Syh Sinaut-Md741-1 76
Syh Sinaut-Md741-1 76
SIMATIC NET
Applications and functions 1
EGPRS/GPRS-Router Setup 2
SINAUT MD741-1
Configuration 3
System manual
Local interface 4
External interface 5
Security functions 6
VPN connection 7
Remote access 8
Additional functions 10
Technical Data 11
C79000-G8976-C236-04 Glossary
Release 02/2011
Legal information
Warning notice system
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
Danger
!
indicates that death or severe personal injury will result if proper precautions are not taken
Warning
!
indicates that death or severe personal injury may result if proper precautions are not taken.
Caution
!
with a safety alert symbol, indicates that minor personal injury can result if proper precautions are not taken..
Caution
without a safety alert symbol, indicates that property damage can result if proper precautions are not taken.
Notice
indicates that an unintended result or situation can occur if the corresponding information is not taken into
account.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
Qualified Personnel
The product/system described in this documentation may be operated only by personnel qualified for the specific
task in accordance with the relevant documentation for the specific task, in particular its warning notices and
safety instructions. Qualified personnel are those who, based on their training and experience, are capable of
identifying risks and avoiding potential hazards when working with these products/systems.
Prescribed Usage
Note the following:
Warning
!
Siemens products may only be used for the applications described in the catalog and in the relevant technical
documentation. If products and components from other manufacturers are used, these must be recommended or
approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
maintenance are required to ensure that the products operate safely and without any problems. The permissible
ambient conditions must be adhered to. The information in the relevant documentation must be observed.
Trademarks
All names identified by ® are registered trademarks of the Siemens AG. The remaining trademarks in this
publication may be trademarks whose use by third parties for their own purposes could violate the rights of the
owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
Use only an external power supply which also complies with EN60950. The output
voltage of the external power supply must not exceed 30V DC. The output of the
external power supply must be short-circuit proof.
Warning
! The power supply unit to supply the SINAUT MD741-1 must comply with the
requirements for a Limited Power Source according to IEC/EN 60950-1
The power supply unit to supply the SINAUT MD741-1 must comply with NEC Class 2
circuits as outlined in the National Electrical Code ® (ANSI/NFPA 70) only.
Please pay regard to section 2.7 of the system manual, as well as the installation
and utilisation regulations of the respective manufacturers of the power supply, the
battery or the accumulator.
SIM card
To install the SIM card the device must be opened. Before opening the device,
disconnect it from the supply voltage. Static charges can damage the device when
it is open. Discharge the electric static of your body before opening the device. To
do so, touch an earthed surface, e.g. the metal casing of the switch cabinet. Please
pay regard to section 2.7 of this system manual.
Handling cables
Never pull a cable connector out of a socket by its cable, but pull on the connector
itself. Cable connectors with screw fasteners (D-Sub) must always be screwed on
tightly. Do not lay the cable over sharp corners and edges without edge protection.
If necessary, provide sufficient strain relief for the cables.
For safety reasons, make sure that the bending radius of the cables is observed.
Failure to observe the bending radius of the antenna cable results in the
deterioration of the system's transmission and reception properties. The minimum
bending radius static must not fall below 5 times the cable diameter and dynamic
below 15 times the cable diameter.
SINAUT MD741-1
C79000-G8976-C236-04
Preface
Radio device
Warning
!
Never use the device in places where the operation of radio devices is prohibited. The
device contains a radio transmitter which could in certain circumstances impair the
functionality of electronic medical devices such as hearing aids or pacemakers. You
can obtain advice from your physician or the manufacturer of such devices. To prevent
data carriers from being demagnetised, do not keep disks, credit cards or other
magnetic data carriers near the device.
Installing antennas
Warning
!
The emission limits as recommended by the German Commission on Radiological
Protection (13/14 September 2001; www.ssk.de) must be observed.
When installing an antenna outdoors it is essential that the antenna is fitted correctly
by a qualified person.
When the antenna is installed outdoors it must be earthed for lightning protection. The
outdoor antennas shield must be reliable connective to protective earth.
For US this is the National Electric Code NFPA 70, article 810.
For Germany, observe the current version of the Lightning Protection Standard VDE
0185 (DIN EN 62305) Sections 1 to 4 for buildings with lightning protection, or the
standard VDE 0855 (DIN EN 60728-11) in case there is no lightning protection.
Observe the regulations listed in chapter 12 before putting the SINAUT MD741-1 into
operation.
SINAUT MD741-1
4 C79000-G8976-C236-04
Operating costs
Notice
Note that data packets exchanged for sign up connections, reconnecting, connect
attempts (e.g. Server switched off, wrong destination address, etc.) as well as keeping
the connection alive are also subject to charge.
The firmware of the SINAUT MD741-1 includes open Source Software under terms
of GPL/LGPL. According to section 3b of GPL and of section 6b of LGPL we
provide you the source code. Please write to
s_opsource@gmx.net
s_opsource@gmx.de
Please enter 'Open Source MD741' as subject of your e-mail, that we can filter your
e-mail easier.
SINAUT MD741-1
C79000-G8976-C236-04
Firmware with OpenBSD
The firmware of SINAUT MD741-1 contains sections from the OpenBSD software.
The use of OpenBSD software is subject to the following copyright notice
SINAUT MD741-1
6 C79000-G8976-C236-04
Preface
Online Support
In addition to our product documentation, the comprehensive online
information platform supports you in all aspects of our Service & Support at
any time and from any location in the world. You will find this on the Internet
at the following address:
www.siemens.com/automation/service&support
Here, you will find the following information:
Support news, newsletter
Product information, Product Support, Applications & Tools
Technical Forum
Access to other features of our Service & Support offer:
– Technical Consulting
– Engineering Support
– Field Service
Phone: +49 911 895 7444
– Spare parts and repairs
Phone: +49 911 895 7448
– Optimization and modernization
SINAUT MD741-1
C79000-G8976-C236-04 7
Preface
– Technical Support
Expert advice on technical questions with a wide range of demand-
optimized services for all our products and systems.
Phone: +49 911 895 7222
www.siemens.de/automation/support-request
You will find contact addresses on the Internet at the following address:
www.automation.siemens.com/partner
SITRAIN
With over 300 different courses, SITRAIN covers the entire Siemens product
and system spectrum in the field of automation and drive technology.
Advanced training tailored to your needs is also available. In addition to our
classic range of courses, we also offer a combination of various training
media and sequences. You can, for example, use self-study programs on
CD-ROM or on the Internet as preparation or to consolidate training.
You will find detailed information on our training curriculum and how to
contact our customer consultants at the following Internet address:
www.siemens.com/sitrain
Siemens documentation
You will find the order numbers for the relevant Siemens documentation
in the following catalogs:
– SIMATIC NET Industrial Communication, catalog IK PI
– SIMATIC Products for Totally Integrated Automation and Micro
Automation, catalog ST 70
You can request these catalogs and additional information from your
Siemens representative.
You will find many SIMATIC NET manuals on the Internet pages of
Siemens Customer Support for automation:
Link to Customer Support:
http://support.automation.siemens.com/WW/view/en
Enter the ID of the relevant manual as the search item. The ID is listed
below some of the reference entries in brackets.
You will find the latest version of this documentation under the entry
ID 22550242.
Alternatively you will find the SIMATIC NET manuals on the Internet
pages of Siemens Customer Support for automation:
http://support.automation.siemens.com/WW/view/en/10805878
Browse to the designated product group and set the following filter
settings:
"Entry list" → Entry type "Manuals"
SINAUT MD741-1
8 C79000-G8976-C236-04
Contents
SINAUT MD741-1
C79000-G8976-C236-04 9
Contents
SINAUT MD741-1
10 C79000-G8976-C236-04
Applications and functions
1
The SINAUT MD741-1 provides a wireless connection to the Internet or to a private
network. The SINAUT MD741-1 can provide this connection in any location where
a GSM network (Global System for Mobile Communication = mobile phone
network) is available which provides the services EGPRS (Enhanced General
Packet Radio Service = EDGE) or GPRS (General Packet Radio Service). A
precondition for this is a SIM card of a GSM network operator with the appropriate
services activated.
The SINAUT MD741-1 thus links a locally connected application or entire networks
to the Internet via wireless IP connections. It is also possible to connect directly to
an intranet, to which in turn the external remote stations are connected.
The SINAUT MD741-1 can establish a VPN (Virtual Private Network) between a
locally connected application / a network and an external network, and can protect
this connection against access by third parties through the use of IPsec (Internet
Protocol Security).
In order to perform these tasks in the scenarios described, the device combines the
following functions:
Firewall for protection against unauthorized access. The dynamic packet filter
examines data packets based on their source and destination addresses
(stateful inspection firewall) and blocks undesirable data traffic (anti-spoofing)
The SINAUT MD741-1 can establish via the wireless IP connections a VPN
Virtual Private Network) between the locally connected application or network
and en external network and can protect this connection by IPsec (Internet
Protocol Security) against unwanted access by third parties.
SINAUT MD741-1
C79000-G8976-C236-04 11
Application examples of the SINAUT MD741-1
S7-300
Central
Station
CPU TIM ST7cc
MD741-1
DSL-Modem VPN-Router
(E-)GPRS INTERNET
APN
VPN-Tunnel
VPN-Tunnel
TIM
VPN-Tunnel
Configuration
The device can be configured via a Web user interface that can simply be
displayed using a Web browser. It can be accessed by means of the following:
EGPRS/GPRS
SINAUT MD741-1
C79000-G8976-C236-04 12
Connection via
GSM-CSD
PC with
MD741-1
Web browser
Connection
PC with via (E-)GPRS
Web browser
PC with
Web browser
Firewall functions
The SINAUT MD741-1 provides the following firewall functions in order to protect
the local network and itself from external attacks:
● Anti-spoofing
● Port forwarding
● NAT
Additional functions
● DNS cache
● DHCP server
● NTP
● Remote logging
● In Port
● DynDNS client
SINAUT MD741-1
C79000-G8976-C236-04 13
Setup
2
2.1 Important notes on using the device
The following safety notices must be adhered to when setting up and operating the
device and during all work relating to it such as installation, connecting up,
replacing devices or opening the device.
Warning
! Risk of explosion when connecting or disconnecting the device
EXPLOSION HAZARD
DO NOT CONNECT OR DISCONNECT EQUIPMENT WHEN A FLAMMABLE OR
COMBUSTIBLE ATMOSPHERE IS PRESENT.
Warning
! Replacing components
EXPLOSION HAZARD
SUBSTITUTION OF COMPONENTS MAY IMPAIR SUITABILITY FOR CLASS I,
DIVISION 2 OR ZONE 2.
Warning
! Requirements for the cabinet/enclosure
When used in hazardous environments corresponding to Class I, Division 2 or Class I,
Zone 2, the device must be installed in a cabinet or a suitable enclosure.
To comply with EU Directive 94/9 (ATEX95), this enclosure must meet the
requirements of at least IP54 in compliance with EN 60529.
SINAUT MD741-1
14 C79000-G8976-C236-04
2 Setup
Warning
! Suitable cables for temperatures in excess of 70 °C
If the cable or conduit entry point exceeds 70 °C or the branching point of conductors
exceeds 80 °C, special precautions must be taken. If the equipment is operated in an
air ambient in excess of 50 °C, only use cables with admitted maximum operating
temperature of at least 80 °C.
Warning
! Protection against transient voltage surges
Provisions shall be made to prevent the rated voltage from being exceeded by
transient voltage surges of more than 40 %. This criterion is fulfilled, if supplies are
derived from SELV (Safety Extra-Low Voltage) only.
Step Chapter
1. First familiarise yourself with the preconditions for operation 2.3
of the SINAUT MD741-1.
2. Read the safety instructions and other instructions at the
beginning of this document very carefully, and be sure to
follow them.
3. Familiarise yourself with the control elements, connections 2.4 -2.7
and operating state indicators of the SINAUT MD741-1.
4. Connect a PC with a Web browser (Admin PC) to the local 3
interface (X2) of the SINAUT MD741-1.
5. Using the Web user interface of the SINAUT MD741-1, enter 5.1
the PIN (Personal Identification Number) of the SIM card.
6. Disconnect the SINAUT MD741-1 from the power supply. 2.7
7. Insert the SIM card in the device. 2.8
8. Connect the antenna. 2.7
9. Connect the SINAUT MD741-1 to the power supply. 2.7
10. Set the SINAUT MD741-1 up in accordance with your 3 - 10
requirements.
