Skip to content

Safety Instructions#

Intended Use#

The radar sensor BRS 30 is a sensor for object detection and distance measurement. It is intended to be installed in a machine or system and is designed for industrial use.

Important Notes:

  • The BRS 30 may only be operated in approved countries (see information sheet on conformity and approval) and in accordance with national laws.
  • Proper function is only guaranteed if the device is used in accordance with the manual, all relevant documents, and the technical specifications. Use only original Balluff accessories.

Cybersecurity:

  • The sensor must be used in a secure environment. The operator or manufacturer of the machine is responsible for ensuring the machine is cybersecure. This also includes a cybersecurity risk analysis.
  • It is important to plan and implement security measures based on this risk analysis.
  • The operator or manufacturer must ensure that all persons working with the device have received cybersecurity training.

Important

Only for use in the secondary of a Class 2 source of supply.


Reasonably Foreseeable Misuse#

Uses not listed in the description of intended use are prohibited. Such prohibited uses will void any warranty and liability claims against the manufacturer. Technical or electrical modifications to the product are also not permitted, except for updates.

The device must not be used:

  • in safety-critical applications where the safety of persons depends on the function of the device.
  • in potentially explosive atmospheres.
  • in outdoor use
  • in direct contact with food.
  • by private consumers.

General Safety Instructions#

Installation and commissioning

Installation and commissioning of the device must only be performed by trained specialists. Only the components and replacement parts approved by Balluff GmbH in the device data sheet and/or the device operating manual may be used. Balluff GmbH accepts no liability for damages resulting from improper use or unauthorized manipulation.

Planning the system

Before you commission the device, please carefully read the device data sheet, the device operating manual and the technical documentation for the device (hereafter referred to as "documentation"), where it exists.
The respective, current documentation associated with the device is available from www.balluff.com.
During installation and operation of the device, please observe all safety aspects provided in the documentation.

Failure to comply in part or in whole may result in harm to life, the body or health and in property damage.
Adhere to the specifications for the operating voltage according to the documentation and observe the details provided in the documentation for the intended use of the device. The device may only be used with an approved power supply.

Using the system

Observe the voltages specified in the documentation. Incorrect voltages may lead to excessive heat and cause a fire. Incorrect connection of the device may cause machine malfunctions! Make certain that power is switched off and that the device is grounded during installation and maintenance work.

Operation and testing

The system owner and user are responsible for adhering to locally applicable safety regulations. In the event of device defects and malfunctions, it is to be taken out of operation and safeguarded against unauthorized use

Electromagnetic Radiation
When handled properly, this device poses no hazard at a distance of 20 cm or more. At a distance of less than 20 cm, heating of exposed body parts in the field (e.g., fingers) is possible.
Nevertheless, Balluff recommends that people with pacemakers and pregnant women do not stay in the immediate vicinity of the device.
Do not operate the device near medical equipment or, without prior approval, near military installations, airports, or radio astronomy facilities.



Cybersecure Environment#

To ensure cybersecurity, you must protect components, networks, and systems from unauthorized access and ensure data integrity.

Recommended Measures:

  • Take organizational and technical measures for network-capable devices and software.
  • Implement an information security management system (ISMS) to manage all information security measures.

Cybersecurity Resources:

We recommend using a network secured according to the state of the art.
The sensors are intended for use at Purdue Level 0 "Field Level / Sensors".

Note on Purdue Level 0: Purdue Level 0 refers to the lowest level of the Purdue reference architecture for industrial automation systems. This level includes the physical sensors and actuators directly connected to the production environment. Devices at this level are responsible for real-time data acquisition and processing.
Access to the devices from outside should only be possible for known and trusted devices and authorized users.

According to IO-Link Standard V 1.1.4, the sensor does not have authentication mechanisms.
Changing the settings/parameters of the sensor is possible for all actors who have access to the IO-Link interface.
Use the device only on an IO-Link network module that is sufficiently protected against access and operated in a secure network.
Ensure that only authorized users have access to the IO-Link network module and the secure network.

According to IO-Link Standard V 1.1.4, the sensor does not have mechanisms to protect against physical manipulation or reading of memory contents in the event of physical access.
The sensor and its interfaces must be protected against physical access by appropriate measures, such as access monitoring to the machine and barriers.

According to IO-Link Standard V 1.1.4, the sensor does not have mechanisms to protect data integrity.
Data is transmitted unencrypted from the device via the IO-Link protocol to the IO-Link network module. Eavesdropping, influencing, or interfering is possible if the network is not sufficiently protected.
The sensor and its interfaces must be protected against physical access by appropriate measures, such as access monitoring to the machine and barriers.
The sensor should only be operated on an IO-Link network module that is sufficiently protected against access.

According to the IO-Link Standard, this IO-Link device does not have an independent logging mechanism.
However, the device has mechanisms for reporting events (events) that may also be suitable for analyzing cybersecurity events.
We recommend using the device on an IO-Link network module with event logging, where the event log can be read out from the IO-Link network module via a suitable protocol.