WAGO I/O SYSTEM 750 XTR
Important Notes 23
750-8202/040-001 PFC200 2ETH RS TELE XTR
Manual
Version 1.2.0, valid from FW Version 03.01.07(13)
2.3
Licensing Terms of the Software Package Used
The firmware for the “PFC200 2ETH RS TELE XTR” controller (750-8202/040-
001) contains open-source software.
The licence conditions of the software packages are stored in the controller in
text form. They can be accessed via the WBM page “Legal Information” > “Open
Source Software.”
You can obtain the source code with licensing terms of the open-source software
from WAGO Kontakttechnik GmbH & Co. KG on request. Send your request to
with the subject “Controller Board Support Package.”
2.4
Special Use Conditions for ETHERNET Devices
If not otherwise specified, ETHERNET devices are intended for use on local
networks. Please note the following when using ETHERNET devices in your
system:
•
Do not connect control components and control networks directly to an
open network such as the Internet or an office network. WAGO
recommends putting control components and control networks behind a
firewall.
•
In the control components (e.g., for WAGO I/-CHECK and CODESYS)
close all ports and services not required by your application to minimize the
risk of cyber attacks and to enhance cyber security.
Only open ports and services during commissioning and/or configuration.
•
Limit physical and electronic access to all automation components to
authorized personnel only.
•
Change the default passwords before first use! This will reduce the risk of
unauthorized access to your system.
•
Regularly change the passwords used! This will reduce the risk of
unauthorized access to your system.
•
If remote access to control components and control networks is required,
use a Virtual Private Network (VPN).
•
Regularly perform threat analyses. You can check whether the measures
taken meet your security requirements.
•
Use “defense-in-depth” mechanisms in your system's security configuration
to restrict the access to and control of individual products and networks.
•
Please note the risks of using cloud services!
If you use third-party cloud services, sensitive data is transferred to the
cloud service provider at one's own responsibility. External access may
result in manipulated data and/or unwanted control commands affecting the