AXC F 3152 

 

Note: For further information about the hardware, refer to the product documentation of this controller (item no. 1069208):

There are different Ethernet and firewall configurations due to three Ethernet interfaces.

Connecting and operating elements

The controller consists of the following components: 

 

SD card

  • Only use encrypted SD cards!

Information on this can be found in the topic SD card encryption.

Security seals

In order to prevent manipulation of the device supplied and to detect unauthorized opening of the device, security seals have been applied to the controller.

From hardware revision 04, the housing of PLCnext Control AXC F 3152 is protected by security seals like shown below. 

These security seals are damaged in the event of unauthorized opening. In this case, correct operation of the PLCnext Control can no longer be ensured.

  • Check the delivery for transport damage. Damaged packaging is an indicator of potential damage to the device that may have occurred during transport. This could result in a malfunction.
  • Do not open the housing. If the housing is opened, the function of the device can no longer be ensured.
  • Check at regular intervals that none of the seals are damaged. If any of the seals are damaged or missing, it may be that the device has been tampered. In this case, contact Phoenix Contact without delay before using the device.

 

Security seals

Checking the device identity

PLCnext Control uses Trusted Platform Modules (TPM) to ensure the device identity. 

During production, a unique Device Certificate (IDevID) is installed on each device and stored in the TPM. To check the device identity, please check the device certificate and follow the certificate chain to the Phoenix Contact root certificate. Depending on the controller model or hardware revisions, PLCnext Control devices use different types of TPMs.

Latest AXC F 3152 hardware revisions are containing the Infineon Trusted Platform Module 2.0 SLB 9673 (firmware 26.13). The compliance with FIPS 140-2 physical level 3 is confirmed by NIST CMVP certificate #4467.

Activating  PROFINET

After you have performed a threat analysis and implemented appropriate protective measures from the security context, you can activate PROFINET.

 For information on how to activate PROFINET, refer to the topic Activating PROFINET in this PLCnext Technology ‑ Security Info Center.

 For further information on PROFINET in the WBM, refer to the PROFINET diagnostics topic in the main PLCnext Technology ‑ Info Center.

Using PROFINET 

Communication paths

The controller consists of these communication paths:

Ethernet interfaces

The Ethernet interfaces are assigned as follows:

Assignment of the Ethernet interfaces

The following is an overview of how the Ethernet interfaces are assigned on the various pages in the WBM

Ethernet interface hardware Ethernet interface WBM - Network page Ethernet interfaces WBM - Firewall page
X1 TCP/IP (LAN1) LAN1
X2 TCP/IP (LAN2) LAN2
X3 TCP/IP (LAN3) LAN3

Firewall configurations

You need to adjust the firewall configurations (for more information, refer to the firewall basic configurations ):  

Input rules:

Output rules:

Using the service interface (USB)

  • Perform a threat analysis before activating the service interface.

You should only use an SSH connection during commissioning, not during operation of a system.

Note: You must always explicitly deactivate the service interface. It is not deactivated by a reset 1/reset 2 or activating the Security Profile. Once activated, the service interface will otherwise always remain on.

Here is an example of the firewall settings you need to make when using the service interface (see comments in the following screenshot):

 

How to reset the controller 

Reset 1

Resetting the controller to default setting type 1 deletes all settings that you have configured. These include, for example:

  • The PLCnext Engineer project, including all applications that have been programmed in accordance with IEC 61131-3
  • All applications that were programmed using high-level languages
  • The configured bus configuration
  • The network configuration of the controller
  • Changes and extensions that you have made to the operating system or to the firmware

To reset the controller to default setting type 1, proceed as follows:

  • Switch off the supply voltage of the controller.
  • After the LEDs have gone out, press the reset button.
  • Hold the reset button down and switch the supply voltage on.
    The RUN and FAIL LEDs light up.
  • Release the reset button.

The controller is reset to default setting type 1.

Reset 2

Resetting to default setting type 2 resets the controller to the delivery state. This deletes all settings that you have configured.

To reset the controller to default setting type 2, proceed as follows:

  • Switch off the supply voltage of the controller.
  • After the LEDs have gone out, press the reset button.
  • Hold the reset button down and switch the supply voltage on.
    The RUN and FAIL LEDs light up.
  • Press and hold the Reset button down (approx. 30 s) until all LEDs (except the E and D LEDs) light up.
  • Release the reset button.

The controller is reset to default setting type 2.

Netload Limiter configuration

You configure the Netload Limiter on the Netload Limiter page in the WBM (ConfigurationNetwork, Netload Limiter tab). 

The Netload Limiter must be activated on the interface x1 (LAN 1). 

For further information, refer to the topic Configuring Netload Limiter.

Controller-specific information on the 62443-4-2 compliance list

Note: Please note the additional controller-specific information on the 62443-4-2 compliance list.

 

 


• Published/reviewed: 2024-12-16 • Revision 016 •