Log in
RU 

Sigur E510

Up to four access points: doors, turnstiles, gates or barriers depending on the configuration and availability of terminals

Overview

The Sigur E510 controller is able to control various types of equipment - doors, turnstiles, barrier arms or gates. Depending on the settings, one controller can manage simultaneously 4 access points. The types of devices can be combined flexibly.

Distinctive features of the controller are DHCP and SNMP protocols support for quick addition of devices to the system and centralized monitoring, as well as an extended temperature range.

Additional equipment: card capture readers, breathalyzers, lights and others - connects directly to the controller. It does not require extension or similar devices.


Key features

Feature Description
Access points’ management Up to 4 access points: doors, turnstiles, gates or barrier arms
depending on the settings and availability of free terminal blocks
Internal memory 90 000 dentifiers
30 000 time zones
400 000 events 1
Server networking interface Ethernet 10/100BASE-TX
Network protocols DHCP, SNMP
Data encryption SSL/TLS
Reader interface Wiegand-26, 34, 37, 42, 56, 58
Wiegand-4, 6, 8 (for keyboards)
Dallas Touch Memory
Number
of relay outputs
4
Number
of open collector outputs
13
Number
of signal inputs
10
Connection to fire alarm Two-wire galvanically isolated line to connect several controllers to a single fire alarm cable.
Supply
voltage
9,9…17 V
Consumed
current
max. 250mA
Protection class IP20
Temperature
range
-40°C to +50°C


Note 1

The allocation of autonomous memory between keys, modes and events is configurable.

Connection to the ip network

The E510 controllers, like other Sigur IP controllers, connect directly to the local network. This feature makes their use at facilities with a developed IP infrastructure convenient, facilitating cable installation greatly. There is no limit on the number of controllers connected to the IP network. All data transmitted between the controllers and the system’s server is encrypted (SSL / TLS).

The IP network used can be of any complexity and length, including controllers that are able to interact via the Internet. Within the system, it is possible to combine any controllers and methods of building a network.

The controllers support the standard DHCP protocol for adding to the system, which allows the ACS server to identify the device in the system automatically.

Centralized monitoring

Sigur E510 controllers support the standard SNMP protocol for monitoring the status of the device itself (for example, supply voltage) and most of the third-party equipment connected to it.

Autonomous access rules’ support

The following logics are implemented by the controller without direct involvement of the software. They can also be combined in any way.

  • Access schedules (time zones) of any frequency from 1 to 31 days, any number of access permission intervals independently for entry and exit
  • Anti-re-entry, zone control
  • Dual authentication: main feature (proximity card, fingerprint, etc.) + PIN
  • Security Authorized Access
  • Escorted access. Individual installation of escort groups for various employees
  • Two-person access
  • Blocking access through the doors if one of them is open. A special case - the organization of a gateway
  • Automatic opening of the opposite gateway door after entering it, immediately or with a programmable delay
  • Limiting the number of people in the zone
  • Issuance of control signals by a card capture reader
  • Unlocking in case of fire alarm
  • Managing the lock status of the access point by double presenting the employee's card
  • Control of third-party gate controllers using programmable logic. Direct control of the gate motors, performing the functions of the drive controller
  • Delay in locking the lock
  • A lot of configurable parameters, including time delays, control methods, methods of analyzing input signals
  • Possibilities to override the function of any hardware terminal
  • Issuance of signals "hold the door", "burglary", "unlock", and many others. Dozens of possibilities to control other third-party devices
  • Taking into account the features of specific models of turnstiles, gates, readers

Note 2

The function requires a connection but its implementation does not create a dependence of the decision-making logic on the quality of the connection. Access decisions are always made autonomously and instantly.