Catalog excerpts
System connections for peripherals Customised solution in compliance with security and building requirements.
Open the catalog to page 1dormakaba dormakaba®, Kaba®, DORMA®, Com-ID®, Ilco® La Gard® LEGIC® SAFLOK®, Silca® etc. are registered brands of dormakaba Group. Country-specific requirements or business considerations may mean that not all dormakaba Group products and systems are available in all markets.
Open the catalog to page 2Section overview Table of contents introduction Go for freedom Online Always connected Wireless Connected by radio link TO CardLink/AoC The ID card is the connection Whitelist Easy and independent Summary Possible connections Summary Which connection is the right one? Further smart solutions Everything from one single source
Open the catalog to page 3Every door is different. dormakaba provides you with exactly the right solution. 4
Open the catalog to page 4The freedom to choose as you go Enterprises vary greatly - and so do their needs: so it is good when the access solution can adjust to suit. Not all sectors of an enterprise have the same security and convenience requirements. It is important that access for all authorised persons runs smoothly at very busy main entrances during peak times. Other doors are further away and less busy, but still need to be monitored and integrated inexpensively: So it is good if the right solution is available for every situation. It may be essential that one entrance is monitored and remote controlled in...
Open the catalog to page 5How does the online connection work? The access points are wired up and connected to the access system via a network. How are new access rights assigned at access points? Via the network, in real time. What happens with door events and alarms? All events are forwarded in real time to the access system. Which applications are typical for an online connection? • Securing the building shell • Complex door situations like turnstiles, tripod turnstiles or gates for high-security areas, two-factor authentication • High frequency figures and frequent rights changes • Door monitoring and remote...
Open the catalog to page 6Security and high availability, even on failure of the network connection. Online means: everything in a single system, from straightforward entry to complex gates. No sooner is the access medium issued than the authorised person is already inside. All data are exchanged in real time. The online components are versatile. And, in the case of higher security requirements, you decide whether an additional PIN code or biometry is used.
Open the catalog to page 7Wireless Connected by radio link How does the wireless connection work? The access points are radio-linked to the access system. How are new access rights assigned at access points? • Immediately per radio What happens with door events and alarms? Events can be directly forwarded to or requested by the system. Which applications are typical for a wireless connection? • Networking of access points if door wiring is not an option • Incorporation in distant branches • Doors that need to be opened and closed per remote control • Doors used infrequently, however need system connection due to...
Open the catalog to page 801 Glass doors are a challenge in installation terms. A wireless connection dispenses with the need for wiring on doors. 02 Benefits of particular interest when it comes to listed buildings: the easy installation protects the historic building structure. 03 Wireless connection: The gateway networks the wireless door components with the access system. 04 Even distant rooms are easily incorporated per radio and integrated into the overall system 05 Lost or stolen IDs can be easily blocked.
Open the catalog to page 9O /—v 03 How does the CardLink/AoC connection work? • The access points are not wired • The connection between the access system and door component is established via the ID card How are new access rights assigned at access points? • Users are assigned rights to their ID cards at update readers (online) • The battery status of a component can be forwarded to the access system via the user ID card. • Access events of a person can be forwarded to the access system via the user ID card (CardLink). • No door monitoring • No door event and alarm feedback Which applications are typical for a...
Open the catalog to page 11Well suited for extending or modernising existing mechanical locking systems. How does the whitelist connection work? • The access points are not wired • Access rights are saved in the component How are new access rights assigned at access points? The authorised media are uploaded to the components on site via the programmer. What happens with door events and alarms? • The status of the whitelist components (battery status and booking memory) and access bookings can be collected via the programmer, they are manually transferred to the access system • No door monitoring • No door event and...
Open the catalog to page 1201 Simply issue an authorised medium and access is possible - even without personal data being maintained centrally. 02 Good and easy: programming and displaying of rights is performed in the familiar locking plan overview. 03 Summary Whitelist connection 04 The access rights are uploaded from the system to the programmer. 05 The service personnel program the access components using the programmer on site.
Open the catalog to page 13Online, Wireless, CardLink/AoC, Whitelist How does it work? View a comparison of the key facts. 01 Online • High frequency figures • Mapping complex door situations • Door alarms and events in real time • Different security levels 02 Wireless • Low installation effort • Control/enable/block doors manually • Easily extend existing systems 03 CardLink/AoC • Easy installation • Isolated doors that cannot be reached by wire or radio • Extend systems inexpensively with wireless components 04 Whitelist • Familiar locking plan overview for locking system personnel • Extend mechanical locking...
Open the catalog to page 14Online, Wireless, CardLink/AoC, Whitelist Which connection is the right one? Which is connection is best depends on your needs. Every connection types has its own advantages. The table shows you which connection type is right for you. Best of all: you can decide which connection types you wish to combine in your access solution. You are free to focus on security aspects, economy or convenience. We will be happy to help you find an easy, cost-efficient and secure option.
Open the catalog to page 16All Dormakaba catalogs and technical brochures
-
Axessor® Serie
8 Pages
-
ED 100 / ED 250
32 Pages
-
Door Closer Finishes
1 Pages
-
Which Door Control?
12 Pages
-
Safe Lock range
24 Pages
-
Doors & Security Solutions
8 Pages
-
Saflok R Plus
2 Pages
-
Saflok Quantum Pixel
2 Pages
-
RFID Encoder
2 Pages
-
Confidant RFID
2 Pages
-
Kaba 20
71 Pages
-
Orthos
20 Pages
-
EM
24 Pages
-
SVP/SVZ
27 Pages
-
Eagle One
2 Pages
-
TS 92/TS 91
12 Pages
-
Electronic Lock Parts Price Book
68 Pages
-
ED 100LE - ED 250LE
17 Pages
-
Magic Switch
2 Pages
-
ES 200
10 Pages
-
ITS 96
20 Pages
-
TS 90 IMPULSE
6 Pages
-
TS 97
6 Pages
-
TS 93
36 Pages
-
ST TST
24 Pages
-
oracode
2 Pages
-
Kaba
2 Pages
-
dorma service —
12 Pages
-
ENTRANCE SYSTEMS
16 Pages
-
INTEGRATED ACCESS CONTROL
4 Pages
-
ktv secure
8 Pages
-
B-net 95 80
2 Pages
-
Kaba overview brochure
29 Pages
-
Biometrics
8 Pages
-
Kaba exos® LA-PG
2 Pages
-
Registration Unit SL - RFID
2 Pages
-
Remote Reader Modules (RRM)
2 Pages
-
Compact Reader SL-MIFARE®
2 Pages
-
quattro pluS Brochure
4 Pages
Archived catalogs
-
Access Control
6 Pages
-
Access control_2011
2 Pages
-
Kaba exos® LA-SK
2 Pages
-
Kaba exos® LA-PV
2 Pages
-
Kaba exos® LA-PP
2 Pages
-
Kaba exos® LA-PB
2 Pages
-
Kaba exos® LA-KT
2 Pages
-
Deposit boxes in Safe
4 Pages
-
Safe Deposit Installations
4 Pages
-
Vault Doors TRP 2500/3500
2 Pages
-
Vault Doors TRP 800
2 Pages
-
Vault Rooms
2 Pages
-
Casher Cashboxes
2 Pages
-
Varrit optima Safes
8 Pages
-
Varrit Safes
2 Pages