Apple Manuel VoiceOver Getting Started Includes instructions and complete command lists for using VoiceOver with Mac OS X version 10.4 Tiger Apple sur Fnac.com - Pour voir la liste complète des manuels APPLE, cliquez ici

 

 

TELECHARGER LE PDF sur : http://images.apple.com/accessibility/voiceover/pdf/VO_GettingStarted.pdf Commander un produit Apple sur Fnac.com

 

 

Voir également d'autres Guides APPLE :

Apple-Server_Administration_v10.5.pdf-Manuel

Apple-ipod_classic_features_guide.pdf-Manuel

Apple-Lecteur-Optique-Manuel

Apple-Carte-AirPort-Manuel

Apple-iPhone_Finger_Tips_Guide.pdf-Anglais-Manuel

Apple-Couvercle-Manuel

Apple-battery.cube.pdf-Manuel

Apple-Boitier-de-l-ordinateur-Manuel

Apple-Pile-Interne-Manuel

Apple-atacable.pdf-Manuel

Apple-videocard.pdf-Manuel

Apple-Guide_de_configuration_de_l_Airport_Express_5.1.pdf-Manuel

Apple-iMac_Mid2010_UG_F.pdf-Manuel

Apple-MacBook_13inch_Mid2009_F.pdf-Manuel

Apple-MacBook_Mid2007_UserGuide.F.pdf-Manuel

Apple-Designing_AirPort_Networks_10.5-Windows_F.pdf-Manuel

Apple-Administration_de_QuickTime_Streaming_et_Broadcasting_10.5.pdf-Manuel

Apple-Opstillingsvejledning_til_TimeCapsule.pdf-Danemark-Manuel

Apple-iPod_nano_5th_gen_Benutzerhandbuch.pdf-Manuel

Apple-iOS_Business.pdf-Manuel

Apple-AirPort_Extreme_Installationshandbuch.pdf-Manuel

Apple-Final_Cut_Express_4_Installation_de_votre_logiciel.pdf-Manuel

Apple-MacBook_Pro_15inch_2.53GHz_Mid2009.pdf-Manuel

Apple-Network_Services.pdf-Manuel

Apple-Aperture_Performing_Adjustments_f.pdf-Manuel

Apple-Supplement_au_guide_Premiers_contacts.pdf-Manuel

Apple-Administration_des_images_systeme_et_de_la_mise_a_jour_de_logiciels_10.5.pdf-Manuel

Apple-Mac_OSX_Server_v10.6_Premiers_contacts.pdf-Francais-Manuel

Apple-Designing_AirPort_Networks_10.5-Windows_F.pdf-Manuel

Apple-Mise_a_niveau_et_migration_v10.5.pdf-Manue

Apple-MacBookPro_Late_2007_2.4_2.2GHz_F.pdf-Manuel

Apple-Mac_mini_Late2009_SL_Server_F.pdf-Manuel

Apple-Mac_OS_X_Server_10.5_Premiers_contacts.pdf-Manuel

Apple-iPod_touch_2.0_Guide_de_l_utilisateur_CA.pdf-Manuel

Apple-MacBook_Pro_17inch_Mid2010_F.pdf-Manuel

Apple-Comment_demarrer_Leopard.pdf-Manuel

Apple-iPod_2ndGen_USB_Power_Adapter-FR.pdf-Manuel

Apple-Feuille_de_operations_10.4.pdf-Manuel

Apple-Time_Capsule_Installationshandbuch.pdf-Allemand-Manuel

Apple-F034-2262AXerve-grappe.pdf-Manuel

Apple-Mac_Pro_Early2009_4707_UG_F

Apple-imacg5_17inch_Power_Supply

Apple-Logic_Studio_Installieren_Ihrer_Software_Retail

Apple-IntroductionXserve1.0.1

Apple-Aperture_Getting_Started_d.pdf-Allemand

Apple-getting_started_with_passbook

Apple-iPod_mini_2nd_Gen_UserGuide.pdf-Anglais

Apple-Deploiement-d-iPhone-et-d-iPad-Reseaux-prives-virtuels

Apple-F034-2262AXerve-grappe

Apple-Mac_OS_X_Server_Glossaire_10.5

Apple-FRLogic_Pro_7_Guide_TDM

Apple-iphone_bluetooth_headset_userguide

Apple-Administration_des_services_reseau_10.5

Apple-imacg5_17inch_harddrive

Apple-iPod_nano_4th_gen_Manuale_utente

Apple-iBook-G4-Getting-Started

Apple-XsanGettingStarted

Apple-Mac_mini_UG-Early2006

Apple-Guide_des_fonctionnalites_de_l_iPod_classic

Apple-Guide_de_configuration_d_Xsan_2

Apple-MacBook_Late2006_UsersGuide

Apple-sur-Fnac.com

Apple-Mac_mini_Mid2010_User_Guide_F.pdf-Francais

Apple-PowerBookG3UserManual.PDF.Anglais

Apple-Installation_de_votre_logiciel_Logic_Studio_Retail

Apple-Pages-Guide-de-l-utilisateur

Apple-MacBook_Pro_13inch_Mid2009.pdf.Anglais

Apple-MacBook_Pro_15inch_Mid2009

Apple-Installation_de_votre_logiciel_Logic_Studio_Upgrade

Apple-FRLogic_Pro_7_Guide_TDM

Apple-airportextreme_802.11n_userguide

Apple-iPod_shuffle_3rdGen_UG

Apple-iPod_classic_160GB_User_Guide

Apple-iPod_nano_5th_gen_UserGuide

Apple-ipod_touch_features_guide

Apple-Wireless_Mighty_Mouse_UG

Apple-Advanced-Memory-Management-Programming-Guide

Apple-iOS-App-Programming-Guide

Apple-Concurrency-Programming-Guide

Apple-MainStage-2-User-Manual-Anglais

Apple-iMacG3_2002MultilingualUserGuide

Apple-iBookG3_DualUSBUserGuideMultilingual.PDF.Anglais

Apple-imacG5_20inch_AirPort

Apple-Guide_de_l_utilisateur_de_Mac_Pro_Early_2008

Apple-Installation_de_votre_logiciel_Logic_Express_8

Apple-iMac_Guide_de_l_utilisateur_Mid2007

Apple-imacg5_20inch_OpticalDrive

Apple-FCP6_Formats_de_diffusion_et_formats_HD

Apple-prise_en_charge_des_surfaces_de_controle_logic_pro_8

Apple-Aperture_Quick_Reference_f

Apple-Shake_4_User_Manual

Apple-aluminumAppleKeyboard_wireless2007_UserGuide

Apple-ipod_shuffle_features_guide

Apple-Color-User-Manual

Apple-XsanGettingStarted

Apple-Migration_10.4_2e_Ed

Apple-MacBook_Air_SuperDrive

Apple-MacBook_Late2007-f

ApplePowerMacG5_(Early_2005)_UserGuide

Apple-iSightUserGuide

Apple-MacBook_Pro_Early_2008_Guide_de_l_utilisateur

Apple-Nouvelles-fonctionnalites-aperture-1.5

Apple-premiers_contacts_2e_ed_10.4.pdf-Mac-OS-X-Server

Apple-premiers_contacts_2e_ed_10.4

Apple-eMac_2005UserGuide

Apple-imacg5_20inch_Inverter

Apple-Keynote2_UserGuide.pdf-Japon

Apple-Welcome_to_Tiger.pdf-Japon

Apple-XsanAdminGuide_j.pdf-Japon

Apple-PowerBookG4_UG_15GE.PDF-Japon

Apple-Xsan_Migration.pdf-Japon

Apple-Xserve_Intel_DIY_TopCover_JA.pdf-Japon

Apple-iPod_nano_6thgen_User_Guide_J.pdf-Japon

Apple-Aperture_Photography_Fundamentals.pdf-Japon

Apple-nikeipod_users_guide.pdf-Japon

Apple-QuickTime71_UsersGuide.pdf-Japon

Apple-iMacG5_iSight_UG.pdf-Japon

Apple-Aperture_Performing_Adjustments_j.pdf-Japon

Apple-iMacG5_17inch_HardDrive.pdf-Japon

Apple-iPod_shuffle_Features_Guide_J.pdf-Japon

Apple-MacBook_Air_User_Guide.pdf-Japon

Apple-MacBook_UsersGuide.pdf-Japon

Apple-iPad_iOS4_Brukerhandbok.pdf-Norge-Norvege

Apple-Apple_AirPort_Networks_Early2009_H.pd-Norge-Norvege

Apple-iPod_classic_120GB_no.pdf-Norge-Norvege

Apple-StoreKitGuide.pdf-Japon

Apple-Xserve_Intel_DIY_ExpansionCardRiser_JA.pdf-Japon

Apple-iMacG5_Battery.pdf-Japon

Apple-Logic_Pro_8_Getting_Started.pdf-Japon

Apple-PowerBook-handbok-Norge-Norveg

Apple-iWork09_formler_og_funksjoner.pdf-Norge-Norvege

Apple-MacBook_Pro_15inch_Mid2010_H.pdf-Norge-Norvege

Apple-MacPro_HardDrive_DIY.pdf-Japon

Apple-iPod_Fifth_Gen_Funksjonsoversikt.pdf-Norge-Norvege

Apple-MacBook_13inch_white_Early2009_H.pdf-Norge-Norvege

Apple-GarageBand_09_Komme_i_gang.pdf-Norge-Norvege

Apple-MacBook_Pro_15inch_Mid2009_H.pdf-Norge-Norvege

Apple-imac_mid2011_ug_h.pdf-Norge-Norvege

Apple-iDVD_08_Komme_i_gang.pdf-Norge-Norvege

Apple-MacBook_Air_11inch_Late2010_UG_H.pdf-Norge-Norvege

Apple-iMac_Mid2010_UG_H.pdf-Norge-Norvege

Apple-MacBook_13inch_Mid2009_H.pdf-Norge-Norvege

/Apple-iPhone_3G_Viktig_produktinformasjon_H-Norge-Norvege

Apple-MacBook_13inch_Mid2010_UG_H.pdf-Norge-Norvege

Apple-macbook_air_13inch_mid2011_ug_no.pdf-Norge-Norvege

Apple-Mac_mini_Early2009_UG_H.pdf-Norge-Norvege

Apple-ipad2_brukerhandbok.pdf-Norge-Norvege

Apple-iPhoto_08_Komme_i_gang.pdf-Norge-Norvege

Apple-MacBook_Air_Brukerhandbok_Late2008.pdf-Norge-Norvege

Apple-Pages09_Brukerhandbok.pdf-Norge-Norvege

Apple-MacBook_13inch_Late2009_UG_H.pdf-Norge-Norvege

Apple-iPhone_3GS_Viktig_produktinformasjon.pdf-Norge-Norvege

Apple-MacBook_13inch_Aluminum_Late2008_H.pdf-Norge-Norvege

Apple-Wireless_Keyboard_Aluminum_2007_H-Norge-Norvege

Apple-NiPod_photo_Brukerhandbok_N0190269.pdf-Norge-Norvege

Apple-MacBook_Pro_13inch_Mid2010_H.pdf-Norge-Norvege

Apple-MacBook_Pro_17inch_Mid2010_H.pdf-Norge-Norvege

Apple-Velkommen_til_Snow_Leopard.pdf-Norge-Norvege.htm

Apple-TimeCapsule_Klargjoringsoversikt.pdf-Norge-Norvege

Apple-iPhone_3GS_Hurtigstart.pdf-Norge-Norvege

Apple-Snow_Leopard_Installeringsinstruksjoner.pdf-Norge-Norvege

Apple-iMacG5_iSight_UG.pdf-Norge-Norvege

Apple-iPod_Handbok_S0342141.pdf-Norge-Norvege

Apple-ipad_brukerhandbok.pdf-Norge-Norvege

Apple-GE_Money_Bank_Handlekonto.pdf-Norge-Norvege

Apple-MacBook_Air_11inch_Late2010_UG_H.pdf-Norge-Norvege

Apple-iPod_nano_6thgen_Brukerhandbok.pdf-Norge-Norvege

Apple-iPod_touch_iOS4_Brukerhandbok.pdf-Norge-Norvege

Apple-MacBook_Air_13inch_Late2010_UG_H.pdf-Norge-Norvege

Apple-MacBook_Pro_15inch_Early2011_H.pdf-Norge-Norvege

Apple-Numbers09_Brukerhandbok.pdf-Norge-Norvege

Apple-Welcome_to_Leopard.pdf-Japon

Apple-PowerMacG5_UserGuide.pdf-Norge-Norvege

Apple-iPod_touch_2.1_Brukerhandbok.pdf-Norge-Norvege

Apple-Boot_Camp_Installering-klargjoring.pdf-Norge-Norvege

Apple-MacOSX10.3_Welcome.pdf-Norge-Norvege

Apple-iPod_shuffle_3rdGen_UG_H.pdf-Norge-Norvege

Apple-iPhone_4_Viktig_produktinformasjon.pdf-Norge-Norvege

Apple_TV_Klargjoringsoversikt.pdf-Norge-Norvege

Apple-iMovie_08_Komme_i_gang.pdf-Norge-Norvege

Apple-iPod_classic_160GB_Brukerhandbok.pdf-Norge-Norvege

Apple-Boot_Camp_Installering_10.6.pdf-Norge-Norvege

Apple-Network-Services-Location-Manager-Veiledning-for-nettverksadministratorer-Norge-Norvege

Apple-iOS_Business_Mar12_FR.pdf

Apple-PCIDualAttachedFDDICard.pdf

Apple-Aperture_Installing_Your_Software_f.pdf

Apple-User_Management_Admin_v10.4.pdf

Apple-Compressor-4-ユーザーズマニュアル Japon

Apple-Network_Services_v10.4.pdf

Apple-iPod_2ndGen_USB_Power_Adapter-DE

Apple-Mail_Service_v10.4.pdf

Apple-AirPort_Express_Opstillingsvejledning_5.1.pdf

Apple-MagSafe_Airline_Adapter.pdf

Apple-L-Apple-Multiple-Scan-20-Display

Apple-Administration_du_service_de_messagerie_10.5.pdf

Apple-System_Image_Admin.pdf

Apple-iMac_Intel-based_Late2006.pdf-Japon

Apple-iPhone_3GS_Finger_Tips_J.pdf-Japon

Apple-Power-Mac-G4-Mirrored-Drive-Doors-Japon

Apple-AirMac-カード取り付け手順-Japon

Apple-iPhone開発ガイド-Japon

Apple-atadrive_pmg4mdd.j.pdf-Japon

Apple-iPod_touch_2.2_User_Guide_J.pdf-Japon

Apple-Mac_OS_X_Server_v10.2.pdf

Apple-AppleCare_Protection_Plan_for_Apple_TV.pdf

Apple_Component_AV_Cable.pdf

Apple-DVD_Studio_Pro_4_Installation_de_votre_logiciel

Apple-Windows_Services

Apple-Motion_3_New_Features_F

Apple-g4mdd-fw800-lowerfan

Apple-MacOSX10.3_Welcome

Apple-Print_Service

Apple-Xserve_Setup_Guide_F

Apple-PowerBookG4_17inch1.67GHzUG

Apple-iMac_Intel-based_Late2006

Apple-Installation_de_votre_logiciel

Apple-guide_des_fonctions_de_l_iPod_nano

Apple-Administration_de_serveur_v10.5

Apple-Mac-OS-X-Server-Premiers-contacts-Pour-la-version-10.3-ou-ulterieure

Apple-boot_camp_install-setup

Apple-iBookG3_14inchUserGuideMultilingual

Apple-mac_pro_server_mid2010_ug_f

Apple-Motion_Supplemental_Documentation

Apple-imac_mid2011_ug_f

Apple-iphone_guide_de_l_utilisateur

Apple-macbook_air_11inch_mid2011_ug_fr

Apple-NouvellesfonctionnalitesdeLogicExpress7.2

Apple-QT_Streaming_Server

Apple-Web_Technologies_Admin

Apple-Mac_Pro_Early2009_4707_UG

Apple-guide_de_l_utilisateur_de_Numbers08

Apple-Decouverte_d_Aperture_2

Apple-Guide_de_configuration_et_d'administration

Apple-mac_integration_basics_fr_106.

Apple-iPod_shuffle_4thgen_Guide_de_l_utilisateur

Apple-ARA_Japan

Apple-081811_APP_iPhone_Japanese_v5.4.pdf-Japan

Apple-Recycle_Contract120919.pdf-Japan

Apple-World_Travel_Adapter_Kit_UG

Apple-iPod_nano_6thgen_User_Guide

Apple-RemoteSupportJP

Apple-Mac_mini_Early2009_UG_F.pdf-Manuel-de-l-utilisateur

Apple-Compressor_3_Batch_Monitor_User_Manual_F.pdf-Manuel-de-l-utilisateur

Apple-Premiers__contacts_avec_iDVD_08

Apple-Mac_mini_Intel_User_Guide.pdf

Apple-Prise_en_charge_des_surfaces_de_controle_Logic_Express_8

Apple-mac_integration_basics_fr_107.pdf

Apple-Final-Cut-Pro-7-Niveau-1-Guide-de-preparation-a-l-examen

Apple-Logic9-examen-prep-fr.pdf-Logic-Pro-9-Niveau-1-Guide-de-preparation-a-l-examen

