Software House ESTAR002-MB Two-Reader IP Edge Access Door Controller

Technical Specification

Features:
  • Make: Software House
  • Model code: ESTAR002-MB
  • Series: iSTAR Edge
  • Controller Type: Networkable
  • No of Cardholders: 400,000
Read more
Additional info:

Motherboard only Controls and powers all access control devices at the door to minimize installation costs Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering Localized access control decision-making with storage for over 400,000 personnel records Dedicated input for fire alarm interlock releases door locks during fire conditions Local LCD and LEDs provide clear startup and troubleshooting information AES 256 network encryption; FIPS 197 listed Compatible with C•CURE 9000 and C•CURE 800/8000

Read more
Make Software House
Manufacturer Software House, Tyco International
Model code ESTAR002-MB
Series iSTAR Edge
Controller Type Networkable
No of Cardholders 400,000
Networkable Yes
Communication Type TCP/IP, RS485
Onboard No/Type of Inputs / Outputs 8 Supervised Inputs, 4 Relay Outputs
Universal / Wiegand Reader Interface Yes
Reader Max. Distance m 150 ~ 1219
Physical Specifications Dimensions mm: 190 x 146 x 25
Environmental Specifications Operating Temp oC: 0 ~ 50 C (32 ~ 122 F)
Operating Humidity %: 5 ~ 95
Additional info
  • Motherboard only
  • Controls and powers all access control devices at the door to minimize installation costs
  • Powerful iSTAR feature set including anti-passback and advanced peer-to-peer clustering
  • Localized access control decision-making with storage for over 400,000 personnel records
  • Dedicated input for fire alarm interlock releases door locks during fire conditions
  • Local LCD and LEDs provide clear startup and troubleshooting information
  • AES 256 network encryption; FIPS 197 listed
  • Compatible with C•CURE 9000 and C•CURE 800/8000
Download PDF version Download PDF version

Related Whitepapers

Protecting Dormitory Residents and Assets

Top 5 Ways to Ensure Visitor Safety and Security

Moving to Mobile: A Guide for Businesses Switching to Mobile Access Control