| Rated Discharge Current | 10kA (8/20μs) |
| Response Time | Less than 10ns |
| Maximum Operating Current | 300mA |
| Operating Temperature | -25℃ to +70℃ |
| Maximum Operating Voltage | 4V |
| Peak "Let-Through" Voltage: Line-to-Line / Line-to-Ground | 25V / 600V |
| Line Resistance | 1Ω per line |
| Data Rate (TIA Cat5) | 100Mbps |
1. Among similar products, it features lower insertion impedance, reducing signal attenuation.
2. Under the same test voltage and waveform, the residual voltage is at least 5-20V lower than comparable products.
3. Sturdy, fire-resistant ABS housing suitable for various hazardous environments.
4. Provides full protection mode for line-to-line and line-to-ground.
5. Fast response time, less than 10ns.
Leitong Network Surge Protector Description:
1. Protects twisted-pair Ethernet (10Base-T) or token ring networks using Category 3, 4, or 5 cables with RJ45 interfaces.
2. Suitable for signal transmission systems of 8-core twisted-pair cables. Leitong Network Surge Protector Application: Protects network cables between buildings, safeguarding computers, servers, repeaters, hubs, and other equipment from lightning interference.
Leitong Network Surge Protector Performance and Advantages:
1. Low let-through voltage between conductors (please refer to [System Technical Specifications]).
2. Provides repeated protection in lightning-prone environments.
3. ESP Net-100 offers effective protection without affecting normal system operation.
4. Low capacitance lines prevent signal attenuation during startup.
5. Low insertion impedance minimizes signal attenuation, thereby increasing signal transmission distance.
6. Sturdy ABS housing.
7. Equipped with mounting holes for easy surface installation.
8. Robust grounding bolts ensure effective grounding.
9. Includes Category 5 UTP short cables (25cm) for neat installation.
Leitong Network Surge Protector Installation:
Connect in series with the network cable,
Choose a) near the entrance/exit of the protector in and out of buildings,
or b) when the protector enters the network hub,
or c) close to the equipment that needs protection.
This ensures proximity to the system ground connection point (for effective grounding).