11. Connect your local application. 2.7
SINAUT MD741-1
C79000-G8976-C236-04
2 Setup
Antenna
An antenna, adapted to the frequency bands of the GSM network operator you
have chosen: 850 MHz, 900 MHz, 1800 MHz or 1900 MHz. Use only antennas
from the accessories for the SINAUT MD741-1.
Power supply
A power supply with a voltage between 12 VDC and 30 VDC that can provide
sufficient current.
SIM card
PIN
The SIM card must be activated by your GSM network operator for the services
EGPRS or GPRS.
● User name
● Password
The SIM card must be activated by your GSM network operator for the CSD
service if you wish to use remote configuration via a dial-in data connection, see
Chapter 8.3.
SINAUT MD741-1
16 C79000-G8976-C236-04
2 Setup
On the front side of the SINAUT MD741-1 there is a small hole (see B) which is
SET marked and has a button behind it. Use a pointed object, e.g. a straightened-
out paperclip, to press this button.
● If you press the button for longer than 5 seconds, the SINAUT MD741-1
reboots and loads the factory settings.
SINAUT MD741-1
C79000-G8976-C236-04
2 Setup
The SINAUT MD741-1 has 7 indicator lamps (LEDs) to indicate the operating state.
The 3 indicator lamps on the left-hand side of the device indicate the state of the
EGPRS wireless modem:
The 3 indicator lamps on the right-hand side of the device indicate the state of
additional device functions:
SINAUT MD741-1
18 C79000-G8976-C236-04
2 Setup
2.7 Connections
X2 (10/100 Base-T)
The local network is connected to the local applications at the 10/100 Base-T
connection, e.g. a programmable controller, a machine with an Ethernet interface
for remote monitoring, or a notebook or desktop PC.
To set up the SINAUT MD741-1, connect the Admin PC with Web browser here.
A connecting cable with a RJ45 plug must be used. It can be a cross-over cable or
a patch cable.
X1 (USB; Service)
In the SINAUT MD741-1 this interface has no function and is reserved for later
applications. Do not connect any devices here. Doing so could interfere with the
SINAUT MD741-1's operation.
The SINAUT MD741-1 has an antenna jack of the type SMA for connecting the
antenna.
The antenna that is used should have an impedance of about 50 ohms. It must be
matched for GSM 900MHz and DCS 1800MHz or GSM 850 MHz and PCS 1900
MHz, depending on which frequency bands your GSM network operator uses. In
Europe and China GSM 900MHz and DCS 1800MHz are used, in the USA GSM
850 MHz and PCS 1900 MHz are used. Obtain this information from your network
operator.
Caution:
Use only antennas from the accessories line for the SINAUT MD741-1. Other
antennas could interfere with product characteristics or even lead to defects.
When installing the antenna, a sufficiently good signal quality must be ensured
(CSQ > 11). Use the indicator lamps of the SINAUT MD741-1 which show the
signal quality. Make sure that there are no large metal objects (e.g. reinforced
concrete) close to the antenna.
Observe the installation and user instructions for the antenna being used.
SINAUT MD741-1
C79000-G8976-C236-04
2 Setup
Warning:
When the antenna is installed outdoors it must be earthed for lightning protection.
The outdoor antennas shield must be reliable connective to protective earth. The
installation shall be done according the national installation codes (For US this is
the National Electric Code NFPA 70, article 810).
This work must be carried out by qualified personnel only.
Power supply
The SINAUT MD741-1 operates with direct current of from DC 12-30 V, nominally
DC 24 V. This power supply is connected at the screw terminals on the left-hand
side of the device.
Connect the positive supply voltage to one or both screw terminals marked 24V
and the negative supply voltage to one or both screw terminals marked 0V.
Warning:
The power supply unit of the SINAUT MD741-1 is not electrically isolated. Observe
the safety instructions at the beginning of this manual.
SINAUT MD741-1
20 C79000-G8976-C236-04
2 Setup
Caution:
Before inserting the SIM card, enter the PIN of the SIM card in the SINAUT
MD741-1 via the Web user interface. See Chapter 5.1.
1. After you have entered the PIN of the SIM card, disconnect the SINAUT
MD741-1 completely from the power supply.
2. The drawer for the SIM card is located on the back of the device. Right next to
the drawer for the SIM card in the housing aperture there is a small yellow
button. Press on this button with a pointed object, for example a pencil.
When the button is pressed the SIM card drawer comes out of the housing.
3. Place the SIM card in the drawer so that its gold-plated contacts remain visible.
4. Then push the drawer with the SIM card completely into the housing.
Caution:
Do not under any circumstances insert or remove the SIM card during operation.
Doing so could damage the SIM card and the SINAUT MD741-1.
SINAUT MD741-1
C79000-G8976-C236-04
2 Setup
The SINAUT MD741-1 is suitable for top-hat rail mounting on DIN EN 50022 rails.
A corresponding bracket can be found at the rear of the device.
SINAUT MD741-1
22 C79000-G8976-C236-04
Configuration
3
Configuration of the router and firewall functions is carried out locally or remotely
via the Web-based administration interface of the SINAUT MD741-1.
Remote configuration
Remote configuration via HTTPS or CSD access is only possible if the SINAUT
MD741-1 is configured for remote access. In this case proceed exactly as
described in Chapter 8.
● The computer (Admin PC) that you use to carry out configuration must be
either connected directly to the Ethernet jack of the SINAUT MD741-1 via a
network cable or it must have direct access to the SINAUT MD741-1 via the
local network.
● The network adapter of the computer (Admin PC) that you use to carry out
configuration must have the following TCP/IP configuration:
IP address: 192.168.1.2
Instead of the IP address 192.168.1.2 you can also use other IP addresses
from the range 192.169.1.x.
● If you also wish to use the Admin PC to access the external network via the
SINAUT MD741-1, the following additional settings are necessary:
SINAUT MD741-1
23 C79000-G8976-C236-04
3 Configuration
Then click on LAN Connection. In the dialog box Properties of LAN Connection,
click on the General tab and select there the entry Internet Protocol (TCP/IP). Open
Properties by clicking on the corresponding button.
Note:
The path leading to the dialog box Properties of LAN Connection depends on your
Windows settings. If you are not able to find this dialog box, search in the Windows
Help function for LAN Connection or Properties of Internet Protocol (TCP/IP).
Enter the following values in order to get to the Web user interface of the SINAUT
MD741-1:
IP address: 192.168.1.2
SINAUT MD741-1
24 C79000-G8976-C236-04
3 Configuration
In addition, enter the following values if you want to use the Admin PC to access
the external network via the SINAUT MD741-1:
If you call up addresses via a domain name (e.g. www.neuhaus.de), then you must
refer to a domain name server (DNS) to find out what IP address is behind the
name. You can define the following as the domain name server:
or
To define the domain name server in the TCP/IP configuration of your network
adapter, proceed as described above.
For user names, passwords, host names, APN and PIN the following ASCII
chracters may be used:
abcdefghIjklmnopqrstuvwxyzABCDEFGHIJKLMNOPQR
STUVWXYZ0123456789!$%&'()*+,./:;<=>?@[\]^_`{|}
abcdefghIjklmnopqrstuvwxyzABCDEFGHIJKLMNOPQR
STUVWXYZ0123456789.-
SINAUT MD741-1
C79000-G8976-C236-04
3 Configuration
Proceed as follows:
2. Make sure that the browser does not automatically dial a connection when it is
launched.
3. In the address line of the browser, enter the address of the SINAUT MD741-1
in full. In the factory settings this is:
https://192.168.1.1
SINAUT MD741-1
26 C79000-G8976-C236-04
3 Configuration
Note
Because the device can only be administered via encrypted access, it is delivered
with a self-signed certificate. In the case of certificates with signatures that the
operating system does not know, a security message is generated. You can
display the certificate.
It must be clear from the certificate that it was issued for SIEMENS AG. The Web
user interface is addressed via an IP address and not using a name, which is why
the name specified in the security certificate, is not the same as the one in the
certificate.
5. You will be asked to enter the user name and the password:
Password: sinaut
Note
You should change the password in any event. The factory settings are general
knowledge and does not provide sufficient protection. Chapter 3.8 contains a
description of how to change the password.
SINAUT MD741-1
C79000-G8976-C236-04
3 Configuration
After the user name and password are entered, the start page of the SINAUT
MD741-1 appears in the Web browser with an overview of the operating state, see
Chapter 3.4.
If after several tries the browser still reports that the page cannot be displayed, try
the following:
ping 192.168.1.1
If a return receipt message for the 4 packets that were sent out does not
appear within the specified time period, check the cable, the connections and
the network card.
● Make sure that the browser does not use a proxy server. In MS Internet
Explorer (Version 7.0), make these settings as follows: Menu Tools, Internet
Options..., tab Connections: Under LAN Settings, click on the Settings... button,
then in the dialog box Settings for local network (LAN), make sure that under
Proxy Server the entry Use proxy server for LAN is not activated.
● If other LAN connections are active on the computer, deactivate them for the
duration of the configuration process.
Under the Windows menu Start, Connect To ..., Show All Connections… ,
under LAN or High-Speed Internet right-click on the connection concerned and
select Deactivate in the pop-up menu.
https://192.168.1.1/
SINAUT MD741-1
28 C79000-G8976-C236-04
3 Configuration
After the Web user interface of the SINAUT MD741-1 is called up and the user
name and password are entered, an overview of the current operating state of the
SINAUT MD741-1 appears.
Note
Use the Refresh function of the Web browser to update the displayed values.
Shows the current system time of the SINAUT MD741-1 in the format:
Connection
External hostname
SINAUT MD741-1
C79000-G8976-C236-04
3 Configuration
Assigned IP address
Shoes the IP address at which the SINAUT MD741-1 can be reached in EGPRS or
GPRS. This IP address is assigned to the SINAUT MD741-1 by EGPRS or GPRS.
Note
Remote HTTPS
Shows whether remote access to the Web user interface of the SINAUT MD741-1
via EGPRS, GPRS or CSD is permitted (see Chapter 8.1).
Remote SSH
Shows whether remote access to the SSH console of the SINAUT MD741-1 via
EGPRS, GPRS or CSD is permitted (see Chapter 8.2).
SINAUT MD741-1
30 C79000-G8976-C236-04
3 Configuration
CSD Dial-In
Shows whether remote CSD service calls are allowed (see Chapter 8.3).
The Web user interface of the SINAUT MD741-1 supports English and German
language.
Automatic
The SINAUT MD741-1 selects the language of the Web user interface in
accordance to the selected language of the used Web browser:
Deutsch
The SINAUT MD741-1 uses the German language, irrespective of the Web
browser settings.
English
The SINAUT MD741-1 uses the English language, irrespective of the Web browser
settings.
Click the GO and refresh your Web browser to change the language.
SINAUT MD741-1
C79000-G8976-C236-04
3 Configuration
Note
Depending on how you configure the SINAUT MD741-1, you may then have to
adapt the network interface of the locally connected computer or network
accordingly.
Invalid entries
The SINAUT MD741-1 checks your entries. Obvious errors are detected during
saving and the input box in question is marked.
SINAUT MD741-1
32 C79000-G8976-C236-04
3 Configuration
The settings of the SINAUT MD741-1 can be saved in configuration profiles (files)
and re-loaded at any time.
Upload Profile
Loads to the SINAUT MD741-1 a configuration profile that was created before and
saved on the Admin PC. Files with configuration profiles have the file extension
*.epr.
Create profile
First enter a name for the profile in the input box. Create saves the settings in a
profile with this names and then displays them in the table of saved configuration
profiles.
SINAUT MD741-1
C79000-G8976-C236-04
3 Configuration
The table of saved configuration profiles shows all of the profiles that are saved in
the SINAUT MD741-1.
Download
Activate
The SINAUT MD741-1 accepts the settings from the selected configuration profile
and continues to work using them.
Delete
The profile Default configuration contains the factory settings, and cannot be
deleted.
SINAUT MD741-1
34 C79000-G8976-C236-04
3 Configuration
● Password: sinaut
Note
Change the password immediately after initial start-up. The factory settings are
general knowledge and does not provide sufficient protection.
Note
The user name for the SSH access is different from the user name for the Web-
Interface.
The password for the SSH access is the same as for the Web-Interface.
To change the password, enter the new password you have selected in New
access password and confirm the entry in Retype new access password.
Reset can be used to discard any entries that have not yet been saved. Save
accepts the new password.
