Software House ESTAR002 two-reader IP edge access door controller

Technical Specification

Features:
  • Make: Software House
  • Model code: ESTAR002
  • Series: iSTAR Edge
  • Controller Type: Networkable
  • No of Cardholders: 400,000
Read more
Additional info:

With enclosure Controls and powers all access control devices at the door to minimise installation costs Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localised access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Read more
Make Software House
Manufacturer Software House
Category Access Control>Access control controllers
Model code ESTAR002
Series iSTAR Edge
Controller Type Networkable
No of Cardholders 400,000
Networkable Yes
Communication Type TCP/IP, RS485
Onboard No/Type of Inputs / Outputs 8 Supervised Inputs, 4 Relay Outputs
Universal / Wiegand Reader Interface Yes
Reader Max. Distance m 150 ~ 1219
Electrical Specifications Voltage: 12 V DC / 24 V DC
Physical Specifications Weight g: 4,200
Environmental Specifications Operating Temp oC: 0 ~ 50 C (32 ~ 122 F)
Operating Humidity %: 5 ~ 95
Additional info
  • With enclosure
  • Controls and powers all access control devices at the door to minimise installation costs
  • Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering
  • Localised access control decision-making with storage for over 400,000 personnel records
  • Dedicated input for fire alarm interlock releases door locks during fire conditions
  • Local LCD and LEDs provide clear startup and troubleshooting information
  • AES 256 network encryption; FIPS 197 listed
  • Compatible with C•CURE 9000 and C•CURE 800/8000
Download PDF version Download PDF version

Related Whitepapers

The security challenges of data centers

The critical importance of Trusted Execution Environment in access control

Cybersecurity in keyless access management

Quick poll
What's the primary benefit of integrating access control with video surveillance?