1540 Series PoE Ethernet Surge Protector INSTALLATION INSTRUCTIONS WARNING: Failure to connect the protector to a proper ground connection can result in improper operation of the protector during a surge event. To Install Ethernet Cable into the Model 1540 Module: 1. Turn the cable grip counter-clockwise to loosen the rubber grommet on the LINE side. 2. Insert the RJ45 jack through the cable grip. Pressure and twisting through the rubber may be required. 3. Pull the cable and insert the RJ45 plug into the RJ45 jack. 4. For Model 1540-2, remove about 4.5 inches of the cable sleeve and follow the color coding on the PCB silkscreen. To maintain high speed, do not untwist more than 0.5 inch. Trim excess as necessary. 5. Turn the cable grip clockwise to tighten the rubber grommet. 6. To ensure that the cable is sealed, verify that the cable cannot be pushed in or pulled out. No movement should be noticeable. Due to the various diameters of Ethernet cables, wrapping six layers of electrical tape around the area of the cable grip is recommended. 7. Follow steps #1, 2, 3, 5, and 6 for PROTECTED Side. 8. Connect a ground cable to the brass stud. The ground must be installed in accordance with Article 800 of the National Electrical Code, NFPA 70. CABLE RJ45 JACK CABLE GRIP CABLE (PROTECTED) GROUND STUD ETHERNET CABLE RECOMMENDED ELECTRICAL TAPE WRAPPING AREA To Wall-Mount the Model 1540 Module: 1. Unscrew and remove the lid of the protector. 2. Insert wall screws (not provided) into the four mounting holes near the edges (see arrows in illustration) and secure the module to the wall. 3. Replace and secure the lid of the protector. Asia-Pacific: Tel: +886-2 2562-4117 • Fax: +886-2 2562-4116 EMEA: Tel: +36 88 520 390 • Fax: +36 88 520 211 The Americas: Tel: +1-951 781-5500 • Fax: +1-951 781-5700 www.bourns.com 07/15 Specifications are subject to change without notice. The device characteristics and parameters in this data sheet can and do vary in different applications and actual device performance may vary over time. Users should verify actual device performance in their specific applications.