3.9 Reboot
The reboot resets the functions of the SINAUT MD741-1. Current settings
according to the configuration profile do not change. The SINAUT MD741-1
continues to work using these settings after the reboot.
SINAUT MD741-1
C79000-G8976-C236-04
3 Configuration
Reboot now
The reboot is carried out automatically once a day if you switch the function on with
Yes.
Specify the Time of the daily reboot. The reboot will be carried out at the specified
system time. Existing connections will be interrupted.
Factory settings
SINAUT MD741-1
36 C79000-G8976-C236-04
3 Configuration
The factory settings of the SINAUT MD741-1 can be restored by the following
means:
A click on the push button Reset loads the factory settings, resets the passwords
and deletes the stored certificates, the configuration profiles and the archived log
files.
The load of the factory settings can also be activated by pushing the service button
(see chapter 2.5).
Default configuration
If just the factory settings shall be loaded, without to delete the certificates,
configuration profiles and the archived log files, just activate the default
configuration as being described in chapter 3.7.
SINAUT MD741-1
C79000-G8976-C236-04
Local interface
4
The local interface is the interface of the SINAUT MD741-1 for connecting the local
network. The interface is labeled X2 on the device. This is an Ethernet interface
with a data rate of 10Mbit/s or 100Mbit/s.
The Local network is the Network connected to the local interface of the SINAUT
MD741-1. The local network contains at least one local application.
Local applications are network components in the local network, for example a
programmable controller, a machine with an Ethernet interface for remote
monitoring, or a notebook or desktop PC or the Admin PC.
Configure the local interface and the related functions according to the your
requirements and the advices in this chapter.
This is where the IP addresses and the netmasks at which the SINAUT MD741-1
can be reached by local applications are set.
Figure 4-1 Local Network > Basic Settings > Local IPs
SINAUT MD741-1
C79000-G8976-C236-04
4 Local interface
IP 192.168.1.1
Netmask 255.255.255.0
These factory-set IP addresses and netmasks can be changed freely, but should
follow the applicable recommendations (RFC 1918).
Local IP
and
netmask
Admin PC
You can define additional addresses at which the SINAUT MD741-1 can be
reached by local applications. This is useful, for example, when the local network is
subdivided into subnetworks. Then multiple local applications from different
subnetworks can reach the SINAUT MD741-1 under various addresses.
New
Adds additional IP addresses and netmasks, which you can then modify in turn.
Delete
Removes the respective IP address and netmask. The first entry cannot be
deleted.
SINAUT MD741-1
C79000-G8976-C236-04
4 Local interface
IP addresses
and so forth
PC with
Web browser
Figure 4-4 Local Network > Basic Settings > Local IPs
Start DHCP server – Yes switches on the DHCP server of the SINAUT MD741-1;
No switches it off.
SINAUT MD741-1
40 C79000-G8976-C236-04
4 Local interface
Local netmask
Here enter the local netmask that should be assigned to the local applications.
Default gateway
Here enter the default gateway that should be assigned to the local applications.
DNS server
Here enter the DNS server that should be assigned to the local applications.
With Yes the IO addresses that the DHCP server of the SINAUT MD741-1 assigns
are drawn from a dynamic address pool.
With No the IP addresses must be assigned to the MAC addresses of the local
application under Static Leases.
Static Leases
MAC address of the client – MAC address of the querying local application
SINAUT MD741-1
C79000-G8976-C236-04
4 Local interface
Factory settings
The SINAUT MD741-1 provides a domain name server (DNS) to the local network.
If you enter the IP address of the SINAUT MD741-1 in your local application as the
domain name server (DNS), then the SINAUT MD741-1 answers the DNS queries
from its cache. If it does not know the corresponding IP address for a domain
address, then the SINAUT MD741-1 forwards the query to an external domain name
server (DNS).
Remote network
DNS of the DNS in the Private
network provider Internet DNS
MD741-1
Local Router/
application Firewall
(E-)GPRS INTERNET
APN
The time period for which the SINAUT MD741-1 holds a domain address in the
cache depends on the host being addressed. In addition to the IP address, a DNS
query to an external domain name server also supplies the life span of this
information.
SINAUT MD741-1
42 C79000-G8976-C236-04
4 Local interface
The external domain name server (DNS) used can be a server of the network
operator, a server on the Internet, or a server in a private external network.
Selected nameserver
Select which domain name server (DNS) the SINAUT MD741-1 should query.
Provider Defined
User Defined
As the user you select your preferred DNS. The DNSes can be connected to the
Internet, or it can be a private DNS in your network.
If you have selected the option User Defined then enter the IP address of the
selected DNS as the Server IP Address.
Factory settings
SINAUT MD741-1
C79000-G8976-C236-04
4 Local interface
The SINAUT MD741-1 can also be addressed from the local network using a host
name. To do this, define a host name, e.g. MD741.
The SINAUT MD741-1 can then be called up, for example from a Web browser as
MD741.
Note
The security concept of the SINAUT MD741-1 requires the creation of an outgoing
firewall rule for each local application that is to use this hostname function. See
Chapter 6.1.
If you do not use DHCP (see Chapter 4.2), then identical search paths have to be
entered manually in the SINAUT MD741-1 and in the local applications. If you do
use DHCP, the local applications received the search path entered in the SINAUT
MD741-1 via DHCP.
Factory settings
Searchpath example.local
Hostname SINAUT
SINAUT MD741-1
44 C79000-G8976-C236-04
4 Local interface
This is where you set the system time for the SINAUT MD741-1. This system time
is:
The SINAUT MD741-1 can also obtain the system time from a time server via NTP
(= Network Time Protocol). There are a number of time servers on the Internet that
can be used to obtain the current time very precisely via NTP.
The NTP time servers communicate the UTC (= Universal Time Coordinated). To
specify the time zone, select a city near the location near where the SINAUT
MD741-1 will be operating. The time in this time zone will then be used as the
system time.
SINAUT MD741-1
C79000-G8976-C236-04
4 Local interface
NTP server
Click on New to add an NTP server, and enter the IP address of such an NTP
server, or use the NTP server preset at the factory. You can specify multiple NTP
servers at the same time.
Poll interval
Notice
Synchronization of the system time via NTP creates additional data traffic on the
EGPRS or GPRS interfaces. This may result in additional costs, depending on your
user agreement with the GSM network operator.
The SINAUT MD741-1 can serve itself as an NTP time server for the applications
that are connected to its local network interface. To activate this function select
Yes.
The NTP time server in the SINAUT MD741-1 can be reached via the local IP
address set for the SINAUT MD741-1, see Chapter 4.1.
Factory settings
SINAUT MD741-1
46 C79000-G8976-C236-04
4 Local interface
If the local network is subdivided into subnetworks, you can define additional
routes.
Factory settings
Network: 192.168.2.0/24
Gateway: 192.168.0.254
SINAUT MD741-1
C79000-G8976-C236-04
External interface
5
The external interface of the SINAUT MD741-1 connects the SINAUT MD741-1 to
the external network. EGPRS, GPRS or GSM are used for the communication at
this interface.
External remote stations are network components in an external network, e.g. Web
servers on the Internet, routers on an intranet, a central company server, an Admin
PC, and much more.
Configure the external interface and the related functions according to the your
requirements and the advices in this chapter.
The SINAUT MD741-1 uses EGPRS or GPRS for communication with the external
network. For access to the services EGPRS and GPRS and to the underlying GSM
wireless network, access parameters are necessary, which you will receive from
your GSM network operator.
MD741-1
Local
application
SIM
(E-)GPRS
VPN
APN
(private)
SINAUT MD741-1
48 C79000-G8976-C236-04
5 External interface
The user name and password protect the access to EGPRS and GPRS.
The APN (Access Point Name) defines the transition from EGPRS or GPRS to
additional connected IP networks, for example a public APN to the Internet or a
private APN to a virtual private network (VPN).
Figure 5-2 External Network > EDGE/GPRS - Provider selection mode - manual
If you select Manual as the provider selection mode, enter the user name,
password and APN for the GPRS service manually.
Figure 5-3 External Network > EDGE/GPRS - Provider selection mode - Automatic
If you select Automatic as the provider selection mode, the access data for the
GPRS service is selected automatically from the list of providers based on the Net
ID of the SIM card. You can create several entries in the list.
Note
Only the standard APNs of the providers are entered automatically!
With New, you add a new entry. With Delete, you remove the entries.
SINAUT MD741-1
C79000-G8976-C236-04
5 External interface
PIN
Enter the PIN for your SIM card here. You will receive the PIN from your network
operator.
The SINAUT MD741-1 also works with SIM cards that have no PIN; in this case
enter NONE. In this case the input box is left empty.
Note
If no entry is made, the input box for the PIN is shown with a red outline after
saving.
Here, you can enter any text of your choice to name the GPRS service, such as the
name of the provider (for example Vodafone, Eplus, my GPRS access).
Here, enter the identification number (Net-ID) of the network provider. Each
GSM/GPRS network provider has an assigned identification number that is unique
worldwide known as the Public Land Mobile Network (PLMN). PLMN is made up of
(MCC) and (MNC). You will find the Net-ID in the documentation provided by your
GSM/GPRS network provider or on the provider's Internet pages.
The Net-ID is stored on the SIM card. The SINAUT MD741-1 reads the Net-ID from
the SIM card and selects the corresponding GPRS access data from the list of
providers.
User name
Enter the user name for EGPRS and GPRS here. Some GSM/GPRS network
operators do not use access control with user names and/or passwords. In this
case enter guest in the corresponding box.
Password
Enter the password for EGPRS and GPRS here. Some GSM/GPRS network
operators do not use access control with user names and/or passwords. In this
case enter guest in the corresponding box.
APN
Enter the name of the transition from EGPRS and GPRS to other networks here.
You can find the APN in your GSM/GPRS network operator's documentation, on
your operator's Website, or ask your operator's hotline.
SINAUT MD741-1
50 C79000-G8976-C236-04
5 External interface
Factory settings
PIN NONE
User name guest
Password guest
APN NONE
Password guest
APN internet.t-mobile
Password guest
APN web.vodafone.de
Password guest
APN internet.eplus.de
4th provider O2
Net-ID 26207
Password guest
APN internal
SINAUT MD741-1
C79000-G8976-C236-04
5 External interface
nth provider O2
Net-ID NONE
Password NONE
APN NONE
With the function Connection Check the SINAUT MD741-1 checks its connection to
EGPRS or GPRS and to the connected external networks, such as the Internet or
an intranet. To do this, the SINAUT MD741-1 sends ping packets (ICMPs) to up to
four remote stations (target hosts) at regular intervals. This takes place
independently of the user data connections. If after such a ping the SINAUT
MD741-1 receives a response from at least one of the remote stations addressed,
then the SINAUT MD741-1 is still connected with the EGPRS or GPRS and ready
for operation.
Some network operators interrupt connections when they are inactive. This is
likewise prevented by the Connection Check function.
MD741-1
Local Router/
application Firewall
(E-)GPRS INTERNET
APN
Notice
Sending ping packets (ICMPs) increases the amount of data sent and received via
EGPRS or GPRS. This can lead to increased costs.
SINAUT MD741-1
52 C79000-G8976-C236-04
5 External interface
Select up to four remote stations that the SINAUT MD741-1 can ping. The remote
stations must be available continuously and must answer pings.
Note
Make sure that the selected remote stations will not be disturbed.
Specifies the interval at which the connection check ping packets are sent by the
SINAUT MD741-1. This is specified in minutes.
Specifies how many times it is allowed for all ping packets of an interval not to
receive an answer, i.e. for none of four pinged remote stations to answer, before
the specified action is carried out.
SINAUT MD741-1
C79000-G8976-C236-04
5 External interface
Renew Connection
The SINAUT MD741-1 re-establishes the connection to EGPRS or GPRS if the
ping packets sent were not answered.
Reboot MD741-1
The SINAUT MD741-1 carries out a reboot if the ping packets sent were not
answered.
Factory settings
MD741-1 Response: IP
Local
application
(E-)GPRS INTERNET
APN Router/
Firewall
SINAUT MD741-1
54 C79000-G8976-C236-04
5 External interface
DynDNS provider
Enter here the username and the password that authorise you to use the DynDNS
service. Your DynDNS provider will give you this information.
DynDNS hostname
Here enter the hostname that you have agreed with your DynDNS provider for the
SINAUT MD741-1, e.g. myMD741.dyndns.org.
Factory settings
SINAUT MD741-1
C79000-G8976-C236-04
5 External interface
Note
Using the services provided by the "SIMATIC Remote Support Services", remote
access to machines and plants is available.
