edgeController
6
2
Safety instructions
Content
Electromagnetic compatibility ................................................................................................................... 6
Cyber security ........................................................................................................................................... 6
61267
•
The unit described is a subcomponent for integration into a system. The system architect is
responsible for the safety of the system. The system creator undertakes to perform a risk
assessment and to create documentation in accordance with legal and normative requirements to
be provided to the operator and user of the system. This documentation must contain all
necessary information and safety instructions for the operator, the user and, if applicable, for any
service personnel authorised by the architect of the system.
•
Read this document before setting up the product and keep it during the entire service life.
•
The product must be suitable for the corresponding applications and environmental conditions
without any restrictions.
•
Only use the product for its intended purpose (→
Functions and features
(
•
If the operating instructions or the technical data are not adhered to, personal injury and/or
damage to property may occur.
•
In case of malfunctions of the unit, please contact the manufacturer. Tampering with the unit is not
allowed.
•
Installation, electrical connection, set-up, programming, configuration, operation and maintenance
of the product must be carried out by personnel qualified and authorised for the respective activity.
•
Protect units, connectors and cables against damage.
•
Replace damaged units, otherwise the technical data and safety will be impaired.
>
2.1
Electromagnetic compatibility
61268
This is a class A product. It can cause radio interference in domestic areas. In this case, the operator
is requested to take appropriate measures.
>
2.2
Cyber security
61269
The edgeController offers the following safety functions:
Design:
•
Hardened Yocto-Linux distribution
Integrity:
•
Convenient update of the complete system (recovery system)
•
Backup & restoring the system configuration
Authentication:
•
User administration via CODESYS
•
Individual rights management for both the programming system and the runtime system via
CODESYS
•
Authentication with external cloud
Confidentiality:
•
Browser-based access to web visualisation via TLS-secured connection
•
Cloud communication only via TLS-secured connection