Setting up securityglobal FW Rulesets SIMATIC NET. Industrial Ethernet Security Setting up security. Preface. Firewall in standard mode

Similar documents
Siemens Spares. Setting up security in STEP 7. Professional SIMATIC NET. Industrial Ethernet Security Setting up security in STEP 7 Professional

SIMATIC NET. Industrial Ethernet Security SCALANCE S615 Getting Started. Preface. Connecting SCALANCE S615 to the WAN 1

Creating the program. TIA Portal. SIMATIC Creating the program. Loading the block library 1. Deleting program block Main [OB1]

SIMATIC. S7/HMI SIMATIC Automation Tool V3.1 SP1 product information. SIMATIC Automation Tool features 1. Known problems. Product Information

SIMATIC. Process Control System PCS 7 PCS 7 system documentation - Readme V8.0 SP2 (Update 1) Options for Accessing Documentation 1

SINEMA Remote Connect - Client SIMATIC NET. Industrial Remote Communication SINEMA Remote Connect - Client. Preface. Requirements for operation

Team engineering via Inter Project. Engineering. TIA Portal. Team engineering via Inter Project Engineering. Basics of "Inter Project Engineering"

Readme SiVArc V14 SP1 Update 6

Getting Started - Startdrive. Startdrive SINAMICS. Introduction 1. Connecting the drive unit to the PC. Creating a project 3

SIMATIC NET. Industrial Remote Communication - Remote Networks SINEMA Remote Connect. Preface. Connecting the SINEMA RC Server to the WAN 1

SIMATIC NET. Industrial Remote Communication - Remote Networks SINEMA Remote Connect - Client. Preface. Requirements for operation 1

Primary Setup Tool (PST) SIMATIC NET. Industrial Ethernet / PROFINET Primary Setup Tool (PST) Preface. Description. Software installation 2

Class documentation. COMOSKDictionary COMOS. Platform Class documentation COMOSKDictionary. Trademarks. General. KDictionary. Programming Manual

CP 1623 SIMATIC NET. PG/PC - Industrial Ethernet CP Preface. Description of the device. Software installation. Hardware installation

Key Panels Library SIMATIC HMI. Key Panels Library. Preface 1. Installation of Key Panels Library. Working with the Key Panels Library

SIMATIC NET. SCALANCE S and SOFTNET Security Client A B C D E. Preface, Contents

Performance data abgn SCALANCE W770/W730 SIMATIC NET. Industrial Wireless LAN Performance data abgn SCALANCE W770/W730.

Setting up a secure VPN Connection between SCALANCE S and CP x43-1 Adv. Using a static IP Address. SCALANCE S, CP Advanced, CP Advanced

DI 8x24VDC ST digital input module SIMATIC. ET 200SP DI 8x24VDC ST digital input module (6ES7131-6BF00-0BA0) Preface. Documentation guide

PD PA AP How To Configure Maxum II TimeServer Access

SIMATIC. Communications processor CP First Steps in Commissioning. Getting Started 09/2008 A5E

SITOP UPS1600 under STEP 7 V5. SITOP UPS1600 under STEP 7 V5. Introduction. Safety notes. Description 3. Assigning the IP address

MindSphere. Visual Explorer. Introduction. User roles for "Visual Explorer" Connecting "Visual Explorer" to MindSphere data. Creating Visualizations

COMOS. Platform Class documentation RevisionMaster_dll. Class: RevisionInfo 1. Class: RevisionMaster 2. Programming Manual

SITOP UPS1600 under STEP 7 V13. SITOP UPS1600 under STEP 7 V13. Introduction. Safety notes. Description. Assigning the IP address

SIMATIC NET. Industrial Remote Communication Remote Networks SCALANCE M-800 Getting Started. Preface. Connecting SCALANCE M- 800 to WAN 1

SIMATIC NET. Industrial Ethernet / PROFINET Primary Setup Tool (PST) Preface. Functions 1. Software installation 2. Operation. Configuration Manual

Setting up a secure VPN Connection between CP x43-1 Adv. and SOFTNET Security Client Using a static IP Address

Performance data abgn PCIe Minicard MPCIE-R1-ABGN-U3 SIMATIC NET

DANGER indicates that death or severe personal injury will result if proper precautions are not taken.

First Steps in Commissioning CPU. 31xC: Positioning with digital output SIMATIC

S7-300 Getting Started - Commissioning a CPU 31xC: Closed-loop control

SIMATIC. Process Control System PCS 7 OS Process Control (V8.1) Preface 1. Additional documentation 2. Functions of the PCS 7 OS in process mode 3

Configuration limits for products of the SIMATIC NET PC Software V8.1 SIMATIC NET

SIMOTION. Motion Control Task Trace. Preface 1. Overview 2. Configuring 3. Working with the SIMOTION Task Profiler 4.

SIMATIC NET. Industrial Remote Communication Remote Networks SCALANCE M-800 Getting Started. Preface. Connecting SCALANCE M-800 to WAN 1

Validity 1. Improvements in STEP 7 2. Improvements in WinCC 3 SIMATIC. Readme. Readme

SIMATIC. Process Control System PCS 7 Trend Micro OfficeScan (V8.0; V8.0 SP1) Configuration. Using virus scanners 1.

party software COMOS Platform Third-party software Trademarks 1 Requirements for the system environment Third-party software releases Operating Manual

SIMATIC/SINAMICS. Getting started with SINAMICS V90 PN on S Motion Control. Fundamental safety instructions 1. Introduction

SIMATIC. Process Control System PCS 7 VT Readme V8.2 (online) Security information 1. Overview 2. Notes on Installation 3. Notes on usage 4.

SIMATIC. Process Control System PCS 7 Configuration McAfee Endpoint Security Security information 1. Preface 2.

RF-MANAGER simulator SIMATIC. RFID-Systems RF-MANAGER simulator. Simulating projects. Compact Operating Instructions 06/2010 A5E

SIMATIC. Communications processor CP 340 first commissioning steps. Getting Started 04/2005 A5E

Product Information Mixed. Configuration ET 200SP / ET 200AL SIMATIC. ET 200SP Product Information Mixed Configuration ET 200SP / ET 200AL.

SINEMA Remote Connect - Server SIMATIC NET. Industrial Remote Communication - TeleControl SINEMA Remote Connect - Server. Preface

Setting up a secure VPN Connection between SCALANCE S and SSC Using a static IP Address. SCALANCE S, SOFTNET Security Client

SIMATIC. ET 200SP Open Controller Product information on CPU 1515SP PC. Preface. Product Information. Technical update. Technical specifications 3

SIMATIC. PCS 7 Licenses and configuration limits (V9.0) Security information 1. Preface 2. Selecting the correct license keys 3

Class: DocumentManager 1 COMOS. Platform Class documentation DocumentManager_dll. Programming Manual 03/2017 V10.2.

SIMATIC. Process Control System PCS 7 Advanced Process Functions Operator Manual. Preface. Security information 1. Overview 2. Material management 3

Setting up a secure VPN connection between two SCALANCE S Modules Using a static IP Address

Block Library Motor Starter SIRIUS for SIMATIC PCS 7

Optional package printer driver V1.4

SIMATIC HMI. Software RemoteOperate V2. Preface. Overview 1. Range of functions of the RemoteOperate software. Hardware and software requirements

Siemens Drives & PLCs

SIMATIC IPC Wizard for. Widescreen devices with multitouch SIMATIC. Industrial PC SIMATIC IPC Wizard for. Preface.

Configuration limits for products of the HARDNET-PB DP-Base 1

Power module PM-E DC24V HF SIMATIC. ET 200S distributed I/O Power module PM-E DC24V HF (6ES7138-4CA60-0AB0) Preface. Properties.

SIMATIC. Process Control System PCS 7 Symantec Endpoint Protection 11.0 Configuration. Using virus scanners 1. Configuration 2. Commissioning Manual

SIMATIC NET. S TeleControl MSC300_Library program block library. Block library for TCSB (V3) WDC_S7_300_... (FB92) 2 UDT_WDC_PARAM (UDT91) 3

SIMATIC Ident RFID systems MDS D423 Compact Operating Instructions

SIMATIC. STEP 7 PLUS TIA Portal Teamcenter Gateway. Introduction to TIA Portal Teamcenter Gateway 1. System requirements 2

SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection V14. Security information 1. Preface 2.

ST (6ES7132-6FD00-0BB1)

SIMATIC. SIMATIC Logon V User management and electronic signatures 1. Hardware and Software Requirements 2. Scope of delivery 3.

General Information 1. Connection 2. User Interface 3 ATC5300. Menus 4. Automatic Transfer Controller. Remote Control Software Manual A5E

SIMATIC. Process Control System PCS 7 PCS 7 Documentation (V8.1) Options for Accessing Documentation 1. Documentation for the Planning Phase 2

Web Option for OS (V8.0) SIMATIC. Process Control System PCS 7 Web Option for OS (V8.0) Preface 1. Additional documentation

SIMATIC. Process Control System PCS 7 SIMATIC Management Console (V9.0) Security information 1. Preface 2. Basics 3

Class: POptions 1 COMOS. Platform Class documentation POptions_dll. Programming Manual 04/2014 A5E AA

SIMATIC. Industrial software WinAC RTX F Introduction 1. Selecting suitable hardware 2. Installing/removing the WinAC RTX F 2009 software

SIMATIC. Process Control System PCS 7 OS Process Control (V8.1) Security information 1. Preface 2. Additional documentation 3

SIMATIC. Process Control System PCS 7 Licenses and quantity structures (V8.0) Preface 1. Selecting the correct license keys 2

DANGER indicates that death or severe personal injury will result if proper precautions are not taken.

SIMATIC. WinCC Readme Runtime Professional. Validity 1. Improvements in Update 7 2. Improvements in Update 6 3. Improvements in Update 5 4

ET 200S distributed I/O system 4DO DC24V/2A ST digital electronic module (6ES7132-4BD32-0AA0)

Siemens Spares COMOS. Operations Inspection. Introduction 1. Working with the "Inspection" plugin 2. Working with the "Inspection diagram" plugin 3

SIMATIC NET. Industrial Remote Communication TeleService TS Gateway. Preface. Application and properties. Installation, commissioning and operation 2

Industrial Controls. SIMOCODE pro SIMOCODE pro PCS 7 Library. Preface. Security information. Product specific security. information.

Quick Start powermanager SENTRON. Software Quick Start powermanager. Introduction. Installation. Starting the project 3

SIMATIC. Function modules FM 351 First Steps in Commissioning. Purpose of the Getting Started. Requirements 2

Deckblatt. APL Operator Guide SIMATIC PCS 7. Application description June Applikationen & Tools. Answers for industry.

Power module PM-E DC24V/8A RO SIMATIC. ET 200S distributed I/O Power module PM-E DC24V/8A RO (6ES7138-4CA80-0AB0) Preface. Properties.

Operator Station (V8.0) SIMATIC. Process Control System PCS 7 Operator Station (V8.0) Preface 1. The PCS 7 Operator Station

SIMATIC. WinCC Readme Runtime Professional. Validity 1. Improvements in Update 2 2. Improvements in Update 1 3

Commissioning PC Stations - Manual. and Quick Start SIMATIC NET. PC software Commissioning PC Stations - Manual and Quick Start.

Basic principles 1. Configuring function diagrams based on IEC 2. Administration 3 COMOS. Automation Logical. Operating Manual 04/2015 A5E AD

English. SIMATIC Sensors. RFID-Systems RF600. Getting Started. Edition 11/2005; J31069-D0172-U001-A1-7618

SIMATIC. Process Control System PCS 7 Software update with utilization of new functions. Security information 1. Preface 2.

SIMATIC. SIMATIC Energy Manager V1.0 App for ios and Android. Preface. SIMATIC Energy Manager app. Establish connection to SIMATIC Energy Manager PRO

Industrial Controls. Motor management and control devices SIMOCODE pro. Introduction 1. Configuring a reversing starter. List of abbreviations

Siemens Automation Products

Line reactors SINAMICS. SINAMICS G120P Line reactors. Safety information 1. General. Mechanical installation 3. Electrical installation 4

SINETPLAN Siemens Network Planner

COMOS. Operations Inspection. Introduction 1. Working with the "Inspection" plugin 2. Working with the "Inspection diagram" plugin 3

SIMATIC. Process Control System PCS 7 SIMATIC Management Console (V9.0 Update 1) Security information 1. Preface 2. Basics 3


MindSphere. MindConnect IoT Extension Getting Started. Introduction to MindSphere. Prerequisites 2. Preparations 3. MindConnect IoT Extension

COMOS. Automation COMOS Automation Interfaces SPI 1. Generic Excel import 2. Process visualization via OPC client 3.

Transcription:

Global FW Rulesets SIMATIC NET Industrial Ethernet Security Preface 1 Firewall in standard mode 2 Firewall in advanced mode 3 Configuring a VPN tunnel 4 Configuring remote access via a VPN tunnel 5 Getting Started 04/2012 C79000-G8976-C287-01

Legal information Legal information Warning notice system This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are graded according to the degree of danger. DANGER indicates that death or severe personal injury will result if proper precautions are not taken. WARNING indicates that death or severe personal injury may result if proper precautions are not taken. CAUTION with a safety alert symbol, indicates that minor personal injury can result if proper precautions are not taken. CAUTION without a safety alert symbol, indicates that property damage can result if proper precautions are not taken. NOTICE indicates that an unintended result or situation can occur if the relevant information is not taken into account. If more than one degree of danger is present, the warning notice representing the highest degree of danger will be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to property damage. Qualified Personnel The product/system described in this documentation may be operated only by personnel qualified for the specific task in accordance with the relevant documentation, in particular its warning notices and safety instructions. Qualified personnel are those who, based on their training and experience, are capable of identifying risks and avoiding potential hazards when working with these products/systems. Proper use of Siemens products Note the following: WARNING Siemens products may only be used for the applications described in the catalog and in the relevant technical documentation. If products and components from other manufacturers are used, these must be recommended or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and maintenance are required to ensure that the products operate safely and without any problems. The permissible ambient conditions must be complied with. The information in the relevant documentation must be observed. Trademarks All names identified by are registered trademarks of Siemens AG. The remaining trademarks in this publication may be trademarks whose use by third parties for their own purposes could violate the rights of the owner. Disclaimer of Liability We have reviewed the contents of this publication to ensure consistency with the hardware and software described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the information in this publication is reviewed regularly and any necessary corrections are included in subsequent editions. Siemens AG Industry Sector Postfach 48 48 90026 NÜRNBERG GERMANY Order number: C79000-G8976-C287-01 P 04/2012 Technical data subject to change Copyright Siemens AG 2012. All rights reserved

Table of contents 1 Preface... 7 2 Firewall in standard mode... 9 2.1 Example with a SCALANCE S...9 2.1.1 Overview...9 2.1.2 Set up SCALANCE S and the network...11 2.1.3 Make the IP settings for the PCs...11 2.1.4 Create the project and module...13 2.1.5 Configure the firewall...13 2.1.6 Downloading the configuration to the security module...14 2.1.7 Test the firewall function (ping test)...15 2.1.8 Log firewall data traffic...17 2.2 Example with a CP x43-1 Advanced...18 2.2.1 Overview...18 2.2.2 Make the IP settings for the PCs...19 2.2.3 Create the project and module...20 2.2.4 Configure the firewall...21 2.2.5 Downloading the configuration to the security module...22 2.2.6 Test the firewall function (ping test)...23 2.2.7 Log firewall data traffic...25 2.3 Example with a CP 1628...26 2.3.1 Overview...26 2.3.2 Make the IP settings for the PCs...27 2.3.3 Create the project and module...29 2.3.4 Configure the firewall...29 2.3.5 Downloading the configuration to the security module...31 2.3.6 Test the firewall function (ping test)...31 2.3.7 Log firewall data traffic...32 3 Firewall in advanced mode... 35 3.1 SCALANCE S as firewall and NAT router...35 3.1.1 Overview...35 3.1.2 Set up SCALANCE S and the network...37 3.1.3 Make the IP settings for the PCs...37 3.1.4 Create the project and module...39 3.1.5 Configuring the NAT router mode...41 3.1.6 Configure the firewall...43 3.1.7 Downloading the configuration to the security module...45 3.1.8 Test the NAT router function (ping test)...46 3.2 Creating user-specific firewall rules...49 3.2.1 Overview...49 3.2.2 Set up SCALANCE S and the network...50 3.2.3 Make the IP settings for the PCs...51 3.2.4 Create the project and module...52 3.2.5 Creating remote access users...55 Getting Started, 04/2012, C79000-G8976-C287-01 3

