Reviews & Opinions
Independent and trusted. Read before buy Apple Iphone!

Apple Iphone

Manual

Preview of first few manual pages (at low quality). Check before download. Click to enlarge.
Manual - 1 page  Manual - 2 page  Manual - 3 page 

Download (English)
Apple Iphone Mobile Phone, size: 9.6 MB
Related manuals
Apple Iphone Version IOS 4 Software
Apple Iphone Bluetooth Headset
Apple Iphone OS 3.1 Software
Apple Iphone 3G
Apple Iphone Bluetooth Headset

Instruction: After click Download and complete offer, you will get access to list of direct links to websites where you can download this manual.

About

Apple IphoneApple iPhone 8 GB (first generation) (AT&T - GSM)

Internal antenna, Up to 480 minutes talk, Up to 250 hours standby, 4.8 oz

iPhone combines three products - a revolutionary mobile phone, a widescreen iPod with touch controls, and a breakthrough Internet communications device with desktop-class email, web browsing, maps, and searching - into one small and lightweight handheld device. iPhone also introduces an entirely new user interface based on a large multi-touch display and pioneering new software, letting you control everything with just your fingers. So it ushers in an era of software power and sophistication nev... Read more

 

[ Report abuse or wrong photo | Share your Apple Iphone photo ]

User reviews and opinions

<== Click here to post a new opinion, comment, review, etc.

Comments to date: 12. Page 1 of 1. Average Rating:
MoGuibz 11:38pm on Tuesday, November 2nd, 2010 
Took me a few days of googling to hack this phone to work with t-mobile. It comes with 1.1.1 OS out of the box now. So I downgraded to 1. The iphone is a nice phone, but not great. AT&T and Apple lock this phone down which is not right since we spend so much on it.
defacto 4:14am on Friday, October 15th, 2010 
Good phone, fast, better battery life, retina display Overpriced. You can get it much cheaper via ATT or even Apple direct for 699.
h27 5:52pm on Sunday, October 10th, 2010 
Good to have spares I find these pry tools are invaluable for dismantling small electronic devices. Knock-off earbuds I only paid 3$ for mine, but they are knock-offs and not the real Apple earbuds. The sound in them stinks.
xbskid 4:23am on Friday, September 24th, 2010 
It would be great, I agree, if the world worked from the MAC platform. I was an initial adopter of mobileme when it had problems. However, those have been ironed out and the product works as advertised.
rayray5848 4:56am on Tuesday, September 14th, 2010 
This is no longer necessary to pipe music to receive telephone, Internet connection their new Apple iPhone . With the iPhone. * The bold, 115.5 x 62.1 x 12.3mm compared to the first generation iPhone apple 115 x 61 x 11.6mm * Impressive cheap.
NomdePlume 10:58pm on Saturday, August 21st, 2010 
This is no longer necessary to pipe music to receive telephone, Internet connection their new Apple iPhone . With the iPhone.
pedrodias 6:51pm on Wednesday, August 4th, 2010 
An amazing phone. In the start it looks like it is difficult to handle, first by price and then by functions. When there is no 3G HSDPA compatibility; no wireless iTunes connectivity or downloads; no external memory card slot; no stereo Bluetooth so why would ... I love my new iphone, it was very easy to sync with itunes - both music and contacts, very intuitive to learn how to do things.
pursuever 1:36pm on Monday, July 26th, 2010 
Apple is making millions on a great idea but ...  I like the internet, I like videoing and taking pictures and being able to email them.
Caoimhin 11:44am on Thursday, May 27th, 2010 
I bought the iphone because it is "idiot proof". Being of an older generation and not too tech savvy this phone was a breeze. Nice to handle, 4GB Storage Price, camera quality Amazing combination of phone/music player/video player WHEN IT WORKS! Screen suddenly dies or freezes during task. Firmware update may kill it!
Shushu 3:06pm on Wednesday, May 19th, 2010 
I bought this phone and a MacBook thinking th...  Screen size, Apps, voice quality No bluetooth communication with Mac computers
lord_rblade 8:02am on Saturday, April 17th, 2010 
The iPhone is a great phone... If you like sp...  I really like the touch screen and all the apps that iPhone has. AT&T is known for their 3g problems. I ca...  Great App Store Poor Coverage, Verizon Wireless is faster and has better coverage
Samanther 5:11am on Saturday, March 20th, 2010 
Earphones Although the earphones work fine, one of them lost the metal outside cover within a week. Also one of the cords (right and left). Apple Earphones They are the Apple earphones. Exactly what you expect. The mic and button work with the iPhone 3G, but not the volume buttons.

Comments posted on www.ps2netdrivers.net are solely the views and opinions of the people posting them and do not necessarily reflect the views or opinions of us.

 

Documents

doc0

Microsoft Exchange ActiveSync
iPhone, iPod touch, and iPad support the following versions of Microsoft Exchange: Exchange ActiveSync for Exchange Server (EAS) 2003 Service Pack 2 Exchange ActiveSync for Exchange Server (EAS) 2007 For support of Exchange 2007 policies and features, Service Pack 1 is required.
Supported Exchange ActiveSync Policies
The following Exchange policies are supported: Enforce password on device Minimum password length Maximum failed password attempts Require both numbers and letters Inactivity time in minutes The following Exchange 2007 policies are also supported: Allow or prohibit simple password Password expiration Password history Policy refresh interval Minimum number of complex characters in password Require manual syncing while roaming Allow camera Require device encryption For a description of each policy, refer to your Exchange ActiveSync documentation.
The Exchange policy to require device encryption (RequireDeviceEncryption) is supported on iPhone 3GS, on iPod touch (Fall 2009 models with 32 GB or more) and on iPad. iPhone, iPhone 3G, and other iPod touch models dont support device encryption and wont connect to an Exchange Server that requires it. If you enable the policy Require Both Numbers and Letters on Exchange 2003, or the policy Require Alphanumeric Password on Exchange 2007, the user must enter a device passcode that contains at least one complex character. The value specified by the inactivity time policy (MaxInactivityTimeDeviceLock or AEFrequencyValue) is used to set the maximum value that users can select in both Settings > General > Auto-Lock and Settings > General > Passcode Lock > Require Passcode.

