Bosch ITS-DX4020-G GPRS/GSM communicator
Technical Specification
- Make: Bosch
- Model code: ITS-DX4020-G
- Transmission Media: GSM / GPRS transmission
- Standalone: Yes
- Power Supply: 12 V DC
Bosch ITS-DX4020-G enables two-way IP or dialed communications over a commercial GPRS/GSM network. Typical functions are event reporting to a central monitoring station and remote access to Bosch control panels. The ITS-DX4020-G is built for a wide variety of secure commercial and industrial applications. Flexible end-to-end path supervision, the 128 bit AES encryption and anti-substitution features make ITS-DX4020-G suitable for high security and fire monitoring applications.
Read more| Make | Bosch |
|---|---|
| Manufacturer | Bosch Security Systems |
| Category | Intruder Alarms>Intruder alarm communicators |
| Model code | ITS-DX4020-G |
| Transmission Media | GSM / GPRS transmission |
| Standalone | Yes |
| Electrical Specifications | Power Supply: 12 V DC |
| Physical Specifications | Dimensions mm: 133 x 80 x 23 |
| Environmental Specifications |
Operating Temp oC: -10 ~ +55 C (14 ~ 131 F) Operating Humidity %: 5 ~ 93 |
| Additional info | Bosch ITS-DX4020-G enables two-way IP or dialed communications over a commercial GPRS/GSM network. Typical functions are event reporting to a central monitoring station and remote access to Bosch control panels. The ITS-DX4020-G is built for a wide variety of secure commercial and industrial applications. Flexible end-to-end path supervision, the 128 bit AES encryption and anti-substitution features make ITS-DX4020-G suitable for high security and fire monitoring applications. |
- See other Bosch products
- Bosch IP Dome cameras
- Bosch Dome cameras
- Bosch CCTV cameras
- Bosch Intruder detectors
- Bosch IP cameras
Related Whitepapers
Preparing your organisation with quality situational awareness
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

