DSX Jetway Door Extended Bypass application
Technical Specification
- Make: DSX
- Model code: Jetway Door Extended Bypass
- Time & Attendance: Yes
DSX Jetway Door Extended Bypass require constant monitoring but often require an extended bypass in which the door can be propped open for a longer than normal amount of time. However the time the door is bypassed for normal entry and exit cannot be near as long as it is for loading or unloading. DSX can accommodate two different bypass times using a Code to Input and Time Zone link. Presenting a Card or Card+PIN once grants the card holder access. If the Card or Card+PIN is used a second time within 5 seconds the door is unlocked as normal but now bypassed for the extended time. Once the door is shut it is relocked.
Read moreMake | DSX |
---|---|
Manufacturer | DSX - Europe Ltd. |
Category | Access Control>Access control software |
Model code | Jetway Door Extended Bypass |
Time & Attendance | Yes |
Additional info | DSX Jetway Door Extended Bypass require constant monitoring but often require an extended bypass in which the door can be propped open for a longer than normal amount of time. However the time the door is bypassed for normal entry and exit cannot be near as long as it is for loading or unloading. DSX can accommodate two different bypass times using a Code to Input and Time Zone link. Presenting a Card or Card+PIN once grants the card holder access. If the Card or Card+PIN is used a second time within 5 seconds the door is unlocked as normal but now bypassed for the extended time. Once the door is shut it is relocked. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Access and security in the age of hybrid working
Cybersecurity in keyless access management
The critical role of access control in K-12 school security
A modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadSecurity practices for hotels
Download2025 Trends in video surveillance
DownloadMaximising security and performance
Download