1
10
1Deploying iPhone and iPod touch
This chapter provides an overview of how to deploy iPhone and iPod touch in your enterprise.
iPhone and iPod touch are designed to easily integrate with your enterprise systems
including Microsoft Exchange 2003 and 2007, 802.1X-based secure wireless networks,
and Cisco IPSec virtual private networks. As with any enterprise solution, good
planning and an understanding of your deployment options make deployment easier
and more efficient for you and your users.
When planning your deployment of iPhone and iPod touch consider the following:
ÂHow will your company’s iPhones be activated for wireless cellular service?
ÂWhich enterprise network services, applications and data will your users need to
access?
ÂWhat policies do you want to set on the devices to protect sensitive company data?
ÂDo you want to manually configure devices individually, or use a streamlined process
for configuring a large fleet?
The specifics of your enterprise environment, IT policies, wireless carrier, and your
computing and communication requirements affect how you tailor your deployment
strategy.
Activating Devices
Each iPhone must be activated with your wireless carrier before it can be used to make
and receive calls, send text messages or connect to the cellular data network. Contact
your carrier for voice and data tariffs and activation instructions for consumer and
business customers.
You or your user will need to install a SIM card in the iPhone. After the SIM card is
installed, iPhone must be connected to a computer with iTunes to complete the
activation process. If the SIM card is already active, iPhone will be unlocked and ready
for immediate use; otherwise, iTunes will walk you through the process of activating a
new line of service.