Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
Apple iPod and iPod Touch manuale d’uso - BKManuals

Apple iPod and iPod Touch manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso Apple iPod and iPod Touch. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica Apple iPod and iPod Touch o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso Apple iPod and iPod Touch descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso Apple iPod and iPod Touch dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo Apple iPod and iPod Touch
- nome del fabbricante e anno di fabbricazione Apple iPod and iPod Touch
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature Apple iPod and iPod Touch
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio Apple iPod and iPod Touch non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti Apple iPod and iPod Touch e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio Apple in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche Apple iPod and iPod Touch, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo Apple iPod and iPod Touch, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso Apple iPod and iPod Touch. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    iPhone and iP od touch En terprise Deploymen t Guide[...]

  • Pagina 2

    K Apple Inc. © 2008 Apple Inc. All rights reserved. This manual may not be copied , in whole or in part, without the written consent of Apple . The Apple logo is a trademark of Apple Inc ., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of [...]

  • Pagina 3

    3 3 C onten ts Prefac e 5 iPhone in the Enterprise 5 System Requiremen ts 6 Microsoft Exchange ActiveSync 8 VPN 8 Network Security 9 Certificates 9 Email accounts 9 Additional Resour ces Chapter 1 1 0 Deploying iPhone and iP od touch 10 Activating Devices 11 Pr eparing Access t o Network Services and Enterprise Data 14 Determining Device P asscode [...]

  • Pagina 4

    4 Contents 39 Setting iT unes Restrictions Chapter 5 42 Deploying iPhone Applications 42 Register for A pplication Development 43 Signing Applications 43 Creating the Distribution P rovisioning P rofile 43 Installing Pr ovisioning P rofiles using iT unes 44 Installing Pro visioning Profiles using iPhone Configuration Utility for Mac OS X 44 Install[...]

  • Pagina 5

    5 Prefac e iPhone in the Ent erprise Learn ho w to int egrate iPhone and iP od touch with your enterprise syst ems. This guide is for system administrat ors. It provides information about deploying and supporting i Phone and iP od touch in enterprise environmen ts. Syst em Requirements Read this section for an overview of the system requirements an[...]

  • Pagina 6

    6 Preface iPhone in the Enterprise Windows c omputers  Windows XP Ser vice P ack 2 or Windo ws V ista  500 MHz P entium processor or faster  256 MB of RAM  Quick Time 7 . 1 .6 or later Some features of iT unes, such as use of the iT unes Store, have additional requir ements. See the documentation included with the iT unes installer for more[...]

  • Pagina 7

    Preface iPhone in the Enterprise 7 Remote Wipe Y ou can remotely wipe the contents of an iPhone or iP od touch. Doing so quick ly remove s all data and configuration information from the devic e, then the device is securely erased and restor ed to original, factor y settings. I t can take approximately one hour for each 8 GB of device capacity for [...]

  • Pagina 8

    8 Preface iPhone in the Enterprise Exchange A c tiveSync F eatures Not Supported Not all Exchange f eatures are supported, including, for example:  F older management  Opening links in email to documents stor ed on Sharepoint servers  T ask synchronization  Setting an “ out of office ” a utoreply message  Creating meeting invitations [...]

  • Pagina 9

    Preface iPhone in the Enterprise 9 Certificates iPhone and iP od touch can use certificates in the following ra w formats: Â PKCS1 (.cer , .cr t, .der) Â PKSC1 2 (.p1 2, .pfx) Email accounts iPhone and iP od touch support industr y-standard IMAP4- and POP3-enabled mail solutions on a range of ser ver platforms including Windows, UNIX, Linux, and [...]

  • Pagina 10

    1 10 1 Deploying iPhone and iP od touch This chapter pr ovides an o ver view of how to deploy iPhone and iP od touch in your ent erprise. iPhone and iP od touch are designed t o easily integrate with y our enterprise systems including Microsoft Exchange 2003 and 2 007 , 802. 1X-based secure wireless networks , and Cisco IPSec vir tual private netw [...]

