TP 6…PS
4/28
PHOENIX CONTACT
4109_en_B
1.3.2
Product changes
Changes or modifications to hardware and software of the device are not permitted.
Incorrect operation or modifications to the device can endanger your safety or damage the
device. Do not repair the device yourself. If the device is defective, please contact
Phoenix Contact.
1.3.3
Disposal
The device contains valuable recyclable materials, which should be utilized. The elec
-
tronic circuit board is fitted with a lithium battery. Dispose of the device separately
from other waste, i.e., via an appropriate collection site.
1.4
Security in the network
NOTE: Risk of unauthorized network access
Connecting devices to a network via Ethernet entails the danger of unauthorized ac
-
cess to the network.
To prevent unauthorized network access, please read the following notes:
–
If possible, deactivate unused communication channels.
–
Assign passwords such that third parties cannot access the device and make un-
authorized changes.
–
Due to its communication interfaces, the device should not be used in security-crit-
ical applications unless additional security appliances are used. Therefore, please
take additional protective measures in accordance with the IT security require-
ments and the standards applicable to your application, e.g., virtual networks
(VPN) for remote maintenance access, firewalls, etc., for protection against unau-
thorized network access.
–
On first request, you shall release Phoenix Contact and the companies associated
with Phoenix Contact GmbH & Co. KG, Flachsmarkstrasse 8, 32825 Blomberg,
Germany in accordance with §§ 15 ff AktG (German Stock Corporation Act), here
-
inafter collectively referred to as “Phoenix Contact”, from all third-party claims
made due to improper use.
–
For the protection of networks for remote maintenance via VPN, Phoenix Contact
offers the mGuard product series of security appliances; these are described in the
latest Phoenix Contact catalog (
phoenixcontact.net/products
).
–
Additional measures for protection against unauthorized network access are listed
in the AH EN INDUSTRIAL SECURITY application note. The application note can
be downloaded at
phoenixcontact.net/products
).
Summary of Contents for TP 6000 HMI
Page 1: ...User manual UM EN TP 6000 TP 6000 HMI for machine control...
Page 4: ...TP 6 PS 2 28 PHOENIX CONTACT 4109_en_B...
Page 8: ...TP 6 PS 6 28 PHOENIX CONTACT 4109_en_B...
Page 16: ...TP 6 PS 14 28 PHOENIX CONTACT 4109_en_B...
Page 18: ...TP 6 PS 16 28 PHOENIX CONTACT 4109_en_B...
Page 26: ...TP 6 PS 24 28 PHOENIX CONTACT 4109_en_B...