Apple-aperture_photography_fundamentals.pdf-Manuel-de-l-utilisateu

Apple-emac-memory.pdf-Manuel-de-l-utilisateur

Apple-Apple-Installation-et-configuration-de-votre-Power-Mac-G4

Apple-Guide_de_l_administrateur_d_Xsan_2.pdf

Apple-premiers_contacts_avec_imovie6.pdf

Apple-Tiger_Guide_Installation_et_de_configuration.pdf

Apple-Final-Cut-Pro-7-Level-One-Exam-Preparation-Guide-and-Practice-Exam

Apple-Open_Directory.pdf

Apple-Nike_+_iPod_User_guide

Apple-ard_admin_guide_2.2_fr.pdf

Apple-systemoverviewj.pdf-Japon

Apple-Xserve_TO_J070411.pdf-Japon

Apple-Mac_Pro_User_Guide.pdf

Apple-iMacG5_iSight_UG.pdf

Apple-premiers_contacts_avec_iwork_08.pdf

Apple-services_de_collaboration_2e_ed_10.4.pdf

Apple-iPhone_Bluetooth_Headset_Benutzerhandbuch.pdf

Apple-Guide_de_l_utilisateur_de_Keynote08.pdf

APPLE/Apple-Logic-Pro-9-Effectsrfr.pdf

Apple-Logic-Pro-9-Effectsrfr.pdf

Apple-iPod_shuffle_3rdGen_UG_F.pdf

Apple-iPod_classic_160Go_Guide_de_l_utilisateur.pdf

Apple-iBookG4GettingStarted.pdf

Apple-Administration_de_technologies_web_10.5.pdf

Apple-Compressor-4-User-Manual-fr

Apple-MainStage-User-Manual-fr.pdf

Apple-Logic_Pro_8.0_lbn_j.pdf

Apple-PowerBookG4_15inch1.67-1.5GHzUserGuide.pdf

Apple-MacBook_Pro_15inch_Mid2010_CH.pdf

Apple-LED_Cinema_Display_27-inch_UG.pdf

Apple-MacBook_Pro_15inch_Mid2009_RS.pdf

Apple-macbook_pro_13inch_early2011_f.pdf

Apple-iMac_Mid2010_UG_BR.pdf

Apple-iMac_Late2009_UG_J.pdf

Apple-iphone_user_guide-For-iOS-6-Software

Apple-iDVD5_Getting_Started.pdf

Apple-guide_des_fonctionnalites_de_l_ipod_touch.pdf

Apple_iPod_touch_User_Guide

Apple_macbook_pro_13inch_early2011_f

Apple_Guide_de_l_utilisateur_d_Utilitaire_RAID

Apple_Time_Capsule_Early2009_Setup_F

Apple_iphone_4s_finger_tips_guide_rs

Apple_iphone_upute_za_uporabu

Apple_ipad_user_guide_ta

Apple_iPod_touch_User_Guide

apple_earpods_user_guide

apple_iphone_gebruikershandleiding

apple_iphone_5_info

apple_iphone_brukerhandbok

apple_apple_tv_3rd_gen_setup_tw

apple_macbook_pro-retina-mid-2012-important_product_info_ch

apple_Macintosh-User-s-Guide-for-Macintosh-PowerBook-145

Apple_ipod_touch_user_guide_ta

Apple_TV_2nd_gen_Setup_Guide_h

Apple_ipod_touch_manual_del_usuario

Apple_iphone_4s_finger_tips_guide_tu

Apple_macbook_pro_retina_qs_th

Apple-Manuel_de_l'utilisateur_de_Final_Cut_Server

Apple-iMac_G5_de_lutilisateur

Apple-Cinema_Tools_4.0_User_Manual_F

Apple-Personal-LaserWriter300-User-s-Guide

Apple-QuickTake-100-User-s-Guide-for-Macintosh

Apple-User-s-Guide-Macintosh-LC-630-DOS-Compatible

Apple-iPhone_iOS3.1_User_Guide

Apple-iphone_4s_important_product_information_guide

Apple-iPod_shuffle_Features_Guide_F

Liste-documentation-apple

Apple-Premiers_contacts_avec_iMovie_08

Apple-macbook_pro-retina-mid-2012-important_product_info_br

Apple-macbook_pro-13-inch-mid-2012-important_product_info

Apple-macbook_air-11-inch_mid-2012-qs_br

Apple-Manuel_de_l_utilisateur_de_MainStage

Apple-Compressor_3_User_Manual_F

Apple-Color_1.0_User_Manual_F

Apple-guide_de_configuration_airport_express_4.2

Apple-TimeCapsule_SetupGuide

Apple-Instruments_et_effets_Logic_Express_8

Apple-Manuel_de_l_utilisateur_de_WaveBurner

Apple-Macmini_Guide_de_l'utilisateur

Apple-PowerMacG5_UserGuide

Disque dur, ATA parallèle Instructions de remplacement

Apple-final_cut_pro_x_logic_effects_ref_f

Apple-Leopard_Installationshandbok

Manuale Utente PowerBookG4

Apple-thunderbolt_display_getting_started_1e

Apple-Compressor-4-Benutzerhandbuch

Apple-macbook_air_11inch_mid2011_ug

Apple-macbook_air-mid-2012-important_product_info_j

Apple-iPod-nano-Guide-des-fonctionnalites

Apple-iPod-nano-Guide-des-fonctionnalites

Apple-iPod-nano-Guide-de-l-utilisateur-4eme-generation

Apple-iPod-nano-Guide-de-l-utilisateur-4eme-generation

Apple-Manuel_de_l_utilisateur_d_Utilitaire_de_reponse_d_impulsion

Apple-Aperture_2_Raccourcis_clavier

AppleTV_Setup-Guide

Apple-livetype_2_user_manual_f

Apple-imacG5_17inch_harddrive

Apple-macbook_air_guide_de_l_utilisateur

Apple-MacBook_Early_2008_Guide_de_l_utilisateur

Apple-Keynote-2-Guide-de-l-utilisateur

Apple-PowerBook-User-s-Guide-for-PowerBook-computers

Apple-Macintosh-Performa-User-s-Guide-5200CD-and-5300CD

Apple-Macintosh-Performa-User-s-Guide

Apple-Workgroup-Server-Guide

Apple-iPod-nano-Guide-des-fonctionnalites

Apple-iPad-User-Guide-For-iOS-5-1-Software

Apple-Boot-Camp-Guide-d-installation-et-de-configuration

Apple-iPod-nano-Guide-de-l-utilisateur-4eme-generation

Power Mac G5 Guide de l’utilisateur APPLE

Guide de l'utilisateur PAGE '08 APPLE

Guide de l'utilisateur KEYNOTE '09 APPLE

Guide de l'Utilisateur KEYNOTE '3 APPLE

Guide de l'Utilisateur UTILITAIRE RAID

Guide de l'Utilisateur Logic Studio

Power Mac G5 Guide de l’utilisateur APPLE

Guide de l'utilisateur PAGE '08 APPLE

Guide de l'utilisateur KEYNOTE '09 APPLE

Guide de l'Utilisateur KEYNOTE '3 APPLE

Guide de l'Utilisateur UTILITAIRE RAID

Guide de l'Utilisateur Logic Studio

Guide de l’utilisateur ipad Pour le logiciel iOS 5.1

PowerBook G4 Premiers Contacts APPLE

Guide de l'Utilisateur iphone pour le logiciel ios 5.1 APPLE

Guide de l’utilisateur ipad Pour le logiciel iOS 4,3

Guide de l’utilisateur iPod nano 5ème génération

Guide de l'utilisateur iPod Touch 2.2 APPLE

Guide de l’utilisateur QuickTime 7  Mac OS X 10.3.9 et ultérieur Windows XP et Windows 2000

Guide de l'utilisateur MacBook 13 pouces Mi 2010

Guide de l’utilisateur iPhone (Pour les logiciels iOS 4.2 et 4.3)

