Figures
Figure 1-1. ONline 10BASE-T Security Module Application . . . . . . . . . . 1-3
Figure 2-1. Sample Configuration Distance Calculation . . . . . . . . . . . . . 2-9
Figure 2-2. Unshielded Twisted Pair Network . . . . . . . . . . . . . . . . . . . 2-11
Figure 2-3. Redundant Twisted Pair Configuration . . . . . . . . . . . . . . . 2-12
Figure 3-1. Security Module Dip Switch SW1 Location . . . . . . . . . . . . . 3-5
Figure 3-2. Attaching the Tie-Wrap Bracket to the Module . . . . . . . . . . 3-9
Figure 3-3. Attaching Cables With 90° Connectors . . . . . . . . . . . . . . . 3-10
Figure 3-4. Installing an ONline 10BASE-T Security Module . . . . . . . . . 3-11
Figure 3-5. ONline 10BASE-T Security Module Cable Connection . . . . 3-12
Figure 3-6. Security Module Faceplate . . . . . . . . . . . . . . . . . . . . . . . . 3-19
Figure 4-1. Example of Eavesdropping Security . . . . . . . . . . . . . . . . . . . 4-5
Figure 4-2. Example of Intrusion Detection . . . . . . . . . . . . . . . . . . . . . . 4-6
Figure A-1. 50-Pin Cable Male and Female Connectors . . . . . . . . . . . . A-4
Figure A-2. RJ-45 Connector Pinouts . . . . . . . . . . . . . . . . . . . . . . . . . . A-7
ONline