Table of contents 3.2.6 Creating and assigning user-specific firewall rules... 56 3.2.7 Downloading the configuration to the security module... 58 3.2.8 Logging in on the Web page... 59 3.2.9 Test the firewall function (ping test)... 59 3.3 CP x43-1 Advanced as firewall and NAT router... 61 3.3.1 Overview... 61 3.3.2 Make the IP settings for the PCs... 63 3.3.3 Create the project and module... 64 3.3.4 Configuring the NAT router mode... 65 3.3.5 Configure the firewall... 67 3.3.6 Downloading the configuration to the security module... 69 3.3.7 Test the NAT router function (ping test)... 70 3.4 Example with a CP 1628 and CP x43-1... 72 3.4.1 Overview... 72 3.4.2 Make the IP settings for the PCs... 73 3.4.3 Create the project and module... 74 3.4.4 Configure the firewall... 75 3.4.5 Downloading the configuration to the security module... 76 3.4.6 Test the firewall function (ping test)... 77 4 Configuring a VPN tunnel... 79 4.1 VPN tunnel between SCALANCE S and SCALANCE S... 79 4.1.1 Overview... 79 4.1.2 Set up SCALANCE S and the network... 81 4.1.3 Make the IP settings for the PCs... 82 4.1.4 Create the project and modules... 83 4.1.5 Configuring a tunnel connection... 85 4.1.6 Download the configuration to the SCALANCE S module... 85 4.1.7 Test the tunnel function (ping test)... 86 4.2 VPN tunnel between CP 1628 and CP x43-1... 89 4.2.1 Overview... 89 4.2.2 Make the IP settings for the PCs... 90 4.2.3 Create the project and modules... 91 4.2.4 Configuring a tunnel connection... 92 4.2.5 Downloading the configuration to the security module... 93 4.2.6 Test the tunnel function (ping test)... 93 4.3 VPN tunnel between SCALANCE S CP... 96 4.3.1 Overview... 96 4.3.2 Setting up the security module and network... 98 4.3.3 Make the IP settings for the PCs... 98 4.3.4 Create the project and modules... 99 4.3.5 Configuring a tunnel connection... 100 4.3.6 Downloading the configuration to the security module... 101 4.3.7 Test the tunnel function (ping test)... 102 4.4 VPN tunnel between all security products... 104 4.4.1 Overview... 104 4.4.2 Make the IP settings for the PCs... 106 4.4.3 Create the project and modules... 107 4.4.4 Configuring a tunnel connection... 109 4 Getting Started, 04/2012, C79000-G8976-C287-01

Table of contents 4.4.5 Loading the configuration on the security module and saving the SOFTNET Security Client configuration...110 4.4.6 Set up a tunnel with the SOFTNET Security Client...111 4.4.7 Test the tunnel function (ping test)...113 5 Configuring remote access via a VPN tunnel... 115 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client...115 5.1.1 Overview...115 5.1.2 Set up SCALANCE S and the network...117 5.1.3 Make the IP settings for the PCs...118 5.1.4 Create the project and modules...119 5.1.5 Configuring a tunnel connection...124 5.1.6 Loading the configuration on the SCALANCE S and saving the SOFTNET Security Client configuration...125 5.1.7 Set up a tunnel with the SOFTNET Security Client...126 5.1.8 Test the tunnel function (ping test)...128 5.2 Remote access - VPN tunnel example with CP x43-1 Advanced and SOFTNET Security Client...130 5.2.1 Overview...130 5.2.2 Make the IP settings for the PCs...132 5.2.3 Create the project and modules...133 5.2.4 Configuring a tunnel connection...135 5.2.5 Loading the configuration on the security module and saving the SOFTNET Security Client configuration...136 5.2.6 Set up a tunnel with the SOFTNET Security Client...137 5.2.7 Test the tunnel function (ping test)...139 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client...141 5.3.1 Overview...141 5.3.2 Setting up SCALANCE M and network...143 5.3.3 Make the IP settings for the PCs...143 5.3.4 Create the project and modules...145 5.3.5 Configuring a tunnel connection...146 5.3.6 Saving the configuration of the SCALANCE M and the SOFTNET Security Client...149 5.3.7 Configuring the SCALANCE M...150 5.3.8 Setting up a tunnel with the SOFTNET Security Client...157 5.3.9 Test the tunnel function (ping test)...159 Getting Started, 04/2012, C79000-G8976-C287-01 5

Table of contents 6 Getting Started, 04/2012, C79000-G8976-C287-01

Preface 1 Getting results fast with Getting Started Based on a simple test network, this Getting Started shows you how to work with security modules S and the Security Configuration Tool. You will soon see that you can implement the security functions of security modules in the network without any great project engineering effort. Working through the Getting Started, you will be able to implement the basic functions of the security modules and the SOFTNET security client based on various security examples. IP settings for the Examples Note The IP settings in the examples are freely selected and do not cause any conflicts in the isolated test network. In a real network, you would need to adapt these IP settings to avoid possible address conflicts. This Getting Started applies to the following: Configuration software: STEP 7 classic V5.5 SP2 Hotfix 1 Security Configuration Tool (SCT) as of V3.0 Products: "Security Appliances": SCALANCE S 602 as of V3.0, order number: 6GK5 602-0BA10-2AA3 SCALANCE S 612 as of V3.0, order number: 6GK5 612-0BA10-2AA3 SCALANCE S 623 as of V3.0, order number: 6GK5 623-0BA10-2AA3 SOFTNET Security Client as of V4.0, order number: 6GK1 704-1VW02-0AA0 "Security Integrated" products: CP 343-1 Advanced GX30 as of V3.0, order number: 6GK7 343-1GX31-0XE0 CP 443-1 Advanced GX31 as of V3.0, order number: 6GK7 443-1GX30-0XE0 CP 1628 as of V1.0, order number: 6GK1162-8AA00 SCALANCE M 875 as of V1.0, order number: 6GK5 875-0AA10-1AA2 SINAUT MD741-1 as of 2.x, order number: 6NH9741-1AA00 Getting Started, 04/2012, C79000-G8976-C287-01 7

Preface General terminology "security module" In this documentation, the term "security module" includes the following products: CP 343-1 Advanced GX31, CP 443-1 Advanced GX30, CP 1628, SCALANCE S 602 V3/SCALANCE S 612 V3/SCALANCE S 623 V3. The CPs 343-1 Advanced GX31, and 443-1 Advanced GX30 are simply called CP x43-1. SCALANCE M 875 and SINAUT MD7x are simply called SCALANCE M. If you want to know more You will find further information on the topic of "Industrial Ethernet Security" in the configuration manual "SIMATIC NET - Basics and Application". This explains the entire functionality and the Security Configuration Tool configuration software in greater detail. You will find a current release on the Internet under the following entry ID: 56577508 (http://support.automation.siemens.com/ww/view/en/56577508) You will find hardware descriptions and installation instructions in the documents relating to the individual modules. Global FW Rulesets 8 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in standard mode 2 2.1 Example with a SCALANCE S 2.1.1 Overview In this example, you configure the firewall in the "standard mode" project engineering view. The standard mode includes predefined sets of rules for data traffic. With this configuration, IP traffic can only be initiated from the internal network; only the response is permitted from the external network. Setting up the test network Getting Started, 04/2012, C79000-G8976-C287-01 9

Firewall in standard mode 2.1 Example with a SCALANCE S Internal network - attachment to the internal port of the security module In the test setup, in the internal network, the network node is implemented by one PC connected to the internal port of the security module. PC2: Represents a node in the internal network Security module: SCALANCE S module for protection of the internal network External network - attachment to the external port of the security module The public, external network is connected to the external port of the security module. PC1: PC with the Security Configuration Tool Required devices/components: Use the following components to set up to the network: 1 x SCALANCE S module, (additional option: a suitably installed DIN rail with fittings) 1 x 24 V power supply with cable connector and terminal block plug 1 x PC on which the Security Configuration Tool is installed 1 x PC in the internal network to test the configuration The required network cable, TP cable (twisted pair) complying with the IE FC RJ-45 standard for Industrial Ethernet Overview of the next steps: 10 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in standard mode 2.1 Example with a SCALANCE S 2.1.2 Set up SCALANCE S and the network Follow the steps below: 1. First unpack the SCALANCE S and check that it is undamaged. 2. Connect the power supply to the SCALANCE S. Result: After connecting the power, the Fault LED (F) is lit yellow. WARNING The SCALANCE S is designed for operation with safety extra-low voltage. This means that only safety extra-low voltages (SELV) complying with IEC950/EN60950/ VDE0805 can be connected to the power supply terminals. The power supply unit to supply the SCALANCE S must comply with NEC Class 2 (voltage range 18-32 V, current requirement approx. 250 ma). 3. Now establish the physical network connections by plugging the network cable connectors into the ports being used (RJ-45 jacks): Connect PC2 with port 2 of module 1. Connect PC1 with port 1 of module 1. 4. Now turn on the PCs. NOTICE The Ethernet attachments at port 1 and port 2 are handled differently by the SCALANCE S and must not be swapped over when connecting to the communication network: Port 1 - external network Upper RJ-45 jack, marked red = unprotected network area; Port 2 - Internal Network Lower RJ-45 jack, marked green = network protected by SCALANCE S; If the ports are swapped over, the device loses its protective function. 2.1.3 Make the IP settings for the PCs For the test, the PCs are given the following IP address settings: PC IP address Subnet mask Default gateway PC1 192.168.1.100 255.255.255.0 192.168.1.1 PC2 192.168.2.100 255.255.255.0 192.168.2.1 Getting Started, 04/2012, C79000-G8976-C287-01 11

Firewall in standard mode 2.1 Example with a SCALANCE S Follow the steps below for PC1 and PC2: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. 4. Click the "Properties" button. 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Now enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 12 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in standard mode 2.1 Example with a SCALANCE S 2.1.4 Create the project and module Follow the steps below: 1. Install and start the Security Configuration Tool on PC1. 2. Select the "Project" > "New" menu command. 3. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. 4. Confirm your entries with "OK". Result: A new project is created. The "Selection of a module or software configuration" dialog opens. 5. Configure the product type, module and firmware release. 6. In the "Configuration" area, enter the MAC address in the required format. The MAC address is printed on the front of the SCALANCE S module (see figure). 7. In the "Configuration" area, enter the external IP address (191.0.0.200) and the external subnet mask (255.255.0.0) in the required format and confirm the dialog with "OK". Result: The module will then be displayed in the list of configured modules. 2.1.5 Configure the firewall In standard mode, the firewall can be set simply with predefined sets of rules. You can activate these sets of rules by clicking on them. Follow the steps below: 1. Select the "Module1" row in the content area. 2. Select the "Edit" > "Properties..." menu command. Getting Started, 04/2012, C79000-G8976-C287-01 13

Firewall in standard mode 2.1 Example with a SCALANCE S 3. Select the "Firewall" tab in the displayed dialog. 4. Enable the option shown below: Result: IP traffic is only initiated from the internal network; only the response is permitted from the external network. Access using HTTPS for online diagnostics from PC1 to PC2 is allowed. 5. You should also select the Logging options to record data traffic. 6. Close the dialog with "OK". 7. Save the project with the menu command "Project" > "Save As..." under a meaningful name. 2.1.6 Downloading the configuration to the security module Follow the steps below: 1. Select the module in the content area. 14 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in standard mode 2.1 Example with a SCALANCE S 2. Select the "Transfer" > "To module..." menu command. 3. Start the download with the "Start" button. If the download was completed free of errors, the SCALANCE S module is restarted automatically and the new configuration activated. Result: SCALANCE S in productive operation The SCALANCE S is now in productive operation. This mode is indicated by the Fault LED being lit green. Commissioning the configuration is now complete and the SCALANCE S is now protecting the internal network (PC2) with the firewall. 2.1.7 Test the firewall function (ping test) How can you test the configured function? The function can be tested as described below using a ping command. As an alternative, you can also use other communication programs to test the configuration. NOTICE In Windows, the firewall can be set so that as default the ping commands do not pass through. If necessary, you will need to enable the ICMP services of the type "Request" and "Response". Test phase 1 Now test the function of the firewall configuration, first with allowed outgoing IP data traffic as follows: 1. On PC2, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". Getting Started, 04/2012, C79000-G8976-C287-01 15

Firewall in standard mode 2.1 Example with a SCALANCE S 2. Enter the Ping command from PC2 to PC1 (IP address 191.0.0.1) In the command line of the "Command Prompt" window, enter the command "ping 191.0.0.1" at the cursor position. You will then receive the following message (positive reply from PC1): Result If the IP packets have reached PC1, the "Ping statistics for 191.0.01" display the following: Sent = 4 Received = 4 Lost = 0 (0% loss) Due to the configuration, the ping packets can pass from the internal network to the external network. The PC in the external network has replied to the ping packets. Due to the "stateful inspection" function of the firewall, the reply packets arriving from the external network are automatically passed into the internal network. Test phase 2 Now test the function of the firewall configuration with blocked outgoing IP data traffic as follows: 1. Now reopen the firewall dialog as described above. 2. Deselect the "Allow IP traffic" > "External -> Internal" " option in the "Firewall" tab. Close the dialog with "OK". 16 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in standard mode 2.1 Example with a SCALANCE S 3. Now download the modified configuration to the security module again. 4. If the downloading is completed free of errors, enter the same ping command ("ping 191.0.0.1") in the Command Prompt window of PC2. You will then receive the following message (no reply from PC1): Result The IP packets from PC2 cannot reach PC1 since the data traffic from the "internal network" (PC2) to the "external network" (PC1) is not allowed. This is shown in the "Ping statistics for 191.0.0.1" as follows: Sent = 4 Received = 0 Lost = 4 (100% loss) 2.1.8 Log firewall data traffic On the security modules, the local logging of system, audit and packet filter events is enabled as default. While working through this example, you also activated the logging options for the relevant data traffic when configuring the firewall. You can display the recorded events in online mode. Follow the steps below: 1. On PC1, change to online mode in the Security Configuration Tool with the "View" > "Online" menu command. 2. Select the "Edit" > "Online Diagnostics..." menu command. 3. Select the "Packet Filter Log" tab. 4. Click the "Start Reading" button. 5. Acknowledge the displayed dialog with OK. Result: The log entries are read from the security module and displayed here. Getting Started, 04/2012, C79000-G8976-C287-01 17

Firewall in standard mode 2.2 Example with a CP x43-1 Advanced 2.2 Example with a CP x43-1 Advanced 2.2.1 Overview In this example, you configure the firewall in the "standard mode" project engineering view. The standard mode includes predefined sets of rules for data traffic. With this configuration, IP traffic can only be initiated from the internal network and from the station; only the response is permitted from the external network. Setting up the test network Internal network - attachment to an internal port of the security module In the test setup, in the internal network, the network node is implemented by one PC connected to an internal port of the security module. PC2: Represents a node in the internal network Security module: CP x43-1 to protect the internal network External network - attachment to the external port of the security module The public, external network is connected to the external port of the security module. PC1: PC with the Security Configuration Tool and STEP 7 18 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in standard mode 2.2 Example with a CP x43-1 Advanced Requirement: To be able to work through the example, the following requirements must be met: The Security Configuration Tool configuration software is installed on PC1. STEP 7 is installed on PC1 and a STEP 7 project with the security module has already been created. The IP address of PC1 must be in the same subnet as the gigabit address of the security module. CP x43-1 has the following settings in STEP 7: Gigabit IP address: 140.0.0.1, subnet mask: 255.255.0.0 PROFINET IP address: 192.0.0.1, subnet mask: 255.255.255.0 Overview of the next steps: 2.2.2 Make the IP settings for the PCs For the test, the PCs are given the following IP address settings: PC IP address Subnet mask Default gateway PC1 140.0.0.2 255.255.0.0 140.0.0.1 PC2 192.0.0.2 255.255.255.0 192.0.0.1 Follow the steps below for PC1 and PC2: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. Getting Started, 04/2012, C79000-G8976-C287-01 19

