Phoenix Contact CHARX SEC-3150 handleiding
Handleiding
Je bekijkt pagina 12 van 180

CHARX control modular
6 / 172
PHOENIX CONTACT 109999_en_05
Network security: Risk of unauthorized network access
Connecting devices to a network via Ethernet always entails the risk of unauthorized access
to the network.
Therefore, please check for the option of disabling active communication channels in your
application (e.g., FTP, DCP, HTTP, HTTPS, etc.) or setting passwords to prevent third par-
ties from accessing the controller without authorization and modifying the system.
Due to its communication interfaces, the controller should only be used in safety-critical ap-
plications if additional security appliances are used.
If possible, use HTTPS to access the web-based management of the charging controller.
To do so, enter https:// followed by the IP address in the address line of the browser (e.g.,
https://192.168.5.1).
Please take additional protective measures in accordance with the IT security requirements
and the standards applicable to your application (e.g., virtual networks (VPNs) for remote
maintenance access, firewalls, etc.) to prevent unauthorized network access.
On first request, you shall release Phoenix Contact and the companies associated with
PHOENIX CONTACT GmbH & Co. KG, Flachsmarktstrasse 8, 32825 Blomberg, Germany
in accordance with §§ 15 ff AktG (German Stock Corporation Act), hereinafter collectively
referred to as “Phoenix Contact”, from all third-party claims made due to improper use.
For the protection of networks for remote maintenance via VPN, Phoenix Contact offers the
mGuard product series security appliances; further information on this is available in the lat-
est Phoenix Contact catalog (phoenixcontact.com/products
).
Additional measures for protection against unauthorized network access can be found in
the “Industrial Security” application note. The application note can be downloaded at phoe-
nixcontact.com/qr/2404267.
– Application note, German, measures to protect network-capable devices with commu-
nication interfaces, solutions, and PC-based software against unauthorized access
(AH DE INDUSTRIAL SECURITY)
– Application note, English, measures to protect network-capable devices with commu-
nication interfaces, solutions, and PC-based software against unauthorized access
(AH EN INDUSTRIAL SECURITY)
Disposal
Do not dispose of the device with household waste, it should instead be disposed of in ac-
cordance with the currently applicable national regulations. It can also be returned to
Phoenix Contact.
Bekijk gratis de handleiding van Phoenix Contact CHARX SEC-3150, stel vragen en lees de antwoorden op veelvoorkomende problemen, of gebruik onze assistent om sneller informatie in de handleiding te vinden of uitleg te krijgen over specifieke functies.
Productinformatie
| Merk | Phoenix Contact |
| Model | CHARX SEC-3150 |
| Categorie | Niet gecategoriseerd |
| Taal | Nederlands |
| Grootte | 22567 MB |







