The Inception controller is an integrated access control and intruder detection
system featuring a powerful built-in web server. This allows you to monitor, control
and administer your site from any smartphone, tablet or computer with a network
connection. If an internet connection is available for your controller, the same web
interface can be easily accessed from any internet connected device.
This manual is intended to explain many of the features available to you, including
connecting to the user interfaces, controlling the system, managing the users and
ongoing system administration. However, the information in this manual is intended
as a basic guide only. For more in-depth information, there is detailed information
located at the top of each web page and in tooltips throughout the web interface.
Inception is a powerful system that can be congured in many different ways, so
some of the details in this manual may not apply to your system. Please contact
your installation technician for operating instructions for your system and for
information about the features that have been provided or congured.
The web interface of Inception is the primary way of interacting with the system.
Inception’s web interface is designed to be responsive, meaning that you can use
the device of your choice, be it a computer, tablet or smartphone. Many different
browsers are supported, however it is recommended that the browser you use is
kept up to date to avoid issues.
The Inception controller’s web interface can be accessed via a local network or the
Internet.
Local Network Connection
If your device is on the same network as the Inception controller, it can be
accessed by typing the IP address of the controller into your device's web
browser. The IP address assigned to your device should be located on the “Site
Details” page of this manual, lled in by your installation technician.
SkyTunnel Internet Connection
If the network your Inception controller is connected to has internet access, you
can connect to the web interface from any internet-connected device. You will
require the serial number of your controller, which should be lled in on the
“Site Details” page. It is in the format INxxxxxxxx. To connect, navigate to
https://skytunnel.com.au/inception/SERIALNUMBER, where SERIALNUMBER
is the serial number of your Inception controller.
6
Logging In
Once you have browsed to the Inception web
interface, you will be presented with a login
screen. Enter your username and the password
to log in. Alternatively, a PIN can be used
instead of a password with PIN entry mode,
which may be better suited for touch devices.
On successful login, you will be taken to the
Dashboard screen of Inception.
Connecting to the Web Interface (cont.)
Navigating the Web Browser
The navigation bar on the left hand side of the screen
provides access to any part of the system. When browsing
from a smaller screen like a mobile device, the navigation
bar can be expanded by pressing the menu button at the
top right of the screen.
The current page is highlighted in blue and only the pages
you can visit are available. Any pages that you do not have
permission to visit are automatically hidden.
• The [State / Control] section contains pages for
monitoring and controlling the items in the system.
• The [Conguration] section is where the
conguration pages such as user management and scheduling are located.
• The [System] section includes some system
administration tasks like downloading reports and
backing up the database.
Throughout this document, navigating to web pages will be indicated by bold
blocks like [Conguration > Users > Manage Users].
Accessing Help Information
Throughout the web interface, a signicant amount of help information is included
in each web page. At the top of each page, a sentence gives a brief introduction
to the page with a “Read More…” link that expands to show detailed information
about what the page offers and how to use the page. Similar information can also
be found on many of the dialogs that appear as you interact with the system.
When conguring items in the system, such as editing or adding users, tooltip
information icons are located to the right of each edit option. Clicking the icon
will show a tooltip popup for that edit option. This will include information that
describes what the option does, why it does it, how to use it and what
considerations to make when setting the option.
Logging Out
The web interface will remain logged in while the web page is open. Closing the
page will eventually close the session after some time, however for security it is
recommended that the [Logout] option is pressed from the navigation menu.
System Control
7
User Interfaces
Elite / EliteX Terminal
In addition to the web interface, day to day control of the
system is also available via an Elite Terminal. This is a keypad
interface that is often used for controlling items such as security
areas or automation outputs.
Using the Terminal
The keys on the terminal perform specic tasks which help you
navigate the system. The below table describes the basic key
functions. How to perform specic functions will be discussed
later in the relevant sections.
[<], [^], [v], [>]
[HELP]The [HELP] key displays help text for the menu you are
[MENU]
[END]The [END] key logs you off from the terminal
[OK]Pressing [OK] is often used to accept changes or
Alpha-numeric
Keys
[ON], [OFF]The [ON] and [OFF] keys are used to control the selected item.
Logging On
Before controlling the system with the terminal, users must log on to the terminal by
entering their PIN (a unique number up to 8 digits long) and pressing [OK].
Code : ######
The terminal will automatically log off after 1 minute of inactivity.
The arrow keys are used to navigate within a menu. The up
and down arrows typically allow you to scroll through a list of
items, while left and right arrows may show additional options
currently viewing. Pressing the key multiple times shows
additional help text and eventually returns you to the
original screen
This key returns you to the main menu screen
acknowledge what is displayed on screen.
