Check out our special report on casino security
Gallagher Controller 6000
Technical Specification
- Make: Gallagher
- Model code: Controller 6000
- Controller Type: Networkable
- Max No. of Doors per Controller: 10
- No of Cardholders: 500,000
Gallagher Controller 6000 (C6000) is the interface between the Gallagher Command Centre Server and the distributed field hardware. Capable of processing, storing and communicating data in real time when the Gallagher Command Centre Server is offline. The Controller 6000 uses straight forward system architecture to provide powerful and flexible configuration.
Read more| Make | Gallagher |
|---|---|
| Manufacturer | Gallagher Security (Europe) Ltd |
| Category | Access Control>Access control controllers |
| Model code | Controller 6000 |
| Controller Type | Networkable |
| Max No. of Doors per Controller | 10 |
| No of Cardholders | 500,000 |
| Networkable | Yes |
| Communication Type | HBUS, GBUS, SensorBUS or AperioTM |
| Onboard No/Type of Inputs / Outputs | 12 ~ 24 in / 2 ~ 8 out |
| Universal / Wiegand Reader Interface | Yes |
| Electrical Specifications | Voltage: 13.6 VDC |
| Environmental Specifications |
Operating Temp oC: -10 ~ +70 Operating Humidity %: 0 ~ 95 |
| Additional info | Gallagher Controller 6000 (C6000) is the interface between the Gallagher Command Centre Server and the distributed field hardware. Capable of processing, storing and communicating data in real time when the Gallagher Command Centre Server is offline. The Controller 6000 uses straight forward system architecture to provide powerful and flexible configuration. |
You might be interested in these products
Related Whitepapers
Cyber security and high security in a business integrated world
5 reasons to integrate mobile technology into your security solution
Cybersecurity in keyless access management
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

