Top Compact Keyboards, Timer Electric Toothbrushes, Wi-Fi Modules, Battery Cases, and Gaming Keyboards for 2023
Top Compact Keyboards, Timer Electric Toothbrushes, Wi-Fi Modules, Battery Cases, and Gaming Keyboards for 2023 Top Compact Keyboards, Timer Electric Toothbrushes, Wi-Fi Modules, Battery Cases, and Gaming Keyboards for 2023
Home Control Panel Compact Keyboard
Paxton 326-735-US PROXIMITY compact vandal proof reader

Paxton 326-735-US PROXIMITY compact vandal proof reader

$ 63.53

$ 82.59

Unavailable
Paxton 326-735-US PROXIMITY compact vandal proof reader

Paxton 326-735-US PROXIMITY compact vandal proof reader

$ 63.53

$ 82.59

Title:
  • DefaultTitle
Unavailable
Please select combo product attributes
The combo subtotal is $,SAVE$

Product Details

  • IPX7 rated - suitable for external use
  • A simple solution for vulnerable areas
  • A lost card can be deleted in seconds
  • Control over access by token color
  • Up to 10,000 users on one site
  • All cards are immediately valid

About – Proximity compact vandal proof reader is a single door access control system with all of the electronics within the housing of the reader. Compact systems can be installed on many doors over a site, all using the same cards. The compact vandal-proof reader’s cylindrical construction means that all the control electronics may be buried in a wall. This reader is ideal where access control is required on a door at risk of vandalism. The end cap is used as a marker, so users know where to present their tokens. The reader is supplied with black caps as standard. Replacement covers in a range of colors are available to Paxton registered installers free of charge.

Installation – The compact reader has two wires which connect to the lock and two wires which connect to the power supply. There are two wires for connection to an exit button if required. It is not recommended to mount the reader in metal as this will affect the read range. The vandal proofreader is buried into the wall. The most secure mounting is in a blind hole (see illustration below). Once installed, present the enrolment card to the reader. All the tokens in the pack are now valid.

Operation – User tokens are valid and ready for use once the installation is complete. Every user token is supplied with a corresponding shadow card. As user tokens are issued, the name of the user is marked on the shadow card. If a user is to be barred, or a user card is lost, the shadow card marked with the user’s name is presented to any readers on site. This simple action invalidates the user card. Another user token may be issued for that user.

Additional features can be programmed using the PROXIMITY function card pack. These features include zoning which allows you to limit access by zone color.

You May Also Like

Cart
Top Compact Keyboards, Timer Electric Toothbrushes, Wi-Fi Modules, Battery Cases, and Gaming Keyboards for 2023
Your cart is currently empty.