
For your safety
CX20x0
11
Version: 2.5
2.3
Safety instructions
The following safety instructions must be followed during installation and working with networks and the
software.
Mounting
• Never work on live equipment. Always switch off the power supply for the device before installation,
troubleshooting or maintenance. Protect the device against unintentional switching on.
• Observe the relevant accident prevention regulations for your machine (e.g. the BGV A 3, electrical
systems and equipment).
• Ensure standard-compliant connection and avoid risks to personnel. Ensure that data and supply
cables are laid in a standard-compliant manner and ensure correct pin assignment.
• Observe the relevant EMC guidelines for your application.
• Avoid polarity reversal of the data and supply cables, as this may cause damage to the equipment.
• The devices contain electronic components, which may be destroyed by electrostatic discharge when
touched. Observe the safety precautions against electrostatic discharge according to DIN EN
61340-5-1/-3.
Working with networks
• Restrict access to all devices to an authorized circle of persons.
• Change the default passwords to reduce the risk of unauthorized access.
• Protect the devices with a firewall.
• Apply the IT security precautions according to IEC 62443, in order to limit access to and control of
devices and networks.
Working with the software
• The sensitivity of a PC against malicious software increases with the number of installed and active
software.
• Uninstall or disable unnecessary software.
Further information about the safe handling of networks and software can be found in the Beckhoff
Information System:
Document name
IPC Security Guideline
2.4
Notes on information security
The products of Beckhoff Automation GmbH & Co. KG (Beckhoff), insofar as they can be accessed online,
are equipped with security functions that support the secure operation of plants, systems, machines and
networks. Despite the security functions, the creation, implementation and constant updating of a holistic
security concept for the operation are necessary to protect the respective plant, system, machine and
networks against cyber threats. The products sold by Beckhoff are only part of the overall security concept.
The customer is responsible for preventing unauthorized access by third parties to its equipment, systems,
machines and networks. The latter should be connected to the corporate network or the Internet only if
appropriate protective measures have been set up.
In addition, the recommendations from Beckhoff regarding appropriate protective measures should be
observed. Further information regarding information security and industrial security can be found in our
Содержание CX20 0 Series
Страница 1: ...Manual EN CX20x0 Embedded PC 11 10 2021 Version 2 5...
Страница 2: ......
Страница 5: ...Table of contents CX20x0 5 Version 2 5 List of tables 88 List of figures 90...
Страница 6: ...Table of contents CX20x0 6 Version 2 5...
Страница 91: ......