AXC 1050 (XC)
10
PHOENIX CONTACT 8482_en_03
NOTE: : Risk of unauthorized network access
Connecting devices to a network via Ethernet always entails the risk of unauthorized ac-
cess to the network.
Therefore, please check your application for any option of deactivating active communi-
cation channels (for instance SNMP, FTP, BootP, DCP, etc.), or setting passwords to pre-
vent third parties from accessing the controller without authorization and modifying the
system.
Because of the controller's communication interfaces, we advise against using the con-
troller in safety-critical applications without additional security appliances.
Please take additional protective measures according to the IT security requirements and
the standards applicable to your application (for instance virtual networks (VPN) for re-
mote maintenance access, firewalls, etc.) for protection against unauthorized network ac-
cess.
On first request, you shall release Phoenix Contact and the companies associated with
Phoenix Contact GmbH & Co. KG, Flachsmarktstraße 8, 32825 Blomberg in accordance
with §§ 15 ff. AktG or German Stock Corporation Act (hereinafter collectively referred to
as "Phoenix Contact") from all third-party claims that are made due to improper use.
For the protection of networks for remote maintenance via VPN, Phoenix Contact offers
the mGuard product series security appliances which you can find described in the latest
Phoenix Contact catalog (
phoenixcontact.net/products).
Additional measures for protection from unauthorized network access can be found in the
AH EN INDUSTRIAL SECURITY application note. The application note can be download-
ed at phoenixcontact.net/products.