DSX DSX-1022 Access control controller
Technical Specification
- Make: DSX
- Model code: DSX-1022
- Controller Type: Standalone
- Max No. of Doors per Controller: 2
- Networkable: Yes
The DSX-1022 is an independent processing 2 door package designed to be a cost effective building block platform that allows expansion in a scalable manner. Each controller can be used in conjunction with all other DSX controllers as master or slave in the controller network. The DSX-1022 is compatible with Wiegand, Barium Ferrite, Proximity, Bar Code, Magnetic Stripe, and Biometric readers. The DSX-1022 has a standard configuration of 512K of Flash ROM and 512K of RAM. The DSX-1022 communicates with the WinDSX Communication Server via TCP/IP LAN communication, Direct Serial Port connect, and Dial-up Phone Modem.
Read moreMake | DSX |
---|---|
Manufacturer | DSX - Europe Ltd. |
Category | Access Control>Access control controllers |
Model code | DSX-1022 |
Controller Type | Standalone |
Max No. of Doors per Controller | 2 |
Networkable | Yes |
Communication Type | TCP/IP |
Onboard No/Type of Inputs / Outputs | 8 inputs, 4 outputs |
Universal / Wiegand Reader Interface | Yes |
Electrical Specifications |
Voltage: 16.5 V AC Power Consumption: 33 W |
Physical Specifications |
Dimensions mm: 393 x 342 x 152 Weight g: 726 |
Environmental Specifications |
Operating Temp oC: 0 ~ 55 Operating Humidity %: 0 ~ 95 |
Additional info | The DSX-1022 is an independent processing 2 door package designed to be a cost effective building block platform that allows expansion in a scalable manner. Each controller can be used in conjunction with all other DSX controllers as master or slave in the controller network. The DSX-1022 is compatible with Wiegand, Barium Ferrite, Proximity, Bar Code, Magnetic Stripe, and Biometric readers. The DSX-1022 has a standard configuration of 512K of Flash ROM and 512K of RAM. The DSX-1022 communicates with the WinDSX Communication Server via TCP/IP LAN communication, Direct Serial Port connect, and Dial-up Phone Modem. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Cybersecurity in keyless access management
Three essential reasons to upgrade your access control technology in 2022
Securing unmanned infrastructure at the network edge
A modern guide to data loss prevention
DownloadThe truth behind 9 mobile access myths
Download7 proven solutions for law enforcement key control and asset management
DownloadAccess control system planning phase 2
DownloadSecurity practices for hotels
Download