In addition to allowing numbers to be entered, the numeric
keys are used for selecting menus. For example, [MENU] [2] [1] takes you to the Change PIN menu.
8
Area Control
Areas are a core part of intruder detection; if your system is intended for access
control only, this topic can be skipped.
What is an Area?
An area commonly represents a physical location which groups all of the
detector devices in that location together. Those detector devices could be
movement detectors or magnetic door / window switches for example. When an
area is armed (turned on), that location is secured and any activity in that area is
considered to be unauthorised. When an intruder event occurs, sirens will often
sound and alarm messages are sent to the monitoring station. To stop the sirens
and acknowledge the alarm, the area needs to be disarmed (turned off).
Depending on how your system has been congured, there may be a single area
for the whole building or it could be broken up into many smaller areas. This allows
some sections of the building to be secure while others are not.
Disarming an Area
Disarming the area (or turning it off) disables intruder detection for that location
and allows people to move around in that area. Disarming also resets the state of
the area, cancelling anything that is currently active such as sirens during an alarm
or warnings during an entry procedure.
Arming an Area
When you attempt to secure an area, the system goes through an arming
procedure. The system automatically checks the state of the area and the system,
to ensure the area can be correctly secured. Any issues that occur during arming,
such as a door or window that is left open, will be displayed and should be xed
before attempting to secure the area again.
The common reason for a failed arm is the presence of unsecure inputs or
detectors in the area. In this case, you should check each input that is listed as it
could indicate that a door or window is not closed properly, or that there are still
people in the area.
An area can also fail to arm if there are alarm communication path issues or
hardware issues like AC Fail or battery problems. In these cases, you should
contact your installation company.
If the problem can’t be xed, such as a faulty input or a hardware issue, the issue
can be overridden (isolated) and the arm attempt tried again. However the issue
should be investigated as soon as possible.
System Control
9
System Control
Area Control (cont.)
Controlling from the Web Interface
Once you have logged in to the web
interface (see the “Connecting to the Web
Interface” section), navigate to the [State / Control > Control Areas] page. From there,
live state of all areas can be seen. The
“Quick Control” button can be used to easily
control the area based on its current state.
For example, a disarmed area will be armed,
while an armed area or an area in alarm will
be disarmed.
If an arm attempt fails, the reason will be
shown in a dialog. As mentioned previously,
the issue can be investigated, resolved and
the arm attempt tried again. If the issue can’t
be xed, the Isolate and Retry button will
override the issue and retry the arm again.
Elite Terminal Entry / Exit Paths
If Elite Terminals are installed in the building, they can be used to control the
security areas. Often, these terminals will be located inside the security area that
they control so they can’t be vandalised and tampered with. However this presents
the problem where the control of the area is performed within the secure area.
10
To achieve this, an entry / exit path is created between an exit door and the
terminal. This path is still protected by detectors, but if you enter the area through a
designated entry point then the path is temporarily ignored by the system for a
short amount of time, enough to reach the terminal and disarm the system.
Similarly, arming the area from the terminal will have a short delay (exit delay)
where you can walk along the path and leave without sounding the sirens.
Deviating from the path would be treated as an intruder event and cause the sirens
to sound.
Area Control (cont.)
Elite Terminal Exit Procedure
To control areas from an Elite Terminal, you must rst log in with your PIN (see the
“Elite / EliteX Terminal > Logging On” section). Depending on your system setup,
you may be taken straight to the area control screen, but if not, press [MENU], [0]
to access area control.
Admin Area ^v
Is Disarmed
Pressing [^] and [v] will scroll through each of the areas that you have permission
to control. Once you have selected the area you want, pressing [ON] will attempt
to arm the area. If the arm fails, the failure message will be shown, along with a
scrollable list of items to investigate.
Arm Failed
Area Admin Area contained 1 unsealed inputs
Unsecure Items ^v
Warehouse Rear Door
On a successful arm, Exit Delay mode will begin.
Area Armed
Exit Area Now
Leave the area along the proper exit path.
Elite Terminal Entry Procedure
The entry procedure begins by entering the area through the correct entry point.
At that time, Entry Delay mode begins and various devices may beep to indicate
there is a short amount of time to disarm the system. Make your way to the terminal
along the entry path.
To control areas from an Elite Terminal, you must rst log in with your PIN (see the
“Elite / EliteX Terminal > Logging On” section). Depending on your system setup,
you may be taken straight to the area control screen, but if not, press [MENU], [0]
to access area control.
Admin Area ^v
In Entry Mode. Press OFF to Disarm
The area in entry mode should be shown. Press the [OFF] key to disarm the area.
System Control
11
Loading...
+ 25 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.