  • Pagina 11

    Chapter 1 Deploying iPhone and iPod touch 11 Although there is no cellular service or SIM card for iP od touch, it must also be connected to a computer with iT unes for unlocking. Because iT unes is required to c omplete the activation proce ss for both iPhone and iP od touch, y ou must decide whether you want t o install iT unes on each user ’ s[...]

  • Pagina 12

    12 Chapter 1 Deploying iPhone and iPod touch Network C onfiguration  Make sure por t 443 is open on the firewall. I f your company use s Outlook Web Access , port 443 is most likely already open.  V erify that a ser ver cer tificate is installed on the Exchange fron tend server and enable Require Basic SSL for the Ex change ActiveSync vir tual [...]

  • Pagina 13

    Chapter 1 Deploying iPhone and iPod touch 13 WP A/WP A2 Enterprise Network C onfiguration  V erify network appliances for compatibility and select an authentication type (EAP type) suppor ted by iPhone and iP od touch. Make sure that 802. 1X is enabled on the authentication server , and if nece ssar y , install a ser ver cer tificate and assign n[...]

  • Pagina 14

    14 Chapter 1 Deploying iPhone and iPod touch IMAP Email If you don ’t use Microsof t Exchange , y ou can still implement a secure , standards-based email solution using any email server that suppor ts IMAP and is configured to requir e user authentication and SSL. The se servers can be located within a DMZ subnetwork, behind a corporate firewall,[...]

  • Pagina 15

    Chapter 1 Deploying iPhone and iPod touch 15 If you don ’t use Microsof t Exchange , y ou can set similar policies on your device s by creating configuration profiles . Y ou distribute the profiles via email or a web site that is accessible using the device . If you want to change a policy , you must post or send an updated profile to users f or [...]

  • Pagina 16

    2 16 2 Creating and Deplo ying C onfiguration P rofile s Configur ation profile s define how iPhone and iP od touch work with y our enterprise syst ems. Configuration profiles ar e XML files that, when installed, provide information that iPhone and iP od touch can use to connect to and communicat e with your enterprise systems. They contain VPN con[...]

  • Pagina 17

    Chapter 2 Creating and Deploying Configuration Profiles 17 When you open iPhone Configuration Utility , a window similar t o the one shown below appears. The cont ent of the main section of the window changes as you select items in the sidebar . The sidebar displa ys the Librar y , which contains the following categorie s: Â Devices shows a list o[...]

  • Pagina 18

    18 Chapter 2 Creating and Deploying Configuration Profiles iPhone Configur ation Utility for the W eb The web-based version of iPhone C onfiguration Utilit y lets you create configuration profiles for y our devices. Follow the instructions below for the platf orm you’ re using. Installing on Mac OS X T o install the utilit y on Mac OS X v1 0.5 Le[...]

  • Pagina 19

    Chapter 2 Creating and Deploying Configuration Profiles 19 A screen similar to the one shown here will appear . F or information about using the utility , see “Creating Configuration P rofiles,” below . Changing the User name and P assword for iPhone C onfiguration Utility W eb T o change the user name and password for accessing the utility , e[...]

  • Pagina 20

    20 Chapter 2 Creating and Deploying Configuration Profiles T o restar t the utility on Windo ws 1 Go to Con trol P anel > Administrative T ools > Ser vices. 2 Select Apple iPhone Configuration Web Utility . 3 Select Restar t from the Action menu. T o restar t the utility on Mac OS X 1 Open T erminal. 2 Enter sudo -s and authen ticate with an [...]

  • Pagina 21

    Chapter 2 Creating and Deploying Configuration Profiles 21 General Settings This is where you pr ovide the name and identifier of this profile . A configuration name is required . The name you specify appears in the profiles list and is display ed on the device after the configuration profile is installed . Although the name doesn ’t have to be u[...]

  • Pagina 22

    22 Chapter 2 Creating and Deploying Configuration Profiles T o sign a profile, click Apply Signature in the Signature section of the General pane. In the Configuration Signing window that appears , add the digital certificates necessary to authenticat e your signature . (Cer tificates in raw f ormats 1 and 1 2 are suppor ted.) Then select your priv[...]