Firewall in standard mode 2.2 Example with a CP x43-1 Advanced 4. Click the "Properties" button. 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Now enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 2.2.3 Create the project and module Follow the steps below: 1. In the "Security" tab of the object properties, enable the "Enable security" check box. 20 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in standard mode 2.2 Example with a CP x43-1 Advanced 2. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. Confirm your entries with "OK". Result: A new security project is created. 3. In HW Config, open the Security Configuration Tool with the "Edit" > "Security Configuration Tool" menu command. Result: The security module will then be displayed in the list of configured modules. 2.2.4 Configure the firewall In standard mode, the firewall can be set simply with predefined sets of rules. You can activate these sets of rules by clicking on them. Follow the steps below: 1. In the contents area of the Security Configuration Tool, select the row with the CP. 2. Select the "Edit" > "Properties..." menu command. 3. Select the "Firewall" tab in the displayed dialog. 4. Select the "Enable firewall" check box. Getting Started, 04/2012, C79000-G8976-C287-01 21

Firewall in standard mode 2.2 Example with a CP x43-1 Advanced 5. Enable the options shown below: Result: IP traffic can only be initiated from the internal network and from the station; only the response is permitted from the external network. Access using HTTPS for online diagnostics from PC1 to PC2 is allowed. 6. You should also select the Logging options to record the relevant data traffic. 7. Close the dialog with "OK". 2.2.5 Downloading the configuration to the security module Follow the steps below: 1. Close the Security Configuration Tool. 22 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in standard mode 2.2 Example with a CP x43-1 Advanced 2. In HW Config, select the "Station" > "Save and Compile" menu. 3. Download the new configuration to the security module using the "PLC" > "Download to Module" menu. If the download was completed free of errors, the security module restarts automatically and the new configuration is activated. Result: Security module in productive mode The commissioning of the configuration is complete. The security module protects the internal network (PC2). Outgoing IP traffic from the internal to the external network is allowed. 2.2.6 Test the firewall function (ping test) How can you test the configured function? The function can be tested as described below using a ping command. As an alternative, you can also use other communication programs to test the configuration. NOTICE In Windows, the firewall can be set so that as default the ping commands do not pass through. If necessary, you will need to enable the ICMP services of the type "Request" and "Response". Test phase 1 Now test the function of the firewall configuration, first with allowed outgoing IP data traffic as follows: 1. On PC2, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". Getting Started, 04/2012, C79000-G8976-C287-01 23

Firewall in standard mode 2.2 Example with a CP x43-1 Advanced 2. Enter the Ping command from PC2 to PC1 (IP address 140.0.0.2) In the command line of the "Command Prompt" window, enter the command "ping 140.0.0.2" at the cursor position. You will then receive the following message (positive reply from PC1): Result If the IP packets have reached PC1, the "Ping statistics for 140.0.0.2" display the following: Sent = 4 Received = 4 Lost = 0 (0% loss) Due to the configuration, the ping packets can pass from the internal network to the external network. The PC in the external network has replied to the ping packets. Due to the "stateful inspection" function of the firewall, the reply packets arriving from the external network are automatically passed into the internal network. Test phase 2 Now test the function of the firewall configuration with blocked outgoing IP data traffic as follows: 1. Now reopen the firewall dialog as described above. 2. Deselect the "Allow IP traffic" > "Station => External / Internal => External" option in the "Firewall" tab. Close the dialog with "OK". 24 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in standard mode 2.2 Example with a CP x43-1 Advanced 3. Now download the modified configuration to the security module again. 4. If the downloading is completed free of errors, enter the same ping command ("ping 140.0.0.2") in the Command Prompt window of PC2. You will then receive the following message (no reply from PC1): Result The IP packets from PC2 cannot reach PC1 since the data traffic from the "internal network" (PC2) and the station to the "external network" (PC1) is not allowed. This is shown in the "Ping statistics for 140.0.0.2" as follows: Sent = 4 Received = 0 Lost = 4 (100% loss) 2.2.7 Log firewall data traffic On the security modules, the local logging of system, audit and packet filter events is enabled as default. While working through this example, you also activated the logging options for the relevant data traffic when configuring the firewall. You can display the recorded events in online mode. Follow the steps below: 1. On PC1, change to online mode in the Security Configuration Tool with the "View" > "Online" menu command. 2. Select the "Edit" > "Online Diagnostics..." menu command. 3. Select the "Packet Filter Log" tab. 4. Click the "Start Reading" button. 5. Acknowledge the displayed dialog with OK. Result: The log entries are read from the security module and displayed here. Getting Started, 04/2012, C79000-G8976-C287-01 25

Firewall in standard mode 2.3 Example with a CP 1628 2.3 Example with a CP 1628 2.3.1 Overview In this example, you configure the firewall in the "standard mode" project engineering view. The standard mode includes predefined sets of rules for data traffic. With this configuration, IP traffic can only be initiated from PC2; only the response is permitted from the external network. Setting up the test network PC1: PC with the Security Configuration Tool and STEP 7 PC2 and security module: PC with CP 1628 Requirement: To be able to work through the example, the following requirements must be met: The Security Configuration Tool configuration software is installed on PC1. STEP 7 is installed on PC1 and a STEP 7 project with the security module has already been created. PC2 with the CP 1628 has the following settings in STEP 7: IP address Industrial Ethernet: 192.168.0.5, subnet mask: 255.255.255.0 The NDIS IP address is set up in the IP settings of the PC. 26 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in standard mode 2.3 Example with a CP 1628 Overview of the next steps: 2.3.2 Make the IP settings for the PCs For the test, the PCs are given the following IP address settings: PC IP address Subnet mask PC1 192.168.0.101 255.255.255.0 PC2 NDIS: 192.168.0.105 255.255.255.0 Follow the steps below for PC1 and PC2: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. Getting Started, 04/2012, C79000-G8976-C287-01 27

Firewall in standard mode 2.3 Example with a CP 1628 4. Click the "Properties" button. 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Now enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 28 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in standard mode 2.3 Example with a CP 1628 2.3.3 Create the project and module Follow the steps below: 1. In the "Security" tab of the object properties, enable the "Enable security" check box. 2. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. Confirm your entries with "OK". Result: A new security project is created. 3. In HW Config, open the Security Configuration Tool with the "Edit" > "Security Configuration Tool" menu command. Result: The security module will then be displayed in the list of configured modules. 2.3.4 Configure the firewall In standard mode, the firewall can be set simply with predefined sets of rules. You can activate these sets of rules by clicking on them. Follow the steps below: 1. In the contents area of the Security Configuration Tool, select the row with the CP 1628. 2. Select the "Edit" > "Properties..." menu command. 3. Select the "Firewall" tab in the displayed dialog. Getting Started, 04/2012, C79000-G8976-C287-01 29

Firewall in standard mode 2.3 Example with a CP 1628 4. Enable the options shown below: Result: The IP traffic can now be initiated by PC2; only the reply from PC1 is allowed. Access using HTTPS for online diagnostics from PC1 to PC2 is allowed. 5. You should also select the Logging options to record data traffic. 6. Close the dialog with "OK". 30 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in standard mode 2.3 Example with a CP 1628 2.3.5 Downloading the configuration to the security module Follow the steps below: 1. Close the Security Configuration Tool. 2. In HW Config, select the "Station" > "Save and Compile" menu. 3. Download the new configuration to the security module using the "PLC" > "Download to Module" menu. If the download was completed free of errors, the security module restarts automatically and the new configuration is activated. Result: Security module in productive mode The commissioning of the configuration is complete. The security module protects PC2. Outgoing IP traffic from the external network to PC2 is allowed. 2.3.6 Test the firewall function (ping test) How can you test the configured function? The function can be tested as described below using a ping command. As an alternative, you can also use other communication programs to test the configuration. NOTICE In Windows, the firewall can be set so that as default the ping commands do not pass through. If necessary, you will need to enable the ICMP services of the type "Request" and "Response". Test phase 1 Now test the function of the firewall configuration, first with allowed outgoing IP data traffic as follows: 1. On PC2, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". Getting Started, 04/2012, C79000-G8976-C287-01 31

Firewall in standard mode 2.3 Example with a CP 1628 2. Enter the ping command from PC2 to PC1 (IP address 192.168.0.101) In the command line of the "Command Prompt" window, enter the command "ping 192.168.0.101" at the cursor position. You will then receive the following message (positive reply from PC1): Result If the IP packets have reached PC1, the "Ping statistics for 192.168.0.101" display the following: Sent = 4 Received = 4 Lost = 0 (0% loss) Due to the configuration, the ping packets from PC2 can reach PC1. PC1 has replied to the ping frames. Due to the "stateful inspection" function of the firewall, the reply packets arriving from PC1 are automatically forwarded to PC2. 2.3.7 Log firewall data traffic On the security modules, the local logging of system, audit and packet filter events is enabled as default. While working through this example, you also activated the logging options for the relevant data traffic when configuring the firewall. You can display the recorded events in online mode. Follow the steps below: 1. On PC1, change to online mode in the Security Configuration Tool with the "View" > "Online" menu command. 2. Select the "Edit" > "Online Diagnostics..." menu command. 3. Select the "Packet Filter Log" tab. 32 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in standard mode 2.3 Example with a CP 1628 4. Click the "Start Reading" button. 5. Acknowledge the displayed dialog with OK. Result: The log entries are read from the security module and displayed here. Getting Started, 04/2012, C79000-G8976-C287-01 33

Firewall in standard mode 2.3 Example with a CP 1628 34 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3 3.1 SCALANCE S as firewall and NAT router 3.1.1 Overview In this example, you configure the NAT router mode. You configure in the "advanced mode" configuration view. With this configuration, you have the situation that all the packets sent from the internal subnet to the PC1 node in the external network are allowed to pass the firewall. The packets are forwarded to the outside with an IP address translated to the IP address of the security module and with a dynamically assigned port number. Only the replies to these packets is allowed to pass from the external network. Setting up the test network Getting Started, 04/2012, C79000-G8976-C287-01 35

Firewall in advanced mode 3.1 SCALANCE S as firewall and NAT router Internal network - attachment to the internal port of the security module In the test setup, in the internal network, each network node is implemented by one PC connected to the internal port of the security module. PC2: Represents a node in the internal network Security module: SCALANCE S module for protection of the internal network External network - attachment to the external port of the security module The public, external network is connected to the external port of the security module. PC1: PC with the Security Configuration Tool Required devices/components: Use the following components to set up to the network: 1 x SCALANCE S module, (additional option: a suitably installed DIN rail with fittings); 1 x 24 V power supply with cable connector and terminal block plug; 1 x PC on which the Security Configuration Tool is installed; 1 x PC in the internal network to test the configuration; The required network cable, TP cable (twisted pair) complying with the IE FC RJ-45 standard for Industrial Ethernet. Overview of the next steps: 36 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.1 SCALANCE S as firewall and NAT router 3.1.2 Set up SCALANCE S and the network Follow the steps below: 1. First unpack the SCALANCE S and check that it is undamaged. 2. Connect the power supply to the SCALANCE S. Result: After connecting the power, the Fault LED (F) is lit yellow. WARNING The SCALANCE S is designed for operation with safety extra-low voltage. This means that only safety extra-low voltages (SELV) complying with IEC950/EN60950/ VDE0805 can be connected to the power supply terminals. The power supply unit to supply the SCALANCE S must comply with NEC Class 2 (voltage range 18-32 V, current requirement approx. 250 ma). 3. Now establish the physical network connections by plugging the network cable connectors into the ports being used (RJ-45 jacks): Connect PC2 with port 2 of module 1. Connect PC1 with port 1 of module 1. 4. Now turn on the PCs. NOTICE The Ethernet attachments at port 1 and port 2 are handled differently by the SCALANCE S and must not be swapped over when connecting to the communication network: Port 1 - External Network Upper RJ-45 jack, marked red = unprotected network area; Port 2 - Internal Network Lower RJ-45 jack, marked green = network protected by SCALANCE S; If the ports are swapped over, the device loses its protective function. 3.1.3 Make the IP settings for the PCs For the test, the PCs are given the following IP address settings: PC IP address Subnet mask Default gateway PC1 192.168.10.100 255.255.255.0 192.168.10.1 PC2 172.10.10.100 255.255.255.0 172.10.10.1 For standard gateway, specify the IP addresses that will be assigned to the security module for the internal and external interface in the subsequent project engineering: Getting Started, 04/2012, C79000-G8976-C287-01 37

Firewall in advanced mode 3.1 SCALANCE S as firewall and NAT router PC1 uses the external interface. PC2 uses the internal interface. Follow the steps below for PC1 and PC2: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. 4. Click the "Properties" button. 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 38 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.1 SCALANCE S as firewall and NAT router 3.1.4 Create the project and module Follow the steps below: 1. Install and start the Security Configuration Tool on PC1. 2. Select the "Project" > "New" menu command. 3. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. Confirm your entries with "OK". Result: A new project is created. The "Selection of a module or software configuration" dialog opens. 4. Configure the product type, module and firmware release. 5. In the "Configuration" area, enter the MAC address in the required format. The MAC address is printed on the front of the SCALANCE S module (see figure). Getting Started, 04/2012, C79000-G8976-C287-01 39

Firewall in advanced mode 3.1 SCALANCE S as firewall and NAT router 6. In the "Configuration" area, enter the external IP address (192.168.10.1) and the external subnet mask (255.255.255.0) in the required format and confirm the dialog with "OK". Result: The module will then be displayed in the list of configured modules. 40 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.1 SCALANCE S as firewall and NAT router 3.1.5 Configuring the NAT router mode The common use case in which all internal nodes send packets to the external network and keep their IP addresses hidden by the NAT functionality is preconfigured on the security module. Below, you will see how to enable this behavior. Enabling router mode - follow the steps below: 1. Change the configuration view to advanced mode with the menu command "View" > "Advanced mode". 2. Double-click on the security module. Result: The "Interfaces" tab is opened. 3. Select the "Routing mode" for "Interface routing". 4. In the "Internal (P2)" input area, you add the address information for the interface of the SCALANCE S to the internal subnet: IP address: 172.10.10.1 Subnet mask: 255.255.255.0 Getting Started, 04/2012, C79000-G8976-C287-01 41

Firewall in advanced mode 3.1 SCALANCE S as firewall and NAT router To enable NAT router mode for internal nodes - follow the steps below: Configure the required address translation for NAT mode. 1. Select the "NAT" tab. 2. Select the options "NAT active" and "Allow all internal nodes access to the outside" in the "NAT" input area. An entry has been added to the end of the address translation list in the "NAT" input area. The "*" entry in the "internal IP address" column stands for all nodes in the internal network. 3. Close the dialog with "OK". Now set the firewall so that the frames are allowed to pass from internal to external. 42 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.1 SCALANCE S as firewall and NAT router 3.1.6 Configure the firewall In this example, define a set of rules that allows the traffic from the internal node (PC2) to the node in the external network (PC1). You will also see how to define a global set of rules and assign it to a module. Once the rule set has been defined, it can be assigned to other modules in the same project using dragand-drop. To define a global rule set, follow the steps below: 1. Expand the "Global firewall rule sets" in the navigation area and select "Firewall IP rule sets". 2. Select the "Insert rule set" entry in the shortcut menu. Getting Started, 04/2012, C79000-G8976-C287-01 43

Firewall in advanced mode 3.1 SCALANCE S as firewall and NAT router 3. Enter a rule set in the dialog as shown below: 4. In the row of the new rule set, select the "Log" check box. Result: Packet filter logging is enabled. Packets to which the defined rule is applied are logged. You will use this log in the example shown here in the final test of the configuration. 5. Close the dialog with "OK". To assign a global rule set, follow the steps below: 1. Select the "Module1" object in the navigation area and holding down the left mouse button, drag it to the newly created global firewall rule set. 44 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.1 SCALANCE S as firewall and NAT router 2. You can check the assignment by reopening the dialog for setting the module properties and selecting the "Firewall" tab. The global firewall rule was saved in the "IP rules" tab. 3. If you click the "Expand rule sets" button, you can view the rule set in detail. Result: The offline configuration is complete. 3.1.7 Downloading the configuration to the security module Follow the steps below: 1. Select the module in the content area. Getting Started, 04/2012, C79000-G8976-C287-01 45

