Fundamental safety instructions
16
© Festo Didactic
8065842 en
4.5
Guarantee and liability for application examples
The application examples are not legally binding, and we cannot guarantee their completeness in terms of
their configuration, their equipment or any events that may occur. The application examples are not
representations of any specific customer solution; they are merely intended to illustrate typical tasks for
which the product in question could be used. You bear the responsibility for ensuring that the products
described here are operated properly. These application examples do not in any way relieve you of your
responsibility to ensure that the system is handled safely when it is being used, installed, operated or
maintained.
4.6
Cyber security
Note
Festo Didactic offers products with industrial security functions that aid the safe operation of plants,
systems, machines and networks. In order to protect plants, systems, machines and networks from cyber
threats, a comprehensive industrial security concept must be implemented and continuously updated.
Festo's products and services only constitute one part of such a concept.
The customer is responsible for preventing unauthorized access to their plants, systems, machines and
networks. Systems, machines and components should only be connected to a company's network or the
Internet if and as necessary, and only when the suitable security measures (e.g. firewalls and network
segmentation) are in place. Furthermore, Festo's guidelines on suitable security measures should be
observed. Festo products and solutions are constantly being developed further in order to make them more
secure. Festo strongly recommends that customers install product updates as soon as they become
available and always use the latest versions of its products. Any use of product versions that are no longer
supported or any failure to install the latest updates may render the customer vulnerable to cyber attacks.
WARNING
•
Unsecure operating conditions due to software tampering
–
Forms of software tampering (e.g. viruses, Trojans, malware and worms) can
lead to unsecure operating conditions in your system, which may in turn lead to
severe or fatal injury or property damage.
–
Keep your software up to date.
–
Integrate the automation and actuator components into an overarching and
comprehensive industrial security concept for the installation or machine in
question that is in line with the latest technological developments.
–
Make sure that all the products you have installed are incorporated into your
overarching industrial security concept.
–
Use suitable measures, such as a virus scanner, to protect files save on
exchangeable storage media from malware.
Summary of Contents for CP Factory
Page 21: ...Fundamental safety instructions Festo Didactic 8065842 en 21 4 11 CE Declaration of Conformity...
Page 22: ...Fundamental safety instructions 22 Festo Didactic 8065842 en...
Page 23: ...Fundamental safety instructions Festo Didactic 8065842 en 23...
Page 27: ...Technical data Festo Didactic 8065842 en 27 Illustration similar...
Page 68: ...Operation 68 Festo Didactic 8065842 en 4 Choose application...