Apple Ipod 3G
Here you can find all about Apple Ipod 3G like 32gb and other informations. For example: 8gb, price in india, s, accessories, price, manual, review, reset, charger.
Apple Ipod 3G manual (user guide) is ready to download for free.
On the bottom of page users can write a review. If you own a Apple Ipod 3G please write about it to help other people. [ Report abuse or wrong photo | Share your Apple Ipod 3G photo ]
Apple Ipod (3g) MP3 Player, size: 883 KB
Apple Ipod 3G
User reviews and opinions
|InDigo72||10:11am on Saturday, October 23rd, 2010|
|Excellent map graphics and user interface. I will give 4 star on it.This is REAL personal navigation application. iPhone WarrantyiPhone comes with 90 days of complimentary technical support. In addition, your iPhone, its rechargeable battery.|
|foolhandy||6:08am on Saturday, October 9th, 2010|
|As one of the biggest Electronic producer, Apple launch the new generation of I Phone, that is apple I Phone 3G. As we know together. iPhone combines three products - a revolutionary mobile phone, a widescreen iPod with touch controls.|
|ceejld||8:00am on Saturday, September 11th, 2010|
|I bought an iPhone just after my friend told me about this website. iPhone works like my personal assistant. Great price too. I love it. I have had a blackberry before and the iphone severely trumps the blackberry!!! I love my iphone and I will NEVER get rid of it!!!|
|Protoculture||5:49pm on Sunday, September 5th, 2010|
|To me, it looks like Blackberry is for a serious, adult, mature user whereas the iPhone is for those who just want to look and feel young.|
|alzie||10:03pm on Wednesday, July 21st, 2010|
|With fast 3G technology for mobile environments, Maps with GPS, support for enterprise features like Microsoft Exchange and the new AppStore.|
|s35824||7:26pm on Tuesday, May 18th, 2010|
|The latest and most famed phone currently. This phone is very different from other phones. This is an outstanding phone with many features.|
|sys||11:23am on Saturday, May 1st, 2010|
|Just the best phone I have ever owned! Great user interface..Excellent web browser. Multi-touch works great and the app store rocks None|
|thek||10:02am on Thursday, April 15th, 2010|
|Why would someone want a 4g, which has awful reception issues and features a second cam which is useless without wifi? or a 3gs.|
Comments posted on www.ps2netdrivers.net are solely the views and opinions of the people posting them and do not necessarily reflect the views or opinions of us.
LL2595_border.book Page 11 Wednesday, April 28, 2004 3:44 PM
Step 2: Install the Software Insert the iPod CD into your computer and install iTunes and the iPod software. Step 3: Import Music to Your Computer Complete this step if you havent already transferred music to your computer. You can import music from your audio CDs, or if you have an Internet connection, you can buy music online and download it to your computer using the iTunes Music Store. You can browse hundreds of thousands of songs and listen to a 30-second preview of any song. The iTunes Music Store is available in some countries only. To import music to your computer from an audio CD: 1 Insert a CD into your computer. iTunes opens automatically and the CD is selected in the iTunes Source list. 2 Uncheck songs you dont want to transfer, then click Import. 3 Repeat for any other CDs with songs youd like to import. To buy music online: 1 Open iTunes and click Music Store in the Source list. 2 Click the Account button and follow the onscreen instructions to set up an account or enter your existing Apple Account or America Online (AOL) account information.
LL2595_border.book Page 12 Wednesday, April 28, 2004 3:44 PM
Step 4: Connect iPod and Transfer Music Connect iPod to your computer using the included iPod Dock Connector to FireWire Cable. You can also use the optional iPod Dock (see page 42). Be sure the connectors on both ends of the cable are oriented correctly. They can only be inserted one way.
FireWire 400 port
When you connect iPod to your computer, iTunes opens automatically and transfers the songs and playlists in your music library to iPod. When the transfer is complete, the main menu appears on the iPod screen.
LL2595_border.book Page 13 Wednesday, April 28, 2004 3:44 PM
If your Windows PC doesnt have a 6-pin FireWire port: If your computer doesnt have a 6-pin FireWire (IEEE 1394) port, here are other ways you can connect iPod: If your computer has a 4-pin FireWire port, use the included 6-pinto4-pin FireWire adapter.
6-pinto4-pin FireWire adapter
Note: You cant charge iPod through your computer using a 4-pin FireWire port. If your computer has a USB 2.0 port, you can purchase an iPod Dock Connector to USB 2.0 + FireWire Cable from Apple. If your computer doesnt have a FireWire port or a USB port, you can purchase a FireWire card or USB 2.0 card, and install it. Go to www.apple.com/ipod for more information on cables and compatible FireWire and USB cards.
LL2595_border.book Page 14 Wednesday, April 28, 2004 3:44 PM
Step 5: Play Music When the song transfer is complete, disconnect iPod from your computer. Squeeze both sides of the Dock connector to disconnect the cable from iPod. Then use the Touch Wheel and Select button to browse for a song. Press the Play or Select button and enjoy!
To Learn More
Read the next chapter to learn more about using the Touch Wheel and the other iPod controls, transferring music to and managing music on iPod, using other features of iPod, charging the battery, and using iPod accessories.
LL2595_border.book Page 15 Wednesday, April 28, 2004 3:44 PM
Read this section to learn about using iPod controls, transferring music, charging the battery, and using the extra features of your iPod.
Using iPod Controls
Press any button to turn on iPod. The main menu appears.
Use the iPod buttons and Touch Wheel to navigate through the onscreen menus, play songs, change settings, and view information. Move your thumb along the Touch Wheel to highlight a menu item. Press the Select button to select the item. Press the Menu button to go back to the previous menu.
LL2595_border.book Page 16 Wednesday, April 28, 2004 3:44 PM
iPod Remote port
Dock connector port
LL2595_border.book Page 17 Wednesday, April 28, 2004 3:44 PM
iPod Controls Reset iPod (For use during troubleshooting) Toggle the Hold switch (set it to Hold, then turn it off again). Then press Menu and Play/Pause simultaneously for about 5 seconds, until the Apple logo appears. Press any button. Press and hold Play/Pause. Press and hold Menu or select Backlight from the main menu. Scroll to the item and press the Select button. Press Menu. Select Playlists or Browse from the main menu. Highlight the song and press the Select or Play/Pause button. Highlight the list title (an album title, or the title of a playlist, for example) and press Play/Pause. From the Now Playing screen, use the Touch Wheel. You can also use the iPod Remote (included with some models) from any screen. Press Play/Pause when no song or list is highlighted.
Turn on iPod Turn off iPod Turn the backlight on or off Select a menu item Go back to the previous menu Browse for a song Play a song Play all the songs in a list Change the volume
Pause a song
LL2595_border.book Page 18 Wednesday, April 28, 2004 3:44 PM
iPod Controls Disable the iPod buttons (So you dont press them accidentally) Skip to any point in a song Skip to the next song Start a song over Play the previous song Fast-forward Rewind Set the Hold switch to Hold (an orange bar appears). From the Now Playing screen, press the Select button. Then scroll to any point in the song. Press Next/Fast-forward. Press Previous/Rewind. Press Previous/Rewind twice. Press and hold Next/Fast-forward. Press and hold Previous/Rewind.
LL2595_border.book Page 19 Wednesday, April 28, 2004 3:44 PM
Disabling iPod Buttons Using the Hold Switch
If youre carrying iPod in your pocket and you dont want to press the buttons or turn it on accidentally, you can make the buttons inactive. Set the Hold switch to Hold.
