Table of contents
Legal information ......................................................................................................... 2
1 Introduction ........................................................................................................ 5
1.1 Overview............................................................................................... 5
1.2 The SCALANCE devices...................................................................... 6
2 Abridged checklist ............................................................................................. 7
3 Detailed checklist .............................................................................................. 8
3.1 Use the latest firmware ......................................................................... 8
3.2 Set up time synchronization ................................................................. 8
3.3 Disable unencrypted protocols ............................................................. 9
3.4 Use secure FTP ................................................................................. 10
3.5 DHCP client ........................................................................................ 10
3.6 Change default passwords ................................................................. 11
3.7 PROFINET ......................................................................................... 12
3.8 HTTPS certificates and SSH keys ..................................................... 13
3.9 Dynamic Configuration Protocol ......................................................... 14
3.9.1 DCP access ........................................................................................ 14
3.9.2 DCP forwarding .................................................................................. 15
3.9.3 DCP Discovery ................................................................................... 15
3.10 Quality of service - traffic shaping ...................................................... 16
3.11 Redundancy ....................................................................................... 17
3.11.1 Ring redundancy ................................................................................ 17
3.11.2 Spanning tree ..................................................................................... 19
3.11.3 Passive listening ................................................................................. 20
3.12 Wireless LAN ...................................................................................... 21
3.12.1 WLAN encryption ............................................................................... 21
3.12.2 WLAN layer-2 tunnel .......................................................................... 21
3.12.3 WLAN iPCF ........................................................................................ 22
3.13 Configuration ...................................................................................... 22
3.13.1 Storage information with MSPS devices ............................................ 22
3.13.2 Configuration backup ......................................................................... 23
3.13.3 C-PLUG/Key-PLUG ............................................................................ 24
3.13.4 Scheduled restart and Trial Mode ...................................................... 25
3.14 Additional settings .............................................................................. 26
3.14.1 Port settings ....................................................................................... 26
3.14.2 System information ............................................................................. 26
3.14.3 Syslog ................................................................................................. 27
3.14.4 Limit key functions .............................................................................. 27
3.14.5 Rate control ........................................................................................ 27
3.14.6 Loop detection .................................................................................... 28
3.14.7 Port mirroring ...................................................................................... 28
3.14.8 VRRP.................................................................................................. 29
3.14.9 Default gateway .................................................................................. 29
3.14.10 Brute Force Prevention ...................................................................... 30
3.14.11 Turn off firewall with SCALANCE S/M ............................................... 30
4 Appendix .......................................................................................................... 31