To use the services, additional service agreements are necessary and certain
constraints must be kept to. If you are interested in the Siemens Remote Service,
speak to your local Siemens contact.
If the Siemens Remote Service is activated, the SINAUT MD741-1 transfers its
external IP address assigned by the EDGE/GPRS service to a selectable
destination server. This transfer is made using the secure HTTPS protocol.
The procedure is comparable with the DynDNS service and requires suitable
access to the server.
With New, you add a new destination server. With Delete, you remove existing
entries.
If you do not want to use the Siemens Remote Service, select No.
Refresh interval
Enter the interval in seconds at which the assigned IP address of the SINAUT
MD741-1 is transferred to the selected destination server.
Here, enter the destination address and access data of one or more destination
servers:
SINAUT MD741-1
56 C79000-G8976-C236-04
5 External interface
Remote host
Group
Username
Password
Factory settings
Group group
Username user
Password pass
SINAUT MD741-1
C79000-G8976-C236-04
Security functions
6
6.1 Packet Filter
A stateful inspection firewall is a packet filtering method. Packet filters only let IP
packets through if this has been defined previously using firewall rules. The
following is defined in the firewall rules:
It is likewise defined here what will be done with IP packets that are not allowed
through (discard, reject).
For a simple packet filter it is always necessary to create two firewall rules for a
connection:
● One rule for the query direction from the source to the destination, and
● a second rule for the query direction from the destination to the source.
SINAUT MD741-1
58 C79000-G8976-C236-04
6 Security functions
The Firewall Rules (Incoming) are used to define how to handle IP packets that are
received from external networks (e.g. the Internet) via EGPRS or GPRS. The
source is the sender of this IP packet. The destination is the local applications on
the SINAUT MD741-1.
In the factory settings, no incoming firewall rule is set initially, i.e. no IP packets can
go through.
New
Adds an additional firewall rule that you can then fill out.
Delete
Protocol
Select the protocol for which this rule will be valid. The following selections are
available: TCP, UDP, ICMP. If you select All, the rule is valid for all three protocols.
From IP
Enter the IP address of the external remote station that is allowed to send IP
packets to the local network. Do this by specifying the IP address or an IP range for
the remote station. 0.0.0.0/0 means all addresses.
From port
Enter the port from which the external remote station is allowed to send IP packets.
(is only evaluated for the protocols TCP and UDP)
SINAUT MD741-1
C79000-G8976-C236-04
6 Security functions
To IP
Enter the IP address in the local network to which IP packets may be sent. Do this
by specifying the IP address or an IP range of the application in the local network.
0.0.0.0/0 means all addresses.
To port
Enter the port to which the external remote station is allowed to send IP packets.
Action
Reject – The data packets are rejected, and the sender receives a corresponding
message.
Drop – The data packets are discarded without any feedback to the sender.
The Firewall Rules (Outgoing) are used to define how to handle IP packets that are
received from the local network. The source is an application in the local network.
The destination is an external remote station, e.g. on the Internet or in a private
network.
In the factory settings, no outgoing firewall rule is set initially, i.e. no IP packets can
go through.
New
Adds an additional firewall rule that you can then fill out.
Protocol
Select the protocol for which this rule will be valid. The following selections are
available: TCP, UDP, ICMP. If you select All, the rule is valid for all three protocols.
From IP
Enter the IP address of the local application that is allowed to send IP packets to
the external network. Do this by specifying the IP address or an IP range for the
local application. 0.0.0.0/0 means all addresses.
SINAUT MD741-1
60 C79000-G8976-C236-04
6 Security functions
From port
Enter the port from which the local network is allowed to send IP packets. Do this
by specifying the port number.
(is only evaluated for the protocols TCP and UDP)
To IP
Enter the IP address in the external network to which IP packets may be sent. Do
this by specifying the IP address or an IP range of the application in the network.
0.0.0.0/0 means all addresses.
To port
Enter the port to which the external remote station is allowed to send IP packets.
Do this by specifying the port number.
(is only evaluated for the protocols TCP and UDP)
Action
Reject – The data packets are rejected, and the sender receives a corresponding
message.
Drop – The data packets are discarded without any feedback to the sender.
Log
For each individual firewall rule you can define whether the event should be
This logs all connection attempts that are not covered by the defined rules.
SINAUT MD741-1
C79000-G8976-C236-04
6 Security functions
Factory settings
Incoming firewall
From IP 0.0.0.0/0
To IP 0.0.0.0/0
To port Any
Action Accept
Outgoing firewall
From IP 0.0.0.0/0
To IP 0.0.0.0/0
To port Any
Action Accept
SINAUT MD741-1
62 C79000-G8976-C236-04
6 Security functions
If a rule has been created for port forwarding, then data packets received at a
defined IP port of the SINAUT MD741-1 from the external network will be
forwarded. The incoming data packets are then forwarded to a specified IP address
and port number in the local network. The port forwarding can be configured for
TCP or UDP.
In port forwarding the following occurs: The header of incoming data packets from
the external network that are addressed to the external IP address of the SINAUT
MD741-1 and to a specific port are adapted so that they are forwarded to the
internal network to a specific computer and to a specific port of that computer.
This means that the IP address and port number in the header of incoming data
packets are modified.
Note
In order for incoming data packets to be forwarded to the defined IP address in the
local network, a corresponding incoming firewall rule must be set up for this IP
address in the packet filter. See Chapter 6.1.
New
Adds a new forwarding rule that you can then fill out.
Delete
Protocol
Specify here the protocol (TCP or UDP) to which the rule should refer.
SINAUT MD741-1
C79000-G8976-C236-04
6 Security functions
Destination port
Specify here the port number (e.g. 80) at which the data packets which are to be
forwarded arrive from the external network.
Forward to IP
Specify here the IP address in the local network to which the incoming data
packets should be forwarded.
Forward to port
Specify here the port number (e.g.) for the IP address in the local network to which
the incoming data packets should be forwarded.
Log
For each port forwarding rule you can define whether the event should be
Factory settings
Forwarding Rules -
Protocol All
Destination port 80
Forward to IP 127.0.0.1
Forward to port 80
SINAUT MD741-1
64 C79000-G8976-C236-04
6 Security functions
The advanced security functions serve to protect the SINAUT MD741-1 and the
local applications against attacks. For protective purposes it is assumed that only a
certain number of connections or received PING packets are permissible and
desirable in normal operation, and that a sudden burst represents an attack.
Maximum number …
The entries
set the upper limits. The settings (see illustration) have been selected so that they
will in practice never be reached in normal use. In the event of an attack, however,
they can be reached very easily, which means that the limitations constitute
additional protection. If your operating environment contains special requirements,
then you can change the values accordingly.
You can use this option to affect the response when ICMP packets are received
that are sent from the external network in the direction of the SINAUT MD741-1.
You have the following options:
SINAUT MD741-1
C79000-G8976-C236-04
6 Security functions
● Allow Ping: Only ping packets (ICMP type 8) to the SINAUT MD741-1 are
accepted.
● Accept: All types of ICMP packets to the SINAUT MD741-1 are accepted.
Factory settings
SINAUT MD741-1
66 C79000-G8976-C236-04
6 Security functions
The application of individual firewall rules is recorded in the firewall log. To do this,
the LOG function must be activated for the various firewall functions.
Caution
SINAUT MD741-1
C79000-G8976-C236-04
VPN connection
7
The SINAUT MD741-1 can connect the local network to a friendly remote network via a VPN
tunnel. The IP data packets that are exchanged between the two networks are encrypted, and
are protected against unauthorised tampering by the VPN tunnel. This means that even
unprotected public networks like the Internet can be used to transfer data without endangering
the confidentiality or integrity of the data.
For the SINAUT MD741-1 to establish a VPN tunnel, the remote network must
have a VPN gateway as the remote station for the SINAUT MD741-1.
Remote network
Local network
Admin PC Admin PC
MD741-1
VPN gateway
Local External
applikation (E-)GPRS INTERNET remote
stations
APN
Local
application
VPN tunnel
SINAUT MD741-1
68 C79000-G8976-C236-04
7 VPN connection
For the VPN tunnel, the SINAUT MD741-1 uses the IPsec method in tunnel mode.
In this method the IP data packets to be transmitted are completely encrypted and
provided with a new header before they are sent to the remote station's VPN
gateway. There the data packets are received, decrypted, and used to reconstruct
the original data packets. These are then forwarded to their destination in the
remote network.
● In VPN Roadwarrior Mode the SINAUT MD741-1 VPN can accept connections
from remote stations with an unknown address. These can be, for example,
remote stations in mobile use that obtain their IP address dynamically.
The VPN connection must be established by the remote station. Only one VPN
connection is possible in Roadwarrior Mode. VPN connections in Standard
Mode can be used at the same time.
● In VPN Standard Mode the address (IP address or hostname) of the remote
station's VPN gateway must be known for the VPN connection to be
established. The VPN connection can be established either by the SINAUT
MD741-1 or by the remote station's VPN gateway as desired.
Establishment of the VPN connection is subdivided into two phases: First in Phase
1 (ISAKMP = Internet Security Association and Key Management Protocol) the
Security Association (SA) for the key exchange between the SINAUT MD741-1 and
the VPN gateway of the remote station is established.
After that in Phase 2 (IPsec = Internet Protocol Security) the Security Association
(SA) for the actual IPsec connection between the SINAUT MD741-1 and the
remote station's VPN gateway is established.
● ESP
● Diffie-Hellman group 1, 2 or 5
● Tunnel Mode
● Quick Mode
● Main Mode
SINAUT MD741-1
C79000-G8976-C236-04
7 VPN connection
If the remote station is a computer running under Windows 2000, then the
Microsoft Windows 2000 High Encryption Pack or at least Service Pack 2 must
also be installed.
If the remote station is on the other side of a NAT router, then the remote station
must support NAT-T. Or else the NAT router must know the IPsec protocol
(IPsec/VPN passthrough).
The Roadwarrior Mode makes it possible for the SINAUT MD741-1 to accept a
VPN connection initiated by a remote station with an unknown IP address. The
remote station must authenticate itself properly; in this VPN connection there is no
identification of the remote station based on the IP address or the hostname of the
remote station.
Set the SINAUT MD741-1 up in accordance with what has been agreed with the
system administrator of the remote station.
SINAUT MD741-1
70 C79000-G8976-C236-04
7 VPN connection
Authentication method
Select the authentication method in accordance with what you have agreed with
the system administrator of the remote station.
● X.509 certificate
● CA certificate
● Pre-shared key
In the authentication methods X.509 certificate and CA certificate, the keys used
for authentication have first been signed by a Certification Authority (CA). This
method is considered especially secure. A CA can be a service provider, but also,
for example, the system administrator for your project, provided that he has the
necessary software tools.
The CA creates a certificate file (PKCS12) with the file extension *p12 for each of
the two remote stations. This certificate file contains the public and private keys for
the own station, the signed certificate from the CA, and the public key of the CA.
For the authentication method X.509 there is additionally a key file (*.pem, *cer or
*.crt) for each of the two remote stations with the public key of the own station.
SINAUT MD741-1
C79000-G8976-C236-04
7 VPN connection
X.509 certificate
The public keys (files with extension *.pem, *cer or *.crt) are exchanged between
the SINAUT MD741-1 and the remote station's VPN gateway takes place
manually, for example on a CD-ROM or vie e-mail. To load the certificate, proceed
as described in Chapter 7.3.
CA certificate
The public keys are exchanged between the SINAUT MD741-1 and the remote
station's VPN gateway via the data connection when the VPN connection is
established. Manual exchange of the key files is not necessary.
Remote certificate
If you have selected X.509 certificate as the authentication method, then a list of
the remote certificates that you have already loaded into the SINAUT MD741-1 is
displayed here. Select the certificate for the VPN connection.
The Local ID and the Remote ID are used by IPsec to identify the remote stations
uniquely when establishing the VPN connection. The own Local ID constitutes the
Remote ID of the remote station and vice versa.
SINAUT MD741-1
72 C79000-G8976-C236-04
7 VPN connection
Here you can define the properties of the VPN connection according to your
requirements and what you have agreed with the system administrator of the
remote station.
Agree with the administrator of the remote station which encryption method will be
used for the ISAKMP-SA and the IPsec-SA. The SINAUT MD741-1 supports the
following methods:
● 3DES-168
● AES-128
● AES-192
● AES-256
SINAUT MD741-1
C79000-G8976-C236-04
7 VPN connection
Note:
The more bits in the encryption algorithm - indicated by the appended number - the
more secure it is. The method AES-256 is therefore considered the most secure.
