InteliLite Global Guide
7
ComAp reserves the right to update this End User's Guide /Manual at any time. ComAp does not assume any
responsibility for its use outside of the scope of the Standard Terms and the License Agreement.
Licensed End User is entitled to make only necessary number of copies of the End User's Guide /Manual. Any
translation of this End User's Guide /Manual without the prior written consent of ComAp is expressly prohibited!
Even if the prior written consent from ComAp is acquired, ComAp does not take any responsibility for the
content and quality of any such translation. ComAp will deem a translation equal to this End User's
Guide/Manual only if it agrees to verify such a translation. The terms and conditions of such verification must be
included in the written consent.
For more details relating to the Ownership, Extent of Permitted Reproductions Term of Use of the
Documentation and to the Confidentiality rules please review and comply with the ComAp’s END
USER or Distributor LICENSE AGREEMENT CONDITIONS– COMAP CONTROL SYSTEMS
SOFTWARE and STANDARD TERMS FOR SALE OF PRODUCTS AND PROVISION OF SERVICES
available on the
.
Security Risk Disclaimer
Pay attention to the following recommendations and measures to increase the level of security of ComAp
products and services.
Please note that possible cyber-attacks cannot be fully avoided by the below mentioned recommendations and
set of measures already performed by ComAp, but by following them the cyber-attacks can be considerably
reduced and thereby to reduce the risk of damage. ComAp does not take any responsibility for the actions of
persons responsible for cyber-attacks, nor for any damage caused by the cyber-attack. However, ComAp is
prepared to provide technical support to resolve problems arising from such actions, including but not limited to
restoring settings prior to the cyber-attacks, backing up data, recommending other preventive measures against
any further attacks.
Warning:
Some forms of technical support may be provided against payment. There is no legal or factual
entitlement for technical services provided in connection to resolving problems arising from cyber-attack or
other unauthorized accesses to ComAp's Products or Services.
General security recommendations and set of measures
1. AccessCode
• Change the AccessCode BEFORE the device is connected to a network.
• Use a secure AccessCode – ideally a random string of 8 characters containing lowercase, uppercase letters
and digits.
• For each device use a different AccessCode.
2. Password
• Change the password BEFORE the device enters a regular operation.
• Do not leave displays or PC tools unattended if an user, especially administrator, is logged in.
3. Controller Web interface
• The controller web interface at port TCP/80 is based on http, not https, and thus it is intended to be used only
in closed private network infrastructures.
• Avoid exposing the port TCP/80 to the public Internet.
4. MODBUS/TCP
• The MODBUS/TCP protocol (port TCP/502) is an instrumentation protocol designed to exchange data
between locally connected devices like sensors, I/O modules, controllers etc. From it’s nature it does not
contain any kind of security – neither encryption nor authentication. Thus it is intended to be used only in closed
private network infrastructures.
Summary of Contents for InteliLite AMF25
Page 34: ...InteliLite Global Guide 34 ConnectionType SplPhL1L2 Image 4 11 Split phase L1L2 application ...
Page 36: ...InteliLite Global Guide 36 Image 4 14 Typical Split Phase generator wiring ...
Page 91: ...InteliLite Global Guide 91 Image 5 13 Flowchart of start of diesel engine ...
Page 93: ...InteliLite Global Guide 93 Image 5 14 Flowchart of start of gas engine ...
Page 721: ...InteliLite Global Guide 721 Image 9 34 IGS PTM Image 9 35 IGS PTM dimensions ...
Page 727: ...InteliLite Global Guide 727 Image 9 36 Inteli AIN8TC Image 9 37 Inteli AIN8TC dimensions ...
Page 731: ...InteliLite Global Guide 731 Image 9 38 Inteli AIO9 1 Image 9 39 Inteli AIO9 1 dimensions ...