Global Directory

  • Security
    • American DynamicsAmerican Dynamics Logo
    • Bentel Security Bentel Logo
    • CEM SystemsCEM Systems written on a white background
    • CloudvueCloudvue logo
    • DSCDSC written on a white background
    • ExacqExacq-gray
    • IllustraIllustra logo
    • IQIQ
    • KantechKantech logo on a white background
    • SES
    • Software HouseSoftware House logo
    • VisonicVisonic logo
  • Building Automation and Controls
    • Johnson ControlsJCI logo
    • MetasysMetasys logo
    • Facility ExplorerFacility Explorer logo
    • EasyIOEasyio Logo
    • VerasysVerasys logo
    • BCProAnsul logo
    • PENNPenn logo
  • Digital Solutions
    • OpenBlueOpenBlue Logo
    • FM:Systems
  • Fire Detection
    • AutocallAnsul logo
    • FireClassFireClass logo
    • SimplexSimplex logo
    • ZettlerZettler logo
    • VigilantVigilant logo
    • DBEDBE written on a white background
  • Fire Suppression
    • Tyco FireTyco Blue Logo
    • ANSULAnsul logo
    • ChemguardChemguard logo
    • SkumSkum logo
    • HygoodHygood logo
    • GrinnellGrinell logo
    • SprinkCADSprinkCAD logo
    • Pyro ChemPyro-Chem logo
    • AquaMistAnsul logo
  • HVAC Equipment
    • Johnson ControlsJCI logo
    • YorkYORK logo
    • Championchampion
    • ColemanColeman logo
    • EnvirotecEnviro-Tec logo
    • LuxaireLuxaire Heating & Cooling logo
    • Miller-Picking
    • Pace
    • QuantechQuantech logo
    • Silent-Aire
    • TempmasterTempMaster logo
    • TriatekTriatek logo
    • TrionTrion IAQ logo
  • Industrial Refrigeration
    • YorkYORK logo
    • FrickFrick Industrial Refrigeration logo
    • M&M Carnot
    • SabroeSabroe logo
    • York Process Systemsyork-process-system-logo
  • Retail Solutions
    • Sensormatic
JCI Logo
Login | Register
Login | Register
Software House
  • Products and Solutions
    Products and Solutions
    • Access Control Management Software
      Access Control Management Software
      • Access Control Management Software
      • Access Control and Event Management Software
      Featured

      Natively Intelligent Security Software to Scale

      CCURE IQ 310 image

      Physical security solutions built to adapt and scale —so you’re always ready for what’s next.

      Explore our software
    • Controllers
      Controllers
      • Controllers
      • Door Controllers
      • Door Controller Modules and Accessories
      • Electronic Locks
      • Exit Devices
    • Readers and Credentials
      Readers and Credentials
      • Readers and Credentials
      • Readers and Biometrics
      • Credentials
    • Other Products and Services
      Other Products and Services
      • Other Products and Services
      • Access Control and Event Management
      • Badging Printers Scanners and Accessories
    • Register Software Licensing
  • Services and Support
    Services and Support
    • Services and Support
    • Support Portal
    • Professional Services
    • Register Software Licensing
    • Software Support Agreement
    • C•CURE User Forum
    • C•CURE Go Reader Privacy Notice
    • Cyber Protection Program
    • Training and Support Services
    • Warranty and Repair Services
    • Resources
  • Industries
    Industries
    • Industries
    • Data Centers
    • IT, Telecom and Professional Services
    • Financial and Banking
    • Education
    • Government
    • Transportation
    • Healthcare
    • Retail
    • Industrial and Manufacturing
    • Sports and Entertainment
  • Partners
    Partners
    • Compatibility Matrix
    • Technology Partners
Search Contact Us
  1. Software House
  2. Controllers
  3. Door Controllers
  4. iSTAR Ultra G2 Controller
iSTAR Ultra SE G2 product image
Istar ultra g2 collage product image
Istar ultra g2 rack mount servers product image
Istar ultra g2 enclosure open product image
Istar ultra g2 enclosure closed product image
  • iSTAR Ultra SE G2 thumb image
  • Istar ultra g2 collage thumb image
  • Istar ultra g2 rack mount servers thumb image
  • Istar ultra g2 enclosure open thumb image
  • Istar ultra g2 enclosure closed thumb image

