Quick Start Guide WALL IE: As of FW 1.08
Quick Start Guide WALL IE: As of FW 1.08
Quick Start Guide WALL IE: As of FW 1.08
Version
13 en
as of FW 1.08
www.helmholz.com
Contents
1. Introduction 3
2. Connection 4
3. Initial access to the web interface 4
4. Overview 5
5. Choosing the operating mode 6
6. Application case “NAT” 7
7. Bridge mode 16
8. MAC address filtering 21
9. Firmware update 22
10. Resetting to factory settings 23
11. LED status information 23
12. Button functions 23
13. Technical data 24
Note:
Our products contain open source software, among others. This software is subject to the respectively relevant license conditions. The corresponding licensing conditions, including
a copy of the complete license text, will be sent to you with the product. They are also provided in our download area of the respective products under www.helmholz.com. We also
offer to send you the complete corresponding source text of the respective open source software for an at-cost fee of 10 Euro as a DVD to you or a third parts at your request. This offer
is valid for a period of three years, starting from the date of product delivery.
Now connect a patch cable with the LAN connection of your PC and one of the
LAN ports P2–P4 of the WALL IE. The web interface can be reached in the delivery
condition by calling up https://192.168.0.100 in the browser page.
Note: For security reasons, the web interface can only be reached through a secured
HTTPS connection. In order to reach the website, an exception must be confirmed once
in the browser.
An own certificate for the connection backup can be stored in the “Device/HTTPS”
menu as needed.
Note: Please note the password well! For security reasons, there is no possibility to
reset the password without setting the device to the factory settings.
4. Overview
The “Overview” website of the WALL IE always opens after the login.
This contains a menu bar in the upper section and an overview of the status,
the system information, and the basic settings of the WALL IE beneath them.
Note: Please check at the website of the WALL IE under www.helmholz.com for a
newer firmware version. The firmware update is described on page 22.
P1 WAN
When an automation cell with preset IP addresses is to be incorporated into a External (WAN)
P2 LAN
production network with other IP addresses, the IP addresses of the machine must SN:
000000000
P3 LAN
normally all be set again. FCN PWR
RST
RDY
192.168.10.5
Internal (LAN)
P4 LAN
ACT
Ext. V DC USR
18 ... 30 V
– + FE IN1 IN2
When using Network Address Translation (NAT), WALL IE offers the possibility to
0 0 0
1 1 1
2 2 2
3 3 3
4 4 4
5 5 5
6 6 6
7 7 7
leave the IP addresses of the machine as they are, but to enable communication with
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
the machine network with own IP addresses from the production network.
In the NAT operating mode, WALL IE forwards the data transfer between various IPv4
networks (Layer 3) and implements the IP addresses with the help of NAT.
0 0 0 0 0 0
1 1 1 1 1 1
2 2 2 2 2 2
3 3 3 3 3 3
4 4 4 4 4 4
5 5 5 5 5 5
6 6 6 6 6 6
7 7 7 7 7 7
0 0 0 0
1 1 1 1
2 2 2 2
3 3
Packet filters and MAC address filters can be used to limit the permitted data trans-
3 3
4 4 4 4
5 5 5 5
6 6 6 6
7 7 7 7
P1 WAN
P1 WAN
P1 WAN
network.
P2 LAN
P2 LAN
P2 LAN
SN: SN: SN:
000000000 000000000 000000000
P3 LAN
P3 LAN
P3 LAN
PWR FCN PWR FCN PWR
FCN
P4 LAN
P4 LAN
If “NAT” is your planned application case, please continue reading on page 7.
P4 LAN
ACT ACT ACT
0 0 0 0 0
0 0 0 0
1 1 1 1 1
1 1 1 1
2 2 2 2 2
2 2 2 2
3 3 3 3 3
3 3 3 3
4 4 4 4 4
4 4 4 4
5 5 5 5 5
5 5 5 5
6 6 6 6 6
6 6 6 6
7 7 7 7 7
7 7 7 7
0 0 0
0 0 0
1 1 1
1 1 1
2 2 2
2 2 2
3 3 3
3 3 3
4 4 4
4 4 4
5 5 5
5 5 5
6 6 6
6 6 6
7 7 7
7 7 7
P1 WAN
This enables the separation of a part of the production network without the use of External (WAN)
P2 LAN
different network addresses. SN:
000000000
P3 LAN
PWR
If “Bridge” is your planned application case, please continue reading on page 16.
