|A]
O Scan always
Available only in the client mode.
Not with iPCF
Available only in the client mode.
Not with iPCF
bkscanint
[200 ... 60000]
Interval at which the client
scans for further access points.

bkchannel [channels]
Selects certain channels on Available only in the client mode.
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 201
Comment
which the client searches for
further access points.
The channels are entered
separated by spaces

Available only in the client mode.
bkchsel [E|D]
Enables / disables scanning for
further access points on specific
channels.

Only available in access point mode.
force [E|D]
Enables / disables roaming if
the connection is lost on
Ethernet interface.

Decides the threshold at which
the client changes to another
AP.
low Changes at a slightly
higher field strength
to the AP with the
stronger signal.
medium Changes at a
moderately higher
field strength to the
AP with the stronger
signal.
roamthr
high Changes only at a
significantly higher
field strength to the
AP with the stronger
signal.

Not with iPCF
swretry [E|D]
Enables / disables the software
retry functionality.

swretno [0 ...
Specifies the number of
software retries.

Not with iPCF
hwretno [0 ...
Specifies the number of
hardware retries.

When this function is enabled, higher data rates
according to IEEE 802.11b are supported (higher
performance).
preamb [E|D]
Enables / disables the short
preamble.

Specifies which antennas are
used:

O Only antenna A
B Only antenna B
SA Antenna A sending,
antenna B receiving.
SB Antenna B sending,
antenna A receiving.
antenna [A|B|SA|SB|D]
D Use the better of the
two antennas (antenna
diversity).
With the IWLAN/PB Link with one antenna socket, the
default (Antenna A) must not be changed.
noise [A|L|M|H]11
Set the noise filter.
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
202 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Comment
O Automatic
L Low
M Medium
H High
A strong noise filter allows a more stable connection
but also a shorter transmission range.
Not with iPCF
wmm [E|D]
Enables / disables frame
transmission taking into account
priority.

antgain [0...30]
Entry of the antenna gain in dBi.
Entry of the antenna type:
0 User defined
1 ANT792-6MN - gain: 6
dBi (2.4 GHz)
2 ANT793-6MN - gain: 5
dBi (5 GHz)
3 ANT795-6MN - gain: 6
dBi (2.4 GHz) 8 dBi (5
GHz)
4 ANT795-6DN - gain: 9
dBi (2.4 GHz) 9 dBi (5
GHz)
5 ANT792-8DN - gain: 14
dBi (2.4 GHz)
6 ANT793-8DN - gain: 18
dBi (5 GHz)
7 ANT792-4DN (RCoax
Antenna) - gain: 4 dBi
(2.4 GHz)
8 ANT793-4MN (RCoax
Antenna) - gain: 6 dBi (5
GHz)
9 RCoax leaky wave cable
- gain: 0 dBi (2.4 GHz) 0
dBi (5 GHz)
10 ANT795-4MR - gain:
3 dBi (2.4 GHz)
5 dBi (5 GHz)
anttype [0...n]
11 ANT795-4MS - gain:
4 dBi (2.4 GHz)
5 dBi (5 GHz)
To display the list, enter "anttype ?".
antcable [0 ... 30]
Entry of the length of the
antenna cable in meters.


Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 203
5.8.3.4 CLI\INTERFACES\WLAN1\SSID (or \WLAN2\SSID or \WLAN3\SSID) menu command
Connection to a network
With the command in this menu, you configure the way in which a client connects to a
network.

Note
The SSID List submenu is only available for clients or access points in client mode.

CLI\INTERFACES\WLAN1\SSID> (or \WLAN2\SSID or \WLAN3\SSID)

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Available only in the client mode.
add <network name>
Adds a network name (SSID)
to the SSID list.

Available only in the client mode.
edit <index> <network
name>
Changes the network name
(SSID) at the <index> location
in the SSID list.

Available only in the client mode.
delete <index>
Deletes the network name
(SSID) from the SSID list at
the <index> location.

clearall Clears all network names
(SSID) from the SSID list.


5.8.3.5 CLI\INTERFACES\WLAN1\802.11G (or \WLAN2\802.11G or \WLAN3\802.11G) menu
command
Special options of the 802.11g standard
With the commands in this menu, you can configure specific properties of the 802.11g
standard. You can, for example, specify how management and control data is sent in
802.11g mode.
CLI\INTERFACES\WLAN1\802.11G (or \WLAN2\802.11G or \WLAN3\802.11G)

Comment Command Description
IWLAN/
PB LINK
W744 W74
6
W747 W78x

W78x
RR
Specifies whether the RTS/CTS method is
used for 802.11g packets:

ctsmode [0|1|2]
0 Do not use CTS. Only available in access point mode.
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
204 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Comment
1 Always use CTS.
2 CTS depending on whether
802.11b clients exist.
Specifies the data rate for 802.11g CTS
frames:
0 1 Mbps
1 2 Mbps
2 5.5 Mbps
ctsrate
[0|1|2|3]
3 11 Mbps
Not with iPCF
Specifies the method for avoiding 802.11g
packet collisions:
0 CTS only
ctstype [0|1]
1 RTS/CTS
Not with iPCF
sslot [E|D]
Enables / disables short slot times between
data packets.

Only available in access point mode.
only11g [E|D]
When this is enabled, only the OFDM
modulation technique is supported.


5.8.3.6 CLI\INTERFACES\WLAN1\DATARATES (or \WLAN2\DATARATES or
\WLAN3\DATARATES) menu command
Variable setting of the transmission rates
With the commands of this menu, you can configure the transmission rate.
CLI\INTERFACES\WLAN1\DATARATES (or \WLAN2\DATARATES or \WLAN3\DATARATES)

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
info
The following overview shows
you the available transmission
rates and their current
configuration.

default
Enables the default setting for the
current WLAN mode

edit
<rate> <E | D> <E | D>
Changes the settings for the
specified data rate (in Mbps). The
two parameters indicate whether
the rate should be used or is
defined as "Basic Rate".
Overview:

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 205
Comment
Rate Enabled Basic
Rate
1 x x
2 x x
5.5 x x
6 x
9 x
11 x x
12 x
18 x
24 x
36 x
48 x
54 x
Example:
The command
"edit 5.5 d d"
disables the data rate 5.5 Mbps. The screenshot
shows the default setting for the 802.11g mode.

5.8.3.7 CLI\INTERFACES\WLAN1\VAP1..7 (or \WLAN2\VAP1..7 or \WLAN3\VAP1..7) menu
command
Virtual access points
With the commands in this menu, you make settings for virtual access points.
CLI\INTERFACES\WLAN1\VAP1..7> (or \WLAN2\VAP1..7 or \WLAN3\VAP1..7)

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Only available in access point mode.
vap [E|D]
Enable / disable virtual access point.

Only available in access point mode.
ssid [network name]
Assigns a network name (SSID).


Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
206 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.8.4 The CLI\SECURITY menu
5.8.4.1 CLI\SECURITY menu command
Configuration of the SCALANCE W-700
With the command in this menu, you specify how the SCALANCE W-700 is configured.
CLI\SECURITY>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Configuration of the SCALANCE W-700 is:
E Possible only over the
wired Ethernet port.
mgmteth [E|D]
D Possible over all
interfaces


5.8.4.2 CLI\SECURITY\BASIC\WLAN1 (or \WLAN2 or \WLAN3) menu command
Security settings of the SCALANCE W-700
With the commands in this menu, you specify the security settings of the SCALANCE W-
700.
CLI\SECURITY\BASIC\WLAN1> (or \WLAN2 or \WLAN3)

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78
x

W78x
RR
Specifies the authentication type. For
the parameter n, enter a number
between 0 and 4 for the
authentication type:

0 Open System
1 Shared Key
2 WPA (RADIUS)
3 WPA-PSK
authent
[0|1|2|3|4|5|6|7|8]
4 802.1x (RADIUS)
With the authentication types 7 (WPA-Auto) and 8
(WPA-Auto-PSK), the encryption method of
WPA and WPA2 or of WPA-PSK & WPA2-PSK
must be the same.
Not with iPCF
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 207
Comment
5 WPA2
6 WPA2-PSK
7 WPA-Auto
8 WPA-Auto-PSK
encrypt [E|D]
Encryption enabled / disabled.
cipher
[OFF|AUTO|WEP|AES|TKI
P]
Specifies the encryption scheme.
keysrc [0..2]
Select the key source.
Enter 0 as the parameter if the key is
managed by the server. Enter 1 if the
key will be provided by a RADIUS
server. Enter 2 if mixed operation is
required.

defkey [1|2|3|4]
Select the default WEP key.
The password can be 8 to 63 ASCII characters or
exactly 64 hexadecimal characters long.
wpaphrase [WPA
password]
Enter the WPA-PSK password.

Interval in seconds,
(0; 3636000), 0 = OFF
grkint [interval]
Specifies the "Group Key Update
Intervals" in WPA-PSK.

supssid [E|D]
Enable / disable Close Wireless
System functionality.

Allowed / Intracell or Ethernet
blocking)
Allowed no restriction of data traffic
Intracell blocking of data traffic
between the clients in the
cell
intracom [A|I|E]
Ethernet blocking of data traffic to
Ethernet

(Enable / Disable communication to
other SSIDs)
Enable data traffic with other
SSIDs permitted
ssidcom [E|D]
Disable data traffic with other
SSIDs blocked

In client mode only.
username [name]
Specifies the user name for the
RADIUS server.

In client mode only.
password [password]
Specifies the password for the
RADIUS server.

In client mode only.
chkserver [E|D]
Enables / disables authentication of
the server.