Remote Wipe

You can remotely wipe the contents of an iPhone, iPod touch, or iPad. Wiping removes all data and configuration information from the device. The device is securely erased and restored to original, factory settings. Important: On iPhone and iPhone 3G, wiping overwrites the data on the device, which can take approximately one hour for each 8 GB of device capacity. Connect the device to a power supply before wiping. If the device turns off due to low power, the wiping process resumes when the device is connected to power. On iPhone 3GS and iPad, wiping removes the encryption key to the data (which is encrypted using 256-bit AES encryption) which occurs instantaneously. With Exchange Server 2007, you can initiate a remote wipe using the Exchange Management Console, Outlook Web Access, or the Exchange ActiveSync Mobile Administration Web Tool. With Exchange Server 2003, you can initiate a remote wipe using the Exchange ActiveSync Mobile Administration Web Tool. Users can also wipe a device in their possession by choosing Erase All Content and Settings from the Reset menu in General settings. Devices can also be configured to automatically initiate a wipe after several failed passcode attempts. If you recover a device that was wiped because it was lost, use iTunes to restore it using the devices latest backup.

Microsoft Direct Push

The Exchange server automatically delivers email, contacts, and calendar events to iPhone and iPad Wi-Fi + 3G if a cellular or Wi-Fi data connection is available. iPod touch and iPad Wi-Fi dont have a cellular connection, so they receive push notifications only when theyre active and connected to a Wi-Fi network.
Microsoft Exchange Autodiscovery
The Autodiscover service of Exchange Server 2007 is supported. When you manually configure a device, Autodiscover uses your email address and password to automatically determine the correct Exchange server information. For information about enabling the Autodiscover service, see http://technet.microsoft.com/en-us/ library/cc539114.aspx.
Microsoft Exchange Global Address List
iPhone, iPod touch, and iPad retrieve contact information from your companys Exchange server corporate directory. You can access the directory when searching in Contacts, and its automatically accessed for completing email addresses as you enter them.
Additional Supported Exchange ActiveSync Features
In addition to the features and capabilities already described, iPhone OS supports: Creating calendar invitations. With Microsoft Exchange 2007, you can also view the status of replies to your invitations. Setting Free, Busy, Tentative, or Out of Office status for your calendar events. Searching mail messages on the server. Requires Microsoft Exchange 2007. Exchange ActiveSync client certificate-based authentication.
Unsupported Exchange ActiveSync Features
Not all Exchange features are supported, including, for example: Folder management Opening links in email to documents stored on SharePoint servers Task synchronization Setting an out of office autoreply message Flagging messages for follow-up
iPhone OS works with VPN servers that support the following protocols and authentication methods: L2TP/IPSec with user authentication by MS-CHAPV2 Password, RSA SecurID and CryptoCard, and machine authentication by shared secret. PPTP with user authentication by MS-CHAPV2 Password, RSA SecurID, and CryptoCard. Cisco IPSec with user authentication by Password, RSA SecurID, or CryptoCard, and machine authentication by shared secret and certificates. See Appendix A for compatible Cisco VPN servers and recommendations about configurations.
Cisco IPSec with certificate-based authentication supports VPN on demand for domains you specify during configuration. See VPN Settings on page 35 for details.

Over-the-Air Enrollment and Configuration
Enrollment is the process of authenticating a device and user so that you can automate the process of distributing certificates. Digital certificates provide many benefits to users. They can be used to authenticate access to key enterprise services, such as Microsoft Exchange ActiveSync, WPA2 Enterprise wireless networks, and corporate VPN connections. Certificate-based authentication also permits the use of VPN On Demand for seamless access to corporate networks. In addition to using the over-the-air enrollment capabilities to issue certificates for your companys public key infrastructure (PKI), you can also deploy device configuration profiles. This ensures that only trusted users are accessing corporate services and that their devices are configured according to your IT policies. And because configuration profiles can be both encrypted and locked, the settings cannot be removed, altered, or shared with others. These capabilities are available to you in the over-the-air process described below, and also by using iPhone Configuration Utility to configure devices while theyre attached to your administrative computer. See Chapter 2 to learn about using iPhone Configuration Utility. Implementing over-the-air enrollment and configuration requires development and integration of authentication, directory, and certificate services. The process can be deployed using standard web services, and once its in place, it permits your users to set up their devices in a secure, authenticated fashion.
Overview of the Authenticated Enrollment and Configuration Process
To implement this process, you need to create your own profile distribution service that accepts HTTP connections, authenticates users, creates mobileconfig profiles, and manages the overall process described in this section. You also need a CA (certificate authority) to issue the device credentials using Simple Certificate Enrollment Protocol (SCEP). For links to PKI, SCEP, and related topics see Other Resources on page 27. The following diagram shows the enrollment and configuration process that iPhone supports.
Phase 1 - Begin Enrollment

Profile service

Enrollment request Device information request User: Anne Johnson sample sample
Attributes required: UDID, OS version, IMEI Challenge token: AnneJohnson1 URL for response: https://profiles.example.com

Phase 1 Begin Enrollment: Enrollment begins with the user using Safari to access the URL of the profile distribution service youve created. You can distribute this URL via SMS or email. The enrollment request, represented as step 1 in the diagram, should authenticate the users identify. Authentication can be as simple as basic auth, or you can tie into your existing directory services. In step 2, your service sends a configuration profile (.mobileconfig) in response. This response specifies a list of attributes that the device must provide in the next reply and a pre-shared key (challenge) that can carry the identity of the user forward during this process so you can customize the configuration process for each user. The device attributes that the service can request are iPhone OS version, device ID (MAC Address), product type (iPhone 3GS returns iPhone2,1), phone ID (IMEI), and SIM information (ICCID). For a sample configuration profile for this phase, see Sample Phase 1 Server Response on page 84.
Phase 2 - Device Authentication

