Inner Range FE3000 Intruder alarm communicator
Technical Specification
- Make: Inner Range
- Model code: FE3000
- Series: Concept 3000 / Access 4000 Series
- Digital Communicators: Yes
- Transmission Media: GSM transmission
The FE3000 can be used to add additional reporting paths, such as IP, CDMA, GPRS or GSM to any CID reporting alarm panel. All paths are monitored and if one path fails then that failure, along with any alarms, is reported via another path. The FE3000 can also poll the alarm panel as often as every five monutes to ensure that it is operating correctly. Any panel failure can then be immediately reported. The FE3000 truely adds another dimension to any alarm panel it is connected to.
Read moreMake | Inner Range |
---|---|
Manufacturer | Inner Range |
Category | Intruder Alarms>Intruder alarm communicators |
Model code | FE3000 |
Series | Concept 3000 / Access 4000 Series |
Digital Communicators | Yes |
Transmission Media | GSM transmission |
No of Channels | 12 channels |
No of Messages | 32 messages |
No of Telephone Messages | 32 telephone messages |
Standalone | Yes |
No of Inputs | 12 |
No of Outputs | 8 |
Electrical Specifications | Power Supply: 1.5 A |
Physical Specifications |
Weight g: 4 kg Dimensions mm: 375 x 190 x 72 |
Environmental Specifications | Operating Temp oC: 0 ~ +50 |
Additional info | The FE3000 can be used to add additional reporting paths, such as IP, CDMA, GPRS or GSM to any CID reporting alarm panel. All paths are monitored and if one path fails then that failure, along with any alarms, is reported via another path. The FE3000 can also poll the alarm panel as often as every five monutes to ensure that it is operating correctly. Any panel failure can then be immediately reported. The FE3000 truely adds another dimension to any alarm panel it is connected to. |
Download PDF version Download PDF version |
Related Whitepapers
IoT connectivity
11 advantages of a combined system for access control and intrusion
Boosting on-site safety and security
The ultimate guide to mastering key control
DownloadUsing artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
Download