Guide-de-l-utilisateur-iPod-touch-pour-le-logiciel-ios-4-3-APPLE

Guide-de-l-utilisateur-iPad-2-pour-le-logiciel-ios-4-3-APPLE

Guide de déploiement en entreprise iPhone OS

Guide-de-l-administrateur-Apple-Remote-Desktop-3-1

Guide-de-l-utilisateur-Apple-Xserve-Diagnostics-Version-3X103

Guide-de-configuration-AirPort-Extreme-802.11n-5e-Generation

Guide-de-configuration-AirPort-Extreme-802-11n-5e-Generation

Guide-de-l-utilisateur-Capteur-Nike-iPod

Guide-de-l-utilisateur-iMac-21-5-pouces-et-27-pouces-mi-2011-APPLE

Guide-de-l-utilisateur-Apple-Qadministrator-4

Guide-d-installation-Apple-TV-3-eme-generation

User-Guide-iPad-For-ios-5-1-Software

VoiceOver Getting Started Includes instructions and complete command lists for using VoiceOver with Mac OS X version 10.4 Tiger.2 1 Contents Chapter 1 6 Introduction 6 About VoiceOver 7 What You Need to Get Started 7 Using This Document 8 Where to Find More Information 8 VoiceOver Quick Start 8 VoiceOver Help 8 VoiceOver Menu 8 Mac OS X Keyboard Shortcuts 9 Resources on the Internet 9 Teaching and Learning Tools 9 Darkening the Screen 9 VoiceOver Quick Start Application 9 VoiceOver Keyboard Commands Diagrams 10 About VoiceOver Accessibility Chapter 2 11 Introduction to Mac OS X 11 The Desktop 12 The Finder 12 Toolbar Buttons 12 Sidebar and View Browser 13 The Dock 13 The Menu Bar 14 Files and Folders 14 System Preferences 15 Spotlight Chapter 3 16 Keyboard Basics 16 Important Keys to Know 17 About Function Keys 18 Using Function Keys on Portable Computers 18 Using Home, End, Page Up, and Page Down on Portable Computers 18 Keyboard AccessibilityContents 3 18 Sticky Keys 19 Slow Keys 19 Key Repeat Rate 20 Keyboard Settings in VoiceOver Utility Chapter 4 22 VoiceOver Basics 22 Following Instructions 22 Turning On VoiceOver 23 Using VoiceOver in the Login Window 23 Pausing VoiceOver Speech 23 Controlling VoiceOver 24 Reading Window Contents 25 Reading Text 25 Changing Rate, Pitch, and Volume Temporarily 26 Interacting With Content Areas 27 Using Buttons and Controls 28 Learning More About an Item 28 Navigating Menus 29 Navigating Quickly in a Menu 29 Using Pop-up Menus 29 Using Contextual Menus 30 Understanding Duplicate Menu Items 30 Working With the VoiceOver Menu 31 Using the Commands Menu 32 Chapter 4 Exercises 32 Exercise 4.1: Moving the VoiceOver Cursor 32 Exercise 4.2: Interacting With a Content Area 32 Exercise 4.3: Navigating the Menu Bar 33 Exercise 4.4: Navigating in a Menu and Submenu 33 Exercise 4.5: Using the VoiceOver Menu Chapter 5 34 Using VoiceOver With Mac OS X 34 Using the Dock 35 Setting Dock Preferences 35 Working With Contextual Menus for Dock Items 35 Switching Between Applications and Windows 37 Navigating Finder Windows 38 Using Icon View 38 Using List View 39 Using Column View 40 Accessing Finder Window Buttons 40 Selecting Files and Folders 41 Copying and Moving Files4 Contents 42 The Item Chooser Menu 43 Interacting With Windows 43 Moving and Resizing Windows 43 Moving a Scroll Bar 44 Using Spotlight 44 Using the Spotlight Menu 45 Using the Spotlight Window 46 Changing the Sort Criteria 46 Chapter 5 Exercises 46 Exercise 5.1: Using the Dock 47 Exercise 5.2: Using the Item Chooser Menu 47 Exercise 5.3: Copying and Pasting a File Chapter 6 50 VoiceOver Utility and Preferences 50 Saving VoiceOver Settings 51 Setting the Amount of Spoken Detail 51 Adjusting Punctuation Settings 52 Adjusting Text Attribute Settings 52 Setting Navigation Options 53 Setting Website Navigation Options 53 Setting VoiceOver Cursor Options 54 Customizing Voices 54 Using Different Voices 55 Changing Rate, Pitch, and Volume 55 Setting Visual Options 56 Magnifying the VoiceOver Cursor 57 Using the Caption Panel 57 Moving and Resizing the Caption Panel 57 Changing the Caption Panel Font Size 58 Tiling Visuals 58 Hiding Visuals 59 Setting Text Pronunciation 59 Chapter 6 Exercises 59 Exercise 6.1: Using VoiceOver to Change Voice Settings 60 Exercise 6.2: Using VoiceOver to Change Rate, Pitch, and Volume 61 Exercise 6.3: Adjusting the Caption Panel 62 Exercise 6.4: Magnifying the VoiceOver Cursor and Tiling VoiceOver Visuals 62 Exercise 6.5: Adding Pronunciation to the VoiceOver Dictionary Chapter 7 64 Web Browsing and Email 64 Connecting to the Internet 66 Using Mac OS X Mail 66 The Mail ToolbarContents 5 66 Opening Collapsed Folders in the Mailboxes Outline 67 Reading Email 68 Addressing a Message 68 Using the Safari Web Browser 68 Navigating Websites With VoiceOver 69 Using the Link Chooser Menu 70 Navigating Website Images 70 Chapter 7 Exercises 70 Exercise 7.1: Opening and Reading an Email Message 71 Exercise 7.2: Using the Link Chooser Menu Chapter 8 72 Reading and Editing Text 72 Reading a Document 73 Working With Text 73 Locating the Insertion Point 73 Navigating in a Document 74 Bookmarking a Document 74 Cursor Tracking in Text Areas 74 Selecting Text 75 Hearing Text Attributes 75 Using TextEdit With VoiceOver 75 Checking Spelling in TextEdit 76 Changing Tab Stops in TextEdit 77 Chapter 8 Exercises 77 Exercise 8.1: Following the Insertion Point 77 Exercise 8.2: Cutting and Pasting Text 78 Exercise 8.3: Saving a Document Chapter 9 79 Advanced Navigation Skills 79 Full Keyboard Navigation and VoiceOver 79 Advanced Cursor Tracking 80 Using the Cursor Control Keys 81 Using the Mouse With VoiceOver 81 Mouse Settings in VoiceOver Utility 82 Making the Mouse Pointer More Visible 82 Using the Numeric Keypad to Control the Mouse 83 Quickly Navigating to Content Areas 83 Chapter 9 Exercises 83 Exercise 9.1: Using Command-Tab to Switch Applications 84 Exercise 9.2: Moving Cursors Independently Appendix 85 VoiceOver Commands1 6 1 Introduction Welcome to VoiceOver Getting Started. This document introduces you to VoiceOver and gets you started using your Mac in a new way. VoiceOver is an alternative way for users with visual or learning disabilities to use Mac OS X. It provides magnification options, keyboard control, and spoken English descriptions of what’s happening on the computer screen. VoiceOver reads aloud the contents of documents (and webpages) and provides a comprehensive audible description of the user’s workspace and activities taking place on the computer. It also includes a rich set of keyboard commands for navigating the Mac OS X interface and interacting with application and system controls. About VoiceOver VoiceOver is an integrated part of the Mac OS X operating system. If your computer has Mac OS X version 10.4 or later installed, VoiceOver is already installed and ready to use. Just turn on VoiceOver to begin using it. VoiceOver works in conjunction with full keyboard access, the standard Mac OS X keyboard navigation method. With full keyboard access, you can use the Tab key and arrow keys to move to controls and text fields in windows, and the Space bar to select or activate them. But when you use VoiceOver, you can do so much more. VoiceOver uses keyboard commands to navigate your computer screen, windows, documents, and websites. It reads aloud everything it encounters and lets you know when events occur on your screen, such as when dialogs, alert messages, and progress bars appear.Chapter 1 Introduction 7 What You Need to Get Started To use VoiceOver, you need:  A Macintosh computer with Mac OS X version 10.4 or later installed  An English language Apple keyboard  Built-in or external speakers or headphones A mouse and display are optional. If you don’t need a display or mouse, you can use VoiceOver without them. An Internet connection is highly recommended. Using This Document This document is a comprehensive guide to using VoiceOver. It is organized into 11 chapters with a VoiceOver commands appendix. You can read the chapters in any order you choose, but if you are new to Mac OS X and to VoiceOver, you will find that reading them in the order presented lets you build upon knowledge gained in previous chapters.  Chapter 1, “Introduction”: In this chapter, you learn what VoiceOver is, what you need to get started using it, and where to find more information about VoiceOver.  Chapter 2, “Introduction to Mac OS X”: In this chapter, you learn Mac OS X basics that will help you use VoiceOver effectively. It includes a description of the screen layout, windows, Finder, and System Preferences.  Chapter 3, “Keyboard Basics”: In this chapter, you learn which keys control VoiceOver. You also learn about keyboard practice and how to set preferences in Mac OS X and VoiceOver if you have difficulty using a keyboard.  Chapter 4, “VoiceOver Basics”: In this chapter, you learn the basics of controlling VoiceOver. Users who have never used VoiceOver will find out how to navigate, read text in windows and dialogs, and select controls and objects.  Chapter 5, “Using VoiceOver With Mac OS X”: In this chapter, you learn how to use VoiceOver to navigate windows and perform everyday tasks on your computer using VoiceOver.  Chapter 6, “VoiceOver Utility and Preferences”: In this chapter, you learn how to use VoiceOver Utility to customize VoiceOver for your needs.  Chapter 7, “Web Browsing and Email”: In this chapter, you learn how to set up your Internet connection and use Mail and Safari to get email and browse the Internet.  Chapter 8, “Reading and Editing Text”: In this chapter, you learn how to use VoiceOver to read and edit text and check spelling.8 Chapter 1 Introduction  Chapter 9, “Advanced Navigation Skills”: In this chapter, you learn how to use the keyboard, mouse, and VoiceOver cursor independently. You also learn how to use the mouse with VoiceOver, and about alternate ways to control the mouse.  Appendix , “VoiceOver Commands”: In this appendix, you learn all the commands you can use to control VoiceOver. Where to Find More Information You can use the resources and VoiceOver features described below to learn more about using VoiceOver. VoiceOver Quick Start When you turn on a new Macintosh computer for the first time, you hear music play as Setup Assistant starts up. If you wait a moment, you hear a spoken invitation to learn how to use VoiceOver to set up your computer. If you are new to VoiceOver, follow the prompts to start the VoiceOver Quick Start. You will learn how to navigate with VoiceOver and interact with buttons and controls. VoiceOver Help Your computer comes with a built-in help system for Mac OS X and all its applications. You can access these in the Help menu in the menu bar. VoiceOver Help contains pages to help you with specific tasks, complete lists of all the keyboard commands for VoiceOver, and an orientation to VoiceOver. When you open VoiceOver Help, you can look for pages by typing keywords or phrases in the text field or by looking in the index of help topics. You can open a complete list of all the VoiceOver commands from the VoiceOver Utility Help menu. VoiceOver Menu The VoiceOver menu contains all the VoiceOver commands you can apply to the item in the VoiceOver cursor. It acts as a quick reference guide as you work. When you use the VoiceOver command Control-Option-F7, the VoiceOver menu appears in the middle of the screen for sighted users. Non-sighted users can use VoiceOver navigation to read the menu and make selections. Mac OS X Keyboard Shortcuts You can find lists of keyboard shortcuts for Mac OS X and most applications in the built-in help system. Search for “shortcuts” or “keyboard shortcuts” or check the index if there is one. You can change or create keyboard shortcuts in the Keyboard & Mouse preference pane of System Preferences.Chapter 1 Introduction 9 Resources on the Internet The Apple website has several sections devoted to VoiceOver and accessibility. You can find additional learning materials and support information at these addresses:  www.apple.com/accessibility  www.apple.com/accessibility/voiceover  www.apple.com/support/tiger/voiceover  www.apple.com/education/accessibility/technology/voiceover.html In addition, you can find discussion groups on Apple’s website and other websites to help you connect with other VoiceOver users. Teaching and Learning Tools If you are teaching or collaborating with a VoiceOver user, you can turn on a caption panel that displays the text that VoiceOver is speaking. For more information about the caption panel and how to customize it, see “Setting Visual Options” on page 55. Darkening the Screen If you are a sighted user, you can use the screen curtain to simulate a non-sighted user’s experience. The screen curtain turns off all the visuals of the display, leaving a blank screen. This is a great way to learn how to use VoiceOver. To turn the screen curtain on and off: m Press Control-Option-Shift-F11. VoiceOver Quick Start Application The VoiceOver Quick Start is available as a separate application that you can use any time. Although it was designed to help users learn the basic commands necessary to set up a computer using VoiceOver, the VoiceOver Quick Start can also be used as a basic teaching tool. You can download the VoiceOver Quick Start from this Apple accessibility website: www.apple.com/accessibility/voiceover. VoiceOver Keyboard Commands Diagrams You can download and print keyboard diagrams that show the VoiceOver commands assigned to keys on a standard Apple English language keyboard. These diagrams are intended for use by sighted users who want a more visual way to learn the VoiceOver commands. You can download these diagrams from this Apple accessibility website: www.apple.com/accessibility/voiceover.10 Chapter 1 Introduction About VoiceOver Accessibility VoiceOver is a new technology in Mac OS X version 10.4 Tiger. You can use VoiceOver with TextEdit, Mail, and Safari to do word processing, send and receive email, and browse websites on the Internet. You can also use VoiceOver with some other applications. As developers begin to support the underlying accessibility frameworks provided in Mac OS X, more applications will become accessible with VoiceOver. Contact the manufacturers of your favorite applications to inquire about the accessibility of their products. Visit the Apple website to learn about new developments and resources, and check the Internet for discussion groups and user groups.2 11 2 Introduction to Mac OS X This chapter introduces you to basic information about Mac OS X. When you understand how your computer is organized and how to use the Finder and application windows, learning to use VoiceOver is much easier. In Chapter 5, “Using VoiceOver With Mac OS X,” you will learn how to use VoiceOver with Mac OS X to complete everyday tasks on your computer. You can find much more information about Mac OS X in Mac Help on your computer and on the Apple website. The Desktop The desktop is the working area of your computer that contains folders, files, and other items. When you connect to a server or connect an external hard disk or an iPod, an icon that represents it appears on the desktop. When you insert a CD or DVD into your computer’s optical drive, it also appears on the desktop. You can store files and folders directly on your desktop for quick access.12 Chapter 2 Introduction to Mac OS X The Finder The Finder keeps track of files and folders and manages the desktop. When you open a folder or other item on the desktop, a new Finder window like the one shown below automatically opens. Finder windows have a toolbar at the top and two sections below the toolbar called the sidebar and the view browser. Three colored buttons above the toolbar are used to close the window, send the window to the Dock, or change the window to its previous size. See “Accessing Finder Window Buttons” on page 40 to learn the standard Mac OS X keyboard shortcuts or menu commands to use these buttons. Toolbar Buttons You use the buttons in the toolbar to navigate, change the view, find items, and perform some actions.  Use the Back and Forward buttons on the left side of the toolbar to move back and forth between locations on your computer, just as you would in a web browser.  Use the three view buttons to choose the way you want to view the contents of your hard disk and folders. You can choose icon, list, or column view.  Use the Action pop-up menu to choose commands you can perform for the item selected. For example, in the Finder window, some choices in the Action menu are New Folder, Get Info, or Open. In other applications, you see different choices in the Action menu.  Use the search text field to type a word or phrase to locate an item. You can use the buttons below the search text field to focus the search to a particular location. You can choose Servers, Computer, Home, the current folder, or another location you specify. Sidebar and View Browser Below the toolbar, the Finder window is split into two sections. The left side is called the sidebar. At the top of the sidebar are icons that represent your hard disk, hard disk partitions if you have them, any mounted servers or volumes, and the network. Chapter 2 Introduction to Mac OS X 13 Below a separator are icons that represent often used folders on your hard disk. Mac OS X has folders already set up for you to store your music, pictures, movies, and documents. In the sidebar, you also see folders for the desktop contents, your home folder, and applications. When a folder is selected in the sidebar, its contents are displayed on the right side of the Finder window in the view browser. Finder windows can display items in the view browser in icon, list, or column view. The Dock The Dock is a customizable list of items that provides quick access to applications and documents you use often. It appears as a row or column of icons on the screen. You can position the Dock along the bottom, left, or right edge of the screen. When an application is open, its icon appears temporarily in the Dock. When you minimize a window, it disappears from the desktop and appears as an icon on the right side of the Dock. Each item in the Dock has a contextual menu that gives you quick access to commands for that item. The contextual menu also contains the commands “Remove from Dock” for icons that have been placed there permanently, and “Keep in Dock” for applications that are open but whose icons are only there temporarily. The Menu Bar Mac OS X has a menu bar permanently located at the top of the screen. The menu bar contains a collection of menus for the application that is currently active. When you switch applications, the menus in the menu bar change to reflect the active application. Most applications include File, Edit, Format, Window, and Help menus. The Apple menu, located at the far left of the menu bar, is the same in every application. It contains system commands and preferences. The right side of the menu bar contains status menus. Status menus display information and provide shortcuts to system and application settings that you may frequently change. Common status menus include the volume slider, clock, and battery level indicator. You can show or hide individual status menus in System Preferences and other applications. At the far right side of the menu bar is the Spotlight menu. You can use Spotlight, the advanced search technology built in to Mac OS X, to search your entire system for information contained in files, emails, contacts, images, calendars, and applications. For more information about Spotlight, see “Spotlight” on page 15.14 Chapter 2 Introduction to Mac OS X Files and Folders Most of the information in your computer is stored in files. Files include documents, images, applications, and so on. Folders are simply a collection of files. Each file or folder is represented by an icon with its name below or to the right of the icon. You can select the text in the file’s name to change it, and you can copy, move, and delete files on your computer. Your computer comes with some folders already set up, but you can create and delete your own folders to organize your information. Most folders and files you create are stored in a home folder with your user account name. If you have multiple user accounts on your computer, each user account has its own home folder. You click once on a file or folder icon to select it and twice to open it. Clicking twice quickly is called a “double-click.” If you double-click an application icon, you start the application and a window for the application opens. If you double-click a file created by an application, you automatically open the application (if it wasn’t open already) and open the file. For example, if you double-click a TextEdit file on the desktop, TextEdit starts up and its icon appears in the Dock. At the same time, the document opens on the desktop. If you can’t use a mouse to select and click, you can use VoiceOver commands instead. System Preferences System Preferences is a Mac OS X utility that you use to customize your computer and choose essential settings such as your network configuration and Internet access. System Preferences is located in the Apple menu and has an icon in the Dock. You can find settings to improve accessibility in these preferences:  Displays preferences  Keyboard & Mouse preferences  Speech preferences  Universal Access preferences The easiest way to learn about the many options in System Preferences is to explore the different preference panes. Some preferences have multiple panes you access by clicking the tab buttons. Network preferences even has an Assistant button to help you troubleshoot connection problems.Chapter 2 Introduction to Mac OS X 15 Spotlight Spotlight is extraordinarily useful for VoiceOver users. In many cases, it may be easier to use than the Finder for opening files, folders, and applications. When you type text in the Spotlight search text field, search results appear immediately in a menu below the search text field. The more complete the word or phrase, the more refined your list of results will be. Search results are grouped by category, such as Applications, System Preferences, Documents, and Folders. You click an item in the list to open it. If you don’t find the item you want, you can search again or click Show All at the top of the results list. Clicking Show All displays a more complete list of results in a new window called the Spotlight window. Spotlight search results include all the metadata inside files, including the kind of content, the author, edit history, format, size, and many more details. Depending on the search word you type, you may find thousands of results. Spotlight narrows its results to show you the best matches, but you can also browse the entire list if you want. You can use Spotlight to find just about anything, anywhere, on your computer with lightning speed. You don’t have to remember folder hierarchies or carefully store project files in meaningful folders. You can find more information about Spotlight in Mac Help on your computer or on the Apple website at www.apple.com/macosx. See “Using Spotlight” on page 44 for information about using Spotlight with VoiceOver.3 16 3 Keyboard Basics This chapter provides basic information about using VoiceOver with the Apple keyboard. You use your keyboard to control VoiceOver, so you need to be very familiar with your keyboard before you can use VoiceOver effectively. If you are new to the Mac or have trouble using a keyboard, you’ll find important information in this chapter. If you use a portable computer, make sure you review the section in this chapter about function keys. Important Keys to Know You should be very familiar with the location of all the keys on your keyboard before you begin using VoiceOver. In addition to the letters and punctuation characters, you should know the location of these keys:  Control  Option  Command  Return  Escape  Home  End  Page Up  Page Down  Up, Down, Right, and Left arrows  Function keys (F1 through F11)Chapter 3 Keyboard Basics 17 If you’re not familiar with the layout of keys on your keyboard, you can use the keyboard practice built in to VoiceOver to help you learn the name and location of the keys. In the keyboard practice, you press keys to hear their names. Using keyboard practice: 1 Press Command-F5 to turn on VoiceOver. The Command keys are located directly to the left and right of the Space bar. You can press either one. The F5 key is in the top row of keys, sixth from the left. 2 Press Control-Option-K to begin keyboard practice The Control and Option keys are the first two keys on the left of the bottom row. On a portable keyboard, the Fn key comes first, then Control and Option. 3 Press keys to hear their names. Press the Shift key to hear the shifted characters on punctuation keys. 4 Press the Escape key to end keyboard practice The Escape key is on the top-left corner of the keyboard. While you’re using keyboard practice, you can’t use your computer or keyboard for any other tasks. You must press the Escape key to return your keyboard to its regular use. About Function Keys In VoiceOver, you use the function keys at the top of the keyboard to perform many important actions. The function keys are labeled F1–F12 on some keyboards, and some keyboards have function keys up to F16. You also use the function keys to perform actions and commands in many other software applications. To use a function key or other VoiceOver command keys for another software application when VoiceOver is on, press Control-Option-Tab and then press the function key. This command lets VoiceOver know that the next key combination is for another application. e s c F 1 F 2 F 3 F 4 F 5 F 6 F 7 F 8 F 9 F 1 0 F 1 1 F 1 2 F 1 318 Chapter 3 Keyboard Basics Using Function Keys on Portable Computers On a portable computer, many of the function keys are programmed to perform hardware-related functions such as adjusting brightness and volume. When you want to perform an alternate action for the key, you press the Fn key and the function key together. For example, in VoiceOver you press the following key combination to open VoiceOver Utility: Control-Option-F8 If you use a portable computer, you must press the function key with the command Fn-Control-Option-F8 If you use VoiceOver all the time or very frequently, you can change the default behavior of the function keys so that they perform software actions. Then the portable keyboard behaves like a standard keyboard, and you press the Fn key only to change the volume or change any of the other hardware settings. To change the default behavior of the function keys: 1 Click the System Preferences icon in the Dock or choose Apple menu > System Preferences to open System Preferences. 2 Click the Keyboard & Mouse button. 3 Click the Keyboard tab. 4 Select the checkbox labeled “Use the F1-F12 keys to control software features.” When this checkbox is selected, you press the Fn key when you want to use the hardware function of the key, such as adjusting volume. When you use the keys for VoiceOver commands, you don’t need to press the Fn key with the VoiceOver commands that use function keys. Using Home, End, Page Up, and Page Down on Portable Computers A standard keyboard has dedicated keys for Home, End, Page Up, and Page Down. These are important VoiceOver navigation keys. On a portable computer, you use the arrow keys with the Fn key for these functions. Keyboard Accessibility If you are able to use a keyboard but find it difficult, some other features included in Mac OS X may help you use your keyboard more effectively with VoiceOver. Sticky Keys The Sticky Keys feature treats a series of modifier key presses as a single key combination. For example, you can press Control, and then Option, and your keyboard interprets that combination as Control-Option held down together.Chapter 3 Keyboard Basics 19 To turn on Sticky Keys: 1 Click the System Preferences icon in the Dock or choose Apple menu > System Preferences to open System Preferences. 2 Click the Universal Access button. 