However, the longer the key, the more time the encryption process takes and the
more computing power is required.
Agree with the administrator of the remote station which method will be used for
computing checksums/hashes during the ISAKMP phase and the IPsec phase. The
following selections are available:
● MD5
● SHA-1
ISAKMP-SA mode
Agree with the administrator of the remote station which method will be used for
negotiating the ISAKMP-SA. The following selections are available:
● Main mode
● Aggressive mode
Note:
When the authentication method Pre-Shared Key is used, Aggressive mode must
be set in Roadwarrior mode.
The keys for an IPsec connection are renewed at certain intervals in order to
increase the effort required to attack an IPsec connection.
Specify the lifetime (in seconds) of the keys agreed on for the ISAKMP-SA and
IPsec-SA.
SINAUT MD741-1
74 C79000-G8976-C236-04
7 VPN connection
NAT-T
There may be a NAT router between the SINAUT MD741-1 and the VPN gateway
of the remote network. Not all NAT routers allow IPsec data packets to go through.
It may therefore be necessary to encapsulate the IPsec data packets in UDP
packets so that they can go through the NAT router.
On:
If the SINAUT MD741-1 detects a NAT router that does not let the IPsec data
packets through, then UDP encapsulation is started automatically.
Force:
Off:
If the remote station supports the dead peer detection (DPD) protocol, then the
partner in question can detect whether the IPsec connection is still valid or not,
meaning that it may have to be re-established. Without DPD, depending on the
configuration it may be necessary to wait until the SA lifetime elapses or the
connection has to be re-initiated manually. To check whether the IPsec connection
is still valid, the dead peer detection sends DPD requests to the remote station
itself. If there is no answer, then after the permitted number of failed attempts the
IPsec connection is considered to be interrupted.
Notice
Sending DPD requests increases the amount of data sent and received via EGPRS
or GPRS. This can lead to increased costs.
Yes
Dead peer detection is switched on. Independently of the transmission of user
data, the SINAUT MD741-1 detects if the connection is lost, in which case it waits
for the connection to be re-established by the remote stations.
No
Dead peer detection is switched off.
SINAUT MD741-1
C79000-G8976-C236-04
7 VPN connection
Time period in seconds after which DPD requests will be sent. These requests test
whether the remote station is still available.
Time period in seconds after which the connection to the remote station will be
declared dead if no response has been made to the DPD requests.
Factory settings
Name Any
Remote ID NONE
Local ID NONE
Remote certificate -
NAT-T On
SINAUT MD741-1
76 C79000-G8976-C236-04
7 VPN connection
SINAUT MD741-1
C79000-G8976-C236-04
7 VPN connection
Connection name
Remote host
Specify the address of the remote station here, either as a hostname (e.g.
myadress.com) or as an IP address.
Local
application
VPN tunnel
In the authentication methods X.509 certificate and CA certificate, the keys used
for authentication have first been signed by a Certification Authority (CA). This
method is considered especially secure. A CA can be a service provider, but also,
for example, the system administrator for your project, provided that he has the
necessary software tools. The CA creates a certificate file (PKCS12) with the file
extension *p12 for each of the two remote stations. This certificate file contains the
public and private keys for the own station, the signed certificate from the CA, and
the public key of the CA. For the authentication method X.509 there is additionally
a key file (*.pem, *cer or *.crt) for each of the two remote stations with the public
key of the own station.
X.509 certificate
The public keys (files with extension *.pem, *cer or *.crt) are exchanged between
the SINAUT MD741-1 and the remote station's VPN gateway takes place
manually, for example on a CD-ROM or vie e-mail. To load the certificate, proceed
as described in Chapter 7.3.
CA certificate
The public keys are exchanged between the SINAUT MD741-1 and the remote
station's VPN gateway via the data connection when the VPN connection is
established. Manual exchange of the key files is not necessary.
SINAUT MD741-1
78 C79000-G8976-C236-04
7 VPN connection
The Local ID and the Remote ID are used by IPsec to identify the remote stations
uniquely when establishing the VPN connection.
● If you keep the factory setting NONE, then the Distinguished Names from the
own certificate and from the certificate communicated by the remote station are
automatically applied and used as the Local ID and Remote ID.
● If you manually change the entry for the Local ID or the Remote ID, then the
corresponding entries must be adapted at the remote station. The own Local ID
must be the same as the Remote ID of the remote station and vice versa. The
entries for Local or Remote IDs must be made in the ASN.1 format, e.g.
"C=XY/O=XY Org/CN=xy.org.org"
● If you keep the factory setting NONE, then the own IP address is automatically
used as the Local ID, and the IP address of the remote station is used as the
Remote ID:
● If you manually change the entry for the Local ID or for the Remote ID, then the
entries must have the format of a hostname (e.g. RemoteStation.de) or the
format of an e-mail address (remote@station.de). The own Local ID must be
the same as the Remote ID of the remote station and vice versa.
Note:
If with pre-shared secret key (PSK) the IP address is not used as the Remote ID,
then the Aggressive Mode has to be set as the ISAKMP-SA mode.
Scalance S ID
If you have loaded a Scalance S certificate, by clicking the Scalance S button, you
can load the Remote ID from the certificate.
Yes
The SINAUT MD741-1 waits for the VPN gateway of the remote network to initiate
establishment of the VPN connection.
SINAUT MD741-1
C79000-G8976-C236-04
7 VPN connection
No
Here enter the IP address (e.g. 123.123.123.123) of the remote network. The
remote network can also be only a single computer.
Address of
the local Address of
Admin PC network the remote
Admin PC
network
MD741-1
VPN gateway
External
Local
applikation (E-)GPRS INTERNET remote
stations
APN
Local
application
VPN tunnel
Here enter the subnet mask (e.g. 255.255.255.0) of the remote network. The
remote network can also be only a single computer.
Here enter the IP address (e.g. 123.123.123.123) of the local network. The local
network can also be only a single computer.
Here enter the subnet mask (e.g. 255.255.255.0) of the local network. The local
network can also be only a single computer.
SINAUT MD741-1
80 C79000-G8976-C236-04
7 VPN connection
Here you can define the properties of the VPN connection according to your
requirements and what you have agreed with the system administrator of the
remote station.
Agree with the administrator of the remote station which encryption method will be
used for the ISAKMP-SA and the IPsec-SA. The SINAUT MD741-1 supports the
following methods:
● 3DES-168
● AES-128
● AES-192
● AES-256
3DES-168 is a commonly used, and is therefore set as the default. The method
can be defined differently for ISAKMP-SA and IPsec-SA.
SINAUT MD741-1
C79000-G8976-C236-04
7 VPN connection
Note:
The more bits in the encryption algorithm - indicated by the appended number - the
more secure it is. The method AES-256 is therefore considered the most secure.
However, the longer the key, the more time the encryption process takes and the
more computing power is required.
Agree with the administrator of the remote station which method will be used for
computing checksums/hashes during the ISAKMP phase and the IPsec phase. The
following selections are available:
● MD5
● SHA-1
ISAKMP-SA mode
Agree with the administrator of the remote station which method will be used for
negotiating the ISAKMP-SA. The following selections are available:
● Main mode
● Aggressive mode
DH/PFS group
Agree with the administrator of the remote station the DH group for the key
exchange.
The keys for an IPsec connection are renewed at certain intervals in order to
increase the effort required to attack an IPsec connection.
Specify the lifetime (in seconds) of the keys agreed on for the ISAKMP-SA and
IPsec-SA.
SINAUT MD741-1
82 C79000-G8976-C236-04
7 VPN connection
NAT-T
There may be a NAT router between the SINAUT MD741-1 and the VPN gateway
of the remote network. Not all NAT routers allow IPsec data packets to go through.
It may therefore be necessary to encapsulate the IPsec data packets in UDP
packets so that they can go through the NAT router.
On:
If the SINAUT MD741-1 detects a NAT router that does not let the IPsec data
packets through, then UDP encapsulation is started automatically.
Force:
Off:
If the remote station supports the dead peer detection (DPD) protocol, then the
partner in question can detect whether the IPsec connection is still valid or not,
meaning that it may have to be re-established. Without DPD, depending on the
configuration it may be necessary to wait until the SA lifetime elapses or the
connection has to be re-initiated manually. To check whether the IPsec connection
is still valid, the dead peer detection sends DPD requests to the remote station
itself. If there is no answer, then after the permitted number of failed attempts the
IPsec connection is considered to be interrupted.
Notice
Sending DPD requests increases the amount of data sent and received via EGPRS
or GPRS. This can lead to increased costs.
Yes
Dead peer detection is switched on. Attempts are made to re-establish the IPsec
connection if it has been declared dead, independently of the transmission of user
data.
No
SINAUT MD741-1
C79000-G8976-C236-04
7 VPN connection
Time period in seconds after which DPD requests will be sent. These requests test
whether the remote station is still available.
Time period in seconds after which the connection to the remote station will be
declared dead if no response has been made to the DPD requests.
Factory settings
Name NewConnection
Enabled No (switched off)
Remote ID NONE
Local ID NONE
Remote certificate -
SINAUT MD741-1
84 C79000-G8976-C236-04
7 VPN connection
NAT-T On
Here load key files (*.pem, *.cer or *.crt) with remote certificates and public key
from remote stations into the SINAUT MD741-1. To do this, the files must be saved
on the Admin PC. A remote certificate is only required for the authentication
method with X.509 certificate.
SINAUT MD741-1
C79000-G8976-C236-04
7 VPN connection
Here load the certificate file (PKCS12 file) with the file extension .p12 into the
SINAUT MD741-1. To do this, the certificate file must be saved on the Admin PC.
Caution
If there is already a certificate file in the device, then it must be deleted before
loading a new file.
Password
The certificate file (PKCS12 file) is password-protected. Here enter the password
that you received with the certificate file.
A list with all of the loaded remote certificates is shown here. You can use Delete to
remove a remote certificates that is no longer needed.
The name and status of the loaded certificate file (PKCS12 file) is shown here. A
white check mark on a green dot indicates that the corresponding component of
the certificate file is present, a white cross on a red dot indicates that the
corresponding component is missing or that the wrong password was entered.
SINAUT MD741-1
86 C79000-G8976-C236-04
7 VPN connection
The user interface for setting up the firewall rules for VPN tunnels can be found
under IPsec VPN > Connections:
SINAUT MD741-1
C79000-G8976-C236-04
7 VPN connection
Function
The IPsec VPN connection is viewed as fundamentally secure. Thus data traffic
over this connection is not limited by default. It is possible, however, to create
firewall rules for the VPN connection
To set up firewall rules for the VPN connection, proceed in the same way as for
setting up the packet filter function of the general firewall (see Chapter 6.1).
However, the rules defined here apply only to the specific VPN connection.
Factory settings
Function
With the supervision of VPN connections the SINAUT MD741-1 checks the
condition of configured VPN connections. To check the VPN connection status the
SINAUT MD741-1 sends periodically ping packets (ICMP) via the VPN connection
to one or several remote stations (target hosts). This is made independently from
payload data. For each VPN connection an own supervision can be configured.
SINAUT MD741-1
88 C79000-G8976-C236-04
7 VPN connection
If the SINAUT MD741-1 receives the answer for the ping packet from at least one
addressed remote station, the VPN connection is still operational.
Target hosts
MD 741-1
Ping Pi ng
Client IP H ost IP
Note
Do not ping a host downstream from the VPN Gateway! Here, the tunnel
monitoring responds if a host can no longer be reached, for example due to
ShutDown.
Ping the internal IP interface of the VPN Gateway!
If no remote station answers the ping packet the transmission of the ping packet
will be repeated several times after a delay which can be configured. If all
repetitions end without success, the VPN client in the SINAUT MD741-1 are will be
restarted. This causes a reconnection of all existing VPN connections.
Notice
Sending ping packets (ICMPs) increases the amount of data sent and received via
EGPRS or GPRS. This can lead to increased costs.
Yes
No
SINAUT MD741-1
C79000-G8976-C236-04
7 VPN connection
This parameter determines the time interval to send ping packets through the
supervised VPN connection (VPN tunnel).
Retry delay
This parameter determines the delay a ping packet is repeated after a failed ping
check (ping packet not answered).
Retry count
This parameter determines the number of allowed failed ping transmission retries
before the VPN client inside the SINAUT MD741-1 are will be restarted.