Firewall in advanced mode 3.1 SCALANCE S as firewall and NAT router 2. Select the "Transfer" > "To module..." menu command. 3. Start the download with the "Start" button. If the download was completed free of errors, the SCALANCE S module is restarted automatically and the new configuration activated. Result: SCALANCE S in productive operation The SCALANCE S is now in productive operation. This mode is indicated by the Fault display being lit green. 3.1.8 Test the NAT router function (ping test) How can you test the configured function? The function can be tested as described below using a ping command. To be able to recognize the effects of the NAT router mode, use the packet filter logging on the firewall interface. A reminder: In the definition of the global firewall rule, you have already enabled the packet filter logging option. Note on the ping command: As an alternative, you can also use other communication programs to test the configuration. NOTICE In Windows, the firewall can be set so that as default the ping commands do not pass through. If necessary, you will need to enable the ICMP services of the type "Request" and "Response". 46 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.1 SCALANCE S as firewall and NAT router Test part 1 - sending the ping command Now test the function of the NAT router mode in IP data traffic from internal to external as follows: 1. On PC2, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". 2. Enter the ping command from PC2 to PC1 (IP address 192.168.10.100) In the command line of the "Command Prompt" window, enter the command "ping 192.168.10.100" at the cursor position. You will then receive the following message (positive reply from PC1): Test part 2 - evaluating the result 1. Change to online mode in the Security Configuration Tool with the "View" > "Online" menu command. 2. Select the module you want to edit and then select the menu command "Edit" > "Online diagnostics" to open the online dialog. 3. Select the "Packet Filter Log" tab. Getting Started, 04/2012, C79000-G8976-C287-01 47

Firewall in advanced mode 3.1 SCALANCE S as firewall and NAT router 4. Click the "Start Reading" button. 5. Acknowledge the displayed dialog with "OK". Result: The log entries are read from the security module and displayed here. Result You will see the following in the log output: Output row 1 The IP addresses of the packets from PC2 to PC1 are displayed on the interface to the external network with the external IP address of the security module (192.168.10.01). This matches the expected address conversion (note: the additional port assignment is not shown here). Output row 2 The reply packets are displayed with the destination address of the node in the internal subnet (PC2: 172.10.10.100). You can see that the address conversion had already taken place before the reply packet passed the firewall. 48 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.2 Creating user-specific firewall rules 3.2 Creating user-specific firewall rules 3.2.1 Overview In this example, you create a user-specific firewall rule and assign it to a user. You configure in the "advanced mode" configuration view. The created user is allowed to access PC2 in the internal network from PC1 in the external network. For other users, access remains blocked. Setting up the test network Internal network - attachment to the internal port of the security module In the test setup, in the internal network, each network node is implemented by one PC connected to the internal port of the security module. PC2: Represents a node in the internal network Security module: SCALANCE S module for protection of the internal network External network - attachment to the external port of the security module The public, external network is connected to the external port of the security module. PC1: PC with the Security Configuration Tool Getting Started, 04/2012, C79000-G8976-C287-01 49

Firewall in advanced mode 3.2 Creating user-specific firewall rules Required devices/components: Use the following components to set up to the network: 1 x SCALANCE S module, (additional option: a suitably installed DIN rail with fittings); 1 x 24 V power supply with cable connector and terminal block plug; 1 x PC on which the Security Configuration Tool is installed; 1 x PC in the internal network to test the configuration; The required network cable, TP cable (twisted pair) complying with the IE FC RJ-45 standard for Industrial Ethernet. Overview of the next steps: 3.2.2 Set up SCALANCE S and the network Follow the steps below: 1. First unpack the SCALANCE S and check that it is undamaged. 2. Connect the power supply to the SCALANCE S. Result: After connecting the power, the Fault LED (F) is lit yellow. 50 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.2 Creating user-specific firewall rules WARNING The SCALANCE S is designed for operation with safety extra-low voltage. This means that only safety extra-low voltages (SELV) complying with IEC950/EN60950/ VDE0805 can be connected to the power supply terminals. The power supply unit to supply the SCALANCE S must comply with NEC Class 2 (voltage range 18-32 V, current requirement approx. 250 ma). 3. Now establish the physical network connections by plugging the network cable connectors into the ports being used (RJ-45 jacks): Connect PC2 with port 2 of module 1. Connect PC1 with port 1 of module 1. 4. Now turn on the PCs. NOTICE The Ethernet attachments at port 1 and port 2 are handled differently by the SCALANCE S and must not be swapped over when connecting to the communication network: Port 1 - external network Upper RJ-45 jack, marked red = unprotected network area; Port 2 - Internal Network Lower RJ-45 jack, marked green = network protected by SCALANCE S; If the ports are swapped over, the device loses its protective function. 3.2.3 Make the IP settings for the PCs For the test, the PCs are given the following IP address settings: PC IP address Subnet mask Default gateway PC1 192.168.1.100 255.255.255.0 192.168.1.1 PC2 192.168.2.100 255.255.255.0 192.168.2.1 Follow the steps below for PC1 and PC2: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. Getting Started, 04/2012, C79000-G8976-C287-01 51

Firewall in advanced mode 3.2 Creating user-specific firewall rules 4. Click the "Properties" button. 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Now enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 3.2.4 Create the project and module Follow the steps below: 1. Install and start the Security Configuration Tool on PC1. 2. Select the "Project" > "New" menu command. 3. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. Confirm your entries with "OK". Result: A new project is created. The "Selection of a module or software configuration" dialog opens. 4. Configure the product type, module and firmware release. 52 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.2 Creating user-specific firewall rules 5. In the "Configuration" area, enter the MAC address in the required format. The MAC address is printed on the front of the SCALANCE S module (see figure). 6. In the "Configuration" area, enter the external IP address (192.168.1.1) and the external subnet mask (255.255.255.0) in the required format. Getting Started, 04/2012, C79000-G8976-C287-01 53

Firewall in advanced mode 3.2 Creating user-specific firewall rules 7. Enable the "Enable routing" option. 8. Enter the internal IP address (192.168.2.1) and the internal subnet mask (255.255.255.0) in the required format and confirm the dialog with "OK". Result: The module will then be displayed in the list of configured modules. 54 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.2 Creating user-specific firewall rules 3.2.5 Creating remote access users Creating a remote access user 1. Select the "Options" > "User management" menu command. 2. Click the "Add" button. 3. Enter a new user with the following data: 4. Close the dialog with "OK". Getting Started, 04/2012, C79000-G8976-C287-01 55

Firewall in advanced mode 3.2 Creating user-specific firewall rules 3.2.6 Creating and assigning user-specific firewall rules How to access this function 1. Change the configuration view to advanced mode with the menu command "View" > "Advanced mode". 2. Select the "User-specific IP rule sets" object in the navigation area. 3. Select the "Insert rule set" entry in the shortcut menu. 56 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.2 Creating user-specific firewall rules 4. Enter a rule set in the dialog as shown below: 5. From the "Available users" list, select the "Remote" user and click the "Add" button. To assign a rule set, follow the steps below: 1. Select the security module in the navigation area and holding down the left mouse button, drag it to the newly created user-specific firewall rule set. Getting Started, 04/2012, C79000-G8976-C287-01 57

Firewall in advanced mode 3.2 Creating user-specific firewall rules 2. You can check the assignment by reopening the dialog for setting the module properties and selecting the "Firewall" tab. The user-specific firewall rule was saved in the "IP rules" tab. 3. If you click the "Expand rule sets" button, you can view the rule set in detail. Result: The offline configuration is complete. 3.2.7 Downloading the configuration to the security module Follow the steps below: 1. Select the module in the content area. 2. Select the "Transfer" > "To module..." menu command. 3. Start the download with the "Start" button. If the download was completed free of errors, the SCALANCE S module is restarted automatically and the new configuration activated. Result: SCALANCE S in productive operation The SCALANCE S is now in productive operation. This mode is indicated by the Fault display being lit green. 58 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.2 Creating user-specific firewall rules 3.2.8 Logging in on the Web page Logging on via Web page 1. In the Web browser of PC1, enter the address "https://192.168.1.1". 2. In the following window, enter the user name "Remote" and the corresponding password. 3. The predefined firewall rule set is enabled for the "Remote" user. Access from PC1 in the external network to PC2 in the internal network is allowed. 3.2.9 Test the firewall function (ping test) How can you test the configured function? The function can be tested as described below using a ping command. As an alternative, you can also use other communication programs to test the configuration. NOTICE In Windows, the firewall can be set so that as default the ping commands do not pass through. If necessary, you will need to enable the ICMP services of the type "Request" and "Response". Getting Started, 04/2012, C79000-G8976-C287-01 59

Firewall in advanced mode 3.2 Creating user-specific firewall rules Testing Now test the function of the firewall configuration as follows: 1. On PC1, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". 2. Enter the ping command from PC1 to PC2 (IP address 192.168.2.100) In the command line of the "Command Prompt" window, enter the command "ping 192.168.2.100" at the cursor position: You will then receive the following message (positive reply from PC2): Result If the IP packets have reached PC1, the "Ping statistics for 192.168.2.100" display the following: Sent = 4 Received = 4 Lost = 0 (0% loss) Due to the configuration, the ping packets can pass from the external network to the internal network. The PC in the internal network has replied to the ping packets. Due to the "stateful inspection" function of the firewall, the reply packets arriving from the internal network are automatically passed into the external network. 60 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.3 CP x43-1 Advanced as firewall and NAT router 3.3 CP x43-1 Advanced as firewall and NAT router 3.3.1 Overview In this example, you configure the NAT router mode. You configure in the "advanced mode" configuration view. With this configuration, you have the situation that all the packets sent from the internal subnet to the PC1 node in the external network are allowed to pass the firewall. The packets are forwarded to the outside with an IP address translated to the IP address of the security module and with a dynamically assigned port number. Only the replies to these packets is allowed to pass from the external network. You will also see how to define a global set of rules and assign it to a module. Setting up the test network Getting Started, 04/2012, C79000-G8976-C287-01 61

Firewall in advanced mode 3.3 CP x43-1 Advanced as firewall and NAT router Internal network - attachment to the internal port of the security module In the test setup, in the internal network, the network node is implemented by one PC connected to the internal port of the security module. PC2: Represents a node in the internal network Security module: CP x43-1 to protect the internal network External network - attachment to the external port of the security module The public, external network is connected to the external port of the security module. PC1: PC with the Security Configuration Tool and STEP 7 Requirement: To be able to work through the example, the following requirements must be met: The Security Configuration Tool configuration software is installed on PC1. STEP 7 is installed on PC1 and a STEP 7 project with the security module has already been created. The IP address of PC1 must be in the same subnet as the gigabit address of the security module. CP x43-1 has the following settings in STEP 7: Gigabit IP address: 140.0.0.1, subnet mask: 255.255.0.0 PROFINET IP address: 192.0.0.1, subnet mask: 255.255.255.0 Overview of the next steps: 62 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.3 CP x43-1 Advanced as firewall and NAT router 3.3.2 Make the IP settings for the PCs For the test, the PCs are given the following IP address settings: PC IP address Subnet mask Default gateway PC1 140.0.0.2 255.255.0.0 140.0.0.1 PC2 192.0.0.2 255.255.255.0 192.0.0.1 For standard gateway, specify the IP addresses that will be assigned to the security module for the internal and external interface in the subsequent project engineering: PC1 uses the external interface. PC2 uses the internal interface. Follow the steps below for PC1 and PC2: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. Getting Started, 04/2012, C79000-G8976-C287-01 63

Firewall in advanced mode 3.3 CP x43-1 Advanced as firewall and NAT router 4. Click the "Properties" button. 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 3.3.3 Create the project and module Follow the steps below: 1. In the "Security" tab of the object properties, enable the "Enable security" check box. 64 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.3 CP x43-1 Advanced as firewall and NAT router 2. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. Confirm your entries with "OK". Result: A new security project is created. 3. In HW Config, open the Security Configuration Tool with the "Edit" > "Security Configuration Tool" menu command. Result: The security module will then be displayed in the list of configured modules. 3.3.4 Configuring the NAT router mode The common use case in which all internal nodes send packets to the external network and keep their IP addresses hidden by the NAT functionality is preconfigured on the security module. Below, you will see how to enable this behavior. To enable NAT router mode for internal nodes - follow the steps below: Configure the required address translation for NAT mode. 1. Change the configuration view to advanced mode with the menu command "View" > "Advanced mode". 2. Select the "NAT" tab. Getting Started, 04/2012, C79000-G8976-C287-01 65

Firewall in advanced mode 3.3 CP x43-1 Advanced as firewall and NAT router 3. Select the options "NAT active" and "Allow all internal nodes access to the outside" in the "NAT" input area. An entry has been added to the end of the address translation list in the "NAT" input area. The "*" entry in the "internal IP address" column stands for all nodes in the internal network. 4. Close the dialog with "OK". Now set the firewall so that the frames are allowed to pass from internal to external. 66 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.3 CP x43-1 Advanced as firewall and NAT router 3.3.5 Configure the firewall In this example, define a set of rules that allows the traffic from the internal node (PC2) to the node in the external network (PC1). You will also see how to define a global set of rules and assign it to a module. Once the rule set has been defined, it can be assigned to other modules in the same project using dragand-drop. To define a global rule set, follow the steps below: 1. Expand the "Global firewall rule sets" in the navigation area and select "Firewall IP rule sets". 2. Select the "Insert rule set" entry in the shortcut menu. Getting Started, 04/2012, C79000-G8976-C287-01 67

Firewall in advanced mode 3.3 CP x43-1 Advanced as firewall and NAT router 3. Enter a rule set in the dialog as shown below: 4. In the row of the new rule set, select the "Log" check box. Result: Packet filter logging is enabled. Packets to which the defined rule is applied are logged. You will use this log in the example shown here in the final test of the configuration. 5. Close the dialog with "OK". To assign a global rule set, follow the steps below: 1. Select the security module in the navigation area and holding down the left mouse button, drag it to the newly created global firewall rule set. 68 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.3 CP x43-1 Advanced as firewall and NAT router 2. You can check the assignment by reopening the dialog for setting the module properties and selecting the "Firewall" tab. The global firewall rule was saved in the "IP rules" tab. 3. If you click the "Expand rule sets" button, you can view the rule set in detail. 4. Select the "Enable firewall" check box. Result: The offline configuration is complete. 3.3.6 Downloading the configuration to the security module Follow the steps below: 1. Close the Security Configuration Tool. 2. In HW Config, select the "Station" > "Save and Compile" menu. 3. Download the new configuration to the security module using the "PLC" > "Download to Module" menu. If the download was completed free of errors, the security module restarts automatically and the new configuration is activated. Getting Started, 04/2012, C79000-G8976-C287-01 69

Firewall in advanced mode 3.3 CP x43-1 Advanced as firewall and NAT router Result: Security module in productive mode The commissioning of the configuration is complete. The security module protects the internal network (PC2). Outgoing IP traffic from the internal to the external network is allowed. 3.3.7 Test the NAT router function (ping test) How can you test the configured function? The function can be tested as described below using a ping command. To be able to recognize the effects of the NAT router mode, use the packet filter logging on the firewall interface. A reminder: In the definition of the global firewall rule, you have already enabled the packet filter logging option. Note on the ping command: As an alternative, you can also use other communication programs to test the configuration. NOTICE In Windows, the firewall can be set so that as default the ping commands do not pass through. If necessary, you will need to enable the ICMP services of the type "Request" and "Response". Test part 1 - sending the ping command Now test the function of the NAT router mode in IP data traffic from the internal to the external network as follows: 1. On PC2, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". 70 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.3 CP x43-1 Advanced as firewall and NAT router 2. Enter the Ping command from PC2 to PC1 (IP address 140.0.0.2) In the command line of the "Command Prompt" window, enter the command "ping 140.0.0.2" at the cursor position. You will then receive the following message (positive reply from PC1): Test part 2 - evaluating the result 1. Change to online mode in the Security Configuration Tool with the "View" > "Online" menu command. 2. Select the module you want to edit and then select the menu command "Edit" > "Online diagnostics" to open the online dialog. 3. Select the "Packet Filter Log" tab. 4. Click the "Start Reading" button. 5. Acknowledge the displayed dialog with "OK". Result: The log entries are read from the security module and displayed here. Getting Started, 04/2012, C79000-G8976-C287-01 71