3 Click the Keyboard tab. 4 Select the On radio button for Sticky Keys. When you turn on Sticky Keys, you can also set options to hear a sound when a modifier key you press is accepted, and display an icon of the symbol for the modifier keys you pressed. Checkboxes for these options are below the Sticky Keys On and Off radio buttons. Slow Keys With the Slow Keys feature you can control the amount of time between when a key is pressed and when it is accepted by the keyboard. If you frequently press keys accidentally, you may want a longer delay. To turn on Slow Keys: 1 Click the System Preferences icon in the Dock or choose Apple menu > System Preferences to open System Preferences. 2 Click the Universal Access button. 3 Click the Keyboard tab. 4 Select the On radio button for Slow Keys. 5 Move the Acceptance Delay slider to the left for a longer delay and to the right for a shorter delay. You can also hear audible feedback when you press keys. You hear one sound when a key is pressed and a different sound when the key is accepted. This is a very good way to monitor what’s happening if you can’t see the screen. Select the checkbox labeled “Use click key sounds” under the Slow Keys On and Off buttons to turn this on. Key Repeat Rate If you find that keys register more than once when you press them, you can adjust the key repeat rate. The key repeat rate and key repeat delay let you control how fast keys repeat and adjust how much time the keyboard will wait before it begins to repeat a key press. If you have trouble releasing keys fast enough, you can set the delay very long or turn off the repeat. To adjust the key repeat rate: 1 Click the System Preferences icon in the Dock or choose Apple menu > System Preferences to open System Preferences. 2 Click the Keyboard & Mouse button.20 Chapter 3 Keyboard Basics 3 Click the Keyboard tab. 4 Move the Key Repeat Rate slider to the left if you want repeated keys to repeat slowly (if you tend to make mistakes when pressing keys, moving this slider to a slow setting will help minimize the number of repeated keystrokes). Move the slider to the right if you want the keys to repeat at a faster pace. 5 Move the Delay Until Repeat slider to the left to cause a longer delay between when you hold down the key and when the key begins to repeat. You can move the Delay Until Repeat slider all the way to the left to turn off key repeating completely. Keyboard Settings in VoiceOver Utility You use the VoiceOver Utility application to customize VoiceOver settings. The Verbosity pane of VoiceOver Utility shown below includes some settings to help you use your keyboard. Typing Echo As you type, VoiceOver can speak what you typed. If you are not a confident typist, or if you just want to hear confirmation, you may want to use the typing echo. VoiceOver is set to echo each character as you type it. You can change the setting in the “While typing speak” pop-up menu to one of these:  None: VoiceOver doesn’t speak what you type.  Every Character: VoiceOver speaks each character as you type it. This is the default setting for VoiceOver.  Every Word: VoiceOver speaks the word you type as soon as you press the Space bar, a punctuation key, or the Return key. This tells VoiceOver that the word is complete.Chapter 3 Keyboard Basics 21 Key Press Notification The “Announce when a modifier key is pressed” checkbox sets VoiceOver to say the name of the modifier key when you press it. VoiceOver speaks these keys:  Shift  Control  Option  Command  Fn Turning on this option may help you become accustomed to the location of modifier keys on your keyboard, and it may help prevent you from making mistakes. Caps Lock Key Notification If the Caps Lock key is pressed, you’ll be unable to use many VoiceOver commands. Select the “Announce when the caps lock key is pressed” checkbox to hear VoiceOver announce when this key is pressed. To open VoiceOver Utility when VoiceOver is turned off: 1 Click the System Preferences icon in the Dock or choose Apple menu > System Preferences to open System Preferences. 2 Click the Universal Access button. 3 Click the Seeing tab. 4 Click the Open VoiceOver Utility button. When VoiceOver is turned on, you can open VoiceOver Utility with the VoiceOver command Control-Option-F8. You will find more information about other VoiceOver Utility settings in later chapters.4 22 4 VoiceOver Basics This chapter provides basic information about using VoiceOver to navigate your computer, click buttons, make selections in menus, and perform other basic tasks. After reading this chapter, you will have enough information to begin using VoiceOver. You will have practiced moving the VoiceOver cursor, interacting with scroll bars, and navigating menus. Following Instructions When you use VoiceOver, you use the keyboard to activate controls. For example, when you read “click,” use the VoiceOver command Control-Option-Space bar instead of the mouse. Menu commands are written using the greater than or right angle bracket symbol to show a sequence of menu commands. For example: Choose Finder > Services > Summarize. In this example, Finder is the name of a menu in the menu bar. Services is a submenu in the Finder menu, and Summarize is a command in the Services submenu. VoiceOver speaks the sequence as “Choose Finder greater than Services greater than Summarize.” Turning On VoiceOver You can turn VoiceOver on and off at any time; you don’t have to restart your computer or log in again. This makes it easier for users with different needs to share the same computer. You can turn on VoiceOver in System Preferences, and also with a quick VoiceOver command.Chapter 4 VoiceOver Basics 23 To turn on VoiceOver in System Preferences: 1 Click the System Preferences icon in the Dock or choose Apple menu > System Preferences to open System Preferences. 2 Click the Universal Access button. 3 Click the Seeing tab. 4 Select the On radio button for VoiceOver. To turn VoiceOver on or off quickly: m Press Command-F5. If you are using a portable computer, press Fn-Command-F5. If VoiceOver is on, Command-F5 turns it off. If VoiceOver is off, the command turns it on. The change takes effect immediately and remains in effect even after you log out of your user account or restart your computer. Using VoiceOver in the Login Window If your computer requires you to log in and you want to use VoiceOver to navigate and read the contents of the Mac OS X login window, you must first set a preference in Accounts preferences. To turn on VoiceOver for the login window: 1 Click the System Preferences icon in the Dock or choose Apple menu > System Preferences to open System Preferences. 2 Click the Accounts button. 3 Click the Login Options button below the accounts list. If the Login Options button is dimmed, click the lock icon at the bottom of the Accounts window and type an administrator’s name and password to unlock the window. 4 Select the checkbox labeled “Use VoiceOver at login window.” Pausing VoiceOver Speech When you’re using VoiceOver, you may want to silence the speech when you don’t want to hear something. Just press and release the Control key to stop VoiceOver from speaking. If VoiceOver is reading text and you don’t use any other commands after you press the Control key, you can press and release Control again to hear VoiceOver resume speaking where it left off. Controlling VoiceOver To control VoiceOver, you press and hold the Control and Option keys while you press other keys to get information and perform actions.24 Chapter 4 VoiceOver Basics When VoiceOver is on, a box is drawn around an object on the screen to show where VoiceOver is focused. This box is called the VoiceOver cursor. The visual representation of the VoiceOver cursor helps sighted users track VoiceOver’s location. Objects in the VoiceOver cursor can be buttons and other controls, text, images, files, documents, and anything else that is displayed on your computer screen. To move the VoiceOver cursor, you hold down the Control and Option keys as you press the arrow keys. This moves the VoiceOver cursor vertically or horizontally. In general, you should navigate windows horizontally, using the Left and Right arrow keys. The VoiceOver cursor moves from left to right, wrapping to the next row as it moves forward or back. Use the Up and Down arrow keys to navigate vertically in lists and tables, or in windows where you are familiar with the layout. The VoiceOver cursor moves up and down, wrapping to the next column as it moves up or down. For convenience, you can lock the Control and Option keys so that you don’t have to press them while you are controlling VoiceOver. Locking the Control and Option keys is useful if you are doing a lot of navigation and exploration with VoiceOver. It reduces the number of keys you need to press to accomplish these goals. With Control and Option locked, all you need to press are the remaining keys for the command, usually one or two others. To lock or unlock the Control and Option keys: m Press Control-Option-semicolon (;). You can practice navigating with the VoiceOver cursor using the exercises at the end of this chapter. Reading Window Contents When you open a new window, the VoiceOver cursor goes to the first item in the upper-left corner of the window and stops there. As you navigate the window, you hear descriptions of the items in the VoiceOver cursor. If the VoiceOver cursor reaches text, it reads the text that’s visible on the screen. A good way to get a sense of how a window is laid out or to find out what information the window contains is to have VoiceOver read all the contents of the window. To read the window contents: m Press Control-Option-Shift-W.Chapter 4 VoiceOver Basics 25 When you use the Control-Option-Shift-W command to read the contents of the window, VoiceOver reads only what’s visible. If there are more contents than can fit in the window, scroll bars appear at the bottom or right side of the window so that you can scroll to the rest of the content. For example, a large document may have many pages, but only part of one page is visible on the screen. You use scroll bars to make more of the document visible so that you can read it. You can use other VoiceOver commands to read all the contents of scroll areas and other content areas without having to scroll. The next section describes these techniques. Reading Text Reading the contents of a window is very useful, but sometimes it isn’t enough. You’ll need to be able to read individual words, sentences, and characters as well. You can use the following VoiceOver commands for more control when you read text:  Control-Option-C to read the last character in the VoiceOver cursor.  Control-Option-W to read the last word in the VoiceOver cursor.  Control-Option-S to read the sentence where the VoiceOver cursor is located.  Control-Option-L to read the line where the VoiceOver cursor is located.  Control-Option-P to read the paragraph where the VoiceOver cursor is located. In addition, you can hear words or characters spelled phonetically to help you figure out something that is difficult to hear. To do this, you use the same commands for reading by character or reading by word, but you press the commands two or three times to hear progressively more detail. For example, if you hear the word “tab” but aren’t sure you heard it right, you can press Control-Option-W to hear the word spoken. Press Control-Option-W again to hear the word spelled. If you’re still not sure what was read, press Control-Option-W a third time to hear each letter’s phonetic name (“tango alpha bravo”). Changing Rate, Pitch, and Volume Temporarily While you’re working, you may want to change the rate, pitch, or volume temporarily without changing your permanent settings. You can use a VoiceOver command to do this quickly. To change settings temporarily: 1 Press Control-Option-Command-Right Arrow. Each time you press this command, you hear VoiceOver cycle through rate, pitch, and volume. If you stopped at “rate” the last time you used the command, the next time you press the command you hear “pitch.”26 Chapter 4 VoiceOver Basics 2 After you hear the setting you want to change, press Control-Option-Command-Up Arrow or Down Arrow. The Up Arrow increases the setting and the Down Arrow decreases the setting. 3 Release the keys to return to navigation. These settings remain in effect until you change them, log out of your user account, turn off your computer, or turn off VoiceOver. To set your preferences for these, see “Customizing Voices” on page 54. Interacting With Content Areas To be successful using VoiceOver, you must understand the VoiceOver concept of interaction. When navigating the contents of windows, menus, and the desktop, VoiceOver groups related items in order to present a cleaner overall picture of the contents of the screen. So for example, moving once to the right will move the VoiceOver cursor from one button to another, not just from one word or character to the next. This allows you to quickly survey all that is available to you by navigating through the major elements of a window or application. When you find an item of interest, you then interact with it to read, add, control, or modify its contents. Windows, documents, and webpages often have areas that contain text, files, or other content. When the VoiceOver cursor reaches one of these areas, it identifies the content area. Depending on the application or window, VoiceOver may identify these areas as:  A scroll area  HTML content  A list  A text area  An outline  A group  A table When you reach a content area, you can navigate past it to something else, or you can interact with the content area to investigate, read, or modify something it contains. For example, a Finder window has a sidebar that contains folders. You can skip over the sidebar to the view browser, or interact with the sidebar to select one of its folders.Chapter 4 VoiceOver Basics 27 First you use a command to let VoiceOver know that you want to interact with the items it contains. Then you use the VoiceOver navigation commands to navigate within the content area. The VoiceOver cursor stays within the boundaries of the object you're interacting with, so when you navigate left, right, up, and down, you'll navigate only to the objects within that area. If you find another object of interest, and it contains objects, you can interact with it as well. Interaction allows you to navigate the larger elements of an application quickly to locate what interests you, and also provides the control you need to investigate the smallest details. When you’re done, a VoiceOver command stops the interaction, returning the VoiceOver cursor to the previous object or area. You can repeat the VoiceOver command to interact or stop interacting as many times as necessary. When there's nothing more to interact with, or stop interacting with, you'll hear a “beep” sound. To interact with a content area:  Press Control-Option-Shift-Down Arrow to begin interacting.  Press Control-Option-Shift-Up Arrow to stop interacting with the content area. To practice interacting with content areas, see the exercises at the end of this chapter. You can use a VoiceOver command to read everything in the VoiceOver cursor, including content not visible on the screen. This is a quick way to find out what’s in a content area. When you use this command on an area that has scroll bars, the contents become visible as VoiceOver reads them. To read everything in the VoiceOver cursor: m Press Control-Option-A when the VoiceOver cursor is on a content area. If you want to navigate or interact with the items in a content area, you have to first let VoiceOver know that you want to interact with the items it contains. Then you can use all the regular VoiceOver commands inside the content area. Using Buttons and Controls You can use VoiceOver commands to press a button, select checkboxes, choose an item in a list or menu, and move sliders. For example, when instructions ask you to “click Save” or “click Cancel,” move the VoiceOver cursor to the button and use a VoiceOver command to perform the button’s action. You can use the same VoiceOver command to select a checkbox or radio button. To click a button or select a checkbox or radio button: m Press Control-Option-Space bar. You use this same powerful command to select just about anything on the screen, from items in menus and lists to folders and files that you want to move or copy.28 Chapter 4 VoiceOver Basics A slider control, such as the control for your computer’s volume, is usually identified as an incrementor or simply a slider. To move it, you have to first let VoiceOver know that you want to interact with the slider, just as you do for content areas. Then you use the arrow keys to change the value. To interact with a slider or incrementor: 1 Press Control-Option-Shift-Down Arrow to start interacting. 2 Press Control and Option with an appropriate arrow key (Up, Down, Left, or Right, depending on whether the control is horizontal or vertical). 3 When you reach the value you want, press Control-Option-Shift-Up Arrow to stop interacting with the control. Learning More About an Item VoiceOver provides several ways to find out about an item that is in the VoiceOver cursor. If you aren’t sure what it is or how to use it, try any of the following discovery techniques:  To hear a description of the item, press Control-Option-F3.  To hear how to use the item, press Control-Option-H to hear the help tag. Help tags are often provided for controls so that you know what the control is used for.  To hear a list of VoiceOver commands that can be used for the item, press ControlOption-H a second time to open the Commands menu. The Commands menu gives you every command you can use for the item. Navigating Menus Menus are vertical lists of commands and options that perform actions when you choose them. Some menu items have submenus that contain additional choices. You can think of menus and submenus as a hierarchical outline. The menu bar at the top of the screen is separated into three main areas: the Apple and application menus, status menus, and the Spotlight menu. You can use the same VoiceOver command to access each of these areas. To navigate the menu bar: 1 Press Control-Option-M to go to the first menu in the menu bar. 2 Press Control-Option-Right Arrow to move along the menu bar. You hear a “bonk” sound when you reach the last menu. 3 Press Control-Option-M again to move to the first status menu in the menu bar and Control-Option-Right Arrow to move to the last status menu. 4 Press Control-Option-M again to go to the Spotlight menu.Chapter 4 VoiceOver Basics 29 The Control-Option-M command cycles through the three areas. If you leave the menu bar, the next time you press the command, you start at the Apple menu. Whether you’re in a Finder menu, application menu, pop-up menu, or VoiceOver menu, you use the same navigation techniques. To navigate in a menu:  Press Control-Option-Down Arrow to move down a menu.  Press Control-Option-Up Arrow to move up a menu.  Press Control-Option-Space bar to choose a menu item.  Press Escape to leave a menu without making a selection.  Press Control-Option-Right Arrow to move to the submenu and Control-Option-Left Arrow to move out of the submenu and back to the main menu. You can use the exercises at the end of this chapter to practice navigating the menu bar and menus. Navigating Quickly in a Menu In Mac OS X, you can type the first letters of a word or phrase to move quickly to the item in the menu that most closely resembles what you typed. For example, if you know the menu contains a submenu for font selection, type “f” or “fo” to go to the first item in the menu that starts with these letters. The more letters you type, the greater the chance that the item you want will be found first. In VoiceOver menus, the menu contracts to show only the items that contain the word, letters, or phrase you typed. If more than one item contains the letters you typed, you can use the arrow keys to locate the one you want. You can try this out in the Item Chooser menu exercise later in this chapter. Using Pop-up Menus Many windows and webpages use pop-up menus, described by VoiceOver as pop-up menu buttons, to present options and choices. Press Control-Option-Space bar to show the menu, then navigate the menu the same way you would any other menu. Using Contextual Menus Contextual menus give you quick access to often-used commands for the selected item. Contextual menus are convenient because you don’t have to navigate to the menu bar to perform an action. In Mac OS X, you press the Control key while you click the item with your mouse to see a contextual menu. You can perform the same action with a VoiceOver command. To open a contextual menu for an item: m Press Control-Option-Shift-M. Contextual menus are also available for items in the Dock.30 Chapter 4 VoiceOver Basics Understanding Duplicate Menu Items Some menu items have an ellipsis (three dots) after the name. An ellipsis after an item in a menu lets you know that a dialog will appear when you choose that menu item. You’ll need to take some type of action to dismiss the dialog and continue, such as typing a password or making a choice. When VoiceOver is turned on, you will see or hear menu items that appear to be duplicates. The first menu item includes an ellipsis in the name and the second one doesn’t. When VoiceOver is off, only the menu item with the ellipsis appears in the menu, and you would have to press Control when you choose the menu item to bypass the dialog and take action directly. When VoiceOver is on, you can choose either menu item. For example, when VoiceOver is off, “Restart...” appears in the Apple menu, indicating that a dialog will appear when you choose this command. You can hold down the Option key when you choose this command and your computer restarts without displaying a dialog. When VoiceOver is on, you hear both “restart ellipsis” and “restart” in the menu. Working With the VoiceOver Menu The VoiceOver menu, shown below, appears as a shaded rectangle on the screen for sighted users. The VoiceOver menu contains all the VoiceOver commands you can use for the item in the VoiceOver cursor followed by their command key equivalent. VoiceOver menus do not show the Control and Option keys for the commands, but you still must press Control and Option with the keys shown. Sometimes VoiceOver commands require multiple key presses. For example, in the VoiceOver menu shown above, you press Control-Option-H two times to go directly to the Commands menu. In the VoiceOver menu, this is indicated by “H H.”Chapter 4 VoiceOver Basics 31 To open the VoiceOver menu: m Press Control-Option-F7. Sighted users can change the size of the font in the VoiceOver menu to make it easier to read. The font will stay the same size until you log out or restart your computer. To change the size of the font: m Press Control-Option-Right brace ( } ) to increase the font size and Control-Option-Left brace ( { ) to decrease it. Note: The right and left brace keys are the shifted keys to the right of the P on your keyboard. You can use the exercises at the end of this chapter to practice using the VoiceOver menu. Using the Commands Menu The Commands menu, shown below, is invaluable when you are learning VoiceOver. The Commands menu shows a list of all the VoiceOver commands you can use for the item in the VoiceOver cursor. To open the Commands menu: m Press Control-Option-H twice. The first time you press the command, you hear the contents of the item’s help tag, if there is one. The second time, the Commands menu opens.32 Chapter 4 VoiceOver Basics Chapter 4 Exercises The exercises that follow will help you practice moving the VoiceOver cursor, interacting with scroll areas, and navigating menus. Exercise 4.1: Moving the VoiceOver Cursor In this exercise, you will practice moving the VoiceOver cursor and listening to the audible cues and descriptions. 1 Press Command-F5 to turn on VoiceOver. 2 Press and hold the Control and Option keys while you press the Up, Down, Left, and Right arrow keys. 3 Listen to the descriptions of items and practice moving around the screen. 4 Listen to the sound effects that indicate wrapping to the next or previous line or column. Exercise 4.2: Interacting With a Content Area In this exercise, you’ll move the VoiceOver cursor to a content area and interact with it. 1 Press Command-F5 to turn on VoiceOver. 2 Press Command-N to open a new Finder window. (Make sure the Finder is the active application.) 3 Press and hold the Control and Option keys while you press the Right Arrow keys. Listen to the descriptions of items and stop when you hear “sidebar list.” 4 Press Control-Option-Shift-Down Arrow and listen to VoiceOver say “Interact with sidebar list Network folder.” If you have something other than a Network folder at the top of the list, or if an item is selected, you’ll hear that instead. 5 Press Control-Option-Down Arrow to move down the list. Notice the tone that indicates you’ve reached the end of the list. 6 Press Control-Option-Shift-Up Arrow to stop interacting with the list. Listen to VoiceOver say “Stop interacting with sidebar list.” Exercise 4.3: Navigating the Menu Bar In this exercise, you will use VoiceOver commands to access the different parts of the menu bar. The VoiceOver command Control-Option-M moves the VoiceOver cursor to the next section of the menu bar each time you press it. 1 Make sure the Finder is the active application by either clicking the desktop or pressing Control-Option-Shift-D to move the VoiceOver cursor to the desktop. 2 Press Control-Option-M to go to the menu bar, then press Control-Option-Right Arrow to move along the menu bar. Listen to the names of the different menus. When you get to the last menu, you hear a sound effect. 3 Press Control-Option-M again. You hear the first status menu, which may be “volume” if you haven’t turned on any applications that have status menus.Chapter 4 VoiceOver Basics 33 4 Press Control-Option-Right Arrow to move to all the status menus. You hear a sound to indicate the end of the status menus. 5 Press Control-Option-M again to access the Spotlight menu. You can type a search word or term here to find items on your computer. 6 Press Escape to close the menu without making a selection. Exercise 4.4: Navigating in a Menu and Submenu In this exercise, you will go to the menu bar and use a submenu to find any applications, documents, and servers you used recently. 1 Press Control-Option-M to go to the Apple menu, which is the first menu in the menu bar. 2 Press Control-Option-Down Arrow to open the Apple menu. 3 Press Control-Option-Down Arrow until you hear “Recent Items submenu.” 4 Press Control-Option-Right Arrow to go to the submenu. 5 Press Control-Option-Down Arrow and Control-Option-Up Arrow to move up and down the menu to hear the applications, documents, and servers you used recently. 6 Press Control-Option-Left Arrow to return to Recent Items in the Apple menu. 7 Press Escape to leave the menu without making a selection. Exercise 4.5: Using the VoiceOver Menu In this exercise, you will open the VoiceOver menu and use VoiceOver commands to increase the font size, navigate the menu, and select an item in the menu. 1 Press Control-Option-F7. 2 Press Control-Option-right brace ( } ) several times to make the font bigger. 3 Press Control-Option-left brace ( { ) until the font size is back to its original size or any size you wish. 4 Press Control-Option-Down Arrow until you hear “Commands menu H H,” then press Control-Option-Right Arrow. 