Check out our special report on Cybersecurity
HID Dorado WP644 weather resistant pass-through magnetic stripe card reader
Technical Specification
- Make: HID
- Model code: Dorado WP644
- Reader Type: Magnetic Stripe
- Standalone/ Networkable: Standalone / Networkable
- Mount Type: Surface mount
The Model WP644 Weatherproof Pass-Through Reader combines ease-of-use with installation flexibility. Available with a white or black housing, the Model WP644 reader mounts on a door mullion, directly on the wall, or on a single-gang electrical box. Connect to access control systems using either a Wiegand or Clock-and-Data input.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control readers |
| Model code | Dorado WP644 |
| Reader Type | Magnetic Stripe |
| Standalone/ Networkable | Standalone / Networkable |
| Mount Type | Surface mount |
| LED / Beep | LED |
| Colour | White |
| Wiegand Interface | Yes |
| Clock-and-Data Interface | Yes |
| Electrical Specifications |
Voltage: 4.75 ~ 5.25 V DC Power Consumption: 35 mA |
| Environmental Specifications |
Operating Temp oC: -35 ~ + 66 Operating Humidity %: 5 ~ 95 |
| Additional info | The Model WP644 Weatherproof Pass-Through Reader combines ease-of-use with installation flexibility. Available with a white or black housing, the Model WP644 reader mounts on a door mullion, directly on the wall, or on a single-gang electrical box. Connect to access control systems using either a Wiegand or Clock-and-Data input. |
- See other HID products
- HID Access control cards/ tags/ fobs
- HID Access control controllers
- HID Access control software
Related Whitepapers
Three essential reasons to upgrade your access control technology in 2022
Physical access control in higher education
OSDP is the strongest access control for your business
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

