Software House USTAR-GCM-2U network-ready door controller

Technical Specification

Features:
  • Make: Software House
  • Model code: USTAR-GCM-2U
  • Series: iSTAR Ultra
  • Controller Type: Networkable
  • No of Cardholders: 500,000
Read more
Additional info:

GCM board with rack enclosure Controls up to four ACMs (Access Control Modules) Embedded lock power management lowers installation costs Hardened Linux embedded OS for improved security and scalability Includes global anti-passback and advanced peer-to-peer clustering Native intrusion zone functionality LCD provides important controller status and diagnostics information Manages up to 500,000 cardholders in local memory Dedicated input for fire alarm interlock overrides door locks during fire conditions Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications

Read more
Make Software House
Manufacturer Software House
Category Access Control>Access control controllers
Model code USTAR-GCM-2U
Series iSTAR Ultra
Controller Type Networkable
No of Cardholders 500,000
Offline Capabilities Yes
Networkable Yes
Communication Type RS485
Universal / Wiegand Reader Interface Yes
Electrical Specifications Voltage: 12 V DC
Physical Specifications Dimensions mm: 252 x 445 x 86
Weight g: 4,300
Environmental Specifications Operating Temp oC: 0 ~ 50 C (32 ~ 122 F)
Operating Humidity %: 5 ~ 95
Additional info
  • GCM board with rack enclosure
  • Controls up to four ACMs (Access Control Modules)
  • Embedded lock power management lowers installation costs
  • Hardened Linux embedded OS for improved security and scalability
  • Includes global anti-passback and advanced peer-to-peer clustering
  • Native intrusion zone functionality
  • LCD provides important controller status and diagnostics information
  • Manages up to 500,000 cardholders in local memory
  • Dedicated input for fire alarm interlock overrides door locks during fire conditions
  • Onboard 256-bit AES network encryption
  • Supports OSDP Secure Channel for encrypted reader communications
Download PDF version Download PDF version

Related Whitepapers

The security challenges of data centers

The critical importance of Trusted Execution Environment in access control

Cybersecurity in keyless access management

Quick poll
What is the most significant challenge facing smart building security today?