Bosch ISC-BDL2-WP12G blue line gen2 tritech motion detector
Technical Specification
- Make: Bosch
- Model code: ISC-BDL2-WP12G
- PIR Detectors: Yes
- Infra Red Beams: Yes
- Coverage/ Range m: 12 x 12
The Blue Line Gen2 TriTech motion detectors use a combination of passive infrared (PIR) and microwave detection technologies with advanced signal processing. The pet-friendly (-WP) models generate alarms for human intruders without generating false alarms for pets. Some of its functions include wall-to-wall coverage, self-locking enclosure, sealed optics and electronics as well as first step processing.
Read moreMake | Bosch |
---|---|
Manufacturer | Bosch Security Systems |
Category | Intruder Alarms>Intruder detectors |
Model code | ISC-BDL2-WP12G |
PIR Detectors | Yes |
Infra Red Beams | Yes |
Coverage/ Range m | 12 x 12 |
Microwave | Yes |
Pet Tolerance | Yes |
Power Consumption | 10 mA |
Sealed Optics | Yes |
Mount Type | Surface, Semi-Flush |
Electrical Specifications | Power Supply: 9 ~ 15 V DC |
Physical Specifications | Dimensions mm: 105 x 61 x 44 |
Environmental Specifications | Operating Temp oC: -30 ~ +55 C (-22 ~ +130 F) |
Additional info | The Blue Line Gen2 TriTech motion detectors use a combination of passive infrared (PIR) and microwave detection technologies with advanced signal processing. The pet-friendly (-WP) models generate alarms for human intruders without generating false alarms for pets. Some of its functions include wall-to-wall coverage, self-locking enclosure, sealed optics and electronics as well as first step processing. |
Download PDF version Download PDF version |
You might be interested in these products
- See other Bosch products
- Bosch IP Dome cameras
- Bosch Dome cameras
- Bosch CCTV cameras
- Bosch IP cameras
- Bosch Network video recorders (NVRs)
Related Whitepapers
Market Report: Cannabis at a glance
Optimise your business with analytics and AI
The key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
DownloadThe truth behind 9 mobile access myths
Download5 surprising findings from OT vulnerability assessments
DownloadPhysical access control
Download