Wavetrend L-PA100 Access control card/ tag/ fob
Technical Specification
- Make: Wavetrend
- Model code: L-PA100
- Series: L-Series
- Operating Temperature oC: -10 ~ +60
- Voltage: 5 ~ 13.6
The Wiegand interface unit converts data from the Wavetrend Buffer L-CB100 or the Wavetrend Reader L-RX201 to standard Wiegand (bit selectable) protocol as commonly used in the Access Control Industry. The unit comprises of a plug-in module, consisting of a 8-way screw terminal for the input wires from the Receiver Network and an 8-way terminal for the seven wires to a Wiegand access controller. The user should order Wiegand encoded Tags for use with this unit.
Read more| Make | Wavetrend |
|---|---|
| Manufacturer | Wavetrend Ltd |
| Category | Access Control>Access control cards/ tags/ fobs |
| Model code | L-PA100 |
| Series | L-Series |
| Environmental Specifications | Operating Temperature oC: -10 ~ +60 |
| Electrical Specifications | Voltage: 5 ~ 13.6 |
| Accessories | Wiegand interface protocal adapter |
| Additional info | The Wiegand interface unit converts data from the Wavetrend Buffer L-CB100 or the Wavetrend Reader L-RX201 to standard Wiegand (bit selectable) protocol as commonly used in the Access Control Industry. The unit comprises of a plug-in module, consisting of a 8-way screw terminal for the input wires from the Receiver Network and an 8-way terminal for the seven wires to a Wiegand access controller. The user should order Wiegand encoded Tags for use with this unit. |
- See other Wavetrend products
- Wavetrend Access control systems & kits
- Wavetrend Access control readers
- Wavetrend Access control software
Related Whitepapers
Integrated access control: reap the benefits of connected security
A guide to specifying RFID readers
Three essential reasons to upgrade your access control technology in 2022
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download
