Check out our special report on Artificial Intelligence
CEM SWENET128 Ethernet reader controller software for 128 doors
Technical Specification
- Make: CEM
- Model code: SWENET128
- Max No. of Doors per System: 128
- Reader Types: Card
- Communication: TCP/IP
CEM SWENET128 is an Ethernet reader controller software for 128 doors. It is a software controller required for use with Ethernet based CEM readers and devices as part of the AC2000 SE (Standard Edition) and AC2000 AE (Airport Edition) access control systems. The RTC is used with CEM Ethernet devices such as the emerald touch screen reader, S610e reader, S610f reader, Etherprox reader, S3030 portable reader range, eDCM 300 (Door Control Module), eDCM 300 Input/Output Module and the EIOC (Ethernet Input/Output Controller). The RTC Ethernet software offers an added layer of system resilience as it is capable of operating independently from the central CDC server should communications between the two be temporarily lost.
Read more| Make | CEM |
|---|---|
| Manufacturer | CEM Systems Ltd |
| Category | Access Control>Access control software |
| Model code | SWENET128 |
| Max No. of Doors per System | 128 |
| Reader Types | Card |
| Communication | TCP/IP |
| Central / Remote Monitoring | Yes |
| Import/Export of Information | Yes |
| Additional info | CEM SWENET128 is an Ethernet reader controller software for 128 doors. It is a software controller required for use with Ethernet based CEM readers and devices as part of the AC2000 SE (Standard Edition) and AC2000 AE (Airport Edition) access control systems. The RTC is used with CEM Ethernet devices such as the emerald touch screen reader, S610e reader, S610f reader, Etherprox reader, S3030 portable reader range, eDCM 300 (Door Control Module), eDCM 300 Input/Output Module and the EIOC (Ethernet Input/Output Controller). The RTC Ethernet software offers an added layer of system resilience as it is capable of operating independently from the central CDC server should communications between the two be temporarily lost. |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download