Signed response via POST

sample
Attributes: UDID, OS Version, IMEI Challenge token: AnneJohnson1
Phase 2 Device Authentication: After the user accepts the installation of the profile received in phase 1, the device looks up the requested attributes, adds the challenge response (if provided), signs the response using the devices built-in identity (Apple-issued certificate), and sends it back to the profile distribution service using HTTP Post. For a sample configuration profile for this phase, see Sample Phase 2 Device Response on page 85.
Phase 3 - Device Certificate Installation
Certificate issuing service
Challenge Key generation specs URL for response
Challenge Certificate Signing Request Public key Device certificate 2
RSA: 1024 Challenge: AnneJohnson1 URL:http://ca.example.com/ getkey.exe
Phase 3 Certificate Installation: In step 1, the profile distribution service responds with specifications that the device uses to generate a key (RSA 1024) and where to return it for certification using SCEP (Simple Certificate Enrollment Protocol). In step 2, the SCEP request must be handled in automatic mode, using the challenge from the SCEP packet to authenticate the request. In step 3, the CA responds with an encryption certificate for the device. For a sample configuration profile for this phase, see Sample Phase 3 Server Response With SCEP Specifications on page 85.
Phase 4 - Device Configuration

2 Profile service

A.mobileconfig file encrypted for device and signed by profile service Device attributes signed with device certificate sample
1 UDID, OS version, IMEI, MAC address
Exchange policies, VPN settings, additional SCEP payloads, mail accounts, etc.
Phase 4 Device Configuration: In step 1, the device replies with the list of attributes, signed using the encryption certificate provided by the CA in the previous phase. In step 2, the profile service responds with an encrypted.mobileconfig file thats automatically installed. The profile service should sign the.mobileconfig file. Its SSL certificate can be used for this purpose, for example. In addition to general settings, this configuration profile should also define enterprise policies that you want to enforce and it should be a locked profile so the user cannot remove it from the device. The configuration profile can contain additional requests for enrollment of identities using SCEP, which are executed as the profile is installed. Similarly, when a certificate installed using SCEP expires or is otherwise invalidated, the device asks the user to update the profile. When the user authorizes the request, the device repeats the above process to obtain a new certificate and profile. For a sample configuration profile for this phase, see Sample Phase 4 Device Response on page 87.

SCEP Settings

The SCEP payload lets you specify settings that allow the device to obtain certificates from a CA using Simple Certificate Enrollment Protocol (SCEP).
Setting URL Name Description This is the address of the SCEP server. This can be any string that will be understood by the certificate authority, it can be used to distinguish between instances, for example. The representation of a X.500 name represented as an array of OID and value. For example, /C=US/O=Apple Inc./CN=foo/1.2.5.3=bar, which would translate to: [ [ [C US] ], [ [O Apple Inc.] ],., [ [ 1.2.5.3 bar ] ] ] , , , A pre-shared secret the SCEP server can use to identify the request or user. Select a key size, andusing the checkboxes below this fieldthe acceptable use of the key. If your Certificate Authority uses HTTP, use this field to provide the fingerprint of the CAs certificate which the device will use to confirm authenticity of the CAs response. during the enrollment process. You can enter a SHA1 or MD5 fingerprint, or select a certificate to import its signature.

Subject

Challenge Key Size and Usage Fingerprint
For more information about how the iPhone obtains certificates wirelessly, see Over-the-Air Enrollment and Configuration on page 22.

Advanced Settings

The Advanced payload lets you change the devices Access Point Name (APN) and cell network proxy settings. These settings define how the device connects to the carriers network. Change these settings only when specifically directed to do so by a carrier network expert. If these settings are incorrect, the device cant access data using the cellular network. To undo an inadvertent change to these settings, delete the profile from the device. Apple recommends that you define APN settings in a configuration profile separate from other enterprise settings, because profiles that specify APN information must be signed by your cell service provider. iPhone OS supports APN user names of up to 20 characters, and passwords of up to 32 characters.
Editing Configuration Profiles
In iPhone Configuration Utility, select a profile in the Configuration Profiles list, and then use the payload list and editing panes to make changes. You can also import a profile by choosing File > Add to Library and then selecting a.mobileconfig file. If the settings panes arent visible, choose View > Show Detail.
The Identifier field in the General payload is used by the device to determine whether a profile is new, or an update to an existing profile. If you want the updated profile to replace one that users have already installed, dont change the Identifier.

Distributing Configuration Profiles on the Web
You can distribute configuration profiles using a website. Users install the profile by downloading it using Safari on their device. To easily distribute the URL to your users, send it via SMS. To export a configuration profile: 1 Click the Export button in the iPhone Configuration Utility toolbar. In the dialog that appears, select a security option: a None: A plain text.mobileconfig file is created. It can be installed on any device. Some content in the file is obfuscated to prevent casual snooping if the file is examined, but you should make sure that when you put the file on your website its accessible only by authorized users. b Sign Configuration Profile: The.mobileconfig file is signed and wont be installed by a device if its altered. Once installed, the profile can only be updated by a profile that has the same identifier and is signed by the same copy of iPhone Configuration Utility. Some of the information in the profile is obfuscated to prevent casual snooping if the file is examined, but you should make sure that when you put the file on your website, its accessible only by authorized users. c Sign and Encrypt Profile: Signs the profile so it cannot be altered, and encrypts all of the contents so the profile cannot be examined and can only be installed on a specific device. Separate.mobileconfig files will be created for each of the devices you select from the Devices list. 2 Click Export, then select a location to save the.mobileconfig files. The files are ready for posting on your website. Dont compress the.mobileconfig file or change its extension, or the device wont recognize or install the profile.
User Installation of Downloaded Configuration Profiles
Provide your users with the URL where they can download the profiles onto their devices, or send the profiles to an email account your users can access using the device before its set up with your enterprise-specific information. When a user downloads the profile from the web, or opens the attachment using Mail, the device recognizes the.mobileconfig extension as a profile and begins installation when the user taps Install.
During installation, the user is asked to enter any necessary information, such as passwords that were not specified in the profile, and other information as required by the settings you specified. The device also retrieves the Exchange ActiveSync policies from the server, and will refresh the policies, if theyve changed, with every subsequent connection. If the device or Exchange ActiveSync policies enforce a passcode setting, the user must enter a passcode that complies with the policy in order to complete the installation. Additionally, the user is asked to enter any passwords necessary to use certificates included in the profile. If the installation isnt completed successfullyperhaps because the Exchange server was unreachable or the user cancelled the processnone of the information entered by the user is retained. Users may want to change how many days worth of messages are synced to the device and which mail folders other than the inbox are synced. The defaults are three days and all folders. Users can change these by going to Settings > Mail, Contacts, Calendars > Exchange account name.

