Welcome visit RFID & Security Warehouse!

Category Navigation:

Access Controller TCP/IP Net Web Admin 1 Door 2 Reader


Availability: In stock

Be the first to review this product

Access Controller TCP/IP Net Web Admin 1 Door 2 Reader
Model : L01


Access Controller TCP/IP Net Web Admin 1 Door 2 Reader

Unit Size 160mm *106mm
Unit Packing Way Brown box
Unit Packing Size
Accessories User Manual, warranty card
Function Introduction
Conventional Function offline operation; real time supervision; photo display; mass storage; flexible user privilege setup; remote unlocking; multi-user supervision; quick setting; convenient checking and query; revisable and printable report form; report form;report can be exported to excel file; card+password unlocking; alarm for long time unclosing;alarm for invalid card swiping; first card unlocking;alarm for illegal break in; unlocking at definite time; e-map ,patrol, meeting,const meal etc.
Professional function for professional users such as bank,cash house, telecom station, power supply station,prison and plice station: interface locking; intimidation alarm; integrated fire control;anti-passback and anti-tail; interlocking;multi-card unlocking; emergency double locking; in door population checking; unlocking based on internal and external validation.
all-in-one-card management system nomal shift and multi-shifts time attendance management system; fixed ration dining management system; meeting attendance management system; online patrol management system and security alarm management system.
Communication TCP/IP
English Software supportable database: SQL
Description Control 1 door, get in and out door by swiping card, or get in by swiping card and get out door by button
Power Supply 12VDC; 4-7A
Power Consumption of Circuit Board Less than 100mA
Input Format of Reader Wiegand 26/34 bit (All card reader with compatible protocol, such as Motorola , HID, EM , Mifare one etc)
Quantity of Readers 2 Pcs
Door Controlled 1
Door opening time extending setting 1-600 Seconds(adjustable)
Max q ' ty of controller Unlimited
Operation Temperature -40℃-70℃
Operation Humidity 10-90 % RH , No Condensation
Q ' ty of users 20,000 Users
Q ' ty of Event Buffers(offline) 100,000 Event Buffers
Power interruption protection measure High Speed Memory, Records never lose
Max Distance from Reader to Controller 100M (suggestion distance 80m)
Max Distance between Controllers
Depand on network range
Collocations PCB board, case, power, power line, serial port communication line, software, manual, certificate, key(2pcs), carton
Alarm for long time door open, ilegal break in, intimidate Yes
Fire and alarm linkage If no connection with the expansion board, only has software interface alarm, and drive the computer speaker. If connected with expansion board, is able to alarm by hardware, if connected with strengthened expansion board, then is able to Security alarm
Complsive open and close door at long time Yes
Open door in remote distance Yes
Inter block No
Anti pass back and tail Yes
Multi-card open door Yes
Open long time at specified time Yes
Electronic map Yes
Urgency locking Yes
First card unlocking Yes
Unlock based on internal and external validation Yes
Keypad (card+passwor, supper password) Yes

Software (Access Control + Time & Attendances + Patrol )

Contactless Cards Management System is a sophisticated access control and alarm management software. It centralises security requirements within all types of installation irrespective of their complexity. Large installations can rely on the power of ACCESS 2000 to monitor tens of thousands of cardholders and hundreds of controllers, in multi-sites applications. Database mirroring, system redundancy and import/export of databases increase the system efficiency and security.

Access Control with Multiple Functions. In addtion to standard access control features (time zones, access levels, etc.),Contactless Cards Management System offers many built-in functions: numerous levels of password protection, anti-passback(local, global, and timed), interlock, counters, message on the controller display, etc...

Security is reinforced as alarm conditions, events and schedule automatically trigger predefined actions, processes and global reflexes. 

Actions, Processes and Global Reflex. All actions are available to be sequenced within processes and incorporated into global reflexes, triggered upon predefined events (access, alarm and schedule). Examples: flashing icons, visual or audible instructions, command sent to com port, external applications executed, report printed or exported, any programmed relay activation, arm/disarm alarm zones, card invalidation, etc...

Personalised Reports Wizard. Contactless Cards Management System incorporates a powerful report user-friendly wizard for generation, update and export of personalised reports, all in widely used existing formats. Reports are compiled from the journal of from the system database. 



  • Access Control
  • Time & Attendance: T&A reports show how long cardholders have spent on the site. It eases the calculation of individual or groups of employees' daily and total hours, over a definable period. The employees' transactions can easily be exported to external T&A applications.
  • Guard Patrol Program: A guard patrol tou checks the appropriate arrival of a guard at specdific checkpoints within predefined deadlines.

Main features 

  • Real time monitoring of movements and alarms
  • Up to 100,000 card holders
  • Compatible with WIEGAND controllers:2001,WG2002,WG2004,WG2002..NET
  • Compatible Windows 98/2000/ME/NT/XP
  • Wizard
  • Visual identification
  • Real time monitoring of movements and alarms 

Product Attachments

View FileAccess Management Software 7.55 for AT8000 Series Controller    Size: (17.19 MB)

Product Tags

Use spaces to separate tags. Use single quotes (') for phrases.

Write Your Own Review

You're reviewing: Access Controller TCP/IP Net Web Admin 1 Door 2 Reader

Do You Have Any Question ?

5 + 5 = enter the result ex:(3 + 2 = 5)

* required fields

Sharing of Knowledge with Professionals
  1. Top 10 Best Google Chrome Extensions For Entrepreneurs

    13.05.2017 12:05

    Source: Top 10 Best Google Chrome Extensions For Entrepreneurs

  2. 8 of your best predictions for the future of IoT in 2017

    08.01.2017 07:01

    This year we decided ask some of those working across our IoT verticals about...

  3. The Opportunities and Challenges of the Industrial Internet of Things | 2017-01-01 | Quality Magazine

    08.01.2017 06:01

    The Internet of Things (IoT) describes the growing trend in which a wide...

  4. Can You Post to Instagram from Desktop? 10 Options to Try

    02.01.2017 07:01

    Wondering if you can post to Instagram from desktop? Here are 10 options....

  5. IBM 研討會 – 議程: 2016 IBM預建未來論壇

    02.01.2017 03:01

    Source: IBM 研討會 – 議程: 2016 IBM預建未來論壇

  6. 7 張圖,一次讀懂「基層→高層」的升遷路徑!|經理人

    01.01.2017 21:01

    Source: 7 張圖,一次讀懂「基層→高層」的升遷路徑!|經理人

  7. 把錢給到位,讓心不委屈!看鼎泰豐如何「寵」員工,讓人力變人才|經理人

    01.01.2017 21:01

    Source: 把錢給到位,讓心不委屈!看鼎泰豐如何「寵」員工,讓人力變人才|經理人

  8. 【強勢挑戰 PayPal】FinTech 獨角獸 Stripe 推到 25 國,每年處理超過 100 億美元交易 | TechOrange

    01.01.2017 21:01

    Stripe英國範圍負責人本月在富比士中介紹了Stripe公司的五大競爭力: 1、商業模式:不止是支付平台...

  9. Optimizing Manufacturing with the Internet of Things(IoT) : White Paper

    29.12.2016 06:12

    Big data analytics and the Internet of Things in manufacturing Industry as an...

  10. 10 Tips to Improve Construction Site Security | Alok Sharma | Pulse | LinkedIn

    28.12.2016 06:12

    Source: 10 Tips to Improve Construction Site Security | Alok Sharma...

Contact Us

Block 4 West, SEG Technology Park, Hua Qiang Road North, Shenzhen, China



Email Newsletters
Welcome leave us your email address for product update