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
208 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Comment
radauth
Sets the RADIUS authentication type
to
AUTO
EAP_TLS
EAP_TTLS
PEAP

preauth
Enables preauthentication for WPA2
aging
With WPA2, sets the renewal interval
for the PMK in minutes


5.8.4.3 CLI\SECURITY\BASIC\WLAN1\VAP1..7 (or \WLAN2\VAP1..7 or \WLAN3\VAP1..7) menu
command
Security settings of the virtual access point
With the commands in this menu, you specify the security settings of the virtual access point.
CLI\SECURITY\BASIC\WLAN1\VAP1>
(or \WLAN2\VAP1 or \WLAN3\VAP1)

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Specifies the authentication type.
For the parameter n, enter a number
between 0 and 4 for the authentication
type:

0 Open System
1 Shared Key
2 WPA (RADIUS)
3 WPA-PSK
4 802.1x (RADIUS)
5 WPA2
6 WPA2-PSK
7 WPA-Auto
authent
[0|1|2|3|4|5|6|7|8]
8 WPA-Auto-PSK
With the authentication types 7 (WPA-Auto) and 8
(WPA-Auto-PSK), the encryption method of
WPA and WPA2 or of WPA-PSK & WPA2-PSK
must be the same.
encrypt [E|D]
Encryption enabled / disabled.
cipher
[OFF|AUTO|WEP|AES|TKIP
]
Specifies the encryption scheme.
defkey [1|2|3|4]
Select the default WEP key.
The password can be 8 to 63 ASCII characters or
exactly 64 hexadecimal characters long.
wpaphrase [WPA
password]
Enter the WPA-PSK password.

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 209
Comment
Interval in seconds,
(0; 3636000), 0 = OFF
grkint [interval]
Specifies the "Group Key Update
Intervals" in WPA-PSK.

supssid [E|D]
Enable / disable Close Wireless
System functionality.


5.8.4.4 CLI\SECURITY\KEYS\WLAN1 (or \WLAN2 or \WLAN3) menu command
Specifying the WEP key
With the commands in this menu, you enter a key in the key table and edit it.
CLI\SECURITY\KEYS\WLAN1>
(or \WLAN2 or \WLAN3)

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Indexes from 5 onwards are private keys
add <Len> <Key>
[index]
Adds at a key at the end or at the
specified index in the table.

edit <Index> <Len>
<Key>
Changes the key at the index location.
delete <Index>
Deletes the key at the index location.
clearall
Deletes all keys.
5.8.4.5 CLI\SECURITY\ACL\WLAN1 (or \WLAN2 or \WLAN3) menu command
Editing the access control list (ACL)
With the commands in this menu, you edit the entries in the access control list.
CLI\SECURITY\ACL\WLAN1>
(or \WLAN2 or \WLAN3)

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Global release of ACL:
E Enable
D Disable
aclmode [E|D|S]
S Strict
Only in access point mode
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
210 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Comment
Create a new entry in the ACL:
MAC MAC address of the client
O Allow
Y Deny
K Default key
P Private key
add <MAC>
[A|Y|K|P][key]
Key Key index for private key
Only in access point mode
Change an existing ACL entry:
index Number of the ACL entry


E
Enable
D Disable
O Allow
Y Deny
K Default key
P Private key
edit <index> [E|D]
[A|Y|K|P] [key]
Key Key index for private key
Only in access point mode
Only in access point mode
delete <index>
Delete an existing ACL entry:
index number of the ACL entry

Only in access point mode
clearall
Deletes all ACL entries.


5.8.4.6 CLI\SECURITY\RADIUS menu command
Authentication over an external server
With the commands in this menu, you set, for example IP addresses, ports and password
CLI\SECURITY\RADIUS>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
server [IP address]
Specifies the IP address of the primary
RADIUS server.

server B [IP address]
Specifies the IP address of the backup
RADIUS server.

port [port]
Specifies the port of the primary
RADIUS server.

port B [port]
Specifies the port of the backup
RADIUS server.

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 211
Comment
secret [password]
Specifies the password for the primary
RADIUS server.

secret B [password]
Specifies the password for the backup
RADIUS server.

maxreq [max. number]
Maximum number of requests to the
RADIUS server.

maxreq B [max. number]
Maximum number of requests to the
RADIUS server (backup server).

The default is 3600 s
authprd [time in s]
Period for repeating authentication.

Sets the time for reauthorization.
S Server
Time_scr [S|L]
L Local


5.8.4.7 CLI\SECURITY\ACCESS menu command
Access permissions for IP addresses
With the commands in this menu, you specify the access permissions for IP addresses.
CLI\SECURITY\ACCESS>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
access [E|D]
Enable / disable access control list.
statmgmt [A|D]
It is possible to access or not possible
to access the IP addresses of the
access control list (Accessed /
Denied).

add <IP>
Adds a new IP address.
edit <Index|IP> [E|D]
Enables / disables the entry in the
table specified by the index or IP
address.

delete <Index|IP>
Deletes the entry.
edit_r [E|D] [IP_1
IP_2]
Adds a new IP range or edits the IP
range.

clearall
Clears the access control list.
delete_r
Deletes an IP range
clear_r
Clears all IP ranges.

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
212 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.8.5 The CLI\BRIDGE menu
5.8.5.1 CLI\BRIDGE menu command
Deleting aged bridge information
With the command in this menu, you specify the time after which old bridge information in
the learning table is deleted.
CLI\BRIDGE>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Values between 10 s and 1,000,000 s can be set
for the aging time.
The default value is 300 s (5 min).
aging [E|D|aging time]
Enables / disables automatic deletion
of information on the assignment of
MAC addresses and ports. With the
Aging time parameter, you can change
the time.

learn
Displays the learning table.
arp
Displays the ARP table.
ipmap
Displays the IP mapping table
STORMTHR
Opens the storm threshold menu
NAT
Opens the NAT menu

5.8.5.2 CLI\BRIDGE\WDS\WLAN1 (or \WLAN2 or \WLAN3) menu command
Increasing network span with WDS
With the commands in this menu, you set the WDS mode (Wireless Distributed System) to
increase the network span or to set up a wireless backbone.
CLI\BRIDGE\WDS\WLAN1>-(or \WLAN2 or \WLAN3)

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
edit <Index> [E|D]
[SE|SD] [key]
Changes the WDS connection
specified by Index. With [E|D], you can
enable / disable the connection.

delete <Index>
Deletes the connection with the
specified index.

clearall
Deletes all WDS connections.
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 213
5.8.5.3 CLI\BRIDGE\VLAN\VLAN_ID menu command
VLAN
With the commands in this menu, you specify the VLAN-ID.
CLI\BRIDGE\VLAN\VLAN_ID>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
info
Shows the currently configured VLANs
and their relationship to the ports.

add <VLAN-ID> [u
[ports]]
Inserts a new VLAN.
Ports: Specifies the port that will
be configured for the VLAN.
u: The port is a member of
the VLAN,
frames are sent without a
VLAN tag.
Examples:
add 100 u 2 4
Creates an entry with the VLAN-ID
100. Ports 2 and 4 are members of this
VLAN.

edit <VLAN-ID>
[- [ports],]
[u [ports],]
Changes the membership of ports in a
VLAN. The parameters correspond to
those of the add command.
Examples:
edit 100 - 2
Port 2 no longer belongs to the VLAN
with ID 100.

delete <VLAN-ID>
Deletes the VLAN with the specified
VLAN ID from the configuration of the
SCALANCE W78x.


5.8.5.4 CLI\BRIDGE\VLAN\PORTS menu command
VLAN ports
With the commands in this menu, you set the properties of the VLAN port.
CLI\BRIDGE\VLAN\PORTS>

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
214 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
info
Displays an overview of the ports and
corresponding VLAN settings.

vlan <Port> <E|D>
Enables / disables VLAN for the
specified port.

portvid <Port>
<VLAN-ID>
Frames received at the specified port
without a VLAN tag are given a VLAN
tag with the <VLAN-ID>.

portprio <Port>
<Priority>
The priority assigned to untagged
frames according to 802.1d.

member <Port>
<all|specific>
The specified port is a member of all
VLANs or only the VLAN configured in
VLAN ID (specific, see above).


5.8.5.5 CLI\BRIDGE\SPANNING menu command
Spanning Tree properties
With the commands in this menu, you set the Spanning Tree properties.
CLI\BRIDGE\SPANNING>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
info
Shows the current spanning tree
configuration.

spanning [E|D]
Enables (E) or disables (D) the (R)STP
algorithm.

version [R | S]
Specifies whether the Rapid Spanning
Tree (R) or Spanning Tree (S) mode is
used.

Default value: 32768
bridge [0 ... 61440]
This specifies the bridge priority for the
SCALANCE W-700:

Default value: 2 s
hellotm [1...10]
Specifies the interval between two
BPDUs in seconds.

Default value: 15 s
fwd_delay [4...30]
Specifies the delay time for the
effectiveness of configuration
information (specified in seconds).

Default value: 20 s
maxage [6....40]
Maximum age for configuration
information. (specified in seconds).


Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 215
5.8.5.6 CLI\BRIDGE\SPANNING\PORTS menu command
Spanning tree port
With the commands in this menu, you set the Spanning Tree port properties.
CLI\BRIDGE\SPANNING\PORTS>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
info
Displays the current spanning tree
configuration.

portstp <E|D> [ports]
Enables / disables the spanning tree
algorithm for the specified ports.


portprio <Port>
[0 ... 240]
Specifies the priority of the port.


stp_cost <Port>
[1 ... 65535]
Specifies the path costs for the port if
Version is set to STP.


rstp_cost <Port>
[0 ... 200000000]
Specifies the path costs for the port if
Version is set to RSTP. If the value is
0, the value is calculated.

edgeport <Port> [T|F]
Specifies whether or not an edge port
(T) or a station (F) that supports
spanning tree or rapid spanning tree is
attached to this port. if a (rapid)
spanning tree protocol is received, the
value F is displayed automatically.

