Check out our special report on Cybersecurity
HID R40
Technical Specification
- Make: HID
- Model code: R40
- Series: iCLASS Series
- Long Range: Yes
- Reader Type: Smart Card
The R40 is designed to mount and cover single gang switch boxes primarily used in the United States and includes a slotted mounting plate for European and Asian back box spacing. iCLASS Card : Up to 4.25”. iCLASS Key/Tag : Up to 2”. MIFARE / DESFire Card (CSN) : Up to 2.5”. 13.56 MHz transmission frequency.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control readers |
| Model code | R40 |
| Long Range | Yes |
| Reader Type | Smart Card |
| Standalone/ Networkable | Standalone |
| IP Rating | IP55 |
| Mount Type | Wall mount |
| Read Range mm | up to 108 mm |
| LED / Beep | LED / Beep |
| Colour | Black / Gray |
| Wiegand Interface | Yes |
| Clock-and-Data Interface | Yes |
| Electrical Specifications |
Voltage: 5 ~ 16 V DC Power Consumption: 50/75 mA @ 12 VDC |
| Physical Specifications | Dimensions mm: 84 x 122 x 24 |
| Environmental Specifications |
Operating Temp oC: -40 ~ +65 Operating Humidity %: 5 ~ 95 |
| Protection | Weather Resistant |
| Additional info |
The R40 is designed to mount and cover single gang switch boxes primarily used in the United States and includes a slotted mounting plate for European and Asian back box spacing. iCLASS Card : Up to 4.25”. iCLASS Key/Tag : Up to 2”. MIFARE / DESFire Card (CSN) : Up to 2.5”. 13.56 MHz transmission frequency. |
- See other HID products
- HID Access control cards/ tags/ fobs
- HID Access control controllers
- HID Access control software
Related Whitepapers
Three essential reasons to upgrade your access control technology in 2022
Physical access control in higher education
OSDP is the strongest access control for your business
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

