video corpo cad

System connections for peripherals
20Pages

{{requestButtons}}

Catalog excerpts

System connections for peripherals - 1

System connections for peripherals Customised solution in compliance with security and building requirements.

Open the catalog to page 1
System connections for peripherals - 2

dormakaba®, Kaba®, DORMA®, Com-ID®, Ilco®, La Gard®, LEGIC®, SAFLOK®, Silca® etc. are registered brands of dormakaba Group. Country-specific requirements or business considerations may mean that not all dormakaba Group products and systems are available in all mark

Open the catalog to page 2
System connections for peripherals - 3

Section overview CardLink/AoC The ID card is the connection Summary Which connection is the right one? Online Always connected Whitelist Easy and independent Wireless Connected by radio link Summary Possible connections Further smart solutions Everything from one single source

Open the catalog to page 3
System connections for peripherals - 4

Every door is different. dormakaba provides you with exactly the right solution. 4

Open the catalog to page 4
System connections for peripherals - 5

Enterprises vary greatly - and so do their needs: so it is good when the access solution can adjust to suit. Not all sectors of an enterprise have the same security and convenience requirements. It is important that access for all authorised persons runs smoothly at very busy main entrances during peak times. Other doors are further away and less busy, but still need to be monitored and integrated inexpensively: So it is good if the right solution is available for every situation. It may be essential that one entrance is monitored and remote controlled in real time, or that access to others...

Open the catalog to page 5
System connections for peripherals - 6

Online Efficient and always online! How does the online connection work? The access points are wired up and connected to the access system via a network. How are new access rights assigned at access points? Via the network, in real time. What happens with door events and alarms? All events are forwarded in real time to the access system. Which applications are typical for an online connection? • Securing the building shell • Complex door situations like turnstiles, tripod turnstiles or gates for high-security areas, twofactor authentication • High frequency figures and frequent rights...

Open the catalog to page 6
System connections for peripherals - 7

Summary Online connection Security and high availability, even on failure of the network connection. Online means: everything in a single system, from straightforward entry to complex gates. No sooner is the access medium issued than the authorised person is already inside. All data are exchanged in real time. The online components are versatile. And, in the case of higher security requirements, you decide whether an additional PIN code or biometry is used.

Open the catalog to page 7
System connections for peripherals - 8

Wireless Connected by radio link How does the wireless connection work? The access points are radio-linked to the access system. How are new access rights assigned at access points? • Immediately per radio What happens with door events and alarms? Events can be directly forwarded to or requested by the system. Which applications are typical for a wireless connection? • Networking of access points if door wiring is not an option • Incorporation in distant branches • Doors that need to be opened and closed per remote control • Doors used infrequently, however need system connection due to...

Open the catalog to page 8
System connections for peripherals - 9

Glass doors are a challenge in installation terms. A wireless connection dispenses with the need for wiring on doors. Benefits of particular interest when it comes to listed buildings: the easy installation protects the historic building structure. Wireless connection: The gateway networks the wireless door components with the access system. Even distant rooms are easily incorporated per radio and integrated into the overall system Lost or stolen IDs can be easily blocked.

Open the catalog to page 9
System connections for peripherals - 11

How does the CardLink/AoC connection work? • The access points are not wired • The connection between the access system and door component is established via the ID card How are new access rights assigned at access points? • Users are assigned rights to their ID cards at update readers (online) • The battery status of a component can be forwarded to the access system via the user ID card. • Access events of a person can be forwarded to the access system via the user ID card (CardLink). • No door monitoring • No door event and alarm feedback Which applications are typical for a CardLink/AoC...

Open the catalog to page 11
System connections for peripherals - 12

Whitelist Easy and independent Well suited for extending or modernising existing mechanical locking systems. How does the whitelist connection work? • The access points are not wired • Access rights are saved in the component How are new access rights assigned at access points? The authorised media are uploaded to the components on site via the programmer. What happens with door events and alarms? • The status of the whitelist components (battery status and booking memory) and access bookings can be collected via the programmer, they are manually transferred to the access system • No door...

Open the catalog to page 12
System connections for peripherals - 13

Simply issue an authorised medium and access is possible - even without personal data being maintained centrally. Good and easy: programming and displaying of rights is performed in the familiar locking plan overview. Summary Whitelist connection The access rights are uploaded from the system to the programmer. The service personnel program the access components using the programmer on site.

Open the catalog to page 13
System connections for peripherals - 14

Online, Wireless, CardLink/AoC, Whitelist How does it work? View a comparison of the key facts. Everything in one access solution 01 Online • High frequency figures • Mapping complex door situations • Door alarms and events in real time • Different security levels 02 Wireless • Low installation effort • Control/enable/block doors manually • Easily extend existing systems . 03 CardLink/AoC • Easy installation • Isolated doors that cannot be reached by wire or radio • Extend systems inexpensively with wireless components 04 Whitelist • Familiar locking plan overview for locking system...

Open the catalog to page 14
System connections for peripherals - 15

CardLink/AoC (standalone) Whitelist (standalone) Security requirements Rights changes/frequencies Door monitoring Typical application Doors to outside, high-security areas (turnstiles, tripod turnstiles, gates, additional verification) Entrances where wiring is not an option or economically viable (glass doors, historic or existing buildings) Doors to offices, laboratories, archives or general entrances Doors to smaller buildings or installations (branches) elsewhere, doors to offices or workshops Rights term of validity Permanent (media issue/return) Communication between entrance and...

Open the catalog to page 15

All Dormakaba catalogs and technical brochures

  1. Kaba 20

    71 Pages

  2. RFID Encoder

    2 Pages

  3. Kaba 20

    71 Pages

  4. Orthos

    20 Pages

  5. EM

    24 Pages

  6. SVP/SVZ

    27 Pages

  7. Eagle One

    2 Pages

  8. TS 92/TS 91

    12 Pages

  9. Magic Switch

    2 Pages

  10. ES 200

    10 Pages

  11. ITS 96

    20 Pages

  12. TS 97

    6 Pages

  13. TS 93

    36 Pages

  14. ST TST

    24 Pages

  15. oracode

    2 Pages

  16. Kaba

    2 Pages

  17. ktv secure

    8 Pages

  18. B-net 95 80

    2 Pages

  19. Biometrics

    8 Pages

Archived catalogs

  1. Vault Rooms

    2 Pages