Firewall in advanced mode 3.4 Example with a CP 1628 and CP x43-1 3.4 Example with a CP 1628 and CP x43-1 3.4.1 Overview In this example, configuration is in the "Advanced mode" configuration view. With this configuration, you have the situation that all the frames sent by the PC2 node to security module 1 and vice versa are allowed to pass the firewall. In addition to this, PC1 is allowed to access PC2 and security module 1. Setting up the test network Security module 1: CP x43-1 Advanced PC1: PC with the Security Configuration Tool and STEP 7 PC2 with security module 2: PC with CP 1628 Requirement: To be able to work through the example, the following requirements must be met: The Security Configuration Tool configuration software is installed on PC1. STEP 7 is installed on PC1 and a STEP 7 project has already been created. In the STEP 7 project, a specified TCP/IP S7 connection between the CP 1628 (PC2) and CP x43-1 has been created. The CP 1628 is the active node. 72 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.4 Example with a CP 1628 and CP x43-1 CP 1628 has the following settings in STEP 7: IP address Industrial Ethernet: 192.168.0.5, subnet mask: 255.255.255.0 The NDIS IP address is set up in the IP settings of the PC. CP x43-1 has the following settings in STEP 7: Gigabit IP address: 192.168.0.11, subnet mask: 255.255.255.0 PROFINET IP address: 192.168.1.11, subnet mask: 255.255.255.0 Overview of the next steps: 3.4.2 Make the IP settings for the PCs For the test, the PCs are given the following IP address settings: PC IP address Subnet mask PC1 192.168.0.110 255.255.255.0 PC2 NDIS: 192.168.0.105 255.255.255.0 Follow the steps below for PC1 and PC2: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. Getting Started, 04/2012, C79000-G8976-C287-01 73

Firewall in advanced mode 3.4 Example with a CP 1628 and CP x43-1 4. Click the "Properties" button. 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 3.4.3 Create the project and module Follow the steps below: 1. In the "Security" tab of the object properties of the CP 1628, enable the "Enable security" check box. 2. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. Confirm your entries with "OK". Result: A new security project is created. 74 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.4 Example with a CP 1628 and CP x43-1 3. Change to the object properties of the CP x43-1 and select the "Enable security" check box on the "Security" tab. 4. In HW Config, open the Security Configuration Tool with the "Edit" > "Security Configuration Tool" menu command. Result: The security modules will then be displayed in the list of configured modules. 3.4.4 Configure the firewall In this example, define the required firewall rules: To define firewall rules for the CP 1628 - follow the steps below: 1. Select the "CP 1628" row in the content area. 2. Select the "Edit" > "Properties..." menu command. Getting Started, 04/2012, C79000-G8976-C287-01 75

Firewall in advanced mode 3.4 Example with a CP 1628 and CP x43-1 3. Select the "Firewall" tab in the displayed dialog. 4. Enable the option shown below. The first two rules are created automatically for the configured connection. To define firewall rules for the CP x43-1 - follow the steps below: 1. Select the "CP 443-1-Advanced" row in the content area. 2. Select the "Edit" > "Properties..." menu command. 3. Select the "Firewall" tab in the displayed dialog. 4. Enable the option shown below. The first two rules are created automatically for the configured connection. Result: The offline configuration is complete. 3.4.5 Downloading the configuration to the security module Follow the steps below: 1. Close the Security Configuration Tool. 2. In HW Config, select the "Station" > "Save and Compile" menu. 3. Download the new configuration to the security module using the "PLC" > "Download to Module" menu. 4. Perform steps 2-3 for the second CP. 76 Getting Started, 04/2012, C79000-G8976-C287-01

Firewall in advanced mode 3.4 Example with a CP 1628 and CP x43-1 If the download was completed free of errors, the security modules restart automatically and the new configuration is activated. Result: Security module in productive mode The commissioning of the configuration is complete. The security module 2 protects PC2. Outgoing IP traffic from the CP 1628 (security module 2) to the CP x43-1 (security module 1) is permitted. 3.4.6 Test the firewall function (ping test) How can you test the configured function? The function can be tested as described below using a ping command. As an alternative, you can also use other communication programs to test the configuration. NOTICE In Windows, the firewall can be set so that as default the ping commands do not pass through. If necessary, you will need to enable the ICMP services of the type "Request" and "Response". Test phase 1 Now test the function of the firewall configuration, first with allowed outgoing IP data traffic as follows: 1. On PC2, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". 2. Enter the ping command from PC2 to the CP x43-1 (IP address 192.168.0.11) In the command line of the "Command Prompt" window, enter the command "ping 192.168.0.11" at the cursor position. You will then receive the following message (positive reply from CP x43-1): Getting Started, 04/2012, C79000-G8976-C287-01 77

Firewall in advanced mode 3.4 Example with a CP 1628 and CP x43-1 Result If the IP packets have reached the CP x43-1, the "Ping statistics for 192.168.0.11" display the following: Sent = 4 Received = 4 Lost = 0 (0% loss) Due to the configuration, the ping frames from PC2 can reach the CP x43-1. The CP x43-1 has replied to the ping frames. Due to the "stateful inspection" function of the firewall, the reply frames arriving from the CP x43-1 are automatically forwarded to PC2. Test part 2 - evaluating the result 1. Change to online mode in the Security Configuration Tool with the "View" > "Online" menu command. 2. Select the module you want to edit and then select the menu command "Edit" > "Online diagnostics" to open the online dialog. 3. Select the "Packet Filter Log" tab. 4. Click the "Start Reading" button. 5. Acknowledge the displayed dialog with "OK". Result: The log entries are read from the security module and displayed here. 78 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4 4.1 VPN tunnel between SCALANCE S and SCALANCE S 4.1.1 Overview In this example, the tunnel function is configured in the "standard mode" project engineering view. Security module 1 and security module 2 are the two tunnel endpoints for the secure tunnel connection in this example. With this configuration, IP traffic and layer 2 traffic (bridge mode only) is possible only over the established tunnel connections with authorized partners. Setting up the test network Getting Started, 04/2012, C79000-G8976-C287-01 79

Configuring a VPN tunnel 4.1 VPN tunnel between SCALANCE S and SCALANCE S Internal network - attachment to an internal port of the security module In the test setup, in the internal network, each network node is implemented by one PC connected to the internal port of the security module. PC1: Represents a node in internal network 1 PC2: Represents a node in internal network 2 Security module 1: SCALANCE S module (not S602) for protection of the internal network 1 Security module 2: SCALANCE S module (not S602) for protection of the internal network 2 External network - attachment to the external port of the security module The public, external network is connected to the external port of the security module. PC3: PC with the Security Configuration Tool Required devices/components: Use the following components to set up to the network: 2 x SCALANCE S modules (not S602), (optional: one or two suitably installed standard rails with fittings); 1 x or 2 x 24 V power supplies with cable connections and terminal block plugs (both modules can also be operated from a common power supply); 1 x PC on which the "Security Configuration Tool" is installed; 2 x PCs in the internal networks to test the configuration; 1 x network hub or switch to set up the network connections with the two security modules and the PCs/PGs; The required network cable, TP cable (twisted pair) complying with the IE FC RJ-45 standard for Industrial Ethernet. Overview of the next steps: 80 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.1 VPN tunnel between SCALANCE S and SCALANCE S 4.1.2 Set up SCALANCE S and the network Follow the steps outlined below: 1. First unpack the SCALANCE S devices and check that they are undamaged. 2. Connect the power supply to the SCALANCE S. Result: After connecting the power, the Fault LED (F) is lit yellow. WARNING The SCALANCE S is designed for operation with safety extra-low voltage. This means that only safety extra-low voltages (SELV) complying with IEC950/EN60950/ VDE0805 can be connected to the power supply terminals. The power supply unit to supply the SCALANCE S must comply with NEC Class 2 (voltage range 18-32 V, current requirement approx. 250 ma). 1. Now establish the physical network connections by plugging the network cable connectors into the ports being used (RJ-45 jacks): Connect PC1 with port 2 of module 1 and PC2 with port 2 of module 2. Connect port 1 of module 1 and port 1 of module 2 with the hub/switch. Connect PC3 to the hub/switch as well. 2. Now turn on the PCs. NOTICE The Ethernet attachments at port 1 and port 2 are handled differently by the SCALANCE S and must not be swapped over when connecting to the communication network: Port 1 - external network Upper RJ-45 jack, marked red = unprotected network area; Port 2 - internal network Lower RJ-45 jack, marked green = network protected by SCALANCE S; If the ports are swapped over, the device loses its protective function. Getting Started, 04/2012, C79000-G8976-C287-01 81

Configuring a VPN tunnel 4.1 VPN tunnel between SCALANCE S and SCALANCE S 4.1.3 Make the IP settings for the PCs For the test, the PCs are given the following IP address settings: PC IP address Subnet mask PC1 191.0.0.1 255.255.0.0 PC2 191.0.0.2 255.255.0.0 PC3 191.0.0.3 255.255.0.0 Follow the steps below for PC1, PC2, and PC3: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. 4. Click the "Properties" button. 82 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.1 VPN tunnel between SCALANCE S and SCALANCE S 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 4.1.4 Create the project and modules Follow the steps below: 1. Install and start the Security Configuration Tool on PC3. 2. Select the "Project" > "New" menu command. 3. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. Confirm your entries with "OK". Result: A new project is created. The "Selection of a module or software configuration" dialog opens. 4. Configure the product type, module and firmware release and close the dialog with "OK". 5. Create a second module. Result: The modules will then be displayed in the list of configured modules. The name and parameters are assigned automatically based on the default settings of the project. 6. In the navigation area, click on "All Modules" and then on the row with "Module1" in the content area. Getting Started, 04/2012, C79000-G8976-C287-01 83

Configuring a VPN tunnel 4.1 VPN tunnel between SCALANCE S and SCALANCE S 7. Click on the "MAC Address" column and enter the MAC address in the specified format. The MAC address is printed on the front of the SCALANCE S module (see figure). 8. Click in the "IP address ext." column and enter this along with the external subnet mask in the required format: For module 1: IP address: 191.0.0.201 subnet mask: 255.255.0.0 For module 2: IP address: 191.0.0.202 subnet mask: 255.255.0.0 9. Repeat steps 6 to 8 for "Module 2". 84 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.1 VPN tunnel between SCALANCE S and SCALANCE S 4.1.5 Configuring a tunnel connection Two security modules can establish an IPsec tunnel for secure communication when they are assigned to the same group in the project. Follow the steps outlined below: 1. Select "VPN groups" in the navigation area and create a new group with the menu command "Insert" > "Group". The group is automatically given the name "Group1". 2. Select the first security module in the content area and drag it to "Group1" in the navigation area. The module is now assigned to this group (is a member of the group). The color of the key symbol changes from gray to blue. 3. Select the second security module in the content area and drag it to "Group1" in the navigation area. The module is now also assigned to this group. 4. Save the project with the menu command "Project" > "Save As..." under a meaningful name. The configuration of the tunnel connection is complete. 4.1.6 Download the configuration to the SCALANCE S module Follow the steps below: 1. Using the menu command "Transfer" > "To all modules...", open the following dialog: Getting Started, 04/2012, C79000-G8976-C287-01 85

Configuring a VPN tunnel 4.1 VPN tunnel between SCALANCE S and SCALANCE S 2. Select the two modules using the "Select All" button. 3. Start the download with the "Start" button. If the download was completed free of errors, the SCALANCE S is restarted automatically and the new configuration activated. Result: SCALANCE S in productive operation The SCALANCE S is now in productive operation. This mode is indicated by the Fault LED being lit green. The configuration has now been commissioned and the two SCALANCE S modules can now establish a communication tunnel over which network nodes from the two internal networks can communicate. 4.1.7 Test the tunnel function (ping test) How can you test the configured function? The function can be tested as described below using a ping command. As an alternative, you can also use other communication programs to test the configuration. NOTICE In Windows, the firewall can be set so that as default the ping commands do not pass through. If necessary, you will need to enable the ICMP services of the type "Request" and "Response". 86 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.1 VPN tunnel between SCALANCE S and SCALANCE S Test phase 1 Now test the function of the tunnel connection established between PC1 and PC2: 1. On PC1, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". 2. Enter the Ping command from PC1 to PC2 (IP address 191.0.0.2) In the command line of the "Command Prompt" window, enter the command "ping 191.0.0.2" at the cursor position. You will then receive the following message (positive reply from PC2): Result If the IP packets have reached PC2, the "Ping statistics for 191.0.0.2" display the following: Sent = 4 Received = 4 Lost = 0 (0% loss) Since no other communication is permitted, these packets must have been transported through the VPN tunnel. Test phase 2 Repeat the test by sending a ping command from PC3. 1. On PC3, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". Getting Started, 04/2012, C79000-G8976-C287-01 87

Configuring a VPN tunnel 4.1 VPN tunnel between SCALANCE S and SCALANCE S 2. Send the same ping command again ("ping 191.0.0.2") in the Command Prompt window of PC3. You will then receive the following message (no reply from PC2): Result The IP frames from PC3 cannot reach PC2 since neither tunnel communication between these two devices is configured nor is normal IP data traffic permitted. This is shown in the "Ping statistics" for 191.0.0.2 as follows: Sent = 4 Received = 0 Lost = 4 (100% loss) 88 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.2 VPN tunnel between CP 1628 and CP x43-1 4.2 VPN tunnel between CP 1628 and CP x43-1 4.2.1 Overview In this example, the tunnel function is configured in the "standard mode" project engineering view. Security module 1 and security module 2 are the two tunnel endpoints for the secure tunnel connection in this example. With this configuration, IP traffic and layer 2 traffic is possible only over the established tunnel connections with authorized partners of a VPN group. Setting up the test network PC1 with security module 1: PC with CP 1628 PC2: PC with the Security Configuration Tool and STEP 7 Security module 2: CP x43-1 Requirement: To be able to work through the example, the following requirements must be met: The Security Configuration Tool configuration software is installed on PC2. STEP 7 is installed on PC2 and a STEP 7 project has already been created. The CPs have the current time of day and the current date. Getting Started, 04/2012, C79000-G8976-C287-01 89

Configuring a VPN tunnel 4.2 VPN tunnel between CP 1628 and CP x43-1 CP 1628 has the following settings in STEP 7: IP address Industrial Ethernet: 192.168.0.5, subnet mask: 255.255.255.0 The NDIS IP address is set up in the IP settings of the PC. CP x43-1 has the following settings in STEP 7: Gigabit IP address: 192.168.0.11, subnet mask: 255.255.255.0 PROFINET IP address: 192.168.1.11, subnet mask: 255.255.255.0 Overview of the next steps: 4.2.2 Make the IP settings for the PCs For the test, the PCs are given the following IP address settings: PC IP address Subnet mask PC1 NDIS: 192.168.0.105 255.255.255.0 PC2 192.168.0.110 255.255.255.0 Follow the steps below for PC1 and PC2: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. 90 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.2 VPN tunnel between CP 1628 and CP x43-1 4. Click the "Properties" button. 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 4.2.3 Create the project and modules Follow the steps below: 1. In the "Security" tab of the object properties of the CP 1628, enable the "Enable security" check box. 2. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. Confirm your entries with "OK". 3. Result: A new security project is created. Getting Started, 04/2012, C79000-G8976-C287-01 91

Configuring a VPN tunnel 4.2 VPN tunnel between CP 1628 and CP x43-1 4. Change to the object properties of the CP x43-1 and select the "Enable security" check box on the "Security" tab. 5. In HW Config, open the Security Configuration Tool with the "Edit" > "Security Configuration Tool" menu command. Result: The security modules will then be displayed in the list of configured modules. 4.2.4 Configuring a tunnel connection Two security modules can establish an IPsec tunnel for secure communication when they are assigned to the same VPN group in the project. Follow the steps outlined below: 1. Select "VPN groups" in the navigation area and create a new group with the menu command "Insert" > "Group". The group is automatically given the name "Group1". 2. In the navigation area, click "All Modules" and then on the row with the first CP. 3. Drag the CP to "Group1" in the navigation area. The module is now assigned to this group (is a member of the group). The color of the key symbol changes from gray to blue. 4. Select the second CP in the content area and drag it to "Group1" in the navigation area. Result: The second CP is now also assigned to this group and the configuration of the tunnel connection is complete. 92 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.2 VPN tunnel between CP 1628 and CP x43-1 4.2.5 Downloading the configuration to the security module Follow the steps below: 1. Close the Security Configuration Tool. 2. In HW Config, select the "Station" > "Save and Compile" menu. 3. Download the new configuration to the security module using the "PLC" > "Download to Module" menu. 4. Perform steps 2-3 for the second CP. If the download was completed free of errors, the security modules restart automatically and the new configuration is activated. Result: Security modules in productive mode Commissioning the configuration is therefore completed and the two security modules can establish a communications tunnel. 4.2.6 Test the tunnel function (ping test) How can you test the configured function? The function can be tested as described below using a ping command. As an alternative, you can also use other communication programs to test the configuration. NOTICE In Windows, the firewall can be set so that as default the ping commands do not pass through. If necessary, you will need to enable the ICMP services of the type "Request" and "Response". Test phase 1 Now test the function of the tunnel connection established between PC1 and security module 2: 1. On PC1, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". Getting Started, 04/2012, C79000-G8976-C287-01 93

