Elk 952 installation instructions In-Line Telephone Surge Protector For Security Controls

Page 1

In-Line Telephone Surge Protector For Security Controls

ELK-952

The ELK-952 provides exceptional protection against damage from lightning, voltage spikes, and surge damage coming into a phone line. It installs between the RJ31X Phone Jack and the Security Control. The ELK-952 features multi-stage protection and is 5 times faster than MOVs.

• 5 Stage Surge Protection

• Super Fast Response Time: < 1 Nanosecond

Very Economical

• Max. Signal Voltage: 250V (peak)

Easy to Install

Breakdown Voltage: 280V (nominal)

• Works with Any Security Control

Maximum ‘Peak’ Pulse Current: 100Amps

INSTALLATION INSTRUCTIONS

This device installs in-line between the RJ31X Phone Jack and the Security Control. It features multi-stage protection: (Tip-Ring, Tip- Ground, Ring-Ground) utilizing Gas Discharge Tube, Spark Gaps, Clamping Diodes, and series inductors. The response time of the Elk-952 is 5 times faster than MOVs.

1.Connect one end of the Telco cord (8 Pin, not supplied) to Control panel.

2.The RJ45 modular plug from the Telco cord plugs into the Elk-952. [Control In]

3.The RJ45 modular plug from the Elk-952 plugs into the RJ31X Jack.

4.The Ground wire (Green/Yel) MUST BE CONNECTED to a good quality Earth Ground.

USER INSTRUCTIONS

This equipment complies with Part 68 of the FCC rules. Located on the equipment is a label that contains, among other information, the ACTA registra- tion number and ringer equivalence number (REN). If requested, this information must be provided to the telephone company.

The REN is used to determine the quantity of devices which may be connected to the telephone line. Excessive REN's on the telephone line may result in the devices not ringing in response to an incoming call. In most, but not all areas, the sum of the REN's should not exceed five (5.0). To be certain of the number of devices that may be connected to the line, as determined by the total REN's, contact the telephone company to determine the maximum REN for the calling area.

This equipment cannot be used on the telephone company-provided coin service. Connection to Party Line Service is subject to State Tariffs.

If this equipment causes harm to the telephone network, the telephone company will notify you in advance that temporary discontinuance of service may be required. If advance notice isn't practical, the telephone company will notify the customer as soon as possible. Also, you will be advised of your right the file a complaint with the FCC if you believe it is necessary.

The telephone company may make changes in its facilities, equipment, operations, or procedures that could affect the operation of the equipment. If this happens, the telephone company will provide advance notice in order for you to make the necessary modifications in order to maintain uninterrupted service.

If trouble is experienced with this equipment, please contact:

ELK Products Inc.

 

P.O. Box 100

 

Hildebran,NC 28637 USA

 

828-397-4200

If the trouble is causing harm to the telephone network, the telephone company may request you to remove the equipment from the network until the problem is resolved.

This equipment uses the following USOC jacks: RJ31X

It is recommended that the customer install an AC surge arrester in the AC outlet to which this device is connected. This is to avoid damaging the equipment caused by local lightning strikes and other electrical surges.

One (1) Year Limited Warranty. Please refer to the Elk Products Website for complete details and limitations of Elk's warranty.

800-797-9355 • www.elkproducts.com • sales@elkproducts.com

Image 1
Contents In-Line Telephone Surge Protector For Security Controls Installation InstructionsELK-952 User Instructions

952 specifications

Elk 952 is a sophisticated platform designed to meet the growing demands of modern industries, particularly focusing on enhanced connectivity and efficiency. One of its standout features is its robust processing power, which allows it to handle extensive data operations and perform complex computations swiftly. This capability is vital for applications such as real-time data analysis, machine learning, and artificial intelligence, where speed and accuracy are paramount.

Equipped with cutting-edge technologies, Elk 952 utilizes advanced networking protocols for seamless communication between devices. Its compatibility with various communication standards makes it a versatile option for many deployment scenarios. This ensures that businesses can integrate Elk 952 into their existing infrastructure without significant overhauls, thus optimizing cost-effectiveness.

A notable characteristic of Elk 952 is its modular design, allowing for easy scalability. As industries evolve and grow, the ability to expand system capabilities without complete replacements is crucial. Users can upgrade individual components or add new functionalities only as needed, which significantly extends the lifespan of the technology and enhances return on investment.

Security is a central focus for Elk 952. It incorporates multiple layers of security protocols designed to protect sensitive data from potential breaches. This is particularly important in sectors like finance and healthcare, where confidentiality is mandated by regulations. The robust encryption standards and regular software updates ensure that the system remains resilient against emerging threats.

Moreover, Elk 952 features an intuitive user interface that simplifies navigation and operation, making it accessible to users with varying levels of technical expertise. This user-friendly design facilitates quick training and reduces the need for extensive onboarding, allowing teams to focus on productivity from day one.

In terms of energy efficiency, Elk 952 is designed with sustainability in mind. Its low power consumption not only reduces operational costs but also minimizes environmental impact, aligning with global efforts toward greener technologies.

In summary, Elk 952 is a high-performance platform that combines advanced processing capabilities, exceptional scalability, robust security, and user-friendly design, making it an ideal solution for businesses looking to enhance their technological infrastructure. Its commitment to efficiency and sustainability sets a new standard for future technologies across industries.