COMpact 5000/R - Firmware V6.6A - Installation, Operation and Configuration V05 03/2016
31
Important Information
Safety Information
Caution:
Electrostatic charges can destroy sensitive components.
•
Divert electrostatic charges from yourself before touching the circuit boards
with your hands or any tools. To do this, touch a metal object, preferably
earthed, such as the PBX's earthing terminal, the 19“ casing, or a computer
casing.
Important:
Mechanical loads and electro-magnetic fields can impair the PBX
operation.
•
Avoid mechanical loads (e. g. vibrations).
•
Avoid the proximity of devices that generate electro-magnetic fields (e.g. radio
sets, professional radio equipment, amateur radio equipment, mobile phones,
DECT systems, etc.).
•
Do not expose the device to direct sunlight.
•
Protect the PBX from dirt, excessive dust, condensation caustic liquids and
steam.
•
Note the values for ambient temperature and humidity indicated in the technical
data.
Important:
A power failure, damaged connection lines, power sockets, or short-
circuits in other devices in the building services can put the PBX out of operation.
•
If you have an uninterruptible power supply, you can continue operating the
majority of the system during a power failure.
•
If possible, provide a separate electric circuit for the connection that supplies
the PBX.
Important:
Take suitable measures for protecting your data and the PBX against
misuse.
•
Prevent unauthorised access to the PBX and its programming.
•
Never tell anyone the user names, passwords, PINs, or the public IP address
of the PBX. This applies to postings in forums and communities, router service
logs and Wireshark traces.
•
Consistently use all available options for assigning passwords. Do not use
passwords that are easy to guess, such as birthdays or anniversaries.
•
Use the available permissions (programming authorisation, exchange line
authorisations, restricted numbers, etc.).
•
Check your PBX's call data management and your NAT router's LOGs regularly
for inconsistencies.
•
You will find more information about protecting the system from misuse on the
Internet pages on the pages of the German Federal Office for Information
Security (see
, with search term
TK-Anlagen
), and in this
document.