Fermax 1490 external doorlock relay MEET
Technical Specification
- Make: Fermax
- Model code: 1490
- Series: MEET IP SYSTEM
- Operating Temperature oC: -40 ~ +70 C (-40 ~ +158 F)
- Operating Humidity %: 20 ~ 80
The DUAL RELAY MEET MODULE can be installed as an auxiliary element for MILO/KIN w/keypad panels or MILO 1W panels, as well, having a different performance in each case:MILO/KIN DIGITAL panelsWhen installed indoors, it works as a secury device, since the electric lock is controled directly from a relay of this device instead of the relay in the panel.In that way is not posible to manipulate the wires of panel, installed outodoor, for opening the door maliciously.MILO 1W panelsRelay 1 is activated simultaneously with the panel relay, when the door is opened fron the monitor.Relay 2 allows the control of a secoundary electric lok for the garage, garden, etc.In both cases, it is also posible to activate manually the relays by means of exit pushbutons.
Read moreMake | Fermax |
---|---|
Manufacturer | Fermax Electrónica S.A.U. |
Category | Access Control>Audio, video or keypad entry |
Model code | 1490 |
Series | MEET IP SYSTEM |
Environmental Specifications |
Operating Temperature oC: -40 ~ +70 C (-40 ~ +158 F) Operating Humidity %: 20 ~ 80 Protection: IP30 |
Electrical Specifications | Voltage: 12 V DC |
Physical Specifications |
Dimensions mm: 115 x 57 x 34 Weight g: 110 |
Additional info |
The DUAL RELAY MEET MODULE can be installed as an auxiliary element for MILO/KIN w/keypad panels or MILO 1W panels, as well, having a different performance in each case: |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The critical role of access control in K-12 school security
Three essential reasons to upgrade your access control technology in 2022
10 top insights in access, cloud and more
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download