Slide the switch toward the center (so you can see the orange stripe) to disable the controls.
LL2595_border.book Page 20 Wednesday, April 28, 2004 3:44 PM
Queueing Up a List of Songs
You can set iPod to play the songs you want in the order you want. When you create a list of songs on your iPod, the songs appear in an On-The-Go playlist. To create an On-The-Go playlist: 1 Highlight a song and press and hold the Select button until the song title flashes. 2 Repeat step 1 for other songs you want to add. 3 Select Playlists > On-The-Go to view your list of songs. You can also queue entire lists of songs at once. For example, to queue an album, highlight the album title and press and hold the Select button until the album title flashes. To play songs in the On-The-Go playlist: Select Playlists > On-The-Go and select a song. To clear the On-The-Go playlist: Select Playlists > On-The-Go > Clear Playlist. To transfer On-The-Go playlists to your computer: If iPod is set to transfer songs automatically (see page 27), and you create an On-The-Go playlist, the playlist automatically transfers to iTunes when you connect iPod. You see the new On-The-Go playlist in the iTunes Source list.
You can assign a rating to a song (from 1 to 5 stars) to indicate how much you like it. You can use song ratings to help you create playlists automatically in iTunes (see About Smart Playlists on page 26).
LL2595_border.book Page 21 Wednesday, April 28, 2004 3:44 PM
To rate a song: 1 Start playing the song. 2 From the Now Playing screen, press the Select button twice. 3 Use the Touch Wheel to select a rating.
Connecting and Disconnecting iPod
You connect iPod to your computer to transfer and manage music, and, in most cases, to charge the battery. If you have a Mac or if you have a Windows PC with a FireWire port, connect iPod using the included FireWire cable. If you have a Windows PC with a USB 2.0 port (and no FireWire port), use the optional iPod Dock Connector to USB 2.0 + FireWire Cable (available at www.apple.com/ storesee page 48 for an illustration). To connect iPod to your computer: Plug the appropriate cable in to a FireWire or USB 2.0 port on your computer, then connect the other end to iPod. Be sure to orient the connectors on the cable correctly. Each connector can only be inserted one way. Or, if you have an iPod Dock (see page 42), connect the appropriate cable to a FireWire or USB 2.0 port on your computer and connect the other end to the Dock. Then put iPod in the Dock.
LL2595_border.book Page 22 Wednesday, April 28, 2004 3:44 PM
Note: If you are using a Windows PC with a USB port and the optional iPod Dock Connector to USB 2.0 + FireWire Cable, you can connect the cables FireWire connector to the iPod Power Adapter to charge the battery, and connect the USB connector to your computers USB port to transfer files at the same time (see page 48 for an illustration). Important: If you are using the iPod Dock Connector to USB 2.0 + FireWire Cable and your computer has USB and FireWire ports, dont plug the cables USB and FireWire connectors in to your computer at the same time. By default, iPod imports songs automatically when you connect it to your computer. When this automatic transfer is done, you can disconnect iPod.
If you set iPod to transfer songs manually (see page 28) or enable iPod for use as a hard disk (see page 34), you must eject iPod before disconnecting it. If its not OK to disconnect iPod, this screen appears:
Important: Dont disconnect iPod if you see the Do not disconnect message. You could damage files on iPod. If you see this message, you must eject iPod before disconnecting it.
LL2595_border.book Page 23 Wednesday, April 28, 2004 3:44 PM
To eject iPod: Select iPod in the iTunes Source list and click the Eject button.
If youre using a Mac, you can also eject iPod by dragging the iPod icon on the desktop to the Trash. If youre using a Windows PC, you can eject iPod by clicking the Safely Remove Hardware icon in the Windows system tray and selecting your iPod. If its OK to disconnect iPod from your computer, the main menu appears:
Or, a large battery icon appears:
To disconnect iPod: If iPod is in the Dock, simply remove it. If iPod is connected to an iPod cable, squeeze both sides of the Dock connector to disconnect the cable from iPod.
LL2595_border.book Page 24 Wednesday, April 28, 2004 3:44 PM
Organizing and Transferring Your Music
For instructions for getting started playing music on iPod, see Setting Up iPod to Play Music on page 10. Read on for more information about organizing and transferring your music.
iTunes is the software application you use to manage the music on your computer and transfer music to iPod. When you connect iPod to your computer, iTunes opens automatically.
Here are some of the things you can do with iTunes: Purchase and download songs from the iTunes Music Store Listen to CDs and digital music Add music from CDs to your music library, so you dont need to have the CD in the drive to play music Organize songs into playlists you create Make your own CDs (if your computer has a CD-writable optical drive) Listen to Internet radio stations This booklet explains how to transfer songs to iPod using iTunes and manage songs on iPod. For information about using the other features of iTunes, open iTunes and choose Help > iTunes and Music Store Help.
LL2595_border.book Page 25 Wednesday, April 28, 2004 3:44 PM
About the iTunes Music Store
Using iTunes, you can preview, purchase, and download your favorite songs from the iTunes Music Store (available in some countries only). There are hundreds of thousands of songs available for purchase. You can use an Apple Account to sign on to the music store, or if you have an America Online (AOL) account, you can use that. To browse for and purchase music: 1 Open iTunes and click Music Store in the Source list. 2 Click the Account button and follow the onscreen instructions to set up an account or enter your existing Apple Account or AOL account information. You can only have music from five different Music Store accounts on one iPod. For more information about the iTunes Music Store, open iTunes and choose Help > iTunes and Music Store Help.
Audio File Formats Supported by iPod
AAC (M4A, M4B, M4P) (up to 320 kbps) Apple Lossless (a high-quality compressed format, available using iTunes 4.5 or later) MP3 (up to 320 kbps) MP3 Variable Bit Rate (VBR) WAV AA (Audible spoken word) AIFF
A song encoded using Apple Lossless format has the same quality as the same song encoded using AIFF or WAV format, but takes up about half the amount of space on iPod. The same song encoded in AAC or MP3 format takes up even less space. When you import music from a CD using iTunes, it is converted to AAC format by default.
Using iPod 25
LL2595_border.book Page 26 Wednesday, April 28, 2004 3:44 PM
If you are using iTunes 4.5 or later on a Windows PC, you can convert nonprotected WMA files to AAC or MP3 format. This can be useful if you have a library of music encoded in WMA format. For more information, open iTunes and choose Help > iTunes and Music Store Help. iPod does not support MPEG Layer 1 or MPEG Layer 2 audio files.
Using iTunes, you can organize songs into playlists. For example, you can create a playlist with songs to listen to while exercising or with songs for a particular mood. You can create as many playlists as you like using any of the songs in your computers music library. Putting a song in a playlist doesnt remove it from the library. When you connect and update iPod, the playlists are transferred to iPod. To browse through playlists, select Playlists in the iPod main menu.
About Smart Playlists
Using iTunes, you can automatically create customized Smart Playlists from the songs in your library. You can create a Smart Playlist that includes only certain genres of music, songs by certain artists, or songs that match particular criteria. For example, you could create a playlist thats no more than 3 gigabytes (GB) in size and includes only songs you have rated 3 stars or higher (see Rating Songs on page 20). After you create a Smart Playlist, any songs on iPod that meet the Smart Playlists criteria are automatically added to the Smart Playlist.
