ELKHART BRASS eWON Cosy 131, 65765001 User Manual

65765001 eWON Cosy 131 Router
1302
WEST BEARDSLEY AVENUE P.O. BOX 1127 ELKHART IN 46515 (574) 295-8330 FAX (574) 293-9914
98573000 REV.REL
© 2015 ELKHART BRASS MFG. CO., INC.
WARNING: This device is NOT rated for use in a hazardous location. Use in a
hazardous location should be subject to the requirements of your electrical hot work permit procedure.
Table of Contents:
Configuration Page
I. Customer Set-Up Information 3-4 II. Field Configuration for WIFI (not required if unit is pre-configured at Elkhart Brass) 5
FAQ
III. Frequently Asked Questions 6-8
Network Security
IV. Network Security Synopsis 9
Attachments
Network Security – Detailed Analysis, for IP Professionals “An IT Perspective”
eWON COSY 131 Equipment Manual
Parameter Listing
2
Customer Setup & Installation Requirements
Overview
24VDC power must also be supplied to the eWON router.
The eWON router needs access to the internet. This access can be achieved either through a wired Ethernet connection, or a wireless (WIFI) connection.
It also needs to be connected to the Elkhart Brass Monitor network. This connection will be a wired Ethernet connection.
Installation / Assembly / Power
Step 1: Mounting the eWON (optional) For convenience, you may mount the router on an unused section of din rail. Slide the clear rail clip on the back of the router down until it clicks into the open position. Install the router onto the din rail and then push up on the clip untill it clicks and locks the router onto the din rail.
Step 2: Antenna Installation (required for WIFI use): Install the antenna onto the router by hand tightening it on to the brass connector on the front of the router.
Step 3: Power Connect power as shown.
Connect 24VDC+ from term [51] or [51A] to the [+] terminal on the removable green connector on top
of the eWON.
Connect 24VDC- from term [52] to the [-] terminal on the removable green connector on top of the
eWON.
Add a ground wire to connect both of the ground connections, as shown.
3
Internet Connection
Optional Wired Internet Connection
Plug an Ethernet cable from the plant network into the WAN port #4. This port is in the lower left corner and is the only one marked with a red LED when the switch is powered up.
The cable can be a patch cable or a crossover cable.
When the unit is powered up, the Switch will automatically obtain an IP address (DHCP) and will begin to work within a few minutes.
Optional Wireless (WIFI) Internet Connection
Potential wireless sources include:
Plant WIFI
Wireless hotspots
Cell phones that have wireless hotspot capability
Dongles that have wireless hotspot capability
For use on WIFI, it is easiest if the switch is pre-configured at Elkhart Brass before it ships to the customer. In order to complete this, the customer must provide the following wireless network information:
SSID
Password (a.k.a. passphrase)
Security Information (WEP, WPA, or none)
SSID and Password must not contain any special characters. SSID and Passwords are case sensitive, be sure to note them exactly.
After the SSID and password are configured at Elkhart Brass, the unit will be shipped to the customer. The unit will then auto connect to their WIFI network automatically on power up.
Elkhart Brass Network Connection
Plug another Ethernet cable into any of the eWON’s LAN Ports; #1, or #2, or #3 (marked with a green LED).
Plug the other end of that cable into any port, on any N-Tron switch, in the Elkhart Brass Monitor network.
This cable can be a patch cable or a crossover cable.
4
II. Field Configuration for WIFI
Note: Field c onfiguration is not normally required. Elkhart Brass will usually pre-configure an eWON router before sending it to a customer.
Field configu ra ti on of the PASSPHRASE, SSID, and SECURITY TYPE
1) Screw on the antenna.
2) Power up the EWON with a 24VDC power source (this can be a battery).
3) Connect an Ethernet cable (patch or crossover) to LAN port 1 of the EWON (upper right hand port).
4) Connect the other end of the cable to a computer’s Ethernet port.
5) Open a browser.
6) Type 192.168.32.131 in the browser address bar, press enter.
7) Select settings.
