HID V2000
Technical Specification
- Make: HID
- Model code: V2000
- Series: VertX
- Controller Type: Networkable
- Max No. of Doors per Controller: 2
The HID VertX products provide a complete and fully featured hardware/firmware infrastructure for OEM access control software host systems, communicating via industry standard TCP/IP protocol, over 10/100 Mbps Ethernet, or the Internet. It can also interface with a Windows DLL. The V2000 boasts a 32- bit RISC processor running the Linux Operating System. Onboard flash memory allows program updates to be downloaded via the network.
Read moreMake | HID |
---|---|
Manufacturer | HID |
Category | Access Control>Access control controllers |
Model code | V2000 |
Controller Type | Networkable |
Max No. of Doors per Controller | 2 |
No of Cardholders | 44,000 |
Networkable | Yes |
Communication Type | TCP/IP |
Universal / Wiegand Reader Interface | Yes |
Electrical Specifications |
Voltage: 12 ~ 18 V DC Power Consumption: 160 mA |
Physical Specifications |
Dimensions mm: 147.32 x 122.55 x 32.38 Weight g: 380 |
Environmental Specifications |
Operating Temp oC: 0 ~ 50 Operating Humidity %: 5 ~ 95 |
Additional info | The HID VertX products provide a complete and fully featured hardware/firmware infrastructure for OEM access control software host systems, communicating via industry standard TCP/IP protocol, over 10/100 Mbps Ethernet, or the Internet. It can also interface with a Windows DLL. The V2000 boasts a 32- bit RISC processor running the Linux Operating System. Onboard flash memory allows program updates to be downloaded via the network. |
Download PDF version Download PDF version |
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control software
Related Whitepapers
The 2024 state of physical access trend report
6 good reasons to embrace mobile credentialing
Three essential reasons to upgrade your access control technology in 2022
A modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
DownloadSecurity practices for hotels
Download