HID Mercury™ M5-16DOR Controller
Technical Specification
- Make: HID
- Model code: Mercury™ M5-16DOR
- Series: M5 Bridge
- Communication Type: 9600, 19200, 38400, or 115200 bps, asynchronous
- Voltage: 12 V DC
The M5 Bridge was built from the existing HID Mercury controller platform and has been redesigned to fit the specific physical parameters of Casi Micro5 enclosures used in Picture Perfect™, Secure Perfect™ and Facility Commander™ access systems. Key Benefits: Delivers plug and play format for a “screwdriver-less” changeover in Casi upgrades Provides a bridge from legacy systems to new and future access control systems Provides all current and future HID Mercury feature sets and future feature upgrades to the traditional HID Mercury platform Does not require power management controller (standard in the legacy products)
Read moreMake | HID |
---|---|
Manufacturer | HID |
Category | Access Control>Access control controllers |
Model code | Mercury™ M5-16DOR |
Communication Type | 9600, 19200, 38400, or 115200 bps, asynchronous |
Electrical Specifications |
Voltage: 12 V DC Power Consumption: 40mA |
Physical Specifications |
Dimensions mm: 260 x 89 x 18 Weight g: 144 |
Environmental Specifications |
Operating Temp oC: 0 ~ 50 C (32 ~ 122 F) Operating Humidity %: 5 ~ 95 |
Additional info |
The M5 Bridge was built from the existing HID Mercury controller platform and has been redesigned to fit the specific physical parameters of Casi Micro5 enclosures used in Picture Perfect™, Secure Perfect™ and Facility Commander™ access systems. Key Benefits:
|
Download PDF version Download PDF version |
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control software
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
A modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadSecurity practices for hotels
Download2025 Trends in video surveillance
DownloadMaximising security and performance
Download