Planning; Structure Guidelines; Installation Site And Touch-Proof Protection; Data Security - WAGO 765-4102/0100-0000 User Manual

8-port-io-link master class b; profinet; 24 v dc; 2.0 a; 8 × m12 connection
Table of Contents

Advertisement

765-4102/0100-0000

Planning

6

6.1 Structure Guidelines

6.1.1 Installation Site and Touch-Proof Protection

This is a class A product. It may cause radio interference in residential areas. The in-
staller/operator must take appropriate measures to avoid radio interference.
Observe the following relevant standards for the setup:
• DIN 60204 (Electrical equipment of machines)
• DIN EN 50178 (Electronic equipment for use in power installations)
• EN 60439 (Low-voltage switchgear and control-gear assemblies)
DIN 60204 and DIN EN 50178 also set the requirements on power supplies per PELV
(protected extra-low voltage) and SELV (safety extra-low voltage) and the requirements
on isolation of the supply cables.

6.1.2 Data Security

Professional planning and design is an important requirement for securing data confiden-
tiality, availability and integrity.

6.1.2.1 Random Influences

Data transmission and processing can be disrupted by random influences, such as tem-
porary electromagnetic disturbances. Proper design and assembly can significantly re-
duce the likelihood of corruption or destruction of data.

6.1.2.2 Deliberate Influences

Use in ETHERNET Areas
ETHERNET products are designed for use in local networks. Please note the following
when using ETHERNET products in your system:
• Do not connect control components and control networks to an open network such as
the Internet or an office network.
WAGO recommends putting control components and control networks behind a fire-
wall.
• In the control components, close all ports and services (e.g., for WAGO-I/O-CHECK
and CODESYS) not required by your application to minimize the risk of cyber attacks
and to enhance cybersecurity.
Only open the ports and services for the duration of the commissioning/configuration.
• Limit physical and electronic access to all automation components to authorized per-
sonnel only.
• To reduce the risk of unauthorized access to your system, change the default pass-
words before first use.
• To reduce the risk of unauthorized access to your system, regularly change the pass-
words used.
• To verify that the measures taken meet your security requirements, regularly perform
threat analyses.
Product manual | Version: 2.1.0
8PORT IOL-B FLD PN DC 24V 2.0A
Planning
33

Advertisement

Table of Contents
loading

Table of Contents