Nedap AEOS AP8001X AEpu processing unit
Technical Specification
- Make: Nedap AEOS
- Model code: AP8001X
- Controller Type: Standalone/Networkable
- Networkable: Yes
- Communication Type: Ethernet, UTP 100/10 Mbps, USB 2.0
The AP8001X AEOS Processing Unit (AEpu) allows you to configure AEOS to suit all your requirements, simply by adding software components. The precise functionality of this generic security controller is determined by the choice of AEOS software components from an extensive library. Consequently, AEOS can be configured at any time.
Read more| Make | Nedap AEOS |
|---|---|
| Manufacturer | Nedap Security Management |
| Category | Access Control>Access control controllers |
| Model code | AP8001X |
| Controller Type | Standalone/Networkable |
| Networkable | Yes |
| Communication Type | Ethernet, UTP 100/10 Mbps, USB 2.0 |
| Electrical Specifications | Power Consumption: 400 mA |
| Physical Specifications |
Dimensions mm: 230 x 126 x 70 Weight g: 800 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 55 Operating Humidity %: 10 ~ 93 |
| Accessories | Processing Unit |
| Additional info |
The AP8001X AEOS Processing Unit (AEpu) allows you to configure AEOS to suit all your requirements, simply by adding software components. The precise functionality of this generic security controller is determined by the choice of AEOS software components from an extensive library. Consequently, AEOS can be configured at any time. |
You might be interested in these products
- See other Nedap AEOS products
- Nedap AEOS Access control readers
- Nedap AEOS Access control software
- Nedap AEOS Access control systems & kits
Related Whitepapers
Achieving frictionless physical access control with AEOS
Access control: Bringing efficiency to your lifts' automatic destination system
6 ways access control can contribute to your business continuity
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
