Global Directory

  • Security
    • American DynamicsAmerican Dynamics Logo
    • Bentel Security Bentel Logo
    • CEM SystemsCEM Systems written on a white background
    • CloudvueCloudvue logo
    • DSCDSC written on a white background
    • ExacqExacq-gray
    • IllustraIllustra logo
    • IQIQ
    • KantechKantech logo on a white background
    • SES
    • Software HouseSoftware House logo
    • VisonicVisonic logo
  • Building Automation and Controls
    • Johnson ControlsJCI logo
    • MetasysMetasys logo
    • Facility ExplorerFacility Explorer logo
    • EasyIOEasyio Logo
    • VerasysVerasys logo
    • BCProAnsul logo
    • PENNPenn logo
  • Digital Solutions
    • OpenBlueOpenBlue Logo
    • FM:Systems
  • Fire Detection
    • AutocallAnsul logo
    • FireClassFireClass logo
    • SimplexSimplex logo
    • ZettlerZettler logo
    • VigilantVigilant logo
    • DBEDBE written on a white background
  • Fire Suppression
    • Tyco FireTyco Blue Logo
    • ANSULAnsul logo
    • ChemguardChemguard logo
    • SkumSkum logo
    • HygoodHygood logo
    • GrinnellGrinell logo
    • SprinkCADSprinkCAD logo
    • Pyro ChemPyro-Chem logo
    • AquaMistAnsul logo
  • HVAC Equipment
    • Johnson ControlsJCI logo
    • YorkYORK logo
    • Championchampion
    • ColemanColeman logo
    • EnvirotecEnviro-Tec logo
    • LuxaireLuxaire Heating & Cooling logo
    • Miller-Picking
    • Pace
    • QuantechQuantech logo
    • Silent-Aire
    • TempmasterTempMaster logo
    • TriatekTriatek logo
    • TrionTrion IAQ logo
  • Industrial Refrigeration
    • YorkYORK logo
    • FrickFrick Industrial Refrigeration logo
    • M&M Carnot
    • SabroeSabroe logo
    • York Process Systemsyork-process-system-logo
  • Retail Solutions
    • Sensormatic
JCI Logo
Login | Register
Login | Register
Software House
  • Products and Solutions
    Products and Solutions
    • Access Control Management Software
      Access Control Management Software
      • Access Control Management Software
      • Access Control and Event Management Software
      Featured

      Natively Intelligent Security Software to Scale

      CCURE IQ 310 image

      Physical security solutions built to adapt and scale —so you’re always ready for what’s next.

      Explore our software
    • Controllers
      Controllers
      • Controllers
      • Door Controllers
      • Door Controller Modules and Accessories
      • Electronic Locks
      • Exit Devices
    • Readers and Credentials
      Readers and Credentials
      • Readers and Credentials
      • Readers and Biometrics
      • Credentials
    • Other Products and Services
      Other Products and Services
      • Other Products and Services
      • Access Control and Event Management
      • Badging Printers Scanners and Accessories
    • Register Software Licensing
  • Services and Support
    Services and Support
    • Services and Support
    • Support Portal
    • Professional Services
    • Register Software Licensing
    • Software Support Agreement
    • C•CURE User Forum
    • C•CURE Go Reader Privacy Notice
    • Cyber Protection Program
    • Training and Support Services
    • Warranty and Repair Services
    • Resources
  • Industries
    Industries
    • Industries
    • Data Centers
    • IT, Telecom and Professional Services
    • Financial and Banking
    • Education
    • Government
    • Transportation
    • Healthcare
    • Retail
    • Industrial and Manufacturing
    • Sports and Entertainment
  • Partners
    Partners
    • Compatibility Matrix
    • Technology Partners
Search Contact Us
  1. Software House
  2. Controllers
  3. Door Controllers
  4. iSTAR Edge G2 Controller
Istar edge G2 board product image
Istar edge G2 product image
Istar edge G2 product image
Istar edge G2 product image
  • Istar edge G2 board thumb image
  • Istar edge G2 thumb image
  • Istar edge G2 thumb image
  • Istar edge G2 thumb image

iSTAR Edge G2 Controller

A powerful, cyber-hardened IP edge access control device

iSTAR Edge G2 is a powerful, cyber-hardened IP edge access control device that provides reliable, localized access control decision making at each door. Its optional PoE module supports up to eight readers.