  • Pagina 23

    Chapter 2 Creating and Deploying Configuration Profiles 23 Â Maximum passcode age (in days): Requires users to change their passcode at the interval you specify . Â Passc ode lock (in minutes): If the device isn’ t used for this period of time , it automatically locks. Entering the passcode unlocks it. Wi-F i Settings Use this pane to set how t[...]

  • Pagina 24

    24 Chapter 2 Creating and Deploying Configuration Profiles VPN Settings Use this pane to ent er the VPN settings for connecting to your network. Y ou can add multiple sets of VPN connec tions by clicking the Add (+) button. F or information about supported VPN protocols and authentication methods , see “ VPN” on page 8. Email Settings Use this [...]

  • Pagina 25

    Chapter 2 Creating and Deploying Configuration Profiles 25 Credentials Settings Use this pane to add certificates to the device . Cer tificates in raw f ormats PKCS1 (.cer , .der , .cr t) and PKCS1 2 (.p1 2, .pfx) ar e suppor ted . When installing an identity cer tificate on the device , make sure that the file contains a certificate and not just a[...]

  • Pagina 26

    26 Chapter 2 Creating and Deploying Configuration Profiles The Configuration Iden tifier field in the General pane is used by the device to determine whether a profile is new , or an update to an existing profile. If you want the updated profile to replac e one that users have alr eady installed , don’t change the Configuration Identifier . Pr ep[...]

  • Pagina 27

    Chapter 2 Creating and Deploying Configuration Profiles 27 IIS W eb S erver If your web server is IIS, add the MIME t ype in the Properties page of the ser ver using IIS Manager . The extension is mobileconfig and the file t ype is application/x-apple- aspen-config. Alternatively , you can add this information t o specific sites using the HTTP Head[...]

  • Pagina 28

    28 Chapter 2 Creating and Deploying Configuration Profiles If the installation isn ’t completed succ essfully , perhaps beca use the Exchange server was unreachable or the user cancelled the proce ss, none of the information ent ered by the user is retained . Users may want t o change how many da ys worth of data is synced to the device. The defa[...]

  • Pagina 29

    3 29 3 Manually C onfiguring D evice s This chapter de scribes how t o configure iPhone and iP od touch manually . If you don ’t provide automatic configuration pr ofiles, users can configure their devices manually . Some settings, such as passcode policies, can only be set by using a configuration profile. VPN Settings T o change VPN settings , [...]

  • Pagina 30

    30 Chapter 3 Manually Configuring Devices Cisco IPSec Settings When you manually configure the device f or Cisco IPSec VPN, a screen similar to following appears: Use this chart to identify the settings and information you ent er: Field Description Description A descriptive title that identifies this group of settings . Ser ver The DNS name or IP a[...]

  • Pagina 31

    Chapter 3 Manually Configuring Devices 31 PPTP Settings When you manually configure the device f or PPTP VPN, a screen similar to the following appears: Use this chart to identify the settings and information you ent er: Field Description Description A descriptive title that identifies this group of settings . Ser ver The DNS name or IP address of [...]

  • Pagina 32

    32 Chapter 3 Manually Configuring Devices L2TP Settings When you manually configure the device f or L2TP VPN, a screen similar to the follo wing appears: Use this chart to identify the settings and information you ent er: Field Description Description A descriptive title that identifies this group of settings . Ser ver The DNS name or IP address of[...]

  • Pagina 33

    Chapter 3 Manually Configuring Devices 33 Wi-F i S ettings T o change Wi-F i settings, go to Settings > G eneral > Network > Wi-Fi. If the network you ’re adding is within range , select it from the list of a vailable networks . O ther wise, tap Other . Make sure that your network infrastructure uses authen tication and encr yption suppo[...]

  • Pagina 34

    34 Chapter 3 Manually Configuring Devices Exchange Settings Y ou can configure only one Exchange account per devic e. T o add an Exchange account, go to Settings > Mail, Contacts, Calendars, and then tap Add Account. On the Add Account scr een, tap M icrosoft Exchange. When you manually configure the device f or Exchange, use this char t to iden[...]

  • Pagina 35

    Chapter 3 Manually Configuring Devices 35 iPhone and iP od touch support M icrosoft’ s Autodiscov er y service, which uses your user name and password to det ermine the address of the fron t-end Exchange server . I f the ser ver’ s address can ’t be determined, you’ll be asked to enter it. After the Exchange accoun t is successfully configu[...]

