Check out our special report on Cybersecurity
HID Vertx V200 Access control controller
Technical Specification
- Make: HID
- Model code: Vertx V200
- Series: VertX
- Networkable: Yes
- Onboard No/Type of Inputs / Outputs: 16 input circuits, 2 auxiliary outputs
The V200 input monitor interface connects up to 16 supervised input circuits. Each input point monitors and reports normal, offnormal, and alarm states. The V200 features on-board flash memory, allowing program updates to be downloaded through the network. The V200 connects to the V1000 via a high speed RS-485 network.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control controllers |
| Model code | Vertx V200 |
| Networkable | Yes |
| Onboard No/Type of Inputs / Outputs | 16 input circuits, 2 auxiliary outputs |
| Universal / Wiegand Reader Interface | Yes |
| Electrical Specifications |
Voltage: 9 ~ 18 V DC Power Consumption: 60 mA |
| Physical Specifications |
Dimensions mm: 147.32 x 122.55 x 32.38 Weight g: 350 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 50 Operating Humidity %: 5 ~ 95 |
| Accessories | Input monitor interface |
| Additional info |
The V200 input monitor interface connects up to 16 supervised input circuits. Each input point monitors and reports normal, offnormal, and alarm states. The V200 features on-board flash memory, allowing program updates to be downloaded through the network. The V200 connects to the V1000 via a high speed RS-485 network. |
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control software
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

