T-1 Circuit connecting to Netopia 4622 xl, RJ48 to RJ48?

Posted on 2011-10-27
Last Modified: 2012-05-12
I have search all over this website and am needing to understand.  with T-1 circuit (RJ48c) to Netopia router (RJ48C), do I need a crossover or straight through?  Also, does anyone have a diagram for dummies on terminating the ends?  Color per pin?

Thank so much
Question by:pscanevit
    LVL 1

    Accepted Solution

    This helped me a lot when i did something like that mate...

    RJ48 Wiring Schematic Pinout Diagram and Color Code. The RJ48 is a registered jack. It is used for T1 and ISDN termination and local area data channels/subrate digital services. The RJ48 use the 8P8C modular plug and 2 pairs of the wires, one pair for transmitting and one pair for receiving data. It uses the 8 position modular connector. RJ-48X is a variation of RJ-48C that contains shorting blocks in the jack so that a loopback is created for troubleshooting when unplugged.

    RJ48 Wiring Schematic Pinout Diagram and Color Code

    LVL 17

    Assisted Solution


    From the above link:

    Make sure you are using a fully populated straight-through CAT-5, RJ-45 or RJ-48 cable. T-1 requires pins 1 rx,2 rx, 4 tx,5 tx and most CAT-3 cables will not work properly. By using the fully populated CAT-5 you are removing any guesswork on whether pins 1,2,4,5 are pinned out properly.

    Author Comment

    Thank you both.  One last question if you don't mind.  If I only have distance of 5 ft from circiut to router, is it necessary to use the STP?
    LVL 17

    Expert Comment


    Author Closing Comment

    I have split the were both wonderful.  I'll now look for steps for bridge configuration steps pertaining to my infrastructure.

    Thank you!

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    How to run any project with ease

    Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
    - Combine task lists, docs, spreadsheets, and chat in one
    - View and edit from mobile/offline
    - Cut down on emails

    Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
    Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
    Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
    This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor ( If you're looking for how to monitor bandwidth using netflow or packet s…

    760 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    8 Experts available now in Live!

    Get 1:1 Help Now