Solved

How to stop recurring network lightning damage.

Posted on 2012-04-07
5
655 Views
Last Modified: 2012-04-07
Every year, lightning hits our network and destroys hundreds of dollars of equipment. This is a church and we have three buildings with cat5 cable running between them. I guess that's what the lightning strikes and it sometimes cascades through switches and routers to destroy actual PC's or sometimes  knock out the network cards.

What is the solution to this? The buildings are close enough for wireless but how would I get the bandwidth we need?
0
Comment
Question by:Jeff swicegood
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
5 Comments
 
LVL 7

Assisted Solution

by:micropc1
micropc1 earned 150 total points
ID: 37819478
For your PCs, invest in some good surge protectors with network protection...

http://www.apc.com/products/resource/include/techspec_index.cfm?base_sku=P8VNTG

For your switches get you can try some UPSs with power conditioning...

http://www.apc.com/products/family/index.cfm?id=310
0
 
LVL 15

Accepted Solution

by:
Perarduaadastra earned 350 total points
ID: 37819517
I agree with micropc1 that surge protection is the way forward for the computers, but UPS's for the switches may be more money than you want to spend. APC do a range of ProtectNet products here:

http://www.apc.com/products/family/index.cfm?id=145

that seem to address the exact issue that you're having.

It would also be helpful to get those ethernet cables underground if possible, even if it doesn't look very tidy; hanging them out in the breeze when electrical storms are common is asking for trouble...
0
 
LVL 1

Author Comment

by:Jeff swicegood
ID: 37819518
Ok the suggestion of surge protectors with network protection is helpful.

But the switches were ON a ups when they got hit last time. It came in through the ethernet.
0
 
LVL 1

Author Comment

by:Jeff swicegood
ID: 37819549
Ok Perarduaadastra, I guess I'm on the right track because I actually did install some of those apc  small in-line protectors. I forgot to mention that. Please answer one question about those: Do they get destroyed at the first hit? How to tell if they are still protecting after a suspected hit?

You are right about burying. One of my three cables is just lying on the ground.
0
 
LVL 15

Expert Comment

by:Perarduaadastra
ID: 37819597
Unfortunately I can't answer your questions about the ProtectNet units, as I've never neede to use them, but APC can - I have used their chat service before for other issues, and it shouldn't be difficult to get the answers you need from the agent.

However, skimming the bumph on these products seems to suggest that they are sacrificial in their operation - once they've been zapped, they don't let anything through, including data!
0

Featured Post

Enroll in May's Course of the Month

May’s Course of the Month is now available! Experts Exchange’s Premium Members and Team Accounts have access to a complimentary course each month as part of their membership—an extra way to increase training and boost professional development.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Configuring NAT in ASA ver. 9.1 4 45
Migrating to Exchange 2016 - AD/DNS question 8 67
Dell SonicWall Connection 18 49
external website is 16 31
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
When speed and performance are vital to revenue, companies must have complete confidence in their cloud environment.
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

738 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question