
AK-C313W-2
- Linux monitor for video intercom
- 7" TFT Screen
- Crystal Clear two-way audio
- 2 wires, WiFi, standard SIP
- Cloud-based maintenance
- Connection of monitor and boards via Cloud

The video door entry monitor is the element that is placed inside the premises, therefore it is also called an indoor unit, and allows to receive calls from visitors to the building staff.
This model has a 7" touch screen for easy operation by the user.
The 2 wire equipment communicates and is powered by conventional copper cables (called wires) and distributors, making it possible to reuse conventional installations that already have this type of wiring.
By having 1 relay output you can act on different elements, such as doors or bells to be triggered during calls.
Advanced configurable functions: oNVIF protocol (allows adding CCTV cameras directly to the monitor without additional APPs), standard SIP protocol 2.0 (allows integrating the equipment with third-party PBXs) and doorbell input (allows directly connecting the doorbell push button to the monitor to act as one).
From the Akuvox Installer Cloud the installation structure is created and the devices are added by their MAC addresses. In this cloud-based platform, you can update the firmware of the devices, modify their local settings (such as network parameters, volume settings, relay parameters, etc.) or monitor their connection status, all remotely. In addition, this system allows computers to communicate with each other from anywhere, without the need to open ports or use a VPN, thanks to the Multisite technology.
The Property Manager Cloud allows you to manage community and office projects created by installers to give credentials to users (key fobs or PIN codes), view access logs or send messages to users.
With the SmartPlus mobile application, the end user can receive calls, open the door or view the live camera of the panel, all from any location. Users can review a complete call and access log, with screenshots, or set up different access methods (PIN codes, NFC and/or Bluetooth access or facial recognition). In addition, they can also create temporary access codes, called temporary keys, with which to generate time-limited access to share with those who need to access the system.