Target hosts
Tunnel name
Determine, which VPN connection (VPN tunnel) shall be supervised. Add a VPN
connection by clicking the New button, delete a VPN connection by clicking the
Delete button.
Host IP address
Client IP address
Enter here any unused IP address of the local network related to the VPN
connection.
Factory settings
Retry count 3
SINAUT MD741-1
90 C79000-G8976-C236-04
7 VPN connection
If NAT-T is enabled (cf. Chapter 7.2), then keepalive data packets will be sent
periodically by the SINAUT MD741-1 through the VPN connection. The purpose of
this is to prevent a NAT router between the SINAUT MD741-1 and the remote
station from interrupting the connection during idle periods without data traffic.
Here you can change the interval between the keepalive data packets.
The Phase 1 timeout determines how long the SINAUT MD741-1 waits for
completion of an authentication process of the ISAKMP-SA. If the set timeout is
exceeded, the authentication will be aborted and restarted.
The Phase 2 timeout determines how long the SINAUT MD741-1 waits for
completion of an authentication process of the IPsec-SA. If the set timeout is
exceeded, the authentication will be aborted and restarted.
SINAUT MD741-1
C79000-G8976-C236-04
7 VPN connection
If the establishment of a VPN connection fails, the connection setup will be retried
by the SINAUT MD741-1. Enter the number of unsuccessfull retries, being
performed before the SINAUT MD741-1 restart its VPN client before trying again
the connection setup.
If the establishment of a VPN connection fails, the connection setup will be retried
by the SINAUT MD741-1. Enter the number of unsuccessfull retries, being
performed before the SINAUT MD741-1reboots and tries again the connection
setup.
DynDNS tracking
If the VPN gateway of the remote stations uses a DynDNS service to get an IP
address and no Dead Peer Detection is used, the SINAUT MD741-1 should
periodically check, if the remote VPN gateway is still reachable. The DynDNS
tracking function provides this function. Yes activates this function, No deactivate
this function.
Configure here the interval it shall be checked, if the remote station is still
reachable.
Number of connects attempts until restart of 5
the VPN client
Factory settings
SINAUT MD741-1
92 C79000-G8976-C236-04
7 VPN connection
Indicates the status of the enabled VPN connections and the option for loading a
protocol file to the Admin PC.
A white check mark on a green dot indicates that the specific Security Association
(SA) has been successfully established- A white cross on a red dot indicates that
the Security Association does not exist.
This function can be used to download the VPN protocol file to the Admin PC.
SINAUT MD741-1
C79000-G8976-C236-04
Remote access
8
8.1 HTTPS remote access
The HTTPS remote access (= HyperText Transfer Protocol Secure) allows secure
access to the Web user interface of the SINAUT MD741-1 from an external
network via EGPRS, GPRS or CSD.
Configuration of the SINAUT MD741-1 via the HTTPS remote access then takes
place exactly like configuration via a Web browser via the local interface (see
chapter 3).
Yes
Access to the Web user interface of the SINAUT MD741-1 from the external
network via HTTPS is allowed.
No
SINAUT MD741-1
94 C79000-G8976-C236-04
8 Remote access
You can define a different port. However, if you have defined a different port, then
the external remote station conducting the remote access must specify the port
number after the IP address when specifying the address.
Example:
If this SINAUT MD741-1 can be accessed via the Internet using the address
192.144.112.5, and if port number 442 has been defined for the remote access,
then the following must be specified in the Web browser at the external remote
station:
https://192.144.112.5:442
New
Adds a new firewall rule for HTTPS remote access that you can then fill out.
Delete
Removes a firewall rule for HTTPS remote access that has been created.
From IP (External)
Specify here the address(es) of the computer(s) for which remote access is
allowed. You have the following options:
Action
Reject means that the data packets are rejected, and the sender receives a
message about the rejection.
Drop means that the data packets are not allowed through. They are discarded
without the sender receiving any information about where they went.
Log
For each individual firewall rule you can define whether the event should be logged
when the rule takes effect - set Log toYes, or not - set Log to No (factory settings).
SINAUT MD741-1
C79000-G8976-C236-04
8 Remote access
Factory settings
Action Accept
The SSH remote access (= Secured SHell) allows secure access to the file system
of the SINAUT MD741-1 from an external network via EGPRS, GPRS or CSD.
Use the SSH remote access only if you are familiar with the LINUX file system.
Warning
Via SSH remote access it is possible to derange the configuration of the device in
such a way that it will have to be sent in for servicing. In this case contact your
dealer or distributor.
SINAUT MD741-1
96 C79000-G8976-C236-04
8 Remote access
Yes
Access to the file system of the SINAUT MD741-1 from the external network via
SSH is allowed.
No
You can define a different port. However, if you have defined a different port, then
the external remote station conducting the remote access must specify the port
number defined here in front of the IP address when specifying the address.
Example:
If this SINAUT MD741-1 can be accessed from the external network using the
address 192.144.112.5, and if port 22222 has been defined for the remote access,
then this port number must be specified in the SSH client (e.g. PUTTY) at the
external remote station:
New
Adds a new firewall rule for SSH remote access that you can then fill out.
Delete
Removes a firewall rule for SSH remote access that has been created.
From IP (External)
Specify here the address(es) of the computer(s) for which remote access is
allowed. You have the following options:
Action
SINAUT MD741-1
C79000-G8976-C236-04
8 Remote access
Reject means that the data packets are rejected, and the sender receives a
message about the rejection.
Drop means that the data packets are not allowed through. They are discarded
without the sender receiving any information about where they went.
Log
For each individual firewall rule you can define whether the event should be logged
when the rule takes effect - set Log to Yes, or not - set Log to No (factory settings).
Factory settings
Action Accept
The CSD dial-in access makes it possible to access the Web user interface of the
SINAUT MD741-1 via a dial-in data connection (CSD = Circuit Switched Data). To
do this, call the SINAUT MD741-1 at the data call number using an analogue
modem, or at the voice or data call number of its SIM card using a GSM modem.
The SINAUT MD741-1 accepts the call if:
● the call number of the telephone connection that you call from is saved in the
list of permitted numbers in SINAUT MD741-1, and
Dialling must be performed by a PPP client, for example via a Windows dial-up
connection. In Windows, use the New Connection Wizard, and under Connect to
the network at my workplace set up a Dial-up connection.
SINAUT MD741-1
98 C79000-G8976-C236-04
8 Remote access
Yes
Access to the Web user interface of the SINAUT MD741-1 from a dial-in data
connection is allowed.
No
Access via dial-in data connection is not allowed.
Select a username and a password that must be used by a PPP client (e.g. a
Windows dial-up connection) to log on to the SINAUT MD741-1. The same
username and the same password must be entered in the PPP client.
Specify the call number of the telephone connection from which the dial-in data
connection is established. The telephone connection must support Calling Line
Identification Presentation (CLIP), and this function must be activated.
The call number entered in the SINAUT MD741-1 must be exactly the same as the
call number reported, any may also have to include the country code and prefix,
e.g. +494012345678.
Note
Firewall rules entered for HTTPS and SSH access also apply for CSD access. The
source IP address ("From IP") for CSD access is defined as 10.99.99.2.
SINAUT MD741-1
C79000-G8976-C236-04
8 Remote access
New
Adds a new approved call number for CSD remote access that you can then fill out.
Delete
Factory settings
SINAUT MD741-1
100 C79000-G8976-C236-04
Status, log and diagnosis
9
9.1 System status display
The System-Status gives an overview about the current operating status of the
SINAUT MD741-1.
Note
Use the Refresh function of the Web browser to update the displayed values.
SINAUT MD741-1
101 C79000-G8976-C236-04
9 Status, log and diagnosis
Shows the current system time of the SINAUT MD741-1 in the format:
Connection
Note
Connected since
Shows how long the current connection to EGPRS or GPRS has existed.
Used APN
Shows the APN (= Access Point Name) of the EGPRS or GPRS that is being used.
External hostname
DynDNS
SINAUT MD741-1
102 C79000-G8976-C236-04
9 Status, log and diagnosis
Assigned IP address
Shoes the IP address at which the SINAUT MD741-1 can be reached in EGPRS or
GPRS. This IP address is assigned to the SINAUT MD741-1 by the EGPRS or
GPRS service.
IMSI
Shows the subscriber identity that is saved on the SIM card being used.
The IMSI (= International Mobile Subscriber Identity) is used by the GSM network
operator to detect the authorisations and agreed services for the SIM card.
IMEI
Shows the serial number of the SINAUT MD741-1 as a GSM wireless device. The
IMEI (= International Mobile Equipment Identity) is assign uniquely worldwide.
Shows the number of bytes that have been sent or received during the existing
connection to GPRS. The counter is reset when a new connection is established.
Note
These figures serve only as a general indication of the data volume, and can differ
significantly from the GSM network operator's accounting.
SINAUT MD741-1
C79000-G8976-C236-04
9 Status, log and diagnosis
Shows the number of bytes that have been sent via GPRS or received since the
last time the factory settings were loaded. The counter is reset when the factory
settings are loaded.
Remote HTTPS
Shows whether remote access to the Web user interface of the SINAUT MD741-1
via EGPRS or GPRS is permitted.
Remote SSH
Shows whether remote access to the SSH console of the SINAUT MD741-1 via
EGPRS or GPRS is permitted.
CSD Dial-In
● White check mark at green dot: CSD service calls are possible.
● White cross at red dot: CSD service calls are not possible.
SINAUT MD741-1
104 C79000-G8976-C236-04
9 Status, log and diagnosis
9.2 Log
Logfile
Important events in the operation of the SINAUT MD741-1 are saved in the log.
● Reboot
● Establishing of connections
● Interruption of connections
● Signal strength
The log is saved to the log archive of the SINAUT MD741-1 when a file size
1 MByte, is reached, but after 24 hours at the latest.
Download - the current log is loaded to the Admin PC. You can select the directory
to save the file to, and can view the file there.
SINAUT MD741-1
C79000-G8976-C236-04
9 Status, log and diagnosis
Log archive
Download - The archived log files are loaded to the Admin PC. You can select the
directory to save the files to, and can view the files there.
Example:
Entries in log
Column A:
Time stamp
Column B:
Product number
Column C:
Column D:
SINAUT MD741-1
106 C79000-G8976-C236-04
9 Status, log and diagnosis
Column E:
Indication of the network operator identification with the 3-digit country code (MCC)
and the 2-3-digit network operator code (MNC).
Column F:
Column G:
Column H:
Column I:
Column J:
Columns K-P:
● Software version
● TX, RX (IP packets transmitted since the last factory settings reboot)
The SINAUT MD741-1 can transfer the system log once per day via FTP (= File
Transfer Protocol) to an FTP server.
The current system log and the system log files in the archive are transferred. After
successful transfer the transferred logs are deleted in the SINAUT MD741-1.
If the transfer fails, the SINAUT MD741-1 tries once again to transfer the data after
24 hours.
SINAUT MD741-1
C79000-G8976-C236-04
9 Status, log and diagnosis
Time
Specifies the daily time, when the log files will be transmitted to the FTP server.
FTP Server
Specifies the address of the FTP server, to which the log files are to be transferred.
The address can be specified as a hostname (e.g. ftp.server.de) or as an IP
address.
Username
Password
SINAUT MD741-1
108 C79000-G8976-C236-04
9 Status, log and diagnosis
Factory settings
Username guest
Password guest
9.4 Snapshot
The service snapshot downloads important log files and current device settings that
could be important for fault diagnosis and saves them in a file.
If you contact our Hotline in the event of a problem with the SINAUT MD741-1, in
many cases they will ask you for the snapshot file.
Note
This file contains the access parameters for EGPRS and GPRS and the addresses
of the remote station. It does not contain the username and password for access to
the SINAUT MD741-1.
SINAUT MD741-1
C79000-G8976-C236-04
9 Status, log and diagnosis
The service snapshot downloads important log files and current device settings that
could be important for fault diagnosis and saves them in a file.
If you contact our Hotline in the event of a problem with the SINAUT MD741-1, in
many cases they will ask you for the snapshot file.
Note
This file contains the access parameters for EGPRS and GPRS and the addresses
of the remote station. It does not contain the username and password for access to
the SINAUT MD741-1.
Click on download. You can select the location on the Admin PC where the
snapshot file will be saved.
<hostname>_Snapshot_<Date&TimeCode>.tgz,
e.g.: md741_Snapshot_200711252237.tgz
Advanced diagnosis
Note
When advanced diagnosis is active, the frequent write access to the non-volatile
memory of the SINAUT MD741-1 can lead to a reduction of its service life.
