Check out our special report on casino security
Software House IP-ACM2A-EP 2-reader Ethernet door module
Technical Specification
- Make: Software House
- Model code: IP-ACM2A-EP
- Controller Type: Networkable
- No of Cardholders: 1000
- Offline Capabilities: Yes
In plastic enclosure Cost-effective IP access control module Up to 32 IP-ACMs per iSTAR Ultra and iSTAR Ultra SE, and up to 8 per iSTAR Ultra LT Convenient second port for biometric reader or efficient network diagnostics Wet lock outputs provide up to 0.75A each for ability to power most lock types Highly distributed architecture PoE or PoE Plus 10/100/GigE connectivity AES-256 network encryption Configurable offline mode Easy setup with static IP or DHCP Small, ‘office-ready” enclosure design Full duplex RS-485 on board to leverage future technology Selectable “wet” and dry output relays OSDP support fosters device interoperability Supports TLS 1.2 and 802.1X secure network protocols for protection against the threat of cyber attacks
Read more| Make | Software House |
|---|---|
| Manufacturer | Software House |
| Category | Access Control>Access control controllers |
| Model code | IP-ACM2A-EP |
| Controller Type | Networkable |
| No of Cardholders | 1000 |
| Offline Capabilities | Yes |
| Networkable | Yes |
| Communication Type | RS485 |
| Onboard No/Type of Inputs / Outputs | 4 Supervised Inputs, 2 Relay Outputs |
| Universal / Wiegand Reader Interface | Yes |
| Reader Max. Distance m | 10 ~ 1219 |
| Electrical Specifications | Voltage: 12 V DC / 24 V DC / PoE / PoE Plus |
| Physical Specifications |
Dimensions mm: 183 x 307 x 62 Weight g: 700 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 50 C (32 ~ 122 F) Operating Humidity %: 5 ~ 95 |
| Additional info |
|
You might be interested in these products
Related Whitepapers
Open credential standards and the impact on physical access control
System design considerations to optimize physical access control
Maximising enterprise security systems in the cloud
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

