Paxton Access - Intelligent access control systems for buildings. About - The vandal proof reader is for use with Switchand Netsystems. Black and white caps are supplied with the reader.
The following readers have been tested on our Netplus control units running vsoftware. The LCD screen can be configured to display images of the customers choice.
Simple token management using our card packs makes administration of the system very easy.
Compact systems are available in proximity, magstripe and keypad variants , .
The desktop reader is designed to sit next to the PC. Additional workstations can also have desktop readers. With the Netsoftware running, any new token . These systems are programmed at each door. If tokens need to be barred or codes change this action must be . The majority of Paxton readers are treated to ensure the electronic components are completely sealed making them 1 resistant to water.
Our readers are suitable for external. Silent operation card: Disables the sounder in the reader. Once installation of the system is complete all user keyfobs are valid and ready to be issued.
As the reader is already housed in metal, its operation is affected less by fitting within close proximity to other metal objects. We have added Genuine HID Technology TM to the majority of Paxton readers. Cards supplied in packs of or 500. Keyfobs supplied in packs of 10. The keyfobs are provided in plastic pouches to keep each keyfob with its associated shadow card.
The card wallet is provided to store the shadow cards once the keyfobs have been issued. Take the matching shadow card and present it to each reader on your site. Exit buttons, door contacts, tamper switches and alarm devices may be connected. Control units communicate to the . What to do if readers or keypads are not working.
Confirm that the settings of the reader or keypad are correct. Check the wiring and integrity of the connectors. Standalone PROXIMITY systems are designed to be installed and administered with minimum effort.
Proximity hands free interface. All configuration and administration is carried out using function cards, allowing the user to easily tailor the system to suit the individual site. At every stage of the programming the PROXIMITY reader will acknowledge, by . Present the token to the reader and the Add User screen will.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.