HID MR16OUT-S3 interface panel

Technical Specification

Features:
  • Make: HID
  • Model code: MR16OUT-S3
  • Series: MR SIO Series 3
  • Controller Type: Networkable
  • Networkable: Yes
Read more
Additional info:

16 programmable relay outputs; 2 dedicated inputs AES 128/256 Data Encryption Easily integrates lighting, heating/cooling, door or elevator control systems Initiates commands by operator, by time schedules, or by events Built-in capacity to control and respond to external device commands Allows the clustering of up to 16 uniquely monitored devices easily and compactly RS-485 host connectivity High performance, reliable platform enables use of hardware with HID Mercury OEM partners software solutions Adds functionality and flexibility to existing access control systems Embedded crypto memory chip provides secured layer of encryption to protect sensitive data

Read more
Make HID
Manufacturer HID
Category Access Control>Access control controllers
Model code MR16OUT-S3
Series MR SIO Series 3
Controller Type Networkable
Networkable Yes
Communication Type RS–485
Onboard No/Type of Inputs / Outputs 16 programmable relay outputs / 2 dedicated inputs
Electrical Specifications Voltage: 12 ~ 24 V DC
Physical Specifications Dimensions mm: 152 x 203 x 25
Environmental Specifications Operating Temp oC: 0 ~ 70 C (32 ~ 158 F)
Operating Humidity %: 5 ~ 95
Additional info
  • 16 programmable relay outputs; 2 dedicated inputs
  • AES 128/256 Data Encryption
  • Easily integrates lighting, heating/cooling, door or elevator control systems
  • Initiates commands by operator, by time schedules, or by events
  • Built-in capacity to control and respond to external device commands
  • Allows the clustering of up to 16 uniquely monitored devices easily and compactly
  • RS-485 host connectivity
  • High performance, reliable platform enables use of hardware with HID Mercury OEM partners software solutions
  • Adds functionality and flexibility to existing access control systems
  • Embedded crypto memory chip provides secured layer of encryption to protect sensitive data
Download PDF version Download PDF version

Related Whitepapers

The truth behind 9 mobile access myths

6 good reasons to embrace mobile credentialing

Three essential reasons to upgrade your access control technology in 2022

Quick poll
What's the primary benefit of integrating access control with video surveillance?