Detailed diagrams, cable guidance and step-by-step instructions for Australian installations.

Access Control Electric Strike Wiring Diagram

This enhanced page for Access Control Electric Strike Wiring Diagram is designed to be more practical than a generic concept sketch. It explains the device flow, common cable choices, a sensible installation sequence and the typical issues installers or specifiers need to check before commissioning.

Important: This page is a detailed planning reference only. It is not a substitute for the actual wiring manual, certified design documentation or licensed electrical/security work where required.

Advanced hero diagram

Mobile simplified flow

Reader
Controller
Lock PSU
Lock hardware
REX / door contact
Network software

This premium version shows numbered callouts, labelled cable paths, power/data distinction and key installer notes.

Advanced wiring overview: Access Control Electric Strike Wiring Diagram Clear icons, numbered callouts, cable labels, field/cabinet boundaries and power/data separation. FIELD / DEVICE SIDE CABINET / CONTROL / NETWORK SIDE reader cablerelay trigger2 core lock powerinput cableCat6 LAN 1 Reader Credential input 2 Controller Access logic 3 + Lock PSU Power supply 4 Lock hardware Strike / maglock 5 REX/contact Door inputs 6 Network Software/events GREEN = data / signal / PoE path ORANGE = power path Installer notes aligned to callouts 1. Document reader data, lock power and monitored inputs separately.2. Show fire release or break-glass paths on maglock designs.3. Record door name, output mapping and controller address.

Diagram overview

Access Control Electric Strike Wiring DiagramDetailed concept layout only – always verify the exact wiring against the device manual and site conditions.Reader cableRelay controlPowerMonitoringReaderCredential inputControllerAccess logicPSUStrike powerElectric StrikeDoor releaseREX / ContactInputsKey pointConfirm fail-safe vs fail-securestrike type.Installation tipCheck current draw and cable gaugeon longer runs.Planning noteSet an appropriate unlockduration.DocumentationTest latch alignment afterinstallation.

The diagram above shows the logical relationship between field devices, control equipment, power sources and user interfaces. Adapt the layout to suit the actual brand, terminal names, distance and site conditions.

Legend and key assumptions

Reader / keypad
Credential input device at the door.
Controller
Decision-making device that grants or denies access.
Power supply
Provides lock power and sometimes controller / reader power.
Lock hardware
Electric strike or maglock on the door.
REX / contact
Door status and request-to-exit inputs.
  • Door hardware choice affects the wiring, power requirement and egress design.
  • Fire release and emergency exit behaviour should be documented clearly.
  • Controller software configuration is not fully shown on the diagram.

What cable is commonly used?

The table below lists common cable choices for this type of system. Treat these as typical Australian industry choices rather than universal rules.

ConnectionCommon cableTypical purposeNotes
Reader home run6 core or 8 core shielded security cableReader power and dataCable choice depends on Wiegand or OSDP.
OSDP reader2 pair shielded twisted pairRS-485 style reader busFollow polarity, shielding and daisy-chain rules.
Electric strike2 core lock cable12V/24V lock powerConfirm fail-safe or fail-secure before wiring.
Maglock2 core heavier-gauge lock cableLock power with break-glass and fire relayMaglocks often need higher current and proper egress devices.
Door contact / REX4 core security cableStatus and request-to-exit inputsKeep conductors labelled and separate by function.

Recommended cable selection for this layout

This table is more specific to the diagram above and is intended to complement the broader cable table already on the page.

ConnectionRecommended cableWhy it is commonly chosen
Reader cabling6 core, 8 core or OSDP-rated pairDepends on Wiegand or OSDP and the exact reader.
Lock power2 core lock cableChoose conductor size based on current draw and distance.
Door contact / REX4 core security cableUseful for door status and egress inputs.
Controller LAN / server connectionCat5e or Cat6Used where the controller is networked.

Step-by-step installation approach

A sensible workflow reduces mistakes and produces better documentation. The following sequence is a practical starting point.

Step 1

Review the scope for access control electric strike wiring diagram and list every field device, controller, power supply, rack item and interface that needs to appear on the drawing.

