Rosslare Security Products AY-H25
Technical Specification
- Make: Rosslare Security Products
- Model code: AY-H25
- Long Range: Yes
- Reader Type: Mifare
- Standalone/ Networkable: Networkable
Compatible with a variety of Rosslare's Wiegand 26-Bit Format supporting access controllers: AC-215, AC-115, AC-015 and with many third party access control systems.
Read more| Make | Rosslare Security Products |
|---|---|
| Manufacturer | Rosslare Enterprises Ltd. |
| Category | Access Control>Access control readers |
| Model code | AY-H25 |
| Long Range | Yes |
| Reader Type | Mifare |
| Standalone/ Networkable | Networkable |
| IP Rating | IP65 |
| Mount Type | Surface mount |
| Reader Output format | 7 programmable output formats |
| LED / Beep | LED |
| Wiegand Interface | Yes |
| Electrical Specifications |
Voltage: 5 ~ 16 V DC Power Consumption: 35 mA @ 12 V |
| Physical Specifications |
Dimensions mm: 110 x 75 x 15 Weight g: 105 |
| Environmental Specifications |
Operating Temp oC: -31 ~ +63 Operating Humidity %: 0 ~ 95 |
| Protection | Tamper resistant |
| Accessories | Comes with mounting template for easier installation. |
| Additional info |
Compatible with a variety of Rosslare's Wiegand 26-Bit Format supporting access controllers: AC-215, AC-115, AC-015 and with many third party access control systems. |
- See other Rosslare Security Products products
- Rosslare Security Products Access control controllers
- Rosslare Security Products Intruder alarm system control panels & accessories
- Rosslare Security Products Access control systems & kits
- Rosslare Security Products Access control software
- Rosslare Security Products Electronic keypads
Related Whitepapers
Access and security in the age of hybrid working
Integrated access control: reap the benefits of connected security
Three essential reasons to upgrade your access control technology in 2022
Aligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
DownloadSecurity and surveillance technologies for the casino market
Download