Configuring a VPN tunnel 4.2 VPN tunnel between CP 1628 and CP x43-1 2. Enter the ping command from PC1 to security module 2 (IP address 192.168.0.11) In the command line of the "Command Prompt" window, enter the command "ping 192.168.0.11" at the cursor position. You will then receive the following message (positive reply from security module 2): Result If the IP packets have reached security module 2, the "Ping statistics for 192.168.0.11" display the following: Sent = 4 Received = 4 Lost = 0 (0% loss) Since no other communication is permitted, these packets must have been transported through the VPN tunnel. Test phase 2 Repeat the test by sending a ping command from PC2. 1. On PC2, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". 94 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.2 VPN tunnel between CP 1628 and CP x43-1 2. Send the same ping command again ("ping 192.168.0.11") in the Command Prompt window of PC2. You will then receive the following message (no reply from security module 2): Result The IP frames from PC2 cannot reach security module 2 since neither tunnel communication between these two devices is configured nor is normal IP data traffic permitted. This is shown in the "Ping statistics" for 192.168.0.11 as follows: Sent = 4 Received = 0 Lost = 4 (100% loss) Getting Started, 04/2012, C79000-G8976-C287-01 95

Configuring a VPN tunnel 4.3 VPN tunnel between SCALANCE S and CP 4.3 VPN tunnel between SCALANCE S and CP 4.3.1 Overview In this example, the tunnel function is configured in the "standard mode" project engineering view. Security module 1 and security module 2 are the two tunnel endpoints for the secure tunnel connection in this example. With this configuration, IP traffic and layer 2 traffic is possible only over the established tunnel connections with authorized partners. Setting up the test network 96 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.3 VPN tunnel between SCALANCE S and CP Internal network - attachment to the internal port of the security module In the test setup, in the internal network, each network node is implemented by one PC connected to the internal port of the security module. PC1: Represents a node in internal network 1 PC2: Represents a node in internal network 2 Security module 1: SCALANCE S module (not S602) for protection of the internal network 1 Security module 2: CP x43-1 to protect the internal network 2 External network - attachment to an external port of the security module The public, external network is connected to an external port of the security module. PC3: PC with the Security Configuration Tool and STEP 7 Requirement: To be able to work through the example, the following requirements must be met: The Security Configuration Tool configuration software is installed on PC3. CP x43-1 has the following settings in STEP 7: Gigabit IP address: 191.0.0.201, subnet mask: 255.255.0.0 PROFINET IP address: 191.1.0.201, subnet mask: 255.255.0.0 Overview of the next steps: Getting Started, 04/2012, C79000-G8976-C287-01 97

Configuring a VPN tunnel 4.3 VPN tunnel between SCALANCE S and CP 4.3.2 Setting up the security module and network Follow the steps outlined below: 1. Now establish the physical network connections by plugging the network cable connectors into the ports being used (RJ-45 jacks): Connect PC1 to an internal port of security module 1 and PC2 to an internal port of security module 2. Connect the external port of security module 1 and the external port of security module 2 to the hub/switch. Connect PC3 to the hub/switch as well. 2. Now turn on the PCs. NOTICE The Ethernet attachments at internal and external port are handled differently by the security module and must not be swapped over when connecting to the communication network: If the ports are swapped over, the device loses its protective function. 4.3.3 Make the IP settings for the PCs For the test, the PCs are given the following IP address settings: PC IP address Subnet mask Default gateway PC1 191.0.0.1 255.255.0.0 191.0.0.201 PC2 191.1.0.1 255.255.0.0 191.1.0.201 PC3 191.0.0.3 255.255.0.0 191.0.0.201 Follow the steps below for PC1, PC2, and PC3: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. 98 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.3 VPN tunnel between SCALANCE S and CP 4. Click the "Properties" button. 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 4.3.4 Create the project and modules Follow the steps below: 1. In the "Security" tab of the object properties, enable the "Enable security" check box. 2. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. Confirm your entries with "OK". Result: A new project is created. Getting Started, 04/2012, C79000-G8976-C287-01 99

Configuring a VPN tunnel 4.3 VPN tunnel between SCALANCE S and CP 3. In HW Config, open the Security Configuration Tool with the "Edit" > "Security Configuration Tool" menu command. Result: The created CP will then be displayed in the list of configured modules. 4. In the Security Configuration Tool, use the "Insert" > "Module" menu command to create a SCALANCE S module with the following parameters: IP address (ext.): 191.0.0.202, subnet mask (ext.): 255.255.0.0. In addition to this, enter the MAC address printed on the front of the security module. Result: The CP and the SCALANCE S module are displayed in the Security Configuration Tool in the list of configured modules. 4.3.5 Configuring a tunnel connection Two security modules can establish an IPsec tunnel for secure communication when they are assigned to the same group in the project. Follow the steps outlined below: 1. Select "VPN groups" in the navigation area and create a new group with the menu command "Insert" > "Group". The group is automatically given the name "Group1". 2. In the navigation area, click on "All Modules" and then on the SCALANCE S module in the content area. 100 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.3 VPN tunnel between SCALANCE S and CP 3. Drag it to "Group1" in the navigation area. The module is now assigned to this group (is a member of the group). The color of the key symbol changes from gray to blue. 4. Select the CP in the content area and drag it to "Group1" in the navigation area. Result: The CP is now also assigned to this group and the configuration of the tunnel connection is complete. 4.3.6 Downloading the configuration to the security module SCALANCE S - follow the steps below: 1. In STEP 7, open the Security Configuration Tool with the "Edit" > "Security Configuration Tool" menu command. 2. Using the menu command "Transfer" > "To all modules...", open the following dialog: The SCALANCE S module is displayed in the list. 1. Select the SCALANCE S module. 2. Start the download with the "Start" button. If the download was completed free of errors, the SCALANCE S module is restarted automatically and the new configuration activated. CP - follow the steps below: 1. Close the Security Configuration Tool. 2. In HW Config, select the "Station" > "Save and Compile" menu. 3. Download the new configuration to the security module using the "PLC" > "Download to Module" menu. Getting Started, 04/2012, C79000-G8976-C287-01 101

Configuring a VPN tunnel 4.3 VPN tunnel between SCALANCE S and CP If the download was completed free of errors, the security module restarts automatically and the new configuration is activated. Result: Security modules in productive mode The configuration has now been commissioned and the two security modules can now establish a communication tunnel over which network nodes from the two internal networks can communicate. 4.3.7 Test the tunnel function (ping test) How can you test the configured function? The function can be tested as described below using a ping command. As an alternative, you can also use other communication programs to test the configuration. NOTICE In Windows, the firewall can be set so that as default the ping commands do not pass through. If necessary, you will need to enable the ICMP services of the type "Request" and "Response". Test phase 1 Now test the function of the tunnel connection established between PC1 and PC2: 1. On PC1, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". 2. Enter the Ping command from PC1 to PC2 (IP address 191.1.0.1) In the command line of the "Command Prompt" window, enter the command "ping 191.1.0.1" at the cursor position. You will then receive the following message (positive reply from PC2): 102 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.3 VPN tunnel between SCALANCE S and CP Result If the IP frames have reached PC2, the "Ping statistics for 191.1.0.1" display the following: Sent = 4 Received = 4 Lost = 0 (0% loss) Since no other communication is permitted, these packets must have been transported through the VPN tunnel. Test phase 2 Repeat the test by sending a ping command from PC3. 1. On PC3, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". 2. Send the same ping command again ("ping 191.1.0.1") in the Command Prompt window of PC3. You will then receive the following message (no reply from PC2): Result The IP frames from PC3 cannot reach PC2 since neither tunnel communication between these two devices is configured nor is normal IP data traffic permitted. This is shown in the "Ping statistics" for 191.1.0.1 as follows: Sent = 4 Received = 0 Lost = 4 (100% loss) Getting Started, 04/2012, C79000-G8976-C287-01 103

Configuring a VPN tunnel 4.4 VPN tunnel between all security products 4.4 VPN tunnel between all security products 4.4.1 Overview In this example, the tunnel function is configured in the "standard mode" project engineering view. With this configuration, IP traffic is possible only over the established VPN tunnel connections between authorized partners or the individual VPN groups. Access from the service PG on which the SOFTNET Security Client is installed is allowed for all four security modules. 104 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.4 VPN tunnel between all security products VPN group VPN node 1 SCALANCE S 612 V3.0 CP 443-1 Advanced GX30 V3.0 SOFTNET Security Client 2 CP 343-1 Advanced GX31 V3.0 CP 443-1 Advanced GX30 V3.0 SOFTNET Security Client 3 CP 1628 V1.0 CP 343-1 Advanced GX31 V3.0 SOFTNET Security Client Requirement: To be able to work through the example, the following requirements must be met: The Security Configuration Tool configuration software and the SOFTNET Security Client are installed on PC2. All security modules have the current time of day and the current date. STEP 7 is installed on PC1 and a STEP 7 project with the following security modules has already been created. Security module IP address Subnet mask CP 443-1 Advanced GX30 V3.0 Gigabit: 90.12.150.41 255.255.0.0 PROFINET: 110.100.150.41 255.255.255.0 CP 343-1 Advanced GX31 V3.0 Gigabit: 90.12.150.11 255.255.0.0 PROFINET: 110.100.150.11 255.255.255.0 CP 1628 V1.0 Industrial Ethernet: 90.12.150.101 255.255.0.0 Getting Started, 04/2012, C79000-G8976-C287-01 105

Configuring a VPN tunnel 4.4 VPN tunnel between all security products Overview of the next steps: 4.4.2 Make the IP settings for the PCs For the test, the PCs are given the following IP address settings: IP address Subnet mask PC1 110.100.150.52 255.255.255.0 PC2 90.12.150.117 255.255.0.0 Follow the steps below for PC1 and PC2: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. 106 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.4 VPN tunnel between all security products 4. Click the "Properties" button. 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Now enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 4.4.3 Create the project and modules Enabling security for the CPs 1. In the "Security" tab of the object properties of the CP 443- Advanced GX30, enable the "Enable security" check box. Getting Started, 04/2012, C79000-G8976-C287-01 107

Configuring a VPN tunnel 4.4 VPN tunnel between all security products 2. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. Confirm your entries with "OK". Result: A new security project is created. 3. In the "Security" tab of the object properties of the CP 343-1 Advanced GX31 and CP 1628, enable the "Enable security" check box one after the other. 4. In HW Config, open the Security Configuration Tool with the "Edit" > "Security Configuration Tool" menu command. Result: The created CPs on which security is activated are displayed in the list of configured modules. Creating SCALANCE S and SOFTNET Security Client 1. Create a new module with the "Insert" > "Module" menu command. Configure: Product type: SCALANCE S Module: S612 Firmware release V3 IP address (ext.): 90.12.150.51, subnet mask (ext.): 255.255.0.0. 2. Select the "Enable routing" check box and enter the following data: IP address (int.): 110.100.150.51, subnet mask (int.): 255.255.255.0 Result: The created SCALANCE S module will be displayed in the list of configured modules as "Module1". 3. In the "Configuration" area, enter the MAC address in the required format. The MAC address is printed on the front of the SCALANCE S module 4. Generate a second module with the "Insert" > "Module" menu command. Configure: Product type: SOFTNET Configuration (SOFTNET Security Client, SCALANCE M87x, MD74x) Module: SOFTNET Security Client Firmware release: V4 Result: The created SOFTNET security client will then be displayed in the list of configured modules as "Module2". 5. In the navigation area, click on "All Modules" and then on the row with "Module1" in the content area. 6. Click in the "Name" column and enter the name "SCA612". 7. Click on the row with "Module2". 8. Click in the "Name" column and enter the name "SSC-PC2". Result: The CPs, the SCALANCE S module and the SOFTNET Security Client are displayed in the Security Configuration Tool in the list of configured modules. 108 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.4 VPN tunnel between all security products 4.4.4 Configuring a tunnel connection Security modules can establish an IPsec tunnel for secure communication when they are assigned to the same group in the project. Follow the steps outlined below: 1. Select "VPN groups" in the navigation area and create a new group with the menu command "Insert" > "Group". The group is automatically given the name "Group1". 2. Add two further groups. The groups are automatically given the names "Group2" and "Group3". 3. One after the other, drag the SCALANCE S module, the CP 443-1 Advanced GX30 and the SOFTNET Security Client to "Group1" in the navigation area. The modules are now assigned to Group1 or are members of this group. The color of the key symbol changes from gray to blue. Getting Started, 04/2012, C79000-G8976-C287-01 109

Configuring a VPN tunnel 4.4 VPN tunnel between all security products 4. One after the other, drag the CP 343-1 Advanced GX31, the CP 443-1 Advanced GX30 and the SOFTNET Security Client to "Group2" in the navigation area. The modules are now assigned to Group2 or are members of this group. The color of the key symbol changes from gray to blue. 5. One after the other, drag the CP 1628, the CP 343-1 Advanced GX31 and the SOFTNET Security Client to "Group3" in the navigation area. The modules are now assigned to Group3 or are members of this group. The color of the key symbol changes from gray to blue. 6. Close SCT. The configuration of the tunnel connection is complete. 4.4.5 Loading the configuration on the security module and saving the SOFTNET Security Client configuration SCALANCE S and SOFTNET Security Client - follow the steps below: 1. In HW Config, open the Security Configuration Tool with the "Edit" > "Security Configuration Tool" menu command. 2. Using the menu command "Transfer" > "To all modules...", open the following dialog: 3. Start the download with the "Start" button. 4. Save the configuration file "projectname.ssc-pc2.dat" in your project folder and assign a password for the private key of the certificate. 110 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.4 VPN tunnel between all security products If the download was completed free of errors, the SCALANCE S module is restarted automatically and the new configuration activated. CPs - follow the steps below: 1. Close the Security Configuration Tool. 2. In HW Config, select the "Station" > "Save and Compile" menu for the CP 443-1 Advanced. 3. Download the new configuration to the security module using the "PLC" > "Download to Module" menu. 4. Perform steps 2-3 for the CP 343-1 and CP 1628. If the download was completed free of errors, the security modules restart automatically and the new configuration is activated. Result: Security modules in productive mode Commissioning the configuration is therefore completed and the two security modules within a VPN group can establish a communications tunnel and communicate with each other securely. 4.4.6 Set up a tunnel with the SOFTNET Security Client Follow the steps outlined below: 1. Start the SOFTNET Security Client on PC2. 2. Click the "Load Configuration" button, change to your project folder and load the "Projectname.SSC-PC2.dat" configuration file. 3. Enter the password for the private key of the certificate and confirm with "Next". 4. Confirm the "Enable all statically configured nodes?" dialog with "Yes". 5. Click the "Tunnel Overview" button. 6. To allow the learned subnets to communicate, enable this using the shortcut menu. Result: Active tunnel connection The tunnel between the SOFTNET Security Client and the security modules was established. This status is indicated by the green circle. In the log console of the tunnel overview of the SOFTNET Security Client, you can see several messages from your system indicating what happened during the connection attempt and whether or not a policy for the communication connection was created. Getting Started, 04/2012, C79000-G8976-C287-01 111

Configuring a VPN tunnel 4.4 VPN tunnel between all security products Commissioning the configuration is now complete and the security modules of the configured VPN groups and the SOFTNET Security Client have established communications tunnels via which they can communicate. 112 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring a VPN tunnel 4.4 VPN tunnel between all security products 4.4.7 Test the tunnel function (ping test) How can you test the configured function? The function can be tested as described below using a ping command. As an alternative, you can also use other communication programs to test the configuration. NOTICE In Windows, the firewall can be set so that as default the ping commands do not pass through. If necessary, you will need to enable the ICMP services of the type "Request" and "Response". Testing Now test the function of the tunnel connection established between PC2 and PC3: 1. On PC2, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". 2. Enter the Ping command from PC2 to PC3 (IP address 90.12.150.101) In the command line of the "Command Prompt" window, enter the command "ping 90.12.150.101" at the cursor position. You will then receive the following message (positive reply from PC1): Result If the IP frames have reached PC1, the "Ping statistics for 90.12.150.101" display the following: Sent = 4 Received = 4 Lost = 0 (0% loss) Since no other communication is permitted, these packets must have been transported through the VPN tunnel. Getting Started, 04/2012, C79000-G8976-C287-01 113

