EasyManua.ls Logo

Siemens SCALANCE - Table of Contents

Siemens SCALANCE
32 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of contents
Checklist
Article ID: 109745536, V2.0, 05/2022
3
© Siemens AG
2022 All rights reserved
Table of contents
Legal information ......................................................................................................... 2
1 Introduction ........................................................................................................ 5
1.1 Overview............................................................................................... 5
1.2 The SCALANCE devices...................................................................... 6
2 Abridged checklist ............................................................................................. 7
3 Detailed checklist .............................................................................................. 8
3.1 Use the latest firmware ......................................................................... 8
3.2 Set up time synchronization ................................................................. 8
3.3 Disable unencrypted protocols ............................................................. 9
3.4 Use secure FTP ................................................................................. 10
3.5 DHCP client ........................................................................................ 10
3.6 Change default passwords ................................................................. 11
3.7 PROFINET ......................................................................................... 12
3.8 HTTPS certificates and SSH keys ..................................................... 13
3.9 Dynamic Configuration Protocol ......................................................... 14
3.9.1 DCP access ........................................................................................ 14
3.9.2 DCP forwarding .................................................................................. 15
3.9.3 DCP Discovery ................................................................................... 15
3.10 Quality of service - traffic shaping ...................................................... 16
3.11 Redundancy ....................................................................................... 17
3.11.1 Ring redundancy ................................................................................ 17
3.11.2 Spanning tree ..................................................................................... 19
3.11.3 Passive listening ................................................................................. 20
3.12 Wireless LAN ...................................................................................... 21
3.12.1 WLAN encryption ............................................................................... 21
3.12.2 WLAN layer-2 tunnel .......................................................................... 21
3.12.3 WLAN iPCF ........................................................................................ 22
3.13 Configuration ...................................................................................... 22
3.13.1 Storage information with MSPS devices ............................................ 22
3.13.2 Configuration backup ......................................................................... 23
3.13.3 C-PLUG/Key-PLUG ............................................................................ 24
3.13.4 Scheduled restart and Trial Mode ...................................................... 25
3.14 Additional settings .............................................................................. 26
3.14.1 Port settings ....................................................................................... 26
3.14.2 System information ............................................................................. 26
3.14.3 Syslog ................................................................................................. 27
3.14.4 Limit key functions .............................................................................. 27
3.14.5 Rate control ........................................................................................ 27
3.14.6 Loop detection .................................................................................... 28
3.14.7 Port mirroring ...................................................................................... 28
3.14.8 VRRP.................................................................................................. 29
3.14.9 Default gateway .................................................................................. 29
3.14.10 Brute Force Prevention ...................................................................... 30
3.14.11 Turn off firewall with SCALANCE S/M ............................................... 30
4 Appendix .......................................................................................................... 31

Related product manuals