LL2595_border.book Page 30 Wednesday, April 28, 2004 3:44 PM
Listening to Spoken Word Audio
You can purchase and download spoken word audiobooks from the iTunes Music Store (available in some countries only) and listen to them on your iPod. You can use iTunes to transfer audiobooks to your iPod the same way you transfer songs. If you stop listening to an audiobook on iPod and go back to it later, the audiobook begins playing from where you left off.
Seeing How Many Songs Are on iPod
To see how many songs are stored on iPod, how much disk space is left, and other information, select Settings > About in the iPod main menu.
Adjusting iPod Settings
You can change settings directly on iPod in the Settings menu.
Setting iPod to Shuffle or Repeat Songs
You can set iPod to repeat a song over and over, or to repeat a sequence of songs. You can also set it to shuffle (play songs or albums in random order). iPod repeats or shuffles songs within the list (album or playlist, for example) from which the first song was selected.
LL2595_border.book Page 31 Wednesday, April 28, 2004 3:44 PM
To set iPod to repeat songs: Select Settings from the iPod main menu. To repeat all songs in the list, set Repeat to All. To repeat one song over and over, set Repeat to One.
To set iPod to shuffle songs or albums: 1 Select Settings from the iPod main menu. 2 Set Shuffle to Songs or to Albums. When you set iPod to shuffle albums, it plays all the songs on an album in order, then randomly selects another album and plays through it in order. When set to shuffle, iPod wont repeat a song or album until it has played through the entire list from which the first song or album was selected.
Setting Songs to Play at the Same Relative Volume Level
iTunes can automatically adjust the volume of songs, so they play at the same relative volume level. You can set iPod to use the iTunes volume settings. To set iTunes to adjust all songs to play at the same relative sound level: 1 In iTunes, choose iTunes > Preferences if you are using a Mac, or choose Edit > Preferences if you are using a Windows PC. 2 Click Effects and select Sound Check. To set iPod to use the iTunes volume settings: Select Settings > Sound Check. If you have not activated Sound Check in iTunes, setting it on iPod has no effect.
LL2595_border.book Page 32 Wednesday, April 28, 2004 3:44 PM
Using the iPod Equalizer
LL2595_border.book Page 35 Wednesday, April 28, 2004 3:44 PM
Preventing iTunes From Opening Automatically
If you use iPod primarily as a hard disk, you may want to disable iTunes from opening automatically when you connect iPod to your computer. To prevent iTunes from opening automatically when you connect iPod to your computer: 1 In iTunes, select iPod in the Source list. 2 Click the Options button and deselect Open iTunes when attached.
Setting the Sleep Timer
You can set iPod to turn off automatically after a specific period of time. Select Extras > Clock > Sleep Timer and select the time you want. When you set the sleep timer, a clock icon and the number of minutes left until iPod turns off appear in the Now Playing screen on iPod.
Setting the Alarm
You can use iPod as an alarm clock. To set an alarm: 1 Select Extras > Clock > Alarm Clock. 2 Set Alarm to On.
LL2595_border.book Page 36 Wednesday, April 28, 2004 3:44 PM
3 Select a sound. If you select Beep, the alarm will be audible through the internal speaker. If you select a playlist, youll need to connect iPod to speakers or headphones to hear the alarm.
Importing Addresses, Phone Numbers, Calendar Events, and To-Do Lists
Your iPod can store contacts, calendar events, and to-do lists, for viewing on the go. If you are using a Mac and iSync, its as easy as clicking a button. To import all information using a Mac and iSync: 1 Connect iPod to your computer. 2 Open iSync and choose Devices > Add Device. You only need to do this step the first time you use iSync with your iPod. 3 Select iPod and click Sync Now. The next time you want to sync iPod, you can simply open iSync and click Sync Now. You can also choose to have iPod sync automatically when you connect it. iSync imports information from iCal and Mac OS X Address Book. Note: iSync transfers information from your computer to iPod. You cant use iSync to transfer information from your iPod to your computer. If you are using Windows, or you dont want to import using iSync, you can transfer information to iPod manually. iPod must be enabled as a hard disk (see Using iPod as an External Hard Disk on page 34).
LL2595_border.book Page 37 Wednesday, April 28, 2004 3:44 PM
To import contact information manually: 1 Connect iPod and open your favorite email or contacts application. Importing contacts works with Palm Desktop, Microsoft Outlook, Microsoft Entourage, and Eudora, among others. 2 Drag contacts from the applications address book to the iPod Contacts folder. To import appointments and other calendar events manually: 1 Export calendar events from any calendar application that uses the standard iCalendar format (filenames end in.ics) or vCal format (filenames end in.vcs). 2 Drag the files to the Calendars folder on iPod. Note: You can only view to-do lists on iPod using iSync and iCal. To view contacts on iPod: Select Extras > Contacts. To view calendar events: Select Extras > Calendar. To view to-do lists: Select Extras > Calendar > To Do.
LL2595_border.book Page 40 Wednesday, April 28, 2004 3:44 PM
To erase photos from a photo card: 1 Import photos from the card (see above). 2 Select Erase Card. All photos are deleted from the photo card. To transfer photos to your computer: Connect iPod to your computer and open the application you use to transfer photos from your digital camera. See the documentation that came with the application for more information. If you are using a Macintosh, you can use iPhoto or Image Capture to transfer photos. Note: Photos are stored in a DCIM (digital camera images) folder on iPod. You can also transfer images to your computer by opening this folder and dragging the image files to the desktop. iPod must be enabled for use as a hard disk. For more information about using an iPod-compatible photo card reader, see the instructions that came with the reader.
iPod has a number of games. To play a game: Select Extras > Games and select a game.
LL2595_border.book Page 41 Wednesday, April 28, 2004 3:44 PM
iPod comes with some accessories, and many other accessories are available at www.apple.com/store.
iPod Remote (Included With Some Models)
To use the iPod Remote, connect it to the iPod Remote port, then connect the Apple Earphones (or another set of headphones) to the remote. Use the buttons on the remote just as you would use the iPod buttons.
LL2595_border.book Page 42 Wednesday, April 28, 2004 3:44 PM
Use the remotes Hold switch to disable the remotes buttons. The iPod Hold switch and the iPod Remote Hold switch do not affect one another.
iPod Dock (Included With Some Models)
The iPod Dock holds iPod upright as it charges or transfers music. Connect the Dock to your computer using the same cable you use with iPod, or connect it to a power outlet using the FireWire cable and power adapter. Then put iPod in the Dock.
Note: Be sure the connectors on the cable are oriented correctly. Each connector can only be inserted one way. Your computer must be on and not in sleep mode (some models of Macintosh can charge iPod while in sleep mode).
LL2595_border.book Page 43 Wednesday, April 28, 2004 3:44 PM
Using the iPod Dock, you can play music from iPod over external powered speakers or a home stereo. You need an audio cable with a standard 3.5 millimeter stereo miniplug (many external speakers have this type of cable attached). To play music from iPod using the Dock: 1 Place iPod in the Dock. 2 Connect the speakers or stereo to the Dock Line Out port using an audio cable with a 3.5 millimeter stereo miniplug.
Line Out port
3 Use the iPod controls to play a song. When the Dock is connected to an external audio source, use the volume controls on the external source to change the volume.
LL2595_border.book Page 44 Wednesday, April 28, 2004 3:44 PM
iPod comes with a pair of high-quality earbud headphones. To use the earbud headphones: Plug them in to the Headphones port, then place the earbud in your ear as shown.
Warning Listening to music at high volume over extended periods of time can damage your hearing.