  • Pagina 36

    36 Chapter 3 Manually Configuring Devices Important: When you configure a device to sync with Ex change, all existing calendar and contact information on the device is o verwritten. Additionally , iT unes no longer sync contacts and calendars with your desktop c omputer . Y ou can still sync your device wirelessly with MobileMe services. T o change[...]

  • Pagina 37

    Chapter 3 Manually Configuring Devices 37 When a certificate is downloaded to the device, the Install Profile screen appears. The description indicate s the type of cer tificate: identity or cer tificate authority (root). T o install the cer tificate, tap Install. T o view or remove a certificate that has been installed, go to Settings > General[...]

  • Pagina 38

    4 38 4 Deploying i T unes Y ou use iT unes to sync music and video , install applications, and more . This chapter describe s how to deploy iT unes and enterprise applications, and defines the settings and restrictions you can specify . Installing iT unes iT unes uses standard Macintosh and Windows installers. The latest version of iT unes is avail[...]

  • Pagina 39

    Chapter 4 Deploying iTunes 39 Silently Installing on Windows T o push iTune s to client comput ers, extrac t the individual .msi files from iT unesSetup.ex e. T o Ex tract .msi files from iT unesSetup.ex e: 1 Run iT unesSetup.ex e. 2 Open %temp% and find a folder named IXP nnn .TMP , where %temp% is your temporar y director y (typically bootdrive :[...]

  • Pagina 40

    40 Chapter 4 Deploying iTunes  Play iT unes media cont ent that is marked as explicit  Play movie s  Play T V shows  Play games Setting iT unes Restrictions for Mac OS X On Mac OS X, you control access by using keys in a plist file . On Mac OS X the k ey values sho wn above can be s pecified for each user by editing ~/Library/Pref erences/ [...]

  • Pagina 41

    Chapter 4 Deploying iTunes 41 Updating iT unes and iPhone Software Manually If you turn off automat ed and user-initiated software update checking in iT unes, you’ll need to distribute software updates t o users for manual installation. T o update iT unes, see the installation and deployment steps described earlier in this document. It ’ s the [...]

  • Pagina 42

    5 42 5 Deploying iPhone A pplications Y ou can distribute iPhone and iP od touch applications to your users . If you want to install iPhone OS applications that you ’ve developed , y ou distribute the application to your users , who install the applications using iT unes. Applications from the online App St ore work on iPhone and iP od touch with[...]

  • Pagina 43

    Chapter 5 Deploying iPhone Applications 43 Signing Applications Applications you distribute t o users must be signed with your distribution certificate. F or instructions about obtaining and using a cer tificate, see the i Phone Developer Cent er at http://developer .apple.com/iphone . Creating the Distribution P rovisioning P rofile Distribution p[...]

  • Pagina 44

    44 Chapter 5 Deploying iPhone Applications Windows Vista  bootdrive :Users username A ppDataRoamingApple Comput erMobileDevice Pr ovisioning P rofiles  bootdrive :P rogramDataApple ComputerMobileDeviceP rovisioning P rofiles  the path specified in the HK CU or HKLM by the P rovisioningP rofilesPath r egistery key SOFT W AREApple C[...]

  • Pagina 45

    Chapter 5 Deploying iPhone Applications 45 Installing Applications using iPhone C onfiguration Utility for Mac OS X Y ou can use iPhone Configuration Utility for Mac OS X to install applications on connected devices. Follow these steps: 1 In iPhone Configuration Utility , choose File > Open and then select the application that you want to instal[...]

  • Pagina 46

    46 Appendix A A Cisco VPN Ser ver C onfiguration Use these guideline s to configure your Cisco VPN ser ver for use with iPhone and iP od touch. Authen tication Methods iPhone suppor t the following a uthentication methods: Â Pre-shar ed key IPsec a uthentication with user authen tication via xauth. Â Client and server cer tificates for IP sec aut[...]

