Software House IP-ACM2A-EP 2-reader Ethernet door module
Technical Specification
- Make: Software House
- Model code: IP-ACM2A-EP
- Controller Type: Networkable
- No of Cardholders: 1000
- Offline Capabilities: Yes
In plastic enclosure Cost-effective IP access control module Up to 32 IP-ACMs per iSTAR Ultra and iSTAR Ultra SE, and up to 8 per iSTAR Ultra LT Convenient second port for biometric reader or efficient network diagnostics Wet lock outputs provide up to 0.75A each for ability to power most lock types Highly distributed architecture PoE or PoE Plus 10/100/GigE connectivity AES-256 network encryption Configurable offline mode Easy setup with static IP or DHCP Small, ‘office-ready” enclosure design Full duplex RS-485 on board to leverage future technology Selectable “wet” and dry output relays OSDP support fosters device interoperability Supports TLS 1.2 and 802.1X secure network protocols for protection against the threat of cyber attacks
Read moreMake | Software House |
---|---|
Manufacturer | Software House |
Category | Access Control>Access control controllers |
Model code | IP-ACM2A-EP |
Controller Type | Networkable |
No of Cardholders | 1000 |
Offline Capabilities | Yes |
Networkable | Yes |
Communication Type | RS485 |
Onboard No/Type of Inputs / Outputs | 4 Supervised Inputs, 2 Relay Outputs |
Universal / Wiegand Reader Interface | Yes |
Reader Max. Distance m | 10 ~ 1219 |
Electrical Specifications | Voltage: 12 V DC / 24 V DC / PoE / PoE Plus |
Physical Specifications |
Dimensions mm: 183 x 307 x 62 Weight g: 700 |
Environmental Specifications |
Operating Temp oC: 0 ~ 50 C (32 ~ 122 F) Operating Humidity %: 5 ~ 95 |
Additional info |
|
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The security challenges of data centers
The critical importance of Trusted Execution Environment in access control
Cybersecurity in keyless access management
Palm vein recognition
DownloadThe key to unlocking K12 school safety grants
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadPhysical access control
DownloadCybersecurity for enterprise: The essential guide to protecting your business
Download