LL2595_border.book Page 45 Wednesday, April 28, 2004 3:44 PM
To purchase iPod accessories, go to www.apple.com/store. Available accessories include: iPod Dock iPod Remote + Earphones iPod In-Ear Headphones iPod Dock Connector to FireWire Cable iPod Dock Connector to USB 2.0 + FireWire Cable iPod Power Adapter iPod Carrying Case World Travel Adapter Kit Third-party accessories such as speakers, headsets, microphones, photo card readers, backup batteries, car stereo adapters, power adapters, and more
Charging the iPod Battery
The iPod battery is 80-percent charged in about an hour, and fully charged in about four hours. If you charge iPod while transferring files or playing music, it may take longer. iPod has an internal, nonremovable battery. If iPod isnt used for a while, the battery may need to be charged.
LL2595_border.book Page 46 Wednesday, April 28, 2004 3:44 PM
You can charge the iPod battery in two ways: If you have a Mac, you can charge iPod by connecting it to your computer. If you have a Windows PC with a 6-pin FireWire port, in most cases you can charge iPod by connecting it to your computer. You can also charge iPod by connecting it to the power adapter and a working electrical outlet. To charge the battery using your computer: Connect iPod to a 6-pin FireWire port on your computer using the included FireWire cable. The computer must be turned on and not in sleep mode (some models of Macintosh can charge iPod while in sleep mode). If the battery icon in the upper-right corner of the iPod screen shows a lightning bolt, the battery is charging.
If you dont see the lightning bolt, you must charge the battery using the iPod Power Adapter.
If You Connect iPod to Your Computer and Nothing Happens
Make sure you have installed the software on the iPod CD. Make sure you have the required computer and software. See What You Need to Get Started on page 7. Your iPod may need to be reset (see page 50). Check the cable connections. Unplug the cable at both ends and make sure no foreign objects are in the FireWire or USB ports. Then plug the cable back in securely. Use only Apple iPod cables. Be sure the connectors on the cables are oriented correctly. They can only be inserted one way. If youre connecting iPod to a Windows PC using the optional iPod Dock Connector to USB 2.0 + FireWire Cable, be sure youre connecting it to a USB 2.0 port. If youre connecting iPod to a Windows PC laptop computer using the optional iPod Dock Connector to USB 2.0 + FireWire Cable, connect the laptop to a power outlet before connecting iPod. If that doesnt work, restart your computer. If that doesnt work, you may need to restore iPod software. See Software Update and Restore on page 53.
LL2595_border.book Page 53 Wednesday, April 28, 2004 3:44 PM
If You Connect iPod to a USB Port and It Doesnt Work Correctly
If youre using a Mac, connect iPod to a FireWire port on your Mac using the FireWire cable that came with iPod. If youre using iPod with a USB 1.1 port on your computer, you must use a FireWire port or a USB 2.0 port. USB 1.1 is not supported and is significantly slower than FireWire and USB 2.0. If your Windows PC doesnt have a FireWire port or USB 2.0 port, you can purchase a Windows-certified FireWire card or USB 2.0 card and install it. For more information, go to www.apple.com/ipod. If youre connecting iPod to a Windows PC using the optional iPod Dock Connector to USB 2.0 + FireWire Cable, be sure youre connecting it to a USB 2.0 port. If youre connecting iPod to a Windows PC laptop computer using the optional iPod Dock Connector to USB 2.0 + FireWire Cable, connect the laptop to a power outlet before connecting iPod.
If Your iPod Remote Isnt Working
Make sure the remotes Hold switch is off. Make sure the remote is plugged firmly in to iPod, and that the headphones are plugged firmly in to the remote. The iPod Remote is included with some models of iPod, and can be purchased separately at www.apple.com/store.
Software Update and Restore
Apple periodically updates iPod software to improve performance or add features. It is recommended that you update your iPod to use the latest software.
LL2595_border.book Page 60 Wednesday, April 28, 2004 3:44 PM
About Operating and Storage Temperatures
Operate your iPod in a place where the temperature is always between 0 and 35 C (32 to 95 F). Store your iPod in a place where the temperature is always between 20 and 45 C (4 to 113 F). Dont leave iPod in your car, since temperatures in parked cars can exceed this range. iPod play time may temporarily shorten in low-temperature conditions. When youre using your iPod or charging the battery, it is normal for the bottom of the case to get warm. The bottom of the iPod case functions as a cooling surface that transfers heat from inside the unit to the cooler air outside.
Avoid Wet Locations
Warning To reduce the chance of shock or injury, do not use your iPod in or near water or wet locations. Keep your iPod and power adapter away from sources of liquids, such as drinks, washbasins, bathtubs, shower stalls, and so on. Protect your iPod and the power adapter from direct sunlight and rain or other moisture. Take care not to spill any food or liquid on iPod or its power adapter. If you do, unplug iPod before cleaning up the spill. In case of a spill, you may have to send your equipment to Apple for service. See Learning More, Service, and Support on page 55.
LL2595_border.book Page 61 Wednesday, April 28, 2004 3:44 PM
Do Not Make Repairs Yourself
Warning Do not attempt to open your iPod or power adapter, disassemble it, or remove the battery. You run the risk of electric shock and voiding the limited warranty. No user-serviceable parts are inside. For service, see Learning More, Service, and Support on page 55.
Follow these general rules when cleaning the outside of your iPod and its components: Make sure your iPod is unplugged. Use a damp, soft, lint-free cloth. Avoid getting moisture in openings. Dont use aerosol sprays, solvents, alcohol, or abrasives.
Your iPod may be damaged by improper storage or handling. Be careful not to drop your iPod when playing or transporting the device.
LL2595_border.book Page 62 Wednesday, April 28, 2004 3:44 PM
Communications Regulation Information
FCC Compliance Statement This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. See instructions if interference to radio or television reception is suspected. Radio and Television Interference This computer equipment generates, uses, and can radiate radio-frequency energy. If it is not installed and used properlythat is, in strict accordance with Apples instructionsit may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in Part 15 of FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. You can determine whether your computer system is causing interference by turning it off. If the interference stops, it was probably caused by the computer or one of the peripheral devices. If your computer system does cause interference to radio or television reception, try to correct the interference by using one or more of the following measures: Turn the television or radio antenna until the interference stops. Move the computer to one side or the other of the television or radio. Move the computer farther away from the television or radio. Plug the computer in to an outlet that is on a different circuit from the television or radio. (That is, make certain the computer and the television or radio are on circuits controlled by different circuit breakers or fuses.) If necessary, consult an Apple-authorized service provider or Apple. See the service and support information that came with your Apple product. Or, consult an experienced radio/television technician for additional suggestions.
LL2595_border.book Page 63 Wednesday, April 28, 2004 3:44 PM
Important: Changes or modifications to this product not authorized by Apple Computer, Inc. could void the EMC compliance and negate your authority to operate the product. This product was tested for EMC compliance under conditions that included the use of Apple peripheral devices and Apple shielded cables and connectors between system components. It is important that you use Apple peripheral devices and shielded cables and connectors between system components to reduce the possibility of causing interference to radios, television sets, and other electronic devices. You can obtain Apple peripheral devices and the proper shielded cables and connectors through an Apple Authorized Reseller. For non-Apple peripheral devices, contact the manufacturer or dealer for assistance. Responsible party (contact for FCC matters only): Apple Computer, Inc. Product Compliance, 1 Infinite Loop M/S 26-A, Cupertino, CA 95014-2084, 408-974-2000. Industry Canada Statement This Class B device meets all requirements of the Canadian interference-causing equipment regulations. Cet appareil numrique de la classe B respecte toutes les exigences du Rglement sur le matriel brouilleur du Canada.
