Check out our special report on casino security
ASSA ABLOY EAC-DP5 door reader module
Technical Specification
- Make: ASSA ABLOY
- Model code: EAC-DP5
- Series: Incedo - Door Reader module
- Controller Type: Standalone/Networkable
- Networkable: Yes
Reader Module in plastic housing Connects up to two wired readers Can usually accommodate readers placed up to 150m from the unit, perfect for most small to medium-sized businesses Eight status LEDs provide concise diagnostic indication for any maintenance requirements Can upgrade firmware direct from a PC without the need to remove any module Enables Relaxed or Full Anti-Passback (APB) access on a single door, or single entry on two doors Includes end-of-line (EOL) sensing on door contact inputs, for additional security within the building Has dry contact digital inputs, including door contact, and two request-to-exit (RTE) inputs Interfaces seamlessly with Aperio® locks and readers, as well as to legacy devices like UHF Receivers Simple and quick installation
Read more| Make | ASSA ABLOY |
|---|---|
| Manufacturer | ASSA ABLOY |
| Category | Access Control>Access control controllers |
| Model code | EAC-DP5 |
| Series | Incedo - Door Reader module |
| Controller Type | Standalone/Networkable |
| Networkable | Yes |
| Electrical Specifications |
Voltage: 12 ~ 15 V DC Power Consumption: 37 mA |
| Physical Specifications |
Dimensions mm: 186 x 99 x 57 Weight g: 280 |
| Environmental Specifications |
Operating Temp oC: -25 ~ 60 C (-13 ~ 140 F) Operating Humidity %: 0 ~ 95 Protection: IP20 |
| Additional info |
|
More ASSA ABLOY Access control controllers
You might be interested in these products
Related Whitepapers
Moving to mobile: A guide for businesses switching to mobile access control
Protecting your data against physical threats
Solve access control challenges in the healthcare sector
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
