{"id":7888,"date":"2021-01-14T23:53:09","date_gmt":"2021-01-14T23:53:09","guid":{"rendered":"https:\/\/kerisys.com\/?post_type=products&#038;p=7888"},"modified":"2024-10-04T10:45:17","modified_gmt":"2024-10-04T10:45:17","slug":"keri-standard-nxt-2d-4d","status":"publish","type":"products","link":"https:\/\/kerisys.com\/products\/keri-standard-nxt-2d-4d\/","title":{"rendered":"Keri (Standard) NXT 2D\/4D"},"content":{"rendered":"<h1>Keri Standard NXT 2\/4 Door Controllers (Legacy)<\/h1>\n<h4>This product is now Obsolete, available for legacy installations only<\/h4>\n<p>The NXT-2\/4D Controller is built for today\u2019s IT environments. By using an existing TCP\/IP network, controller cabling costs can be eliminated. Or, if building a new network, they can be reduced up to 50% over traditional hard-wired access systems by using inexpensive, shielded CAT-5 cable. The NXT-2\/4D is designed to be extremely intelligent with little reliance on network traffic for decision-making, allowing it to be thrifty with any network\u2019s valuable bandwidth. With Ethernet functionality built directly into the controller. Keri\u2019s proprietary MAC addressing scheme allows for reliable hardware discovery and true one-button autoconfiguration.<\/p>\n<ul class='benefits-shortcode'><li><svg width=\"25\" height=\"24\" viewBox=\"0 0 25 24\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M24.125 12C24.125 5.625 18.875 0.375 12.5 0.375C6.07812 0.375 0.875 5.625 0.875 12C0.875 18.4219 6.07812 23.625 12.5 23.625C18.875 23.625 24.125 18.4219 24.125 12ZM11.1406 18.1875C10.8594 18.4688 10.3438 18.4688 10.0625 18.1875L5.1875 13.3125C4.90625 13.0312 4.90625 12.5156 5.1875 12.2344L6.26562 11.2031C6.54688 10.875 7.01562 10.875 7.29688 11.2031L10.625 14.4844L17.6562 7.45312C17.9375 7.125 18.4062 7.125 18.6875 7.45312L19.7656 8.48438C20.0469 8.76562 20.0469 9.28125 19.7656 9.5625L11.1406 18.1875Z\" fill=\"#912036\"\/>\n<\/svg>48,000 Cardholders, 10,000 Event Buffer<\/li><li><svg width=\"25\" height=\"24\" viewBox=\"0 0 25 24\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M24.125 12C24.125 5.625 18.875 0.375 12.5 0.375C6.07812 0.375 0.875 5.625 0.875 12C0.875 18.4219 6.07812 23.625 12.5 23.625C18.875 23.625 24.125 18.4219 24.125 12ZM11.1406 18.1875C10.8594 18.4688 10.3438 18.4688 10.0625 18.1875L5.1875 13.3125C4.90625 13.0312 4.90625 12.5156 5.1875 12.2344L6.26562 11.2031C6.54688 10.875 7.01562 10.875 7.29688 11.2031L10.625 14.4844L17.6562 7.45312C17.9375 7.125 18.4062 7.125 18.6875 7.45312L19.7656 8.48438C20.0469 8.76562 20.0469 9.28125 19.7656 9.5625L11.1406 18.1875Z\" fill=\"#912036\"\/>\n<\/svg>On-board TCP\/IP Connectivity<\/li><li><svg width=\"25\" height=\"24\" viewBox=\"0 0 25 24\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M24.125 12C24.125 5.625 18.875 0.375 12.5 0.375C6.07812 0.375 0.875 5.625 0.875 12C0.875 18.4219 6.07812 23.625 12.5 23.625C18.875 23.625 24.125 18.4219 24.125 12ZM11.1406 18.1875C10.8594 18.4688 10.3438 18.4688 10.0625 18.1875L5.1875 13.3125C4.90625 13.0312 4.90625 12.5156 5.1875 12.2344L6.26562 11.2031C6.54688 10.875 7.01562 10.875 7.29688 11.2031L10.625 14.4844L17.6562 7.45312C17.9375 7.125 18.4062 7.125 18.6875 7.45312L19.7656 8.48438C20.0469 8.76562 20.0469 9.28125 19.7656 9.5625L11.1406 18.1875Z\" fill=\"#912036\"\/>\n<\/svg>Re-assignable Inputs and Outputs<\/li><li><svg width=\"25\" height=\"24\" viewBox=\"0 0 25 24\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M24.125 12C24.125 5.625 18.875 0.375 12.5 0.375C6.07812 0.375 0.875 5.625 0.875 12C0.875 18.4219 6.07812 23.625 12.5 23.625C18.875 23.625 24.125 18.4219 24.125 12ZM11.1406 18.1875C10.8594 18.4688 10.3438 18.4688 10.0625 18.1875L5.1875 13.3125C4.90625 13.0312 4.90625 12.5156 5.1875 12.2344L6.26562 11.2031C6.54688 10.875 7.01562 10.875 7.29688 11.2031L10.625 14.4844L17.6562 7.45312C17.9375 7.125 18.4062 7.125 18.6875 7.45312L19.7656 8.48438C20.0469 8.76562 20.0469 9.28125 19.7656 9.5625L11.1406 18.1875Z\" fill=\"#912036\"\/>\n<\/svg>128 Bit Encryption<\/li><li><svg width=\"25\" height=\"24\" viewBox=\"0 0 25 24\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<path d=\"M24.125 12C24.125 5.625 18.875 0.375 12.5 0.375C6.07812 0.375 0.875 5.625 0.875 12C0.875 18.4219 6.07812 