Configuring a VPN tunnel 4.4 VPN tunnel between all security products Repeating the test section One after the other, test the functionality of the tunnel connections established between PC2 and PC1, PC2 and CP 443-1 Advanced GX30 and PC2 and CP 343-1 Advanced GX31 as described in the section "Test section". If the tunnel connection is correctly established, you will receive a positive response to the ping query from each PC or security module. 114 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client 5.1.1 Overview In this example, the VPN tunnel function is configured in the "standard mode" configuration view. In this example, a security module and the SOFTNET Security Client form the two tunnel endpoints for the secure tunnel connection via a public network. With this configuration, IP traffic is possible only over the established VPN tunnel connections with authorized partners. Setting up the test network Getting Started, 04/2012, C79000-G8976-C287-01 115

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client Internal network - attachment to the internal port of the security module In the test setup, in the internal network, each network node is implemented by one PC connected to the internal port of the security module. PC1: Represents a node in the internal network Security module: SCALANCE S module (not S602) for protection of the internal network External network - attachment to the external port of the security module The public, external network is connected to the external port of the security module. PC2: PC with Security Configuration Tool configuration software and the SOFTNET Security Client software for secure VPN access to the internal network PC3: Test PC for test phase 2 Note In the example, a local area network is used as a substitute for an external public WAN to illustrate the principles of the functionality. Explanations relating to the use of a WAN are provided where necessary. Required devices/components: Use the following components to set up to the network: 1 x SCALANCE S module, (not S602), (optional: a suitably installed DIN rail with fittings); 1 x 24 V power supply with cable connector and terminal block plug; 1 x PC on which the "Security Configuration Tool" and VPN client "SOFTNET Security Client" are installed; 1 x PC in the internal network to test the configuration; 1 x PC in the external network to test the configuration; 1 x network hub or switch to set up the network connections with the SCALANCE S module and the PCs; The required network cable, TP cable (twisted pair) complying with the IE FC RJ-45 standard for Industrial Ethernet. 116 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client Overview of the next steps: 5.1.2 Set up SCALANCE S and the network Follow the steps outlined below: 1. First unpack the SCALANCE S device and check that it is undamaged. 2. Connect the power supply to the SCALANCE S module. Result: After connecting the power, the Fault LED (F) is lit yellow. WARNING The SCALANCE S is designed for operation with safety extra-low voltage. This means that only safety extra-low voltages (SELV) complying with IEC950/EN60950/ VDE0805 can be connected to the power supply terminals. The power supply unit to supply the SCALANCE S must comply with NEC Class 2 (voltage range 18-32 V, current requirement approx. 250 ma). 1. Now establish the physical network connections by plugging the network cable connectors into the ports being used (RJ-45 jacks): Getting Started, 04/2012, C79000-G8976-C287-01 117

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client Connect PC1 with port 2 of module 1. Connect port 1 of module 1 with the hub/switch. Connect PC2 and PC3 to the hub/switch as well. 2. Now turn on the PCs. Note To use a WAN as an external public network, the connections to the hub/switch must be replaced by the connections to the WAN (Internet access). NOTICE The Ethernet attachments at port 1 and port 2 are handled differently by the SCALANCE S and must not be swapped over when connecting to the communication network: Port 1 - "external network" Upper RJ-45 jack, marked red = unprotected network area; Port 2 - "internal network" Lower RJ-45 jack, marked green = network protected by SCALANCE S; If the ports are swapped over, the device loses its protective function. 5.1.3 Make the IP settings for the PCs For the test, the PCs should be given the following IP address settings. PC IP address Subnet mask Default gateway PC1 192.168.0.1 255.255.255.0 192.168.0.201 PC2 191.0.0.2 255.255.0.0 191.0.0.201 PC3 191.0.0.3 255.255.0.0 191.0.0.201 For standard gateway, specify the IP addresses that will be assigned to the security module for the internal and external interface in the subsequent project engineering: PC1 uses the internal interface. PC2 and PC3 use the external interface. Note To use a WAN as an external public network, the relevant IP settings for the connection to the WAN (Internet) must be made on PC2 and PC3. Follow the steps below for PC1, PC2, and PC3: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 118 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. 4. Click the "Properties" button. 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 5.1.4 Create the project and modules Follow the steps below: 1. Select the "Project" > "New" menu command. Getting Started, 04/2012, C79000-G8976-C287-01 119

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client 2. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. 3. Confirm your entries. Result: A new project is created. The "Selection of a module or software configuration" dialog opens. 4. Configure the product type, module and firmware release and close the dialog with "OK" 5. Generate a second module with the "Insert" > "Module" menu command. Configure: Product type: SOFTNET Configuration (SOFTNET Security Client, SCALANCE M87x/MD74x) Module: SOFTNET Security Client Firmware release: Depending on the SOFTNET Security Client version you are using. Close the dialog with "OK". Result: The module will then be displayed in the list of configured modules. The name is assigned automatically based on the default settings of the project. 120 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client 6. Double-click on "Module1". Result: The "Interfaces" tab is opened. 7. Enter the following values in the "External (P1) box: IP address: 191.0.0.201, Subnet mask: 255.255.0.0 MAC: the MAC address printed on the front of the SCALANCE S module (see figure). Note To use a WAN as an external, public network, enter the IP address you received from the provider as "IP address ext." via which the security module will then be reachable in the WAN (Internet). To allow the security module to send packets via the WAN (Internet), you need to enter your DSL router as "Standard router". If you use a DSL router as Internet gateway, the following ports (at least) must be opened on it: Port 500 (ISAKMP) Port 4500 (NAT-T) With SCALANCE S, for configuration downloads (via the WAN without active tunnel), port 443 (HTTPS) must also be open. Configuring routing 1. Select the "Routing mode" for "Interface routing" in the "Interfaces" tab. Getting Started, 04/2012, C79000-G8976-C287-01 121

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client 2. In the input area "Internal (P2), add the following to the address information for the SCALANCE S as follows and confirm your entries with "OK": Internal module IP address: 192.168.0.201 Internal subnet mask: 255.255.255.0 3. In the navigation area, click on "All Modules" and then on the row with "Module2" in the content area. 4. Click in the "Name" column and enter the name "SSC-PC2". Result: The settings are complete and should match the following figure: 122 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client Getting Started, 04/2012, C79000-G8976-C287-01 123

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client 5.1.5 Configuring a tunnel connection A SCALANCE S and the SOFTNET Security Client can establish an IPsec tunnel for secure communication when they are assigned to the same group in the project. Follow the steps outlined below: 1. Select "VPN groups" in the navigation area and create a new group with the menu command "Insert" > "Group". The group is automatically given the name "Group1". 2. Select the SCALANCE S module "Module1" in the content area and drag it to "Group1" in the navigation area. The module is now assigned to this group (is a member of the group). The color of the key symbol changes from gray to blue. This indicates that an IPsec connection has been configured for the module. 3. Select the SOFTNET Security Client in the content area and drag it to "Group1" in the navigation area. The module is now also assigned to this group. 4. Save the project with the menu command "Project" > "Save As..." under a meaningful name. The configuration of the tunnel connection is complete. 124 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client 5.1.6 Loading the configuration on the SCALANCE S and saving the SOFTNET Security Client configuration Follow the steps outlined below: 1. Using the menu command "Transfer" > "To all modules...", open the following dialog: 2. Start the download with the "Start" button. 3. Save the configuration file "projectname.ssc-pc2.dat" in your project folder and assign a password for the private key of the certificate. If the download was completed free of errors, the security module is restarted automatically and the new configuration activated. Result: SCALANCE S in productive operation The security module is in productive mode. This mode is indicated by the Fault LED being lit green. The configuration has been commissioned and the security module and the SOFTNET Security Client can now establish a communication tunnel over which network nodes from the internal networks can communicate securely with PC2 from within the internal network. Note To use a WAN as an external public network, you cannot configure a security module with the factory settings via the WAN. In this case, configure the security module from within the internal network. Getting Started, 04/2012, C79000-G8976-C287-01 125

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client 5.1.7 Set up a tunnel with the SOFTNET Security Client Follow the steps outlined below: 1. Start the SOFTNET Security Client on PC2. 2. Click the "Load Configuration" button, change to your project folder and load the "Projectname.SSC-PC2.dat" configuration file. 3. Enter the password for the private key of the certificate and confirm with "Next". 4. Confirm the "Enable all statically configured nodes?" dialog with "Yes". 5. Click the "Tunnel Overview" button. Result: Active tunnel connection The tunnel between SCALANCE S and SOFTNET Security Client was established. This status is indicated by the green circle beside the "Module1" entry. In the log console of the tunnel overview of the SOFTNET Security Client, you can see several messages from your system indicating what happened during the connection attempt and whether or not a policy for the communication connection was created. 126 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client The configuration has now been commissioned and the SCALANCE S module and the SOFTNET Security Client have established a communication tunnel over which network nodes can communicate securely with PC2 from within the internal network. Getting Started, 04/2012, C79000-G8976-C287-01 127

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client 5.1.8 Test the tunnel function (ping test) How can you test the configured function? The function can be tested as described below using a ping command. As an alternative, you can also use other communication programs to test the configuration. NOTICE In Windows, the firewall can be set so that as default the ping commands do not pass through. If necessary, you will need to enable the ICMP services of the type "Request" and "Response". Test phase 1 Now test the function of the tunnel connection established between PC1 and PC2: 1. On PC2, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". 2. Enter the ping command from PC2 to PC1 (IP address 192.168.0.1). In the command line of the "Command Prompt" window, enter the command ping 192.168.0.1 at the cursor position. You will then receive the following message: (positive reply from PC1). Result If the IP packets have reached PC1, the "Ping statistics for 192.168.0.1" display the following: Sent = 4 Received = 4 Lost = 0 (0% loss) Since no other communication is permitted, these packets must have been transported through the VPN tunnel. 128 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.1 Remote access - VPN tunnel example with SCALANCE S612 and SOFTNET Security Client Test phase 2 Now repeat the test by sending a ping command from PC3. 1. On PC3, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". 2. Send the same ping command (ping 192.168.0.1) in the Command Prompt window of PC3. You will then receive the following message: (no reply from PC1). Result The IP frames from PC3 cannot reach PC1 since neither tunnel communication between these two devices is configured nor is normal IP data traffic permitted. This is shown in the "Ping statistics" for 192.168.0.1 as follows: Sent = 4 Received = 0 Lost = 4 (100% loss) Getting Started, 04/2012, C79000-G8976-C287-01 129

Configuring remote access via a VPN tunnel 5.2 Remote access - VPN tunnel example with CP x43-1 Advanced and SOFTNET Security Client 5.2 Remote access - VPN tunnel example with CP x43-1 Advanced and SOFTNET Security Client 5.2.1 Overview In this example, the VPN tunnel function is configured in the "standard mode" configuration view. In this example, a security module and a SOFTNET Security Client form the two tunnel endpoints for the secure tunnel connection via a public network. With this configuration, IP traffic is possible only over the established VPN tunnel connections with authorized partners. Setting up the test network 130 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.2 Remote access - VPN tunnel example with CP x43-1 Advanced and SOFTNET Security Client Internal network - attachment to the internal port of the security module In the test setup, in the internal network, each network node is implemented by one PC connected to the internal port of the security module. PC1: Represents a node in the internal network Security module: CP x43-1 to protect the internal network External network - attachment to the external port of the security module The public, external network is connected to the external port of a security module. PC2: PC with Security Configuration Tool configuration software and the SOFTNET Security Client software for secure VPN access to the internal network PC3: Test PC for test phase 2 Note In the example, a local area network is used as a substitute for an external public WAN to illustrate the principles of the functionality. Explanations relating to the use of a WAN are provided where necessary. Requirement: To be able to work through the example, the following requirements must be met: The Security Configuration Tool configuration software is installed on PC2. STEP 7 is installed on PC2 and a STEP 7 project has already been created. The security module has the current time of day and the current date. CP x43-1 has the following settings in STEP 7: Gigabit IP address: 191.0.0.201, subnet mask: 255.255.0.0 PROFINET IP address: 192.168.0.201, subnet mask: 255.255.255.0 Getting Started, 04/2012, C79000-G8976-C287-01 131

Configuring remote access via a VPN tunnel 5.2 Remote access - VPN tunnel example with CP x43-1 Advanced and SOFTNET Security Client Overview of the next steps: 5.2.2 Make the IP settings for the PCs For the test, the PCs should be given the following IP address settings. PC IP address Subnet mask Default gateway PC1 192.168.0.1 255.255.255.0 192.168.0.201 PC2 191.0.0.2 255.255.0.0 191.0.0.201 PC3 191.0.0.3 255.255.0.0 191.0.0.201 For standard gateway, specify the IP addresses that will be assigned to the security module for the internal and external interface in the subsequent project engineering: PC1 uses the internal interface. PC2 and PC3 use the external interface. Note To use a WAN as an external public network, the relevant IP settings for the connection to the WAN (Internet) must be made on PC2 and PC3. Follow the steps below for PC1, PC2, and PC3: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. 132 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.2 Remote access - VPN tunnel example with CP x43-1 Advanced and SOFTNET Security Client 4. Click the "Properties" button. 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 5.2.3 Create the project and modules Follow the steps below: 1. In the "Security" tab of the STEP 7 object properties of the security module, enable the "Enable security" check box. Getting Started, 04/2012, C79000-G8976-C287-01 133

Configuring remote access via a VPN tunnel 5.2 Remote access - VPN tunnel example with CP x43-1 Advanced and SOFTNET Security Client 2. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. Confirm your entries with "OK". Result: A new security project is created. 3. Select the "Edit" > "Security Configuration Tool" menu. Result: The security module will then be displayed in the list of configured modules. 1. Generate a second module with the "Insert" > "Module" menu command. Configure: Product type: SOFTNET Configuration (SOFTNET Security Client, SCALANCE M87x/MD74x) Module: SOFTNET Security Client Firmware release: Depending on the SOFTNET Security Client version you are using. 2. Close the dialog with "OK". Result: The module will then be displayed in the list of configured modules. The name is assigned automatically based on the default settings of the project. Note To use a WAN as an external, public network, enter the IP address you received from the provider as "IP address ext." via which the security module will then be reachable in the WAN (Internet). To allow the security module to send packets via the WAN (Internet), you need to enter your DSL router as "Standard router". If you use a DSL router as Internet gateway, the following ports (at least) must be forwarded on it: Port 500 (ISAKMP) Port 4500 (NAT-T) For configuration downloads (not through an active tunnel), port 443 (HTTPS) must also be forwarded. 134 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.2 Remote access - VPN tunnel example with CP x43-1 Advanced and SOFTNET Security Client 3. In the navigation area, click on "All Modules" and then on the row with "Module2" in the content area. 4. Click in the "Name" column and enter the name "SSC-PC2". Result: The settings are complete and should match the following figure: 5.2.4 Configuring a tunnel connection The security module and the SOFTNET Security Client can establish an IPsec tunnel for secure communication when they are assigned to the same group in the project. Follow the steps outlined below: 1. Select "VPN groups" in the navigation area and create a new group with the menu command "Insert" > "Group". The group is automatically given the name "Group1". 2. Select the security module in the content area and drag it to "Group1" in the navigation area. The module is now assigned to this group (is a member of the group). The color of the key symbol changes from gray to blue. This indicates that an IPsec connection has been configured for the module. 3. Select the SOFTNET Security Client in the content area and drag it to "Group1" in the navigation area. The module is now also assigned to this group. The configuration of the tunnel connection is complete. Getting Started, 04/2012, C79000-G8976-C287-01 135