iSTAR Ultra G2 Controller

Cyber-hardened and network door controller supporting up to 32 readers

iSTAR Ultra G2 is a powerful, cyber-hardened and network door controller that supports up to 32 readers. It meets the most demanding access control requirements of enterprise and government applications.

  • iSTAR Ultra G2 Controllers are cyber-hardened network door controllers for up to 32 readers. iSTAR Ultra G2 is best suited to new, wired or wireless installls, while the iSTAR Ultra G2 SE shine in retrofits or upgrades where reduced space is available. They both use OSDP Secure Channel for encrypted reader communications with embedded PIV authentication.
  • Built using a Trusted Execution Environment with advanced network security features, iSTAR Ultra G2 meets the most demanding access control requirements of enterprise and government applications.
  • iSTAR Ultra G2 is ideal for areas that require many readers close to the panel.
Back to Top

iSTAR Ultra G2 Controller

  • Overview
  • Features
  • Benefits
  • Product literature
  • Related products
    Contact Us

    The power of iSTAR Ultra G2

    The iSTAR Ultra G2 door controller brings security to the next level, with advanced access control features, flexible installation, and a cyber-hardened core built to combat the most sophisticated hackers. It supports OSDP Secure Channel for encrypted reader communications, as well as embedded High Assurance FICAM operation without third-party hardware. This ensures that it meets the most demanding access control requirements of enterprise and government applications.
    The power of iSTAR Ultra G2

    Features

    • A powerful cyber-hardened network door controller for up to 32 readers
    • A hardened Linux embedded OS for improved security and scalability, with up to one million cardholders in local memory
    • Advanced controller-to-controller communications for cluster-based anti-passback and I/O logic
    • Trusted Execution Environment for advanced hardware-based cybersecurity protection
    • Dual GigE network ports with IPv6, DHCP and 802.1X support, and a Power over Ethernet (PoE) module featuring PoE+ to power the GCM
    • Supports OSDP Secure Channel for encrypted reader communications, as well as embedded High Assurance FICAM operation without third-party hardware

    Benefits

    Confidentiality And Integrity
    Confidentiality and integrity

    iSTAR Ultra G2 provides advanced hardware-based cybersecurity protection by utilizing Trusted Execution Environment. This secure isolated environment within its CPU runs in parallel to the main Linux OS, maintaining the confidentiality and integrity of the code and data.

    Cost-Effective Scalability
    Cost-effective scalability

    iSTAR Ultra G2 is complemented by a host of available inputs and outputs for 32 doors, as well as optional I/O expansion modules for cost-effective solutions using the panel’s RM bus.

    Uninterrupted Security
    Uninterrupted security

    If communication between iSTAR Ultra G2 and the host system is lost, the device is designed to be a true standalone appliance. All door controller functionality remains uninterrupted, and all alarms and events are buffered until host communications are restored.

    No Redesign Needed
    No redesign needed

    There is no need to redesign an access control project due to controller hardware changes. iSTAR Ultra G2 shares the same overall wiring layout and connectors as its predecessor, iSTAR Ultra. That drastically reduces installation and startup costs.

