We just launched our IP Wall Reader in October, featuring an illuminated touch-pin-pad. It complements our access control system Kentix DoorLock® with a tethered version. Now, an access management system for doors that cannot be connected to a radio-integrated solution can quickly and easily be established. Opening doors is only possible with sufficient authorization and if desired, IP cameras can be integrated in order to increase physical security on the premises. Furthermore, a tethered access solution can now easily be connected with a radio-integrated version to one centrally administered system.
Online access control system Kentix DoorLock® expanded by a tethered version
The new IP Wall Reader offers the possibility to unlock doors with an RFID medium or/and by entering a pin code (two-factor-authorization possible). The central unit with network access is established by a network relay module. It is mounted on the wall and power is supplied via PoE. An integrated web server enables a central administration. Via a BUS connection, the relay module communicates with the IP Wall Reader. The reader can easily be assembled in the outlet socket or with a housing for surface mounting (optional) in the vicinity of the door. In order to integrate an additional door, an expansion reader without a relay module is sufficient. Power for the expansion reader is supplied via the Kentix AccessPoint (KXP-2). If more doors or rooms are to be integrated, several network relay modules can be connected by a master-slave-mode to one system with central administration.
[smart-product id=43249 width=300]
IP video integration for additional physical security
The IP Wall Reader also offers the integration of IP video, if desired. In order to set this up, each door in the system can be connected to an IP camera that is triggered with each unlocking of the door and records a series of pictures. The video sequence is then saved in the log book together with the user data and a time stamp and can be retrieved any time. In case of a false entry or attempted sabotage, the system administrator immediately receives an email with the pictures attached. This offers an increased level of physical security on the entire premises.