5 Press Control-Option-Right Arrow to enter the Commands menu, then use the Up and Down arrow keys to read the items in the menu. 6 Press Control-Option-Left Arrow to return to the VoiceOver menu. 7 Press Control-Option-Up Arrow until you hear “Help question mark,” then press ControlOption-Space bar to select it. The VoiceOver menu closes and the command you chose is performed. In this case, the VoiceOver menu closes and VoiceOver Help opens.5 34 5 Using VoiceOver With Mac OS X You can use VoiceOver to read text, navigate your computer, and perform your daily tasks. When you know the basics of Mac OS X and VoiceOver navigation (covered in earlier chapters), you can begin to use VoiceOver to access files, read documents, and manage your computer. This chapter teaches you how to apply what you know about VoiceOver to these everyday tasks. Using the Dock As you learned in Chapter 2, “Introduction to Mac OS X,” the Dock contains icons for applications and documents that you access frequently, or that you are currently working with. When you hear the name of the application or document you want to use, click it to open it on the desktop. To open an item from the Dock: 1 Press Control-Option-D to move the VoiceOver cursor to the Dock. 2 Press Control-Option-Right Arrow to move across the Dock if it is on the bottom of the screen and Control-Option-Down Arrow if it is located on one side. 3 Press Control-Option-Space bar to open an item in the Dock. The Dock can be positioned on the bottom, left, or right side of the screen. You don’t need to know where the Dock is located to navigate it. The Down and Right arrow keys move toward the bottom or right of the Dock, and the Up and Left arrow keys move up or to the left. The arrow keys work the same, regardless of the location of the Dock. If it will help you to know the location of the Dock, you can find out by checking the Dock menu. To find out where the Dock is positioned on the screen: 1 Press Control-Option-M to go to the Apple menu. 2 Press Control-Option-Down Arrow to move down the menu until you hear “Dock menu,” then press Control-Option-Right Arrow.Chapter 5 Using VoiceOver With Mac OS X 35 3 Press Control-Option-Down Arrow to move down the Dock menu until you hear the location of the Dock. For example, “Position on bottom checked.” Setting Dock Preferences You can also use the Dock submenu to set some preferences for the Dock and quickly access the Dock preferences pane of System Preferences. When hiding is turned on in the Dock submenu, the Dock disappears from the desktop. Dragging the mouse pointer to where the Dock appears when it’s visible causes it to pop up and remain visible as you move the mouse along it. With VoiceOver, you just have to press the VoiceOver command for the Dock to make the Dock visible. Working With Contextual Menus for Dock Items Every item in the Dock has a contextual menu. For example, you can remove an icon from the Dock or permanently add one for an application whose icon would normally appear in the Dock only when that application was open. The items in the contextual menu vary, depending on the type of item. To open a contextual menu for an item in the Dock: m Press Control-Option-Shift-M when the VoiceOver cursor is on the item. Use the standard menu navigation techniques to navigate and select items from a contextual menu. If you want to close the menu without making a selection, press the Escape key. You can practice using the Dock in the exercise at the end of this chapter. Switching Between Applications and Windows Most people have more than one application open at a time and often one or more windows open for each application. You can use a standard Mac OS X keyboard to quickly switch between open applications. To switch between open applications: 1 Press and hold down the Command and Tab keys. 2 Continue to hold down the Command key while you press and release the Tab key. Each time you press the Tab key, you hear the next application. 3 When you hear the application you want to switch to, release both keys. You can use the Application Chooser menu and the Window Chooser menu in VoiceOver to switch quickly to the application and window you want to use.36 Chapter 5 Using VoiceOver With Mac OS X The Application Chooser menu, shown below, lets you choose both an application and an open window for the selected application. To use the Application Chooser menu: 1 Press Control-Option-F1. You hear the name of the active application and the number of open applications. 2 Press Control-Option-F1 a second time to open the Application Chooser menu. 3 Press Control-Option-Down Arrow to move down the list of open applications. 4 When you hear the application you want to switch to, press Control-Option-Right Arrow to go to the submenu for that application. 5 Press Control-Option-Down Arrow until you reach the window you want. If any applications have a dialog open, they also appear in the menu. 6 Press Control-Option-Space bar to move the VoiceOver cursor to the window or dialog that you want. If you just want to switch to the application without going to a specific window, choose the first item in the submenu. If no windows are open for the application, this will be the only choice in the menu. The Window Chooser menu, shown below, works the same way as the Application Chooser menu. However, the Window Chooser menu identifies only the open windows for the active application.Chapter 5 Using VoiceOver With Mac OS X 37 To use the Window Chooser menu: 1 Press Control-Option-F2. You hear the name of the window that is active. 2 Press Control-Option-F2 a second time to open the menu. 3 Press Control-Option-Down Arrow to move down the list of open windows for the active application. If the application has a dialog open, it also appears in the menu. 4 When you hear the window or dialog you want, press Control-Option-Space bar to move the VoiceOver cursor there. Navigating Finder Windows When you open a Finder window, the VoiceOver cursor is in the toolbar, focused on the Back button. You can find a detailed description of the Finder window in “The Finder” on page 12. When you use the Finder window to locate and open a file or folder, you first find the top level folder in the sidebar. When a folder is selected in the sidebar, its contents are displayed on the right side of the Finder window in the view browser. Finder windows can display items in the view browser in icon, list, or column view. Use the navigation method described here to navigate to the view browser. Then use the method under the view descriptions to navigate a particular view. To navigate the Finder window: 1 Press Control-Option-Right Arrow to move the VoiceOver cursor across the toolbar. When you pass over the view buttons, listen to see which view button is selected. If you know which view you want to use, press Control-Option-Space bar to select it. 2 Press Control-Option-Right Arrow until you hear “sidebar.” 3 Press Control-Option-Shift-Down Arrow to interact with the contents of the sidebar. 4 Press control-Option-Down Arrow to move down the list of items in the sidebar. When you find the folder you want, press Control-Option-Shift-Up Arrow to stop interacting. 5 Press Control-Option-Right Arrow to move to the right column, the view browser. When you reach the view browser, you use different techniques to navigate its contents, depending on which view is being used. Below are the descriptions of each view and the navigation techniques for each. You will quickly discover the ones that work best for you.38 Chapter 5 Using VoiceOver With Mac OS X Using Icon View In icon view, shown below, each item in the view browser is represented by an icon. Icons are usually organized alphabetically in rows. You can use the arrow keys to navigate along the rows, or type the beginning letters of a file to jump to an item quickly. To open a file in icon view: 1 If the view browser is not in icon view, you can press the Finder keyboard shortcut Command-1 to change it now. 2 Press Control-Option-Shift-Down Arrow to interact with the browser contents. 3 Type the first few letters of the name of the item you want to locate. The VoiceOver cursor moves to the first file that starts with the letters you typed. You may have to use the arrow keys to move from there to the exact file you want to open. 4 Press Command-O to open the file. Using List View In list view, shown below, items are listed alphabetically and information about each item appears next to it on the same row.Chapter 5 Using VoiceOver With Mac OS X 39 A disclosure triangle appears to the left of folders. When you click a disclosure triangle, you see the contents of the folder below it, indented as they would appear in an outline. To open a file in list view: 1 If the view browser is not in list view, you can press the Finder keyboard shortcut Command-2 to change it. 2 Press Control-Option-Shift-Down Arrow to interact with the browser contents. 3 Press Control-Option-Down Arrow to move down the line of contents. You hear the name of the item and all the information in the row. 4 Press Command-O to open the item selected. Sorting Items in List View Because list view is also a table, you can press Control-Option-Right Arrow or Left Arrow to navigate to individual cells in the table. Then you can sort the information by column. For example, you can arrange the items by the date they were modified. To sort items by column in list view: 1 Move the VoiceOver cursor to the first row of information and press Control-OptionRight Arrow to move to the column you want to sort by. 2 Press Control-Option-Vertical line (|) to sort the column. The vertical line is the shifted character on the right edge of the keyboard above the Return key. 3 To change the order of the sort, press Control-Option-Vertical line (|) again. For example, you could sort the Date Modified column to show the most recent changes at the top or at the bottom of the column. Using Column View In column view, shown below, items are shown in a series of columns like a horizontal outline.40 Chapter 5 Using VoiceOver With Mac OS X Column view is very useful for browsing nested folders. When you select a folder, its contents are shown in the column on the right. You keep moving right until you reach the file you want to open. Your browsing is confined to one window so that you can easily retrace your path if you need to. To open a file in column view: 1 If the view browser is not in column view, you can press the Finder keyboard shortcut Command-3 to change it. 2 Press Control-Option-Shift-Down Arrow to interact with the browser contents. 3 Press Control-Option-Down Arrow to move to the item you want to open. If it’s a single file, press Command-O to open it. If it’s a folder, continue with the next step. 4 Press Control-Option-Right Arrow to move to the contents of the next folder. Accessing Finder Window Buttons You use the three round buttons in the upper-left corner of a Finder window to close the window, put the window in the Dock, or resize the window to its former size. You can press these buttons with a mouse, or use these Finder shortcuts:  Command-W to close the window  Command-M to minimize the window, placing it in the Dock for convenient access later To resize the window, you can either press Control-Option-M to access the menu bar and then choose Window > Zoom, or use the VoiceOver commands for window resizing described in “Moving and Resizing Windows” on page 43. Selecting Files and Folders In the Finder and in other applications, you must first select a file or folder that you want to use before you can open it or copy it. There are different ways to select files and folders, depending on whether cursor tracking is turned on or off. Cursor tracking is described in more detail in Chapter 9. When cursor tracking is on, moving the VoiceOver cursor to a file or folder automatically selects it. If you haven’t changed cursor tracking settings in VoiceOver Utility, cursor tracking is already turned on. If you’re not sure what is selected, you can use a VoiceOver command to find out. This is important information to know before you perform an action such as copying or deleting a file. To hear what is selected: m Press Control-Option-F6.Chapter 5 Using VoiceOver With Mac OS X 41 If nothing is selected, you hear “no selection available.” If text is selected, you hear the text as it is read. If you have cursor tracking turned off, the keyboard focus and VoiceOver cursor will probably be in different locations. This means that the item in the VoiceOver cursor is not selected automatically. You must use a VoiceOver command to select it. To select an item when cursor tracking is turned off: m Press Control-Option-Command-F4. You can select more than one item at a time. This is useful when you want to perform the same action for all of the selected items. For example, you may want to delete several documents with one command. Selecting multiple items works only when cursor tracking is turned off. To select multiple items: 1 Press Control-Option-Shift-F3 to turn off cursor tracking. Note: You can press this command again to turn cursor tracking back on when you’re finished selecting. 2 Press the Escape key to deselect anything that is already selected. 3 Move the VoiceOver cursor to the first item you want to select and press ControlOption-Command-Space bar. 4 Move to the next item and press Control-Option-Command-Space bar. Continue until all the items you want are selected. If you want to deselect an item you selected, return to it and press Control-OptionCommand Space bar. You use different techniques to select text. For more information about selecting text, see “Selecting Text” on page 74. Copying and Moving Files If you can use a mouse, you can drag files to move them, and even hold down the Option key while you drag to create a copy of the original file in another location. If you cannot use a mouse, you can still use VoiceOver to copy a file and paste it in a new location. You can delete the original if you want to. To copy and move files using VoiceOver: 1 Navigate to the file you want to copy. 2 Press Command-C to copy the file. 3 Navigate to the location where you want to place the copy. 4 Press Command-V to paste it in the new location.42 Chapter 5 Using VoiceOver With Mac OS X Note: If you have cursor tracking turned off, press Control-Option-Command-F4 to select the item so you can copy it. The Item Chooser Menu Using the arrow keys to move across every item in a window can be very tedious, especially if you have an idea of what you are looking for and want to get to it quickly. A convenient alternative is to use the Item Chooser menu, shown below. The Item Chooser menu displays these types of items and more:  Controls  Text in table cells  Static text  Buttons In a Mail window, for example, you see all the buttons in the Mail window, names of message senders, column headers, message subjects, and more. To open the Item Chooser menu: m Press Control-Option-I. You can type some letters to quickly reduce the number of items in the menu and use all the other menu navigation and selection techniques you’ve learned.Chapter 5 Using VoiceOver With Mac OS X 43 Interacting With Windows As you work, you will probably have multiple application windows open on the desktop. You can drag these windows to different locations or resize them by dragging the bottom-right corner of the window. VoiceOver users who can’t see the screen or use a mouse can do this too. Moving and Resizing Windows You can use the accent and tilde keys to move or resize a window with VoiceOver. The accent key is directly above the Tab key, and the tilde is the accent key shifted. To move a window: 1 Press Control-Option-accent (‘) to begin moving a window. 2 Use the arrow keys to move the window up, down, left, and right. 3 Press Escape to stop interacting with the window. You hear a “bonk” sound when you can’t move a window any farther in one direction. You can use the Shift key to move a window in smaller increments. To resize a window: 1 Press Control-Option-tilde (~) to begin resizing a window. 2 Use the arrow keys to make the window taller, shorter, wider, or narrower. 3 Press Escape to stop interacting with the window. While you’re moving or resizing a window, you can’t use VoiceOver to perform any other actions. Pressing Escape lets VoiceOver know you’re done. Moving a Scroll Bar Previous chapters discussed how to read the content in scroll areas so that all the contents are read and the window scrolls automatically. There may be times when you want to scroll manually as well. To move a scroll bar: 1 Press Control-Option-Shift-Down Arrow to begin interacting with the scroll area. 2 Press Control-Option-Shift-S to begin scrolling. 3 Press Control and Option with the arrow keys to scroll up and down, or left and right. When the window can’t be scrolled any farther in a particular direction, you hear a “bonk” sound. 4 Press the Escape key to leave the scrolling mode.44 Chapter 5 Using VoiceOver With Mac OS X Using Spotlight The fastest and easiest way to find something on your computer is to type a search term in the Spotlight menu and then click the item you want in the search results. It takes just seconds and will save you a lot of time. There is almost no limit to the type of information you can find with Spotlight. In Spotlight preferences, you can specify categories of information you want Spotlight to search. For example, you can limit searches to just applications, documents, folders, and Mail messages. Or you can expand your search options to include bookmarks in Safari, image files, and more. You can use Mac OS X keyboard shortcuts or the VoiceOver menu command to start a Spotlight search. Using the Spotlight Menu To find an item on your computer, open the Spotlight search field, and type your search term. You can open the Spotlight menu in two ways:  Press Command-Space bar.  Press Control-Option-M three times. As soon as you type the first letters, the search results appear below the search field and begins to display the results. When the search is finished, you hear VoiceOver announce the number of items found.Chapter 5 Using VoiceOver With Mac OS X 45 To navigate the Spotlight menu: 1 Press Command-Space bar or Control-Option-M three times to open the Spotlight menu. 2 Type the word or term you want to use for your search. 3 Press Control-Option-Down Arrow to move down the list of search results. Results are categorized by type. 4 Press Control-Option-Space bar when you hear the item you want to open. The item you selected opens immediately and the VoiceOver cursor leaves the Spotlight menu and goes to the item you opened. If you don’t see the item you want, you can go back to the top of the list and select Show All to open the Spotlight window. Using the Spotlight Window The Spotlight window, shown below, provides additional information about each item and contains a sidebar on the right where you can sort items in each group. You can open the Spotlight window in two ways:  Press Command-Option-Space bar.  Click Show All at the top of the Spotlight search results window.46 Chapter 5 Using VoiceOver With Mac OS X When you interact with the scroll area that contains the search results, the VoiceOver cursor starts on the first column, which contains the disclosure triangles for each group. The way you interact with disclosure triangles in the Spotlight window is different than how you interact with disclosure triangles in some other windows. To open or close disclosure triangles in the Spotlight window: m Press Control-Option-Space bar. As you navigate the search results, press Control-Option-Down Arrow to move down a column. Spotlight displays the first five results in each group. If there are more than five results, you can click the link at the bottom of the group that tells you how many more items it found. Changing the Sort Criteria The body of the Spotlight window contains a sidebar: a scroll area within a scroll area, which you use to sort results. You can sort groups by kind, date, or people, or you can show a flat list. Within groups, you can sort by name, date, kind, or people. You can also choose different ways to sort by date and location. To change the sorting criteria: 1 Press Control-Option-Right Arrow until you hear “scroll area.” This is the area that contains the search results. 2 Press Control-Option-Shift-Down Arrow to interact with the contents. 3 Press Control-Option-Right Arrow to move across the first row in the table until you hear “scroll area” again. This is the sorting sidebar. Press Control-Option-Shift-Down Arrow to interact with it. 4 Press Control-Option-Down Arrow until you hear the criteria you want to use. For example, you can sort groups by kind, date, people, or flat list. 5 Press Control-Option-Command-F5 to move the mouse pointer to the VoiceOver cursor. 6 Press Control-Option-Shift-Space bar to click the mouse. The search results on the left immediately change to reflect your choice. Chapter 5 Exercises The exercises that follow will help you practice using the Dock and the Item Chooser menu, and copying and pasting a folder in different Finder views. Exercise 5.1: Using the Dock In this exercise, you will open a contextual menu for an item in the Dock and move an icon to a different location in the Dock. Rearranging icons in the Dock lets you place frequently used applications where it’s easiest for you to access them. 1 Press Control-Option-D to open the Dock.Chapter 5 Using VoiceOver With Mac OS X 47 2 Press Control-Option-Right Arrow and then Control-Option-Left Arrow to move along the Dock in either direction. Try using the Up and Down arrows too. Stop when you reach an icon you would like to use for this exercise. Notice that VoiceOver identifies open applications by announcing the name of the application and then “running.” 3 Press Control-Option-Shift-M to open the contextual menu for the icon. 4 Press Control-Option-Up Arrow or Down Arrow to navigate the menu. Notice the types of commands you can access from the contextual menu. 5 Press Escape to close the menu without making a selection. 6 Press Control-Option-D again to move the VoiceOver cursor to the Dock, then move the VoiceOver cursor to an icon you want to move. 7 Press Option with an arrow key to move the icon. Each time you press the arrow key, the icon moves in the direction of the arrow. 8 Press Control and Option with the arrow keys to hear the new location of the icon. Try this exercise again and listen to the contextual menu for an application that is running. If you have windows or documents open for the application, you can access them from the contextual menu. Exercise 5.2: Using the Item Chooser Menu In this exercise, you will open a window, use the Item Chooser menu, and find an item in the menu. 1 Click the desktop to make the Finder active, or press Control-Option-Shift-D to go to the desktop. 2 Press Command-N to open a new Finder window. 3 Press Control-Option-I to open the Item Chooser menu. 4 Press Control-Option-Down Arrow to move down the menu and hear the type of items it contains. 5 Type documents or just doc to go to the Documents Folder. The Item Chooser menu is filtered to show only those items that contain the letters or word you typed. 6 Press Control-Option-Down Arrow until you hear Documents Folder, then press Control-Option-Space bar to select it. The Item Chooser menu closes and the VoiceOver cursor moves to the Documents Folder in the Finder window. Exercise 5.3: Copying and Pasting a File In this exercise, you will navigate the Finder window to locate a file, then copy and paste it to a new location. After you copy a file or folder, you can move the copy to any location on your computer and paste it there.48 Chapter 5 Using VoiceOver With Mac OS X This exercise is presented three times, one for each of the different Finder views. All of the Finder exercises begin with a new Finder window. To open a Finder window, you can do one of the following:  Go to the Dock and navigate to the Finder icon. Then press Control-Option-Space bar to go to a Finder window.  Press Command-N when the Finder is the active application.  Press Control-Option-F1 twice to open the Application Chooser menu. Choose “Finder menu” and then “Go to Finder.” The view browser changes automatically to icon view, list view, and column view, depending on the item you select in the sidebar. You can use the Finder keyboard shortcuts provided in each exercise to switch to the view you want to use. Exercise 5.3.a: Copying and Pasting in Icon View 1 Open a Finder window. 2 Press Control-Option-Right Arrow until you hear “sidebar list.” 3 Press Control-Option-Shift-Down Arrow to interact with the contents of the sidebar. 4 Press Control-Option-Down Arrow until you hear your home folder. The title of your home folder includes your user name. 5 Press Control-Option-Shift-Up Arrow to stop interacting with the sidebar. 6 Press control-Option-Right Arrow until you hear “icon view scroll area.” The contents of the right frame may be in a different view, depending on what you select in the sidebar. You can press Command-1 to switch to icon view. 7 Press Control-Option-Shift-Down Arrow to interact with the contents. 8 Press Control-Option-Right Arrow until you hear “Sites selected folder.” 9 Press Command-C, the Finder keyboard shortcut for copying. 10 Press Command-V, the Finder keyboard shortcut for pasting. 11 Press Control-Option-Right Arrow until you hear “Sites copy selected folder.” This is the copy you just made and pasted to the same folder. 12 Press Command-Delete, the Finder keyboard shortcut for deleting, to delete the copy you just made. If you want to verify that the correct folder is selected before you delete it, press Control-Option-F6 to hear the selected item. Exercise 5.3.b: Copying and Pasting in List View 1 Open a Finder window. 2 Press Control-Option-Right Arrow until you hear “sidebar list.” 3 Press Control-Option-Shift-Down Arrow to interact with the contents of the sidebar. 4 Press Control-Option-Down Arrow until you hear your home folder. The title of your home folder includes your user name.Chapter 5 Using VoiceOver With Mac OS X 49 5 Press Control-Option-Shift-Up Arrow to stop interacting with the sidebar. 6 Press control-Option-Right Arrow until you hear “outline.” The contents of the right frame may be in a different view, depending on what you select in the sidebar. You can press Command-2 to switch to list view. 7 Press Control-Option-Shift-Down Arrow to interact with the contents. 8 Press Control-Option-Down Arrow until you hear “Sites selected folder.” 9 Press Command-C, the Finder keyboard shortcut for copying. 10 Press Control-Option-Down Arrow, then press Command-V, the Finder keyboard shortcut for pasting. In list view, you need to move away from the folder you just copied or you will suddenly find yourself using Spotlight to search your computer for documents. 11 Press Control-Option-Right Arrow or Left Arrow until you hear “Sites copy selected folder.” This is the copy you just made and pasted to the same folder. 12 Press Command-Delete, the Finder keyboard shortcut for deleting, to delete the copy you just made. If you want to verify that the correct folder is selected before you delete it, press Control-Option-F6 to hear the selected item. Exercise 5.3.c: Copying and Pasting in Column View 1 Open a Finder window. 2 Press Control-Option-Right Arrow until you hear “sidebar list.” 3 Press Control-Option-Shift-Down Arrow to interact with the contents of the sidebar. 4 Press Control-Option-Down Arrow until you hear the name of your home folder. The title of your home folder includes your user name. 5 Press Control-Option-Shift-Up Arrow to stop interacting with the sidebar. 6 Press Control-Option-Right Arrow until you hear “column view browser.” The contents of the right frame may be in a different view, depending on what you select in the sidebar. You can press Command-3 to switch to column view. 7 Press Control-Option-Shift-Down Arrow to interact with the contents of the scroll area. 8 Press Control-Option-Shift-Right Arrow until you hear “Sites selected folder.” 9 Press Command-C, the Finder keyboard shortcut for copying. 10 Press Command-V, the Finder keyboard shortcut for pasting. 