Phoenix Contact CHARX SEC-3050 handleiding
Handleiding
Je bekijkt pagina 12 van 178

CHARX control modular
12 / 176 Phoenix Contact
109999_en_06
Network security: Risk of unauthorized network access
Connecting devices to a network via Ethernet always entails the risk of unauthorized ac-
cess to the network.
Therefore, please check for the option of disabling active communication channels in
your application (e.g., FTP, DCP, HTTP, HTTPS, etc.) or setting passwords to prevent third
parties from accessing the controller without authorization and modifying the system.
Due to its communication interfaces, the controller should only be used in safety-critical
applications if additional security appliances are used.
If possible, use HTTPS to access the web-based management of the charging controller.
To do so, enter https:// followed by the IP address in the address line of the browser (e.g.,
https://192.168.5.1).
Please take additional protective measures in accordance with the IT security require-
ments and the standards applicable to your application (e.g., virtual networks (VPNs) for
remote maintenance access, firewalls, etc.) to prevent unauthorized network access.
On first request, you shall release Phoenix Contact and the companies associated with
Phoenix Contact GmbH & Co. KG, Flachsmarktstrasse 8, 32825 Blomberg, Germany in
accordance with §§ 15 ff AktG (German Stock Corporation Act), hereinafter collectively
referred to as “Phoenix Contact”, from all third-party claims made due to improper use.
For the protection of networks for remote maintenance via VPN, Phoenix Contact offers
the mGuard product series security appliances; further information on this is available in
the latest Phoenix Contact catalog (phoenixcontact.com/products
).
Additional measures for protection against unauthorized network access can be found in
the “Industrial Security” application note. The application note can be downloaded at
phoenixcontact.com/qr/2404267
.
– Application note, German, measures to protect network-capable devices with com-
munication interfaces, solutions, and PC-based software against unauthorized ac-
cess (AH DE INDUSTRIAL SECURITY)
– Application note, English, measures to protect network-capable devices with com-
munication interfaces, solutions, and PC-based software against unauthorized ac-
cess (AH EN INDUSTRIAL SECURITY)
Disposal
Do not dispose of the device with household waste. It should instead be disposed of in
accordance with the currently applicable national regulations. It can also be returned to
Phoenix Contact.
Bekijk gratis de handleiding van Phoenix Contact CHARX SEC-3050, stel vragen en lees de antwoorden op veelvoorkomende problemen, of gebruik onze assistent om sneller informatie in de handleiding te vinden of uitleg te krijgen over specifieke functies.
Productinformatie
Merk | Phoenix Contact |
Model | CHARX SEC-3050 |
Categorie | Niet gecategoriseerd |
Taal | Nederlands |
Grootte | 18845 MB |