Skip to main content

IP Ratings

An IP rating must begin with 5 for partial dust protection or 6 for complete dust protection. The IP rating is two digits, with the first and second digit defined as follows: 
First Digit (intrusion protection)

0. (or X - see section below): No special protection. Not rated (or no rating supplied) for protection against ingress of this type. 
1. Protection from a large part of the body such as a hand (but no protection from deliberate access); from solid objects greater than 50mm in diameter. 
2. Protection against fingers or other object not greater than 80mm in length and 12mm in diameter (accidental finger contact). 
3. Protection from entry by tools, wires etc, with a diameter of 2.5 mm or more. 
4. Protection against solid objects larger than 1mm (wires, nails, screws, larger insects and other potentially invasive small objects such as tools/small etc). 
5. Partial protection against dust that may harm equipment. 
6. Totally dust tight. Full protection against dust and other particulates, including a vacuum seal, tested against continuous airflow. 

Second Digit (moisture protection)

0. (or X - see section below): No protection. 
1. Protection against vertically falling droplets, such as condensation. ensuring that no damage or interrupted functioning of components will be incurred when an item is upright. 
2. Protection against water droplets deflected up to 15° from vertical 
3. Protected against spray up to 60° from vertical. 
4. Protected against water splashes from all directions. Tested for a minimum of 10 minutes with an oscillating spray (limited ingress permitted with no harmful effects). 
5. Protection against low-pressure jets (6.3 mm) of directed water from any angle (limited ingress permitted with no harmful effects). 
6. Protection against direct high pressure jets. 
7. Protection against full immersion for up to 30 minutes at depths between 15 cm and 1 metre (limited ingress permitted with no harmful effects). 
8. Protection against extended immersion under higher pressure (i.e. greater depths). Precise parameters of this test will be set and advertised by the manufacturer and may include additional factors such as temperature fluctuations and flow rates, depending on equipment type. 
9. (K): Protection against high-pressure, high-temperature jet sprays, wash-downs or steam-cleaning procedures - this rating is most often seen in specific road vehicle applications (standard ISO 20653:2013 Road Vehicles - Degrees of protection). 



Source - CWNP (www.cwnp.com)

Popular posts from this blog

Flaw in ServerKeyExchange messages of TLS Protocol

Here we will discuss the flaw in the ServerKeyExchange messages of the TLS protocol which caused the Logjam attack over TLS while using Diffie-Hellman Key Exchange. Before SSLv3, we don't use to authenticate the ServerKeyExchange messages where server negotiates with client regarding usage of cipersuite and parameters. From onwards SSLv3, TLS send the signed message where it mention about parameters it will use but remain silent over ciphersuite. Or in other words, signed portion contains parameters but not contain information about ciphersuite the server will going to use. Now just to remind you, the difference between DH and DH-EXPORT is the size of parameters only. So how to use this flaw - If the server supports DH-EXPORT, an attacker (Men-in-the-Middle) can edit the negotiation sent by the client (even if client doesn't support DH-EXPORT), and replace the list of client supported ciphersuite with DH-EXPORT only. The server will in turn send back a

Identity PSK ( iPSK)

With the evolution of IoT (Internet of Things), devices that connect wirelessly have increased many folds. From webcams, Smartwatches, fitness bands, firestick, Alexa, Google Home, and many more.., everything is going wireless for connectivity and so does the security threat. The main concern with IoT devices is the unavailability of the full wireless protocol stack (and in the majority of devices, support of 802.1x is not available). So, previously we only have the WPA-PSK option for connecting the IoT devices.  In WPA*-PSK (WPA or WPA2) WLAN, a Pre-Shared Key (PSK) is configured and distributed to all the clients that connect to the WLAN. This leads to PSK leakage, and it can be accessible to unauthorized users (due to the nature of common PSK across all the devices).  Therefore, there was a need to provision unique PSK or Multiple PSK per SSID. Identity-PSKs are unique pre-shared keys created for clients/groups on the same WLAN. Features of iPSK:-   1.Unique PSK for individual Cli