Check out our special report on casino security
Software House GSTAR004-MB IP edge access door controller
Technical Specification
- Make: Software House
- Model code: GSTAR004-MB
- Series: iSTAR Edge G2
- Controller Type: Standalone
- Max No. of Doors per Controller: 4
iSTAR Edge G2 board only, supports four readers Stand-alone IP edge access controller with local database of up to 1,000,000 cardholders Controls and powers all access control devices at the door to minimise installation costs Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Advanced access control feature set including anti-passback, peer-to-peer clustering and local event logic Dual GigE Network ports with IPv6, DHCP and 802.1X support Supports OSDP Secure Channel for encrypted, two-way reader communications Supports embedded High Assurance FICAM operation without additional third-party hardware
Read more| Make | Software House |
|---|---|
| Manufacturer | Software House |
| Category | Access Control>Access control controllers |
| Model code | GSTAR004-MB |
| Series | iSTAR Edge G2 |
| Controller Type | Standalone |
| Max No. of Doors per Controller | 4 |
| No of Cardholders | 1,000,000 |
| Onboard No/Type of Inputs / Outputs | 8 Supervised Inputs, 4 Relay Outputs |
| Universal / Wiegand Reader Interface | Yes |
| Reader Max. Distance m | 10 ~ 1200 |
| Electrical Specifications | Voltage: 12 V DC / 24 V DC |
| Physical Specifications | Dimensions mm: 190 x 146 x 25 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 50 C (32 ~ 122 F) Operating Humidity %: 5 ~ 95 |
| Additional info |
|
You might be interested in these products
Related Whitepapers
Open credential standards and the impact on physical access control
System design considerations to optimize physical access control
Maximising enterprise security systems in the cloud
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download