VCCI Class B Statement
European Community Complies with European Directives 72/23/EEC and 89/336/EEC. Apple and the Environment At Apple, we recognize our responsibility to minimize the environmental impacts of our operations and products. For more information, go to www.apple.com/about/environment.
2004 Apple Computer, Inc. All rights reserved. Apple, the Apple logo, Apple Store, FireWire, iCal, iPod, iTunes, Mac, Macintosh, and Mac OS are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. Finder, the FireWire logo, and iPhoto are trademarks of Apple Computer, Inc.
LL2595_border.book Page 64 Wednesday, April 28, 2004 3:44 PM
034-2595-A Printed in XXXX
Microsoft Direct Push
The Exchange server automatically delivers email, contacts, and calendar events to iPhone and iPad Wi-Fi + 3G if a cellular or Wi-Fi data connection is available. iPod touch and iPad Wi-Fi dont have a cellular connection, so they receive push notifications only when theyre active and connected to a Wi-Fi network.
Microsoft Exchange Autodiscovery
The Autodiscover service of Exchange Server 2007 is supported. When you manually configure a device, Autodiscover uses your email address and password to automatically determine the correct Exchange server information. For information about enabling the Autodiscover service, see http://technet.microsoft.com/en-us/ library/cc539114.aspx.
Microsoft Exchange Global Address List
iPhone, iPod touch, and iPad retrieve contact information from your companys Exchange server corporate directory. You can access the directory when searching in Contacts, and its automatically accessed for completing email addresses as you enter them.
Additional Supported Exchange ActiveSync Features
In addition to the features and capabilities already described, iPhone OS supports: Creating calendar invitations. With Microsoft Exchange 2007, you can also view the status of replies to your invitations. Setting Free, Busy, Tentative, or Out of Office status for your calendar events. Searching mail messages on the server. Requires Microsoft Exchange 2007. Exchange ActiveSync client certificate-based authentication.
Unsupported Exchange ActiveSync Features
Not all Exchange features are supported, including, for example: Folder management Opening links in email to documents stored on SharePoint servers Task synchronization Setting an out of office autoreply message Flagging messages for follow-up
iPhone OS works with VPN servers that support the following protocols and authentication methods: L2TP/IPSec with user authentication by MS-CHAPV2 Password, RSA SecurID and CryptoCard, and machine authentication by shared secret. PPTP with user authentication by MS-CHAPV2 Password, RSA SecurID, and CryptoCard. Cisco IPSec with user authentication by Password, RSA SecurID, or CryptoCard, and machine authentication by shared secret and certificates. See Appendix A for compatible Cisco VPN servers and recommendations about configurations.
Cisco IPSec with certificate-based authentication supports VPN on demand for domains you specify during configuration. See VPN Settings on page 35 for details.
iPhone OS supports the following 802.11i wireless networking security standards as defined by the Wi-Fi Alliance: WEP WPA Personal WPA Enterprise WPA2 Personal WPA2 Enterprise Additionally, iPhone OS supports the following 802.1X authentication methods for WPA Enterprise and WPA2 Enterprise networks: EAP-TLS EAP -TTLS EAP-FAST EAP-SIM PEAP v0, PEAP v1 LEAP
Deploying iPhone and iPod touch
This chapter provides an overview of how to deploy iPhone, iPod touch, and iPad in your enterprise.
iPhone, iPod touch, and iPad are designed to easily integrate with your enterprise systems, including Microsoft Exchange 2003 and 2007, 802.1X-based secure wireless networks, and Cisco IPSec virtual private networks. As with any enterprise solution, good planning and an understanding of your deployment options make deployment easier and more efficient for you and your users. When planning your deployment of iPhone, iPod touch, and iPad, consider the following: How will your companys iPhones and iPad (Wi-Fi + 3G models) be activated for wireless cellular service? Which enterprise network services, applications, and data will your users need to access? What policies do you want to set on the devices to protect sensitive company data? Do you want to manually configure devices individually, or use a streamlined process for configuring a large fleet? The specifics of your enterprise environment, IT policies, wireless carrier, and your computing and communication requirements affect how you tailor your deployment strategy.
Each iPhone must be activated with your wireless carrier before it can be used to make and receive calls, send text messages, or connect to the cellular data network. Contact your carrier for voice and data tariffs and activation instructions for consumer and business customers. You or your user need to install a SIM card in the iPhone. After the SIM card is installed, iPhone must be connected to a computer with iTunes to complete the activation process. If the SIM card is already active, iPhone is ready for immediate use; otherwise, iTunes walks you through the process of activating a new line of service. iPad must be connected to a computer with iTunes to activate the device. For iPad Wi-Fi + 3G in the U.S., you sign up and manage (or cancel) an AT&T data plan using iPad. Go to Settings > Cellular Data > View Account. iPad is unlocked, so you can use your preferred carrier. Contact your carrier to set up an account and obtain a compatible micro SIM card. In the U.S., micro SIM cards compatible with AT&T are included with iPad Wi-Fi + 3G. Although there is no cellular service or SIM card for iPod touch and iPad Wi-Fi, they must also be connected to a computer with iTunes for activation. Because iTunes is required in order to complete the activation process, you must decide whether you want to install iTunes on each users Mac or PC, or whether youll complete activation for each device with your own iTunes installation. After activation, iTunes isnt required in order to use the device with your enterprise systems, but its required for synchronizing music, video, and web browser bookmarks with a computer. Its also required for downloading and installing software updates for devices and installing your enterprise applications. For more information about activating devices and using iTunes, see Chapter 4.
If you plan to use certificate-based authentication, make sure you have your public key infrastructure configured to support device and user-based certificates with the corresponding key distribution process. Verify the compatibility of your certificate formats with the device and your authentication server. For information about certificates see Certificates and Identities on page 11.
Virtual Private Networks
Secure access to private networks is supported on iPhone, iPod touch, and iPad using Cisco IPSec, L2TP over IPSec, and PPTP virtual private network protocols. If your organization supports one of these protocols, no additional network configuration or third-party applications are required in order to use your devices with your VPN infrastructure. Cisco IPSec deployments can take advantage of certificate-based authentication via industry-standard X.509 certificates. Additionally, certificate-based authentication allows you to take advantage of VPN On Demand, which provides seamless, secure wireless access to your enterprise network. For two-factor token-based authentication, iPhone OS supports RSA SecurID and CryptoCard. Users enter their PIN and token-generated, one-time password directly on their device when establishing a VPN connection. For compatible Cisco VPN servers and recommendations about configurations, see Appendix A. iPhone, iPod touch and iPad also support shared secret authentication for Cisco IPSec and L2TP/IPSec deployments, and MS-CHAPv2 for basic user name and password authentication. VPN Proxy auto-config (PAC and WPAD) is also supported, which allows you specify proxy server settings for accessing specific URLs. VPN Setup Guidelines iPhone OS integrates with most existing VPN networks, so minimal configuration is necessary to enable devices to access to your network. The best way to prepare for deployment is to check if your companys existing VPN protocols and authentication methods are supported by iPhone. Ensure compatibility with standards by your VPN concentrators. Its also a good idea to review the authentication path to your RADIUS or authentication server, to make sure standards supported by iPhone OS are enabled within your implementation. Check with your solutions providers to confirm that your software and equipment are up-to-date with the latest security patches and firmware.
