Important Information
Prevent unauthorised access to the PBX and its programming. This installation is not
intended for use in areas children could possibly be near.
Limitations on Use
Do not put a damaged PBX into operation.
Do not touch the PBX or any devices connected to it during an electrical storm.
The device is not designed, manufactured, or intended for use or resale, in environments that
require fail-safe performance, such as in the operation of life-support systems and/or nuclear
facilities. The device may only be used for these purposes with prior written permission from
the manufacturer in each individual case.
Do not make any structural changes to the device.
Necessary Knowledge for Configuration
Only a qualified electrician may open the casing, perform installation work within an open
casing or service work using the buttons inside the casing. If necessary, commission a
specialist to perform this work.
Incomplete or incorrect configuration can be hazardous to people, if for example emergency
calls cannot be performed.
The configuration of the product is made via an integrated web server whose pages are
called via web browser. The user interface of the web server (web interface) is available in
English, French and German.
Repair
Caution: Unauthorised changes to the device can damage the PBX or breach security
and EMC regulations.
• Always have a professional carry out repairs. Please contact your qualified
electrician or the manufacturer directly.
Cleaning
Warning: Liquid that penetrates the casing can cause life-threatening electric shocks
and can damage or destroy the PBX.
• Only clean the device with a slightly damp cloth or an anti-static cloth.
• When cleaning the casing, make sure that no liquid enters the casing.
Data Protection
Take suitable measures for protecting your data and the PBX against misuse.
Never tell anyone the user names, passwords, PINs, or the public IP address of the PBX.
This applies to postings in forums and communities, router service logs and Wireshark
traces.
Consistently use all available options for assigning passwords and PINs. Do not use
passwords and PINs that are easy to guess, such as birthdays or anniversaries.
Use the available permissions (programming authorisation, exchange line authorisations,
restricted numbers, etc.).
22
COMtrexx Business - Instructions V01 01/2021