Paxton Access Switch2 Access control system
Technical Specification
- Make: Paxton Access
- Model code: Switch2
- Standalone/ Networked/ PC: Standalone
- Reader Type: Proximity
- Max Doors per System: 2 doors/system
The control unit stores the access permissions of the user and is mounted within the building. This makes the system suitable for high security applications. Switch2 can be used with PROXIMITY, CARDLOCK or TOUCHLOCK readers. Switch2 can be installed to many doors over a site, all using the same tokens. Two readers can be connected to a single unit to give read in and read out access control
Read moreMake | Paxton Access |
---|---|
Manufacturer | Paxton Access Limited |
Category | Access Control>Access control systems & kits |
Model code | Switch2 |
Standalone/ Networked/ PC | Standalone |
Reader Type | Proximity |
Max Doors per System | 2 doors/system |
Max No. of Controllers | 1 controllers/system |
Max Doors per Controller | 2 doors/controller |
No of Cardholders | 10,000 |
Additional info |
The control unit stores the access permissions of the user and is mounted within the building. This makes the system suitable for high security applications. Switch2 can be used with PROXIMITY, CARDLOCK or TOUCHLOCK readers. Switch2 can be installed to many doors over a site, all using the same tokens. Two readers can be connected to a single unit to give read in and read out access control |
Download PDF version Download PDF version |
See comparison of Paxton Access Switch2 with similar Paxton Access Access control systems & kits
Compare Paxton Access Switch2 with Access control systems & kits from other manufacturers
You might be interested in these products
Related Whitepapers
The critical role of access control in K-12 school security
The benefits of Edge AI + Cloud for security systems
Integrated access control: reap the benefits of connected security
5 surprising findings from OT vulnerability assessments
DownloadThe 2024 state of physical access trend report
DownloadGuide for HAAS: New choice of SMB security system
DownloadSecurity practices for hotels
DownloadThe security challenges of data centers
Download