ILC 2050 BI
PHOENIX CONTACT
107144_en_01
1.3
Intended use
The Inline controller is a modular small-scale controller, which has been specially designed
for automation applications in building infrastructure. The device corresponds to degree of
protection IP20. The device is designed for use in closed control cabinets or control boxes
(junction boxes) with IP54 degree of protection or higher.
The device is designed for use in building infrastructure and in industrial applications.
1.4
Disposal
•
Do not dispose of the device with household waste; it should instead be disposed of in
accordance with the currently applicable national regulations. It can also be returned to
Phoenix Contact.
NOTE: Risk of unauthorized network access
Connecting devices to a network via Ethernet always entails the risk of unauthorized ac-
cess to the network.
Therefore, please check your application for any option of deactivating active communi-
cation channels (e.g., SNMP, SFTP, BootP, DCP) or setting passwords to prevent third
parties from accessing the controller without authorization and modifying the system.
Because of the controller's communication interfaces, we advise against using the con-
troller in safety-critical applications without additional security appliances.
Please take additional protective measures in accordance with the IT security require-
ments and the standards applicable to your application (e.g. virtual networks (VPN) for re-
mote maintenance access, firewalls, etc.) for protection against unauthorized network
access.
On first request, you agree to release Phoenix Contact and the companies associated
with Phoenix Contact GmbH & Co. KG, Flachsmarktstraße 8, 32825 Blomberg, Germa-
ny, in accordance with §§ 15 ff. AktG or the German Stock Corporation Act (hereinafter
collectively referred to as “Phoenix Contact”) from all third-party claims made due to im-
proper use.
For the protection of networks for remote maintenance via VPN, Phoenix Contact offers
the mGuard product series of security appliances, which you can find described in the lat-
est Phoenix Contact catalog (
).
Additional measures for protection against unauthorized network access can be found in
the AH EN INDUSTRIAL SECURITY application note. The application note is available
for downloading at
.
Summary of Contents for 2403160
Page 70: ...ILC 2050 BI 70 74 PHOENIX CONTACT 107144_en_01 ...
Page 72: ...ILC 2050 BI 72 74 PHOENIX CONTACT 107144_en_01 ...
Page 75: ......