Check out our special report on casino security
CyberLock CKS-F30 web station
Technical Specification
- Make: CyberLock
- Model code: CKS-F30
- Standalone/ Networked/ PC: Standalone
- Operating Temperature oC: 0 ~ 50 C (32 ~ 122 F)
- Voltage: 220 V
CyberLock CKS-F30 web station is designed to work as a stand alone communication device. Once it is configured on a computer with either CyberAudit Professional or CyberAudit Enterprise management software, it can be placed indoors, anywhere there is a RJ-45 network connection. The Web Station updates and authorises any CyberKey smart key from a remote location via LAN or over the Internet. It can also be used to charge rechargeable CyberKeys. The Web Station is compatible with all CyberKey smart keys.
Read more| Make | CyberLock |
|---|---|
| Manufacturer | CyberLock |
| Category | Access Control>Access control systems & kits |
| Model code | CKS-F30 |
| Standalone/ Networked/ PC | Standalone |
| Environmental Specifications | Operating Temperature oC: 0 ~ 50 C (32 ~ 122 F) |
| Electrical Specifications | Voltage: 220 V |
| Physical Specifications |
Dimensions mm: 34 x 71 x 103 Weight g: 289.2 |
| Additional info | CyberLock CKS-F30 web station is designed to work as a stand alone communication device. Once it is configured on a computer with either CyberAudit Professional or CyberAudit Enterprise management software, it can be placed indoors, anywhere there is a RJ-45 network connection. The Web Station updates and authorises any CyberKey smart key from a remote location via LAN or over the Internet. It can also be used to charge rechargeable CyberKeys. The Web Station is compatible with all CyberKey smart keys. |
You might be interested in these products
Related Whitepapers
Water utility security: challenges and solutions
Securing America’s Telecommunications Infrastructure
The critical role of access control in K-12 school security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
