Verex 120-8206 Access control controller
Technical Specification
- Make: Verex
- Model code: 120-8206
- Series: Monitor ISM Series
- Max No. of Doors per Controller: 8
- Voltage: 12
Enables comprehensive access control functionality that is both modular or ease of expansion and highly configuable. Each door controller provides complete control of 2 door, 4 reader applications. Package integrates access control and intrusion features, featuring integrated tamper, door contacts, Request to Exit and magnetic lock bond sensors. Each door controller supports Weigand, Magnetic Stripe and Proximity readers. Available with Prime Version : In/Out Doors - 16, Readers - 32 and Enterprise Version : In/Out Doors - 32, Readers - 64.
Read more| Make | Verex |
|---|---|
| Manufacturer | VEREX Technology |
| Category | Access Control>Access control controllers |
| Model code | 120-8206 |
| Series | Monitor ISM Series |
| Max No. of Doors per Controller | 8 |
| Electrical Specifications | Voltage: 12 |
| Physical Specifications | Dimensions mm: 270 x 355 x 80 |
| Accessories | Controller |
| Additional info | Enables comprehensive access control functionality that is both modular or ease of expansion and highly configuable. Each door controller provides complete control of 2 door, 4 reader applications. Package integrates access control and intrusion features, featuring integrated tamper, door contacts, Request to Exit and magnetic lock bond sensors. Each door controller supports Weigand, Magnetic Stripe and Proximity readers. Available with Prime Version : In/Out Doors - 16, Readers - 32 and Enterprise Version : In/Out Doors - 32, Readers - 64. |
You might be interested in these products
Related Whitepapers
Cybersecurity in keyless access management
Three essential reasons to upgrade your access control technology in 2022
Securing unmanned infrastructure at the network edge
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