23.625 12.5 23.625C18.875 23.625 24.125 18.4219 24.125 12ZM11.1406 18.1875C10.8594 18.4688 10.3438 18.4688 10.0625 18.1875L5.1875 13.3125C4.90625 13.0312 4.90625 12.5156 5.1875 12.2344L6.26562 11.2031C6.54688 10.875 7.01562 10.875 7.29688 11.2031L10.625 14.4844L17.6562 7.45312C17.9375 7.125 18.4062 7.125 18.6875 7.45312L19.7656 8.48438C20.0469 8.76562 20.0469 9.28125 19.7656 9.5625L11.1406 18.1875Z\" fill=\"#912036\"\/>\n<\/svg>Both 2-door and 4-door Versions Available<\/li><\/ul>\n<p>To expand the system\u2019s capabilities, companion 4X4 Input\/Output boards (NXT-4X4) can be added &#8211; one to each of the controller\u2019s RS-485 buses. Customers can choose between Keri\u2019s line of highly secure, 4-wire NXT Series Proximity Readers with reader supervision that also provide In\/Out reading capability at each bus, or, when using a Reader Interface Module (NXT-RM3 or NXT-WIPLUS), either a standard Wiegand output reader or Keri&#8217;s MS Series Proximity Reader. Doors.NET software has much of the same look and feel as Keri\u2019s acclaimed original DoorsTM software, but with the added functionality of a Client\/Server architecture.<\/p>\n<p>&nbsp;<\/p>\n<div class='et-box et-warning'>\n\t\t\t\t\t<div class='et-box-content'><b>Keri Public Statement on the Amazon Key:\nKeri does not support using the Amazon Key on Keri controllers.<\/b><\/p>\n<div class='et-learn-more clearfix'>\n\t\t\t\t\t<h3 class='heading-more'>Click here to learn more<span class='et_learnmore_arrow'><span><\/span><\/span><\/h3>\n\t\t\t\t\t<div class='learn-more-content'><p>The Amazon Key does not interface to Keri products in a way that allows the Building Owner or Manager to maintain complete control over their system, nor does it provide any tracking information on when the Amazon Key was used to open a door.<\/p>\n<p>The addition of the Amazon Key to a site introduces a security degradation beyond the control of Keri&#8217;s access control system. Neither Keri nor Amazon provides any documentation on how an installer would integrate the Amazon Key with Keri&#8217;s access control system. Because of this, Keri has strong concerns about the knowledge of the Amazon Key installers as evidenced by the damage Amazon Key installers have caused to Keri controllers and installations at multiple sites.<\/p>\n<p>Any Keri controller failure caused by the installation of an Amazon Key device is cause for voiding the controller warranty. Keri cannot be held responsible for any security lapses created by the use of the Amazon Key<\/p><\/div>\n\t\t\t\t<\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Keri Standard NXT 2\/4 Door Controllers (Legacy) This product is now Obsolete, available for legacy installations only The NXT-2\/4D Controller is built for today\u2019s IT environments. By using an existing [&hellip;]<\/p>\n","protected":false},"featured_media":0,"parent":0,"menu_order":40,"template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":""},"categories":[],"tags":[],"product_type":[],"is_legacy":[],"related_product":[],"ecosystem":[],"class_list":["post-7888","products","type-products","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/products\/7888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/products"}],"about":[{"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/types\/products"}],"version-history":[{"count":0,"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/products\/7888\/revisions"}],"wp:attachment":[{"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/media?parent=7888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/categories?post=7888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/tags?post=7888"},{"taxonomy":"product_type","embeddable":true,"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/product_type?post=7888"},{"taxonomy":"is_legacy","embeddable":true,"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/is_legacy?post=7888"},{"taxonomy":"related_product","embeddable":true,"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/related_product?post=7888"},{"taxonomy":"ecosystem","embeddable":true,"href":"https:\/\/kerisys.com\/wp-json\/wp\/v2\/ecosystem?post=7888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}