8) Type adm (lower case) for both the log in and the password.
9) Select the maintenance tab.
10) Check the box “show advanced options.”
11) Click on the hyperlink edit com config.
12) A very large table with all of the eWON’s parameters are shown. They should be listed in alphabetical
order.
13) Scroll down to Find the parameter WifiPSK. This is the passphrase. It is shown encrypted. Double click
on this parameter and write the new passphrase into the window that pops up. The new passphrase will automatically be encrypted. Note: the passphrase cannot contain any special characters. Press OK when complete.
14) Find the parameter WifiSSID. This is the SSID value. Double click on this parameter and enter the new
SSID in the window that pops up. Note: The SSID cannot contain any special characters. Press OK when complete.
15) Find the parameter WifiSec. This is the security type. Double click and enter a number that represents the
security type. 0 = no security, 1 = WEP, 2 = WPA. Press OK when complete.
16) Press SAVE and then REBOOT.
5
III. FREQUENTLY ASKED QUESTIONS ABOUT THE EWON
What is the EWON and what can it be used for?
EWON is a very high security router that can be connected into a network that controls Elkhart Brass monitors. Once connected, Elkhart Brass can log on to all the PLCs or HMIs on that network remotely through a secure internet connection. Tasks that it can be performed through it are:
Remote commissioning of new systems. Remote commissioning of additions to systems. Remote troubleshooting. Remote software upgrades.
Why should I buy an EWON from Elkhart Brass?
You will save money and time. Engineering fees for travel time are eliminated.
Costs for airfare, hotel, car rental or mileage, tolls, parking, and meals, are all eliminated. Delays associated with travel arrangements are eliminated. Delays associated with engineering availability are nearly eliminated as it is much easier to find a few hours for an EWON service call verses a few days for an on-site call.
Is there a subscription fee?
Beyond the one-time purchase price, there are no additional fees ever.
Who can connect to it?
Even though it will be owned by you the customer, it will be registered with the EWON corporation so that only Elkhart Brass can connect to it.
Can it be used in a hazardous location?
The EWON is not rated for use in a hazardous location. It can be temporarily used in a hazardous location only if the area is known to be free of flammable gases and vapors. It is often operated under an Electrical Hot Work Permit.
Does it need to be installed permanently?
No. It only needs to be installed for the short time it takes to perform a task, usually a few hours. It can then be removed or disabled by removing power to it, and/or disconnecting it from the internet connection.
If I disconnect it and then have another need in the future, can I reconnect it?
Yes, it can be used in the future for new installations, additions, troubleshooting, etc.
6
Does the eWON need to be connected to my business network?
No. The eWON only needs access to the internet and the Elkhart Brass equipment network.
Can Elkhart Brass access my sensitive business information through the eWON?
Absolutely not.
How do I connect it to the internet?
The internet connection can be wired or wireless (WIFI). Any WIFI access point will work, such as a mobile hotspot, cell phone or dongle that can function as a mobile hotspot, or your business WIFI access.
A wired connection from any network that has internet access will also work. Wired connections will configure automatically when the unit is powered up and the Ethernet cables are plugged in. WIFI connections need to be configured, but once configured, the unit will auto connect. The WIFI is set up by default with the following:
SSID: ELKHART BRASS PASSPHRASE: ELKHART BRASS
Can the SSID and passphrase be customized?
The customer can send their desired SSID and passphrase to us and we can preconfigure their values into the unit. We will also need to know what type of encryption will be used (WEP, WPA, or none). NOTE: The SSID and passphrase cannot contain any special characters.
Alternatively, Elkhart Brass can send instructions for field configuration of the unit.
Can I use my GUEST wired or WIFI connection?
Yes. Guest connections usually offer internet access only while blocking access to sensitive data that Elkhart Brass doesn’t need to see anyway.
What makes the EWON connection secure?
Encryption, and multiple technologies and procedures ensure a secure connection.
