Specification

Swipe the card to activate pathway lighting and
additional safety features.
Swiping a card can: Disarm the alarm, Release the door lock,
Light a pathway, Change temperature, Turn on audio zones
with volume and, more!
Leviton
Access
Control
Technical Data Sheet
Access Control Product Family
Limit admission to designated areas
using Leviton Security & Automation’s
Access Control products. When you swipe
a card or keytag, you can accomplish
multiple functions such as arming or
disarming security and activating
a door strike to open a door.
The Access Control product family
consists of a proximity card reader and
accessories that connect to a Leviton
automation control system. The Card
Reader is a 125 KHz high security,
digitally encrypted, 26-Bit proximity card
reader that connects to a serial port on
a Leviton automation system. It provides
a read range up to 4 inches with the
clamshell cards and up to 2 inches with
the key tags.
The reader features durable and scratch
resistant polycarbonate housing. Full
epoxy potting ensures successful
operation even in harsh environments.
It has simplified wiring for residential
or small commercial use – everything
between the controller and the readers
go over a single 4 conductor or Cat5 wire,
including power.
The reader incorporates an input for a
push to exit button and an output for an
electric door strike or magnetic lock. It
can be mounted to a door frame (mullion)
or to any flat wall surface. The two-color
LEDs (green and red) and piezo sounder
on the reader can be customized to
provide individual feedback to the user.
Use either a standard credit card sized
Access Control Card or the convenient
Access Control Keytag to access
the system.
Each card is attached to a user code in
the Leviton Omni or Lumina automation
controller which can be managed with
specific privileges.
Users can be granted privileges based on
time of day and day of week, and access
can be restricted to specific readers.
Each swipe can perform as many actions
as desired and these results can be
customized by time of day, arming
condition, or any other event the security
& automation system is monitoring.
Because each card or keytag is tied to a
specific user, all of the actions can also
be customized for each individual user.
Because each card or keytag is tied to a specific user, all of
the actions can be customized for each individual user.

Summary of content (6 pages)