Software House USTAR-LT16-EM network-ready door controller

Technical Specification

Features:
  • Make: Software House
  • Model code: USTAR-LT16-EM
  • Series: iSTAR Ultra LT
  • Controller Type: Networkable
  • No of Cardholders: 500,000
Read more
Additional info:

Supports 16 readers in metal enclosure Powerful IP-ready door controller Hardened Linux embedded OS for improved security and scalability Onboard 256-bit AES network encryption Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution Native intrusion zone functionality Includes global anti-passback and advanced peer-to-peer clustering Manages up to 500,000 cardholders in local memory

Read more
Make Software House
Manufacturer Software House
Category Access Control>Access control controllers
Model code USTAR-LT16-EM
Series iSTAR Ultra LT
Controller Type Networkable
No of Cardholders 500,000
Networkable Yes
Communication Type RS485
Onboard No/Type of Inputs / Outputs 4 Supervised Inputs, 2 Relay Outputs
Universal / Wiegand Reader Interface Yes
Reader Max. Distance m 150 ~ 1219
Electrical Specifications Voltage: 12 V DC, PoE
Physical Specifications Dimensions mm: 392 x 311 x 84
Weight g: 1,520
Environmental Specifications Operating Temp oC: 0 ~ 50 C (32 ~ 122 F)
Operating Humidity %: 5 ~ 95
Additional info
  • Supports 16 readers in metal enclosure
  • Powerful IP-ready door controller
  • Hardened Linux embedded OS for improved security and scalability
  • Onboard 256-bit AES network encryption
  • Enables wireless locks to communicate with C•CURE 9000 providing a fully integrated and managed lock solution
  • Native intrusion zone functionality
  • Includes global anti-passback and advanced peer-to-peer clustering
  • Manages up to 500,000 cardholders in local memory
Download PDF version Download PDF version

Related Whitepapers

The security challenges of data centers

The critical importance of Trusted Execution Environment in access control

Cybersecurity in keyless access management

Quick poll
What's the primary benefit of integrating access control with video surveillance?