CONNECTIONS: The EWON uses outbound connections over ports that are commonly left open by IT professionals because they are not considered a threat. Ports used are (TCP:443 and UDP:1194) and the EWON is compatible to most proxy servers and works within most existing firewall rules.
PASSWORDS: Unique user logins, connection audit trail, double factor authentication.
NETWORK INFRASTRUCTURE: Globally redundant Tier 1 hosting partners, 24/7 monitoring, SOC 1/SSAE 16/ISAE 3402 Data Centers, ISO270001, CSA
ENCRYPTION: Sessions are via a virtual private network, and are end-to-end encrypted using SSL/TLS for session authentication and IP SEC ESP protocol for tunnel transport over UDP and TCP/IP. The connection is encrypted using a 2084-bit key exchange.
7
OTHER: IP, port, and protocol filtering/firewalling available. Restricted access granularity based on user, group, site for all or single devices or specific port.
DEVICE LEVEL: Network segregation, local device authentication (MAC address).
Is this established technology?
EWON has hosted millions of VPN sessions for numerous customers since this product was launched in 2006. They are an Allen Bradley encompass partner. Allen Bradley is a dominant world leader in PLCs and automation equipment. You can’t ask for a better reference than that.
8
IV. Network Security Synopsis
Everybody is concerned these days about the security of their internet connections. This is exactly why Elkhart Brass is using eWON and their services; because they have unparalleled security. A document that touts all the security measures in detail is attached, but it is hard to read unless you are a network expert. Here is a less technical synopsis:
Outbound connections are made through ports that are typically left open by IT professionals because
your sensitive data can’t be accessed through these ports (port 443 (HTTPS) or UDP 1194). Therefore, changes to your firewall settings are usually not required.
The connection will be through a VPN tunnel, which is invisible on the internet to hackers. There will
be no IP address facing the internet. This is the most secure way to communicate on the internet.
The connection is encrypted using a 2084-bit key exchange.
Password authentication and MAC address authentication are used.
eWON is an encompass partner with Rockwell Automation, the leaders in the PLC world. There is no
better reference than that.
9
eWON Security Paper
Secure Industrial Automation Remote Access Connectivity
Using eWON and Talk2M Pro solutions
Last Modified: January 13, 2015
www.ewon.us
eWON Layered Security Approach | © 2015 eWON Inc. This document is property of eWON Inc.
2
Overview
eWON is a global provider of secure industrial remote access connectivity. By leveraging a combination of its cloud based, redundant infrastructure called Talk2M and its industrial eWON hardware devices, eWON created a first-to-market integrated approach to secure remote access to industrial control systems. Since its
launch in 2006, eWON’s Talk2M has successfully hosted millions of encrypted VPN
sessions allowing engineers to easily and securely remotely monitor and troubleshoot their machines.
Challenges
Remote access has posed numerous challenges for decades. Various solutions including modems, traditional VPNs, IT client software and IP Sec routers have failed to offer a repeatable and secure, reliable solution that is simple to configure, manage, deploy and use.
Customers have different network topologies, requirements and technical competencies. The biggest challenge remains being compatible with existing customer networks and industrial automation and control system (IACS) architecture.
Approach
Understanding the challenges associated with securely deploying and managing remote access within an IACS, eWON developed a solution compatible with industry accepted open standards that addresses the following key areas related to secure remote access in a defense-in-depth layered approach;
Policies & procedures Network Infrastructure Management & Accountability Encryption Application eWON Hardware Devices
Benefits
The benefits of leveraging the eWON Solution include;
Mitigating risks by improving uptime and equipment availability and efficiency
with managed secure remote access, users and devices.
Reduce onsite travel. Reducing mean-time-to-repair (MTTR). Lowering the total cost of ownership (TCO) of the IACS remote access
approach.
Professionally managed globally redundant cloud infrastructure. Compatible with industry standards (SSL and VPN).
eWON Layered Security Approach | © 2014 eWON Inc. This document is property of eWON Inc.
