Software House USTAR-ACM network-ready door controller
Technical Specification
- Make: Software House
- Model code: USTAR-ACM
- Series: iSTAR Ultra
- Controller Type: Networkable
- No of Cardholders: 500,000
ACM board Supports eight Wiegand, RM or OSDP readers, along with 24 supervised inputs and 16 outputs which can be individually wet- or dry-configured Embedded lock power management lowers installation costs Hardened Linux embedded OS for improved security and scalability Includes global anti-passback and advanced peer-to-peer clustering Native intrusion zone functionality LCD provides important controller status and diagnostics information Manages up to 500,000 cardholders in local memory Dedicated input for fire alarm interlock overrides door locks during fire conditions Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications
Read moreMake | Software House |
---|---|
Manufacturer | Software House |
Category | Access Control>Access control controllers |
Model code | USTAR-ACM |
Series | iSTAR Ultra |
Controller Type | Networkable |
No of Cardholders | 500,000 |
Offline Capabilities | Yes |
Networkable | Yes |
Communication Type | RS485 |
Onboard No/Type of Inputs / Outputs | 24 Inputs, 16 Relay Outputs |
Universal / Wiegand Reader Interface | Yes |
Reader Max. Distance m | 150 ~ 1219 |
Electrical Specifications | Voltage: 12 V DC |
Physical Specifications | Dimensions mm: 115 x 397 x 36 |
Environmental Specifications |
Operating Temp oC: 0 ~ 50 C (32 ~ 122 F) Operating Humidity %: 5 ~ 95 |
Additional info |
|
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The security challenges of data centers
The critical importance of Trusted Execution Environment in access control
Cybersecurity in keyless access management
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download