TAC i2810/2814 Access control controller
Technical Specification
- Make: TAC
- Model code: i2810/2814
- Series: Infinet II Series
- Controller Type: Standalone
- Networkable: Yes
The i2810 series also features Flash memory, increased user memory, and a fast (32-bit) processor for faster scan times, with plenty of memory available for data logging of your critical data. The i2810 communicates with the entire Andover Controls Infinet™ RS-485 field bus; i.e., both Infinet and Infinet II controllers, and is compatible with both the Continuum CyberStation and Infinity SX 8000 front-ends. Up to 254 Infinet devices can be networked to any Andover network controller.
Read moreMake | TAC |
---|---|
Manufacturer | TAC Satchwell |
Category | Access Control>Access control controllers |
Model code | i2810/2814 |
Controller Type | Standalone |
Networkable | Yes |
Communication Type | RS-485 |
Onboard No/Type of Inputs / Outputs | 8 inputs, 8 outputs |
Universal / Wiegand Reader Interface | Yes |
Electrical Specifications |
Voltage: 24 V AC Power Consumption: 30 VA |
Physical Specifications |
Dimensions mm: 229 x 153 x 54 Weight g: 750 |
Environmental Specifications |
Operating Temp oC: -23 ~ +60 Operating Humidity %: 10 ~ 95 |
Additional info |
The i2810 series also features Flash memory, increased user memory, and a fast (32-bit) processor for faster scan times, with plenty of memory available for data logging of your critical data. The i2810 communicates with the entire Andover Controls Infinet™ RS-485 field bus; i.e., both Infinet and Infinet II controllers, and is compatible with both the Continuum CyberStation and Infinity SX 8000 front-ends. Up to 254 Infinet devices can be networked to any Andover network controller. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Cybersecurity in keyless access management
Three essential reasons to upgrade your access control technology in 2022
Securing unmanned infrastructure at the network edge
The ultimate guide to mastering key control
DownloadUsing artificial intelligence (AI) to automate physical security systems
DownloadA modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
Download