Check out our special report on casino security
Aiphone ACS-2DR-C two-door access control starter kit
Technical Specification
- Make: Aiphone
- Model code: ACS-2DR-C
- Kits: Yes
- Standalone/ Networked/ PC: Standalone / Networked
- Reader Type: Wiegand
The kit includes a steel ventilated lockable enclosure containing a master door control board and a two-door relay control board Two Wiegand reader inputs (per AC-2DE) Integrated lock power for each door (12V DC, 500mA) Two solid state dry contact relays (per door) Three dry contact inputs (per door) Built-in diagnostic LCD Custom scripting and actions available Can support up to 8 doors with additional AC-2DE two-door expander board Short and over-voltage protection Dedicated port for battery backup TAA and NDAA Compliant Managed using the AC Nio management software, with partitioning options available
Read more| Make | Aiphone |
|---|---|
| Manufacturer | Aiphone |
| Category | Access Control>Access control systems & kits |
| Model code | ACS-2DR-C |
| Kits | Yes |
| Standalone/ Networked/ PC | Standalone / Networked |
| Reader Type | Wiegand |
| Max Doors per System | 8 doors/system |
| Max No. of Controllers | 4 controllers/system |
| Max Doors per Controller | 2 doors/controller |
| No of Cardholders | 100,000 |
| No/ Type of Inputs/ Outputs | 2 dry contact outputs, 1 wet contact output, 3 programmable contact inputs |
| Network Type | IPv4, IPv6, TCP, UDP, HTTPS |
| Additional info |
|
See comparison of Aiphone ACS-2DR-C with similar Aiphone Access control systems & kits
Compare Aiphone ACS-2DR-C with Access control systems & kits from other manufacturers
You might be interested in these products
Related Whitepapers
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
Integrated access control: reap the benefits of connected security
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download

