Inner Range FE3000 Intruder alarm communicator
Technical Specification
- Make: Inner Range
- Model code: FE3000
- Series: Concept 3000 / Access 4000 Series
- Digital Communicators: Yes
- Transmission Media: GSM transmission
The FE3000 can be used to add additional reporting paths, such as IP, CDMA, GPRS or GSM to any CID reporting alarm panel. All paths are monitored and if one path fails then that failure, along with any alarms, is reported via another path. The FE3000 can also poll the alarm panel as often as every five monutes to ensure that it is operating correctly. Any panel failure can then be immediately reported. The FE3000 truely adds another dimension to any alarm panel it is connected to.
Read more| Make | Inner Range |
|---|---|
| Manufacturer | Inner Range |
| Category | Intruder Alarms>Intruder alarm communicators |
| Model code | FE3000 |
| Series | Concept 3000 / Access 4000 Series |
| Digital Communicators | Yes |
| Transmission Media | GSM transmission |
| No of Channels | 12 channels |
| No of Messages | 32 messages |
| No of Telephone Messages | 32 telephone messages |
| Standalone | Yes |
| No of Inputs | 12 |
| No of Outputs | 8 |
| Electrical Specifications | Power Supply: 1.5 A |
| Physical Specifications |
Weight g: 4 kg Dimensions mm: 375 x 190 x 72 |
| Environmental Specifications | Operating Temp oC: 0 ~ +50 |
| Additional info | The FE3000 can be used to add additional reporting paths, such as IP, CDMA, GPRS or GSM to any CID reporting alarm panel. All paths are monitored and if one path fails then that failure, along with any alarms, is reported via another path. The FE3000 can also poll the alarm panel as often as every five monutes to ensure that it is operating correctly. Any panel failure can then be immediately reported. The FE3000 truely adds another dimension to any alarm panel it is connected to. |
Related Whitepapers
The power of integration in physical security systems
IoT connectivity
11 advantages of a combined system for access control and intrusion
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download