Inner Range inception User Manual

Integrated Security and Access Control
User Manual
Table of Contents
Introduction
About Inception 3
Site Details 4
System Notes 5
User Interfaces
Connecting to the Web Interface 6
Elite / EliteX Terminal 8
System Control
Area Control 9
Door Control 13
Output Control 15
Input Control 17
Users
User Management 18
Permission Groups 20
2
Time Periods and Calendars 22
System Administration
Database Backup 24
System Warnings / Messages 25
Reports 27
Review Events 28
Notications 31
Setting Date and Time 32
Network Settings 33
Dashboard Favourites 34
Introduction
About Inception
The Inception controller is an integrated access control and intruder detection system featuring a powerful built-in web server. This allows you to monitor, control and administer your site from any smartphone, tablet or computer with a network connection. If an internet connection is available for your controller, the same web interface can be easily accessed from any internet connected device.
This manual is intended to explain many of the features available to you, including connecting to the user interfaces, controlling the system, managing the users and ongoing system administration. However, the information in this manual is intended as a basic guide only. For more in-depth information, there is detailed information located at the top of each web page and in tooltips throughout the web interface.
Inception is a powerful system that can be congured in many different ways, so
some of the details in this manual may not apply to your system. Please contact your installation technician for operating instructions for your system and for
information about the features that have been provided or congured.
System Control
3
Introduction
Site Details
Installed By: _______________________________________________
_______________________________________________
Phone: _______________________________________________
Email: _______________________________________________
Monitored By: _______________________________________________
_______________________________________________
Phone: _______________________________________________
Email: _______________________________________________
Installation Date: _____________________________________________
4
Serial Number: IN____________________________________________
IP Address: _______________________________________________
Additional Information:
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
___________________________________________
IntroductionIntroduction
System Notes
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
__________________________________________________________________
System Control
5
User Interfaces
Connecting to the Web Interface
The web interface of Inception is the primary way of interacting with the system. Inception’s web interface is designed to be responsive, meaning that you can use the device of your choice, be it a computer, tablet or smartphone. Many different browsers are supported, however it is recommended that the browser you use is kept up to date to avoid issues.
The Inception controller’s web interface can be accessed via a local network or the Internet.
Local Network Connection
If your device is on the same network as the Inception controller, it can be accessed by typing the IP address of the controller into your device's web browser. The IP address assigned to your device should be located on the “Site
Details” page of this manual, lled in by your installation technician.
SkyTunnel Internet Connection
If the network your Inception controller is connected to has internet access, you can connect to the web interface from any internet-connected device. You will
require the serial number of your controller, which should be lled in on the
“Site Details” page. It is in the format INxxxxxxxx. To connect, navigate to https://skytunnel.com.au/inception/SERIALNUMBER, where SERIALNUMBER is the serial number of your Inception controller.
6
Logging In
Once you have browsed to the Inception web interface, you will be presented with a login screen. Enter your username and the password to log in. Alternatively, a PIN can be used instead of a password with PIN entry mode, which may be better suited for touch devices. On successful login, you will be taken to the Dashboard screen of Inception.
Connecting to the Web Interface (cont.)
Navigating the Web Browser
The navigation bar on the left hand side of the screen provides access to any part of the system. When browsing from a smaller screen like a mobile device, the navigation bar can be expanded by pressing the menu button at the top right of the screen.
The current page is highlighted in blue and only the pages you can visit are available. Any pages that you do not have permission to visit are automatically hidden.
• The [State / Control] section contains pages for monitoring and controlling the items in the system.
• The [Conguration] section is where the conguration pages such as user management and scheduling are located.
• The [System] section includes some system administration tasks like downloading reports and backing up the database.
Throughout this document, navigating to web pages will be indicated by bold blocks like [Conguration > Users > Manage Users].
Accessing Help Information
Throughout the web interface, a signicant amount of help information is included
in each web page. At the top of each page, a sentence gives a brief introduction to the page with a “Read More…” link that expands to show detailed information about what the page offers and how to use the page. Similar information can also be found on many of the dialogs that appear as you interact with the system.
When conguring items in the system, such as editing or adding users, tooltip
information icons are located to the right of each edit option. Clicking the icon will show a tooltip popup for that edit option. This will include information that describes what the option does, why it does it, how to use it and what considerations to make when setting the option.
Logging Out
The web interface will remain logged in while the web page is open. Closing the page will eventually close the session after some time, however for security it is recommended that the [Logout] option is pressed from the navigation menu.
System Control
7
User Interfaces
Elite / EliteX Terminal
In addition to the web interface, day to day control of the system is also available via an Elite Terminal. This is a keypad interface that is often used for controlling items such as security areas or automation outputs.
Using the Terminal
The keys on the terminal perform specic tasks which help you
navigate the system. The below table describes the basic key
functions. How to perform specic functions will be discussed
later in the relevant sections.
[<], [^], [v], [>]
[HELP] The [HELP] key displays help text for the menu you are
[MENU]
[END] The [END] key logs you off from the terminal
[OK] Pressing [OK] is often used to accept changes or
Alpha-numeric Keys
[ON], [OFF] The [ON] and [OFF] keys are used to control the selected item.