FCN
RST
RDY
10.10.1.32
P4 LAN
Internal (LAN)
ACT
Ext. V DC USR
18 ... 30 V
– + FE IN1 IN2
0 0 0
1 1 1
2 2 2
3 3 3
4 4 4
5 5 5
6 6 6
7 7 7
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
0 0 0 0 0 0
1 1 1 1 1 1
2 2 2 2 2 2
3 3 3 3 3 3
4 4 4 4 4 4
5 5 5 5 5 5
6 6 6 6 6 6
7 7 7 7 7 7
0 0 0 0
1 1 1 1
2 2 2 2
3 3 3 3
4 4 4 4
5 5 5 5
6 6 6 6
7 7 7 7
Note: When you change the LAN IP address, you may need to reopen the website of the
WALL IE in the browser under the new IP address and log in again.
Status Rule active (a click on the lamp changes the status). Action Add a rule Edit a rule
Rule active (a click on the lamp changes the status). Delete a rule Copy a rule
Important: In the case of a “Basic NAT” rule, all ports for “WAN to LAN” data transfer
are initially blocked for this rule for security reasons!
In order to enable access, packet filter rules must be created or the “Default Action” for
the packet filters be set to “Accept”. See the following chapter.
Note: The packet filters are always also available in the direction “LAN to WAN”,
see page 13.
Select the “WAN to LAN” menu point in the “Packet Filter” menu.
Company network 10.10.1.0/24
With the “Default Option”, you can set whether all frames are generally allowed
10.10.1.10 10.10.1.20
(“Accept”) and only special packets are filtered (“Blacklisting”), or whether all frames External IP Internal IP
are generally prohibited (“Reject” / “Drop”) and only those frames are allowed to 10.10.1.11 192.168.10.1
pass through that correspond with the filter rules (“Whitelisting”). 10.10.1.12 192.168.10.2
10.10.1.13 192.168.10.5
10.10.1.14 192.168.10.50
10.10.1.15 192.168.10.100
If you initially don’t wish to filter, set the default action to “Accept”.
P1 WAN
External (WAN)
P2 LAN
SN:
000000000
P3 LAN
FCN PWR
RST
RDY
192.168.10.5
Internal (LAN)
P4 LAN
ACT
Ext. V DC USR
18 ... 30 V
– + FE IN1 IN2
0 0 0
1 1 1
2 2 2
3 3 3
4 4 4
5 5 5
6 6 6
7 7 7
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
In order to limit access to the machine network to certain participants in the WAN,
set the default action to “Reject” or “Drop”. In the case of prohibited frames from the
WAN, “Reject” sends an error message in response, while “Drop” rejects the frame
0 0 0 0 0 0
1 1 1 1 1 1
2 2 2 2 2 2
3 3 3 3 3 3
4 4 4 4 4 4
5 5 5 5 5 5
6 6 6 6 6 6
7 7 7 7 7 7
Source IP indicates the IP address of the active device in the production network (WAN). Destination IP the addressed device in the machine network (LAN).
The filter rules can be defined for one protocol type with protocol “TCP” or “UPD”.
Destination Ports indicates the ports to which the filter rules apply.
If a filter rule applies to several or even all ports, this can be simply defined in the “Destination Ports” field. A list of ports is indicated separated by commas: “80,443,1194”.
A port range can be indicated with a colon: “4000:5000” or “1:65535” for all ports. Combinations of this are also possible: “80,443,4000:5000”.
Action defines whether this rule allows communication (“Accept”), rejects with error message (“Reject”), or simply rejects (“Drop”). The appropriate method here should
always be chosen in interaction with the “Default Action”. If the Default Action is, for example, “Reject” or “Drop”, the filter rules should all be set to “Accept” (Whitelisting).
If the Default Action is “Accept”, a block can be defined in the filter rules with “Reject” or “Drop” for certain devices (Blacklisting).
With the “ICMP Traffic” option, you can generally allow (“Accept”) the directing
of ICMP packets, for example, a “Ping”, (“Accept”) or prohibit them dependent
upon the packet filters (“Default Action”). If, for example, the packet filters “Default
Action” are set to “Reject” or “Drop”, and ICMP Traffic to “Default Action”, then no
ICMP frames of any kind are allowed through.
In the “LAN to WAN” packet filter, the communication of devices in LAN with devices Note: The MAC address filtering is also available in the NAT operating mode; see page 21.
in the production network (WAN) or into the Internet is completely prohibited or is
blocked or allowed for particular devices.
The entry of the filter rules corresponds to the packet filters “WAN to LAN”, except that
the source IP is now the LAN IP and the destination IP addresses a device in the WAN.
