DSX Jetway Door Extended Bypass application
Technical Specification
- Make: DSX
- Model code: Jetway Door Extended Bypass
- Time & Attendance: Yes
DSX Jetway Door Extended Bypass require constant monitoring but often require an extended bypass in which the door can be propped open for a longer than normal amount of time. However the time the door is bypassed for normal entry and exit cannot be near as long as it is for loading or unloading. DSX can accommodate two different bypass times using a Code to Input and Time Zone link. Presenting a Card or Card+PIN once grants the card holder access. If the Card or Card+PIN is used a second time within 5 seconds the door is unlocked as normal but now bypassed for the extended time. Once the door is shut it is relocked.
Read moreMake | DSX |
---|---|
Manufacturer | DSX - Europe Ltd. |
Category | Access Control>Access control software |
Model code | Jetway Door Extended Bypass |
Time & Attendance | Yes |
Additional info | DSX Jetway Door Extended Bypass require constant monitoring but often require an extended bypass in which the door can be propped open for a longer than normal amount of time. However the time the door is bypassed for normal entry and exit cannot be near as long as it is for loading or unloading. DSX can accommodate two different bypass times using a Code to Input and Time Zone link. Presenting a Card or Card+PIN once grants the card holder access. If the Card or Card+PIN is used a second time within 5 seconds the door is unlocked as normal but now bypassed for the extended time. Once the door is shut it is relocked. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download