Share
Physical Security
Expected delivery 3 to 7 business days (exceptions applied)
Axis Communications
2N Security Bundle for 2N IP Force
2N Security Bundle for 2N IP Force
VPN:01976-001 SKU:PHS856989 UPC:
Loading
Couldn't load pickup availability
Volume discount available - Ask for quote..
View full details
Recently Viewed
2N Security Bundle for 2N IP Force
Product information summary

About the product
The security relay is a simple accessory which prevents doors from being opened with a 12V battery - a technique which allows burglars to open low-power locks if they reach the cables connecting the intercom/reader to the lock. Install the relay between the intercom/reader and the lock it controls. Then pair the security relay with the 2N device. Once set up, the lock will only open if the relay identifies the specific signal sent from the intercom/reader.
The additional and tamper switch activates an alarm if detects intrusion into the intercom's frame. Prepare also more advanced scenarios in the Automation section. The intercom could be set, for example, to play a pre-recorded message, contact a security agency or photograph the vandal.
The components of the bundle are also available separately.
Technical Specifications
Miscellaneous | |
Compatibility | 2N IP Force Intercom |
General Information | |
Product Type | Security Kit |
Manufacturer Part Number | 01976-001 |
Manufacturer Website Address | http://www.axis.com |
Manufacturer | Axis Communications |
Product Name | Security Bundle for 2N IP Force |
Brand Name | 2N |
Product compare
Product warranty
Standard manufacturer warranty as applicable
Return policy
15 days return in original condition.
Price guarantee
!00% we are always lower than market price.
Explore branded collections
Our services

Partner with us

High business ethics and integrity

Consistence and focused performance

Shared vision and shared success

High confidentiality and security
-
See more
Design and build workplace, conference rooms & boardroom
-
See more
Managed IT service, help desks, servers, & networking
-
See more
Next generation devices assess, procure, customization
-
See more
Business continuity, security, backup & disaster recovery
-
See more
Cloud structure, migration, optimization and security
-
See more
Digitization, data retention, automation, Dev apps