SERVSWITCH™ BRAND FIBER KVM EXTENDER II AND II-SM

Plug any local mouse into the Local Unit’s 6-pin mini-DIN female connector labeled with the word “Local” and a mouse icon.

Make a last pair of attachments to the connectors on the Local Unit’s rear panel:

Attach the SC male connectors at the Local-Unit end of your duplex fiber cabling to the Local Unit’s SC female connectors. (The Extender’s SC connectors are keyed so that you can’t plug the fiber cable in the wrong way.) Make sure that this fiber cabling, from here all the way to the Remote Unit, is either 62.5/125-µm or 50/125-µm multimode type for the Extender II (ACS250A) or is 9/125-µm single-mode type for the Extender II-SM

(ACS251A). It can either be a single cable that will run all the way to the Remote Unit or a patch cable that will run to your fiber-distribution closet. Just keep in mind that the more fiber connectors that the Extender’s optical signal runs through, the more it attenuates.

Plug the output cord of one of the Extender’s included power supplies into the 2.1-mm barrel jack on the Local Unit’s rear panel. (The two power supplies are identical, so you can use either one.) Attach the female end of the power supply’s input cord to the IEC 320 male inlet on the transformer. Plug the other end of the input cord into a working AC outlet. The Local Unit should power up immediately—it has no ON/OFF switch. The green Status LED on its front panel should begin flashing to show that it isn’t getting a video signal from the CPU yet.

Don’t power up the attached devices yet—wait until you’re ready to test the system after installing the Remote Unit and remote equipment.

 

 

CAUTION!

Do not attach anything to

the

8-pin mini-DIN connector labeled

“Service” on the Local Unit’s

rear panel, which is reserved for

manufacturer use. Doing so could

severely damage the Extender and

any attached equipment!

 

 

18

Page 19
Image 19
Black Box ACS251A, ACS250A manual Any attached equipment

ACS251A, ACS250A specifications

The Black Box ACS251A and ACS250A are advanced access control systems designed for businesses seeking enhanced security and flexibility. These devices provide comprehensive monitoring and control capabilities, making them essential tools for managing access to sensitive areas within a facility.

Both models feature a user-friendly interface that simplifies installation and operation. The ACS251A and ACS250A support a variety of authentication methods, including card access, biometric scanning, and keypad entry, catering to the diverse needs of different organizations. This flexibility helps businesses ensure that only authorized personnel can gain access to restricted areas.

One of the standout features of the ACS251A model is its ability to integrate seamlessly with existing security systems. It can connect to various types of alarms, sensors, and CCTV systems, allowing for a more thorough approach to facility security. Furthermore, the ACS251A includes advanced reporting capabilities, enabling users to generate detailed logs of access activities. This functionality is vital for compliance and auditing purposes.

The ACS250A, on the other hand, is designed for smaller operations and offers essential features without compromising on performance. It also supports a similar range of authentication methods, making it versatile for use in various settings. The compact design of the ACS250A ensures that it can fit easily into different environments, enhancing its suitability for installations where space is limited.

Both systems utilize cutting-edge technology, including encrypted data communication to maintain security integrity. The ACS access control solutions also offer advanced security features such as anti-passback and time-zone restrictions, enabling organizations to enforce strict access protocols according to their operational hours or employee shifts.

In summary, the Black Box ACS251A and ACS250A are powerful access control systems that provide flexibility, advanced security features, and user-friendly operation. Their ability to integrate into existing security frameworks, along with their diverse authentication methods, makes them ideal for businesses of all sizes looking to enhance their security measures while ensuring ease of use and management. These systems truly represent a leap forward in access control technology, making them a valuable investment for any organization prioritizing safety and efficiency.