Rosslare Security Products AY-H25
Technical Specification
- Make: Rosslare Security Products
- Model code: AY-H25
- Long Range: Yes
- Reader Type: Mifare
- Standalone/ Networkable: Networkable
Compatible with a variety of Rosslare's Wiegand 26-Bit Format supporting access controllers: AC-215, AC-115, AC-015 and with many third party access control systems.
Read moreMake | Rosslare Security Products |
---|---|
Manufacturer | Rosslare Enterprises Ltd. |
Category | Access Control>Access control readers |
Model code | AY-H25 |
Long Range | Yes |
Reader Type | Mifare |
Standalone/ Networkable | Networkable |
IP Rating | IP65 |
Mount Type | Surface mount |
Reader Output format | 7 programmable output formats |
LED / Beep | LED |
Wiegand Interface | Yes |
Electrical Specifications |
Voltage: 5 ~ 16 V DC Power Consumption: 35 mA @ 12 V |
Physical Specifications |
Dimensions mm: 110 x 75 x 15 Weight g: 105 |
Environmental Specifications |
Operating Temp oC: -31 ~ +63 Operating Humidity %: 0 ~ 95 |
Protection | Tamper resistant |
Accessories | Comes with mounting template for easier installation. |
Additional info |
Compatible with a variety of Rosslare's Wiegand 26-Bit Format supporting access controllers: AC-215, AC-115, AC-015 and with many third party access control systems. |
Download PDF version Download PDF version |
You might be interested in these products
- See other Rosslare Security Products products
- Rosslare Security Products Access control controllers
- Rosslare Security Products Intruder alarm system control panels & accessories
- Rosslare Security Products Access control systems & kits
- Rosslare Security Products Access control software
- Rosslare Security Products Electronic keypads
Related Whitepapers
Access and security in the age of hybrid working
Integrated access control: reap the benefits of connected security
Three essential reasons to upgrade your access control technology in 2022
The key to unlocking K12 school safety grants
DownloadHoneywell GARD USB threat report 2024
DownloadThe truth behind 9 mobile access myths
Download5 surprising findings from OT vulnerability assessments
DownloadPhysical access control
Download