  • Pagina 47

    Appendix A Cisco VPN Server Configuration 47 Certificates When setting up and installing certificates, make sure of the following: Â The server identity cer tificate must contain the server ’ s DNS name and/or IP address in the subject alternate name (SubjectAltName) field. The device uses this information to v erify that the certificate belongs[...]

  • Pagina 48

    48 Appendix A Cisco VPN Server Configuration Other Suppor ted F eatures iPhone and iP od touch suppor t the following: Â Application V ersion: T he client software version is sent t o the server , allowing the ser ver to accept or r eject connections based on the device’ s software version. Â Banner: The banner , if configured on the server , i[...]

  • Pagina 49

    49 B Appendix B C onfiguration P rofile F ormat This appendix specifie s the forma t of mobileconfig files f or those who want to cr eate their own t ools. This document assumes that y ou ’ re familiar with the Apple XML DTD and the general propert y list format. A general description of the Apple plist format is a vailable at www .apple.com/DTDs[...]

  • Pagina 50

    50 Appendix B Configuration Profile Format P ayload Con tent The P ayloadConten t array is an array of dictionaries, where each dictionar y describes an individual payload of the profile . Each func tional profile has at least one or more entrie s in this array . Each dictionar y in this array has a few common properties, regardless of the payload [...]

  • Pagina 51

    Appendix B Configuration Profile Format 51 P asscode P olic y Pa yload The P asscode P olicy payload is designated by the com.apple.mobiledevice .passwordpolic y P ayloadT ype value. The presence of this payload type prompts iPhone to presen t the user with an alphanumeric passcode entry mechanism, which allows the entr y of arbitrarily long and co[...]

  • Pagina 52

    52 Appendix B Configuration Profile Format Email P ayload The email payload is designat ed by the com.apple .mail.managed P ayloadT ype value . This payload creat es an email account on the devic e. In addition to the settings common to all payloads , this pa yload defines the follo wing: Key V alue EmailAccountDescription String, optional. A user-[...]

  • Pagina 53

    Appendix B Configuration Profile Format 53 APN P ayload The APN (Acce ss P oint Name) payload is designated by the c om.apple.apn.managed P ayloadT ype value . In addition to the settings common to all payloads , this payload defines the following: Exchange P ayload The Exchange pa yload is designated by the c om.apple.eas.acc ount P ayloadT ype va[...]

  • Pagina 54

    54 Appendix B Configuration Profile Format VPN P ayload The VPN payload is designated by the com.apple .vpn.managed PayloadT ype value. In addition to the settings common to all pa yload types, the VPN pa yload defines the following keys. There are tw o possible dictionaries present at the top lev el, under the keys “PPP ” and “IPSec” . The[...]

  • Pagina 55

    Appendix B Configuration Profile Format 55 IPSec Dic tionary Keys The follo wing elements are f or VPN payloads of t ype IPSec Wi-F i Pa yload The Wi-Fi payload is de signated by the com.apple .wifi.managed P ayloadT ype value. This describes v ersion 0 of the P ayloadV ersion value . In addition to the settings common to all payload types , the pa[...]

  • Pagina 56

    56 Appendix B Configuration Profile Format F or 802. 1X enterprise netw orks, the EAP Client Configuration Dictionary must be provided . EAPClientC onfiguration Dic tionary In addition to the standard encryption t ypes, it is also possible to specify an en terprise profile for a giv en network via the “EAPClientConfiguration ” k ey . This key i[...]

  • Pagina 57

    Appendix B Configuration Profile Format 57 EAP-F ast Suppor t The EAP-F AST module uses the following pr operties in the EAPClientConfiguration dictionar y . Thes keys are hierarchical in nature: if EAPF ASTUseP AC is false , the other two pr operties aren ’t consulted. Similarly , if EAPF ASTProvisionP AC is false , EAPF ASTPro visionP ACAnonymo[...]

  • Pagina 58

    58 Appendix B Configuration Profile Format If EAPF ASTUseP AC is true , then an existing P AC is used , if it is present. The only way to get a P AC on the device currently is to allo w P AC provisioning . So, you need to enable EAPF ASTPro visionP AC, and if desired, also EAPF ASTProvisionP ACAnonymously . EAPF ASTPro visionP ACAnonymously has a s[...]