    Technical Resources

    Document Name
    Description
    Language
    Resource Type

    Data Sheet

    iSTAR-Ultra-G2_ds_r02_hs_en_2024 (English-US)

    iSTAR Ultra G2 Cyber-hardened Access Controller for up to 32 Readers

    English-US Data Sheet
    VIEW

    Data Sheet

    iSTAR-Ultra-G2_ds_r03_hs_bra-pt (Portuguese-Brazil)

    iSTAR Ultra G2 Controle de acesso com cibersegurança reforçada para até 32 leitoras

    Portuguese-Brazil Data Sheet
    VIEW

    Data Sheet

    iSTAR-Ultra-G2_ds_r03_hs_DE (German-Germany)

    iSTAR Ultra G2 Zutrittssteuerungs-Controller mit verbesserten Cybersicherheitsfunktionen für bis zu 32 Lesegeräte

    German-Germany Data Sheet
    VIEW

    Data Sheet

    iSTAR-Ultra-G2_ds_r03_hs_ES (Spanish-Spain)

    iSTAR Ultra G2 Controlador de acceso ciberreforzado para un máximo de 32 lectores

    Spanish-Spain Data Sheet
    VIEW

    Data Sheet

    iSTAR-Ultra-G2_ds_r03_hs_FR (French-France)

    iSTAR Ultra G2 Contrôleur d’accès cybersécurisé pour 32 lecteurs

    French-France Data Sheet
    VIEW

    Data Sheet

    iSTAR-Ultra-G2_ds_r03_hs_lat-es (Latam-Spanish)

    iSTAR Ultra G2 Controlador de acceso con ciberseguridad reforzada para 32 lectoras

    Latam-Spanish Data Sheet
    VIEW

    Data Sheet

    iSTAR-Ultra-G2_ds_r03_hs_NL (Dutch-Netherlands)

    iSTAR Ultra G2 Cyber-hardened toegangscontroller geschikt voor 32 lezers

    Dutch-Netherlands Data Sheet
    VIEW

    Data Sheet

    iSTAR-Ultra-G2_ds_r03_hs_PL (Polish-Poland)

    iSTAR Ultra G2 Cybernetycznie zabezpieczony kontroler dostępu dla 32 czytników

    Polish-Poland Data Sheet
    VIEW

    Certificate

    CoC_EMC_iStar_Ultra_G2_1121 (English-US)

    iStar Ultra G2 ACM SE - Certificate of Conformance

    English-US Certificate
    VIEW

    Declaration of Conformity

    DoC_DN509-0_SWH_iSTAR_Ultra_G2_0722 (English-US)

    iSTAR Ultra G2 - EU Declaration of Conformity

    English-US Declaration of Conformity
    VIEW

    Declaration of Conformity

    UL-Add-iSTAR-Ultra_G2-8200-1995-04-A (English-US)

    iSTAR Ultra G2 UL Addendum

    English-US Declaration of Conformity
    VIEW
    No resource found for selected filter

    Back

    Next

    Related Products

    Software House software options

    Software House software options

    iSTAR Edge G2 Controller

    iSTAR Edge G2 Controller

    IP-ACM v2 Ethernet Door Module

    IP-ACM v2 Ethernet Door Module

    Software House
    CONNECT WITH US
    • Facebook Icon
    • LinkedIn Logo
    • Twitter logo
    • Youtube Icon
    JCI Logo
    Contact Us Subscribe to our newsletter
    • Access Control
    • Video Management Systems
    • Cameras
    • Commercial Intrusion
    • Residential Intrusion
    • Access Control and Event Management Software
    • Door Controllers
    • Door Controllers Modules and Accessories
    • Electronic Locks
    • Exit Devices
    • Readers and Biometrics
    • Credentials
    • Badging Printers Scanners and Accessories
    • Data Centers
    • IT, Telecom and Professional Services
    • Financial and Banking
    • Education
    • Government
    • Transportation
    • Healthcare
    • Retail
    • Industrial and Manufacturing
    • Sports and Entertainment
    • Support Portal
    • Professional Services
    • Register Software Licensing
    • Software Support Agreement
    • C•CURE User Forum
    • C•CURE Go Reader Privacy Notice
    • Cyber Protection Program
    • Training and Support Services
    • Warranty and Repair Services
    • Resources
    © 2025 Johnson Controls. All Rights Reserved.
    • Privacy Notice
    • Terms of Use
    • Accessibility
    • Modern Slavery Act