
For your safety
110146_en_00
PHOENIX CONTACT
9 / 128
NOTE: Device failure due to vibrations and shock levels above the permitted
specifications during operation
If the device is subjected to vibrations and shock levels above the permitted specifi
-
cations during operation, this may lead to malfunctions or even device failure.
• Ensure that the permitted specifications for vibrations and shocks are adhered to
when operating the device, see
1.5
Security in the network
NOTE: Risk of unauthorized network access
Connecting devices to a network via Ethernet always entails the risk of unauthorized
access to the network.
Therefore, please check for the option of disabling active communication channels in
your application (e.g., FTP, DCP, HTTP, HTTPS, etc.) or setting passwords to prevent
third parties from accessing the controller without authorization and modifying the sys
-
tem.
Due to its communication interfaces, the controller should not be used in safety-critical
applications unless additional security appliances are used.
Please take additional precautions in accordance with the IT security requirements
and standards applicable to your application (e.g., virtual networks (VPN) for remote
maintenance access, firewalls, etc.) to prevent unauthorized network access.
On first request, you shall release Phoenix Contact and the companies associated
with Phoenix Contact GmbH & Co. KG, Flachsmarktstraße 8, 32825 Blomberg, Ger
-
many in accordance with §§ 15 ff AktG (German Stock Corporation Act), hereinafter
collectively referred to as “Phoenix Contact”, from all third-party claims made due to
improper use.
For the protection of networks for remote maintenance via VPN, Phoenix Contact of
-
fers the mGuard product range of security appliances, a description of which is pro
-
vided in the latest Phoenix Contact catalog (
).
Additional measures for protection against unauthorized network access are listed in
the AH EN INDUSTRIAL SECURITY application note. The application note can be