Factory settings
SINAUT MD741-1
110 C79000-G8976-C236-04
9 Status, log and diagnosis
SINAUT MD741-1
C79000-G8976-C236-04
Additional functions
10
10.1 Service Center
The SINAUT MD741-1 also uses the Short Message Service (SMS) of the GSM
network. You can specify a special SMS center.
To ensure that the SMS function works reliably, enter the call number of the service
center (SMSC) here. If there is no entry made here, the default SMSC of your
network provider will be used.
The SINAUT MD741-1 can transmit short alarm messages using the SMS (= Short
Message Service) of the GSM network. The sending of an alarm SMS message
can be triggered by the following event:
For the event, you can specify a separate call number to which the alarm message
will be sent. You can enter any text as the alarm message. The following
characters are available:
SINAUT MD741-1
C79000-G8976-C236-04 112
12 Additional functions
abcdefghIjklmnopqrstuvwxyzABCDEFGHIJKLMNOPQR
STUVWXYZ0123456789,!?
Settings
Enable
With Yes, the alarm message is sent if the event occurs, with No, it is not.
Call number
Here, enter the call number of the end device to which the alarm message will be
sent using SMS. The end device must support reception of SMS messages via
GSM or fixed network.
Text
Factory settings
Call number -
Text -
SINAUT MD741-1
C79000-G8976-C236-04
12 Additional functions
With the SMS messaging function, applications connected to the local interface of
the SINAUT MD741-1 can send SMS messages via the GSM network.
Via this TCP/IP connection, the application transfers the text of the SMS to the
SINAUT MD741-1 that packs the text in an SMS message and sends it.
The text must be transferred in a frame via the TCP/IP connection to the SINAUT
MD741-1. The frame must have the following format:
Username#Password#CommandCode#Seq-Num;Callnumber;Message:
Example:
user#password#105#01;004943465789;my SMS text:
Username
Enter a user name to check the permission for sending an SMS message.
Maximum of 10 characters.
Password
CommandCode
Command to send an SMS message from the local network This value of 105 is
fixed and must not be modified.
SINAUT MD741-1
114 C79000-G8976-C236-04
12 Additional functions
Seq-Num
The sequence number is used to assign several requests at the same time The
function is not currently supported.
Call number
Message
The following forbidden characters must not occur in the SMS text:
Select Yes to be able to send SMS messages from the local network.
Select No if you do not want to send SMS messages from the local network.
Username
User name that must be included in the frame before the text is sent using SMS
(see above: "Frame format"). Maximum of 10 characters.
Password
Password that must be included in the frame before the text is sent using SMS
(see above: "Frame format"). Maximum of 10 characters.
Port number
TCP/IP port on which the SINAUT MD741-1 accepts the TCP/IP connection for
sending SMS messages.
SINAUT MD741-1
C79000-G8976-C236-04
12 Additional functions
Firewall Rules
With New, you insert sources ("From IP") for the TCP/IP connection for sending
SMS messages. With Delete, you remove the connections.
From IP (internal)
Action
The drop-down list below Action relates to the TCP/IP connection of the IP address
shown to the left beside the drop-down list. The following three options are
available:
"Accept": Enables the TCP/IP connection for sending SMS messages.
"Reject": The data packets are rejected, and the sender receives a message
about the rejection.
"Drop": The data packets may not pass and are discarded. The sender does not
receive any notification of this.
Log
For each firewall rule, you can specify whether or not the event is logged (Log =
Yes) or whether the factory default is retained (Log = No).
Factory settings
From IP 0.0.0.0
Action Accept
Log No
SINAUT MD741-1
116 C79000-G8976-C236-04
12 Additional functions
The Update function can be used to load new operating software to the SINAUT
MD741-1 and activate this software.
In an immediate update the new software will be unzipped. This process can take
several minutes. After that the actual update process begins, which is indicated by
the LEDs lighting up in sequence.
The settings of the SINAUT MD741-1 will be accepted insofar as the settings still
have the same effect in the new software version as they did before the update.
No
Immediate update - The new operating software is activated immediately after you
load the software and click on Submit.
Yes
Time-controlled update - The new operating software is activated at the defined
update time. The software must have been loaded already.
If you want to have the update carried out with time control, specify the time when
the new operating software is to be activated.
Specify the Year – Month – Day – Hour – Minute.
SINAUT MD741-1
C79000-G8976-C236-04
12 Additional functions
Use Browse to select the file, which includes the new operating software, for
example:
MD741_v1.024-v1.027.tgz
Load the firmware to the device with Open.
Submit
With Submit the operating software is either activated immediately or the operating
software is activated at the specified time.
SINAUT MD741-1
118 C79000-G8976-C236-04
12 Technical Data
Technical Data
11
Interfaces Application 10/100 Base-T (RJ45 plug)
interface Ethernet IEEE802
10/100 Mbit/s
Service interface USB-A (reserved for later applications)
Security Stateful inspection firewall
functions Anti-spoofing
Port forwarding
Additional DNS cache, DHCP server, NTP, remote logging,
functions connection monitoring, alarm-SMS
Management Web-based administration user interface, ssh console
Wireless EDGE / GPRS EDGE Multislot class 12 / EDGE Multislot class 12
connection
Coding schemes CS-1, CS-2, CS-3, CS-4
GSM Module EGPRS (EDGE) / Quad band
EDGE (EGPRS) Multislot Class 12
Mobile Station Class B
Modulation and Coding Scheme MCS 1 – 9
GPRS Multislot Class 12
Full PBCCH support
Mobile Station Class B
Coding Scheme 1 – 4
EDGE / GPRS During the data transmission via EGPRS or GPRS the
device automatically selects from the following
classes:
from EGPRS Multislot Class 12 (4Tx slots)
to EGPRS Multislot Class 10 (2Tx slots),
from EGPRS Multislot Class 10 (2Tx slots)
to EGPRS Multislot Class 8 (1Tx),
from GPRS Multislot Class 12 (4Tx slots)
to GPRS Multislot Class 8 (1Tx)
from GPRS Multislot Class 10 (2Tx slots)
to GPRS Multislot Class 8 (1Tx)
CSD / MTC V.110, RLP, non-transparent
2.4, 4.8, 9.6, 14.4kbps
SMS (TX) Point to point, MO (outgoing)
SINAUT MD741-1
C79000-G8976-C236-04
12 Technical Data
[mA]
IBurst at 24V
800
600
400
200
[ms]
10 20 30 40 50 60 70 80 90 100
4,62ms burst repeat rate
SINAUT MD741-1
120 C79000-G8976-C236-04
12 Technical Data
Continuous Continuous
Current Connected, no data transfer data transfer
Input voltage Burst
consumption (3) data transfer with low signal with medium
quality (1) signal quality (2)
Operating mode [V] [mA] [mA] [mA] [mA]
GSM-CSD 12 174 315 263 1000
24 97 168 137 450
30 82 137 116 360
EGPRS / GPRS 12 174 365 282 1260
24 97 182 147 550
30 82 150 121 420
(1)
Measured at GSM900 Power Level 5 (33dBm transmitting power)
(2)
Measured at GSM900 Power Level 10 (23dBm transmitting power)
(3)
USB port not used
SINAUT MD741-1
C79000-G8976-C236-04
12 Applied Standards and Approvals
Marking
When used within the intended purpose, the equipment is compliant to the
requirements of the following European directives:
SINAUT MD741-1
122 C79000-G8976-C236-04
12 Applied Standards and Approvals
You will find the EU declaration of conformity for this product on the Internet at the
following address:
Filter settings:
Entry type: "Certificates" → Certificate type: "Declaration of conformity" → Search
item(s): <name of the module>
Applied standards
Classification
Applied standards
● EN 60950:2006
Applied standards
● EN61000-6-2: 2001
Warning
The SINAUT MD741-1 is a Class A device. This device can cause radio
interference in residential areas; in this case the user may be required to take
appropriate measures.
SINAUT MD741-1
C79000-G8976-C236-04
12 Applied Standards and Approvals
Applied standards
Classification
SINAUT MD741-1
124 C79000-G8976-C236-04
12 Applied Standards and Approvals
FM certification
Marking (sample)
Applied standards
Classification
http://support.automation.siemens.com/WW/view/en/35029750
UL/CSA Certification
Marking
Applied standards
SINAUT MD741-1
C79000-G8976-C236-04
12 Applied Standards and Approvals
Marking
SINAUT MD741-1
FCC ID: LYHMD741-1
contains MC75 FCC ID: QIPMC75
Applied standards
● FCC Part 15
FCC Part 15
This equipment has been tested and found to comply with the limits for a Class A
digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to
provide reasonable protection against harmful interference in a residential
installation. This equipment generates, uses and can radiate radio frequency
energy and, if not installed and used in accordance with the instructions, may
cause harmful interference to radio communications. However, there is no
guarantee that interference will not occur in a particular installation. If this
equipment does cause harmful interference to radio or television reception, which
can be determined by turning the equipment off and on, the user is encouraged to
try to correct the interference by one or more of the following measures:
● Connect the equipment into an outlet on a circuit different from that to which
the receiver is connected.
This device complies with Part 15 of the FCC Rules. Operation is subject to the
following two conditions:
SINAUT MD741-1
126 C79000-G8976-C236-04
12 Applied Standards and Approvals
Modifications not expressly approved by this company could void the user's
authority to operate the equipment.
You may only use the SINAUT MD741-1 with an antenna of the SINAUT MD741-1
accessory program.
The installation of the SINAUT MD741-1 and the antenna as well as servicing is to
be performed by qualified technical personnel only. When servicing the antenna, or
working at distances closer than those listed below, ensure the transmitter has
been disabled.
This device contains GSM, GPRS Class12 and EGPRS Class 10 functions in the
900 and 1800 MHz Band which are not operational in U.S. Territories.
This device is to be used only for mobile and fixed applications. The antenna(s)
used for this transmitter must be installed to provide a separation distance of at
least 20cm from all persons and must not be co-located or operating in conjunction
with any other antenna or transmitter.
Users and installers must be provided with antenna installation instructions and
transmitter operating conditions for satisfying RF exposure compliance. Antennas
used for this OEM module must not exceed 8.4dBi gain (GSM 1900) and 2.9dBi
(GSM 850) for mobile and fixed operating configurations. This device is approved
as a module to be installed in other devices.
SINAUT MD741-1
C79000-G8976-C236-04
Glossary
APN (Access Point Trans-network connections, e.g. from a GPRS network to the Internet,
Name) are created in the GPRS network via so-called APNs.
APN
(public)
Public
INTERNET
MD741-1
Local
application
(E-)GPRS
Private
INTRANET
APN
(private)
SINAUT MD741-1
C79000-G8976-C236-04
Glossary
Additional Internal The following sketch shows how the IP addresses could be distributed
Routes in a local network with subnetworks, what network addresses result
from this, and what the specification for an additional internal route
could look like.
MD741-1 external address:
(assigned by provider)
e.g. 80.81.192.37
MD741-1
Switch
Network A
Network address: 192.168.11.0 / 24
Netmask: 255.255.255.0
Router A1 A2 A3 A5
A4
IP external: 192.168.11.2
Router
IP internal: 192.168.15.254
Netmask: 255.255.255.0
Switch
Network B
Network address: 192.168.15.0 / 24
Netmask: 255.255.255.0
Router B2
B1 B3 B4
IP external: 192.168.15.1
Router
IP internal: 192.168.27.254
Netmask: 255.255.255.0
Switch
Network C
Network address: 192.168.27.0 / 24
Netmask: 255.255.255.0
Additional
internal routes
C1 C2 C3 C4
SINAUT MD741-1
C79000-G8976-C236-04
Glossary
Network A
Computer A1 A2 A3 A4 A5
IP address 192.168.11.3 192.168.11.4 192.168.11.5 192.168.11.6 192.168.11.7
Network mask 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0
Network B
Computer B1 B2 B3 B4 Additional
IP address 192.168.15.3 192.168.15.4 192.168.15.5 192.168.15.6 internal
Network mask 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 routes:
Network:
Network C
192.168.15.0/24
Computer C1 C2 C3 C4 Gateway:
IP address 192.168.27.3 192.168.27.4 192.168.27.5 192.168.27.6 192.168.11.2
Network mask 255.255.255.0 255.255.255.0 255.255.255.0 255.255.255.0 Network:
192.168.27.0/24
Gateway:
192.168.11.2
Asymmetrical In asymmetrical encryption, data are encrypted with one key and
encryption decrypted with a second key. Both keys are suitable for encryption and
decryption. One of the keys is kept secret by its owner (Private Key),
the other is issued to the public (Public Key), i.e. possible
communication partners.
