Software House GSTAR-ACM-4U cyber-hardened network door controller
Technical Specification
- Make: Software House
- Model code: GSTAR-ACM-4U
- Series: iSTAR Ultra G2
- Controller Type: Networkable
- No of Cardholders: 1,000,000
ACM board in 4U rack mount enclosure Supports up to eight Wiegand, RM or OSDP readers, 24 supervised inputs, and 16 outputs which can be individually wet- or dry-configured Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Embedded lock power management lowers installation costs Advanced controller-to-controller communications for cluster-based antipassback and I/O logic Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware
Read moreMake | Software House |
---|---|
Manufacturer | Software House |
Category | Access Control>Access control controllers |
Model code | GSTAR-ACM-4U |
Series | iSTAR Ultra G2 |
Controller Type | Networkable |
No of Cardholders | 1,000,000 |
Offline Capabilities | Yes |
Networkable | Yes |
Communication Type | Eight RS-485 ports, four full duplex and four half duplex |
Universal / Wiegand Reader Interface | Yes |
Electrical Specifications | Voltage: 12 V DC / 24 V DC |
Physical Specifications |
Dimensions mm: 175 x 445 x 125 Weight g: 4,100 |
Environmental Specifications |
Operating Temp oC: 0 ~ 50 C (32 ~ 122 F) Operating Humidity %: 5 ~ 95 |
Additional info |
|
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The security challenges of data centers
The critical importance of Trusted Execution Environment in access control
Cybersecurity in keyless access management
2025 Trends in video surveillance
Download7 proven solutions for law enforcement key control and asset management
DownloadMaximising security and performance
DownloadGuide for HAAS: New choice of SMB security system
DownloadThe truth behind 9 mobile access myths
Download