
For your safety
108774_en_00 PHOENIX CONTACT 9 / 82
NOTE: Risk of unauthorized network access
Connecting devices to a network via Ethernet always entails the risk of unauthorized ac-
cess to the network.
Therefore, please check for the option of disabling active communication channels in your
application (for instance SNMP, FTP, BootP, DCP, HTTP, HTTPS, etc.) or setting pass-
words to prevent third parties from accessing the device without authorization and modi-
fying the system.
Due to its communication interfaces, the device should not be used in safety-critical ap-
plications unless additional security appliances are used.
Please take additional protective measures in accordance with the IT security require-
ments and the standards applicable to your application (e.g. virtual networks (VPN) for re-
mote maintenance access, firewalls, etc.) for protection against unauthorized network
access.
On first request, you shall release Phoenix Contact and the companies associated with
Phoenix Contact GmbH & Co. KG, Flachsmarktstrasse 8, 32825 Blomberg in accordance
with §§15ff.AktG (German Stock Corporation Act), hereinafter collectively referred to as
“Phoenix Contact”, from all third-party claims made due to improper use.
For the protection of networks for remote maintenance via VPN, Phoenix Contact offers
the mGuard product range of security appliances, a description of which you will find in
the latest Phoenix Contact catalog (phoenixcontact.net/products).
Additional measures for protection against unauthorized network access are listed in the
AH EN INDUSTRIAL SECURITY application note. The application note can be down-
loaded at phoenixcontact.net/products.
NOTE: Electrostatic discharge
The device contains components that can be damaged or destroyed by electrostatic dis-
charge. When handling the device, observe the necessary safety precautions against
electrostatic discharge (ESD) in accordance with EN 61340-5-1 and IEC 61340-5-1.
NOTE: Electrical damage
Performing work on the ImpulseCheck module during operation can damage the device
electronics.
• Disconnect the power to the ImpulseCheck module for all work on the device.
• Make sure that the supply voltage cannot be switched on again by unauthorized per-
sons.
NOTE: Device failure
The device is designed to be powered by an external 24 V DC voltage supply. The per-
missible voltage range is from 20 V DC to 29 V DC (ripple included). If the voltage ex-
ceeds or falls below the permitted voltage range, this may lead to device failure.
NOTE: Property damage due to impermissible stress
The device has an IP20 rating (IEC 60529/EN 60529) and is thus intended for use in a
clean and dry environment. If you use the device in an environment that is outside of the
specified limits, this may cause damage to the device.
• Do not subject the device to mechanical or thermal stress that exceeds the specified
limits.