5356
Previous Page: Building Access System
PDFDownload White Paper

Building Access System

Keypad or Proximity Card Reader:
When you install the Building Access System at your sites, you may choose between numeric keypads and proximity card readers. Both options are weather-resistant and support all advanced Building Access System features.

Entry Control Unit (ECU):
This device is mounted on the interior of the site near the entry point. The ECU accepts data from the attached keypad or proxy reader and passes it upward for validation. If a correct code is received, the ECU will release the door strike, unlocking the door. Up to 16 ECU's may be attached to a single NetGuardian 832A G4.

NetGuardian 832A G4:
The NetGuardian serves as a site manager, supporting up to 16 entry points. It downloads a complete user database from T/Mon, allowing continued access control if the connection with T/Mon is lost.

T/Mon:
T/Mon is the central access control and monitoring device. Up to 1300 user profiles may be databased from within T/Mon, and T/Mon processes and logs all entries and exits. In the event of an acces-related alarm, T/Mon will notify you with any of its standard notification options.


Building Access System Specifications

Proxy Reader

Dimensions: 3"x 5" x 2.5"
Mounting: Wall Mountable
Environmentally Sealed: Yes

Entry Control Unit

Dimensions:6.5" x 6" x 1.5
Mounting: Wall Mountable
Fuse: GMT 1/4 Amp
Power Input: -48VDC
Temperature Range: 32 to 140 F
Humidity Range: 0% to 95%
non-condensing
Interfaces: RS422

Fault Tolerance For Disaster Recovery

This property enables a system to continue operating in the event of the failure of some of its components. Each of the three main components of the system ( T/Mon, NetGuardian, and the ECU) retain a set of entry codes. These codes operate as a fallback system in the event that a link in the system is severed.

The T/Mon contains over 1,300 entry codes, but if that link was severed, the Netguardian has a duplicate backup which it can transmit to the ECU. In the unlikely event that both T/Mon and the NetGuardian were severed the ECU still will preserve a single emergency key to allow access to the site. The redundance of the system is what makes it so crucial to any security operation center looking to establish a secure access system.


Next Page: 9 Key Building Access System Features
PDFDownload White Paper

Get a Custom Application Diagram of Your Perfect-Fit Monitoring System

There is no other network on the planet that is exactly like yours. For that reason, you need to build a monitoring system that's the right fit for you.

"Buying more than you need" and "buying less than you need" are real risks. You also have to think about training, tech support, and upgrade availability.

Send me a quick online message about what you're trying to accomplish. I'll work with you to build a custom PDF application diagram that's a perfect fit for your network.


Make an Informed Decision


Your network isn't off-the-shelf.

Your monitoring system shouldn't be, either.

Customized monitoring application drawing

We'll walk you through this with a customized monitoring diagram.

Just tell us what you're trying to accomplish with remote monitoring.

Get a Custom Diagram