Configuring remote access via a VPN tunnel 5.2 Remote access - VPN tunnel example with CP x43-1 Advanced and SOFTNET Security Client 5.2.5 Loading the configuration on the security module and saving the SOFTNET Security Client configuration Follow the steps outlined below: 1. Using the menu command "Transfer" > "To all modules...", open the following dialog: 2. Start the download with the "Start" button. 3. Save the configuration file "projectname.ssc-pc2.dat" in your project folder and assign a password for the private key of the certificate. If the download was completed free of errors, the security module is restarted automatically and the new configuration activated. Result: Security module in productive mode The configuration has been commissioned and the security module and the SOFTNET Security Client can now establish a communication tunnel over which network nodes from the internal networks can communicate securely with PC2 from within the internal network. Note To use a WAN as an external public network, you cannot configure a security module with the factory settings via the WAN. In this case, configure the security module from within the internal network. 136 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.2 Remote access - VPN tunnel example with CP x43-1 Advanced and SOFTNET Security Client 5.2.6 Set up a tunnel with the SOFTNET Security Client Follow the steps outlined below: 1. Start the SOFTNET Security Client on PC2. 2. Click the "Load Configuration" button, change to your project folder and load the "Projectname.SSC-PC2.dat" configuration file. 3. Enter the password for the private key of the certificate and confirm with "Next". 4. Confirm the "Enable all statically configured nodes?" dialog with "Yes". 5. Click the "Tunnel Overview" button. Result: Active tunnel connection The tunnel between the security module and the SOFTNET Security Client was established. This status is indicated by the green circle beside the "Module1" entry. In the log console of the tunnel overview of the SOFTNET Security Client, you can see several messages from your system indicating what happened during the connection attempt and whether or not a policy for the communication connection was created. Getting Started, 04/2012, C79000-G8976-C287-01 137

Configuring remote access via a VPN tunnel 5.2 Remote access - VPN tunnel example with CP x43-1 Advanced and SOFTNET Security Client The configuration has now been commissioned and the security module and the SOFTNET Security Client have established a communication tunnel over which network nodes can communicate securely with PC2 from within the internal network. 138 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.2 Remote access - VPN tunnel example with CP x43-1 Advanced and SOFTNET Security Client 5.2.7 Test the tunnel function (ping test) How can you test the configured function? The function can be tested as described below using a ping command. As an alternative, you can also use other communication programs to test the configuration. NOTICE In Windows, the firewall can be set so that as default the ping commands do not pass through. If necessary, you will need to enable the ICMP services of the type "Request" and "Response". Test phase 1 Now test the function of the tunnel connection established between PC1 and PC2: 1. On PC2, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". 2. Enter the ping command from PC2 to PC1 (IP address 192.168.0.1). In the command line of the "Command Prompt" window, enter the command "ping 192.168.0.1" at the cursor position. You will then receive the following message (positive reply from PC1): Result If the IP packets have reached PC1, the "Ping statistics for 192.168.0.1" display the following: Sent = 4 Received = 4 Lost = 0 (0% loss) Since no other communication is permitted, these packets must have been transported through the VPN tunnel. Getting Started, 04/2012, C79000-G8976-C287-01 139

Configuring remote access via a VPN tunnel 5.2 Remote access - VPN tunnel example with CP x43-1 Advanced and SOFTNET Security Client Test phase 2 Now repeat the test by sending a ping command from PC3. 1. On PC3, call up the menu command "Start" >"All Programs" > "Accessories" > "Command Prompt". 2. Send the same ping command ("ping 192.168.0.1") in the Command Prompt window of PC3. You will then receive the following message (no reply from PC1): Result The IP frames from PC3 cannot reach PC1 since neither tunnel communication between these two devices is configured nor is normal IP data traffic permitted. This is shown in the "Ping statistics" for 192.168.0.1 as follows: Sent = 4 Received = 0 Lost = 4 (100% loss) 140 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client 5.3.1 Overview In this example, the VPN tunnel function is configured in the "advanced mode" project engineering view. A SCALANCE M and the SOFTNET Security Client form the two tunnel endpoints for the secure tunnel connection via a public network. With this configuration, IP traffic is possible only over the established VPN tunnel connection with authorized partners. Note To configure this example, you need a public, fixed IP address from your provider (mobile wireless provider) for the SIM card of the SCALANCE M that can also be reached from the Internet. (As an alternative, it is also possible to work with a DynDNS address for the SCALANCE M.) Setting up the test network: Getting Started, 04/2012, C79000-G8976-C287-01 141

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client Internal network - attachment to SCALANCE M port X2 ("internal network") In the test setup, in the internal network, a network node is implemented by a PC connected to the "internal network" port (port X2) of a SCALANCE M module. PC1: Represents a node in the internal network SCALANCE M: SCALANCE M module for protection of the internal network External, public network - connection via SCALANCE M antenna ("external network") The external, public network must be a GSM or mobile wireless network that can be selected by the user at the provider (mobile wireless provider) and is reached via the antenna of the SCALANCE M. PC2: PC with Security Configuration Tool configuration software and the SOFTNET Security Client software for secure VPN access to the internal network Required devices/components: Use the following components to set up to the network: 1 x SCALANCE M module with SIM card, (optional: a suitably installed DIN rail with fittings); 1 x 24 V power supply with cable connector and terminal block plug; 1 x PC on which the "Security Configuration Tool" and VPN client "SOFTNET Security Client" are installed; 1 x PC in the internal network of the SCALANCE M with a browser for configuring the SCALANCE M and testing the configuration; 1 x DSL router (connection to the Internet for the PC with the VPN client (ISDN, DSL, UMTS etc.)) The required network cable, TP cable (twisted pair) complying with the IE FC RJ-45 standard for Industrial Ethernet. 142 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client Overview of the next steps 5.3.2 Setting up SCALANCE M and network Follow the steps outlined below: 1. First unpack the SCALANCE M device and check that it is undamaged. 2. Follow the step-by-step commissioning as described in the SCALANCE M system manual up to the point at which you need to set it up to suit your own requirements. To do this, use PC1; for setting up the SCALANCE M, refer to the section Configuring the SCALANCE M (Page 150). 3. Now establish the physical network connections by plugging the network cable connectors into the ports being used (RJ-45 jacks): Connect PC1 with Port X2 ("internal network") of the SCALANCE M Connect PC2 with the DSL router 4. Now turn on the PCs. 5.3.3 Make the IP settings for the PCs For the test, the PCs should be given the following IP address settings. PC IP address Subnet mask Default gateway PC1 192.168.1.101 255.255.255.0 192.168.1.1 PC2 192.168.2.202 255.255.255.0 192.168.2.1 Getting Started, 04/2012, C79000-G8976-C287-01 143

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client For the default gateway for PC1, specify the IP address that you will assign to the SCALANCE M module (for the internal network interface) in the subsequent configuration. For PC2, specify the IP address of the DSL router (for the internal network interface). Follow the steps below with PC1 and PC2 to open the network connections on the relevant PC: 1. On the relevant PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. In the "Local Area Connection Properties" dialog, enable the "Internet Protocol Version 4 (TCP/IPv4)" check box. 4. Click the "Properties" button. 5. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button: off. 6. Enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 7. Close the dialogs with "OK" and close the Control Panel. 144 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client 5.3.4 Create the project and modules Follow the steps below: 1. Install and start the Security Configuration Tool on PC2. 2. Select the "Project" > "New" menu command. 3. In the dialog that follows, create a new user with a user name and the corresponding password. The "administrator" role is assigned to the user automatically. 4. Confirm your entries. Result: A new project is created. The "Selection of a module or software configuration" dialog opens. 5. Configure: Product type: SOFTNET Configuration (SOFTNET Security Client, SOFTNET Security Client, SCALANCE M87x/MD74x) Module: SOFTNET Security Client Firmware release: V3 Assign the module name "SSC-PC2" and close the dialog with "OK". 6. Generate a second module with the "Insert" > "Module" menu command. Configure: Product type: SOFTNET Configuration (SOFTNET Security Client, SOFTNET Security Client, SCALANCE M87x/MD74x) Module: SCALANCE M87x/MD74x Firmware release: V3 Assign the module name "SCALANCE-M". Getting Started, 04/2012, C79000-G8976-C287-01 145

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client 7. In the "Configuration" area, enter the external IP address and the external subnet mask in the required format. Note To configure this example, you need a public, fixed IP address from your provider (mobile wireless provider) for the SIM card of the SCALANCE M that can also be reached from the Internet. Enter this IP address as the external IP address for your module. If you work with dynamic addresses for the SCALANCE M, you require a DynDNS address for the module. In this case, you do not need to adapt the external IP address at this point. The IP address entered therefore serves simply as a placeholder. When configuring the SOFTNET Security Client later, specify a DNS name instead of an external IP address. 8. In the "Configuration" area, enter the internal IP address (192.168.1.1) and the internal subnet mask (255.255.255.0) in the required format and confirm the dialog with "OK". Result: The settings are complete and should match the following figure: 5.3.5 Configuring a tunnel connection A SCALANCE M and the SOFTNET Security Client can establish an IPsec tunnel for secure communication when they are assigned to the same group in the project. Follow the steps outlined below: 1. Select "VPN groups" in the navigation area and create a new group with the menu command "Insert" > "Group": 146 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client The group is automatically given the name "Group1". 2. Select the SCALANCE M module in the content area and drag it to "Group1" in the navigation area. The module is now assigned to this group or is a member of this group. The color of the key symbol changes from gray to blue. This indicates that an IPsec connection has been configured for the module. 3. Select the SOFTNET Security Client module "SSC-PC2" in the content area and drag it to "Group1" in the navigation area. The module is also assigned to this group. 4. Change to advanced mode with the menu command "View" > "Advanced mode". 5. Open the group properties of Group1 by selecting the "Properties..." shortcut menu. Getting Started, 04/2012, C79000-G8976-C287-01 147

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client 6. Change the SA lifetime for phase 1 and phase 2 to 1440 minutes and leave all other settings. NOTICE A successful tunnel connection between a SCALANCE M and the SOFTNET Security Client can only be established if you keep exactly to the following parameters. If you use different parameter settings, it is possible that the two tunnel partners will not be able to set up a VPN connection between them. Authentication method: Certificate Advanced Settings Phase 1: IKE mode: Main Phase 1 DH group: Group2 Phase 1 Encryption: 3DES-168 SA lifetime (minutes): 1440 minutes Phase 1 Authentication: SHA1 Advanced Settings Phase 2: SA lifetime type: Time Phase 2 Encryption: 3DES-168 SA lifetime: 1440 minutes Phase 2 Authentication: SHA1 148 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client 7. Save the project with the menu command "Project" > "Save As..." under a meaningful name. The configuration of the tunnel connection is complete. 5.3.6 Saving the configuration of the SCALANCE M and the SOFTNET Security Client Follow the steps outlined below: 1. Using the menu command "Transfer" > "To all modules...", open the following dialog: 2. Start the download with the "Start" button. Getting Started, 04/2012, C79000-G8976-C287-01 149

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client 3. Save the configuration file "projectname.ssc-pc2.dat" in the project folder and assign a password for the private key of the certificate. The following files will be saved in the project directory: "Projectname.SSC-PC2.dat" "Projectname.string.SSC-PC2.p12" "Projectname.group1.cer" 4. Save the configuration file "projectname.scalance-m.txt" in your project folder and assign a password for the private key of the certificate. The following files will be saved in the project directory: "Projectname.SCALANCE-M.txt" "Projectname.string.SCALANCE-M.p12" "Projectname.group1.SCALANC- M.cer" You have now saved all the necessary files and certificates and can put the SCALANCE M and the SOFTNET Security Client into operation. 5.3.7 Configuring the SCALANCE M The using the saved text file "projectname.scalance-m.txt", you can create the configuration of the SCALANCE M very simply based on its Web-based management. Below, this example shows you the configuration of the SCALANCE M step-by-step. The following is assumed for the configuration: SCALANCE M has a public, fixed IP address that can be reached via the Internet; The SOFTNET Security Client has a dynamic IP address assigned by the provider. At the relevant points, you will also be given information about configuring a DynDNS name for the SCALANCE M. Follow the steps outlined below: 1. Connect to the Web user interface of the SCALANCE M via PC1. Note: If the SCALANCE M has its factory settings, the internal interface of the module has the IP address 192.168.1.1 2. Go to the "IPSec VPN" > "Certificates" folder. 150 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client 3. You saved the required certificates on PC2 in the last section and assigned a password for the private key. Transfer the certificates ("projectname.string.scalance-m.p12", "projectname.group1.scalance-m.cer") for the SCALANCE M initially to PC1. 4. Now upload the certificates of the partners "projectname. group1.scalance-m.cer" and the PKCS 12 file "projectname.string.scalance-m.p12" to the module. VPN Roadwarrior mode of the SCALANCE M Since the SOFTNET Security Client has a dynamic IP address, the VPN Roadwarrior mode of the SCALANCE M is used to establish a secure connection. Roadwarrior mode of the SCALANCE M: In the VPN Roadwarrior mode, the SCALANCE M can accept VPN connections from partners with an unknown address. These can, for example, be mobile partners that obtain their IP address dynamically. The VPN connection must be established by the partner. Only one VPN connection is possible in Roadwarrior mode. VPN connections in standard mode can be operated at the same time. Follow the steps outlined below: 1. Go to the "IPSec VPN" > "Connections" folder. 2. Under "Settings", click the "Edit" button. Getting Started, 04/2012, C79000-G8976-C287-01 151

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client 3. Edit the settings of the Roadwarrior VPN as shown in the following figure and save your entries. You can get the "Remote ID" from the "projectname.scalance-m.txt" text file. As an option, you can enter the "Remote ID" here. 4. In the "IPSec VPN - Connections" window, click the "Edit" button below IKE. 152 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client 5. Edit the IKE settings of the Roadwarrior VPN as shown in the following figure and save your entries. NOTICE Getting Started, 04/2012, C79000-G8976-C287-01 153

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client A successful tunnel connection between SCALANCE M and the SOFTNET Security Client can only be established if you keep exactly to the parameters listed below. If you use different parameter settings, the two tunnel partners will not be able to set up a VPN connection between them. You should therefore always keep to the settings in the exported text file (as shown extra below). Authentication method: X.509 remote certificate Phase 1 - ISKAMP SA: ISAKMP SA encryption: 3DES-168 ISAKMP-SA hash: SHA-1 ISAKMP-SA mode: Main mode ISAKMP-SA Lifetime (seconds): 86400 Phase 2 - IPSec SA: IPSec SA encryption: 3DES-168 IPSec SA hash: SHA-1 IPSec SA lifetime (seconds): 86400 DH/PFS group: DH-2 1024 154 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client 6. To be able to use the diagnostics function of the SOFTNET Security Client for successfully established VPN tunnels in conjunction with the SCALANCE M, you need to allow a ping from the external network of the SCALANCE M. To do this, go to the directory "Security" > "Advanced". Set the "External ICMP to the SCALANCE M" function to the value "Allow ping" and save your entry. Note also the following figure. Note If you do not enable this function, you will not be able to use the diagnostics function of the SOFTNET Security Client for successfully established VPN tunnels in conjunction with the SCALANCE M. You then do not receive any feedback as to whether the tunnel was successfully established but can nevertheless communicate securely via the tunnel. 7. To allow you to access the Web interface of the SCALANCE M via the external interface as well, enable the HTTPS remote access. This gives you the opportunity of configuring and diagnosing the SCALANCE M remotely via an established tunnel. To do this, go to the directory "Access" > "HTTPS". Set in the "Enable HTTPS remote access" function to the value "Yes" as shown in the following figure and save your entry. Getting Started, 04/2012, C79000-G8976-C287-01 155

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client Note If you want to access the SCALANCE M using a DNS name, make the settings for the DynDNS server connection in the following directory: "External Network" > "Advanced Settings" >"DynDNS" 1. Change the setting "Log this SCALANCE M on to a DynDNS server" to the value "Yes". 2. Specify your username and the password of your DynDNS account. 3. Enter the full DynDNS address in the "DynDNS hostname" box. Enter the domain for this address as well (e.g. "mydns.dyndns.org"). 156 Getting Started, 04/2012, C79000-G8976-C287-01

Configuring remote access via a VPN tunnel 5.3 Remote access - VPN tunnel example with SCALANCE M and SOFTNET Security Client The commissioning of the SCALANCE M is now complete. The module and the SOFTNET Security Client can establish a communication tunnel over which network nodes can communicate securely with PC2 from within the internal network. 5.3.8 Setting up a tunnel with the SOFTNET Security Client Follow the steps outlined below: 1. Start the SOFTNET Security Client on PC2. 2. Click the "Load Configuration" button, change to your project folder and load the "Projectname.SSC-PC2.dat" configuration file. 3. For a SCALANCE M configuration, the SOFTNET Security Client opens the dialog "IP- /DNS settings SCALANCE M". In this dialog, enter the public IP address of the SCALANCE M module that you received from your provider. Confirm the dialog with "OK". Note: If you work with a DNS name, you can configure this instead of an IP address in this dialog. 4. Enter the password for the certificate and confirm with "Next". Getting Started, 04/2012, C79000-G8976-C287-01 157