earth_america
user_standard Log on
action_search_stroke
earth_america
Log on to rate and give feedback 1 2 3 4 5 Log on to rate
5
Concept

Concept


Products: (None)
Functionalities: (None)
Product version: 1.8, 1.9, 2.0, 2.1, 3.0, 3.1, 3.2, 3.3, 2022, 2023, 2024
11/21/2024

Safety Information

Important Information

Read these instructions carefully and look at the equipment to become familiar with the device before trying to install, operate, service or maintain it. The following special messages may appear throughout this bulletin or on the equipment to warn of potential hazards or to call attention to information that clarifies or simplifies a procedure.

 
action_zoom_plus_stroke

The addition of this symbol to a “Danger” or “Warning” safety label indicates that an electrical hazard exists which will result in personal injury if the instructions are not followed.

 
action_zoom_plus_stroke

This is the safety alert symbol. It is used to alert you to potential personal injury hazards. Obey all safety messages that follow this symbol to avoid possible injury or death.

Danger Danger

DANGER indicates a hazardous situation which, if not avoided, will result in death or serious injury.

Warning Warning

WARNING indicates a hazardous situation which, if not avoided, could result in death or serious injury.

Caution Caution

CAUTION indicates a hazardous situation which, if not avoided, could result in minor or moderate injury.

Notice

NOTICE is used to address practices not related to physical injury.

Please Note

Electrical equipment should be installed, operated, serviced, and maintained only by qualified personnel. No responsibility is assumed by Schneider Electric for any consequences arising out of the use of this material.

A qualified person is one who has skills and knowledge related to the construction, installation, and operation of electrical equipment and has received safety training to recognize and avoid the hazards involved.

Controller and Server Programming

It is important to verify that application programs are working as expected before downloading the application programs to the controllers and servers. When the application programs are downloaded, verify that they are downloaded correctly by verifying that the system operates as expected. This applies to initial system installations, system upgrades, and changes in an operational system.

Warning Warning

UNINTENDED EQUIPMENT OPERATION

  • Always verify that an application program is working as expected for all targeted servers, controllers, associated equipment, and entire system before downloading the application program to the controller or server.

  • Always verify that changes to an application program that runs in an operational system are working as expected for all targeted servers, controllers, associated equipment, and entire system before downloading the application program to the controller or server.

  • Always verify that the application program is downloaded correctly by verifying that all targeted servers, controllers, associated equipment, and entire system operate as expected after the application program is downloaded.

Failure to follow these instructions can result in death, serious injury, or equipment damage.

Cybersecurity Safety Notice

Notice

POTENTIAL COMPROMISE OF SYSTEM AVAILABILITY, INTEGRITY, AND CONFIDENTIALITY

  • Change default passwords at first use to help prevent unauthorized access to device settings, controls, and information.

  • Change passwords regularly to help prevent unauthorized access to device settings, controls, and information.

  • Do not share accounts. Each user must have their own account.

  • When creating user and display names, it is important to avoid using personal information, and to consider regional privacy policies. Display names will appear in event logs to identify who performed operations on the device.

  • It is recommended that log files be encrypted before transmission to help with security and privacy.

  • Disable unused ports, services, and default accounts to help minimize pathways for malicious attackers.

  • Place networked devices behind multiple layers of cyber defenses (such as firewalls, network segmentation, and network intrusion detection and protection).

  • Use the recommended cybersecurity safety measures (for example, least privilege, separation of duties) to help prevent unauthorized exposure, loss, modification of data and logs, or interruption of services.

Failure to follow these instructions can result in loss of data, unauthorized system access, or equipment damage.

How to Report a Cybersecurity Vulnerability

In the event that a security vulnerability is discovered or suspected, the portal found at www.se.com/ww/en/work/support/cybersecurity/report-a-vulnerability.jsp is to be used for reporting and to establish communication around suspected issues.