Software House GSTAR004 IP edge access door controller
Technical Specification
- Make: Software House
- Model code: GSTAR004
- Series: iSTAR Edge G2
- Controller Type: Standalone
- Max No. of Doors per Controller: 4
iSTAR Edge G2 door controller with metal enclosure, supports four readers Stand-alone IP edge access controller with local database of up to 1,000,000 cardholders Controls and powers all access control devices at the door to minimise installation costs Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Advanced access control feature set including anti-passback, peer-to-peer clustering and local event logic Dual GigE Network ports with IPv6, DHCP and 802.1X support Supports OSDP Secure Channel for encrypted, two-way reader communications Supports embedded High Assurance FICAM operation without additional third-party hardware
Read moreMake | Software House |
---|---|
Manufacturer | Software House |
Category | Access Control>Access control controllers |
Model code | GSTAR004 |
Series | iSTAR Edge G2 |
Controller Type | Standalone |
Max No. of Doors per Controller | 4 |
No of Cardholders | 1,000,000 |
Onboard No/Type of Inputs / Outputs | 8 Supervised Inputs, 4 Relay Outputs |
Universal / Wiegand Reader Interface | Yes |
Reader Max. Distance m | 10 ~ 1200 |
Electrical Specifications | Voltage: 12 V DC / 24 V DC |
Physical Specifications | Weight g: 4,200 |
Environmental Specifications |
Operating Temp oC: 0 ~ 50 C (32 ~ 122 F) Operating Humidity %: 5 ~ 95 |
Additional info |
|
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The security challenges of data centers
The critical importance of Trusted Execution Environment in access control
Cybersecurity in keyless access management
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download