If you want to configure URL-specific proxy settings, place a PAC file on a web server thats accessible with the basic VPN settings, and ensure that its served with a MIME type of application/x-ns-proxy-autoconfig. Alternatively, configure your DNS or DHCP to provide the location of a WPAD file on a server that is similarly accessible.
Grace period for device lock: Specifies how soon the device can be unlocked again after use, without re-prompting for the passcode. Maximum number of failed attempts: Determines how many failed passcode attempts can be made before the device is wiped. If you dont change this setting, after six failed passcode attempts, the device imposes a time delay before a passcode can be entered again. The time delay increases with each failed attempt. After the eleventh failed attempt, all data and settings are securely erased from the device. The passcode time delays always begin after the sixth attempt, so if you set this value to 6 or lower, no time delays are imposed and the device is erased when the attempt value is exceeded.
Use this payload to specify which device features the user is allowed to use. Allow explicit content: When this is turned off, explicit music or video content purchased from the iTunes Store is hidden. Explicit content is marked as such by content providers, such as record labels, when sold through the iTunes Store. Allow use of Safari: When this option is turned off, the Safari web browser application is disabled and its icon removed from the Home screen. This also prevents users from opening web clips. Allow use of YouTube: When this option is turned off, the YouTube application is disabled and its icon is removed from the Home screen. Allow use of iTunes Music Store: When this option is turned off, the iTunes Music Store is disabled and its icon is removed from the Home screen. Users cannot preview, purchase, or download content. Allow installing apps: When this option is turned off, the App Store is disabled and its icon is removed from the Home screen. Users are unable to install or update their applications. Allow use of camera: When this option is turned off, the camera is completely disabled and its icon is removed from the Home screen. Users are unable to take photographs. Allow screen capture: When this option is turned off, users are unable to save a screenshot of the display.
Subscribed Calendars Settings
Use this payload to add read-only calendar subscriptions to the devices Calendar application. You can configure multiple subscriptions by clicking the Add (+) button. A list of public calendars you can subscribe to is available at www.apple.com/downloads/macosx/calendars/. If you select the Use SSL option, be sure to add the certificates necessary to authenticate the connection using the Credentials pane.
Web Clip Settings
Use this payload to add web clips to the Home screen of the users device. Web clips provide fast access to favorite web pages. Make sure the URL you enter includes the prefix http:// or https://this is required for the web clip to function correctly. For example, to add the online version of the iPhone User Guide to the Home screen, specify the web clip URL: http://help.apple.com/iphone/ To add a custom icon, select a graphic file in gif, jpeg, or png format, 59 x 60 pixels in size. The image is automatically scaled and cropped to fit, and converted to png format if necessary.
Use this payload to add certificates and identities to the device. For information about supported formats, see Certificates and Identities on page 11. When installing credentials, also install the intermediate certificates that are necessary to establish a chain to a trusted certificate thats on the device. To view a list of the preinstalled roots, see the Apple Support article at http://support.apple.com/kb/HT2185. If youre adding an identify for use with Microsoft Exchange, use the Exchange payload instead. See Exchange Settings on page 36. Adding credentials on Mac OS X: 1 Click the Add (+) button. 2 In the file dialog that appears, select a PKCS1 or PKSC12 file, then click Open. If the certificate or identity that you want to install in your Keychain, use Keychain Access to export it in.p12 format. Keychain Access is located in /Applications/Utilities. For help see Keychain Access Help, available in the Help menu when Keychain Access is open. To add multiple credentials to the configuration profile, click the Add (+) button again. Adding credentials on Windows: 1 Click the Add (+) button. 2 Select the credential that you want to install from the Windows Certificate Store. If the credential isnt available in your personal certificate store, you must add it, and the private key must be marked as exportable, which is one of the steps offered by the certificate import wizard. Note that adding root certificates requires administrative access to the computer, and the certificate must be added to the personal store. If youre using multiple configuration profiles, make sure certificates arent duplicated. You cannot install multiple copies of the same certificate. Instead of installing certificates using a configuration profile, you can let users use Safari to download the certificates directly to their device from a webpage. Or, you can email certificates to users. See Installing Identities and Root Certificates on page 54 for more information. You can also use the SCEP Settings, below, to specify how the device obtains certificates over-the-air when the profile is installed.
The SCEP payload lets you specify settings that allow the device to obtain certificates from a CA using Simple Certificate Enrollment Protocol (SCEP).
Setting URL Name Description This is the address of the SCEP server. This can be any string that will be understood by the certificate authority, it can be used to distinguish between instances, for example. The representation of a X.500 name represented as an array of OID and value. For example, /C=US/O=Apple Inc./CN=foo/126.96.36.199=bar, which would translate to: [ [ [C US] ], [ [O Apple Inc.] ],., [ [ 188.8.131.52 bar ] ] ] , , , A pre-shared secret the SCEP server can use to identify the request or user. Select a key size, andusing the checkboxes below this fieldthe acceptable use of the key. If your Certificate Authority uses HTTP, use this field to provide the fingerprint of the CAs certificate which the device will use to confirm authenticity of the CAs response. during the enrollment process. You can enter a SHA1 or MD5 fingerprint, or select a certificate to import its signature.
Challenge Key Size and Usage Fingerprint
For more information about how the iPhone obtains certificates wirelessly, see Over-the-Air Enrollment and Configuration on page 22.
The Advanced payload lets you change the devices Access Point Name (APN) and cell network proxy settings. These settings define how the device connects to the carriers network. Change these settings only when specifically directed to do so by a carrier network expert. If these settings are incorrect, the device cant access data using the cellular network. To undo an inadvertent change to these settings, delete the profile from the device. Apple recommends that you define APN settings in a configuration profile separate from other enterprise settings, because profiles that specify APN information must be signed by your cell service provider. iPhone OS supports APN user names of up to 20 characters, and passwords of up to 32 characters.
Distributing Configuration Profiles by Email
You can distribute configuration profiles using email. Users install the profile by receiving the message on their device, then tapping the attachment to install it. To email a configuration profile: 1 Click the Share button in the iPhone Configuration Utility toolbar. In the dialog that appears, select a security option: a None: A plain text.mobileconfig file is created. It can be installed on any device. Some content in the file is obfuscated to prevent casual snooping if the file is examined.
b Sign Configuration Profile: The.mobileconfig file is signed and wont be installed by a device if its altered. Some fields are obfuscated to prevent casual snooping if the file is examined. Once installed, the profile can only be updated by a profile that has the same identifier and is signed by the same copy of iPhone Configuration Utility. c Sign and Encrypt Profile: Signs the profile so it cannot be altered, and encrypts all of the contents so the profile cannot be examined and can only be installed on a specific device. If the profile contains passwords, this option is recommended. Separate.mobileconfig files will be created for each of the devices you select from the Devices list. If a device does not appear in the list, it either hasnt been previously connected to the computer so that the encryption key can be obtained, or it hasnt been upgraded to iPhone OS 3.0 or later. 2 Click Share, and new Mail (Mac OS X) or Outlook (Windows) message opens with the profiles added as uncompressed attachments. The files must be uncompressed for the device to recognize and install the profile.