3
The eWON Security Approach
Using a defense-in-depth approach based on guidelines set forth by ISO27002, IEC 62443-2-4 and NIST Cyber security Framework 1.0 in addition to numerous other publications, guidelines and industry best practices, eWON developed a managed, hybrid, layered cyber security approach to protect its devices, network and most importantly, its customers’ industrial control systems.
Talk2M Network Infrastructure:
Globally redundant Tier 1 hosting
partners, 24/7 monitoring, SOC
1/SSAE 16/ISAE 3402 Data
Centers, ISO270001, CSA
Management & Accountability:
Unique user logins, configurable
user rights to different devices. Connection audit trail. Double
factor authentication.
Encryption: VPN sessions are end-
to-end encrypted using SSL/TLS for
session authentication and IP SEC
ESP protocol for tunnel transport
over UDP and TCP/IP
Application: IP, port, and protocol
filtering/firewalling available. Restricted access granularity
based on user, group, site for all or
single devices or specific port.
eWON Device: Network
segregation, local device
authentication, physical switch for
enabling/disabling access.
Policies & Procedures:
eWON/Talk2M solution enhances
and is compatible with existing
corporate security policies,
firewall rules, and proxy servers.
Policies &
Procedures
Talk2M Network
Infrastructure
User Management
& Accountability
Encryption
Application
eWON
Device
eWON, the global leader in secure
industrial automation remote access, considers device and network security to be a core competency fully integrated at every level within the framework of our solution.
eWON Layered Security Approach | © 2015 eWON Inc. This document is property of eWON Inc.
4
Security Vs Convenience and Acceptance
One of the key challenges with remote connections to industrial control systems is balancing the needs of an engineer or PLC technician with the mandate by the IT department to ensure network security, integrity and reliability. Finding a solution that is readily accepted by both business groups has been a challenge for many years and a source of frustration and inefficiency for all stakeholders. eWON understood that maintaining network security was essential for IT acceptance. At the same time, eWON realized users will never use solutions that are complex, difficult or interrupt productivity. By balancing both the security and ease of use, eWON has created a best-in-class Remote Access solution that works for both end users and IT managers.
The eWON Layered Security Approach
The integrated Talk2M and eWON remote access solution was designed with simplicity and security in mind. To make the eWON and the devices behind it remotely accessible, eWON routers make an outbound connection via UDP or HTTPS to the Talk2M infrastructure. Using our VPN Client software, eCatcher, authorized users are able to log into their Talk2M account and connect to their eWON devices anywhere in the world.
While ease of use is important, the security, integrity, and reliability of eWON’s Talk2M cloud infrastructure and its customers’ networks is eWON’s first priority. Using a
defense-in-depth approach based on guidelines set forth by ISO27002, IEC 62443-2-4 and NIST Cyber security Framework 1.0 and other publications, guidelines and industry best practices, eWON developed a managed, hybrid, layered cyber security approach to protect its devices, network and most importantly, its customers’ industrial control systems.
eWON Hardware Devices
Network segregation, local device authentication, physical switch for enabling/disabling access.
eWON industrial routers are the physical hardware component of eWON’s remote access solution. The eWON units are typically installed in the machine control panel with the machine connected on one side(LAN) and the factory network on the other (WAN). When a connection needs to be established the eWON acts as the gateway through which all traffic passes. When the eWON is first configured for VPN access,
eWON Layered Security Approach | © 2014 eWON Inc. This document is property of eWON Inc.
5
security settings on the device restrict traffic between its two network interfaces. This network segregation limits remote access to only those devices connected to the LAN of the eWON. Access to the rest of the network is prevented.
The eWONs themselves have user-level access rights separate from the Talk2M login. Only users with appropriate credentials and access rights can change the security settings on the eWON. Similarly, for the devices with data services, only authorized users can view or modify the data.
All of our hardware devices feature a digital input. A switch can be connected to this input and the state of the switch can enable or disable the WAN port. This allows the end user to keep full local control of whether or not the device is remotely accessible.
