ACT ACTpro MF 1050 access control reader with built in buzzer
Technical Specification
- Make: ACT
- Model code: ACTpro MF 1050
- Reader Type: Proximity
- Standalone/ Networkable: Standalone
- IP Rating: IP67
Choice of mifare proximity only or pin and mifare proximity. Reader configurable as a Serial or Sector Reader. Compatible with ACTpro mifare ISO cards and Fobs. Sector reader operation configurable for non-ACT cards and fobs via programming card. Selectable Clock and Data or 37-bit Wiegand Output Built-in Buzzer. 4 Colour LED. Surface or flush mount (mounting directly on to standard electrical box). Robust Polycarbonate housing.
Read more| Make | ACT |
|---|---|
| Manufacturer | Vanderbilt Industries |
| Category | Access Control>Access control readers |
| Model code | ACTpro MF 1050 |
| Reader Type | Proximity |
| Standalone/ Networkable | Standalone |
| IP Rating | IP67 |
| Mount Type | Surface mount |
| Keypad Integrated | Yes |
| LED / Beep | LED |
| Wiegand Interface | Yes |
| Clock-and-Data Interface | Yes |
| Electrical Specifications | Voltage: 8 ~ 16 V DC |
| Physical Specifications |
Dimensions mm: 110 x 100 x 35 Weight g: 170 |
| Environmental Specifications | Operating Temp oC: -20 ~ +50 |
| Protection | IP67 |
| Additional info | Choice of mifare proximity only or pin and mifare proximity. Reader configurable as a Serial or Sector Reader. Compatible with ACTpro mifare ISO cards and Fobs. Sector reader operation configurable for non-ACT cards and fobs via programming card. Selectable Clock and Data or 37-bit Wiegand Output Built-in Buzzer. 4 Colour LED. Surface or flush mount (mounting directly on to standard electrical box). Robust Polycarbonate housing. |
Related Whitepapers
10 top insights in access, cloud and more
Schooling the market on education security
Access and security in the age of hybrid working
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

