Bourns® SPDs

1540 Series
PoE Ethernet Surge Protector
INSTALLATION INSTRUCTIONS
WARNING:
Failure to connect the protector to a proper ground connection can result in improper operation of the protector during a surge event.
To Install Ethernet Cable into the Model 1540 Module:
1. Turn the cable grip counter-clockwise to loosen the rubber
grommet on the LINE side.
2. Insert the RJ45 jack through the cable grip. Pressure and
twisting through the rubber may be required.
3. Pull the cable and insert the RJ45 plug into the RJ45 jack.
4. For Model 1540-2, remove about 4.5 inches of the cable sleeve
and follow the color coding on the PCB silkscreen. To maintain
high speed, do not untwist more than 0.5 inch. Trim excess as
necessary.
5. Turn the cable grip clockwise to tighten the rubber grommet.
6. To ensure that the cable is sealed, verify that the cable cannot
be pushed in or pulled out. No movement should be noticeable.
Due to the various diameters of Ethernet cables, wrapping six
layers of electrical tape around the area of the cable grip is
recommended.
7. Follow steps #1, 2, 3, 5, and 6 for PROTECTED Side.
8. Connect a ground cable to the brass stud. The ground must be
installed in accordance with Article 800 of the National Electrical
Code, NFPA 70.
CABLE
RJ45 JACK
CABLE GRIP
CABLE
(PROTECTED)
GROUND STUD
ETHERNET
CABLE
RECOMMENDED
ELECTRICAL TAPE
WRAPPING AREA
To Wall-Mount the Model 1540 Module:
1. Unscrew and remove the lid of the protector.
2. Insert wall screws (not provided) into the four mounting holes
near the edges (see arrows in illustration) and secure the
module to the wall.
3. Replace and secure the lid of the protector.
Asia-Pacific: Tel: +886-2 2562-4117 • Fax: +886-2 2562-4116
EMEA: Tel: +36 88 520 390 • Fax: +36 88 520 211
The Americas: Tel: +1-951 781-5500 • Fax: +1-951 781-5700
www.bourns.com
07/15
Specifications are subject to change without notice.
The device characteristics and parameters in this data sheet can and do vary in different applications and actual device performance may vary over time.
Users should verify actual device performance in their specific applications.