The eWON needs the same type of settings as a PC connected to the same network (IP address, subnet mask and gateway, plus any optional proxy settings). Since the eWON can act as a DHCP client, it can be configured to receive those settings automatically. However, the eWON also can be set up to use a static IP address that is assigned and controlled by the IT department if preferred.
Application
IP, port, and protocol filtering/firewalling available. Restricted access based on user, group, site for all or single devices or specific port.
Within the eCatcher application, Talk2M account administrators can set filtering and firewalling rules about which devices behind the eWON are remotely accessible and even over which ports and with which protocols they are accessible. When combined with Talk2M’s user rights management discussed below, Talk2M administrators have the ability to tailor the remote access rights to fit their organizational structure.
Encryption
VPN sessions are end-to-end encrypted using SSL/TLS for session authentication and IP SEC ESP protocol for tunnel transport over UDP and TCP/IP.
Communications between the remote user and the eWON are fully encrypted. All users and eWON units are authenticated using SSL/TLS for HTTPS session authentication and the IPSec ESP protocol for secure transport over UDP. Talk2M supports the X509 PKI for session authentication, TLS for key exchange, the cipher­independent EVP interface for encrypting tunnel data, and the HMAC-SHA1 algorithm for authenticating tunnel data.
Management & Accountability
Unique user logins, configurable user rights to different devices, connection traceability.
A Talk2M account may have an unlimited number of users. Administrators can create unique logins for every user who needs to access equipment remotely. These unique logins makes it easy to grant and revoke access privileges as needed. In addition, Talk2M account administrators can restrict which remote eWONs particular users can access, which devices behind those eWON are accessible and even the ports on those devices and the communication protocols used. For instance, an administrator might permit remote users to reach the web services in a particular
eWON Layered Security Approach | © 2015 eWON Inc. This document is property of eWON Inc.
6
device for monitoring purposes but limit the ports used for making programing changes to only specific engineers.
Every remote connection is documented on the Talk2M Connection report. The Talk2M Connection report is a powerful IT auditing tool which allows account administrators to monitor which users are connected to which eWON and when and for how long they were connected.
Network Infrastructure
Globally redundant Tier 1 hosting partners, 24/7 monitoring, SOC 1/SSAE 16/ISAE 3402 Data Centers, ISO270001, CSA, SOC2.
The Talk2M infrastructure is a critical integrated element in our remote access solution. It is a fully redundant network of distributed access servers, VPN servers, and other services that act as the secure meeting place for eWONs and users. To increase reliability, redundancy and reduce latency, eWON works with multiple industry leading Tier 1, 2 and 3 hosting partners throughout the world to ensure best in class service. Talk2M is hosted in SOC 1/SSAE 16/ISAE 3402 and ISO 27001 certified data centers. The network of servers is monitored 24/7 to ensure maximum availability and security using intrusion detection systems (IDS), host intrusion prevention systems (HIPS) in addition to an array of alerting mechanisms.
Policies & Procedures
The eWON/Talk2M solution enhances and is compatible with existing corporate security policies, firewall rules, and proxy servers.
eWON understands that its customer designed their corporate security policies carefully. The Talk2M remote access solution is designed to be compatible with customers’ existing security policies. By using outbound connections over commonly open ports (TCP:443 and UDP:1194) and by being compatible to most proxy servers, the eWON is designed to be minimally intrusive on the network and work within the existing firewall rules. Within eCatcher, Talk2M account administrators can customize the password policies to force compliance to corporate password policies and can restrict which users can access which devices remotely. Talk2M account administrators can also view the Talk2M Connection report to see which users are connecting to which eWON devices and when. This report can be a valuable tool to ensure that your corporate remote access policies are being followed.
eWON Layered Security Approach | © 2014 eWON Inc. This document is property of eWON Inc.
7
Summary
A combination of unique hardware and globally redundant cloud infrastructure creates a robust, secure and convenient method to enable encrypted remote access to machines, panels and other industrial automation devices.
The key added-value of Talk2M is the full integration of IT security standards by allowing an Internet communication tunnel between the user and the remote machine while still following the existing firewall rules and security policies of each network. This means little or no IT changes required and gives organizations the ultimate solution to manage their Remote Access needs with maximum control, visibility and security.