P1 WAN
External (WAN)
P2 LAN
SN:
000000000
P3 LAN
FCN PWR
RST
RDY
192.168.10.5
Internal (LAN)
P4 LAN
ACT
Ext. V DC USR
18 ... 30 V
– + FE IN1 IN2
0 0
192.168.10.200
0
1 1 1
2 2 2
3 3 3
4 4 4
5 5 5
6 6 6
7 7 7
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
0 0 0 0 0 0
1 1 1 1 1 1
2 2 2 2 2 2
3 3 3 3 3 3
4 4 4 4 4 4
5 5 5 5 5 5
6 6 6 6 6 6
7 7 7 7 7 7
0 0 0 0
1 1 1 1
2 2 2 2
3 3 3 3
4 4 4 4
5 5 5 5
6 6 6 6
7 7 7 7
6.6. NAPT
Company network 10.10.1.0/24
“NAPT for LAN to WAN traffic” replaces the sender addresses of queries from the
10.10.1.10 10.10.1.20
automation cell (LAN) with the address of the WALL IE (“Source NAT”) in the WAN. External Port Internal IP & Port
If the option is deactivated, the query packets are forwarded to the WAN with their 10.10.1.1:80 192.168.10.1:80
10.10.1.1:102 192.168.10.2:102
original sender IPs. 10.10.1.1:81 192.168.10.5:80
10.10.1.1
P1 WAN
External (WAN)
P2 LAN
SN:
000000000
P3 LAN
FCN PWR
RST
RDY
192.168.10.5
Internal (LAN)
P4 LAN
ACT
Ext. V DC USR
18 ... 30 V
– + FE IN1 IN2
0 0
192.168.10.200
0
1 1 1
2 2 2
3 3 3
4 4 4
5 5 5
6 6 6
7 7 7
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
0 0 0 0 0 0
1 1 1 1 1 1
2 2 2 2 2 2
3 3 3 3 3 3
4 4 4 4 4 4
5 5 5 5 5 5
6 6 6 6 6 6
7 7 7 7 7 7
0 0 0 0
1 1 1 1
2 2 2 2
3 3 3 3
4 4 4 4
5 5 5 5
6 6 6 6
7 7 7 7
Important: If with the packet filters “WAN to LAN” the default action is set to “Reject” 10.10.1.1
P1 WAN
or “Drop”, the corresponding filter rules for access must also be created for each port External (WAN)
P2 LAN
forwarding entry.
SN:
000000000
P3 LAN
FCN PWR
RST
RDY
192.168.10.5
Internal (LAN)
P4 LAN
ACT
Ext. V DC USR
18 ... 30 V
– + FE IN1 IN2
0 0
192.168.10.200
0
1 1 1
2 2 2
3 3 3
4 4 4
5 5 5
6 6 6
7 7 7
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
0 0 0 0 0 0
1 1 1 1 1 1
2 2 2 2 2 2
3 3 3 3 3 3
4 4 4 4 4 4
5 5 5 5 5 5
6 6 6 6 6 6
7 7 7 7 7 7
0 0 0 0
1 1 1 1
2 2 2 2
3 3 3 3
4 4 4 4
5 5 5 5
6 6 6 6
7 7 7 7
The MAC address filtering is also available in the NAT operating mode; see page 21.
Important: In the bridge mode, all ports are initially blocked for “WAN-to-LAN” data
transfer for security reasons!
In order to enable access, packet filter rules must be created or the “Default Action” for
the packet filters be set to “Accept”. See the following chapter.
Note: The packet filters are always also available in the direction “LAN to WAN”,
see page 20.
Select the “WAN to LAN” menu point in the “Packet Filter” menu.
With the “Default Option”, you can set whether all frames are generally allowed Company network 10.10.1.0/24
(“Accept”) and only special packets are filtered (“Blacklisting”), or whether all frames 10.10.1.10 10.10.1.20
are generally prohibited (“Reject” / “Drop”) and only those frames are allowed to
pass through that correspond with the filter rules (“Whitelisting”).
If you initially don’t wish to filter, set the default action to “Accept”.
P1 WAN
External (WAN)
P2 LAN
SN:
000000000
P3 LAN
FCN PWR
RST
RDY
10.10.1.32
P4 LAN
Internal (LAN)
ACT
Ext. V DC USR
In order to limit access to the machine network to certain participants in the WAN,
18 ... 30 V
– + FE IN1 IN2
0 0 0
1 1 1
2 2 2
3 3 3
4 4 4
5 5 5
6 6 6
7 7 7
set the default action to “Reject” or “Drop”. In the case of prohibited frames from the
0 0
1 1
2 2
3 3
4 4
5 5
6 6
7 7
WAN, “Reject” sends an error message in response, while “Drop” rejects the frame
without sending an error message.