11 Press Control-Option-Right Arrow until you hear “Sites copy selected folder.” This is the copy you just made and pasted to the same folder. 12 Press Command-Delete, the Finder keyboard shortcut for deleting, to delete the copy you just made. If you want to verify that the correct folder is selected before you delete it, press Control-Option-F6 to hear the selected item.6 50 6 VoiceOver Utility and Preferences This chapter provides information about the many ways you can customize VoiceOver for your needs. It also introduces VoiceOver Utility, the application you use to customize your VoiceOver settings. VoiceOver Utility is located in Applications/Utilities. You can open it by clicking the VoiceOver Utility button in Universal Access preferences, or by using the VoiceOver command Control-Option-F8. Important: When you press the Reset button in VoiceOver Utility, all the settings on all the panes except Pronunciation are restored to the way they were the first time you turned on VoiceOver. You can’t reset only the settings on a single pane. Saving VoiceOver Settings When you have your VoiceOver settings just the way you want them in VoiceOver Utility, you might want to save them so that you can use those same settings when you use another computer or so that you can share them with a friend. If you have a removable storage device or a server where you can store your settings file, sharing your settings is easy to do. To save your VoiceOver settings to a file: 1 Press Control-Option-F8 to open VoiceOver Utility. 2 Choose File > Export Configuration or press Shift-Command-E. 3 In the Save dialog that opens, type a name for the file and choose where you want to save it, then click Save. You can use the same process to import the saved file. Choose File > Import Configuration or press Shift-Command-I. Then choose your saved configuration file and click Save. You don’t have to restart VoiceOver or your computer, the changes take effect immediately.Chapter 6 VoiceOver Utility and Preferences 51 Setting the Amount of Spoken Detail When you start using VoiceOver, you may want to hear as much detail as possible to help you learn about your computer and applications. As you become more familiar with these, you may not need to hear as much detail. You can choose these and other settings on the Verbosity pane of VoiceOver Utility, shown below. Adjusting Punctuation Settings Punctuation includes the common punctuation marks as well as symbols. You can adjust what you want to hear when punctuation occurs in documents. VoiceOver includes these levels:  None speaks text as you would normally read it, pausing for commas and periods.  Some speaks keyboard symbols and many math symbols, such as the plus sign (+).  Most speaks all special symbols but doesn’t speak common punctuation, such as the comma and period.  All speaks all special symbols and punctuation except for spaces. So, you might hear a sentence spoken like this: “She stopped and turned comma before speaking period.” Some documents, websites, and email messages may have repeated punctuation characters used as emphasis or design elements. You can decide whether or not you hear such punctuation. Of course, if you set your punctuation to None, you won’t hear any. The Repeated Punctuation options are:  Always Spoken means that you hear all punctuation exactly as it occurs unless you’ve set a punctuation level that skips certain punctuation or symbols.  First Three Times means that you hear only the first three instances of a punctuation symbol.52 Chapter 6 VoiceOver Utility and Preferences  Spoken With Count means that you hear the number of instances of the punctuation and then the name of the symbol. For example, the sentence “I am overjoyed!!!!!!!!!” might be read as “I am overjoyed eight exclamation mark” when Punctuation is set to All. Adjusting Text Attribute Settings Writers and designers of documentation and websites use punctuation size and style to convey meaning or to separate elements. VoiceOver can let you know when text changes occur, which can greatly improve your comprehension of the material. You can set whether and how you want VoiceOver to alert you to text changes by choosing one of these settings for the “When text attributes change” pop-up menu:  Do Nothing sets VoiceOver to ignore changes in text attributes when reading text.  Play Tone sounds a light tone when you encounter text in a different font or style than what VoiceOver was just reading.  Speak Attributes speaks the text attributes at the beginning of the text with different attributes. For example, “bold 15 point” or “12 point Helvetica.” You hear only the differences from the previous text, so if both sentences use the same font, you hear only the size or style difference. Setting Navigation Options The Navigation pane of VoiceOver Utility, shown below, provides settings for how the VoiceOver cursor navigates websites and for using the VoiceOver cursor in conjunction with the keyboard and mouse, together or separately.Chapter 6 VoiceOver Utility and Preferences 53 Setting Website Navigation Options The VoiceOver cursor typically moves linearly across webpages, from upper left to lower right. Depending on how a webpage was designed, the VoiceOver cursor may seem to move randomly when you navigate in this way. VoiceOver provides some options for improving the navigation experience. “Group items in web pages” organizes a webpage into related groups of information. For example, all the song titles in a list of hot tunes, or an image with an excerpt of a news article. When you choose this option, VoiceOver identifies these as a group. You can skim quickly through groups until you hear one that interests you. Each group of information is treated as a content area, so you use the VoiceOver command ControlOption-Shift-Down Arrow to interact with the contents. When you click a link on a webpage, a new webpage opens and the VoiceOver cursor goes to the top of the HTML content area. You don’t have to interact with it to read the contents. However, when you type an address in the address field and press Return, the VoiceOver cursor stays in the address field of the newly loaded page. If you want it to start in the HTML content area on a new webpage, select the “VoiceOver cursor moves to newly loaded web page” checkbox. Images with no descriptions can slow down navigation and aren’t helpful if you can’t see them. You can choose options in VoiceOver to skip images, or to skip images without a description. You should be aware, though, that sometimes images are actually links, so if you avoid them completely, you could be missing something important on a webpage. For more information about using VoiceOver with Safari to surf the Internet, see “Using the Safari Web Browser” on page 68. Setting VoiceOver Cursor Options When you use the mouse, you click an item to select it. You can also use the Tab key to move keyboard focus to some items to select them, including items in the view browser of the Finder window. VoiceOver links the keyboard focus and the VoiceOver cursor together to simplify navigation for VoiceOver users. This is called cursor tracking. You can customize how you use the VoiceOver cursor in conjunction with the keyboard and the mouse. You might find it convenient to keep them together as a single unit, or use them separately. Either way, VoiceOver Utility provides options you can set to fit with your specific working style.54 Chapter 6 VoiceOver Utility and Preferences You can choose any combination of tracking options shown on the Navigation pane of VoiceOver Utility. The text selection tracking settings apply when you are interacting with text in a document. When you edit or create documents or enter text in a text box, you are interacting with text. Experiment to see which combination works best for you. For more information about using the VoiceOver cursor, mouse, and keyboard independently, see “Advanced Cursor Tracking” on page 79. Customizing Voices VoiceOver includes a variety of voices so that you can choose the ones that work best for you. Several companies also offer additional voices, available separately, that work with VoiceOver. You can use the Voices pane of VoiceOver Utility, shown below, to set your preferences for voices, rate of speech, pitch, and volume. Using Different Voices VoiceOver automatically uses a single default voice to speak what it reads. However, you can choose different voices to speak different types of information. If only the Default Voice appears in the Voices pane, click the disclosure triangle to reveal additional options. The triangle is called the “Show Additional Voices” or “Hide Additional Voices button” depending on its state. Whenever you see a collapsed disclosure triangle, you can click it to reveal more information. You can set different voices for these types of information:  Default Voice: This voice is used for everything spoken in VoiceOver except any of the options you set.  Content: This voice speaks text in content areas. These can include scroll areas, lists, HTML content areas, and documents.Chapter 6 VoiceOver Utility and Preferences 55  Status: This voice lets you know the current state of buttons and other controls. For example, the status of a checkbox is either “checked” or “unchecked.”  Type: This voice identifies the type of item. Some examples are button, slider, scroll area, and HTML content area.  Attributes: This voice speaks the text attributes at the beginning of text with different attributes than the preceding text. For example, “bold 15 point” or “12 point Helvetica.”  VoiceOver Menu: This voice reads the commands in the VoiceOver menu. Click the pop-up menu next to each type of information and select the voice you want to use. If you don’t make a choice, the default voice you chose will speak the information. You can practice using your VoiceOver skills to change voice settings in the exercise at the end of this chapter. Changing Rate, Pitch, and Volume Next to each voice pop-up menu are controls to adjust the rate, pitch, and volume of each voice. Type a new value in the text field or use the incrementors to change the value. Adjust the volume to a level that suits you. You can also use the volume controls to add emphasis or tune out information. For example, you may find it useful to set the volume higher for content and lower for other information. If there’s information you’d rather not hear, set the volume to 1, which is the lowest value. If you want to return all the settings to their default state, click the Reset button. But remember, this changes almost all of the settings in VoiceOver Utility, not just the pane you’re in. The only settings that won’t change are entries in the Pronunciation pane. You can practice using VoiceOver to change the rate, pitch, and volume in the exercise at the end of this chapter. For information about changing these values temporarily as you work, see “Changing Rate, Pitch, and Volume Temporarily” on page 25. Setting Visual Options It can be difficult for a person not accustomed to using VoiceOver to follow along when someone else is using it. To help them, VoiceOver provides visual feedback on the screen. 56 Chapter 6 VoiceOver Utility and Preferences The VoiceOver cursor and the caption panel are two visual aids for sighted users. You can turn these visuals off or on and set preferences for them in the Display pane of VoiceOver Utility, shown below. Magnifying the VoiceOver Cursor You can magnify the item in the VoiceOver cursor to enhance visibility, or to help you isolate it from the rest of the screen contents. The image below shows the Documents folder magnified in the VoiceOver cursor. You can use the VoiceOver cursor slider in VoiceOver Utility to adjust the magnification setting. This setting is retained when you restart your computer or log in again to your user account. You can also use a VoiceOver command to temporarily increase or decrease the magnification as you’re working. These temporary settings are in effect until you log out or restart your computer.Chapter 6 VoiceOver Utility and Preferences 57 VoiceOver uses the brace keys for this command. The left and right braces are the shifted keys to the right of the P key. To increase or decrease the VoiceOver cursor magnification: m Press control-Option-Right brace ( } ) to increase and Left brace ( { ) to decrease the magnification. Using the Caption Panel The caption panel displays what VoiceOver is speaking so that a sighted person can read what VoiceOver is saying, and more easily follow along. The caption panel is shown below. You can use the options in the Display pane of VoiceOver Utility to change how many lines of text to display and how big the caption panel is. The larger the caption panel, the more space it takes up on the screen. If your caption panel is very large, you may want to increase its transparency so that you can see what is on the screen behind it. Moving and Resizing the Caption Panel If you can use a mouse, you can drag the caption panel to a part of the screen that works best for you. You can also use VoiceOver commands to resize and move the caption panel. The same command works for both actions, similar to the verbosity settings described previously in “Setting Visual Options” on page 55. To move or resize the caption panel: 1 Press Control-Option-Shift-F10. You hear either “resizing caption panel” or “moving caption panel.” Each time you press the command, you switch to the other setting. 2 Press Control and Option with the arrow keys to make the changes you want. If you are resizing the caption panel, the Up Arrow makes the window larger and the Down Arrow makes it smaller. If you are moving the caption panel, the arrow keys move the window in the direction of the arrow. You can press the Shift key with the arrow keys to move in smaller increments. 3 Press Escape to stop interacting with the caption panel. Changing the Caption Panel Font Size You used the brace keys to increase or decrease the magnification of items in the VoiceOver cursor. You use the brace keys to increase or decrease the font size in the caption panel. The left and right brackets are the unshifted keys to the right of the P key.58 Chapter 6 VoiceOver Utility and Preferences To increase the font size of the caption panel: m Press Control-Option-Command-Right bracket ( ] ). To decrease the font size of the caption panel: m Press Control-Option-Command-Left bracket ( [ ). The exercises at the end of this chapter will help you practice working with the caption panel and magnifying the VoiceOver cursor. Tiling Visuals For maximum visual impact, you can dim the screen so that the contents of the VoiceOver cursor stand out brightly. This is called tiling visuals. You can see the results in the image below. The screen is dim except for the magnified item in the VoiceOver cursor, which is centered on the screen. To dim the screen behind the VoiceOver cursor: m Press Control-Option-F10. When you want to return the screen to normal, press Control-Option-F10 again. If the caption panel is turned on, it is centered at the top or bottom of the screen and displayed brightly with the VoiceOver cursor while the rest of the screen is dimmed. Hiding Visuals Even when the VoiceOver cursor or caption panel are visible, there may be times when you want to temporarily hide them. You can use a VoiceOver command to hide them and then make them visible again.Chapter 6 VoiceOver Utility and Preferences 59 To turn the VoiceOver cursor and caption panel on or off: m Press Control-Option-F11. On a portable computer you may need to press Fn-ControlOption-F11. Setting Text Pronunciation You can create word substitutions so that when certain text or symbols appear, you hear a preferred word or pronunciation spoken for the text or symbol. You make these adjustments in the Pronunciation pane of VoiceOver Utility, shown below. VoiceOver comes with some standard pronunciations. You can click the Add button at the bottom of the table to add your own. The Reset button does not change the entries in the pronunciation list, but it does restore all other VoiceOver Utility settings to their original settings. If you want to remove items from the pronunciation list, use the Delete button at the bottom of the Pronunciation pane. The exercises at the end of this chapter will help you practice adding pronunciations to the list. Chapter 6 Exercises The following exercises will help you practice changing voice settings, magnifying the VoiceOver cursor and tiling visuals; moving and resizing the caption panel; and adding a pronunciation to the pronunciation list. Exercise 6.1: Using VoiceOver to Change Voice Settings In this exercise, you will use VoiceOver to navigate the Voices pane of VoiceOver Utility and change voice settings. Make sure cursor tracking is turned on before you begin.60 Chapter 6 VoiceOver Utility and Preferences 1 Press Control-Option-F8 to open VoiceOver Utility. If you’re using a portable computer and have not changed the default behavior of the function keys, press Fn-ControlOption-F8. 2 Press Control-Option-Right Arrow until you hear “Voices tab three of five.” 3 Press Control-Option-Space bar to press the Tab button. 4 Press Control-Option-Right Arrow to hear the remaining tab buttons and the headers for the columns (Voices, Rate, Pitch, and Volume). Stop when you hear “Show Additional Voice Options button.” 5 Press Control-Option-Space bar to press the button and reveal the other information types. You won’t hear them until you navigate to them. 6 Press Control-Option-Right Arrow to move across the Default Voice row. Stop when you hear “Fred. Default Voice pop-up button.” 7 Press Control-Option-Space bar to open the pop-up menu, then use the arrow keys to move up and down the list of voices. 8 Press the Return key to hear the voice you selected read a line of text. Keep sampling voices in this way until you find one you like. 9 Press Control-Option-Right Arrow to navigate to the remaining information types and make selections for these. Exercise 6.2: Using VoiceOver to Change Rate, Pitch, and Volume In this exercise, you will use VoiceOver to change the rate, pitch, and volume of the voices. Make sure cursor tracking is turned on before you begin. If you did the preceding exercise to choose voices, you can skip to step 5. 1 Press Control-Option-F8 to open VoiceOver Utility. If you’re using a portable computer and have not changed the default behavior of the function keys, press Control-OptionFn-F8. 2 Press Control-Option-Right Arrow until you hear “Voices tab three of five.” 3 Press Control-Option-Space bar to press the tab button. 4 Press Control-Option-Right Arrow to hear the remaining tab buttons and the headers for the columns (Voices, Rate, Pitch, and Volume). Stop when you hear “Show Additional Voice Options button.” 5 Press Control-Option-Space bar to press the button and reveal the other information types. You won’t hear them until you navigate to them. 6 Press Control-Option-Right Arrow to move across the Default Voice row. Stop when you hear “thirty-five rate edit text.” If this setting has been changed, you may hear a number other than 35. 7 Type a new value. Since the cursors are tracking each other, the value is already selected. When you start typing, the numbers you type replace what was there.Chapter 6 VoiceOver Utility and Preferences 61 8 Press Control-Option-Right Arrow until you hear “pitch fifty incrementor.” Again, you may hear a different value if this setting was changed. 9 Press Control-Option-Shift-Down Arrow to begin interacting with the incrementor. 10 Press Control-Option-Up Arrow or Control-Option-Down Arrow to change the value. When you stop, you hear the voice speak at the selected pitch. 11 Press Control-Option-Shift-Up Arrow to stop interacting with the incrementor. 12 Press Control-Option-Shift-Right Arrow to move to the Volume column. Use either method to change the value. Exercise 6.3: Adjusting the Caption Panel In this exercise, you will turn on the caption panel and then change its transparency, font size, and location. 1 Press Control-Option-F8 to open VoiceOver Utility. 2 Press Control-Option-Right Arrow until you reach the Display tab, then press ControlOption-Space bar to open the Display pane. 3 Press Control-Option-Right Arrow until you reach the Show Caption Panel checkbox. If it’s unchecked, press Control-Option-Space bar to check it. The caption panel immediately appears at the bottom of the screen. 4 Press Control-Option-Shift-Right Arrow until you reach the Caption Panel Transparency slider. 5 Press Control-Option-Shift-Down Arrow to begin interacting with the slider. 6 Press Control-Option-Right Arrow to make the caption panel more transparent, so you can see the window behind it. 7 When the transparency is at a level you like, press Control-Option-Shift-Up Arrow to stop interacting with the slider. Notice the caption panel doesn’t block as much of the screen. 8 To position the caption panel somewhere other than the center of the desktop, press Control-Option-Shift-F10 until you hear “moving caption panel.” Then press ControlOption-Down Arrow to move the caption panel toward the bottom of the screen.62 Chapter 6 VoiceOver Utility and Preferences 9 When you’re finished moving the caption panel, press the Escape key. Note: You can also use this exercise to practice resizing the caption panel. Press Control-Option-Shift-F10 until you hear “resizing caption panel.” The Up and Down arrows add height and the Left and Right arrows add width to the caption panel. Exercise 6.4: Magnifying the VoiceOver Cursor and Tiling VoiceOver Visuals In this exercise, you will practice using VoiceOver commands to magnify the VoiceOver cursor and isolate the VoiceOver cursor in the center of the screen. The brace keys you use for this command are the shifted keys to the right of the P key. Note: You can use the VoiceOver Menu Magnification slider in the Display pane of VoiceOver Utility to set this level permanently. Using VoiceOver commands as you work maintains the setting only until you log out of your user account or shut down your computer. 1 With VoiceOver turned on, press Control-Option-Shift-Right brace ( } ) to increase the magnification. Each time you press the command, the magnification increases. 2 Press Control-Option-Shift-Left brace ( { ) to decrease the magnification. Stop when the magnification is at a comfortable level. 3 Press Control-Option-F10 to dim the screen and show the contents of the VoiceOver cursor in the center of the screen. 4 Press Control-Option-Right Arrow to navigate around the screen. Notice that the contents of the VoiceOver cursor are always in the center of the screen, regardless of where the VoiceOver cursor is actually located. 5 Press Control-Option-F10 again to return the screen to normal. 6 Press Control-Option-Shift-Left brace ( { ) until the magnification returns to one, the normal setting. Exercise 6.5: Adding Pronunciation to the VoiceOver Dictionary In this exercise, you will add a word to the VoiceOver pronunciation dictionary so that it is spoken the way you prefer. Think of a word or term that you would like to use as an example. If your name has a unique pronunciation, you may want to use it instead of the word provided in the exercise. 1 Press Control-Option-F8 to open VoiceOver Utility. 2 Press Control-Option-Right Arrow until you hear “Pronunciation tab five of five.” 3 Press Control-Option-Space bar to click the tab button and open the Pronunciation pane. 4 Press Control-Option-Right Arrow until you reach the Add button, then press ControlOption-Space bar to click the button. A new dialog opens for you to enter the new pronunciation.Chapter 6 VoiceOver Utility and Preferences 63 5 The first line of the dialog has a text field. Press Control-Option-Right Arrow once to reach the text field, then type the word you chose. If you don’t have a word to add, type ASCII with all capital letters. 6 Press Control-Option-Right Arrow until you reach the Pronunciation text box, then type a phonetic spelling for your word. For example, if you are using ASCII, you could type askee. 7 Press Control-Option-Right Arrow to go to the next line, where you choose applications in which you want to use this pronunciation. The default setting is to use the new pronunciation for all applications. If this is what you want, you don’t need to do anything else here. If you want to use the new pronunciation only for a specific application, click the Applications pop-up menu and choose it from the menu. Only open applications are listed in the menu. 8 Press Control-Option-Right Arrow to go to the Ignore Case checkbox. This checkbox is selected. If you want to use the new pronunciation only for case-specific instances, click the checkbox to deselect it. 9 Press Control-Option-Right Arrow until you reach the Save button, then click it. Your pronunciation is now included in the list of terms in the Pronunciation pane of VoiceOver Utility. You can interact with the contents of the list to hear the items it contains.7 64 7 Web Browsing and Email Mac OS X comes with an email application and web browser that you can use with VoiceOver. You can use the Mail and Safari applications to send and receive your email and surf the Internet. This chapter gives you information to help you connect to the Internet and to help you use VoiceOver with Mail and Safari. Connecting to the Internet When you set up your new computer, Setup Assistant asks you questions about your Internet Service Provider. If you already have Internet access set up, you can start using Mail and Safari right away. If you skipped the Setup Assistant process or didn’t start with a new computer, you can enter the necessary information in Network preferences. To open Network preferences: 1 Press Control-Option-D to go to the Dock. 2 Press Control-Option-Right Arrow until you hear “System Preferences,” then press Control-Option-Space bar. 3 Press Control-Option-Right Arrow until you hear “Network” or press Control-Option-I to open the Item menu and locate it. 4 Press Control-Option-Space bar to open Network preferences.Chapter 7 Web Browsing and Email 65 The Network preferences window, shown below, has two pop-up menus at the top. In the Location pop-up menu, you choose the configuration you’re setting up. If you always use your computer in the same location and connect the same way, you can just leave the location set to Automatic. If you want to create different connection settings for different locations, choose New Location or Edit Locations and use the dialog that opens to make the necessary changes. In the Show pop-up menu, you can choose the type of information you want to view in the table below it. Network Status is on by default, and the table shows the status of your network connection if you have one, your modem if you have one, and any other connection information. Choose your connection method from the pop-up menu to set up your connection. Before you close the window or quit System Preferences, click the Apply Now button at the bottom of the window. If you don’t, a dialog appears, asking if you want to save your changes. If you need more help getting set up, go to the bottom of the Network preferences window, below the table, and click the “Assist me” button for guided setup assistance.66 Chapter 7 Web Browsing and Email Using Mac OS X Mail With the Mail application in Mac OS X, you can conveniently organize, read, and send email. The toolbar at the top of the Mail window includes a search field so that you can quickly locate email messages by subject, words in the text, sender or recipient, and date sent or received. The Mail window is organized like a Finder window, with your inbox and any other mailboxes you create in the left column. VoiceOver calls this the “mailboxes outline.” The contents of the folder selected in the mailboxes outline appear in a messages table in the top half of the right column. When you select one of these messages, its contents are displayed in the lower part of the right frame, called a “message content scroll area.” The first time you open Mail, the Mail Setup Assistant appears to help you set up your email account. You should know the name of the incoming and outgoing mail servers that your Internet Service Provider uses, whether your email account is POP or IMAP, and your email user name and password. If you need help learning how to set up or use Mail, choose Help > Mail Help from the menu bar. The Mail Toolbar The toolbar at the top of the Mail window contains buttons to help you manage your email. You can use these buttons to delete selected messages, label a message as junk, start a new message, reply to a message, get mail, and search. Opening Collapsed Folders in the Mailboxes Outline The mailboxes outline on the left side of the Mail window is a lot like the sidebar in the Finder. It contains an Inbox folder that lists your email accounts, separate folders for mail you sent, and any folders you set up to help you manage your email. Just like in the Finder, you select a mailbox in the mailboxes outline, its contents are displayed in the messages column on the right. Some folders in the mailboxes outline have a triangle next to them so that you can collapse or expand them. You can also use a VoiceOver command to expand a folder and access its contents. The folder contents are shown indented below the folder, just like the Finder’s list view. To expand or contract a disclosure triangle: m Press Control-Option-Backslash (\).Chapter 7 Web Browsing and Email 67 Reading Email Because the Mail window is similar to a Finder window, you can use the same skills discussed in “Navigating Finder Windows” on page 37. You interact with the contents of the mailboxes outline, select a mailbox, and stop interacting. Then you do the same in the messages table to select the message you want to read. To speed up the process, VoiceOver provides a command to jump the VoiceOver cursor from the messages list to the message contents and back again. If you need more explicit instructions, review “Using List View” on page 38. To open an email message: 1 Open the Mail application by clicking the Mail icon in the Dock. 2 Navigate to the mailboxes outline and select a mailbox or folder. Use Control-OptionShift-Down Arrow and Control-Option-Shift-Up Arrow to begin interacting and stop interacting with the contents. 