Software House IP-ACM2A-EP 2-reader Ethernet door module
Technical Specification
- Make: Software House
- Model code: IP-ACM2A-EP
- Controller Type: Networkable
- No of Cardholders: 1000
- Offline Capabilities: Yes
In plastic enclosure Cost-effective IP access control module Up to 32 IP-ACMs per iSTAR Ultra and iSTAR Ultra SE, and up to 8 per iSTAR Ultra LT Convenient second port for biometric reader or efficient network diagnostics Wet lock outputs provide up to 0.75A each for ability to power most lock types Highly distributed architecture PoE or PoE Plus 10/100/GigE connectivity AES-256 network encryption Configurable offline mode Easy setup with static IP or DHCP Small, ‘office-ready” enclosure design Full duplex RS-485 on board to leverage future technology Selectable “wet” and dry output relays OSDP support fosters device interoperability Supports TLS 1.2 and 802.1X secure network protocols for protection against the threat of cyber attacks
Read moreMake | Software House |
---|---|
Manufacturer | Software House |
Category | Access Control>Access control controllers |
Model code | IP-ACM2A-EP |
Controller Type | Networkable |
No of Cardholders | 1000 |
Offline Capabilities | Yes |
Networkable | Yes |
Communication Type | RS485 |
Onboard No/Type of Inputs / Outputs | 4 Supervised Inputs, 2 Relay Outputs |
Universal / Wiegand Reader Interface | Yes |
Reader Max. Distance m | 10 ~ 1219 |
Electrical Specifications | Voltage: 12 V DC / 24 V DC / PoE / PoE Plus |
Physical Specifications |
Dimensions mm: 183 x 307 x 62 Weight g: 700 |
Environmental Specifications |
Operating Temp oC: 0 ~ 50 C (32 ~ 122 F) Operating Humidity %: 5 ~ 95 |
Additional info |
|
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The security challenges of data centers
The critical importance of Trusted Execution Environment in access control
Cybersecurity in keyless access management
Using artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
Download