Software House ESTAR002 two-reader IP edge access door controller

Technical Specification

Features:
  • Make: Software House
  • Model code: ESTAR002
  • Series: iSTAR Edge
  • Controller Type: Networkable
  • No of Cardholders: 400,000
Read more
Additional info:

With enclosure Controls and powers all access control devices at the door to minimise installation costs Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localised access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Read more
Make Software House
Manufacturer Software House
Category Access Control>Access control controllers
Model code ESTAR002
Series iSTAR Edge
Controller Type Networkable
No of Cardholders 400,000
Networkable Yes
Communication Type TCP/IP, RS485
Onboard No/Type of Inputs / Outputs 8 Supervised Inputs, 4 Relay Outputs
Universal / Wiegand Reader Interface Yes
Reader Max. Distance m 150 ~ 1219
Electrical Specifications Voltage: 12 V DC / 24 V DC
Physical Specifications Weight g: 4,200
Environmental Specifications Operating Temp oC: 0 ~ 50 C (32 ~ 122 F)
Operating Humidity %: 5 ~ 95
Additional info
  • With enclosure
  • Controls and powers all access control devices at the door to minimise installation costs
  • Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering
  • Localised access control decision-making with storage for over 400,000 personnel records
  • Dedicated input for fire alarm interlock releases door locks during fire conditions
  • Local LCD and LEDs provide clear startup and troubleshooting information
  • AES 256 network encryption; FIPS 197 listed
  • Compatible with C•CURE 9000 and C•CURE 800/8000
Download PDF version Download PDF version

Related Whitepapers

The critical importance of Trusted Execution Environment in access control

Cybersecurity in keyless access management

Three essential reasons to upgrade your access control technology in 2022

Quick poll
Which feature is most important in a video surveillance system?





$common_vars['trending_topic_article_popup'][0]->title

Sonatype's full platform now in AWS marketplace