SCALANCE W780/W740 to IEEE 802.11n Web Based Management
Configuration Manual, 08/2018, C79000-G8976-C267-13
3
1 Introduction ............................................................................................................................................. 9
1.1 Information on the Configuration Manual.................................................................................. 9
1.2 Type designations ................................................................................................................... 14
1.3 Structure of the type designation ............................................................................................ 15
2 Description ............................................................................................................................................ 17
2.1 Network structures .................................................................................................................. 18
2.2 Possible applications of SCALANCE W700 devices .............................................................. 23
2.3 Product characteristics............................................................................................................ 25
2.4 IEEE 802.11n .......................................................................................................................... 28
2.5 Requirements for installation and operation of SCALANCE W devices ................................. 32
2.6 C-PLUG and KEY-PLUG ........................................................................................................ 33
2.7 Digital input / output ................................................................................................................ 35
2.8 Power over Ethernet (PoE) ..................................................................................................... 37
3 Security recommendations .................................................................................................................... 41
4 Technical basics ................................................................................................................................... 47
4.1 Configuration limits for WBM and CLI ..................................................................................... 47
4.2 Interfaces and system functions ............................................................................................. 49
4.3 EtherNet/IP ............................................................................................................................. 53
4.4 PROFINET .............................................................................................................................. 54
4.5 VLAN ....................................................................................................................................... 55
4.6 MAC-based communication .................................................................................................... 56
4.7 iPCF / iPCF-HT / iPCF-MC ..................................................................................................... 57
4.8 iREF ........................................................................................................................................ 61
4.9 iPRP ........................................................................................................................................ 63
4.10 AeroScout ............................................................................................................................... 66
4.11 NAT/NAPT .............................................................................................................................. 68
4.12 SNMP ...................................................................................................................................... 69
4.13 Spanning Tree ........................................................................................................................ 72
4.13.1 RSTP, MSTP, CIST ................................................................................................................ 73
4.14 User management .................................................................................................................. 75
5 IP addresses ......................................................................................................................................... 77