Check out our special report on Cybersecurity
HID Vertx V300 Access control controller
Technical Specification
- Make: HID
- Model code: Vertx V300
- Series: VertX
- Networkable: Yes
- Onboard No/Type of Inputs / Outputs: 2 auxiliary inputs, 12 relay outputs
The V300 output control interface contains 12 latching Form-C relays, which can connect up to 12 devices controllable by simple contact closures, such as logic inputs for process equipment, HVAC and elevator control panels, CCTV switchers, etc. Loads exceeding 2 A @ 30 VDC should be controlled via interposing relays.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control controllers |
| Model code | Vertx V300 |
| Networkable | Yes |
| Onboard No/Type of Inputs / Outputs | 2 auxiliary inputs, 12 relay outputs |
| Universal / Wiegand Reader Interface | Yes |
| Electrical Specifications |
Voltage: 9 ~ 18 V DC Power Consumption: 60 mA |
| Physical Specifications |
Dimensions mm: 147.32 x 122.55 x 32.38 Weight g: 350 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 50 Operating Humidity %: 5 ~ 95 |
| Accessories | Output control interface |
| Additional info |
The V300 output control interface contains 12 latching Form-C relays, which can connect up to 12 devices controllable by simple contact closures, such as logic inputs for process equipment, HVAC and elevator control panels, CCTV switchers, etc. Loads exceeding 2 A @ 30 VDC should be controlled via interposing relays. |
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control software
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

