Check out our special report on casino security
Siemens 4102-3 Modular controller (MK3) - sub-assembly
Technical Specification
- Make: Vanderbilt
- Model code: 4102-3
- Controller Type: Networkable
- No of Cardholders: 100‚000
- Networkable: Yes
Siemens 4102-3 is a sub-assembly for modular controller. It can control up to eight reading heads or readers‚ TCP/IP‚ RF module‚ memory expansions and comms module are all available "onboard" rather than as separate add-ons. The integrated Cotag technology enables the most cost-effective hands-free solution on the market‚ with a proximity reading range of up to 40 cm and a hands-free reading range of up to 100 cm. The sub-assembly is delivered without the housing.
Read more| Make | Vanderbilt |
|---|---|
| Manufacturer | Vanderbilt Industries |
| Category | Access Control>Access control controllers |
| Model code | 4102-3 |
| Controller Type | Networkable |
| No of Cardholders | 100‚000 |
| Networkable | Yes |
| Communication Type | RS485 |
| Reader Max. Distance m | 1 |
| Electrical Specifications | Power Consumption: 1 A |
| Environmental Specifications | Operating Temp oC: 0 ~ 40 C (32 ~ 104 F) |
| Additional info |
Siemens 4102-3 is a sub-assembly for modular controller. It can control up to eight reading heads or readers‚ TCP/IP‚ RF module‚ memory expansions and comms module are all available "onboard" rather than as separate add-ons. The integrated Cotag technology enables the most cost-effective hands-free solution on the market‚ with a proximity reading range of up to 40 cm and a hands-free reading range of up to 100 cm. The sub-assembly is delivered without the housing. |
You might be interested in these products
Related Whitepapers
10 top insights in access, cloud and more
Schooling the market on education security
Cybersecurity in keyless access management
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download