Schlage (Allegion) RCK15 Wall Mount IP Reader Controller with Keypad
Technical Specification
- Make: Schlage (Allegion)
- Model code: RCK15
- Controller Type: Networkable
- Networkable: Yes
- Onboard No/Type of Inputs / Outputs: Inputs: Request to Exit (REX) / Auxiliary Input (AUX) / Door Position Switch (DPS)
The RCK15 wall mount with keypad is a next-generation IP reader controller designed for scalable and flexible real-time access control in perimeter and high security applications. The all-in-one device leverages the comprehensive ecosystem from Schlage and offers simplified architecture, installation and integration into open PACS solutions, including Pure Access Cloud.
Read moreMake | Schlage (Allegion) |
---|---|
Manufacturer | Allegion plc |
Category | Access Control>Access control controllers |
Model code | RCK15 |
Controller Type | Networkable |
Networkable | Yes |
Onboard No/Type of Inputs / Outputs | Inputs: Request to Exit (REX) / Auxiliary Input (AUX) / Door Position Switch (DPS) |
Electrical Specifications | Voltage: DC power: 10 ~ 13 V DC, PoE or PoE+ (IEEE 802.3af, Class 0) |
Physical Specifications |
Dimensions mm: 130 x 83 x 25 Weight g: 232.5 |
Environmental Specifications |
Operating Temp oC: -40 ~ +66 C (-31 ~ +151 F) Protection: IP65 |
Additional info |
The RCK15 wall mount with keypad is a next-generation IP reader controller designed for scalable and flexible real-time access control in perimeter and high security applications. The all-in-one device leverages the comprehensive ecosystem from Schlage and offers simplified architecture, installation and integration into open PACS solutions, including Pure Access Cloud. |
Download PDF version Download PDF version |
More Schlage (Allegion) Access control controllers
You might be interested in these products
Related Whitepapers
Cybersecurity in keyless access management
Three essential reasons to upgrade your access control technology in 2022
Securing unmanned infrastructure at the network edge
A modern guide to data loss prevention
DownloadThe truth behind 9 mobile access myths
Download7 proven solutions for law enforcement key control and asset management
DownloadAccess control system planning phase 2
DownloadSecurity practices for hotels
Download