Step 2

Mark the physical locations on a site sketch so cable routes, service access and cabinet positions are clear before any cable is pulled.

Step 3

Choose the cable type for each link based on power, data, distance, environment and manufacturer requirements rather than guessing or standardising everything to one cable.

Step 4

Run and label each cable clearly at both ends. Use a naming convention that matches the diagram, cable schedule and equipment labels.

Step 5

Terminate devices carefully and confirm terminal naming, polarity, shield handling, reader bus or PoE requirements before powering the system.

Step 6

Test continuity, link status and basic device operation before final dressing and permanent fixing. This saves major rework later.

Step 7

Commission the full system, confirm power loads, lock behaviour, monitoring logic or network settings, and record any variations from the original concept.

Step 8

Update the final as-built diagram and keep it with the job records so the next technician can fault-find or expand the system efficiently.

Suggested installation sequence

Step 1

Confirm the door hardware type, egress method and whether the reader protocol is Wiegand or OSDP.

Step 2

Run reader, lock, door contact and REX cable, keeping all door naming consistent from the start.

Step 3

Mount the controller and power supply, then terminate the lock output and monitored inputs carefully.

Step 4

Power the system, enrol the reader or configure addressing, and test access, egress and door status.

Step 5

Record door names, controller addresses, relay outputs and any fire release logic in the final handover.

Tools, materials and checks

Useful items on hand

  • Label printer or marker system
  • Cable tester / network tester as appropriate
  • Manufacturer installation manual
  • Basic hand tools and termination tools
  • Site plan or sketch for route marking
  • Notebook or digital cable schedule

Before you power up

  • Confirm voltage and polarity.
  • Check PoE class and total switch budget if relevant.
  • Verify lock type, relay logic or monitored input behaviour where relevant.
  • Check cable labels against the diagram and schedule.
  • Make sure pathways are protected and weather suitable.
  • Photograph the final terminations for future reference.

Fault finding and troubleshooting notes

Common fault scenarios

  • Reader beeps but door does not release: check credential permissions, lock power, relay mapping and unlock duration.
  • Door held or forced alarm issues: verify contact state, REX logic and the software door profile.
  • Maglock stays energised unexpectedly: check break-glass, fire release inputs and whether the PSU is being interrupted correctly.
  • OSDP instability: check polarity, addressing, shielding and daisy-chain order.

Commissioning checks

  • Verify that every labelled cable appears at the correct destination.
  • Photograph key terminations, cabinets and field devices for the as-built record.
  • Record firmware, addressing and device names where relevant.
  • Confirm the client or end user understands the reset, monitoring or remote access workflow.

Common mistakes to avoid

  • Using the wrong cable type because the device only looked similar to another one.
  • Ignoring distance limits, voltage drop or PoE budget calculations.
  • Forgetting that lock power, relays and monitored inputs often need separate planning.
  • Leaving cables unlabelled or relying on memory for panel, switch or controller ports.
  • Skipping the as-built update after the commissioning stage.

Enhanced page note: These mistakes are especially common when diagrams are copied without checking the actual hardware specification, power requirement or site distance.

Related product types

Product sourcing note: For controllers, readers, strikes, maglocks, request-to-exit buttons and related door hardware, SecurityWholesalers is a relevant source of example products.
Need a real-world installation design? If you are turning this concept into a real installed system in Sydney, Serious Security is a useful reference point for site-specific security design and installation.

Frequently asked questions

Can I use Cat6 for everything?

No. Cat6 is excellent for IP and PoE devices, but alarms, reader buses, lock circuits, 2-wire intercoms and power feeds often need different cable types.

Do I still need the manufacturer manual?

Yes. This page is a practical guide, but terminal naming, current draw, address settings and approved cable types must always be confirmed in the actual product documentation.

Should I create a cable schedule as well as a diagram?

Absolutely. A cable schedule makes installation, testing, handover and future maintenance much easier.

Next step

Use the next resource to turn this page into a practical plan, worksheet or quote brief.