HID Aero™ X200 Input Monitor Interface Module

Technical Specification

Features:
Read more
Additional info:

Custom Rules Processing - Use X200 in conjunction with custom rules engine on X1100 to create elaborate rules for handling input states Supervised/Unsupervised - Inputs Supervised inputs can support custom A-to-D conversion IO Module Encryption - Enhance security between intelligent controller and IO modules with AES encryption Crypto Chips - Protect against malicious attacks to keep keys and passwords safe Threat Levels - Define up to 7 different threat levels that are used to instantaneously adjust user access during lockdowns and lockouts Open Architecture – Work with a variety of software partners over time without any re-investment in hardware

Read more
Make HID
Manufacturer HID Global
Model code Aero™ X200
Series HID® Aero™ Controllers
Controller Type Networkable
Networkable Yes
Communication Type RS-485
Onboard No/Type of Inputs / Outputs 19 Inputs / 2 Outputs
Electrical Specifications Voltage: 12 ~ 24 V DC
Physical Specifications Dimensions mm: 164 x 140 x 26
Weight g: 326
Environmental Specifications Operating Temp oC: 0 ~ 70 C (32 ~ 158 F)
Operating Humidity %: 5 ~ 85
Additional info
  • Custom Rules Processing - Use X200 in conjunction with custom rules engine on X1100 to create elaborate rules for handling input states
  • Supervised/Unsupervised - Inputs Supervised inputs can support custom A-to-D conversion
  • IO Module Encryption - Enhance security between intelligent controller and IO modules with AES encryption
  • Crypto Chips - Protect against malicious attacks to keep keys and passwords safe
  • Threat Levels - Define up to 7 different threat levels that are used to instantaneously adjust user access during lockdowns and lockouts
  • Open Architecture – Work with a variety of software partners over time without any re-investment in hardware
Download PDF version Download PDF version

Related Whitepapers

3 Ways To Increase Workplace Safety And Resource Efficiency

Mobile Access- What You Need To Know (Part 1)

Why Outdated Access Control Systems Are a Big Problem