  • iSTAR Edge G2 is an OSDP-verified, cyber-hardened IP edge access control device, ideally suited to standalone edge applications. It provides reliable stand-alone physical access control for up to eight doors, with local database of up to one million cardholders.
  • The iSTAR Edge G2 8 Reader Door Controller provides the highest security through OSDP. It drastically lowers costs for installation and start up where costly space is limited, and its wet lock outputs eliminate the need for additional power supplies.
  • Built using a Trusted Execution Environment with advanced network security features, the iSTAR Edge G2 controllers support cyber resilience through OSDP Secure Channel, which provides encrypted two-way reader communications.
Back to Top

iSTAR Edge G2 Controller

  • Overview
  • Features
  • Benefits
  • Product literature
  • Related products
    Contact Us

    Big controller power in a small package

    One of the most powerful, flexible and secure edge access controllers in the market, iSTAR Edge G2 provides effortless upgrades from its predecessor, iSTAR Edge. It offers support for an impressive eight doors per panel, reducing costly real estate requirements for your security installation. iSTAR Edge G2 controllers are OSDP-verified. They support embedded High Assurance FICAM operation without additional third-party hardware, making them ideal solutions for both government and commercial users.
    Big controller power in a small package

    Features

    • Stand-alone physical access control for up to eight doors, enabling localized decision-making at each door
    • An advanced access control feature set, including anti-passback, peer-to-peer clustering and local event logic
    • OSDP-verified, with encrypted, two-way reader secure channel communication
    • Controls and powers all access control devices at the door to minimize installation costs
    • Wet lock outputs to eliminate the need for additional power supplies
    • A stand-alone IP edge access controller with a database of up to one million credentials for localized decision-making
    • A Trusted Execution Environment to provide advanced hardware-based cybersecurity protection
    • A Power over the Ethernet (PoE) module featuring PoE Plus, with enough power for two doors and associated devices
    • An LCD display to provide status and troubleshooting information
    • A simple upgrade path to iSTAR Edge G2 with the iSTAR Edge Conversion Tool

    Benefits

    Saving You More Money
    Saving you more money

    Drastically reduce installation and startup costs while upgrading features with iSTAR Edge G2. It can directly replace its predecessor, iSTAR Edge; the hardware configurations and connection points remain the same, and the same iSTAR enclosure can be used, too.

    An Effortless Upgrade
    An effortless upgrade

    Hardware, firmware and software can be effortlessly upgraded thanks to features based on pre-existing Edge controllers. They include a 1.2GHz dual core CPU, advanced firmware features such as OSDP, clustering, intrusion zones and keypad commands, panel-based event logic, area controls and ample spare memory for future needs.

    So Much Flexibility
    So much flexibility

    iSTAR Edge G2 controllers provide a variety of power sourcing options for two doors. They offer a choice between a 12/24VDC local power source or iSTAR Edge G2’s unique PoE / PoE Plus plug-in module, which provides cost savings and ease of installation.

    Reliability Always
    Reliability always

    iSTAR Edge G2 is designed to be a true standalone appliance, providing uninterrupted door controller functionality if communication with the host system is lost.

    Cybersecure At The Core
    Cybersecure at the core

    The advanced, hardware-based cybersecurity protection utilizes the Trusted Execution Environment, a secure, isolated environment within its CPU that runs in parallel to the main Linux OS. This guarantees confidentiality and the integrity of the code and data loaded within the device.

    Scalable And Expandable
    Scalable and expandable

    iSTAR Edge G2 controllers offer expandable inputs and outputs using I8 and R8 modules, with the ability to connect as many as eight of each module per controller.

