Fermax 1088
Technical Specification
- Make: Fermax
- Model code: 1088
Controls the door electronically from the domestic telephone and diverts calls from the door to a mobile phone when you are not at home. The new FERMAX Telephone Interface is the perfect complement for audio door entry system. Installed in the home it allows communication with the door and opening from any conventional fixed or mobile telephone in the home. It also carries out telephone dialling functions so it is possible to divert calls from the door through the telephone lines to a programmed telephone number. It can be used by caretakers in blocks or residential areas who can carry out their work with complete freedom of movement if they have a mobile phone to divert the calls from the outdoor panel.
Read more| Make | Fermax |
|---|---|
| Manufacturer | Fermax Electrónica S.A.U. |
| Category | Access Control>Audio, video or keypad entry |
| Model code | 1088 |
| Additional info |
Controls the door electronically from the domestic telephone and diverts calls from the door to a mobile phone when you are not at home. The new FERMAX Telephone Interface is the perfect complement for audio door entry system. Installed in the home it allows communication with the door and opening from any conventional fixed or mobile telephone in the home. It also carries out telephone dialling functions so it is possible to divert calls from the door through the telephone lines to a programmed telephone number. It can be used by caretakers in blocks or residential areas who can carry out their work with complete freedom of movement if they have a mobile phone to divert the calls from the outdoor panel. |
Related Whitepapers
The critical role of access control in K-12 school security
Three essential reasons to upgrade your access control technology in 2022
10 top insights in access, cloud and more
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