Cisco IPSec Settings

When you manually configure the device for Cisco IPSec VPN, a screen similar to the following appears:
Use this chart to identify the settings and information you enter:
Field Description Server Account Password Description A descriptive title that identifies this group of settings. The DNS name or IP address of the VPN server to connect to. The user name of the users VPN login account. Dont enter the group name in this field. The passphrase of the users VPN login account. Leave blank for RSA SecurID and CryptoCard authentication, or if you want the user to enter their password manually with every connection attempt. This will be available only if youve installed a.p12 or.pfx identity that contains a certificate provisioned for remote access and the private key for the certificate. When Use Certificate is on, the Group Name and Shared Secret fields are replaced with an Identify field that lets you pick from a list of installed VPN-compatible identities. The name of the group that the user belongs to as defined on the VPN server. The groups shared secret. This is the same for every member of the users assigned group. Its not the users password and must be specified to initiate a connection.

Use Certificate

Group Name Secret
Chapter 3 Manually Configuring Devices

PPTP Settings

When you manually configure the device for PPTP VPN, a screen similar to the following appears:
Field Description Server Account RSA SecurID Password Encryption Level Description A descriptive title that identifies this group of settings. The DNS name or IP address of the VPN server to connect to. The user name of the users VPN login account. If youre using an RSA SecurID token, turn on this option, so the Password field is hidden. The passphrase of the users VPN login account. The default is Auto, which selects the highest encryption level that is available, starting with 128-bit, then 40-bit, then None. Maximum is 128-bit only. None turns off encryption. The default is On. Sends all network traffic over the VPN link. Turn off to enable split-tunneling, which routes only traffic destined for servers inside the VPN through the server. Other traffic is routed directly to the Internet.

Send All Traffic

L2TP Settings
When you manually configure the device for L2TP VPN, a screen similar to the following appears:
Field Description Server Account Password Secret Send All Traffic Description A descriptive title that identifies this group of settings. The DNS name or IP address of the VPN server to connect to. The user name of the users VPN login account. The password of the users VPN login account. The shared secret (pre-shared key) for the L2TP account. This is the same for all LT2P users. The default is On. Sends all network traffic over the VPN link. Turn off to enable split-tunneling, which routes only traffic destined for servers inside the VPN through the server. Other traffic is routed directly to the Internet.

To change the setting for calendar data go to Settings > Mail, Contacts, Calendars > Sync.
iPhone, iPod touch, and iPad can look up contact information on LDAP directory servers. To add an LDAP server, go to Settings > Mail, Contacts, Calendars > Add Account > Other. Then tap Add LDAP Account.
Enter the LDAP server address, and user name and password if required, then tap Next. If the server is reachable and supplies default search settings to the device, the settings will be used.
The following Search Scope settings are supported:
Search Scope setting Base One Level Subtree Description Searches the base object only. Searches objects one level below the base object, but not the base object itself. Searches the base object and the entire tree of all objects descended from it.
You can define multiple sets of search settings for each server.
iPhone, iPod touch, and iPad work with CalDAV calendar servers that provide group calendars and scheduling. To add a CalDAV server, go to Settings > Mail, Contacts, Calendars > Add Account > Other. Then tap Add CalDAV Account.
Enter the CalDAV server address, and user name and password if necessary, then tap Next. After the server is contacted, additional fields appear that allow you to set more options.
Calendar Subscription Settings
You can add read-only calendars, such as project schedules or holidays. To add a calendar, go to Settings > Mail, Contacts, Calendars > Add Account > Other and then tap Add Subscribed Calendar.
Enter the URL for an iCalendar (.ics) file, and the user name and password if necessary, then tap Save. You can also specify whether alarms that are set in the calendar should be removed when the calendar is added to the device. In addition to adding calendar subscriptions manually, you can send users a webcal:// URL (or an http:// link to a.ics file) and, after the user taps the link, the device will offer to add it as a subscribed calendar.
Installing Identities and Root Certificates
If you dont distribute certificates using profiles, your users can install them manually by using the device to download them from a website, or by opening an attachment in an email message. The device recognizes certificates with the following MIME types and file extensions: application/x-pkcs12,.p12,.pfx application/x-x509-ca-cert,.cer,.crt,.der See Certificates and Identities on page 11 for more information about supported formats and other requirements. When a certificate or identity is downloaded to the device, the Install Profile screen appears. The description indicates the type: identity or certificate authority. To install the certificate, tap Install. If its an identity certificate, youll be asked to enter the certificates password.

To view or remove an installed certificate, go to Settings > General > Profile. If you remove a certificate thats required for accessing an account or network, your device cannot connect to those services.

