Check out our special report on casino security
AMAG Symmetry M2150-EN-DBU-100K intelligent door controller
Technical Specification
- Make: AMAG
- Model code: Symmetry M2150-EN-DBU-100K
- Controller Type: Networkable
- Max No. of Doors per Controller: 16
- No of Cardholders: 100,000
Provides distributed intelligence for your access control system and ensures complete system security, resilience and reliability When combined with Symmetry security management software, provides a seamless security management system Controls up to 16 doors and readers using separate door controllers Manages 100,000 card holders Provided with an on-board Network Interface Card (NIC) and new communications protocols which allow considerably faster data upload and download times than conventional access control panels Integrated AES encrypted 10/100 Mbps Network Interface Card Connect smart card, proximity or legacy magstripe readers using multiNODE current loop protocol (MCLP) Wiegand interface available Failover modem interface provided
Read more| Make | AMAG |
|---|---|
| Manufacturer | AMAG Technology, Inc. |
| Category | Access Control>Access control controllers |
| Model code | Symmetry M2150-EN-DBU-100K |
| Controller Type | Networkable |
| Max No. of Doors per Controller | 16 |
| No of Cardholders | 100,000 |
| Networkable | Yes |
| Universal / Wiegand Reader Interface | Yes |
| Reader Max. Distance m | 1000 |
| Physical Specifications | Dimensions mm: 240 x 160 |
| Environmental Specifications |
Operating Temp oC: -10 ~ 55 C (14 ~ 131 F) Operating Humidity %: 15 ~ 90 |
| Additional info |
|
You might be interested in these products
Related Whitepapers
How analytics engines mitigate risk, ensure compliance and reduce cost
AMAG - Symmetry security management system saves energy and reduces cost
AMAG - Destination dispatch elevator integration
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