Distributing Configuration Profiles on the Web
You can distribute configuration profiles using a website. Users install the profile by downloading it using Safari on their device. To easily distribute the URL to your users, send it via SMS. To export a configuration profile: 1 Click the Export button in the iPhone Configuration Utility toolbar. In the dialog that appears, select a security option: a None: A plain text.mobileconfig file is created. It can be installed on any device. Some content in the file is obfuscated to prevent casual snooping if the file is examined, but you should make sure that when you put the file on your website its accessible only by authorized users. b Sign Configuration Profile: The.mobileconfig file is signed and wont be installed by a device if its altered. Once installed, the profile can only be updated by a profile that has the same identifier and is signed by the same copy of iPhone Configuration Utility. Some of the information in the profile is obfuscated to prevent casual snooping if the file is examined, but you should make sure that when you put the file on your website, its accessible only by authorized users. c Sign and Encrypt Profile: Signs the profile so it cannot be altered, and encrypts all of the contents so the profile cannot be examined and can only be installed on a specific device. Separate.mobileconfig files will be created for each of the devices you select from the Devices list. 2 Click Export, then select a location to save the.mobileconfig files. The files are ready for posting on your website. Dont compress the.mobileconfig file or change its extension, or the device wont recognize or install the profile.
To update iPhone OS, follow these steps: 1 On a computer that doesnt have iTunes software updating turned off, use iTunes to download the software update. To do so, select an attached device in iTunes, click the Summary tab, and then click the Check for Update button. 2 After downloading, copy the updater file (.ipsw) found in the following location: On Mac OS X: ~/Library/iTunes/iPhone Software Updates/ On Windows XP: bootdrive:\Documents and Settings\user\Application Data\ Apple Computer\iTunes\iPhone Software Updates\ 3 Distribute the.ipsw file to your users, or place it on the network where they can access it. 4 Tell your users to back up their device with iTunes before applying the update. During manual updates, iTunes doesnt automatically back up the device before installation. To create a new backup, right-click (Windows) or Control-click (Mac) the device in the iTunes sidebar. Then choose Back Up from the contextual menu that appears. 5 Your users install the update by connecting their device to iTunes, then selecting the Summary tab for their device. Next, they hold down the Option (Mac) or Shift (Windows) key and click the Check for Update button. 6 A file selector dialog appears. Users should select the.ipsw file and then click Open to begin the update process.
Backing Up a Device with iTunes
When iPhone, iPod touch, or iPad is synced with iTunes, device settings are automatically backed up to the computer. Applications purchased from the App Store are copied to the iTunes Library. Applications youve developed yourself, and distributed to your users with enterprise distribution profiles, wont be backed up or transferred to the users computer. But the device backup will include any data files your application creates. Device backups can be stored in encrypted format by selecting the Encrypt Backup option for the device in the summary pane of iTunes. Files are encrypted using AES256. The key is stored securely in the iPhone OS keychain. Important: If the device being backed up has any encrypted profiles installed, iTunes requires the user to enable backup encryption.
You can distribute iPhone, iPod touch, and iPad applications to your users.
If you want to install iPhone OS applications that youve developed, you distribute the application to your users, who install the applications using iTunes. Applications from the online App Store work on iPhone, iPod touch, and iPad without any additional steps. If you develop an application that you want to distribute yourself, it must be digitally signed with a certificate issued by Apple. You must also provide your users with a distribution provisioning profile that allows their device to use the application. The process for deploying your own applications is: Register for enterprise development with Apple. Sign your applications using your certificate. Create an enterprise distribution provisioning profile that authorizes devices to use applications youve signed. Deploy the application and the enterprise distribution provisioning profile to your users computers. Instruct users to install the application and profile using iTunes. See below for more about each of these steps.
For more information about creating applications and provisioning profiles, see: iPhone Developer Center at http://developer.apple.com/iphone/
Cisco VPN Server Configuration
Use these guidelines to configure your Cisco VPN server for use with iPhone, iPod touch and iPad. Supported Cisco Platforms
iPhone OS supports Cisco ASA 5500 Security Appliances and PIX Firewalls configured with 7.2.x software or later. The latest 8.0.x software release (or later) is recommended. iPhone OS also supports Cisco IOS VPN routers with IOS version 12.4(15)T or later. VPN 3000 Series Concentrators dont support iPhone VPN capabilities.
iPhone OS supports the following authentication methods: Pre-shared key IPSec authentication with user authentication via xauth Client and server certificates for IPSec authentication with optional user authentication via xauth Hybrid authentication where the server provides a certificate and the client provides a pre-shared key for IPSec authentication; user authentication is required via xauth. User authentication is provided via xauth and includes the following authentication methods: User name with password RSA SecurID CryptoCard
Appendix A Cisco VPN Server Configuration
The Cisco Unity protocol uses authentication groups to group users together based on a common set of authentication and other parameters. You should create an authentication group for iPhone OS device users. For pre-shared key and hybrid authentication, the group name must be configured on the device with the groups shared secret (pre-shared key) as the group password. When using certificate authentication, no shared secret is used and the users group is determined based on fields in the certificate. The Cisco server settings can be used to map fields in a certificate to user groups.
When setting up and installing certificates, make sure of the following: The server identity certificate must contain the servers DNS name and/or IP address in the subject alternate name (SubjectAltName) field. The device uses this information to verify that the certificate belongs to the server. You can specify the SubjectAltName using wildcard characters for per-segment matching, such as vpn.*.mycompany.com, for more flexibility. The DNS name can be put in the common name field, if no SubjectAltName is specified. The certificate of the CA that signed the servers certificate should be installed on the device. If it isnt a root certificate, install the rest of the trust chain so that the certificate is trusted. If client certificates are used, make sure that the trusted CA certificate that signed the clients certificate is installed on the VPN server. The certificates and certificate authorities must be valid (not expired, for example.). Sending of certificate chains by the server isnt supported and should be turned off. When using certificate-based authentication, make sure that the server is set up to identify the users group based on fields in the client certificate. See Authentication Groups on page 68.
Web Clip Payload
The Web Clip payload is designated by the com.apple.webClip.managed PayloadType value. In addition to the settings common to all payloads, this payload defines the following:
Key URL Label Icon Value String, mandatory. The URL that the Web Clip should open when clicked. The URL must begin with HTTP or HTTPS or it wont work. String, mandatory. The name of the Web Clip as displayed on the Home screen. Data, optional. A PNG icon to be shown on the Home screen. Should be 59 x 60 pixels in size. If not specified, a white square will be shown. Boolean, optional. If No, the user cannot remove the Web Clip, but it will be removed if the profile is deleted.
The Restrictions payload is designated by the com.apple.applicationaccess PayloadType value. In addition to the settings common to all payloads, this payload defines the following:
Key allowAppInstallation Value Boolean, optional. When false, the App Store is disabled and its icon is removed from the Home screen. Users are unable to install or update their applications. Boolean, optional. When false, the camera is completely disabled and its icon is removed from the Home screen. Users are unable to take photographs. Boolean, optional. When false, explicit music or video content purchased from the iTunes Store is hidden. Explicit content is marked as such by content providers, such as record labels, when sold through the iTunes Store. Boolean, optional. When false, users are unable to save a screenshot of the display. Boolean, optional. When false, the YouTube application is disabled and its icon is removed from the Home screen. Boolean, optional. When false, the iTunes Music Store is disabled and its icon is removed from the Home screen. Users cannot preview, purchase, or download content. Boolean, optional. When false, the Safari web browser application is disabled and its icon removed from the Home screen. This also prevents users from opening web clips.
allowScreenShot allowYouTube allowiTunes
The LDAP payload is designated by the com.apple.ldap.account PayloadType value. Theres a one-to-many relationship from LDAP Account to LDAPSearchSettings. Think of LDAP as a tree. Each SearchSettings object represents a node in the tree to start the search at, and what scope to search for (node, node+1 level of children, node + all levels of children). In addition to the settings common to all payloads, this payload defines the following:
Key LDAPAccountDescription LDAPAccountHostName LDAPAccountUseSSL LDAPAccountUserName LDAPAccountPassword LDAPSearchSettings LDAPSearchSettingDescription LDAPSearchSettingSearchBase LDAPSearchSettingScope Value String, optional. Description of the account. String, mandatory. The host. Boolean, mandatory. Whether or not to use SSL. String, optional. The username. String, optional. Use only with encrypted profiles. Top level container object. Can have many of these for one account. Should have at least one for the account to be useful. String, optional. Description of this search setting. String, required. Conceptually, the path to the node to start a search at ou=people,o=example corp String, required. Defines what recursion to use in the search. Can be one of the following 3 values: LDAPSearchSettingScopeBase: Just the immediate node pointed to by SearchBase LDAPSearchSettingScopeOneLevel: The node plus its immediate children. LDAPSearchSettingScopeSubtree: The node plus all children, regardless of depth.
