System connections for peripherals
20Pages

{{requestButtons}}

Catalog excerpts

System connections for peripherals - 1

System connections for peripherals Customised solution in compliance with security and building requirements.

Open the catalog to page 1
System connections for peripherals - 2

dormakaba dormakaba®, Kaba®, DORMA®, Com-ID®, Ilco® La Gard® LEGIC® SAFLOK®, Silca® etc. are registered brands of dormakaba Group. Country-specific requirements or business considerations may mean that not all dormakaba Group products and systems are available in all markets.

Open the catalog to page 2
System connections for peripherals - 3

Section overview Table of contents introduction Go for freedom Online Always connected Wireless Connected by radio link TO CardLink/AoC The ID card is the connection Whitelist Easy and independent Summary Possible connections Summary Which connection is the right one? Further smart solutions Everything from one single source

Open the catalog to page 3
System connections for peripherals - 4

Every door is different. dormakaba provides you with exactly the right solution. 4

Open the catalog to page 4
System connections for peripherals - 5

The freedom to choose as you go Enterprises vary greatly - and so do their needs: so it is good when the access solution can adjust to suit. Not all sectors of an enterprise have the same security and convenience requirements. It is important that access for all authorised persons runs smoothly at very busy main entrances during peak times. Other doors are further away and less busy, but still need to be monitored and integrated inexpensively: So it is good if the right solution is available for every situation. It may be essential that one entrance is monitored and remote controlled in...

Open the catalog to page 5
System connections for peripherals - 6

How does the online connection work? The access points are wired up and connected to the access system via a network. How are new access rights assigned at access points? Via the network, in real time. What happens with door events and alarms? All events are forwarded in real time to the access system. Which applications are typical for an online connection? • Securing the building shell • Complex door situations like turnstiles, tripod turnstiles or gates for high-security areas, two-factor authentication • High frequency figures and frequent rights changes • Door monitoring and remote...

Open the catalog to page 6
System connections for peripherals - 7

Security and high availability, even on failure of the network connection. Online means: everything in a single system, from straightforward entry to complex gates. No sooner is the access medium issued than the authorised person is already inside. All data are exchanged in real time. The online components are versatile. And, in the case of higher security requirements, you decide whether an additional PIN code or biometry is used.

Open the catalog to page 7
System connections for peripherals - 8

Wireless Connected by radio link How does the wireless connection work? The access points are radio-linked to the access system. How are new access rights assigned at access points? • Immediately per radio What happens with door events and alarms? Events can be directly forwarded to or requested by the system. Which applications are typical for a wireless connection? • Networking of access points if door wiring is not an option • Incorporation in distant branches • Doors that need to be opened and closed per remote control • Doors used infrequently, however need system connection due to...

Open the catalog to page 8
System connections for peripherals - 9

01 Glass doors are a challenge in installation terms. A wireless connection dispenses with the need for wiring on doors. 02 Benefits of particular interest when it comes to listed buildings: the easy installation protects the historic building structure. 03 Wireless connection: The gateway networks the wireless door components with the access system. 04 Even distant rooms are easily incorporated per radio and integrated into the overall system 05 Lost or stolen IDs can be easily blocked.

Open the catalog to page 9
System connections for peripherals - 11

O /—v 03 How does the CardLink/AoC connection work? • The access points are not wired • The connection between the access system and door component is established via the ID card How are new access rights assigned at access points? • Users are assigned rights to their ID cards at update readers (online) • The battery status of a component can be forwarded to the access system via the user ID card. • Access events of a person can be forwarded to the access system via the user ID card (CardLink). • No door monitoring • No door event and alarm feedback Which applications are typical for a...

Open the catalog to page 11
System connections for peripherals - 12

Well suited for extending or modernising existing mechanical locking systems. How does the whitelist connection work? • The access points are not wired • Access rights are saved in the component How are new access rights assigned at access points? The authorised media are uploaded to the components on site via the programmer. What happens with door events and alarms? • The status of the whitelist components (battery status and booking memory) and access bookings can be collected via the programmer, they are manually transferred to the access system • No door monitoring • No door event and...

Open the catalog to page 12
System connections for peripherals - 13

01 Simply issue an authorised medium and access is possible - even without personal data being maintained centrally. 02 Good and easy: programming and displaying of rights is performed in the familiar locking plan overview. 03 Summary Whitelist connection 04 The access rights are uploaded from the system to the programmer. 05 The service personnel program the access components using the programmer on site.

Open the catalog to page 13
System connections for peripherals - 14

Online, Wireless, CardLink/AoC, Whitelist How does it work? View a comparison of the key facts. 01 Online • High frequency figures • Mapping complex door situations • Door alarms and events in real time • Different security levels 02 Wireless • Low installation effort • Control/enable/block doors manually • Easily extend existing systems 03 CardLink/AoC • Easy installation • Isolated doors that cannot be reached by wire or radio • Extend systems inexpensively with wireless components 04 Whitelist • Familiar locking plan overview for locking system personnel • Extend mechanical locking...

Open the catalog to page 14
System connections for peripherals - 16

Online, Wireless, CardLink/AoC, Whitelist Which connection is the right one? Which is connection is best depends on your needs. Every connection types has its own advantages. The table shows you which connection type is right for you. Best of all: you can decide which connection types you wish to combine in your access solution. You are free to focus on security aspects, economy or convenience. We will be happy to help you find an easy, cost-efficient and secure option.

Open the catalog to page 16

All Dormakaba catalogs and technical brochures

  1. RFID Encoder

    2 Pages

  2. Kaba 20

    71 Pages

  3. Orthos

    20 Pages

  4. EM

    24 Pages

  5. SVP/SVZ

    27 Pages

  6. Eagle One

    2 Pages

  7. TS 92/TS 91

    12 Pages

  8. Magic Switch

    2 Pages

  9. ES 200

    10 Pages

  10. ITS 96

    20 Pages

  11. TS 97

    6 Pages

  12. TS 93

    36 Pages

  13. ST TST

    24 Pages

  14. oracode

    2 Pages

  15. Kaba

    2 Pages

  16. ktv secure

    8 Pages

  17. B-net 95 80

    2 Pages

  18. Biometrics

    8 Pages

Archived catalogs

  1. Vault Rooms

    2 Pages