Software House STAR008-4URM rack mount door controller

Technical Specification

Features:
  • Make: Software House
  • Model code: STAR008-4URM
  • Series: iSTAR Pro 4U Rack Mount
  • Controller Type: Networkable
  • Max No. of Doors per Controller: 16
Read more
Additional info:

Leverages 4-post IT racks or standard 2-post Telco racks Includes all the necessary components required to control up to 16 doors, in one enclosure Supports 8 RM readers with integral lock power Front panel LCD and LEDs enable quick diagnostics and troubleshooting Hinged cover provides easy access to diagnostic port Dual network LAN ports offer redundant network connection Fully compatible with C•CURE 800/8000 and C•CURE 9000 Supports multiple cards per cardholder and multiple card formats including PIV II extended formats

Read more
Make Software House
Manufacturer Software House
Category Access Control>Access control controllers
Model code STAR008-4URM
Series iSTAR Pro 4U Rack Mount
Controller Type Networkable
Max No. of Doors per Controller 16
Networkable Yes
Communication Type RS485
Onboard No/Type of Inputs / Outputs 32 Inputs, 16 Outputs
Electrical Specifications Voltage: 115 V AC
Power Consumption: 175 W
Physical Specifications Dimensions mm: 180 x 480 x 740
Weight g: 34,000
Environmental Specifications Operating Temp oC: 0 ~ 50 C (32 ~ 122 F)
Operating Humidity %: 5 ~ 95
Additional info
  • Leverages 4-post IT racks or standard 2-post Telco racks
  • Includes all the necessary components required to control up to 16 doors, in one enclosure
  • Supports 8 RM readers with integral lock power
  • Front panel LCD and LEDs enable quick diagnostics and troubleshooting
  • Hinged cover provides easy access to diagnostic port
  • Dual network LAN ports offer redundant network connection
  • Fully compatible with C•CURE 800/8000 and C•CURE 9000
  • Supports multiple cards per cardholder and multiple card formats including PIV II extended formats
Download PDF version Download PDF version

Related Whitepapers

The security challenges of data centers

The critical importance of Trusted Execution Environment in access control

Cybersecurity in keyless access management

Quick poll
What's the primary benefit of integrating access control with video surveillance?