Logging On
Before controlling the system with the terminal, users must log on to the terminal by entering their PIN (a unique number up to 8 digits long) and pressing [OK].
Code : ######
The terminal will automatically log off after 1 minute of inactivity.
The arrow keys are used to navigate within a menu. The up and down arrows typically allow you to scroll through a list of items, while left and right arrows may show additional options
currently viewing. Pressing the key multiple times shows additional help text and eventually returns you to the original screen
This key returns you to the main menu screen
acknowledge what is displayed on screen.
In addition to allowing numbers to be entered, the numeric keys are used for selecting menus. For example, [MENU] [2] [1] takes you to the Change PIN menu.
8
Area Control
Areas are a core part of intruder detection; if your system is intended for access control only, this topic can be skipped.
What is an Area?
An area commonly represents a physical location which groups all of the detector devices in that location together. Those detector devices could be movement detectors or magnetic door / window switches for example. When an area is armed (turned on), that location is secured and any activity in that area is considered to be unauthorised. When an intruder event occurs, sirens will often sound and alarm messages are sent to the monitoring station. To stop the sirens and acknowledge the alarm, the area needs to be disarmed (turned off).
Depending on how your system has been congured, there may be a single area
for the whole building or it could be broken up into many smaller areas. This allows some sections of the building to be secure while others are not.
Disarming an Area
Disarming the area (or turning it off) disables intruder detection for that location and allows people to move around in that area. Disarming also resets the state of the area, cancelling anything that is currently active such as sirens during an alarm or warnings during an entry procedure.
Arming an Area
When you attempt to secure an area, the system goes through an arming procedure. The system automatically checks the state of the area and the system, to ensure the area can be correctly secured. Any issues that occur during arming,
such as a door or window that is left open, will be displayed and should be xed
before attempting to secure the area again.
The common reason for a failed arm is the presence of unsecure inputs or detectors in the area. In this case, you should check each input that is listed as it could indicate that a door or window is not closed properly, or that there are still people in the area.
An area can also fail to arm if there are alarm communication path issues or hardware issues like AC Fail or battery problems. In these cases, you should contact your installation company.
If the problem can’t be xed, such as a faulty input or a hardware issue, the issue
can be overridden (isolated) and the arm attempt tried again. However the issue should be investigated as soon as possible.
System Control
9
System Control
Area Control (cont.)
Controlling from the Web Interface
Once you have logged in to the web interface (see the “Connecting to the Web Interface” section), navigate to the [State / Control > Control Areas] page. From there, live state of all areas can be seen. The “Quick Control” button can be used to easily control the area based on its current state. For example, a disarmed area will be armed, while an armed area or an area in alarm will be disarmed.
If an arm attempt fails, the reason will be shown in a dialog. As mentioned previously, the issue can be investigated, resolved and the arm attempt tried again. If the issue can’t be xed, the Isolate and Retry button will override the issue and retry the arm again.
Elite Terminal Entry / Exit Paths
If Elite Terminals are installed in the building, they can be used to control the security areas. Often, these terminals will be located inside the security area that they control so they can’t be vandalised and tampered with. However this presents the problem where the control of the area is performed within the secure area.
10
To achieve this, an entry / exit path is created between an exit door and the terminal. This path is still protected by detectors, but if you enter the area through a designated entry point then the path is temporarily ignored by the system for a short amount of time, enough to reach the terminal and disarm the system. Similarly, arming the area from the terminal will have a short delay (exit delay) where you can walk along the path and leave without sounding the sirens. Deviating from the path would be treated as an intruder event and cause the sirens to sound.
Area Control (cont.)
Elite Terminal Exit Procedure
To control areas from an Elite Terminal, you must rst log in with your PIN (see the
“Elite / EliteX Terminal > Logging On” section). Depending on your system setup, you may be taken straight to the area control screen, but if not, press [MENU], [0] to access area control.
Admin Area ^v Is Disarmed
Pressing [^] and [v] will scroll through each of the areas that you have permission to control. Once you have selected the area you want, pressing [ON] will attempt to arm the area. If the arm fails, the failure message will be shown, along with a scrollable list of items to investigate.
Arm Failed Area Admin Area contained 1 unsealed inputs
Unsecure Items ^v Warehouse Rear Door
On a successful arm, Exit Delay mode will begin.
Area Armed Exit Area Now
Leave the area along the proper exit path.
Elite Terminal Entry Procedure
The entry procedure begins by entering the area through the correct entry point. At that time, Entry Delay mode begins and various devices may beep to indicate there is a short amount of time to disarm the system. Make your way to the terminal along the entry path.
To control areas from an Elite Terminal, you must rst log in with your PIN (see the
“Elite / EliteX Terminal > Logging On” section). Depending on your system setup, you may be taken straight to the area control screen, but if not, press [MENU], [0] to access area control.
Admin Area ^v In Entry Mode. Press OFF to Disarm
The area in entry mode should be shown. Press the [OFF] key to disarm the area.
System Control
11
Loading...
+ 25 hidden pages