Software House GSTAR-ACM cyber-hardened network door controller

Technical Specification

Features:
  • Make: Software House
  • Model code: GSTAR-ACM
  • Series: iSTAR Ultra G2
  • Controller Type: Networkable
  • No of Cardholders: 1,000,000
Additional info:

ACM board Supports up to eight Wiegand, RM or OSDP readers, 24 supervised inputs, and 16 outputs which can be individually wet- or dry-configured Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection Hardened Linux embedded OS for improved security and scalability Up to 1M cardholders in local memory Dual GigE network ports with IPv6, DHCP and 802.1X support Embedded lock power management lowers installation costs Advanced controller-to-controller communications for cluster-based antipassback and I/O logic Onboard 256-bit AES network encryption Supports OSDP Secure Channel for encrypted reader communications Supports Embedded High Assurance FICAM operation without third-party hardware

Read more
Make Software House
Manufacturer Software House
Category Access control products >Access control controllers
Model code GSTAR-ACM
Series iSTAR Ultra G2
Yes
Electrical Specifications Voltage: 12 V DC / 24 V DC
Physical Specifications Dimensions mm: 114 x 427 x 36
Environmental Specifications Operating Temp oC: 0 ~ 50 C (32 ~ 122 F)
Operating Humidity %: 5 ~ 95
Additional info
  • ACM board
  • Supports up to eight Wiegand, RM or OSDP readers, 24 supervised inputs, and 16 outputs which can be individually wet- or dry-configured
  • Trusted Execution Environment (TEE) provides advanced hardware-based cybersecurity protection
  • Hardened Linux embedded OS for improved security and scalability
  • Up to 1M cardholders in local memory
  • Dual GigE network ports with IPv6, DHCP and 802.1X support
  • Embedded lock power management lowers installation costs
  • Advanced controller-to-controller communications for cluster-based antipassback and I/O logic
  • Onboard 256-bit AES network encryption
  • Supports OSDP Secure Channel for encrypted reader communications
  • Supports Embedded High Assurance FICAM operation without third-party hardware
Download PDF version