user_standard Log on
Log on to rate and give feedback 1 2 3 4 5 Log on to rate


Products: (None)
Functionalities: (None)
Product version: 2.0, 2.1, 3.0, 3.1, 3.2, 3.3, 2022, 2023

Safety Information

Important Information

Read these instructions carefully and look at the equipment to become familiar with the device before trying to install, operate, service or maintain it. The following special messages may appear throughout this bulletin or on the equipment to warn of potential hazards or to call attention to information that clarifies or simplifies a procedure.


The addition of this symbol to a “Danger” or “Warning” safety label indicates that an electrical hazard exists which will result in personal injury if the instructions are not followed.


This is the safety alert symbol. It is used to alert you to potential personal injury hazards. Obey all safety messages that follow this symbol to avoid possible injury or death.

Danger Danger

DANGER indicates a hazardous situation which, if not avoided, will result in death or serious injury.

Warning Warning

WARNING indicates a hazardous situation which, if not avoided, could result in death or serious injury.

Caution Caution

CAUTION indicates a hazardous situation which, if not avoided, could result in minor or moderate injury.


NOTICE is used to address practices not related to physical injury.

Please Note

Electrical equipment should be installed, operated, serviced, and maintained only by qualified personnel. No responsibility is assumed by Schneider Electric for any consequences arising out of the use of this material.

A qualified person is one who has skills and knowledge related to the construction, installation, and operation of electrical equipment and has received safety training to recognize and avoid the hazards involved.

Cybersecurity Safety Notice



  • Change default passwords at first use to help prevent unauthorized access to device settings, controls, and information.

  • Change passwords regularly to help prevent unauthorized access to device settings, controls, and information.

  • Do not share accounts. Each user must have their own account.

  • When creating user and display names, it is important to avoid using personal information, and to consider regional privacy policies. Display names will appear in event logs to identify who performed operations on the device.

  • It is recommended that log files be encrypted before transmission to help with security and privacy.

  • Disable unused ports, services, and default accounts to help minimize pathways for malicious attackers.

  • Place networked devices behind multiple layers of cyber defenses (such as firewalls, network segmentation, and network intrusion detection and protection).

  • Use the recommended cybersecurity safety measures (for example, least privilege, separation of duties) to help prevent unauthorized exposure, loss, modification of data and logs, or interruption of services.

Failure to follow these instructions can result in loss of data, unauthorized system access, or equipment damage.

How to Report a Cybersecurity Vulnerability

In the event that a security vulnerability is discovered or suspected, the portal found at is to be used for reporting and to establish communication around suspected issues.