Sale!

EPXPNS001 NETWORK ADAPTER SECURE DEPLOYMENT GUIDE

The EPXPNS001 PROFINET Scanner is a PROFINET I/O device certified by the PROFINET user organization. The network adapter is the head module for the RSTi-EP system bus, to which up to 64 active RSTi-EP modules can be connected. The PROFINET network adapter has two Ethernet ports, and an integrated switch.
The PROFINET Scanner can be accessed with a system-independent web server application via the USB service interface or the Ethernet.
Thus, all information, such as diagnostics, status values and parameters, can be read and all connected modules can be simulated or forced.
The station’s main power supply is integrated in the PROFINET Scanner. Power is supplied via two 4-pole connectors, separated into the input and output current paths.
Categories: ,

Description

Overview


Essential details:EPXPNS001 NETWORK ADAPTER SECURE DEPLOYMENT GUIDE

The EPXPNS001 PROFINET Scanner is a PROFINET I/O device certified by the PROFINET user organization. The network adapter is the head module for the RSTi-EP system bus, to which up to 64 active RSTi-EP modules can be connected. The PROFINET network adapter has two Ethernet ports, and an integrated switch.
The PROFINET Scanner can be accessed with a system-independent web server application via the USB service interface or the Ethernet.
Thus, all information, such as diagnostics, status values and parameters, can be read and all connected modules can be simulated or forced.
The station’s main power supply is integrated in the PROFINET Scanner. Power is supplied via two 4-pole connectors, separated into the input and output current paths.
Caution, the RSTi-EP station is usually installed on a horizontally positioned DIN rail. Installation on vertically positioned DIN rails is also possible. However, the heat dissipation is reduced such that the derating values change (refer to the section, Thermal Derating.
Modules should to be allowed to de-energize for a minimum 10 seconds after power down, prior to starting any maintenance activity.
The PROFINET Scanner cannot be hot-swapped. Refer to the RSTi-EP Slice I/O User Manual (GFK-2958) for additional information.
Refer to the RSTi-EP Power Supply Reference Guide, a software utility available on PME V9.00, for detailed power-feed requirements.
Module Features
â–Ş Supports up to 64 active RSTi-EP modules
â–Ş Spring-style technology for ease of wiring
â–Ş DIN rail mounted
â–Ş Double-click installation for positive indication of correct installation
â–Ş Built-in Web Server for diagnostic information and firmware update through Ethernet and micro USB port
â–Ş Supports Media Redundancy Protocol (MRP) Client mode operation
â–Ş Support for daisy-chain/line, star, or ring (MRP) technologies
â–Ş Two switched Ethernet ports; 8-conductor RJ-45 shielded twisted pair 10/100 Mbps copper interfaces
â–Ş Fast start-up < 500 ms with a maximum of 10 modules

EPXPNS001

lf you need to inquire or purchase ,please send the product models to my email or call medirectly .

sunny  He

[Email] sales@xiongbagk.cn

[Mobile] 86-18059884797

[WhatsApp] 86-18059884797

[Skype] sales@saulcontrol.com

EPXPNS001 NETWORK ADAPTER SECURE DEPLOYMENT GUIDE

The connection frame has one connector, and two 24 V DC wires can be connected to each connector, along with two ground connections. Those four connectors are used as shown in the following figure. The Spring style technology allows either finely stranded or solid wire with crimped wire-end ferrules or ultrasonically welded wires, each with a maximum cross-section of 1.5 mm² (16 guage), to be inserted easily through the opening in the clamping terminal without having to use tools. To insert fine stranded wires without wire-end ferrules, the pusher must be pressed in with a screwdriver and released to latch the wire.

Defense in Depth is the concept of using multiple, independent layers of security to raise the cost and complexity of a successful attack. To carry out a successful attack on a system, an attacker would need to find not just a single exploitable vulnerability, but would need to exploit vulnerabilities in each layer of defense that protects an asset.
For example, if a system is protected because it is on a network protected by a firewall, the attacker only needs to circumvent the firewall to gain unauthorized access. However, if there is an additional layer of defense, say a username/password authentication requirement, now the attacker needs to find a way to circumvent both the firewall and the username/password authentication.