3 Press Control-Option-Right Arrow to move to the messages table. Remember you need to interact with the contents to read the messages in the table. 4 Press Control and Option with the arrow keys to move across or up and down each row of messages. For example, if you want to view messages by sender, move to the From column and press Control-Option-Down Arrow to move down the column. Note: You can also press Control-Option-R to read the entire row. 5 When you locate an email message you want to read, press Control-Option-J. The VoiceOver cursor jumps to the message content scroll area and begins to read the message. 6 When you’re finished reading, press Control-Option-J to jump back to the message list. Note: You can also use regular VoiceOver window navigation to move to the contents of the email message in the message content scroll area, and you can double-click an email in the message list with the mouse to open the message in a separate window. Controlling Speech As VoiceOver reads the text of the message, you can pause the speaking or repeat what was spoken. To pause VoiceOver speaking: m Press the Control key. Press the Control key again to resume. If you haven’t moved the VoiceOver cursor, or used another VoiceOver command, VoiceOver will continue reading where it left off. To hear what was last spoken repeated: m Press Control-Option-Z. After VoiceOver repeats the previous spoken text, it continues reading where it left off.68 Chapter 7 Web Browsing and Email Addressing a Message Names in your address book appear in the To, CC, and Bcc fields as menu buttons in the Mac OS X Mail application. The address menu buttons function like pop-up menus or contextual menus. In addition to listing all the addresses for an individual or organization, they also list actions you can perform for the address, such as editing it, removing it from the list, opening it in Address Book, creating a Smart Mailbox, and more. To address a Mail message: 1 Open the Mail application and press Control-Option-Right Arrow until you hear “New button.” 2 Press Control-Option-Space bar. A new mail message opens in a separate window. 3 Press Control-Option-Right Arrow until you hear “blank To edit text.” 4 Type the first few letters of the recipient’s name. You hear the name and email address of the first name that matches what you typed. If more than one address is available for the recipient, you hear “Mail has new window” and a list of addresses for that person appears. Press Control-Option-Down Arrow to find the one you want. 5 Press the comma (,) key to enter the address and add another address. You can add as many addresses in the field as you want. If you need to delete an address you just entered, press the Delete key once to highlight the address and a second time to delete it. 6 Press Return to move to the next text field. Note: If you start typing an email address that is already in your address book, pressing Return adds the entire address to the To field. Press Return again to move to the next text field. Using the Safari Web Browser Mac OS X includes Safari, a web browser. The Safari window has navigation buttons across the toolbar at the top, a text field where you can type an Internet address, and a Google search field. Below the toolbar are buttons you click to see all your bookmarks and those you use often. Navigating Websites With VoiceOver VoiceOver provides three ways to navigate websites:  You can move the VoiceOver cursor in a linear way, progressing across or down the website by moving from item to item on the page. This method provides excellent control but may slow down navigation if the page contains many items.Chapter 7 Web Browsing and Email 69  You can select a preference in the Navigation pane of VoiceOver Utility to navigate by group. The VoiceOver cursor moves from one group of information to the next, and you interact with the group if you want to read its contents. This method speeds up navigation and allows you to quickly survey the contents of a page.  You can use the Link Chooser menu. The Link Chooser menu lists all the links on a page, which lets you quickly jump to the link you want. You can choose website navigation options in the Navigation pane of VoiceOver Utility, shown below. For more information about these options, see “Setting Website Navigation Options” on page 53. Websites often contain a mix of links, graphics, and sometimes moving images. Every website is different, so you’ll need to explore each website to learn how it’s arranged. Very often, websites are laid out in a table to help with alignment of text and graphics. Depending on the way content was created or designed, all elements on a website might not be accessible. Some webpages organize information in frames. Frames are often used to separate different sections of the page. Sometimes one frame has links in it that update the contents of other frames. For example, you might click a link in one frame to display information in another frame. VoiceOver provides commands to let you move between frames so that you can access this type of webpage. To navigate from one frame to another: m Press Control-Option-Command-M to move to the next frame, and Control-OptionCommand-Shift-M to move back to the previous frame. Using the Link Chooser Menu The Link Chooser menu does for webpages what the Item Chooser menu does for windows. By listing all the links on a webpage, you can quickly find the one you’re looking for and select it. If you don’t know the exact name of the link, just type a keyword to find links that contain the word. For example, if you suspect there’s a link on the page for customer support or technical support, type support to find likely links. To open the Link Chooser menu: m Press Control-Option-U.70 Chapter 7 Web Browsing and Email When you select a link in the Link Chooser menu, the VoiceOver cursor goes to the link on the webpage but doesn’t activate the link. This gives you a chance to determine whether you really want to go there before you actually switch to a new webpage. You can use the Link Chooser menu in any document or file that contains HTML links, including Mac Help and VoiceOver Help. To practice using the Link Chooser menu, see the exercise at the end of this chapter. Navigating Website Images Websites may contain many images. If a website contains “alt tags,” or text that describes each image on the page, you may find it useful to navigate to these images. If a website has unidentified images, you may want to ignore them. You can set your preferences for navigating images in the Navigation pane of VoiceOver Utility. Note: Some images contain links, so you may miss some links on a page if you choose not to navigate images. Chapter 7 Exercises The exercises that follow will help you practice reading email and navigating websites with Mail and Safari. Exercise 7.1: Opening and Reading an Email Message In this exercise, you will open the Mail application in the Dock, navigate the Mail window to the message list, and go to the message text to read it. You must already have Mail set up with an email account before you begin this exercise. 1 Press Control-Option-D to open the Dock, then press Control-Option-Right Arrow until you reach the Mail icon. 2 Press Control-Option-Space bar to open the Mail window. 3 Press Control-Option-Right Arrow until you hear “mailboxes outline.” This area is similar to the sidebar in a Finder window. Press Control-Option-Shift-Down Arrow to interact with the contents of the mailboxes area. 4 Press Control-Option-Down Arrow to move through the folders and mailboxes in this area. The contents vary depending on how many email accounts you have and any special folders you set up to manage your email messages. 5 When you reach your email account in the Inbox, press Control-Option-Shift-Up Arrow to stop interacting with the mailboxes outline. 6 Press Control-Option-Right Arrow to reach the messages table and press ControlOption-Shift-Down Arrow to interact with it.Chapter 7 Web Browsing and Email 71 7 Press Control-Option-Right Arrow to move across the first row in the message table. Depending on the preferences you set for Mail, you may have columns for the status of the menu, who the sender is, the subject, and date and time information. You can also move down a column, so if you want to read mail from a particular sender, navigate to the From column and then use the Up and Down arrows instead of the Left and Right arrows. 8 After you locate a message to read, press Control-Option-J to move to the message contents below the message table. Notice that VoiceOver begins reading the text automatically. 9 Press Control to pause the speech and Control again to resume. 10 Press Control-Option-Right Arrow and notice that VoiceOver stops reading the text automatically, and you are now interacting with the text. You can use the text commands described in “Reading Text” on page 25 or in “Reading a Document” on page 72 to read a line or sentence at a time. For this exercise, you will return to reading the message contents as a whole. 11 Press Control-Option-Up Arrow to stop interacting with the text, then press ControlOption-A to start reading the message contents from the start again. 12 When you’re finished reading the email message, press Control-Option-J to return to the messages table. Exercise 7.2: Using the Link Chooser Menu In this exercise, you will open a page in Safari or VoiceOver Help, open the Link Chooser menu, and find a link. 1 Press Control-Option-D to open the Dock, or press Control-Option-Question mark (?) to open VoiceOver Help. 2 If you are using Safari, press Control-Option-Right Arrow until you hear “Safari,” then press Control-Option-Space bar to open a webpage in Safari. 3 Press Control-Option-Left Arrow to move to the HTML content area. Note: This is a shortcut to bypass all the toolbars and tabs that may be at the top of a browser window. Technically, the VoiceOver cursor is actually navigating backward. 4 Press Control-Option-Shift-Down Arrow to interact with the HTML content area. 5 Press Control-Option-U to open the Link Chooser menu. 6 Type a word that you’re likely to find in a link on the webpage. In Safari, if your start page is set to an Apple website, try Mac. If you’re in VoiceOver Help, type commands. 7 Press Control-Option-Down Arrow to find the link you want, then press Control-OptionSpace bar. The Link Chooser menu closes and the VoiceOver cursor moves to the link on the page that you selected. 8 Press Control-Option-Space bar to activate the link and open the linked page.8 72 8 Reading and Editing Text This chapter provides information about reading, typing, and editing text. Text is found in many places on your computer: in windows and dialogs, in content areas like webpages and help files, and in documents. You can use the navigation skills covered earlier to navigate to text areas and interact with them. This chapter teaches you how to use the VoiceOver text commands effectively. Reading a Document When you open a document, it opens in the application that created it or in another compatible application. When the document opens, you often have to navigate through the application’s toolbar and text rulers that appear. A tip for quickly accessing the content is to press Control-Option-Left Arrow to navigate backward to the last item on the page, which is typically the text area. Note: If while navigating, you find yourself stuck in a text ruler full of tab markers, it’s easy to get out. Press Control-Option-End (or Control-Option-Fn-Right Arrow on a portable computer) to go to the last visible item on the page, which is usually the text area. When you reach the text area in a document, press Control-Option-A to begin reading the text. You don’t have to interact with the text to read it. Press Control to pause the reading, and press it again to continue where VoiceOver left off. If you need to hear the last phrase repeated, press Control-Option-Z. VoiceOver repeats the last sentence or phrase and continues reading the rest of the text. When you press Control-Option-Shift-Down Arrow to interact with the text area, Control-Option-A reads from where the VoiceOver cursor is located to the bottom of the text area. Use the VoiceOver commands in “Working With Text” below for even greater control of the VoiceOver cursor.Chapter 8 Reading and Editing Text 73 Working With Text When you’re writing and editing in the text area, you are most likely working word-byword or in small chunks of text. You can use the following commands to read the next or previous character, word, line, sentence, or paragraph:  Word: Control-Option-Right Arrow or Left Arrow  Character: Control-Option-Shift-Right Arrow or Left Arrow  Line: Control-Option-Down Arrow or Up Arrow  Sentence: Control-Option-Page Down or Page Up  Paragraph: Control-Option-Shift-Page Down or Page Up Locating the Insertion Point When you work with text, the keyboard focus is represented by a blinking vertical line, also known as an insertion point. This shows you where the next character you type is going to appear. As you type, the insertion point is always to the right of the character you just typed. VoiceOver extends this experience to how VoiceOver speaks characters and words. VoiceOver speaks the character or word as it passes over it. If you’ve used another screen reader, you may be accustomed to a different experience. With a little practice, it doesn’t take long to get familiar with this new orientation. To figure out where the insertion point is in relation to a word or character, remember that it always rests on the other side of what VoiceOver just spoke. This is important to remember, because if you move backward over a character or word, the VoiceOver cursor and the insertion point are focused before the character or word. Try the exercise at the end of this chapter to practice working with text. Navigating in a Document In addition to navigating within the text itself, you can use VoiceOver commands to navigate to the beginning or end of the document. Remember that if there is more content than can be shown in the window, the window will have scroll bars. If you use the first two commands below, the VoiceOver cursor moves only to the top or bottom of what’s visible in the scroll area. Use the second two commands to reach the top or bottom of all the contents of the scroll area. To move the VoiceOver cursor to the first visible word: m Press Control-Option-Home on a desktop computer or Fn-Control-Option-Left Arrow on a portable computer. To move the VoiceOver cursor to the last visible word: m Press Control-Option-End on a desktop computer or Fn-Control-Option-Right Arrow on a portable computer. To move the VoiceOver cursor to the first word, scrolling if necessary: m Press Control-Option-Shift-Home on a desktop computer and Fn-Control-Option-ShiftLeft Arrow on a portable computer.74 Chapter 8 Reading and Editing Text To move the VoiceOver cursor to the last word, scrolling if necessary: m Press Control-Option-Shift-End on a desktop computer and Fn-Control-Option-ShiftRight Arrow on a portable computer. Bookmarking a Document You can place a bookmark in a text document so that you can quickly return to a particular place. You can place only one bookmark, so the second time you set a bookmark, it replaces the first one. Bookmarks are useful for quickly returning to a particular location in a long document. To use bookmarks: m Position the VoiceOver cursor where you want to place a bookmark, then press ControlOption-Shift-1. m Press Control-Option-1 to move the VoiceOver cursor to a bookmark. Bookmarks are only temporary. If you close the document where you’ve placed a bookmark, or if you quit the application, the bookmark is not saved. Cursor Tracking in Text Areas VoiceOver Utility has unique cursor tracking options for working with text. If you want the VoiceOver cursor and insertion point to track each other while you’re working with text, select both of the text selection tracking options in the Navigation pane of VoiceOver Utility, shown below. With these options selected, anything you select with the keyboard will also be in the VoiceOver cursor. Selecting Text To copy, paste, or delete text, you need to select the text first. You use standard Mac OS X keyboard shortcuts to select text. To select one character at a time: m Press Shift-Right Arrow or Shift-Left Arrow to select the character to the right or left of the insertion point. To select one word at a time: m Press Shift-Option-Right or Left Arrow.Chapter 8 Reading and Editing Text 75 To select the text from the keyboard cursor to the end or beginning of the line: m Press Shift-Command-Right or Left Arrow. You can use the VoiceOver command Control-Option-F6 to verify exactly what is selected. Important: When text is selected, you can easily delete it by pressing any key on the keyboard. This is useful if you want to replace the selected text with the words you type. If you accidentally delete the text, use the keyboard shortcut Command-Z to undo your mistake. This correction works only if it occurs immediately after the mistake. This shortcut works in many applications and in many situations. It’s always worth trying it to see if it can correct a mistake. Hearing Text Attributes The font, size, and style of text adds meaning to a formatted document. “Adjusting Text Attribute Settings” on page 52 discussed how to set the way VoiceOver announces changes in text attributes as text is being read. When you’re working with text, you can use a VoiceOver command to hear text attributes for selected text. To hear the attributes of selected text: m Press Control-Option-T. You won’t hear the attributes if the text is not selected. Use one of the previously discussed text selection commands in “Selecting Text” above. Using TextEdit With VoiceOver TextEdit is the powerful word processing application built in to Mac OS X. TextEdit is fully accessible with VoiceOver, and you can use it to open, read, and edit many documents created by other word processing applications, including Microsoft Word. You use all the standard VoiceOver commands to navigate the TextEdit window and interact with toolbars, menus, and text. You can also use TextEdit Help to learn how to use the many powerful features and keyboard shortcuts in TextEdit. A few tips are provided here to get you started. Checking Spelling in TextEdit TextEdit has a preference you can set that underlines misspelled words. If you can’t see the underlining, you can still use TextEdit’s spell check feature to check spelling at any time. A combination of TextEdit keyboard shortcuts and VoiceOver commands makes this a simple task. To check spelling in a document: 1 Move the VoiceOver cursor to an edit text area.76 Chapter 8 Reading and Editing Text 2 Press Command-semicolon (;) to hear the first misspelled word. Sometimes words are underlined that the computer doesn’t recognize, but they’re not actually misspelled. Continue pressing this command until you hear a word that needs to be corrected. 3 Press Control-Option-Shift-M to open a contextual menu for the misspelled word. At the top of the menu are suggested spellings or alternate words. Below those are other options, including a dictionary so you can find the definition of the word. 4 Navigate to the menu choice that you want and press Control-Option-W-W to hear its spelling, or Control-Option-W-W-W to hear it spelled phonetically. 5 Press Control-Option-Space bar to select it. If you choose a corrected spelling from the menu, the new spelling replaces the old one. If you don’t hear an acceptable correction, press Escape to close the menu. Then press Control-Option-Shift-F4 to move the VoiceOver cursor to the misspelled word and edit the word manually. Changing Tab Stops in TextEdit At the far right end of the toolbar are tab stop buttons you can press to add a new tab stop. You can click these buttons or you can add a tab stop at any point when the VoiceOver cursor is in the ruler. If you deselected the Show Ruler checkbox in TextEdit Preferences, you won’t find these buttons or the ruler. To add or change a tab stop: 1 Press Control-Option-Space bar when the VoiceOver cursor is on a tab stop button or in the ruler. In either case, a dialog appears. 2 Press Control-Option-Right Arrow to go to the pop-up menu labeled Right Tab Stop. 3 Press Control-Option-Space bar to open the pop-up menu list and choose the type of tab stop you want to add. 4 Press Control-Option-Right Arrow until you reach the edit text field for the ruler marker value. 5 Type the measurement for where you want to place the tab stop. For example, 6.25 indicates six and one quarter inches on the ruler. 6 Press Control-Option-Right Arrow until you reach the Ok button and click it. You can also drag existing tab stop markers along the ruler. To drag an existing tab stop marker to another location: 1 Navigate to the ruler and locate the tab stop marker you want to move. 2 Press Control-Option-Shift-Down Arrow to interact with the marker. 3 Press Control-Option-Left Arrow or Right Arrow until the marker is where you want it. 4 Press Control-Option-Shift-Up Arrow to stop interacting with the marker.Chapter 8 Reading and Editing Text 77 Chapter 8 Exercises The exercises that follow will help you practice locating the insertion point, selecting text, and saving a document. The first exercise tells you how to open a new document in TextEdit. You can use the same document for all the exercises. Exercise 8.1: Following the Insertion Point In this exercise, you will use Spotlight to find the TextEdit application, create a new document in TextEdit, and practice locating the insertion point. 1 Press Control-Option-M three times to open the Spotlight menu. 2 Type text. 3 Press Control-Option-Down Arrow until you hear “TextEdit top hit.” 4 Press Control-Option-Space bar to open the TextEdit application. A new TextEdit window opens. 5 Press Control-Option-Left Arrow to go backward to the text area and skip all the items in the toolbar and text ruler. 6 Press Control-Option-Shift-Down Arrow so you can type in the text area. 7 Type leaf. The VoiceOver cursor and insertion point are focused to the right of the f. 8 Press Control-Option-Shift-Left Arrow to move back one character and you hear “f” again because now the VoiceOver cursor moved over the f, reading as it went. The insertion point is now blinking on the left of the f. 9 Press Control-Option-Shift-Left Arrow again to move back one character and you hear “a” and the insertion point is now to the left of the a. 10 Continue moving forward and back using Control-Option-Shift-Left Arrow and ControlOption-Shift-Right Arrow to move a character at a time. As you move back and forth, you will understand how VoiceOver communicates the location of the insertion point. Exercise 8.2: Cutting and Pasting Text In this exercise, you will use a Text Edit document to select text and place a bookmark in the text. You can use the same document you created in the previous exercise. 1 Type some text in the document. Make sure you include this sentence: The sun shone hot on the pavement. 2 Press Control-Option-Page Down or Page Up to navigate the text by sentence until you hear “the sun shone hot on the pavement.” If you have a portable computer, remember to press Fn-Control-Option-Up Arrow or Down Arrow. 3 The insertion point is at the beginning of the sentence, so press Shift-Option-Right Arrow until every word in the sentence is selected.78 Chapter 8 Reading and Editing Text If you make a mistake, press Control-Option-Right Arrow to deselect the text, then try again. 4 With the sentence selected, press Command-X to cut the text. The text disappears from the document and is stored on the computer’s clipboard, which is not visible on the screen. 5 Navigate to the end of the text using any of the navigation methods you learned in this chapter. For example, pressing Control-Option-Shift-End on a desktop computer or FnControl-Option-Shift-Right Arrow on a portable computer takes the VoiceOver cursor to the last word in the text area. 6 Press Command-V to paste the sentence you cut. 7 Press Control-Option-S to hear the sentence to verify that it was pasted correctly. Exercise 8.3: Saving a Document In this exercise, you will save the document you created in the previous exercises. Mac OS X uses the same Save dialog for all of its applications, so learning how to navigate this dialog is important. 1 Press Command-S to use the keyboard shortcut for saving a document. The Save command is in the File menu in the menu bar. The first time you save a document, the Save dialog appears. If you are saving changes to a document that has already been saved, the changes are saved, but a dialog doesn’t appear. 2 Create a name for the document. Press Control-Option-Right Arrow to go to the edit text field and type the name you want to use. A suggested name is in the text field and is highlighted. When you start typing, you erase the suggested name and replace it with your own. 3 Press Control-Option-Right Arrow until you reach the pop-up menu next to Where. 