Esser ACS-8 Access control system
Technical Specification
- Make: Esser
- Model code: ACS-8
The ACS-8 features flexible and optional installation technology. 2 controllable RS 485 interface drivers are included as standard in the communication module. The entire firmware can be upgraded. Time-consuming changing of EPROMS for function expansion is now a thing of the past. New program sections and expansions can be incorporated into the panels via MultiAccess for Windows. In online operation, up to 32 ACS-8 units can be operated via one bus controller. The access control rights are set up and managed via "MultiAccess for Windows". The ACS-8 contains the decision rights for door lock release and control. By using several bus controllers, or in the in the Ethernet network, the number of doors can be expanded to a maximum of 999.
Read more| Make | Esser |
|---|---|
| Manufacturer | Esser |
| Category | Access Control>Access control systems & kits |
| Model code | ACS-8 |
| Additional info | The ACS-8 features flexible and optional installation technology. 2 controllable RS 485 interface drivers are included as standard in the communication module. The entire firmware can be upgraded. Time-consuming changing of EPROMS for function expansion is now a thing of the past. New program sections and expansions can be incorporated into the panels via MultiAccess for Windows. In online operation, up to 32 ACS-8 units can be operated via one bus controller. The access control rights are set up and managed via "MultiAccess for Windows". The ACS-8 contains the decision rights for door lock release and control. By using several bus controllers, or in the in the Ethernet network, the number of doors can be expanded to a maximum of 999. |
You might be interested in these products
Related Whitepapers
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
Integrated access control: reap the benefits of connected security
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