The point-to-point link establishes a
direct link between two stations. In this
case, you have the following options:

O The port recognizes a PtP
port based on the duplexity. If
the connection is full duplex, it
is assumed to be PtP, if it is
half duplex, no PtP
connection is assumed
(shared medium).
C Specifies a PtP link, even
though half duplex is being
used.
ptpport <port> <A|T|F>
F Specifies that there is no PtP
link over the relevant port
even with full duplex.


Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
216 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.8.5.7 CLI\BRIDGE\STORMTHR menu command
Storm threshold
With the commands in this menu, you set the storm threshold properties.
CLI\BRIDGE\STORMTHR>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
stormthr <E|D>
Enables / disables the storm threshold
function.

broadcast <limit
value>
Specifies the maximum number of
broadcast packets per second from the
same address.

multicast <limit
value>
Specifies the maximum number
multicast packets per second from the
same address.

broad_eth <limit
value>
Specifies the maximum number of
broadcast packets per second for the
Ethernet interface.

multi_eth <limit
value>
Specifies the maximum number of
multicast packets per second for the
Ethernet interface.

broad_1 <limit value>
broad_2 <limit value>
Specifies the maximum number of
broadcast packets per second for the
first or second wireless interface.

multi_1 <limit value>
multi_2 <limit value>
Specifies the maximum number of
multicast packets per second for the
first or second wireless interface.


5.8.5.8 CLI\BRIDGE\NAT menu command
NAT (Network Address Translation)
With the commands in this menu, you set the NAT properties.
CLI\BRIDGE>nat

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
nat [E|D]
Enables/disables NAT
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 217
Comment
ip [IP address]
Sets the local IP address for the
Ethernet port

subnet [Subnet mask]
Sets the subnet mask for the Ethernet
port

static
Opens the "STATIC" menu

5.8.5.9 CLI\BRIDGE\NAT\STATIC menu command
NAT STATIC
With the commands in this menu, you set the NAT STATIC properties.
CLI\BRIDGE\NAT>STATIC

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Add a static NAT entry:
Type TCP or UDP
G-Port Global Port
L-IP Local IP
add <Type> <G-Port>
<L-IP> <L-Port>
L-Port Local Port

Edit a static NAT entry:
Index Index in table
Type TCP or UDP
G-Port Global Port
L-IP Local IP
edit <Index> <E|D>
[type]
[G-Port] [L-IP]
[L-Port]
L-Port Local Port

delete <Index>
Deletes a static NAT entry
clearall
Deletes all static NAT entries

CLI\BRIDGE\NAT\STATIC>info

Index Enabled Type Global Port Local IP Local Port
1 x TCP 21 172.27.138.2 1026
Example of static information

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
218 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.8.6 The CLI\FILTERS menu
5.8.6.1 CLI\FILTERS\MAC1FLT menu command
MAC Filter
With the commands in this menu, you set the MAC filter properties.
CLI\FILTERS\MAC1FLT>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
fltmac1 <E|D>
Enables / disables the filter.
statmac1 [F|B]
If the value is set to F (forwarding),
only packets with a source address
contained in the table are forwarded. In
mode B (blocking), these packets are
blocked and all others are forwarded.

add <MAC addr.>
[description]
Adds a new address to the filter list.
The optional description has no
influence on the list and simply serves
as information for the user.

edit <Number|MAC>
[E|D] [description]
Changes the specified value.
check_wds <E|D>
Enables / disables checking including
the WDS ports. With the E setting, the
WDS ports are also monitored.

delete <Number|MAC>
Deletes the entry from the list.
clearall
Deletes all entries from the list.

5.8.6.2 CLI\FILTERS\MAC2FLT menu command
MAC-dependent communication paths
With the commands in this menu, you specify which device (MAC address) can
communication with which devices (MAC address).
CLI\FILTERS\MAC2FLT>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
fltmac2 <E|D>
Enables / disables the MAC filter.
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 219
Comment
add <SourceMAC>
<DestMAC>
Adds a new entry with source and
destination address to the filter.

edit <Index> [E|D]
[SourceMAC]
[DestMAC]
Changes the entry specified by Index.
With [E|D], you can enable / disable
the entry.

delete <Index>
Deletes the entry at the specified index
position.

clearall
Deletes all entries for the MAC filter.

5.8.6.3 CLI\FILTERS\PROTO menu command
Protocol filters
With the commands in this menu, you set the protocol filter properties.
CLI\FILTERS\PROTO>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
clearall
Deletes all entries for the protocol filter.
statprot <F|B>
The selected protocols are forwarded /
not forwarded.

fltprot <E|D>
Enables / disables the protocol filter.
add <Pattern>
[description]
Adds a new entry. A hexadecimal
value is expected for the "Pattern"
value. The user can enter a short note
for this protocol as the description.

edit <Index> [E|D]
[Pattern]
[description]
Changes of enables / disables the filter
entry.

delete <Index>
Deletes the filter entry.
clearall
Deletes all entries from the table.

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
220 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.8.7 The CLI\IFEATURES menu
5.8.7.1 CLI\IFEATURES\IQOS\WLAN1 (or \WLAN2 or \WLAN3) menu command

Note
This function is not available in firmware version 3.2.


Client-specific bandwidth reservation - Quality of Service (iQoS)
With the commands in this menu, you set the properties of the iQOS mode or obtain
information on iQoS.
CLI\IFEATURE\IQOS\WLAN1> (or \WLAN2 or \WLAN3)

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
iqos [E|D]
Enables / disables iQOS functionality.
static [E|D]
Enables / disables the calculation of
the minimum transmission rate.

15 1000 ms, default 50 ms
response [response
time]
Specifies the response time for a
client with bandwidth reservation.

add <MAC> <Max_BW>
[E|D]
Creating a critical client.
edit <Index> <Max_BW>
<E|D>
Changes the setting of a client
delete <Index>
Deletes a critical client
clearall
Deletes all critical clients
info
Displays information on iQos.

The CLI also supplies detailed information on iQoS. In this view, the first part displays the
current configuration, in other words whether iQoS is enabled, , whether the calculations and
reservations are based on the static "worst-case" assumptions (static = enabled) or the
current situation (static = disabled). The number of configured critical clients is also
displayed.
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 221


The "Traffic statistics" table shows how many clients are currently in each status and how
many packets of a particular class were sent for each of these classes.
The "Associated Clients" table provides an overview of all clients, their current classification,
and the volume of sent and received data. The shaper interval (SI) is also is displayed for
each client. The shaper interval is the minimum spacing between two packets of a client set
by iQoS. For NCS clients, the SI is selected so that their bandwidth is twice the size of the
current bandwidth.
5.8.7.2 CLI\IFEATURES\IPCF\WLAN1 (or \WLAN2 or \WLAN3) menu command
industrial Point Coordination Function (iPCF)
With the commands in this menu, you set the properties of iPCF.
CLI\IFEATURES\IPCF\WLAN1> (or \WLAN2 or \WLAN3)

Comment Command Description
IWLAN/
PB LINK
W74
4
W746 W747 W78
x

W78x
RR
ipcf [E|D]
Enables or disables iPCF mode.
Only on SCALANCE W78x-xRR models (access
point).
pnio [E|D]
Enables or disables optimized PNIO
support.

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
222 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Comment
Only on SCALANCE W78x-xRR models (access
point).
update [time]
Specifies the PNIO update time for
cyclic PNIO data exchange (in
milliseconds). This value must match
the configured PNIO cycle time. Valid
values: 4, 8, 16, 32, 64, 128, 256, 512.

Matches scanning to directional/RCoax
antennas or omnidirectional antennas.

0 Directional/RCoax antenna
antpatt <0 | 1>
1 Omnidirectional antennas

encrp [E|D]
Enables / disables AES-CCM
encryption


5.8.7.3 CLI\IFEATURES\FORCED_ROAM\WLAN1 (or \WLAN2 or \WLAN3) menu command
Cyclic connection monitoring of an IP address
With the commands in this menu, you set the properties of the forced roaming mode.
CLI\IFEATURES\FORCED_ROAM\WLAN1> (or \WLAN2 or \WLAN3)

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
froam [E|D]
Enables of disables forced roaming on
IP down.

ip [IP address]
Monitors the connection to this IP
partner.

interval [100 - 5000]
Specifies the monitoring cycles to the
IP partner in milliseconds.

lostpkts [1 - 5]
Specifies the maximum number of
unanswered pings before the WLAN
interface is disabled.


5.8.7.4 CLI\IFEATURES\LINKCHECK menu command
Device-related connection monitoring
With the commands in this menu, you set the properties of device-related connection
monitoring.
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 223
CLI\IFEATURES\LINKCHECK>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
linkchk [E|D]
Enable / disable device-related
connection monitoring.

add <MAC> [timeout]
Adds a new MAC address for
connection monitoring and specifies
the monitoring time. No time is
specified, the default is 500 ms.

edit <Index|MAC>
[E|D] [timeout]
Modifies, enables, or disables an entry.
delete <Index|MAC>
Deletes the specified entry from the
list.

clearall
Deletes all entries for connection
monitoring.

The fault state remains active until all the fault
messages have been acknowledged. The fault
status and the LED are cleared if the reason for
the fault status was only a link check error
message.
acknow [Index|All]
Displays or acknowledges (clears) the
Link Check messages requiring
acknowledgment.


5.8.7.5 CLI\IFEATURES\REDUNDANCY menu command
Redundant connection
With the commands in this menu, you set the properties of the redundant connection
between two devices.
CLI\IFEATURES\REDUNDANCY>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
redun [E|D]
Enables / disables the redundancy
function

wep [E|D]
Enables / disables encryption.
mac1 <MAC address>
Specifies the device that will be
operated redundantly along with the
first wireless adapter.

mac2 <MAC address>
Specifies the device that will be
operated redundantly along with the
second wireless adapter.

