Apple iPod and iPod Touch manual Wi-Fi Settings, Enterprise Settings

Page 23

ÂMaximum passcode age (in days): Requires users to change their passcode at the interval you specify.

ÂPasscode lock (in minutes): If the device isn’t used for this period of time, it automatically locks. Entering the passcode unlocks it.

Wi-Fi Settings

Use this pane to set how the device connects to your wireless network. You can add multiple network configurations by clicking the Add (+) button.

These settings must be specified, and must match the requirements of your network, in order for the user to initiate a connection.

ÂService Set Identifier: Enter the SSID of the wireless network to connect to.

ÂHidden Network: Specifies whether the network is broadcasting its identity.

ÂSecurity Type: Select an authentication method for the network. The following choices are available for both Personal and Enterprise networks.

ÂNone: The network doesn’t use authentication.

ÂWEP: The network uses WEP authentication only.

ÂWPA/WPA 2: The network uses WPA authentication only.

ÂAny: The device uses either WEP or WPA authentication when connecting to the network, but won’t connect to non-authenticated networks.

Enterprise Settings

In this section of the Wi-Fi pane, you specify settings for connecting to enterprise networks. This section of the pane appears only if you choose an Enterprise setting in the Security Type pop-up menu.

In the Protocols tab, you specify which EAP methods to use for authentication and configure the EAP-FAST Protected Access Credential settings.

In the Authentication tab, you specify sign-in settings such as user name and authentication protocols. If you’ve installed an identity certificate using the Credentials tab, you can choose it using the Identity Certificate pop-up menu.

In the Trust tab, you specify which certificates should be regarded as trusted for the purpose of validating the authentication server for the Wi-Fi connection. The Trusted Certificates list displays certificates that have been added using the Credentials tab, and lets you select which certificates should be regarded as trusted. Add the names of the authentication servers to be trusted to the Trusted Server Certificates Names list. You can specify a particular server, such as server.mycompany.com or a partial name such as *.mycompany.com.

The Allow Trust Exceptions options lets users decide to trust a server when the chain of trust can’t be established. To avoid these prompts, and to permit connections only to trusted services, turn off this option and embed all necessary certificates in a profile.

Chapter 2 Creating and Deploying Configuration Profiles

23

Image 23
Contents IPhone and iPod touch Enterprise Deployment Guide Page Contents Appendix B Appendix aMac OS X computers System RequirementsIPhone and iPod touch ITunesWindows computers IPhone Configuration UtilityMicrosoft Exchange ActiveSync Supported Exchange ActiveSync PoliciesMicrosoft Exchange Global Address List Remote WipeMicrosoft Direct Push Microsoft Exchange AutodiscoveryNetwork Security Exchange ActiveSync Features Not SupportedAdditional Resources CertificatesEmail accounts Activating Devices Deploying iPhone and iPod touchMicrosoft Exchange Preparing Access to Network Services and Enterprise DataExchange Account Setup WPA/WPA2 Enterprise Wi-Fi NetworksNetwork Configuration Virtual Private Networks WPA/WPA2 Enterprise Network ConfigurationVPN Setup Guidelines Enterprise Applications Imap Network Setup GuidelinesDetermining Device Passcode Policies Imap EmailOther Resources Configuring DevicesIPhone Configuration Utility for Mac OS About iPhone Configuration UtilityCreating and Deploying Configuration Profiles Accessing iPhone Configuration Utility for Web IPhone Configuration Utility for the WebInstalling on Mac OS Installing on Windows XP and Windows VistaStarting or Restarting iPhone Configuration Utility Web To restart the utility on Windows Creating Configuration ProfilesGeneral Settings Passcode Settings Enterprise Settings Wi-Fi SettingsExchange Settings VPN SettingsEmail Settings Advanced Settings Editing Configuration ProfilesCredentials Settings Mac OS X Server Preparing Configuration Profiles for DeploymentDistributing Configuration Profiles by Email Distributing Configuration Profiles on the WebIIS Web Server Installing Configuration ProfilesRemoving and Updating Configuration Profiles VPN Settings Manually Configuring DevicesField Description Cisco IPSec SettingsPptp Settings L2TP Settings Wi-Fi Settings Format domain\username Exchange SettingsManually Configuring Devices Installing Identities and Root Certificates Additional Mail Accounts Installing on Windows using iTunesSetup.exe Installing iTunesInstalling iTunes on Windows Computers Silently Installing on Windows Setting iTunes RestrictionsInstalling iTunes on Macintosh Computers Setting iTunes Restrictions for Windows Setting iTunes Restrictions for Mac OSUpdating iTunes and iPhone Software Manually To update iPhone software, follow these stepsRegister for Application Development Deploying iPhone ApplicationsWindows XP Installing Provisioning Profiles using iTunesMac OS Windows Vista Installing Applications using iTunesUsing Enterprise Applications Authentication Groups ACisco VPN Server ConfigurationIPSec Settings IPhone and iPod touch support the following Other Supported FeaturesAppendix Root LevelPayload Content Number of allowed failed attempts to enter the passcode at Passcode Policy PayloadEmail Payload Exchange Payload APN PayloadPPP Dictionary Keys VPN PayloadIPSec Dictionary Keys Wi-Fi PayloadEncryptionType EAPClientConfiguration DictionaryFast EAP-Fast SupportCertificates Proxy settings

iPod and iPod Touch specifications

The Apple iPod, first released in 2001, revolutionized the way we listen to music. This portable media player, with its sleek design and user-friendly interface, quickly garnered a dedicated following. The original iPod featured a mechanical scroll wheel and a minimalist aesthetic, allowing users to carry their music libraries wherever they went. It was a game changer in the digital music landscape, encouraging both casual listeners and audiophiles to embrace the concept of portability.

As technology evolved, so did the iPod. The introduction of the iPod Mini in 2004 marked a transition to a smaller, more compact design. In 2005, Apple launched the iPod Nano, which showcased an even slimmer profile, vibrant color displays, and flash storage for improved resistance to shocks. The most significant evolution came with the introduction of the iPod Touch in 2007, which transformed the iPod into a more multifaceted device.

The iPod Touch brought a touchscreen interface, resembling the iPhone. It allowed users to access not only their music but also apps, games, and web browsing capabilities. The device was powered by Apple's iOS, featuring a robust App Store that offered thousands of applications, from productivity tools to entertainment options. With Wi-Fi connectivity, the iPod Touch enabled users to stream music and videos, browse the internet, and utilize apps without being tethered to a computer.

In terms of audio quality, iPods have consistently featured high-performance DACs and audio processors, capable of delivering excellent sound reproduction. With support for various audio formats, including AAC, MP3, and Apple Lossless, users could enjoy their music without compromise. The integration of iTunes provided a seamless ecosystem for purchasing, organizing, and syncing music.

Throughout its iterations, the design of the iPod Touch has also evolved. The latest generations sport a sleek aluminum casing, Retina displays, and advanced camera systems. Features such as FaceTime, iMessage, and Apple Music integration have positioned the iPod Touch as a versatile device, appealing not only to music lovers but to a broader audience seeking a portable multimedia experience.

Ultimately, while the rise of smartphones may have overshadowed the iPod, its impact on the music industry and digital media consumption remains undeniable. The legacy of the iPod and iPod Touch is characterized by innovation, portability, and a continuous quest to enhance how we experience music and entertainment in our daily lives.