Do you have a question about the Johnson Controls tyco iSTAR Edge G2 and is the answer not in the manual?
Lists UL listed iSTAR Edge G2 models and their configurations.
Lists compatible reader types and technologies for the iSTAR Edge G2.
Details environmental and electrical specifications, including power and port configurations.
Explains power sources and requirements for the iSTAR Edge G2, including PoE options.
Specifies proper grounding procedures for the iSTAR Edge G2 controller and associated wiring.
Outlines UL compliance requirements and levels for the iSTAR Edge G2 installation.
Covers critical life safety requirements and precautions for handling static electricity during installation.
Describes the supported Ethernet port types and speeds for network connectivity.
Details the encryption methods used for secure communication.
Provides step-by-step instructions for physically installing the iSTAR Edge G2 enclosure.
Details wiring specifications, cable types, and component compatibility for iSTAR Edge G2.
Explains the method for supervising inputs using double resistors (1K, 500 Ohm, 2K Ohm).
Illustrates wiring diagrams for dry and wet relay outputs, including MagLock configurations.
Shows wet wiring configuration specifically for magnetic locks.
Details wiring for AC fail and low battery conditions using specific inputs.
Explains Wiegand reader connections and signaling for data transmission.
Details RS485 reader connections, including full and half-duplex modes.
The iSTAR Edge G2 Controller is a robust and versatile access control device designed for secure and efficient management of entry points within a facility. It integrates seamlessly with the C•CURE 9000 security management system, supporting various versions to ensure compatibility with existing infrastructure. This controller is engineered to meet stringent security standards, making it suitable for a wide range of applications requiring reliable access control.
At its core, the iSTAR Edge G2 Controller serves as a central hub for managing access control operations. It supports up to four readers, allowing for comprehensive coverage of multiple entry points. The controller can be deployed in various configurations, including standalone board-only setups, board-only with Power over Ethernet (PoE), or within a metal enclosure, with or without PoE. This flexibility enables tailored installations to suit specific environmental and power requirements.
The device facilitates communication with a variety of compatible readers, including RM1, RM2, RM3, RM2L-PI, and RM2L-4000 series, as well as specific Software House models like SWH-4200, SWH-4000, SWH-2100, SWH-3100, SWH-4100, SWH-5100, P345MTR, SWH-5200, P345KPMTR, and touchscreen card readers. It also supports OSDP-formatted readers, ensuring broad compatibility with modern access control technologies. The controller's ability to handle both Wiegand and RS485 reader types further enhances its adaptability to different reader infrastructures.
The iSTAR Edge G2 Controller is equipped with multiple relay ports, which can be configured for both dry and wet relay wiring setups. This allows for flexible integration with various locking mechanisms and output devices, such as magnetic locks or other access control peripherals. The relays can be set to either normally open (NO) or normally closed (NC) configurations, providing control over the default state of connected devices.
For enhanced security and monitoring, the controller includes supervised input capabilities. These inputs are crucial for connecting and monitoring various sensors, such as door contacts (DSM), request-to-exit (REX) or request-to-enter (RTE) switches, and other supervised inputs. The use of double resistor 1K supervision for these inputs enables the detection of different states, including short circuits, normal/secure, alert, open circuits, and line faults, providing a comprehensive view of the input status.
The controller also features built-in Ethernet ports, supporting 10/100/1000 Base-T connections, which are essential for network communication with the C•CURE 9000 system and other network devices. This ensures high-speed and reliable data transfer for real-time access control management. Full 256-bit encryption is employed for communications, safeguarding data integrity and privacy across the network.
The iSTAR Edge G2 Controller is designed for ease of integration and operation within a comprehensive security system. Its support for PoE and PoE+ modules simplifies power delivery, reducing the need for separate power supplies and streamlining installation. The ability to configure the PoE module for 24 VDC output ensures compatibility with various wet relays and door locks.
The controller's flexible wiring options, including dry and wet relays, allow for diverse applications. Dry relays are suitable for controlling devices that require an independent power source, while wet relays provide power directly from the controller, simplifying wiring for devices like magnetic locks. The clear distinction between NO and NC configurations for relays provides granular control over device behavior.
The supervised input system, utilizing the NO/NC Double Resistor 1K method, offers advanced monitoring capabilities. This feature is critical for detecting tampering, unauthorized access attempts, or malfunctions in connected sensors. The ability to differentiate between various fault conditions, such as shorts, opens, and line faults, allows for quick diagnosis and resolution of issues, enhancing overall system reliability.
The iSTAR Edge G2 supports both full duplex and half duplex RS485 reader connections, providing flexibility in reader network design. This allows for efficient communication with multiple readers over longer distances, which is beneficial in larger installations. The Wiegand direct connect reader support ensures compatibility with a wide range of legacy and modern Wiegand readers.
For system diagnostics, the controller may include an LCD display, which can provide immediate status updates and facilitate troubleshooting. While the LCD display and associated diagnostic tests are not evaluated by UL, they offer valuable insights during installation and maintenance.
Maintenance of the iSTAR Edge G2 Controller is facilitated by its robust design and clear wiring guidelines. The requirement for proper grounding, using 16 AWG or larger wire, ensures electrical safety and helps prevent damage from electrical surges. Shielded cabling for readers, inputs, outputs, and AUX cables further enhances signal integrity and reduces electromagnetic interference.
The controller's compliance with UL 294 levels for destructive attack, line security, endurance, and standby power indicates its resilience and reliability. This compliance ensures that the device can withstand various security threats and maintain operational integrity over time. For proprietary burglar alarm installations, adherence to UL 681 standards is mandated, ensuring a high level of security.
The design emphasizes static electricity precautions during handling and installation, including touching a grounded surface, wearing a grounding wrist strap, and using static protection mats. These measures protect internal components from damage, extending the lifespan of the device.
The modular design, particularly for PoE modules, allows for easier replacement or upgrade of components. The clear instructions for setting jumpers on the PoE module ensure correct configuration for power delivery and relay voltage, which is crucial for optimal performance and safety.
The detailed wiring specifications, including AWG requirements and maximum cable lengths for different signals (RS-485, power, Ethernet, supervised inputs, reader inputs), provide clear guidance for installers, minimizing wiring errors and ensuring reliable communication. The use of shielded, twisted-pair cable for supervised inputs is specifically recommended to maintain signal quality and prevent interference.
The controller's ability to report Tamper, Battery Low, and AC Power Fail inputs to the C•CURE 9000 system is a critical maintenance feature. These alerts enable proactive monitoring of the system's health and security, allowing operators to address issues such as power outages or unauthorized enclosure access promptly. This comprehensive monitoring capability is essential for maintaining continuous operation and security.
| Model | iSTAR Edge G2 |
|---|---|
| Connectivity | Ethernet |
| Power Supply | 12 or 24 VDC |
| Input Voltage | 12-24 VDC |
| Communication Protocols | TCP/IP |
| Communication Ports | Ethernet, RS-485 |
| Operating Humidity | 0% to 95% non-condensing |
| Outputs | 4 |
| Certifications | CE, FCC |
| Processor | ARM |