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
224 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Comment
name [system name]
Instead of the MAC addresses, you
can also specify the sysName of the
device.

wepkey1 [key index]
Specifies the WEP key of the device
that will be operated redundantly along
with the first wireless adapter.

wepkey2 [key index]
Specifies the WEP key of the device
that will be operated redundantly along
with the second wireless adapter.


5.8.7.6 CLI\IFEATURES\IP_ALIVE menu command
Application-related connection monitoring
With the commands in this menu, you set the properties of application-related connection
monitoring.
CLI\IFEATURES\IP_ALIVE>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
ipalive <E|D>
Enables / disables application-related
connection monitoring.

add <E|D> <IP address>
<:Port> <Timeout>
Adds a new IP address to the
connection monitoring and enables /
disables monitoring for this IP address.

edit <Index|IP addr.>
[:port] [E|D]
[timeout]
Modifies, enables, or disables the entry
specified by the index or IP address.

delete <Index|IP addr.
Deletes the node to be monitored.
clearall
Deletes all entries for connection
monitoring.

The fault state remains active until all the fault
messages have been acknowledged. The fault
state and the Fault LED are cleared if the only
reason was an IP Alive error message. The
command is not visible in the client mode.
acknow [Index|All]
Displays or acknowledges (clears) the
IP Alive messages requiring
acknowledgment.


Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 225
5.8.7.7 CLI\IFEATURES\AEROSCOUT\WLAN1 (or WLAN2 or WLAN3) menu command
Forwarding of AeroScout frames
With the command in this menu, you enable the forwarding of AeroScout frames
CLI\IFEATURES\AEROSCOUT\WLAN1> (or WLAN2 or WLAN3)>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x W78x
RR
aero [E|D]
Enable / disable forwarding of
AeroScout frames.


5.8.8 The CLI\INFORM menu
5.8.8.1 CLI\INFORM menu command
System events and information on the protocols
The pages of this menu provide information on system events and protocols.
CLI\INFORM>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
This can be called in every submenu.
info
Displays information on the current
menu item.

WLAN1
Opens the WLAN menu
ETHERNET
Opens the ETHERNET menu
LOG
Opens the LOG menu
AUTHLOG
Opens the AUTHLOG menu
SIGNAL
Open the signal recorder menu
spanning
Displays information on spanning tree

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
226 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.8.8.2 CLI\INFORM\LOG menu command
System events and information on the protocols
The pages of this menu display tables contain information on system events and on the
behavior of the protocols (IP, TCP, UDP, and ICMP, SNMP).
CLI\INFORM\LOG>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
events <show | clear>
Displays or deletes the log table.
addevent <Text>
Adds an event to the log table.
The default is 400.
eventmax [Max count]
Sets the maximum number of log
entries.


5.8.8.3 CLI\INFORM\AUTHLOG menu command
Logging authentication
The pages of this menu contain a table with information on successful or failed
authentication attempts.
CLI\INFORM\AUTHLOG>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Displays the authentication entries. By
specifying a parameter, the display
can be limited to specific information:
0 All
1 Good
2 All Errors
3 802.11 Errors
4 ACL Errors
5 RADIUS Errors
(request denied, password
rejected etc.)
show [0...8]
6 802.1x Errors
(timeout, no response from
RADIUS or WPA server)

Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 227
Comment
7 Deauthenticated Errors
8 Deassociated errors
clear
Deletes all entries.

5.8.8.4 CLI\INFORM\WLAN1 (or \WLAN2 or \WLAN3) menu command
Logged-on clients
All the logged-on clients along with certain additional information (wireless channel, status
etc.) are displayed here.
CLI\INFORM\WLANx>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
Station
Displays information on the connected
stations.

resetStats
Resets the statistics that are displayed
with the Station command.

(only in access point mode)
Apinfo
Displays information on the access
point.

Scan
Displays all the access points in the
area. Possible only if iPCF is disabled.

Noise
Shows disturbances on the individual
channels.

stasort
Displays information on the available
access points sorted according to MAC
addresses or signal strength.

scanww
Displays all access points regardless
of the country code.

vap
Displays all configured SSIDs (VAPs).
overlap
Shows the access points on the set or
adjacent channels.

over_age [1..7200]
Changes the aging interval (in
minutes) for the list of neighboring
access points. If an AP is inactive for
longer than the time set here, it is
removed from the list.


Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
228 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.8.8.5 CLI\INFORM\ETHERNET menu command
Information on the Ethernet interface
This menu command provides information on the current settings of the Ethernet interface.
The current operating data is also displayed here.
CLI\INFORM\ETHERNET>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
stats
Shows the statistics of the Ethernet
interface.

resetStats
Resets the statistics to zero.

5.8.8.6 CLI\INFORM\IQOS\WLAN1 (or \WLAN2 or \WLAN3) menu command
Information on bandwidth reservation
The pages of this menu provide information on iQoS.
CLI\INFORM\IQOS\WLAN1> (or \WLAN2 or \WLAN3)

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
info
Displays information on iQos.

The CLI also supplies detailed information on iQoS. In this view, the first part displays the
current configuration, in other words whether iQoS is enabled, , whether the calculations and
reservations are based on the static "worst-case" assumptions (static = enabled) or the
current situation (static = disabled). The number of configured critical clients is also
displayed.
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 229


The "Traffic statistics" table shows how many clients are currently in each status and how
many packets of a particular class were sent for each of these classes.
The "Associated Clients" table provides an overview of all clients, their current classification,
and the volume of sent and received data. The shaper interval (SI) is also is displayed for
each client. The shaper interval is the minimum spacing between two packets of a client set
by iQoS. For NCS clients, the SI is selected so that their bandwidth is twice the size of the
current bandwidth.

5.8.8.7 CLI\INFORM\SIGNAL menu command
Display of the current signal strength and recording of a series of measurements
With the commands in this menu, you set the properties of the signal recorder.
CLI\INFORM\SIGNAL>

Comment Command Description
IWLAN/
PB LINK
W744 W746 W747 W78x

W78x
RR
recstart <interval>
[number of recording
points]
Starts signal recording. This command is only available in the client
mode.
Configuration / project engineering
5.8 Configuration with the Command Line Interface
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
230 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Comment
The interval at which the current signal
is recorded can be between 1 and
1000 milliseconds.
A value between 1 and 20000 is
possible for the number of recording
points.

This command is only available in the client
mode.
recstop
Stops signal recording prematurely.

This command is only available in the client
mode.
dispstart [interval]
Displays the current signal strength
cyclically on the CLI.
The interval can be between 100 and
10000 milliseconds

This command is only available in the client
mode.
dispstop
Stars cyclic output of the signal
strength.

This command is only available in client mode
exit
Closes the CLI/TELNET connection.

This command is only available in client mode
info
Displays the parameters of the signal
recorder


Configuration / project engineering
5.9 Configuring with the PRESET PLUG
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 231
5.9 Configuring with the PRESET PLUG
5.9.1 How the PRESET-PLUG works
Multiple use of configuration data
With the PRESET PLUG, it is simple to assign a configuration to WLAN devices such as
access points, ECMs or IWLAN/PB links. You transfer an existing configuration to any
number of other devices using the PRESET PLUG. This procedure is particularly useful
when commissioning a lot of WLAN clients with the same parameter settings because you
do not need to set parameters for each client manually.

Note
To avoid duplicating IP addresses, the IP parameters are not changed but are retained when
you use the PRESET PLUG.
If the PRESET PLUG is inserted, the WLAN interface of the device is deactivated. WLAN
operation with a PRESET PLUG insert it is not possible.

Note
Only for SCALANCE W788-xPRO/RR
With a SCALANCE W788 access point version V3.0, it is not possible to create a PRESET-
PLUG for the IWLAN/PB-Link version V1.1. Please use a version V2.4 SCALANCE W788 or
older. If you update the IWLAN/PB Link to firmware V1.2, the configuration is available again
on a PRESET PLUG (created with V3.1).

5.9.2 Creating a Configuration with a new PRESET PLUG
Procedure
Follow the steps below to save a configuration on a PRESET PLUG:
1. Insert the PRESET PLUG in the C-PLUG slot of a powered-down device with the
required configuration and then turn on the device.
2. Start Web Based Management and select the System > C-PLUG menu.
3. In the "Modify C-PLUG" drop-down list box, select the "Create PRESET-PLUG" entry.
Configuration / project engineering
5.9 Configuring with the PRESET PLUG
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
232 Operating Instructions, Release 07/2008, C79000-G8976-C184-09


4. In the "PRESET PLUG for" box, specify the device for which you want to create the
PRESET PLUG. The PRESET-PLUG created in this way functions only with the device
type you selected. The figure above shows an example of the possible selections for a
SCALANCE W747-1RR.



Note
If you want to create a PRESET-PLUG with a device that has greater functionality than
the destination device to be configured, remember the following:
If you create a PRESET-PLUG with a SCALANCE W78x-xPRO/RR or a W746-1xx or
W747-1xx for the SCALANCE W744-1xx as destination device, you can, for example, set
parameter values for iPCF or layer 2 tunneling. These values are, however, ignored by
the destination device because these functions are not supported by a SCALANCE
W744-1xx.
To avoid duplicating MAC addresses, the "Adopt MAC" parameter is not set to "Adopt
MAC manually" when using the PRESET-PLUG.
5. Click on the "Modify" button to transfer the configuration of the device to the PRESET
PLUG.
6. Turn the device off and remove the PRESET PLUG.
Configuration / project engineering
5.9 Configuring with the PRESET PLUG
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 233
5.9.3 Changing a PRESET PLUG that already contains configuration data
Procedure
Follow the steps below to change the configuration data on a PRESET PLUG:
1. Insert the PRESET PLUG in the C-PLUG slot of a powered-down SCALANCE W-700 and
then turn on the device. The P1 and R1 LEDs flash yellow to signal that the PRESET
PLUG was detected.
2. Start Web Based Management; there you will see the current settings of the PRESET
PLUG.
3. Make the required changes to the configuration.
4. In the "Modify C-PLUG" drop-down list box, select the "Create PRESET-PLUG" entry.
5. In the "PRESET PLUG for" box, specify the device for which you want to create the
PRESET PLUG.
6. Click the "Modify" button to transfer the configuration of the device to the PRESET PLUG.
7. Turn the device off and remove the PRESET PLUG.
5.9.4 Putting a device into operation with a PRESET PLUG
Procedure
Note
To work correctly, the PRESET PLUG must have a content that matches the target device.

