Solved

In / Out on Ethernet Surge Protector

Posted on 2013-05-15
2
769 Views
Last Modified: 2013-05-15
I have a Ethernet Surge Protector PoE Gigabit LAN Thunder RJ45 CAT5 CAT5E CAT6 1000mbs
by Everstar P/N ESWA-3310C6. It has "In" and "Out" posted on the two ends. See the attached picture.

Is "In" for the POE in and "Out" for the POE out?
Or
Is the "In" for the source of the potential shock?

In my case, I am trying to prevent a shock from an outdoor access point getting to my indoor router.
Thanks, Mike
SurgeProtector.png
0
Comment
Question by:drippin
2 Comments
 
LVL 19

Accepted Solution

by:
Ken Butters earned 300 total points
ID: 39168454
Yes you are correct... the OUT should go to your device to be protected.

The IN should be used for the source of the signal.
0
 
LVL 1

Assisted Solution

by:ldellinger
ldellinger earned 200 total points
ID: 39168458
Hello,
Whatever device you want protected needs to be connected to the out port.

If a surge were to occur, it would travel from the source, through the in port, and then be stopped at that point by the surge protector.

I hope this helps!

Larry
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

Multi-source agreements are important because they set standards that all manufacturers should follow to ensure that devices are compatible with multiple vendors. The multi-source agreement (MSA) is an agreement that establishes how multiple vendors…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now