A message encrypted with a Public Key can only be decrypted and
read by the recipient who has the corresponding Private Key. A
message encrypted with the Private Key can be decrypted by any
recipient who has the corresponding Public Key. Encryption with the
Private Key shows that the message actually originates from the owner
of the corresponding Public Key. We therefore speak of a digital
signature.
Asymmetrical encryption methods such as RSA are, however, slow
and vulnerable to certain attacks, which is why they are often
combined with a symmetrical method ( symmetrical encryption). On
the other hand, concepts are also possible which avoid the complex
administration of symmetrical keys.
SINAUT MD741-1
130 C79000-G8976-C236-04
Glossary
SINAUT MD741-1
C79000-G8976-C236-04
Glossary
CSD 9600 CSD (9600) stands for Circuit Switched Data or dial-in data
connection. Here a connection is created between two users (end
points of the connection), similar to a telephone call over a public
telephone network. User 1 dials the telephone number of user 2. The
network signals to user 2 that there is a call, user 2 accepts the call
and the network establishes the connection until one of the users
terminates the connection again.
In a GSM network this service is called CSD, and allows data
transmission at 9600 bit/s or 14400 bit/s, with transmission being either
secured or unsecured. Possible connections are GSM modem to GSM
modem, analog modem to GSM and ISDN modem to GSM modem.
CSQ / RSSI The CSQ value is a value defined in the GSM standard for indicating
the signal quality. CSQ values correspond to the received field
strength RSSI (= Received Signal Strength Indication):
CSQ RSSI
<6 < -101 dBm
6…10 -101…-93 dBm
11…18 -91…-77 dBm
> 18 > 75 dBm
99 Not logged in
SINAUT MD741-1
132 C79000-G8976-C236-04
Glossary
Datagram In the transmission protocol TCP/IP, data are sent in the form of data
packets, the so-called IP datagrams. An IP datagram has the following
structure:
1. IP Header
2. TCP/UDP Header
3. Data (Payload)
SINAUT MD741-1
C79000-G8976-C236-04
Glossary
DynDNS provider Also Dynamic DNS provider. Every computer that is connected to the
Internet has an IP address (IP = Internet Protocol). An IP address
consists of up to 4 three-digit numbers, with dots separating each of
the numbers. If the computer is online via the telephone line via
modem, ISDN or ADSL, then the Internet service provider dynamically
assigns it an IP address, i.e. the address changes from session to
session. Even if the computer is online for more than 24 hours without
interruption (e.g. in the case of a flat rate), the IP address is changed
periodically.
For a local computer to be accessible via the Internet, its address must
be known to the external remote station. This is necessary for it to
establish a connection to the local computer. This is not possible,
however, if the address of the local computer constantly changes. It is
possible, however, if the user of the local computer has an account
with a DynamicDNS provider (DNS = Domain Name Server).
Then he can specify there a hostname under which the computer can
be accessed in the future, e.g.: www.xyz.abc.de. Moreover, the
DynamicDNS provider makes available a small program that has to be
installed and executed on the computer concerned. In each Internet
session of the local computer this tool reports to the DynamicDNS
provider which IP address the computer has at the moment. Its domain
name server registers the current hostname - IP address assignment
and reports this to other domain name servers in the Internet.
If now an external computer wants to establish a connection with a
local computer which is registered with the DynamicDNS provider, the
external computer uses the hostname of the local computer as the
address. In this way a connection is established with the responsible
DNS (Domain Name Server) in order to look up there the IP address
which is currently assigned to this hostname. The IP address is
transmitted back to the external computer, and then used by it as the
destination address. This now leads precisely to the desired local
computer.
As a rule, all Internet addresses are based on this method: First a
connection is established to a DNS in order to determine the IP
addresses assigned to this hostname. Once that has been done, the
IP address that was "looked up" is used to establish the connection to
the desired remote station, which can be any Web site.
EDGE EDGE (= Enhanced Data Rates for GSM Evolution) refers to a method
in which the available data rates in GSM mobile phone networks are
increased by introducing an additional modulation process. With
EDGE, GPRS is expanded to become EGPRS (Enhanced GPRS), and
HSCSD is expanded to become ECSD.
EGPRS EGPRS stands for "Enhanced General Packet Radio Service", which
describes a packet-oriented data service based on GPRS, which is
accelerated by means of EDGE technology.
SINAUT MD741-1
134 C79000-G8976-C236-04
Glossary
GPRS GPRS is the abbreviation for "General Packet Radio Service", a data
transmission system of GSM2+ mobile phone systems. GPRS systems
use the basestations of GSM networks as their wireless equipment,
and their own infrastructure for coupling to other IP networks, such as
the Internet. Data communication is packet-oriented; the Internet
Protocol (IP) is used. GPRS provides data rates of up to 115.2 KBit/s.
It can be seen from the first byte of the IP address whether the IP
address designates a network of Class A, B or C. The following
definitions apply:
Value of the Bytes for the Bytes for the
1st byte network address host address
Class A 1-126 1 3
Class B 128-191 2 2
Class C 192-223 3 1
If you do the arithmetic, you can see that there can be a maximum of
126 Class A networks worldwide, and each of these networks can
comprise a maximum of 256 x 256 x 256 hosts (3 bytes of address
space). There can be 64 x 256 Class B networks, each of which can
contain up to 65,536 hosts (2 bytes of address space: 256 x 256).
There can be 32 x 256 x 256 Class C networks, each of which can
contain up to 256 hosts (1 byte of address space).
SINAUT MD741-1
C79000-G8976-C236-04
Glossary
NAT (Network Address In Network Address Translation (NAT) - often also referred to as IP
Translation) Masquerading - an entire network is "hidden" behind a single device,
the NAT router. This device is usually a router. The internal computers
in the local network remain hidden with their IP addresses when they
communicate to the outside via the NAT router. For the external
communication partners only the NAT router with its own IP address
appears.
However, in order for internal computers to be able to communicate
direct with external computers (on the Internet) the NAT router must
change the IP datagrams passing from internal computers to the
outside and from the outside to an internal computer.
If an IP datagram is sent from the internal network to the outside the
NAT router changes the datagram's IP and TCP headers. It replaces
the source IP address and the source port with its own official IP
address and its own, previously unused port. To this end it creates a
table showing the correlation between the original values and the new
ones.
When receiving a reply datagram the NAT router recognises by means
of the destination port specified that the datagram is actually intended
for an internal computer. Using the table the NAT box exchanges the
destination IP address and the destination port and forwards the
datagram to the internal network.
SINAUT MD741-1
136 C79000-G8976-C236-04
Glossary
Network mask / Subnet A company network with access to the Internet is normally officially
mask assigned only a single IP address, e.g. 134.76.0.0. In this example
address it can be seen from the 1st byte that this company network is
a Class B network, i.e. the last 2 bytes can be used freely for host
addressing. Arithmetically that represents an address space of 65,536
possible hosts (256 x 256).
Such a huge network is not very practical. It is necessary here to form
subnetworks. This is done using a subnet mask. Like an IP address,
this is a field 4 bytes long. The value 255 is assigned to each of the
bytes that represent the network address. The main purpose of this is
to "hide" a part of the host address range in order to use it for the
addressing of subnetworks. For example, in a Class B network (2
bytes for the network address, 2 bytes for the host address), by means
of the subnet mask 255.255.255.0 it is possible to take the 3rd byte,
which was actually intended for host addressing, and use it now for
subnet addressing. Arithmetically that means that 256 subnets with
256 hosts each could be created.
Port number The Port Number field is a 2-byte field in UDP and TCP headers. The
assignment of port numbers serves to identify various data flows that
are processed simultaneously by UDP/TCP. The entire data exchange
between UDP/TCP and the application processes takes place via
these port numbers. The assignment of port numbers to application
processes is performed dynamically and randomly. Fixed port numbers
are assigned for certain frequently-used application processes. These
are called Assigned Numbers.
SINAUT MD741-1
C79000-G8976-C236-04
Glossary
Private Key, Public In asymmetrical encryption algorithms 2 keys are used: a Private Key
key; Certification and a Public Key. The public key serves to encrypt data and the
(X.509) private key to decrypt them.
The public key is provided by the future recipient of the data to those
who will send the data to him in encrypted form. The private key is
possessed only by the recipient and serves to decrypt the received
data.
Certification:
So that the user of the public key (for encryption) can be certain that
the public key conveyed to him really does come from the entity that is
to receive the data to be sent, certification can be used: the verification
of the authenticity of the public key and the consequent link between
the identity of the sender and his key is performed by a Certification
Authority or CA. This is done according to the rules of the CA, for
example by the sender being required to appear in person. Following
successful inspection the CA signed the sender's public key with its
(digital) signature. A certificate is created.
An X.509 certificate makes a connection between an identity in the
form of an 'X.500 Distinguished Name' (DN) and a public key. This
connection is authenticated by the digital signature of an X.509
Certification Authority (CA). The signature - an encryption with the
signature key - can be checked with the private key issued by the CA
to the certificate holder.
Protocol, Transfer Devices that communicate with each other must use the same rules.
protocol They have to "speak the same language". Such rules and standards
are called protocols or transfer protocols. Frequently used protocols
include IP, TCP, PPP, HTTP and SMTP. TCP/IP is the umbrella term
for all protocols that are based on IP.
Service provider Supplier, company or institution that gives users access to the Internet
or to an online service.
SSH SSH (Secure Shell) is a protocol that enables secure, encrypted data
exchange between computers. Secure SHell is used for remote access
to the input console from LINUX-based machines.
SINAUT MD741-1
138 C79000-G8976-C236-04
Glossary
Stateful inspection A stateful inspection firewall is a packet filtering method. Packet filters
firewall only let IP packets through if this has been defined previously using
firewall rules. The following is defined in the firewall rules:
It is likewise defined here what will be done with IP packets that are
not allowed through (discard, reject).
For a simple packet filter it is always necessary to create two firewall
rules for a connection:
One rule for the query direction from the source to the destination,
and
a second rule for the query direction from the destination to the
source.
It is different with a stateful inspection firewall. Here a firewall rule is
only created for the query direction from the source to the destination.
The firewall rule for the response direction from the destination to the
source results from analysis of the data previously sent. The firewall
rule for the responses is closed again after the responses are received
or after a short time period has elapsed. Thus responses can only go
through if there was a previous query. This means that the response
rule cannot be used for unauthorised access. What is more, special
procedures make it possible for UDP and ICMP data to also go
through, even though these data were not requested before.
Symmetrical With symmetrical encryption the data are encrypted and decrypted
encryption using the same key. Examples of symmetrical encryption algorithms
are DES and AES. These are fast, but require complex administration
as the number of users increases.
SINAUT MD741-1
C79000-G8976-C236-04
Glossary
TCP/IP (Transmission Network protocol that is used to connect two computers on the
Control Internet.
Protocol/Internet IP is the basic protocol.
Protocol UDP builds on IP, and sends individual packets. These can arrive at
the recipient in a different sequence from the one they were sent in, or
they can even get lost.
TCP serves to secure the connection, and ensures, for example, that
the data packets are forwarded to the application in the right
sequence.
UDP and TCP provide, in addition to the IP addresses, port numbers
between 1 and 65535, which can be used to distinguish the various
services.
A number of additional protocols are based on UDP and TCP, such as
HTTP (Hyper Text Transfer Protocol), HTTPS (Secure Hyper Text
Transfer Protocol), SMTP (Simple Mail Transfer Protocol), POP3 (Post
Office Protocol, Version 3), DNS (Domain Name Service).
ICMP builds on IP, and contains control messages.
SMTP is an e-mail protocol based on TCP.
IKE is an IPsec protocol based on UDP.
ESP is IPsec protocol based on IP.
On a Windows PC, WINSOCK.DLL (or WSOCK32.DLL) handles both
of these protocols.
( Datagram)
VPN (Virtual Private A Virtual Private Network (VPN) connects several separate private
Network) networks (subnets) via a public network, e.g. the Internet, to form a
shared network. Confidentiality and authenticity are ensured by using
cryptographic protocols. A VPN therefore provides an inexpensive
alternative to dedicated lines when it comes to setting up a
supraregional corporate network.
SINAUT MD741-1
140 C79000-G8976-C236-04
Glossary
SINAUT MD741-1
C79000-G8976-C236-04