Follow the steps below to put a device into operation with the configuration data on a
PRESET PLUG.
1. Insert the PRESET PLUG in the C-PLUG slot of the device to which you want to assign a
configuration.
2. Turn on the power to the device. The LEDs "P1" and "R1" (and "Rx" on a SCALANCE W-
700 with more than one wireless interface) flash yellow to signal that the PRESET PLUG
was detected.
3. Press the reset button beside the C-PLUG briefly to save the settings of the PRESET
PLUG on the device.
4. When all the data has been transferred from the PRESET PLUG to the device, the LEDs
stop flashing and are permanently lit.
5. Turn the device off and remove the PRESET PLUG.



Note
The next time the device starts up, it uses the settings from the PRESET PLUG and the
previous IP configuration.
Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
234 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
5.10 PROFINET IO functionality
5.10.1 Configuring with PROFINET IO
Using PROFINET IO
One option for diagnostics, parameter assignment, and generation of alarm messages of the
connected SCALANCE W-700 devices is to use PROFINET IO. Here, you can see how you
can use the options of PROFINET IO for a connected SCALANCE W-700.

Note
The SCALANCE W744-1PRO and W744-1 devices cannot be used as PNIO devices.

In the example, it is assumed that a PNIO-Controller V2 is already configured with a
PROFINET IO chain (see also PROFINET IO System Manual).

Note
STEP 7 V5.4 SP4 is required.

Based on the example of a SCALANCE W-700, the following section shows a hardware
configuration with a PROFINET IO line.
Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 235

Figure 5-8 Setup of the station in HW Config
Including a SCALANCE W-700
To include a SCALANCE W-700 as a PN IO device, this must exist in the module catalog
under PROFINET IO.
Procedure
If the devices are not yet included in STEP 7, follow the steps below:
1. In the dialog, select HW Config -> Options "Install GSD files".
The following screen appears:
Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
236 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

Figure 5-9 Installing GSD files
2. Using the "Browse" function go to the supplied xml file (for example GSDML-V2.2-
Siemens-002A-SCALANCE_W700-YYYYMMDD.xml - Y, M and D stand for the issue
date of the file).
3. Then adopt the file with "Install". The SCALANCE W-700 is now included in the module
catalog
4. Take the SCALANCE W-700 you require from the HW catalog - here, for example,
SCALANCE W786-1PRO (PROFINET IO > Network Components > SCALANCE W-700
> SCALANCE W786-1PRO). Drag the selected SCALANCE to the PROFINET IO
system.
Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 237

Figure 5-10 Inserting a SCALANCE W-700
5. Click on the "(1)SCALANCE" icon so that the slots of the SCALANCE W786 are
displayed in the lower part of the screen. By double-clicking on slot=0, you can set the
global parameters of the device (substitute module) as shown in the figure below.
Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
238 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

Figure 5-11 HW Config: Setting the global parameters
6. You can set the parameters assigned to the relevant module on slot 0.
7. Click on the slots of the ports to set the port-specific parameters.
8. Open the "Object Properties dialog in HW Config (right-click on the Icon -> Object
Properties) and enter the name of the PROFINET IO device. Click OK to exit the dialog.
Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 239

Figure 5-12 HW Config: Context menu of the device
9. Select the Station > Save and Compile menu command.
10. Interconnect the devices over the network and turn on the power supplies of the
networked devices.
11. To transfer the name to the SCALANCE W786-1PRO, you require an online connection
from the PG to the PROFINET IO device. Select "PLC > Ethernet > Assign device name"
to open the relevant dialog.
Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
240 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

Figure 5-13 Assigning a device name in HW Config
12. If you are using multiple PROFINET IO devices, multiple PROFINET IO devices are also
indicated in the "Assign device name" dialog. In this case, you should compare the MAC
address of the device with the indicated MAC address and select the correct IO device.
With the "Flashing On / Off" button, you can check the device assignment visually (the
LED of the Ethernet port flashes on the selected SCALANCE W786),
Click the "Assign name" button in the "Assign device name" dialog. The device name is
stored permanently on the SCALANCE W786. After assigning the name, the device
name you assigned appears in the dialog box.
13. Download the hardware configuration to the controller (in this example, the CPU317-
2PN/DP). Select PLC > Download to Module

5.10.2 Settings in HW Config
Power supply monitoring and C-PLUG monitoring on the SCALANCE W-700
Here, you decide how the SCALANCE W-700 reacts to a problem in the power supply or to a
C-PLUG fault.
Redundant power supply
Not monitored
The failure of one of the two power supplies does not cause an alarm.
Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 241
Monitored
The failure of one of the two power supplies causes an alarm.
C-PLUG monitoring
Not monitored
The C-PLUG is not monitored.
Monitored
A C-PLUG fault causes an alarm.

Figure 5-14 Settings for monitoring the power supply and the C-PLUG in the "Properties" dialog
Port-specific settings
Here, you make the settings for the Ethernet port of the SCALANCE W-700. In the dialog
below, this is done based on the example of a SCALANCE W786-1PRO.
Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
242 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

Figure 5-15 Settings for the Ethernet interface
Transmission mode
In the "Options" section, you can make settings for the transmission mode.
Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 243

Figure 5-16 Options relating to the transmission mode in the "Properties" dialog
If PNIO communication with the SCALANCE W-700 is via a WLAN interface, for technical
reasons the Ethernet port status is always signaled as "100 Mbps full duplex":
Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
244 Operating Instructions, Release 07/2008, C79000-G8976-C184-09

Figure 5-17 "Network attachment" property of a SCALANCE W-700
5.10.3 Access options over PROFINET IO
Slot Functions
SCALANCE W-700s have a subslot per port in slot 0. Functions that cannot be assigned
uniquely to one port are assigned to the device access point (slot 0).

Slot 0 Subslot 1 Alarms
Data records (4.5)
Device Access Point (DAP)
Interface connection
C-PLUG
Redundant power supply
Subslot 8001 Alarms (IEC)
Data records (IEC)
Ethernet port 1
Alarm response
Port state
Generating alarms
The user configures exactly the assignment and required properties of the ports. This makes
it necessary to match the configuration and installation. If the setting in STEP 7 requires that
port 1 is not linked, this must be taken into account during installation. The power fault mask
set by STEP 7 is stored retentively and the port fault mask is reset. If you exit DataEX, the
settings in the fault mask made by STEP 7 are retained and continue to apply without
PROFINET operation.
Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 245
Effect of other signaling mechanisms during DataEX
The fault mask is displayed as set by STEP 7 both in the Web interface and in CLI.
Changes are not possible.
Data record 4:
Access: Read-write,
Structure:
typedef struct {
Word BlockType;
Word BlockLength;
Byte BlockVersionHigh:
Byte BlockVersionLow:
DWord Alarm_enable; };
BlockType:
1: Constant
BlockLength:
6: Constant in device data, designates the length without Type+ Length
BlockVersionHigh:
1: Constant in device data, designates the major version
BlockVersionLow:
1: Constant in device data, designates the minor version
Enable_alarms:
This bit list specifies what is to be monitored. If a bit is set, this alarm source is enabled.

Reserved

Bit 2 - 31
C-PLUG

Bit 1
Red_power

Bit 0
0 0: No C-PLUG monitoring 0: No monitoring of the redundant power supply
1: Missing or incorrect C-
PLUG generates alarm
1: Monitoring of the redundant power supply
Data record 5:
Supplies the current alarm setting for this port
Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
246 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Access: Read-only
typedef struct {
Word BlockType;
Word BlockLength;
Byte BlockVersionHigh;
Byte BlockVersionLow;
DWord status; };
BlockType:
1: Constant
BlockLength:
6: Constant in device data, designates the length without Type+ Length
BlockVersionHigh:
1: Constant in device data, designates the major version
BlockVersionLow:
1: Constant in device data, designates the minor version
Status:

Reserved

Bits 8-31
C-PLUG_status

Bits 4-7
Reserved

Bits 2-3
Fault_line_status

Bit 1
Power line redundancy

Bit 0
0 Information regarding
the configuration plug
of the network
component
0: C-PLUG inserted
and ok
1:C-PLUG not inserted
2: C-PLUG inserted but
not ok (incorrect type)
3: C-PLUG inserted but
not ok (checksum error)
Information regarding
the current state of the
signaling contact
0: Fault line passive
1: Fault line active
This bit provides
information about the
redundant power supply
0: not redundant
1: redundant

Configuration / project engineering
5.10 PROFINET IO functionality
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 247

Note
C-PLUG
For detailed information on the topic of C-PLUGs, refer to the sections "Description" and
"Configuration with Web Based Management".
In the following situations, PNIO does not start up:
A C-PLUG for the wrong type is inserted
When a CRC error occurs
The configuration of the device requires a C-PLUG, but this is not inserted.


SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 249
Upkeep and maintenance
6
6.1 Replacing the C-PLUG
Procedure
Follow the steps below to replace the C-PLUG of a SCALANCE W788-xPRO/RR or W74x-
1PRO/RR:
1. Turn off the power to the device.
2. Remove the old SCALANCE W788-xPRO/RR or W74x-1PRO/RR from its mounting and
open the sealing screw on the rear with a coin or broad screwdriver.
3. Remove the C-PLUG.
4. Open the sealing screw of the new device in the same way and insert the C-PLUG of the
old device.
5. Replace the sealing screws of both devices.
If a new C-PLUG is inserted in a SCALANCE W788-xPRO/RR or W74x-1PRO/RR, the
configuration stored locally on the device is saved to the C-PLUG. If an incorrect C-PLUG
(for example from another device or a damaged plug) is inserted, the device signals an error
with the red LED. The user then has the choice of either removing the C-PLUG again or
selecting the option to reformat the C-PLUG and use it.

Note
It is essential that the configuration on the C-PLUG was generated with a firmware version
the firmware version on the destination device.
Example: A C-PLUG with version V3.0 cannot be used for a SCALANCE W78x with
firmware version V2.4.


Upkeep and maintenance
6.2 Loading new firmware over FTP
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
250 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
6.2 Loading new firmware over FTP
Procedure
You can load new firmware on a SCALANCE W-700 over FTP even if the device is not
reachable over WEB Based Management or the CLI. This may be the situation if there was a
power down during a firmware update. Follow the steps below to load new firmware using
FTP:
1. Turn off the power to the device.
2. Now press the Reset button and reconnect the power to the device while holding down
the button.
3. Hold down the button until the red fault LED (F) starts to flash after approximately 2
seconds.
4. Now release the button. The bootloader waits in this state for a new firmware file that you
can download by FTP.
5. Connect a PC to the SCALANCE W-700 over the Ethernet interface.
6. Assign an IP address to the SCALANCE W-700 with the Primary Setup Tool.
7. Open a DOS box and change to the directory where the file with the new firmware is
located and then execute the command "ftp <ip address>".
As an alternative, you can use a different FTP client.
8. Enter "siemens" as both the login and password.
9. Load the new firmware with the command "put <firmware>".
10. Once the firmware has been transferred completely to the device, the device is restarted
automatically.

Upkeep and maintenance
6.3 Restoring the default parameter settings
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 251
6.3 Restoring the default parameter settings
Procedure
Follow the steps below to reset the device parameters to the factory settings:

NOTICE
When you reset the device parameters, all previously changed settings are lost!


1. Turn off the power to the device.
2. Now press the Reset button and reconnect the power to the device while holding down
the button.
3. Hold down the button until the red fault LED (F) stops flashing after approximately 10
seconds and is permanently lit.
4. Now release the button and wait until the fault LED (F) goes off again.
5. The device then starts automatically with the default parameters.


SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 253
Troubleshooting/FAQ
7
7.1 Disrupted data transmission due to the received power being too high
Causes and effects of excessive received power
If the received power at the input of a WLAN is too high, this overdrives the amplifier circuit.
Overdrive can occur on clients and access points. If the received power on the WLAN device
is higher than -40 dBm, this can lead to disruptions in communication. The current received
power [in dBm] is displayed in WBM in the Information > Available WLAN (on clients) or
Information > Clients List (on access points) menu. The power of the input signal on the
WLAN device is influenced by the following factors:
Distance between the WLAN partners
Reflections of the electromagnetic waves by parts of the building
"Transmit power" setting in Web Based Management of the access point or client.
Remedy
If communication is disrupted by an excessive received power (greater than -40 dBm), you
can eliminate the problem in the following ways:
Increase the distance between the transmitter and receiver.
Reduce the transmit power of the WLAN partner with suitable settings in Web Based
Management or in the Command Line Interface.

Troubleshooting/FAQ
7.2 Changing from MLFB 6GK57xx-xSx00-2Ax6 to MLFB 6GK57xx-xAA60-xAx0
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
254 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
7.2 Changing from MLFB 6GK57xx-xSx00-2Ax6 to MLFB 6GK57xx-
xAA60-xAx0
New hardware
The hardware redesign of the Scalance W components with MLFB 6GK57xx-xSx00-2Ax6
with the introduction of new MLFBs was necessary to equip the devices with a power supply
conforming with Power over Ethernet (PoE) to IEEE 802.3af. Following the redesign, the
devices also have a new IWLAN wireless module.
The following table shows the order numbers of the previous and new hardware:

Previous MLFB is replaced by MLFB (redesigned hardware)
6GK5744-1ST00-2AA6 6GK5744-1AA60-2AA0
6GK5744-1ST00-2AB6 6GK5744-1AA60-2AB0
6GK5746-1ST00-2AA6 6GK5746-1AA60-4AA0
6GK5746-1ST00-2AB6 6GK5746-1AA60-4AB0
6GK5746-1ST00-2BA6 6GK5746-1AA60-4BA0
6GK5747-1SR00-2AA6 6GK5747-1AA60-6AA0
6GK5747-1SR00-2AB6 6GK5747-1AA60-6AB0
6GK5788-1ST00-2AA6 6GK5788-1AA60-2AA0
6GK5788-1ST00-2AB6 6GK5788-1AA60-2AB0
6GK5788-1SR00-2AA6 6GK5788-1AA60-6AA0
6GK5788-1SR00-2AB6 6GK5788-1AA60-6AB0
6GK5788-2ST00-2AA6 6GK5788-2AA60-2AA0
6GK5788-2ST00-2AB6 6GK5788-2AA60-2AB0
6GK5788-2SR00-2AA6 6GK5788-2AA60-6AA0
6GK5788-2SR00-2AB6 6GK5788-2AA60-6AB0
For detailed information on the technical difference between the previous devices and the
devices of the new series, refer to the section "Description" - "Differences in the properties of
devices with other hardware".

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 255
Technical specifications
8
8.1 Technical specifications for the SCALANCE W788-xPRO/RR and
W74x-1PRO/RR
Device variants
The technical specifications of the
SIMATIC NET SCALANCE W744-1PRO
SIMATIC NET SCALANCE W746-1PRO
SIMATIC NET SCALANCE W747-1RR
SIMATIC NET SCALANCE W788-1PRO
SIMATIC NET SCALANCE W788-2PRO
SIMATIC NET SCALANCE W788-1RR
SIMATIC NET SCALANCE W788-2RR
are largely identical. Unless indicated otherwise in the table, the following tables apply to all
the devices listed above:
Data transfer

Ethernet transfer rate 10/100 Mbps
Wireless transmission rate 1 ... 54 Mbps (108 Mbps)
Wireless standards supported 802.11a
802.11b
802.11g
802.11h
Power supply standards supported 802.3af (Power over Ethernet)
Interfaces
Note
Bridging a power outage is possible only with an input voltage of 24 V DC (-15% . . . +20%).



Technical specifications
8.1 Technical specifications for the SCALANCE W788-xPRO/RR and W74x-1PRO/RR
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
256 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Power M12 connector
(24 V DC, 48 V DC)
Energy contacts in the hybrid connector
(24 V DC, 48 V DC)
RJ-45 socket Power over Ethernet (48 V DC)
2 supplies 24 V DC (24 V DC, 48 V DC)
safety extra-low voltage (SELV).
The following applies to all named power
contacts:
Power supply cables isolated according to IEEE
802.3af, isolation resistance > 2 Mohms.
Back up IE IP 67 hybrid connector
R-SMA antenna sockets
(2 x or 4 x with the 788-2PRO)
Electrical data

Power consumption < 10 W
Construction

Dimensions without antennas
(W x H x L)
125 mm x 88 mm x 108 mm
Weight approx. 1050 g
Permitted ambient conditions

Operating temperature -20C to 60C
Transport/storage temperature -40C to 70C
Degree of protection Tested to IP65
MTBF information (mean time between failure)

MTBF 67 years
Transmit power
Table 8-1 Transmit power in IEEE 802.11b mode (2.4 GHz)
Data rate [Mbps] P0 [dBm]
1 20
2 20
5,5 20
Technical specifications
8.1 Technical specifications for the SCALANCE W788-xPRO/RR and W74x-1PRO/RR
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 257
Data rate [Mbps] P0 [dBm]
11 20

Table 8-2 Transmit power in IEEE 802.11g mode (2.4 GHz)
Data rate [Mbps] P0 [dBm]
6 17
9 17
12 17
18 17
24 17
36 17
48 17
54 16

Table 8-3 Transmit power in IEEE 802.11a/h mode (5 GHz)
Data rate [Mbps] P0 [dBm]
6 17
9 17
12 17
18 17
24 17
36 16
48 15
54 13,5

Receiver sensitivity
Table 8-4 Receiver sensitivity in IEEE 802.11b mode (2.4 GHz)
Data rate [Mbps] Pe [dBm]
1 -98
2 -94
5,5 -92
11 -90

Technical specifications
8.1 Technical specifications for the SCALANCE W788-xPRO/RR and W74x-1PRO/RR
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
258 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Table 8-5 Receiver sensitivity in IEEE 802.11g mode (2.4 GHz)
Data rate [Mbps] Pe [dBm]
6 -93
9 -92
12 -91
18 -88
24 -85
36 -82
48 -77
54 -76

Table 8-6 Receiver sensitivity in IEEE 802.11a/h mode (5 GHz)
Data rate [Mbps] Pe [dBm]
6 -90
9 -89
12 -88
18 -86
24 -83
36 -80
48 -75
54 -74

Technical specifications
8.2 Technical specifications ANT795-4MR
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 259
8.2 Technical specifications ANT795-4MR
Mechanical characteristics

Connector R-SMA male for connection to
SCALANCE W78x or
SCALANCE W74x
Cover material Polycarbonate
Silicone-free
Electrical characteristics

Frequency range 2.4 ~ 2.4835 GHz
5.15 ~ 5.35 GHz
5.725 ~ 5.85 GHz
Impedance 50 ohms
Voltage standing wave ratio 2,0
Return loss -10 dB
Gain at 2.45 GHz 3 dBi
Gain at 5.25 GHz 5 dBi
Polarization Vertical
Ambient temperature - 20 C.... + 60 C


SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 261
Dimension drawings
9
9.1 Drilling template for the SCALANCE W788-xPRO/RR and SCALANCE
W74x-1PRO/RR
Drill holes for wall mounting
125
115
4
8
0
9
0
5
5


Dimension drawings
9.2 Dimension drawing ANT795-4MR
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
262 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
9.2 Dimension drawing ANT795-4MR
21,2
34,6
1
4
8
13
6



SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 263
Appendix
A
A.1 Private MIB variables of the SCALANCE W78x / W74x
Downloading the MIB of the SCALANCE W-700 using the Internet Explorer
Using the URL
http://<IP_address>/snScalanceW.mib
, you display the login window if you are not yet logged on. After you have logged on
successfully, you can access the private MIB of the SCALANCE W-700. To save this on your
PC, the source text view should be enabled.
OID
The private MIB variables of the SCALANCE W78x have the following object identifiers:
iso(1).org(3).dod(6).internet(1).private(4).
enterprises(1).ad(4196).adProductMibs(1).simaticNet(1).
iScalanceW(4)
Variables for access points and clients
The following table shows the private MIB variables available for access points and clients:

Name OID Description Number of
objects
snDownload 1.3.6.1.4.1.4196.1.1.4.100.1.5 Download information and control variables
for image, configuration file, events table.
17
snNvLog 1.3.6.1.4.1.4196.1.1.4.100.1.6 Log for events. 8
snTrapInfo 1.3.6.1.4.1.4196.1.1.4.100.1.7 Information on traps. 6
snGen 1.3.6.1.4.1.4196.1.1.4.100.1.8 General information, not conforming with
MIB-2.
23
snTcpip 1.3.6.1.4.1.4196.1.1.4.100.1.10 IP address, Subnet Mask, Default Gateway,
DHCP Status
5
snScalanceWCommon 1.3.6.1.4.1.4196.1.1.4.100.2.1 SCALANCE W-700 - specific settings. 24
snScalanceWFilter 1.3.6.1.4.1.4196.1.1.4.100.2.4 Protocol filters and storm threshold settings 18
snScalanceWStats 1.3.6.1.4.1.4196.1.1.4.100.2.5 Information on WLAN 1 and WLAN 2
interfaces.
62
snScalanceWDevices 1.3.6.1.4.1.4196.1.1.4.100.2.6 AP mode: List and information on all clients
currently "associated" or connected.
Client mode: List of devices with which the
client is currently connected.
49
Appendix
A.1 Private MIB variables of the SCALANCE W78x / W74x
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
264 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Name OID Description Number of
objects
snScalanceWScan 1.3.6.1.4.1.4196.1.1.4.100.2.7 Client mode: List of reachable WLANs and
information whether the clients can connect
to them.
11
snScalanceWAccess 1.3.6.1.4.1.4196.1.1.4.100.2.9 List of IP addresses that can access the
management interface.
5
Variables available only for access points

Name OID Description Number of
objects
snScalanceWAcl 1.3.6.1.4.1.4196.1.1.4.100.2.8 Information and settings for the Access
Control Lists.
9
snScalanceWVirtualAp 1.3.6.1.4.1.4196.1.1.4.100.2.10 Information on the currently configured
virtual APs.
17

Traps for access points and clients

Name Specific
index
Variables Description
snScalanceWPowerLineD
own
32 snScalanceWChangedPowerLine - The power
line where the last power down occurred. 1-
M12, 2-Ethernet Power
This is generated if there is a
power down on M12 or the
Ethernet power connector.
snScalanceWPowerLineU
p
32 snScalanceWChangedPowerLine - The power
line where the last power up occurred. 1-M12,
2-Ethernet Power
This is generated if there is a
power up on M12 or the Ethernet
power connector.
snScalanceWFault 41 snScalanceWFaultValue -
Fault value:
0 = no fault,
bit 0 = power M12 is off,
bit 1 = link down,
bit 2 = internal error,
bit 23 = Link Check error,
bit 24 = IP Alive broken,
bit 25 = power ethernet is off,
bit 26 = Cold/warm start,
bit 27 = C-PLUG error,
bit 28 = iQoS error,
bit 29 = Redundancy error"
This is generated if the
snScalanceWFaultValue variable
is changed.
The bit is set to "1" according to
the event that has occurred.
snScalanceWIQOS 51 snScalanceWIQOSValue - Description of the
last snScalanceWIQOS trap

snScalanceWLinkCheckO
ff
81 snScalanceWLinkCheckValue - Description of
the last snScalanceWLinkCheckOff Trap
This is generated if a timeout
occurs with a client monitored
with Link Check.
Appendix
A.1 Private MIB variables of the SCALANCE W78x / W74x
SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 265
Name Specific
index
Variables Description
snScalanceWLinkIntegrity
On
82 snScalanceWLinkCheckValue - Description of
the last snScalanceWLinkCheckOn trap
This is generated if a client
monitored with Link Check logs
on again at the AP following a
timeout.
snScalanceWClientAuthe
nticated
85 SnScalanceWClientsIndex - An index of the
client in the snScalanceWClients table
This is generated when a client
logs on at the AP.
snScalanceWClientDeAut
henticated
86 SnScalanceWClientsIndex - An index of the
client in the snScalanceWClients table
This is generated when a client
logs off from the AP.
snScalanceWRedundanc
y
53 SnScalanceWRedundancyValue- Description
of the last redundancy trap.
SnScalanceWRedundancyState- Status of
redundancy connection
This is generated if the status of
the redundant connection
changes, for example when the
connection of wireless interface A
aborts.

Traps available only for access points


Name Specific
index
Variables Description
snScalanceWOverlapAP 101 snScalanceWOverlapAPValue
- Description of the last OverlapAP trap.
Is generated when an
access point is detected on the
device's own or an overlapping
wireless channel.
snScalanceWiPCFPNIO
maxSTAs
111 snScalanceWPNIOValue - Description of the
last snScalanceWiPCFPNIOmaxSTAs or
snScalanceWiPCFPNIOCycleTime trap
Is generated when there are too
many clients registered for the
specified update time in iPCF
mode with PNIO support.
snScalanceWiPCFPNIOC
ycleTime
112 snScalanceWPNIOValue - Description of the
last snScalanceWiPCFPNIOmaxSTAs or
snScalanceWiPCFPNIOCycleTime trap
Is generated when the specified
update time in iPCF mode with
PNIO support cannot be kept to.
snScalanceWForcedRoa
mingVapStateChanged
121 snScalanceWVirtualApIndex
- Index of the VAP
snScalanceWVirtualApState
- Current State of the VAP
unknown (0)
authenticated (1)
associated (2)
powersafe (3)
adhoc (4)
joined (5)
vap-is-up (6)
vap-starting (7)
vap-is-down (8)
locked (9)
vap-connected (10)
Generated when the status of the
VAP changes.


SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 267
Glossary
Access Point
A (Wireless) Access Point (WAP) is an electronic device that functions as the interface
between a mobile wireless network and a wired computer network. End devices (clients)
establish a wireless connection to the wireless access point over a wireless adapter. The
access point is connected to a permanently installed communication network over a cable.
ACL
Access Control List. List with MAC addresses with the right to access the mobile wireless
network.
Ad hoc network
Mobile wireless network between individual devices (point-to-point).
AeroScout
AeroScout tags are battery-operated sensor nodes that send out WLAN frames cyclically as
multicast frames. Among other things, they also have an ambient temperature sensor and a
motion sensor.
AES
Advanced Encryption Standard, Encryption according to the Rijndael algorithm.
ARP
Address Resolution Protocol
The ARP protocol is used for address resolution. Its task is to find the corresponding network
hardware address (MAC address) for a given protocol address.
An ARP protocol implementation is often found on hosts on which the Internet protocol family
is used. IP forms a virtual network on the basis of IP addresses. These must be mapped to
the given hardware addresses when the data is transported. To achieve this mapping, the
ARP protocol is often used.
Bandwidth
Maximum throughput of a connecting cable (normally specified in bps).
Glossary

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
268 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Broadcast
A broadcast is like "calling all all stations": Broadcast packets are received by all nodes
configured to receive broadcasts.
Broadcast address
A broadcast in a computer network is a message with which data packets are sent by one
node to all other nodes of a network. If a message is intended for all nodes in a network, a
broadcast address is used as the destination address.
DFS
Dynamic Frequency Selection. With the Dynamic Frequency Selection function, that is also
part of the 802.11h expansion, an automatic channel change is possible if another user or
technical device is discovered on a channel during operation. This includes, for example,
radar systems that also transfer data in the 5 GHz frequency band. Before a channel is used,
it is checked to make sure that no other system is already using the channel or frequency
range. If another user is discovered, data transmission on the channel is stopped and the
device changes to a free channel.
This is intended to avoid influence by WLAN systems operating according to 802.11a in the
5 GHz band.
DHCP
Dynamic Host Configuration Protocol
ESS
Extended Service Set. ESS is a link between two or more cells of a WLAN (BSS - Basic
Service Set) and a larger mobile wireless network.
Firewall
One or more devices that allow or prevent data access to interconnected networks according
to given security restrictions.
Handover
A handover is the procedure in a mobile wireless network (for example a mobile wireless
network complying with IEEE 802.11) during which the mobile client changes from one cell
to another or from one channel to another while a data connection exists.
HTTPS
HyperText Transfer Protocol Secure
Protocol for the encryption and authentication of communication between Web server and
Web browser in the World Wide Web.
HTTPS is an expansion of HTTP for secure transmission of confidential data with the aid of
SSL.
Glossary