    Technical Resources

    Document Name
    Description
    Language
    Resource Type

    Data Sheet

    iSTAR-Edge-G2_ds_r01_hs_en (English-US)

    iSTAR Edge G2 Eight-Reader IP Access Control Edge Device

    English-US Data Sheet
    VIEW

    Data Sheet

    iSTAR-Edge-G2_ds_r03_hs_bra-pt (Portuguese-Brazil)

    iSTAR Edge G2 Dispositivo de borda para controle de acesso por IP com quatro leitoras

    Portuguese-Brazil Data Sheet
    VIEW

    Data Sheet

    iSTAR-Edge-G2_ds_r03_hs_lat-es (Latam-Spanish)

    iSTAR Edge G2 Dispositivo perimetral de control de acceso IP para cuatro lectoras

    Latam-Spanish Data Sheet
    VIEW

    Certificate

    Cert_CB_SWH_iStar_Edge_G2_0519 (English-US)

    IP Edge Certificate of Compliance

    English-US Certificate
    VIEW

    Certificate

    CoC_EMC_SWH_iStar_Edge_G2_0419 (English-US)

    iStar Edge II IP Edge Access Control Device - Certificate of Conformity

    English-US Certificate
    VIEW

    Declaration of Conformity

    DoC_DN127-2_iStar_Edge_G2_0721_Bloom (English-US)

    IP Edge Access Control Device - EU Declaration of Conformity

    English-US Declaration of Conformity
    VIEW

    Certificate

    DoC_DN127-2_iStar_Edge_G2_0721 (English-US)

    IP Edge Access Control Device - EU Declaration of Conformity

    English-US Certificate
    VIEW

    Declaration of Conformity

    UL-Add-iSTAR-Edge_G2-8200-1971-01-C (English-US)

    iSTAR Edge G2 UL Addendum

    English-US Declaration of Conformity
    VIEW

    Declaration of Conformity

    CC9K-v2-90-vpat-ri-hs-8200-2029-01-A0-en (English-US)

    VPAT® C•CURE 9000 v2.90 Accessibility Conformance Report

    English-US Declaration of Conformity
    VIEW

    Installation Guide

    Cert_CB_SWH_iSTAR_Edge_1110 (English-US)

    C•CURE 9000 Access Control and Event Management System Installation Guide

    English-US Installation Guide
    VIEW

    Certificate

    CoC_EMC_SWH_iSTAR_Edge_0810 (English-US)

    iSTAR Edge (EdgeStar) - Certificate of Conformity

    English-US Certificate
    VIEW

    Declaration of Conformity

    CoC_UL_SWH_iStar_Edge_1212 (English-US)

    Software House, DIV of sensormatic electronics LLC - Certificate of Compliance

    English-US Declaration of Conformity
    VIEW

    User Guide

    edge_doc (English-US)

    iSTAR Edge - EU Declaration of Conformity

    English-US User Guide
    VIEW
    No resource found for selected filter

    Back

    Next

    Related Products

    iSTAR Ultra G2 Controller

    iSTAR Ultra G2 Controller

    Software House software options

    Software House software options

    Touchscreen Reader

    Touchscreen Reader

    IP-ACM v2 Ethernet Door Module

    IP-ACM v2 Ethernet Door Module

    RM and OSDP Boards

    RM and OSDP Boards

    I/O Modules and Devices

    I/O Modules and Devices

    Software House
    CONNECT WITH US
    • Facebook Icon
    • LinkedIn Logo
    • Twitter logo
    • Youtube Icon
    JCI Logo
    Contact Us Subscribe to our newsletter
    • Access Control
    • Video Management Systems
    • Cameras
    • Commercial Intrusion
    • Residential Intrusion
    • Access Control and Event Management Software
    • Door Controllers
    • Door Controllers Modules and Accessories
    • Electronic Locks
    • Exit Devices
    • Readers and Biometrics
    • Credentials
    • Badging Printers Scanners and Accessories
    • Data Centers
    • IT, Telecom and Professional Services
    • Financial and Banking
    • Education
    • Government
    • Transportation
    • Healthcare
    • Retail
    • Industrial and Manufacturing
    • Sports and Entertainment
    • Support Portal
    • Professional Services
    • Register Software Licensing
    • Software Support Agreement
    • C•CURE User Forum
    • C•CURE Go Reader Privacy Notice
    • Cyber Protection Program
    • Training and Support Services
    • Warranty and Repair Services
    • Resources
    © 2025 Johnson Controls. All Rights Reserved.
    • Privacy Notice
    • Terms of Use
    • Accessibility
    • Modern Slavery Act