Safety notes
GB
The CGLine+ web interface must be
operated in undamaged and
functional state.
When carrying out maintenance work
with the device the device must be
de-energised.
When carrying out device maintenance,
observe national safety and accident
prevention regulations and the safety
notes in the operating instructions below
designated with
Conformity to standards
Compliant with: EN 60950-1.
Developed, manufactured and tested
according to DIN EN ISO 9001.
Description /
application area
This short instruction manual describes
only a quick commissioning procedure
of the CGLine+ Web Compact Controller.
A complete Installation and Operating
Instuction are downloadable from the
website of the CGLine+ Web Compact
Controller.
Commissioning and
modifying network settings
Please connect a patch cable with RJ45
plugs between the Compact Controller
and a PC (e.g. notebook).
2
Quick installation manual CGLine+ Web Compact Controller ZNO2050500 PrB
All manuals and user guides at all-guides.com
CAUTION
.
CYBERSECURITY
This chapter provides guidelines to securely
deploy the CGLine+ Web Compact Controller
and minimize the cybersecurity risk to the
installer system.
•
Asset identification and inventory:
Ensure that the CGLine+ Web Compact
Controller is labelled and inventoried
using the Part number and Mac address
printed on the product label, and also
the IP address configured during the
installation of the material and actual
firmware version.
•
Restrict Physical access: Ensure that
physical access to the CGLine+ Web
Compact Controller is restricted only
to authorized user(s). CGLine+ Web
Compact Controller
supports the physical access ports RJ-45,
USB that can be used to tamper the
device. Access to these ports should be
restricted to authorized personnel only.
Secure the facility and equipment rooms
or closets with access control mecha-
nisms such as locks, entry card readers,
guards, man traps, CCTV, etc. as appro-
priate. Monitor and log the access at all
times. Before connecting any portable
device through a USB port or SD card
slot, scan the device to prevent unau-
thorized access.
•
Restrict Logical access: Access to 'Admin'
& 'Service' user accounts should be
restricted to authorized personnel only
as system configuration can be tam-
pered by abusing these accounts. Ensure
password length, complexity and expi-
ration requirements are appropriately
set, particularly for all administrative
accounts (e.g., minimum 10 characters,
mix of upper- and lower-case and spe-
cial characters, and expire every 90 days,
or otherwise in accordance with your
03/2020
www.eaton.com