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 269
IEEE
Institute of Electrical and Electronics Engineers
IEEE 802.11
Standard for mobile wireless networks in the 2.4 GHz range with transmission rates of up to
2 Mbps.
IEEE 802.11a
Standard for mobile wireless networks in the 5 GHz range with transmission rates of up to 54
Mbps.
IEEE 802.11b
Standard for mobile wireless networks in the 2.4 GHz range with transmission rates of up to
11 Mbps.
IEEE 802.11e
Enhancement of the wireless LAN standard to support Quality of Service (QoS).
IEEE 802.11g
Standard for mobile wireless networks in the 2.4 GHz range with transmission rates of up to
54 Mbps.
IEEE 802.11h
The IEEE 802.11a standard expanded by TPC and DFS.
IEEE 802.11i
Among other things, the standard describes the WPA2 method, the TKIP procedure and the
AES encryption algorithm. IEEE 802.11i removes a series of weak points in the WEP
security mechanism.
IEEE 802.1x
The heart of the standard is the use of a Radius server as the authentication server. In
addition to this, in IEEE 802.1x, the entire communication is encrypted.
Industrial Ethernet
A bus system complying with IEEE 802.3 (ISO 8802-2)
Glossary

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
270 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
IP address
The IP address consists of 4 bytes. Each byte is represented in decimal, with a dot
separating it from the previous one. This results in the following structure, where XXX
represents a number between 0 and 255 (dotted decimal notation): XXX.XXX.XXX.XXX
The IP address is made up of two parts, the network ID and the host ID. This allows different
subnets to be created. Depending on the bytes of the IP address used as the network ID and
those used for the host ID, the IP address can be assigned to a specific address class:

Address Class Address class identifier Network address and node
address
O Byte 1 (possible value 1 - 126)
(Byte 1 is the byte furthest left.)
Byte 2 to byte 4
Possible value in each case
0 - 255.
0.0.0 must not be assigned,
255.255.255 is the broadcast
address.
B Byte 1
(possible value 128 - 191)
Byte 2
(possible value 0 - 255)
Byte 3 and byte 4
Possible value in each case
0 - 255.
0.0 must not be assigned,
255,255 is the broadcast
address.
C Byte 1
(possible value 192 - 223)
Bytes 2 and 3
(possible value in each case
0 - 255)
Byte 4
Possible value 1 - 254.
0 must not be assigned, 255 is
the broadcast address.
D Byte 1
(possible value 224 - 239)
multicast addresses
Byte 2 to byte 4
Possible value in each case
0 - 255
0.0.0 must not be assigned.
There are several multicast
addresses with a special
meaning, for example
224.0.0.1
All systems of the subnet
224.0.0.2
All routers of the subnet
iPCF
The industrial Point Coordination Function is a communications protocol with which data
traffic between the access point and connected stations is controlled to avoid collisions.
Using iPCF, the data throughput can be optimized even with a high number of nodes. iPCF
also allows fast cell changes.
PROFINET IO
PROFINET IO, abbreviated to PNIO, allows communication with distributed IO devices on
the basis of Ethernet. The main feature of PROFINET IO is the cyclic data traffic between IO
controller and field device.
Glossary

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 271
PST
Primary Setup Tool
QoS
Quality of Service (QoS) is a general term that indicates the correct functionality of all
interactive components of a telecommunications network. Depending on the communications
standard (for example IP), error parameters are detected and recorded with which the
operation of the technology is continuously monitored and that form the basis for any
necessary maintenance. In a general sense, QoS means the quality characteristics of a
network as a whole from the perspective of the user of a particular service.
RADIUS
Remote Authentification Dial In User Service. A method in which the authentication is
handled on a separate server.
Roaming
Free movement of wireless LAN nodes even beyond the boundaries of an access point's
cell. The nodes and can move from one cell to the next without any noticeable interruption.
Server
A server is a device or generally an object that can provide certain services at the request of
a client.
Services
Services provided by a communication protocol.
SINEMA E
The planning, simulation and configuration software SINEMA E is used to plan and configure
IWLAN applications. It can be used to visualize IWLAN networks, for example according to
coverage, data transfer rate, signal/noise ratio and overlapping taking into account
environmental and device characteristics.
SNMP
Simple Network Management Protocol. Standardized protocol for exchange of network
management information.
SSID
The Service Set Identifier (SSID) is used to identify a mobile wireless network based on
IEEE 802.11.
Glossary

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
272 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
Subnet mask
The subnet mask specifies which parts of an IP address are assigned to the network
number. The bits in the IP address whose corresponding bits in the subnet mask have the
value 1 are assigned to the network number.
System
All the electrical equipment within a system. A system includes, among other things:
Programmable logic controllers, devices for operator control and monitoring, bus systems,
field devices, drives, power supply cabling.
TCP/IP
TCP = Transport Connection Protocol; IP = Internet Protocol
TKIP
Temporal Key Integrity Protocol. Scheme for cyclic changing of keys in WLANs.
TPC
The Transmit-Power Control function (TPC) introduced as a supplementary function by the
802.11h enhancement for 5 GHz components allows an automatic adaptation of the transmit
power. Information on the attenuation values and the expected budget reserves in received
power are taken into account. TPC is also intended to make sure that the maximum
permitted transmit power of a channel specified by the relevant regulatory bodies is not
exceeded by the component. TPC attempts to operate with the minimum transmit power
between the communicating stations or between access point and station.
WBM
Web Based Management. HTTP-based configuration method in which an HTTP server is
used in the relevant device.
WDS
Wireless Distribution System. Radio links for connecting the access points for an extended
service set (ESS).
WEP
Wired Eqivalence Privacy is an optional part of the IEEE 802.11 standard. WEP specifies
methods of authentication and encryption working with fixed keys stored on the device. All
devices that want to access a network in which WEP is used must first be supplied with the
same keys. The keys can also only be renewed manually.
Wi-Fi
Wireless Fidelity. Specification for wireless networks.
Glossary

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 273
The Wi-Fi Alliance is a group of WLAN manufacturers that tests and certifies the
interoperability of WLAN products. Wi-Fi is a certification of WLANs according to 802.11b
and is performed by WECA, the WiFi parent organization. This certification confirms the
interoperability of WLAN products operating in compliance to the 802.11b standard.
The Wi-Fi Alliance also develops standards. The WiFi Alliance has developed its own
architectures for security procedures that have not yet been standardized such as the WiFi
Protected Architecture (WPA) to be able to test the compatibility of the various
manufacturers' products.
For real-time transmission, the Wi-Fi Alliance has specified Wi-Fi Multimedia (WMM) for
transmissions with guaranteed quality of service (QoS).
WPA
Wi-Fi Protected Access is a method specified by the die Wi-Fi alliance to close the security
gaps in WEP. Authentication using a server is stipulated (802.1x). The dynamic exchange of
keys at each frame introduces further security. Users can choose between TKIP (Temporal
Key Integrity Protocol) and AES (Advanced Encryption Standard).
Although WPA was never officially part of the IEEE 802.11 standards family, it has become
very widespread in a very short time. This, however, applies only to the WPA procedure
described above using TKIP. The optional possible implementation of WPA on the basis of
AES, on the other hand, did not become established and is therefore irrelevant in everyday
practice. AES only took on practical value only with the development of the later WPA2
standard.
WPA-PSK
WPA-PSK is a weakened form of WPA. In this method, authentication is not established by a
server but is based on a password. This password must be configured manually on the client
and server. Wherever possible, you should change to the WPA method to achieve greater
security.

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
Operating Instructions, Release 07/2008, C79000-G8976-C184-09 275
Index
A
ACL, 133
Ad hoc networks, 14
Adopt MAC Address, 72
Antenna Gain, 122
Antennas, 44, 123
ARP table, 145
Authentication, 86, 128
B
Bandwidth reservation, 56, 158
Basic Wizard, 66
Beacons, 121
Bridge priority, 55
C
CLI commands
Shortcuts for commands, 182
Symbolic representation, 182
CostCost, 149
C-PLUG, 32, 113
D
DHCP server, 104
E
E-mail, 108
Encryption, 129
F
FAULT, 194
Fault State, 110
Forward Delay, 148
G
Grounding, 40
H
Hello time, 148
Help function, 101
HTTPS, 65
Hybrid cable, 37
I
IEEE 802.11, 22
IEEE 802.11a, 22
IEEE 802.11b, 22
IEEE 802.11g, 22, 125
IEEE 802.11h, 22
IP address, 68
IP, TCP/IP, ICMP, SNMP, 176
iPCF, 95, 158
iPCF Wizard, 66, 95
L
Learning Table, 145
LED simulation, 102
Lightning protection, 38
Link Check, 161
Load & Save, 110
Locale setting, 183
M
MAC filter, 156
Max Age, 148
Mode and locale setting, 102
Multichannel configuration, 16
Index

SCALANCE W788-xPRO/RR / SCALANCE W74x-1PRO/RR
276 Operating Instructions, Release 07/2008, C79000-G8976-C184-09
N
NAPT, 153
NAT, 152
Network access, 19
NEW, 101
O
Overlap AP, 173
P
Password
Character set, 79
PRESET PLUG, 231
Priority, 149
PROFINET IO, 234
Protocol filter, 157
R
RADIUS, 91
Redundant connection, 57
Refresh, 101
Reset Statistics, 101
RFC
RFC 1518, 61
RFC 1519, 61
Root bridge, 55
RTS/CTS, 121, 123
S
Safety extra low voltage, 39
Save
Device data, 110
Security settings, 82
Security Wizard, 66
Set Values, 101
Slot function, 244
SNTP, 110, 193
Spanning Tree, 146
Spanning tree port parameters, 148
SSID, 83
Standalone configuration, 13
Storm threshold, 152
Subnet mask, 61
T
Transmit power, 121
TTL, 104
W
WDS, 136
Web Based Management, 64
Wireless access, 15
Wizards, 64
WPA, 130
WPA2, 89

You might also like