Technical Contact Information
In the U.S. contact;
eWON Inc. Tel: (412) 586-5901 Fax: (412) 586-5920 Web: www.ewon.us Email: info@ewon.us 2345 Murray Ave, Suite 305, Pittsburgh, PA 15217
More information is available on our website at www.ewon.us or visit our support site at: http://support.ewon.biz
Worldwide Offices:
United States Belgium Japan
support.ewon.biz
eWON COSY 131
This installation guide describes the hardware of the eWON COSY 131 and explains how to get started with the embedded web site.
Installation Guide
IG 022 / Rev. 1.7
Table of Contents
1. Product Summary ............................................................................................................. 4
1.1. Introduction ...................................................................................................................................... 4
1.2. Concept of the eWON COSY 131 Family ................................................................................... 4
1.3. General specification of the hardware platform ..................................................................... 4
1.4. Typical applications ........................................................................................................................ 5
1.5. Type and Part Numbers ................................................................................................................. 5
2. Safety, Environmental & Regulatory Information ........................................................... 6
2.1. Scope ................................................................................................................................................ 6
2.2. Power supply .................................................................................................................................... 6
2.3. Applicable Directives, Standards and Compliance ................................................................ 6
2.3.1. Applicable European Directives ........................................................................................ 6
2.3.2. Applicable Safety Standards ............................................................................................. 7
2.3.3. FCC Compliance .................................................................................................................. 7
2.3.4. Certifications .......................................................................................................................... 7
2.4. Field implementation & environmental conditions .................................................................. 7
2.4.1. Ingress Protection .................................................................................................................. 7
2.4.2. Mounting Recommendations ............................................................................................ 8
2.4.3. Cabling rules ........................................................................................................................ 10
2.4.4. Environmental conditions .................................................................................................. 10
2.4.5. Earthing ................................................................................................................................. 10
2.5. Battery ............................................................................................................................................. 10
3. Hardware description .................................................................................................... 11
3.1. Label ................................................................................................................................................ 11
3.2. Mechanical dimensions ............................................................................................................... 13
3.3. Overall description ........................................................................................................................ 13
3.3.1. Front ....................................................................................................................................... 13
3.3.2. Upper side ............................................................................................................................ 14
3.3.3. Status LED (COSY 131 – All version) ................................................................................. 14
3.3.3.1. WiFi Status LED (EC6133C) ........................................................................................... 15
3.3.3.2. Cellular Modem Status LED (EC6133D - EC6133E) .................................................. 15
3.4. Radio communication models ................................................................................................... 16
3.4.1. COSY 131 with internal WiFi modem ............................................................................... 16
3.4.2. COSY 131 with internal 3G+ Penta-band modem ....................................................... 17
3.4.3. COSY 131 with internal 4G JP Quad-band modem .................................................... 18
3.5. LAN Switch Specifications ........................................................................................................... 19
3.5.1. Boot process ........................................................................................................................ 19
3.5.2. LAN Switch configuration .................................................................................................. 19
4. COSY IP Address & Access to the Web Configuration ................................................ 20
4.1. Factory Default IP settings ........................................................................................................... 20
4.2. Powering ON .................................................................................................................................. 20
4.3. Connecting to the eWON COSY LAN IP Address .................................................................. 20
4.4. eWON COSY's Web Interface .................................................................................................... 21
5. Troubleshooting .............................................................................................................. 22
5.1. Normal Boot Process ..................................................................................................................... 22
Page 2 / 32 eWON COSY 131 | IG 022
Table of Contents
5.2. Resetting the eWON COSY 131 .................................................................................................. 22
5.2.1. First Level Reset (user reset) .............................................................................................. 22
5.2.2. Second Level Reset (factory reset) ................................................................................. 22
5.3. Reset Impact Matrix ...................................................................................................................... 23
Appendix A - Connector Pinout & Related Specifications ............................................. 24
A.1 - Main Connector ......................................................................................................................... 24
A.2 - Specification of the External Power Supply ........................................................................... 25
A.3 - Digital Output & Digital Inputs .................................................................................................. 25
A.4 - Supported Wireless WiFi Frequencies ...................................................................................... 28
Revision .............................................................................................................................. 30
Revision History ..................................................................................................................................... 30
Page 3 / 32 eWON COSY 131 | IG 022
Chapter 1
Product Summary
1. Product Summary
1.1. Introduction
The present Installation Guide describes the hardware of the eWON COSY 131 family.
