Controller
See Windows Software
See Prices and buy online
|
SPECIFICATIONS
CONTROLLER (EANC 1-4)
Max. doors per controller 4; Completely independent configuration for
each door
Typical authorisation time <0.5s
Maximum number of users - 5000
Network - full duplex, 4-wire RS485 running at 115.2Kbaud
Maximum network segment length 1000m (can be extended using repeaters)
Maximum number of controllers per network segment - 32 , (can be extended
using repeaters)
TCP/IP Ethernet adapter available
L.E.D.s on controller indicate active outputs and network traffic
Available either as bare board or mounted in a steel cabinet with 3A power
supply and room for backup battery
Dimensions 110mm x 140mm x 25mm (with connectors in place)
Real-time clock, maintains controller time in the event of local power
loss
Battery for clock backup: CR2032, 3V coin cell
Audit trail on board, non-volatile memory holds up to 2000 events
Rated Voltage - 12V DC, Operating Voltage - 10V to 14V DC Max.
Outputs - 4 --- 2x relay(COM,NO,NC) 3A at 30V DC, 2x FET 3A at 30V DC
Inputs for egress buttons, door contacts, power supply failure, case tamper
Cover label Black with white text. Separate text adjacent each terminal
with colour-coded connections, and input/output ident. markers
READER (EANR)
'Prox'/RFID, operating at 125 KHz, non-continuous
Supplied with connections pigtail; Cable length - 5m
Maximum read range - 100mm
Operation through glass - giving the option of mounting the reader on
the inside of a window or glass door for vandal proof installation
Maximum cable length from controller to each reader - 100m
easy-3-wire colour-coded reader connections(+12V, Signal, 0V);
handles LED and beeper control as well as Prox read
Readers should not be mounted directly on metal and should be 600mm apart
(otherwise reading distance is impaired)
LED indicators and beeper on readers signal when a tag is authorised/rejected
Max readers per controller - 16
Shape and dimensions - circular, diameter: 55mm, depth : 15mm
Mounting - 1x No.6 screw
Finish Brushed stainless effect self-adhesive decal to front, black contrasting
body sides
Fully potted, suitable for both internal and external mounting
RFID Tags
RFID tags available as key-fobs, ISO cards and clamshells as standard
Windows Software included as standard with the PC interface (RS485 converter
to either RS232 or USB, or ethernet adapter)
Custom system configuration and monitoring application software built
on a Microsoft Jet database core
Familiar easy to use Windows-Explorer style interface
Configuration wizards allow fast and easy setup
Unlimited logging of site activity (audit trail)
Audit trail (site activity) can be exported in a number of formats including
common spreadsheets
Printing of activity log and fire roll-call
PC needs to be connected only to make configuration changes, recover audit
trails, and to support global anti-passback
User Tags added, as required, by the system administrator utilising desktop
reader adjacent to PC
User's Tag authorisation can be deleted via PC
Access rights to each door can be assigned to any tag user, including
which times and days they have access and limiting access to specific
date ranges
Live monitoring of site activity (Tag usage) available, including Photo
ID of user
Live roll-call available, showing who is on/off site
Doors/Users can be grouped to facilitate simple management of access rights
Doors can be configured to unlock at appropriate times
Double-locking feature available on doors, allowing authorisation levels
to be set against users
Fire roll call and anti-passback support by configuring readers to log
entry and exit
Email alerts
Automatic roll-call printing on alert
Multiple controller networks can be connected to the same PC and managed
simultaneously from a single instance of the software
Password protection prevents unauthorised changes to configuration
Search tool facilitates rapid location of doors/users etc. by name
WINDOWS SOFTWARE
Included as standard with the PC interface
Custom system configuration and monitoring application software built
on a Microsoft Jet database core
Familiar easy to use Windows-Explorer style interface
Configuration wizards allow fast and easy setup
Unlimited logging of site activity (audit trail)
Audit trail (site activity) can be exported in a number of formats including
common spreadsheets
Printing of activity log and fire roll-call
PC needs to be connected only to make configuration changes, recover audit
trails, and to support global antipassback
User Tags added, as required, by the system administrator utilising desktop
reader adjacent to PC
User’s Tag authorisation can be deleted via PC
Access rights to each door can be assigned to any tag user, including
which times and days they have access
and limiting access to specific date ranges
Live monitoring of site activity (Tag usage) available, including Photo
ID of user
Live roll-call available, showing who is on/off site
Doors/Users can be grouped to facilitate simple management of access rights
Doors can be configured to unlock at appropriate times
Double-locking feature available on doors, allowing
authorisation levels to be set against users
Fire roll call and anti-passback support by configuring readers to log
entry and exit
Email alerts
Automatic roll-call printing on alert
Multiple controller networks can be connected to the same PC and managed
simultaneously from a single instance of the software
Password protection prevents unauthorised changes to configuration
Search tool facilitates rapid location of doors/users etc. by name
Established in 1990, Coastform applies the
latest advances
in technology to create sophisticated yet beautifully simple
to use solutions. Our product portfolio includes ‘prox’
access control, touch switches, through-glass touch
TOP OF PAGE |
|