Rosslare Security Products AY-L23 E Access control reader
Technical Specification
- Make: Rosslare Security Products
- Model code: AY-L23 E
- Long Range: Yes
- Reader Type: Proximity
- Standalone/ Networkable: Networkable
This unique RF Reader is compatible with Rosslare's UHF Remote Controls in the ISM Band, can receive an ID from a remote control from up to 70 meters range. Ideal for applications such as guard towers, and long range use.
Read more| Make | Rosslare Security Products |
|---|---|
| Manufacturer | Rosslare Enterprises Ltd. |
| Category | Access Control>Access control readers |
| Model code | AY-L23 E |
| Long Range | Yes |
| Reader Type | Proximity |
| Standalone/ Networkable | Networkable |
| IP Rating | IP65 |
| Mount Type | Surface mount |
| LED / Beep | LED |
| Wiegand Interface | Yes |
| Electrical Specifications |
Voltage: 6 ~ 12 V DC Power Consumption: 55 mA |
| Physical Specifications |
Dimensions mm: 145 x 43 x 21 Weight g: 138 |
| Environmental Specifications |
Operating Temp oC: 0 ~ 63 Operating Humidity %: 0 ~ 100 |
| Protection | Weather Resistant |
| Additional info | This unique RF Reader is compatible with Rosslare's UHF Remote Controls in the ISM Band, can receive an ID from a remote control from up to 70 meters range. Ideal for applications such as guard towers, and long range use. |
- See other Rosslare Security Products products
- Rosslare Security Products Access control controllers
- Rosslare Security Products Intruder alarm system control panels & accessories
- Rosslare Security Products Access control systems & kits
- Rosslare Security Products Access control software
- Rosslare Security Products Electronic keypads
Related Whitepapers
Access and security in the age of hybrid working
Integrated access control: reap the benefits of connected security
Three essential reasons to upgrade your access control technology in 2022
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