0 0 0 0 0 0
1 1 1 1 1 1
2 2 2 2 2 2
3 3 3 3 3 3
4 4 4 4 4 4
5 5 5 5 5 5
6 6 6 6 6 6
7 7 7 7 7 7
(e.g. a visualization). This PC should be able to access the CPU with the IP address 10.10.1.30 10.10.1.31 10.10.1.50 10.10.1.100
10.10.1.30 within the LAN via the port 102 with the help of the TCP protocol. Machine network 10.10.1.0/24
Source IP indicates the IP address of the active device in the production network (WAN).
Destination IP the addressed device in the machine network (LAN).
The filter rules can be defined for one protocol type with protocol “TCP” or “UPD”.
Destination Ports indicates the ports to which the filter rules apply.
If a filter rule applies to several or even all ports, this can be simply defined in the “Destination Ports” field. A list of ports is indicated separated by commas: “80,443,1194”.
A port range can be indicated with a colon: “4000:5000” or “1:65535” for all ports. Combinations of this are also possible: “80,443,4000:5000”.
Action defines whether this rule allows communication (“Accept”), rejects with error message (“Reject”), or simply rejects (“Drop”). The appropriate method here should
always be chosen in interaction with the “Default Action”. If the Default Action is, for example, “Reject” or “Drop”, the filter rules should all be set to “Accept” (Whitelisting).
If the Default Action is “Accept”, a block can be defined in the filter rules with “Reject” or “Drop” for certain devices (Blacklisting).
With the “ICMP Traffic” option, you can generally allow (“Accept”) the directing
of ICMP packets, for example, a “Ping”, (“Accept”) or prohibit them dependent
upon the packet filters (“Default Action”). If, for example, the packet filters “Default
Action” are set to “Reject” or “Drop”, and ICMP Traffic to “Default Action”, then no
ICMP frames of any kind are allowed through.
In the “LAN to WAN” packet filter, the communication of devices in LAN with devices Important: In the event that devices in the LAN should communicate with devices in
in the production network (WAN) can be completely prohibited or be blocked or the production network, the LAN IP address of the WALL IE must also be entered for the
allowed for particular devices. devices in the LAN as a gateway.
Note: The MAC address filtering is also available in the Bridge operating mode;
see page 21.
MAC addresses must always be entered in the format “AA:BB:CC:DD:EE:FF”, whereby If MAC filtering is used in the “Whitelist” mode, the MAC addresses of all permitted
numbers are to be indicated with hexadecimals. devices are indicated.
If no MAC filter rule has been entered or activated, the “MAC Filtering” is completely
Important: MAC Filtering has the highest priority of all filters in the WALL IE. As soon as deactivated, irrespective of the “Default MAC Policy”.
the first MAC address has been entered in the MAC filter mode “Whitelist”, only frames MAC filtering can be used both in the NAT and in the Bridge operating mode.
from this MAC address are allowed to pass through, irrespective of all other packet filter
rules.
Note: In the NAT mode, the MAC filtering is only carried out WHEN the MAC address is
also indicated in the IP header of the packet. Layer 2 frames are not forwarded in the
NAT mode. The MAC filtering takes place on layer 2 in the bridge mode.
SCAN
QR CODE WALL IE
Industrial NAT
TO GET
FIRMWARE Gateway / Firewall
Firmware
The firmware file has the file ending “HUF” (Helmholz Update File) and is encoded
to protect it from being changed.
File the firmware file on your PC and select the storage location with “Browse”.
The firmware file is then transferred to the WALL IE. This can take up to 1 minute,
depending upon the network connection.
The firmware file is decoded and checked in the WALL IE. If the content is correct,
the firmware is burned into the program memory and a restart of the WALL IE
takes place.
RST The “RST” button triggers an immediate restart of the WALL IE,
in the course of which all saved settings are retained.
Dimensions (DxWxH) 32,5 x 58,5 x 76,5 mm DC 24 V (18 ... 30 V DC, SELV and limited
- Voltage supply
Weight Approx. 130 g energy circuit)
Helmholz GmbH & Co. KG | Hannberger Weg 2 | 91091 Großenseebach | Germany | Phone +49 9135 7380-0 | Fax +49 9135 7380-110 | info@helmholz.de | www.helmholz.com