Apollo Security Sales AAM-20 Access control card/ tag/ fob
Technical Specification
- Make: Apollo Security Sales
- Model code: AAM-20
- Standalone/ Networked/ PC: Networked
- Max Doors per Controller: 16 doors/controller
- Operating Temperature oC: 0~50
Provide full distributed processing of access control, alarm reporting and remote control for large and mid-sized system applications. Handles up to 4 interface modules, 20 alarm panels (320 inputs), 20 relay modules. Elevator control, high speed 32-bit CMOS processor.
Read more| Make | Apollo Security Sales |
|---|---|
| Manufacturer | Apollo Security |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | AAM-20 |
| Standalone/ Networked/ PC | Networked |
| Max Doors per Controller | 16 doors/controller |
| Environmental Specifications | Operating Temperature oC: 0~50 |
| Electrical Specifications | Voltage: 5@1A |
| Physical Specifications | Dimensions mm: 304 x 190 x 25 |
| Accessories | Controller |
| Additional info | Provide full distributed processing of access control, alarm reporting and remote control for large and mid-sized system applications. Handles up to 4 interface modules, 20 alarm panels (320 inputs), 20 relay modules. Elevator control, high speed 32-bit CMOS processor. |
More Apollo Security Sales Access control cards/ tags/ fobs
- See other Apollo Security Sales products
- Apollo Security Sales Access control software
- Apollo Security Sales Access control systems & kits
- Apollo Security Sales Access control readers
- Apollo Security Sales Access control controllers
- Apollo Security Sales Intruder alarm system control panels & accessories
Related Whitepapers
Integrated access control: reap the benefits of connected security
A guide to specifying RFID readers
Three essential reasons to upgrade your access control technology in 2022
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download