Software House ESTAR002-MB two-reader IP edge access door controller

Technical Specification

Features:
  • Make: Software House
  • Model code: ESTAR002-MB
  • Series: iSTAR Edge
  • Controller Type: Networkable
  • No of Cardholders: 400,000
Read more
Additional info:

Motherboard only Controls and powers all access control devices at the door to minimise installation costs Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localised access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Read more
Make Software House
Manufacturer Software House
Category Access Control>Access control controllers
Model code ESTAR002-MB
Series iSTAR Edge
Controller Type Networkable
No of Cardholders 400,000
Networkable Yes
Communication Type TCP/IP, RS485
Onboard No/Type of Inputs / Outputs 8 Supervised Inputs, 4 Relay Outputs
Universal / Wiegand Reader Interface Yes
Reader Max. Distance m 150 ~ 1219
Physical Specifications Dimensions mm: 190 x 146 x 25
Environmental Specifications Operating Temp oC: 0 ~ 50 C (32 ~ 122 F)
Operating Humidity %: 5 ~ 95
Additional info
  • Motherboard only
  • Controls and powers all access control devices at the door to minimise installation costs
  • Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering
  • Localised access control decision-making with storage for over 400,000 personnel records
  • Dedicated input for fire alarm interlock releases door locks during fire conditions
  • Local LCD and LEDs provide clear startup and troubleshooting information
  • AES 256 network encryption; FIPS 197 listed
  • Compatible with C•CURE 9000 and C•CURE 800/8000
Download PDF version Download PDF version

Related Whitepapers

The security challenges of data centers

The critical importance of Trusted Execution Environment in access control

Cybersecurity in keyless access management

Quick poll
What's the primary benefit of integrating access control with video surveillance?