Table of contents
Preface .........................................................................................................................................................3
1 Description..................................................................................................................................................13
1.1 Function .................................................................................................................................13
1.2 Configuration examples .........................................................................................................14
1.2.1 TeleControl with SINEMA RC ................................................................................................14
1.2.2 Secure access with S615.......................................................................................................16
1.3 Requirements for operation....................................................................................................16
1.3.1 Use in a PROFINET environment ..........................................................................................17
1.4 System functions....................................................................................................................18
1.5 Configuration limits for WBM and CLI ....................................................................................19
1.6 Configuration limits for SINEMA RC ......................................................................................21
1.7 PLUG .....................................................................................................................................22
1.7.1 C-PLUG and KEY-PLUG .......................................................................................................22
1.7.2 PRESET PLUG ......................................................................................................................23
2 Security recommendation...........................................................................................................................25
3 Technical basics .........................................................................................................................................31
3.1 Structure of an IPv4 address..................................................................................................31
3.2 ICMP ......................................................................................................................................33
3.3 VLAN......................................................................................................................................35
3.3.1 VLAN......................................................................................................................................35
3.3.2 VLAN tagging .........................................................................................................................36
3.4 SNMP.....................................................................................................................................37
3.5 Security functions...................................................................................................................40
3.5.1 User management..................................................................................................................40
3.5.2 Firewall...................................................................................................................................42
3.5.2.1 Firewall...................................................................................................................................42
3.5.3 NAT ........................................................................................................................................45
3.5.4 NAT and firewall.....................................................................................................................46
3.5.5 Certificates .............................................................................................................................49
3.5.6 VPN........................................................................................................................................49
3.5.6.1 IPsec VPN..............................................................................................................................49
3.5.6.2 OpenVPN ...............................................................................................................................53
3.5.6.3 VPN connection establishment ..............................................................................................54
3.6 Redundancy ...........................................................................................................................58
3.6.1 Spanning Tree........................................................................................................................58
3.6.1.1 RSTP......................................................................................................................................59
3.6.2 VRRPv3 .................................................................................................................................59
SCALANCE S615 Web Based Management
Configuration Manual, 11/2019, C79000-G8976-C388-08 7