The CalDAV payload is designated by the com.apple.caldav.account PayloadType value. In addition to the settings common to all payloads, this payload defines the following:
Key CalDAVAccountDescription CalDAVHostName CalDAVUsername CalDAVPassword CalDAVUseSSL CalDAVPort CalDAVPrincipalURL Value String, optional. Description of the account. String, mandatory. The server address String, mandatory. The users login name. String, optional. The users password Boolean, mandatory. Whether or not to use SSL. Number, optional. The port on which to connect to the server. String, optional. The base URL to the users calendar.
Calendar Subscription Payload
The CalSub payload is designated by the com.apple.subscribedcalendar.account PayloadType value. In addition to the settings common to all payloads, this payload defines the following:
Key SubCalAccountDescription SubCalAccountHostName SubCalAccountUsername SubCalAccountPassword SubCalAccountUseSSL Value String, optional. Description of the account. String, mandatory. The server address. String, optional. The users login name String, optional. The users password. Boolean, mandatory. Whether or not to use SSL.
The SCEP (Simple Certificate Enrollment Protocol) payload is designated by the com.apple.encrypted-profile-service PayloadType value. In addition to the settings common to all payloads, this payload defines the following:
Key URL Name Value String, mandatory. String, optional. any string which is understood by the SCEP server. For example, it could be a domain name like example.org. If a certificate authority has multiple CA certificates this field can be used to distinguish which is required. Array, optional. The representation of a X.500 name represented as an array of OID and value. For example, /C=US/O=Apple Inc./ CN=foo/184.108.40.206=bar, which would translate to: [ [ [C US] ], [ [O Apple Inc.] ],., [ [ 220.127.116.11 bar ] ] ] , , , OIDs can be represented as dotted numbers, with shortcuts for C, L, ST, O, OU, CN (country, locality, state, organization, organizational unit, common name). String, optional. A pre-shared secret. Number, optional. The keysize in bits, either 1024 or 2048. String, optional. Currently always RSA. Number, optional. A bitmask indicating the use of the key. 1 is signing, 4 is encryption, 5 is both signing and encryption. Some CAs, such as Windows CA, support only encryption or signing, but not both at the same time.
For 802.1X enterprise networks, the EAP Client Configuration Dictionary must be provided.
In addition to the standard encryption types, its possible to specify an enterprise profile for a given network via the EAPClientConfiguration key. If present, its value is a dictionary with the following keys.
Key UserName Value String, optional. Unless you know the exact user name, this property wont appear in an imported configuration. Users can enter this information when they authenticate. Array of integer values. These EAP types are accepted: 13 = TLS 17 = LEAP 21 = TTLS 25 = PEAP 43 = EAP-FAST Array of strings, optional. Identifies the certificates to be trusted for this authentication. Each entry must contain the UUID of a certificate payload. Use this key to prevent the device from asking the user if the listed certificates are trusted. Dynamic trust (the certificate dialogue) is disabled if this property is specified, unless TLSAllowTrustExceptions is also specified with the value true. Array of string values, optional. This is the list of server certificate common names that will be accepted. You can use wildcards to specify the name, such as wpa.*.example.com. If a server presents a certificate that isnt in this list, it wont be trusted. Used alone or in combination with TLSTrustedCertificates, the property allows someone to carefully craft which certificates to trust for the given network, and avoid dynamically trusted certificates. Dynamic trust (the certificate dialogue) is disabled if this property is specified, unless TLSAllowTrustExceptions is also specified with the value true. Boolean, optional. Allows/disallows a dynamic trust decision by the user. The dynamic trust is the certificate dialogue that appears when a certificate isnt trusted. If this is false, the authentication fails if the certificate isnt already trusted. See PayloadCertificateAnchorUUID and TLSTrustedNames above. The default value of this property is true unless either PayloadCertificateAnchorUUID or TLSTrustedServerNames is supplied, in which case the default value is false.
Value String, optional. This is the inner authentication used by the TTLS module. The default value is MSCHAPv2. Possible values are PAP CHAP MSCHAP and MSCHAPv2 , , ,. String, optional. This key is only relevant to TTLS, PEAP, and EAPFAST. This allows the user to hide his or her identity. The users actual name appears only inside the encrypted tunnel. For example, it could be set to anonymous or anon or , email@example.com. It can increase security because an attacker cant see the authenticating users name in the clear.
8gb S10 1996 IC-28A Cintiq 17SX DV-GH550 Office 3 8920G DMC-FX100 MCO153UQ 42PG6000 GS-260 Stylus T10 Control STR-DA5000ES Alpha 350 LBP-810 L1917S-BN DN-HC4500 SF-565 Price If-ED Date 1974 Flashlight PMD560 AZ1010 KX-TCD340 Triax 300 TX109 S 2430 DL MX850 XR-A780 Accessories PNA 250T PLC-XU48 28PW6006-01 HWU8DD VGN-N38m-W TH-42E MP-C789 DCR-TRV330E Silver Evo3 MAC 300 3000 N100 KRC-V879R Charger Escuadron MZ-E707 FA-HS1AM NW-E005F Logano G225 ZWF-3102 5000X Scanmaker 5600 Prodigy 85745 DCR-PC109 SX3242FX HD7500 II Architecture AS405 CDA-9857 V4 0 TA-N7 Tvix Tvix RDR-HX1080 TC-1785 HCD-FX10 WT-2000ARM Xperia X2 Lavw1039-W MDX-C6500RV GT-S5510T Motorokr ECM-MS908C RT-54NA21T EOB53000 Adapter MX9000 MY521X LN510 Rocz404 DCR-TRV9 Manual TM769 Fostex X-28 Classic X243HQB D-BG1 Review TX-32LMD70 Cygnus125-2006 SDP-E300 S-ST70-CR A9200 SMX-C20BP Stream KX-FP205 Samsung M110 Reset Price In India DSC-T1 KX-P3196 Maxxum 9XI LV200 C-330 LH-T6000 LE19R71W DXZ825
manuel d'instructions, Guide de l'utilisateur | Manual de instrucciones, Instrucciones de uso | Bedienungsanleitung, Bedienungsanleitung | Manual de Instruções, guia do usuário | инструкция | návod na použitie, Užívateľská príručka, návod k použití | bruksanvisningen | instrukcja, podręcznik użytkownika | kullanım kılavuzu, Kullanım | kézikönyv, használati útmutató | manuale di istruzioni, istruzioni d'uso | handleiding, gebruikershandleiding
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101