Vanderbilt AC5162 Controller
Technical Specification
- Make: Vanderbilt
- Model code: AC5162
- Series: SiPass Series
- Controller Type: Networkable
- Max No. of Doors per Controller: 2
The AC5162 is a wall housing which includes all relevant basic components of the SiPass Access Control System. It is equipped with one Advanced Central Controller ACC, two Dual Reader Interfaces DRI and one power supply. In addition, the AC5162 offers additional assembly places to add further SiPass components, two batteries for an uninterrupted power supply operation or an additional power supply. The wall housing itself consists of a base plate where all components are pre-assembled and a cover. As all modules are already pre-assembled only the connection to the power supply and access readers has to be established. An integrated tamper contact ensures that the housing cannot be opened unnoticed by unauthorized persons.
Read moreMake | Vanderbilt |
---|---|
Manufacturer | Vanderbilt Industries |
Category | Access Control>Access control controllers |
Model code | AC5162 |
Controller Type | Networkable |
Max No. of Doors per Controller | 2 |
Networkable | Yes |
Electrical Specifications | Voltage: 24 V DC |
Physical Specifications | Dimensions mm: 500 x 700 x 200 |
Environmental Specifications | Operating Temp oC: -10 ~ +55 |
Additional info |
The AC5162 is a wall housing which includes all relevant basic components of the SiPass Access Control System. It is equipped with one Advanced Central Controller ACC, two Dual Reader Interfaces DRI and one power supply. In addition, the AC5162 offers additional assembly places to add further SiPass components, two batteries for an uninterrupted power supply operation or an additional power supply. The wall housing itself consists of a base plate where all components are pre-assembled and a cover. As all modules are already pre-assembled only the connection to the power supply and access readers has to be established. An integrated tamper contact ensures that the housing cannot be opened unnoticed by unauthorized persons. |
Download PDF version Download PDF version |
You might be interested in these products
Related Whitepapers
Cybersecurity in Keyless Access Management
Three Essential Reasons To Upgrade Your Access Control Technology In 2022
Securing Unmanned Infrastructure at the Network Edge