The eWON Cosy 131 family is a set of industrial gateways/routers fully compatible with the Talk2M cloud connectivity services (www.talk2M.com).
1.2. Concept of the eWON COSY 131 Family
The Cosy 131 is available in different versions depending on their communication media:
Ethernet Switch Cosy 131 Ethernet
WiFi & Ethernet Switch Cosy 131 WiFi
3G+ & Ethernet Switch Cosy 131 Cellular 3G+
4G & Ethernet Switch Cosy 131 4G JP
1.3. General specification of the hardware platform
Characteristic Value
Design
Industrial design (24 VDC power supply, DIN Rail mounting, extended temperature)
Processor ARM9
Clock
Backed up real time clock (RTC) Backup battery lifetime has 10 years expectancy
Ethernet Interface LAN Ethernet port 10/100 Mbps
Digital Input 2
Digital Output 1
Mounting Latch for DIN rail EN50022-compliant
1.4. Typical applications
Remote Access of Ethernet & USB devices using Talk2M connection
Industrial VPN router
Page 4 / 32 eWON COSY 131 | IG 022
Chapter 1
Product Summary
1.5. Type and Part Numbers
The available part numbers are:
Part Number Type Description
EC61330_00MA COSY 131 LAN/WAN – Ethernet Only 4-Port Switch
EC6133C_00MA COSY 131 LAN/WAN, WIFI – Ethernet Switch
EC6133D_01MA COSY 131 LAN/WAN, 3G+ Penta-band - Ethernet Switch
EC6133E_00MA COSY 131 LAN/WAN, 4G Quad-band (Japan) - Ethernet Switch
Table: List of the available part numbers
- Note -
The MA suffix means Multiple languages A (UK, FR, DE, ES, IT)
The part number syntax is explained in 3.1. Label
Page 5 / 32 eWON COSY 131 | IG 022
Chapter 2
Safety, Environmental & Regulatory Information
2. Safety, Environmental & Regulatory Information
2.1. Scope
The present chapter addresses Safety, Environmental & Regulatory Information for the eWON Cosy 131 family.
2.2. Power supply
The external power supply is a third party device that is not part of this certification.
The device shall be powered by a LPS power supply certified according to IEC/UL60950-1 or Class 2 per NEC (See annex A.2. Specification of the External Power Supply for detailed information).
2.3. Applicable Directives, Standards and Compliance
The product described in the present Installation Guide complies with the CE, RE directives and the FCC regulations related to the wireless modems.
The product described in the present Installation Guide belongs to class A Information Technology Equipment (ITE). In a domestic environment this product may cause radio interference in which case the user may be required to take appropriate measures.
2.3.1. Applicable European Directives
The product described in the present Installation Guide is in conformity with the following EC directives:
RoHS Directive 2011/65/EU
EMC Directive 2014/30/EU
RE directive 2014/53/EU (for versions including RF modems)
The product conforms to the corresponding R&TTE articles: RF Spectrum efficiency, Art. 3(2); EMC, Art. 3(1)(b); Safety, Art. 3(1)(a);
REACH Directive 2006/121/EC
For COSY 131, Cellular 3G+ only: to comply with RE directive
Antenna must be mounted on a grounded plate
2.3.2. Applicable Safety Standards
The product described in the present Installation Guide is in conformity with the following safety standards:
IEC/EN 60950-1
UL 60950-1
Page 6 / 32 eWON COSY 131 | IG 022
Loading...
+ 50 hidden pages