Additional Mail Accounts

You can configure only one Exchange account, but you can add multiple POP and IMAP accounts. This can be used, for example, to access mail on a Lotus Notes or Novell Groupwise mail server. Go to Settings > Accounts > Mail, Contacts, Calendars > Add Account > Other. For more about adding an IMAP account, see the iPhone User Guide, iPod touch User Guide, or iPad User Guide.
Updating and Removing Profiles
For information about how a user updates or removes configuration profiles, see Removing and Updating Configuration Profiles on page 43. For information about installing distribution provisioning profiles, see Deploying Applications on page 63.
For information about the format and function of auto-proxy configuration files, used by the VPN proxy settings, see the following: Proxy auto-config (PAC) at http://en.wikipedia.org/wiki/Proxy_auto-config Web Proxy Autodiscovery Protocol at http://en.wikipedia.org/wiki/Wpad Microsoft TechNet Using Automatic Configuration, Automatic Proxy, and Automatic Detection at http://technet.microsoft.com/en-us/library/dd361918.aspx Apple has several video tutorials, viewable in a standard web browser, that show your users how to set up and use the features of iPhone, iPod touch, and iPad: iPhone Guided Tour at www.apple.com/iphone/guidedtour/ iPod touch Guided Tour at www.apple.com/ipodtouch/guidedtour/ iPad Guided Tour at www.apple.com/ipad/guided-tours/ iPhone Support webpage at www.apple.com/support/iphone/ iPod touch Support webpage at www.apple.com/support/ipodtouch/ iPad Support webpage at www.apple.com/support/ipad/ There is also a user guide for each device, in PDF, that provides additional tips and usage details: iPhone User Guide: http://manuals.info.apple.com/en/iPhone_User_Guide.pdf iPod touch User Guide: http://manuals.info.apple.com/en/iPod_touch_User_Guide.pdf iPad User Guide: http://manuals.info.apple.com/en/iPad_User_Guide.pdf

Deploying iTunes

You use iTunes to sync music and video, install applications, and more.
This chapter describes how to deploy iTunes and enterprise applications, and defines the settings and restrictions you can specify. iPhone, iPod touch, and iPad can sync each type of data (music, media, etc) to only one computer at a time. For example, you can sync music with a desktop computer and bookmarks with a portable computer, by setting iTunes sync options appropriately on both computers. See iTunes Help, available in the Help menu when iTunes is open, for more information about sync options.

Cisco VPN Server Configuration
Use these guidelines to configure your Cisco VPN server for use with iPhone, iPod touch and iPad. Supported Cisco Platforms
iPhone OS supports Cisco ASA 5500 Security Appliances and PIX Firewalls configured with 7.2.x software or later. The latest 8.0.x software release (or later) is recommended. iPhone OS also supports Cisco IOS VPN routers with IOS version 12.4(15)T or later. VPN 3000 Series Concentrators dont support iPhone VPN capabilities.

Authentication Methods

iPhone OS supports the following authentication methods: Pre-shared key IPSec authentication with user authentication via xauth Client and server certificates for IPSec authentication with optional user authentication via xauth Hybrid authentication where the server provides a certificate and the client provides a pre-shared key for IPSec authentication; user authentication is required via xauth. User authentication is provided via xauth and includes the following authentication methods: User name with password RSA SecurID CryptoCard
Appendix A Cisco VPN Server Configuration

Authentication Groups

The Cisco Unity protocol uses authentication groups to group users together based on a common set of authentication and other parameters. You should create an authentication group for iPhone OS device users. For pre-shared key and hybrid authentication, the group name must be configured on the device with the groups shared secret (pre-shared key) as the group password. When using certificate authentication, no shared secret is used and the users group is determined based on fields in the certificate. The Cisco server settings can be used to map fields in a certificate to user groups.

Certificates

When setting up and installing certificates, make sure of the following: The server identity certificate must contain the servers DNS name and/or IP address in the subject alternate name (SubjectAltName) field. The device uses this information to verify that the certificate belongs to the server. You can specify the SubjectAltName using wildcard characters for per-segment matching, such as vpn.*.mycompany.com, for more flexibility. The DNS name can be put in the common name field, if no SubjectAltName is specified. The certificate of the CA that signed the servers certificate should be installed on the device. If it isnt a root certificate, install the rest of the trust chain so that the certificate is trusted. If client certificates are used, make sure that the trusted CA certificate that signed the clients certificate is installed on the VPN server. The certificates and certificate authorities must be valid (not expired, for example.). Sending of certificate chains by the server isnt supported and should be turned off. When using certificate-based authentication, make sure that the server is set up to identify the users group based on fields in the client certificate. See Authentication Groups on page 68.

Key EmailAccountType

Value String, mandatory. Allowed values are EmailTypePOP and EmailTypeIMAP. Defines the protocol to be used for that account. String, mandatory. Designates the full email address for the account. If not present in the payload, the device prompts for this string during profile installation. String, mandatory. Designates the authentication scheme for incoming mail. Allowed values are EmailAuthPassword and EmailAuthNone. String, mandatory. Designates the incoming mail server host name (or IP address). Number, optional. Designates the incoming mail server port number. If no port number is specified, the default port for a given protocol is used. Boolean, optional. Default Yes. Designates whether the incoming mail server uses SSL for authentication. String, mandatory. Designates the user name for the email account, usually the same as the email address up to the @ character. If not present in the payload, and the account is set up to require authentication for incoming email, the device will prompt for this string during profile installation. String, optional. Password for the Incoming Mail Server. Use only with encrypted profiles. String, optional. Password for the Outgoing Mail Server. Use only with encrypted profiles.

