CEM webEntry II Controller supports up to 64 doors and can manage up to 10,000 cardholders
Technical Specification
- Make: CEM
- Model code: webEntry II Controller
- Controller Type: Standalone/Networkable
- Max No. of Doors per Controller: 64
- No of Cardholders: 10,000
The webEntry™ II controller is a unique, low cost ‘entry level' access control system that is at the forefront of today's IP-based security technologies. It uniquely combines a Web server interface and access control functionalities into one control panel allowing complete system administration and monitoring on any network connected PC using Microsoft Internet Explorer web browser. Available in various configurations, the webEntry II controller supports up to 64 doors and can manage up to 10,000 cardholders. With an onboard battery backup the webEntry II controller can continue online for approximately three hours.
Read more| Make | CEM |
|---|---|
| Manufacturer | CEM Systems Ltd |
| Category | Access Control>Access control controllers |
| Model code | webEntry II Controller |
| Controller Type | Standalone/Networkable |
| Max No. of Doors per Controller | 64 |
| No of Cardholders | 10,000 |
| Networkable | Yes |
| Electrical Specifications |
Voltage: 100 ~ 240 V AC Power Consumption: 300 mA |
| Physical Specifications |
Dimensions mm: 42 x 483 x 233 Weight g: 2,600 |
| Environmental Specifications | Operating Temp oC: -10 ~ +50 |
| Additional info |
The webEntry™ II controller is a unique, low cost ‘entry level' access control system that is at the forefront of today's IP-based security technologies. It uniquely combines a Web server interface and access control functionalities into one control panel allowing complete system administration and monitoring on any network connected PC using Microsoft Internet Explorer web browser. Available in various configurations, the webEntry II controller supports up to 64 doors and can manage up to 10,000 cardholders. With an onboard battery backup the webEntry II controller can continue online for approximately three hours. |
You might be interested in these products
Related Whitepapers
Cybersecurity in keyless access management
Three essential reasons to upgrade your access control technology in 2022
Securing unmanned infrastructure at the network edge
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

