Software House iSTAR Ultra SE - Ultra mode network-ready door controller
Technical Specification
- Make: Software House
- Model code: iSTAR Ultra SE - Ultra mode
- Controller Type: Networkable
- No of Cardholders: 500,000
- Networkable: Yes
Powerful network-ready door controller for up to 32 readers (16 from ACMs) Dedicated DIP switch allows to go from “Pro mode” for use with C•CURE 800/8000 and C•CURE 9000 to “Ultra mode” for use with C•CURE 9000 Dual GigE network ports for redundant network operation Hardened Linux embedded OS for improved security and scalability Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Includes global anti-passback and advanced peer-to-peer clustering Native intrusion zone functionality Manages up to 500,000 cardholders in local memory Socketed relays improve serviceability Dedicated input for fire alarm interlock overrides door locks during fire conditions Onboard 256-bit AES network encryption Great solution for enterprise and government installations
Read moreMake | Software House |
---|---|
Manufacturer | Software House |
Category | Access Control>Access control controllers |
Model code | iSTAR Ultra SE - Ultra mode |
Controller Type | Networkable |
No of Cardholders | 500,000 |
Networkable | Yes |
Communication Type | RS485 |
Onboard No/Type of Inputs / Outputs | 16 Supervised Inputs, 8 Relay Outputs |
Universal / Wiegand Reader Interface | Yes |
Reader Max. Distance m | 150 ~ 1219 |
Electrical Specifications | Voltage: 12 V DC |
Environmental Specifications |
Operating Temp oC: 0 ~ 50 C (32 ~ 122 F) Operating Humidity %: 5 ~ 95 |
Additional info |
|
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
The security challenges of data centers
The critical importance of Trusted Execution Environment in access control
Cybersecurity in keyless access management
The key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
Download5 surprising findings from OT vulnerability assessments
DownloadPalm vein recognition
DownloadPhysical access control
Download