EmailAddress

IncomingMailServerAuthentication
IncomingMailServerHostName IncomingMailServerPortNumber
IncomingMailServerUseSSL IncomingMailServerUsername
IncomingPassword OutgoingPassword
OutgoingPasswwordSameAsIncomi Boolean, optional. If set, the user will be prompted for the ngPassword password only once and it will be used for both outgoing and incoming mail. OutgoingMailServerAuthentication String, mandatory. Designates the authentication scheme for outgoing mail. Allowed values are EmailAuthPassword and EmailAuthNone. String, mandatory. Designates the outgoing mail server host name (or IP address). Number, optional. Designates the outgoing mail server port number. If no port number is specified, ports 25, 587 and 465 are used, in this order. Boolean, optional. Default Yes. Designates whether the outgoing mail server uses SSL for authentication. String, mandatory. Designates the user name for the email account, usually the same as the email address up to the @ character. If not present in the payload, and the account is set up to require authentication for outgoing email, the device prompts for this string during profile installation.
OutgoingMailServerHostName OutgoingMailServerPortNumber
OutgoingMailServerUseSSL OutgoingMailServerUsername

Web Clip Payload

The Web Clip payload is designated by the com.apple.webClip.managed PayloadType value. In addition to the settings common to all payloads, this payload defines the following:
Key URL Label Icon Value String, mandatory. The URL that the Web Clip should open when clicked. The URL must begin with HTTP or HTTPS or it wont work. String, mandatory. The name of the Web Clip as displayed on the Home screen. Data, optional. A PNG icon to be shown on the Home screen. Should be 59 x 60 pixels in size. If not specified, a white square will be shown. Boolean, optional. If No, the user cannot remove the Web Clip, but it will be removed if the profile is deleted.

CalDAV Payload

The CalDAV payload is designated by the com.apple.caldav.account PayloadType value. In addition to the settings common to all payloads, this payload defines the following:
Key CalDAVAccountDescription CalDAVHostName CalDAVUsername CalDAVPassword CalDAVUseSSL CalDAVPort CalDAVPrincipalURL Value String, optional. Description of the account. String, mandatory. The server address String, mandatory. The users login name. String, optional. The users password Boolean, mandatory. Whether or not to use SSL. Number, optional. The port on which to connect to the server. String, optional. The base URL to the users calendar.
Calendar Subscription Payload
The CalSub payload is designated by the com.apple.subscribedcalendar.account PayloadType value. In addition to the settings common to all payloads, this payload defines the following:
Key SubCalAccountDescription SubCalAccountHostName SubCalAccountUsername SubCalAccountPassword SubCalAccountUseSSL Value String, optional. Description of the account. String, mandatory. The server address. String, optional. The users login name String, optional. The users password. Boolean, mandatory. Whether or not to use SSL.

SCEP Payload

The SCEP (Simple Certificate Enrollment Protocol) payload is designated by the com.apple.encrypted-profile-service PayloadType value. In addition to the settings common to all payloads, this payload defines the following:
Key URL Name Value String, mandatory. String, optional. any string which is understood by the SCEP server. For example, it could be a domain name like example.org. If a certificate authority has multiple CA certificates this field can be used to distinguish which is required. Array, optional. The representation of a X.500 name represented as an array of OID and value. For example, /C=US/O=Apple Inc./ CN=foo/1.2.5.3=bar, which would translate to: [ [ [C US] ], [ [O Apple Inc.] ],., [ [ 1.2.5.3 bar ] ] ] , , , OIDs can be represented as dotted numbers, with shortcuts for C, L, ST, O, OU, CN (country, locality, state, organization, organizational unit, common name). String, optional. A pre-shared secret. Number, optional. The keysize in bits, either 1024 or 2048. String, optional. Currently always RSA. Number, optional. A bitmask indicating the use of the key. 1 is signing, 4 is encryption, 5 is both signing and encryption. Some CAs, such as Windows CA, support only encryption or signing, but not both at the same time.

Appendix C Sample Scripts
Sample AppleScript for iPhone Configuration Utility
This sample script demonstrates creating configuration files using iPhone Configuration Utility for Mac OS X.
tell application "iPhone Configuration Utility" log (count of every configuration profile) set theProfile to make new configuration profile with properties {displayed name:"Profile Via Script", profile identifier:"com.example.configviascript", organization:"Example Org.", account description:"This is a configuration profile created via AppleScript"} tell theProfile make new passcode payload with properties {passcode required:true, simple value allowed:true} make new restrictions payload with properties {YouTube allowed:false} make new WiFi payload with properties {service set identifier:"Example Wi-Fi", security type:WPA, password:"password"} set theWiFiPayload to make new WiFi payload delete theWiFiPayload make new VPN payload with properties {connection name:"Example VPN Connection"} set theVPNPayload to make new VPN payload delete theVPNPayload make new email payload with properties {account description:"Email Account 1 Via Scripting"} make new email payload with properties {account description:"Email Account 2 Via Scripting"} make new Exchange ActiveSync payload with properties {account name:"ExchangePayloadAccount"} make new LDAP payload with properties {account description:"LDAP Account 1 Via Scripting"} make new LDAP payload with properties {account description:"LDAP Account 2 Via Scripting"} make new web clip payload with properties {label:"Web Clip Account 1 Via Scripting"} make new web clip payload with properties {label:"Web Clip Account 2 Via Scripting"} end tell end tell

