Safety instructions

The following safety instructions must be followed during installation and working with networks and the software.

Explosion protection

Device modification CX2900-0107 is mandatory for operation of the embedded PC in hazardous areas, zone 2/22. The device modification entails the modification and relocation of the device label and a factory-fitted retainer bracket for mechanically securing the connectors.

WARNING

Operation without device modification

Without the CX2900-0107 device modification, the USB plugs may slip out of the USB interfaces due to vibration, which may trigger a deflagration or explosion.

The embedded PC must only be used with the device modification, and the USB plugs must be secured to the retainer brackets with cable ties.

Tighten the screws of the DVI plugs and, if present, also the screws of the fieldbus plugs, in order to prevent the plugs slipping out. Only use RJ45 plugs with an intact latching lug. Use cable ties to secure the USB and RJ45 plugs to the retainer brackets.

The CXxxxx-N020 optional interface (audio interface) may not be used in hazardous areas.

The embedded PC must be installed in a housing, which ensures protection rating IP54 for gas according to EN 60079-15. A housing with protection rating IP54 is required for non-conductive dust. IP6X is required for conductive dust according to EN 60079-31.

Observe the temperature at the cable entry points into the housing. If the temperature during nominal operation is higher than 70 °C at the entry points or higher than 80 °C at the wire branching points, cables must be selected that are designed for these high temperatures and operation in hazardous areas.

Maintain the prescribed ambient temperature during operation. The permissible ambient temperature range during operation is -25 °C ... +60 °C.

Take measures to prevent the rated operating voltage exceeding 119 V through short-term interference voltages.

Switch off the power supply and ensure that no explosive atmosphere occurs when:

Mounting

Working with networks

Working with the software

Further information on the safe handling of networks and software can be found in the Beckhoff Information System:
http://infosys.beckhoff.com

Document name

IPC Security Guideline