WAGO I/O SYSTEM 750 XTR Important Notes 23750-8202/040-001 PFC200 2ETH RS TELE XTRManualVersion 1.2.0, valid from FW Version 03.01.07(13)2.3 Licensing Terms of the Software Package UsedThe firmware for the “PFC200 2ETH RS TELE XTR” controller (750-8202/040-001) contains open-source software.The licence conditions of the software packages are stored in the controller intext form. They can be accessed via the WBM page “Legal Information” > “OpenSource Software.”You can obtain the source code with licensing terms of the open-source softwarefrom WAGO Kontakttechnik GmbH & Co. KG on request. Send your request tosupport@wago.com with the subject “Controller Board Support Package.”2.4 Special Use Conditions for ETHERNET DevicesIf not otherwise specified, ETHERNET devices are intended for use on localnetworks. Please note the following when using ETHERNET devices in yoursystem:• Do not connect control components and control networks directly to anopen network such as the Internet or an office network. WAGOrecommends putting control components and control networks behind afirewall.• In the control components (e.g., for WAGO I/-CHECK and CODESYS)close all ports and services not required by your application to minimize therisk of cyber attacks and to enhance cyber security.Only open ports and services during commissioning and/or configuration.• Limit physical and electronic access to all automation components toauthorized personnel only.• Change the default passwords before first use! This will reduce the risk ofunauthorized access to your system.• Regularly change the passwords used! This will reduce the risk ofunauthorized access to your system.• If remote access to control components and control networks is required,use a Virtual Private Network (VPN).• Regularly perform threat analyses. You can check whether the measurestaken meet your security requirements.• Use “defense-in-depth” mechanisms in your system's security configurationto restrict the access to and control of individual products and networks.• Please note the risks of using cloud services!If you use third-party cloud services, sensitive data is transferred to thecloud service provider at one's own responsibility. External access mayresult in manipulated data and/or unwanted control commands affecting the