doc1

Apple One (1) Year Limited Warranty
Apples warranty obligations for this hardware product are limited to the terms set forth below: Apple Inc. (Apple) warrants this Apple-branded hardware product against defects in materials and workmanship under normal use for a period of ONE (1) YEAR from the date of retail purchase by the original end-user purchaser (Warranty Period). If a hardware defect arises and a valid claim is received within the Warranty Period, at its option and to the extent permitted by law, Apple will either (1) repair the hardware defect at no charge, using new or refurbished replacement parts, (2) exchange the product with a product that is new or which has been manufactured from new or serviceable used parts and is at least functionally equivalent to the original product, or (3) refund the purchase price of the product. Apple may request that you replace defective parts with new or refurbished user-installable parts that Apple provides in fulfillment of its warranty obligation. A replacement product or part, including a user-installable part that has been installed in accordance with instructions provided by Apple, assumes the remaining warranty of the original product or ninety (90) days from the date of replacement or repair, whichever provides longer coverage for you. When a product or part is exchanged, any replacement item becomes your property and the replaced item becomes Apples property. Parts provided by Apple in fulfillment of its warranty obligation must be used in products for which warranty service is claimed. When a refund is given, the product for which the refund is provided must be returned to Apple and becomes Apples property. EXCLUSIONS AND LIMITATIONS This Limited Warranty applies only to hardware products manufactured by or for Apple that can be identified by the Apple trademark, trade name, or logo affixed to them. The Limited Warranty does not apply to any non-Apple hardware products or any software, even if packaged or sold with Apple hardware. Manufacturers, suppliers, or publishers, other than Apple, may provide their own warranties to the end user purchaser, but Apple, in so far as permitted by law, provides their products as is Software distributed by Apple with or without the Apple brand name (including, but not limited to. system software) is not covered under this Limited Warranty. Refer to the licensing agreement accompanying the software for details of your rights with respect to its use. Apple does not warrant that the operation of the product will be uninterrupted or error-free. Apple is not responsible for damage arising from failure to follow instructions relating to the products use. This warranty does not apply: (a) to damage caused by use with non-Apple products; (b) to damage caused by accident, abuse, misuse, flood, fire, earthquake or other external causes; (c) to damage caused by operating the product outside the permitted or intended uses described by Apple; (d) to damage caused by service (including upgrades and expansions) performed by anyone who is not a representative of Apple or an Apple Authorized Service Provider (AASP); (e) to a product or part that has been modified to alter functionality or capability without the written permission of Apple; (f ) to consumable parts, such as batteries, unless damage has occurred due to a defect in materials or workmanship; (g) to cosmetic damage, including but not limited to scratches, dents and broken plastic on ports; or (h) if any Apple serial number has been removed or defaced. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS, AND YOU MAY ALSO HAVE OTHER RIGHTS WHICH VARY FROM STATE TO STATE. APPLES RESPONSIBILITY FOR HARDWARE DEFECTS IS LIMITED TO REPAIR OR REPLACEMENT SERVICE AS DETERMINED BY APPLE IN ITS SOLE DISCRETION. ALL EXPRESS AND IMPLIED WARRANTIES, INCLUDING BUT NOT LIMITED TO ANY IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, ARE LIMITED IN TIME TO THE TERM OF THIS LIMITED WARRANTY. NO WARRANTIES, WHETHER EXPRESS OR IMPLIED, WILL APPLY AFTER THE EXPIRATION OF THE LIMITED WARRANTY PERIOD. SOME STATES DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS, SO THIS LIMITATION MAY NOT APPLY TO YOU. No Apple reseller, agent, or employee is authorized to make any modification, extension, or addition to this warranty. If any term is held to be illegal or unenforceable, the legality or enforceability of the remaining terms shall not be affected or impaired. EXCEPT AS PROVIDED IN THIS WARRANTY AND TO THE EXTENT PERMITTED BY LAW, APPLE IS NOT RESPONSIBLE FOR DIRECT, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES RESULTING FROM ANY BREACH OF WARRANTY OR CONDITION, OR UNDER ANY OTHER LEGAL THEORY, INCLUDING BUT NOT LIMITED TO LOSS OF USE; LOSS OF REVENUE; LOSS OF ACTUAL OR ANTICIPATED PROFITS (INCLUDING LOSS OF PROFITS ON CONTRACTS); LOSS OF THE USE OF MONEY; LOSS OF ANTICIPATED SAVINGS; LOSS OF BUSINESS; LOSS OF OPPORTUNITY; LOSS OF GOODWILL; LOSS OF REPUTATION; LOSS OF, DAMAGE TO OR CORRUPTION OF DATA; OR ANY INDIRECT OR CONSEQUENTIAL LOSS OR DAMAGE HOWSOEVER CAUSED INCLUDING THE REPLACEMENT OF EQUIPMENT AND PROPERTY, ANY COSTS OF RECOVERING, PROGRAMMING, OR REPRODUCING ANY PROGRAM OR DATA STORED OR USED WITH APPLE PRODUCTS AND ANY FAILURE TO MAINTAIN THE CONFIDENTIALITY OF DATA STORED ON THE PRODUCT. THE FOREGOING LIMITATION SHALL NOT APPLY TO DEATH OR PERSONAL INJURY CLAIMS, OR ANY STATUTORY LIABILITY FOR INTENTIONAL AND GROSS NEGLIGENT ACTS AND/OR OMISSIONS. SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. OBTAINING WARRANTY SERVICE Please access and review the online help resources referred to in the documentation accompanying this hardware product before requesting warranty service. If the product is still not functioning properly after making use of these resources, please contact the Apple representatives or, if applicable, an Apple owned retail store (Apple Retail) or AASP located using the information provided in the documentation. When contacting Apple via telephone, other charges may apply depending on your location. When calling, an Apple representative or AASP will help determine whether your product requires service and, if it does, will inform you how Apple will provide it. You must assist in diagnosing issues with your product and follow Apples warranty processes. Apple may restrict service to the fifty states of the United States of America and the District of Columbia, and provide warranty service (i) at an Apple Retail or AASP location, where service is performed at the location, or the Apple Retail or AASP may send the product to an Apple repair service location for service, (ii) by sending you prepaid way bills (and if you no longer have the original packaging, Apple may send you packaging material) to enable you to ship the product to Apples repair service location for service, or (iii) by sending you new or refurbished customer-installable replacement product or parts to enable you to service or exchange your own product (DIY Service). Upon receipt of the replacement product or part, the original product or part becomes the property of Apple and you agree to follow instructions, including, if required, arranging the return of original product or part to Apple in a timely manner. When providing DIY Service requiring the return of the original product or part, Apple may require a credit card

