Preface
CP 154xSP-1
6
Operating Instructions, 12/2019, C79000-G8976-C426-05
Current manual edition on the Internet
You will also find the current version of this manual on the Internet pages of Siemens
Industry Online Support:
●
CP 1542SP-1 / CP 1543SP-1
Link: (
https://support.industry.siemens.com/cs/ww/en/ps/22144/man
●
CP 1542SP-1 IRC
Link: (
https://support.industry.siemens.com/cs/ww/en/ps/22143/man
Cross references
In this manual there are often cross references to other sections.
To be able to return to the initial page after jumping to a cross reference, some PDF readers
support the command <Alt>+<left arrow>.
License conditions
Note
Open source software
Read the license conditions for open source software carefully before using the product.
You will find license conditions in the following document on the supplied data medium:
●
OSS_CP-ET200SP_99.pdf
Security information
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is
necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens’ products and solutions constitute one element of such a concept.
Customers are responsible for preventing unauthorized access to their plants, systems,
machines and networks. Such systems, machines and components should only be
connected to an enterprise network or the internet if and to the extent such a connection is
necessary and only when appropriate security measures (e.g. firewalls and/or network
segmentation) are in place.
For additional information on industrial security measures that may be implemented, please
visit
Link: (
http://www.siemens.com/industrialsecurity
Siemens’ products and solutions undergo continuous development to make them more
secure. Siemens strongly recommends that product updates are applied as soon as they are
available and that the latest product versions are used. Use of product versions that are no
longer supported, and failure to apply the latest updates may increase customers’ exposure
to cyber threats.