authorization as security for the retail price of the replacement product or part and applicable shipping costs. If you follow instructions, Apple will cancel the credit card authorization, so you will not be charged for the product or part and shipping costs. If you fail to return the replaced product or part as instructed, Apple will charge the credit card for the authorized amount. Service options, parts availability and response times may vary. Service options are subject to change at any time. In accordance with applicable law, Apple may require that you furnish proof of purchase details and/or comply with registration requirements before receiving warranty service. Please refer to the accompanying documentation for more details on this and other matters on obtaining warranty service. Apple will maintain and use customer information in accordance with the Apple Customer Privacy Policy accessible at www.apple.com/legal/privacy. If your product is capable of storing software programs, data and other information, you should protect its contents against possible operational failures. Before you deliver your product for warranty service it is your responsibility to keep a separate backup copy of the contents and disable any security passwords. THE CONTENTS OF YOUR PRODUCT WILL BE DELETED AND THE STORAGE MEDIA REFORMATTED IN THE COURSE OF WARRANTY SERVICE. Your product will be returned to you configured as originally purchased, subject to applicable updates. You will be responsible for reinstalling all other software programs, data and passwords. Recovery and reinstallation of software programs and user data are not covered under this Limited Warranty. Apple Inc. 1 Infinite Loop, Cupertino CA 95014
2007 Apple Inc. All rights reserved. Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. iPhone US v1.3 E034-4304-A

 

Technical specifications

Full description

iPhone combines three products - a revolutionary mobile phone, a widescreen iPod with touch controls, and a breakthrough Internet communications device with desktop-class email, web browsing, maps, and searching - into one small and lightweight handheld device. iPhone also introduces an entirely new user interface based on a large multi-touch display and pioneering new software, letting you control everything with just your fingers. So it ushers in an era of software power and sophistication never before seen in a mobile device, completely redefining what you can do on a mobile phone.

General
Product TypeSmartphone
Phone DesignCandy bar
Integrated ComponentsDigital camera, digital player
AntennaInternal
Width2.4 in
Depth0.7 in
Height4.6 in
Weight4.8 oz
Body ColorBlack
Cellular
TechnologyGSM
BandGSM 850/900/1800/1900 (Quadband)
Service ProviderAT&T
Operating SystemOS X
Input Device(s)Multi-touch
Messaging & Internet
Cellular Messaging ServicesSMS
Mobile Email ClientYes
Supported Email ProtocolsPOP3, IMAP4
Internet BrowserYes
Messaging / Data FeaturesPDF support, Microsoft Word support, Microsoft Excel support
Communications
EDGE (Enhanced Data Rates For Global Evolution)Yes
Wireless InterfaceIEEE 802.11b, IEEE 802.11g, Bluetooth 2.0 EDR
Telephone Features
SpeakerphoneYes
Call TimerYes
Conference Call CapabilityYes
Polyphonic RingerYes
Organizer
CalculatorYes , basic
Digital Player (Recorder)
Supported Digital Audio StandardsWAV, AAC, AIFF, MP3, Apple Lossless
Supported Digital Video StandardsH.264
Memory
User Memory8 GB - shared
Digital Camera
Sensor Resolution2 Megapixel
Display
TypeLCD display - color
TechnologyTFT
Diagonal Size3.5"
Display Resolution320 x 480 pixels
Display Illumination ColorWhite
Connections
Connector Type1 x headset jack - mini-phone 3.5 mm
Battery
Run Time DetailsTalk - up to 480 min Standby - up to 250 hrs
Miscellaneous
Cables IncludedUSB cable
Included AccessoriesPhone charging stand + power adapter , hands-free headset, cleaning cloth
Universal Product Identifiers
BrandApple
Part NumberMA712LL/A
GTIN00885909254026

 

Tags

KX-TH111 SHB6102-00 Clock DVP-SR700H M1073 IS Desktop 4 Cases KX-TCD210FX ITD84 HD Autopilot MP 100 Yamaha MS10 R 850 Nero 8 Rrus511 Deluxe 8 Mini Fromagere MHC-610 Scirocco Accessories Warranty Verizon KDC-122 RW6800 LD220Z Drivers Scales Chrono 300 USB PC Apps 2175V Zoom G1N Avic-F710BT Zalman 7700 ZWG5160 Daystar T56640 EM200 KX-TG6411E A1200N Conroe945PL-glan Mediahome 4 DEH-P4950MP RTI A5 DI3510 Sandisk C200 YFZ350 HVL-F20AM 4g B-ULS DSC-V1 WEP750 HS8060 Control LE40A568p3M K7vmmp31 K8NF4g-sata2 Chambers RL38ecsw Aspire E700 Motorizr Z3 FX-890 SA-8800 Update LF-U850A NV-HD100B Mouse System AX-M138 Aspire 4520 EW920S Emachines E525 Meter Iiif 3gs LL-T15g4 Notebooks Finepix F810 DVD-VR475M 41189 ATA-171P YZ250-2008 Server CPD-E230 KX-F750 AF-9400PV2R Illusion M-2 32LB125B5U Premio ST2 CVP-35 Updatecd1 3 ME-6B Nikkor DVD-S1700 Reservoir Dogs Dvdr3590H 58 Wrtp54G Magic Sdk Optio E60 Lecoaspira 701 KD R303 Syncmaster 151S TX-21V2 CL2854AN Afti 30 TH-A75R HDR-AX2000E CDA-7852R

 

manuel d'instructions, Guide de l'utilisateur | Manual de instrucciones, Instrucciones de uso | Bedienungsanleitung, Bedienungsanleitung | Manual de Instruções, guia do usuário | инструкция | návod na použitie, Užívateľská príručka, návod k použití | bruksanvisningen | instrukcja, podręcznik użytkownika | kullanım kılavuzu, Kullanım | kézikönyv, használati útmutató | manuale di istruzioni, istruzioni d'uso | handleiding, gebruikershandleiding

 

Sitemap

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101