4 Press Control-Option-Space bar to open the pop-up menu so you can choose where you want to save the document. Choose a folder from the list. This pop-up menu shows folders that you use frequently. If you don’t find the location you want, you can press the disclosure button again to open a navigation window. For this exercise, any folder in the pop-up menu will do. 5 Press Control-Option-Right Arrow until you reach the Save button and press ControlOption-Space bar to click it.9 79 9 Advanced Navigation Skills This chapter explains how to navigate using the VoiceOver cursor, keyboard cursor, and mouse pointer—separately and together. Using the keyboard, mouse pointer, and VoiceOver cursor independently can give you more flexibility as you work. You’ve already been introduced to cursor tracking, but this chapter provides detailed information. This chapter also provides information about making the mouse more accessible. Full Keyboard Navigation and VoiceOver Mac OS X has built-in keyboard navigation separate from VoiceOver. Users who don’t use VoiceOver can still use their keyboards to navigate menus, select checkboxes and radio buttons, press buttons, and enter text in text fields. Full keyboard access and VoiceOver work together seamlessly, so you can take advantage of all the built-in keyboard shortcuts along with the powerful commands in VoiceOver. Try the exercise at the end of this chapter to practice using full keyboard navigation to switch between applications. You can find more information about using full keyboard access in Mac Help and in the Keyboard & Mouse preferences pane in System Preferences. Advanced Cursor Tracking When you use the keyboard to move to a control, the keyboard is “focused” there. The item is highlighted, or a blinking i-beam cursor appears in a text document to show where the next keyboard action will occur. The mouse pointer and the keyboard focus are closely linked; for example, when you use the mouse to select a file, the keyboard focus also moves to the file.80 Chapter 9 Advanced Navigation Skills VoiceOver preferences are set so that the keyboard focus and the VoiceOver cursor track each other. This is called cursor tracking. Wherever you move the keyboard focus with the Tab or Arrow keys using full keyboard navigation, the VoiceOver cursor follows. When you move the VoiceOver cursor, the keyboard focus follows if it can. The keyboard can’t move to every item on the screen the way VoiceOver can. You can also work with cursor tracking turned off. When you turn off cursor tracking, you can leave your keyboard focus in one place and move the VoiceOver cursor around to read a dialog that just appeared, check email, or perform other tasks while your keyboard focus stays where you left it. With a simple command, you quickly bring them back together. You can do the same for the mouse. For example, you could use the mouse or Mouse Keys to locate something on the screen, and then use a command to move the VoiceOver cursor to where the mouse pointer is located. Using the Cursor Control Keys You can use the mouse, keyboard, and VoiceOver cursor to navigate to text and objects that appear on your screen. VoiceOver uses three function keys to describe the keyboard, VoiceOver cursor, and mouse pointer. Note: If you use a portable computer and have not changed the default settings for the function keys in Keyboard & Mouse preferences, you must press the Fn key to use these keys for VoiceOver commands. See “Using Function Keys on Portable Computers” on page 18. F3—The VoiceOver Cursor Key  Press Control-Option-F3 to hear a description of the item in the VoiceOver cursor. This could be a control, text in a document, an HTML content area, and more. The description includes the current state of the item. For example, you might hear that the checkbox is selected, or hear the value settings of a slider. F4—The Keyboard Key  Press Control-Option-F4 to hear a description of the item on which the keyboard is focused. The description includes the current state of the item, and, if it applies, whether it is enabled or disabled.  Press Control-Option-Shift-F4 to move the VoiceOver cursor to where the keyboard is focused. When you move the keyboard focus, the VoiceOver cursor remains where you moved it. Use this command when cursor tracking is turned off.  Press Control-Option-Command-F4 to move the keyboard focus to the VoiceOver cursor. When you move the keyboard focus again, the VoiceOver cursor does not move with it. Use this command when cursor tracking is turned off.Chapter 9 Advanced Navigation Skills 81 F5—The Mouse Key  Press Control-Option-F5 to hear a description of what is under the mouse pointer.  Press Control-Option-F5 a second time to hear the location of the mouse pointer as x and y coordinates. The origin point is the top-left corner of the main display, where the Apple menu is located.  Press Control-Option-Shift-F5 to move the VoiceOver cursor to where the mouse pointer is located. When you move the mouse, the VoiceOver cursor remains where you moved it. Use this command when cursor tracking is turned off, or if you don’t have mouse tracking options turned on in VoiceOver Utility.  Press Control-Option-Command-F5 to move the mouse pointer to the VoiceOver cursor. When you move the mouse again, the VoiceOver cursor does not move with it. Use this command when cursor tracking is turned off, or if you don’t have mouse tracking options turned on in VoiceOver Utility. Try the exercise at the end of this chapter to practice moving the cursors independently. Using the Mouse With VoiceOver VoiceOver and Mac OS X provide several options to help you use the mouse. Mouse Settings in VoiceOver Utility The Verbosity pane of VoiceOver Utility includes two very useful settings for using your mouse with VoiceOver: Select the “Speak text under mouse after delay” checkbox so that you can hear the text under the mouse pointer. If you have some vision but have trouble reading text, this is one way to use the mouse selectively to read. VoiceOver follows your punctuation settings when it reads text under the mouse. So, if you want to hear text attributes, you also hear them for the text under the mouse pointer. You can move the slider next to the checkbox to set the amount of time you want VoiceOver to wait before speaking. Move the slider left to shorten the delay and to the right for a longer delay. The “Announce when mouse cursor enters a window” checkbox sets VoiceOver to announce the name of the window the mouse enters. This can be useful if you have little or no vision but want to use the mouse to locate items on the screen. When you move the mouse to a new window, VoiceOver says “entering” and the name of the window.82 Chapter 9 Advanced Navigation Skills Making the Mouse Pointer More Visible In Mac OS X, you can increase the size of the mouse pointer so that you can locate it more easily on the screen. When the pointer changes to an insertion point, crosshair, or any other shape, these shapes are also magnified. To increase the size of the mouse pointer: 1 Click the System Preferences icon in the Dock or choose Apple menu > System Preferences to open System Preferences. 2 Click the Mouse button. On a portable computer, click Mouse & Trackpad. 3 Move the Cursor Size slider to the right to make it larger. If you need to make the mouse pointer very large, you might need to practice placing the pointer correctly to activate controls. Using the Numeric Keypad to Control the Mouse If you are able to see the mouse pointer but have difficulty using the mouse, you can turn on Mouse Keys in Universal Access preferences. Mouse Keys lets you use the numeric keypad to move the pointer and click items on the screen. When Mouse Keys is turned on, you use the numeric keypad keys to move the mouse pointer. If you are using the built-in keyboard on a portable computer, press the Fn key to use the U, I, O, J, K, L, and M keys as a numeric keypad. If you have difficulty finding these keys, use the VoiceOver Keyboard Practice feature described in Chapter 3. To turn on Mouse Keys: 1 Open System Preferences and click Universal Access. 2 Click the Mouse button. On a portable computer, click the Trackpad & Mouse button instead. 3 Select the On button for Mouse Keys. The table below shows you the keys to press for a standard keyboard and a portable computer keyboard. To use the numeric keypad to control the mouse: Action Shortcuts Portable Computer Shortcuts Move up 8 8 Move down 2 K Move left 4 U Move right 6 O Move diagonally 1, 3, 7, 9 J, L, 7, 9 Click the mouse button 5 IChapter 9 Advanced Navigation Skills 83 For more information about this and other accessibility features, see Mac Help. Quickly Navigating to Content Areas VoiceOver treats the items in a window as a continuous loop, so if you are at the top of a window and press Control-Option-Left Arrow, you go to the last item in the window. You hear audible cues when you wrap to the next line, or wrap from top to bottom or bottom to top. If the VoiceOver cursor is in a webpage or a text document, the application may have a lot of controls at the top of the window, such as buttons, links, tab markers, or bookmarks. If you just want to get to the main body of the content quickly without having to key through all these items, you can avoid them by moving backward one or two places. For websites and other windows, this often places the VoiceOver cursor on the HTML content area or the text area. To move to the bottom quickly: m Press Control-Option-Left Arrow. You can also use a VoiceOver command to move to the last item on the page, which is often an HTML content area or a text area. To move to the last item on the page: m Press Control-Option-Shift-End, or Fn-Control-Option-Right Arrow on a portable computer. Chapter 9 Exercises The following exercises will help you practice using cursor navigation and full keyboard navigation. Exercise 9.1: Using Command-Tab to Switch Applications In this exercise, you’ll use a keyboard command to hear which applications are open and switch to one of them. For a better experience, you should have several applications open. 1 Press and hold the Command key. 2 Press the Tab key to hear the open applications. Each time you press Tab, you hear the next open application. Hold down the mouse button 0 M Release the mouse button Period (.) Period (.) Action Shortcuts Portable Computer Shortcuts84 Chapter 9 Advanced Navigation Skills 3 Release the keys when you hear the application you want to switch to. If the application has an open window, the window becomes active and the VoiceOver cursor moves there. If no window is open, the application becomes active and you can begin using its menu to perform actions. Exercise 9.2: Moving Cursors Independently In this exercise, you’ll move the VoiceOver cursor to a text field and start typing. Next, you’ll turn off cursor tracking and try the same thing. Notice the different experience. 1 Press Command-F5 to turn on VoiceOver. 2 Make sure the Finder is the active application. Then press Command-N to open a new Finder window. 3 Press and hold the Control and Option keys while you press the Right Arrow keys. Listen to the descriptions of items and stop when you hear “search text field.” 4 Type some text in the field. 5 Notice that you could type in the field because the keyboard and VoiceOver cursor were in the same location. Now see what happens when you turn off cursor tracking. 6 Press Control-Option-Left Arrow until you hear “list view switcher radio button.” 7 Press Control-Option-Shift-F3. You hear “disable cursor tracking.” 8 Press Control-Option-Right Arrow until you hear “search text field.” Notice that the List View Switcher button is highlighted and the search field is in the VoiceOver cursor. 9 Press the Return key. The keyboard presses the List View Switcher button and the Finder window view changes. 10 Type some text and notice that no keys register. This is because the keyboard is still on the List View Switcher button. 11 Press Control-Option-Command-F4 and start typing. Notice that the keyboard focus moves to the search text field so that you can type. 85 Appendix VoiceOver Commands You use the Control and Option keys with other keys to control VoiceOver. If you have an iBook or PowerBook computer, you may need to press the Fn key when you press a function key. Action Commands General Lock and unlock the Control and Option keys Control-Option-Semicolon (;) Turn VoiceOver on and off Command-F5 Open the VoiceOver menu Control-Option-F7 Open VoiceOver Help Control-Option-Question mark (?) Get help for an item Control-Option-H Open the Commands menu for an item Control-Option-H two times Open VoiceOver Utility Control-Option-F8 Start keyboard practice Control-Option-K Close a menu, stop an action, or exit a mode Control-Option-Escape (Esc) Tell VoiceOver to ignore the next key combination you press Control-Option-Tab Change the speech, rate, pitch, and volume Control-Option-Command-Right Arrow or Control-Option-Command-Left Arrow to move to the next or previous setting (rate, then pitch, then volume). Then press Control-OptionCommand-Up Arrow to increase and ControlOption-Command-Down Arrow to decrease. Change the amount of detail (verbosity) you hear for typing echo, punctuation, and text attributes Control-Option-V Then press the Left or Right Arrow key to choose the setting: typing echo, punctuation, or text attributes. Use the Up and Down Arrow keys to change the level for the setting. Press the Escape key to leave this mode. Magnify the item in the VoiceOver cursor Control-Option-Right brace ( } )86 Appendix VoiceOver Commands Shrink the item in the VoiceOver cursor Control-Option-Left brace ( { ) Temporarily hide or show the VoiceOver cursor and caption panel Control-Option-F11 Dim the screen, highlight the caption panel, and show the item in the VoiceOver cursor in the center of the screen (tile visuals) Control-Option-F10 Press again to return to the normal view. Resize or move the caption panel Control-Option-Shift-F10 Press again to cycle through these actions. Then use the arrow keys to resize the caption panel or move it. Press the Shift key with the arrow keys to move in smaller increments. Increase the font size in the caption panel Control-Option-Command-right bracket (]) Decrease the font size in the caption panel Control-Option-Command-left bracket ([) Turn the screen black (screen curtain) Control-Option-Shift-F11 Orientation Application summary Control-Option-F1 Application Chooser menu Control-Option-F1 two times Window summary Control-Option-F2 Window Chooser menu for the active application Control-Option-F2 two times Describe the item in the VoiceOver cursor Control-Option-F3 Describe the item that has keyboard focus Control-Option-F4 Describe the item under the mouse pointer Control-Option-F5 Describe the location of the mouse in x, y coordinates (from top-left corner of screen) Control-Option-F5 two times Click the item under the mouse pointer Control-Option-Shift-Space bar Press once for a single mouse click and two times to double-click. Describe the selected item Control-Option-F6 Read everything in the VoiceOver cursor Control-Option-A Read everything visible in the window Control-Option-Shift-W Repeat the last spoken phrase Control-Option-Z Save the last spoken phrase and the crash log to a file on the desktop for troubleshooting Control-Option-Shift-Z Navigation Move up Control-Option-Up Arrow Move down Control-Option-Down Arrow Move to previous Control-Option-Left Arrow Move to next Control-Option-Right Arrow Action CommandsAppendix VoiceOver Commands 87 Move to the top of the visible area, such as the window or text area, where the VoiceOver cursor is located Control-Option-Home On a portable computer, press Fn-ControlOption-Left Arrow. Move to the bottom of the visible area, such as the window or text area, where the VoiceOver cursor is located Control-Option-End On a portable computer, press Fn-ControlOption-Left Arrow. Move to the top of the area, such as the window or text area, where the VoiceOver cursor is located, scrolling if necessary Control-Option-Shift-Home On a portable computer, press Fn-ControlOption-Shift-Left Arrow. Move to the bottom of the area, such as the window or text area, where the VoiceOver cursor is located, scrolling if necessary Control-Option-Shift-End On a portable computer, press Fn-ControlOption-Shift-Right Arrow. Move to the top of the window Control-Option-Command-Home On a portable computer, press Fn-ControlOption-Command-Left Arrow. Move to the bottom-right corner of the window Control-Option-Command-End On a portable computer, press Fn-ControlOption-Command-Right Arrow. Move to the front the window where the VoiceOver cursor is located and make it active Control-Option-Shift-F2 Close the window where the VoiceOver cursor is located Control-Option-Command-F2 List the links on a page Control-Option-U List the items in a window Control-Option-I Move to the Dock Control-Option-D Move to the Desktop Control-Option-Shift-D Move to the menu bar Control-Option-M Move to the first status menu in the menu bar Control-Option-M two times Open the Spotlight menu Control-Option-M three times Open a contextual menu Control-Option-Shift-M Jump to a linked item (for example, from a Mail message in the Inbox to its message text) Control-Option-J Move to the next frame in an HTML content area (such as a webpage) Control-Option-Command-M Move to the previous frame in an HTML content area (such as a webpage) Control-Option-Command-Shift-M Move back, retracing the movements of the VoiceOver cursor Control-Option-Left bracket ([) Move forward, retracing the movements of the VoiceOver cursor Control-Option-Right bracket (]) Turn cursor tracking on or off temporarily Control-Option-Shift-F3 Action Commands88 Appendix VoiceOver Commands Move VoiceOver cursor to keyboard focus Control-Option-Shift-F4 Move keyboard focus to VoiceOver cursor Control-Option-Command-F4 Move VoiceOver cursor to mouse Control-Option-Shift-F5 Move mouse to VoiceOver cursor Control-Option-Command-F5 Text Read all text If you are interacting with the text, this command reads from the VoiceOver cursor to the end of the text. Control-Option-A Get text attributes Control-Option-T Add a bookmark in text Control-Option-Shift-1 Jump to a bookmark in text Control-Option-1 Read paragraph in VoiceOver cursor Control-Option-P Read next paragraph Control-Option-Shift-Page Down Read previous paragraph Control-Option-Shift-Page Up Read sentence in VoiceOver cursor Control-Option-S Read next sentence Control-Option-Page Down Read previous sentence Control-Option-Page Up Read line in VoiceOver cursor Control-Option-L Read next line Control-Option-Down Arrow Read previous line Control-Option-Up Arrow Read word in VoiceOver cursor Control-Option-W Press twice to hear the word spelled; press a third time to hear the word spelled phonetically. Read next word Control-Option-Right Arrow Read previous word Control-Option-Left Arrow Read character in VoiceOver cursor Control-Option-C Press twice to hear the phonetic character. Read next character Control-Option-Shift-Right Arrow Read previous character Control-Option-Shift-Left Arrow Move to first visible word Control-Option-Home On a portable computer, press Fn-ControlOption-Left Arrow. Move to last visible word Control-Option-End On a portable computer, press Fn-ControlOption-Right Arrow. Action CommandsAppendix VoiceOver Commands 89 Move to beginning of text, scrolling if necessary Control-Option-Shift-Home On a portable computer, press Fn-ControlOption-Shift-Left Arrow. Move to end of text, scrolling if necessary Control-Option-Shift-End On a portable computer, press Fn-ControlOption-Shift-Left Arrow. Add new tab stop (in TextEdit) Control-Option-Space bar Delete the current tab stop (in TextEdit) Control-Option-Delete Interact with tab stop (in TextEdit) Control-Option-Shift-Down Arrow Then use the Left and Right arrow keys to move the stop. Interaction Interact with an item Control-Option-Shift-Down Arrow Stop interacting with an item Control-Option-Shift-Up Arrow Perform the default action for a selected item Control-Option-Space bar Select a menu or list item Control-Option-Return Select multiple items Control-Option-Command-Space bar Turn off cursor tracking to use this command. Click the item under the mouse pointer Control-Option-Shift-Space bar Press once for a single mouse click and two times to double-click. Open or close a disclosure triangle Control-Option-Backslash (\) Read a row in a table or outline Control-Option-R Read the column header in a table or outline Control-Option-Shift-C Sort a column Control-Option-Vertical line (|) Interact with scroll bars Control-Option-Shift-S Then use the arrow keys to scroll up or down or side to side. Use Page Up and Page Down to scroll vertically one page at a time. Use ShiftPage Up and Shift-Page Down to scroll horizontally one page at a time. Resize a window Control-Option-Tilde (~) Then use the arrow keys to make the window taller, shorter, wider, or narrower. Use Shift with the arrow keys to resize in smaller increments. Move or drag a window Control-Option-Accent (`) Then use the arrow keys to move the window. Use Shift with the arrow keys to move in smaller increments. Stop scrolling, resizing, or dragging Control-Option-Escape (Esc) Action Commandswww.apple.com/accessibility/voiceover © 2005 Apple Computer, Inc. All rights reserved. Apple, the Apple logo, iPod, Mac, Macintosh, and Mac OS are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. Finder, Safari, and Spotlight are trademarks of Apple Computer, Inc. Other product and company names mentioned herein may be trademarks of their respective companies. 019-0517 Velkommen. Du ser Apple TV. Denne håndbog indeholder alle de oplysninger, du skal bruge, så du kan gå direkte fra indstilling til sofa.Indholdsfortegnelse 1. Tilslut 2. Konfigurer 7 Hvad er der i kassen? 8 Hvad du behøver 10 Kast et blik på Apple TV 12 Indstille Apple TV 18 Netværkskonfiguration 19 Oprette forbindelse til iTunes3. Klar, parat, se 4. Problemer? Ingen problemer 22 Bruge Apple Remote 23 Fjernbetjeningens funktioner i grundtræk 23 Parre Apple TV med en fjernbetjening 24 Ophæve pardannelsen mellem Apple TV og en fjernbetjening 25 Udskifte batteriet i fjernbetjeningen 26 Leje film 28 Fejlfinding 33 Indikatorlampe 34 Service og support 34 Serienummer 35 Vedligeholdelse og rengøring1 1 Tilslut www.apple.com/dk/support/appletv6 Kapitel 1 Tilslut Med Apple TV kan du leje film i høj opløsning eller købe tv-udsendelser, musik og musikvideoer fra iTunes Store samt se podcasts og YouTube-videoer – alt sammen uden at forlade sofaen. Du kan nyde digitale fotografier i høj opløsning fra dit .Macwebgalleri, Flickr, din Mac eller pc. Og du kan altid nyde yndlingsindholdet fra din Mac eller pc. Læs oplysningerne i dette kapitel for at komme i gang. Hvis du vil have oplysninger om Se Hvad du har brug for “Hvad du behøver” på side 8 Opstilling “Indstille Apple TV” på side 12 Indstilling af netværksforbindelsen “Konfigurer” på side 17 Brug af Apple Remote “Klar, parat, se” på side 21 Fejlfinding til Apple TV “Problemer? Ingen problemer” på side 27 Sikkerhed og garanti til Apple TV Vejledning med vigtige produktoplysninger til Apple TVKapitel 1 Tilslut 7 Hvad er der i kassen? Bemærk: Netledningen ser måske anderledes ud end den, der vises på billedet. Netledning Apple Remote MENU8 Kapitel 1 Tilslut Hvad du behøver Før du kan begynde at bruge Apple TV, skal du have følgende: Et fjernsyn med bred skærm Et fjernsyn med bred skærm og forbedret opløsning eller HD (high-definition), som kan arbejde med mindst en af følgende opløsninger:  1080p  1080i  720p  576p  480p Kabler  Et HDMI-kabel eller  Component videokabler med analoge lydkabler eller et optisk lydkabelKapitel 1 Tilslut 9 Netværk  Et kabelbaseret eller trådløst netværk  En bredbåndsforbindelse til Internet (DSL, kabel, LAN)  En adgangskode til det trådløse netværk (hvis du bruger en) Computer og software Computeren skal opfylde følgende systemkrav, før du kan afspille indhold fra en Mac eller pc på Apple TV:  En Mac med Mac OS X v10.3.9 eller v10.4.7 eller en nyere version  En pc med Windows XP Home eller Professional (SP2) eller en 32 bit version af Windows Vista  iTunes 7.6 eller en nyere version  En iTunes Store-konto10 Kapitel 1 Tilslut Kast et blik på Apple TV optical audio £ d G audio video R L IR-modtager Indikatorlampe £ d Port til strømforsyning HDMIport Component videoporte Analoge lydporte USBport Optisk digital lydport G EthernetportKapitel 1 Tilslut 11 IR-modtager Bruges sammen med den medfølgende Apple Remote til betjening af Apple TV. Indikatorlampe Indikatorlampen blinker orange, når Apple TV starter. Når Apple TV er tændt, lyser statusindikatoren hvidt. Der findes flere oplysninger om indikatorlampen i “Indikatorlampe” på side 33. d USB-port Til service og diagnosticering. ≤ Netstik Sæt den medfølgende netledning i Apple TV. G Ethernet-port Hvis du opretter forbindelse til netværket vha. Ethernet, skal du tilslutte et Ethernet-kabel. £ HDMI-port Slut Apple TV til et fjernsyn med bred skærm via en HDMI-port vha. et HDMIkabel eller via en DVI-port vha. et HDMI-til-DVI-kabel. Component videoporte Slut Apple TV til et fjernsyn med bred skærm via component videoporte (Y, Pb og Pr) vha. et component videokabel med et grønt, blåt og rødt stik. Analoge lydporte Slut Apple TV til et fjernsyn med bred skærm eller en hjemmebiografmodtager via analoge lydporte (rød og hvid) vha. et analogt lydkabel. Optisk digital lydport Slut Apple TV til en hjemmebiografmodtager med en optisk digital lydport vha. et optisk digitalt lydkabel (kaldes også et S/PDIF- eller TOSLINK-kabel). Z Indbygget trådløst Wi-Fi-/AirPort-netværk Slut Apple TV til det trådløse netværk.12 Kapitel 1 Tilslut Indstille Apple TV Apple TV tilsluttes fjernsynet via en HDMI-port, som både leverer lyd og video til fjernsynet, eller via component video- og lydporte. Før du tilslutter udstyret, skal du kontrollere, om du har de korrekte kabler til portene på bagsiden af fjernsynet. Du kommer i gang på følgende måde:  Sæt lyd- og videokablerne i Apple TV og dit fjernsyn med bred skærm  Slut Apple TV til det trådløse netværk eller Ethernet-netværket  Installer den nyeste version af iTunes på computeren, hvis du vil afspille indhold fra computeren via Apple TV Du kan slutte Apple TV til et bredt fjernsyn, der har:  En HDMI-port – brug et HDMI-kabel til både video og lyd  Component videoporte (Y, Pb og Pr) – brug et component videokabel med et grønt, blåt og rødt stik og et lydkabel Du kan også slutte Apple TV til en hjemmebiografmodtager eller et fjernsyn, som har en DVI-port, vha. et HDMI-til-DVI-kabel til video og et lydkabel. Vigtigt: Før du slutter Apple TV til en stikkontakt, skal du læse alle instruktionerne til installering nedenfor og sikkerhedsoplysningerne i den medfølgende Vejledning med vigtige produktoplysninger.Kapitel 1 Tilslut 13 Trin 1: Tilslutte kablerne Vælg den opstilling, der passer til portene på fjernsynet eller modtageren. Du tilslutter et fjernsyn med bred skærm via en HDMI-port på følgende måde: 1 Sæt den ene ende af et HDMI-kabel i porten på bagsiden af fjernsynet. 2 Sæt den anden ende i porten på bagsiden af Apple TV. Hvis fjernsynets HDMI-port bruges af en anden enhed, eller hvis fjernsynet ikke har en HDMI-port, kan du tilslutte Apple TV vha. component video- og lydkabler. optical audio G £ d audio video R L Apple TV Fjernsyn HDMI-port HDMI-port HDMI-kabel14 Kapitel 1 Tilslut Du tilslutter et fjernsyn med bred skærm via en component video- og analog lydport på følgende måde: 1 Sæt det grønne, blå og røde stik i den ene ende af et component videokabel i Y-, Pb- og Pr-portene på fjernsynet, og sæt stikkene i den anden ende af kablet i portene på Apple TV. 2 Sæt den ene ende af et analogt lydkabel med røde og hvide stik i Apple TV, og sæt den anden ende i fjernsynet. Bemærk: Den indbyggede 802.11 Wi-Fi-funktion forbinder Apple TV med det trådløse netværk. Hvis dit netværk er Ethernet-baseret, skal du slutte Apple TV til netværket via et Ethernet-kabel (sælges separat). optical audio G £ d audio video R L Component videokabel Analogt lydkabel Apple TV Fjernsyn Lyd, venstre (hvid) Videoindgang (Y, Pb, Pr) Lyd, højre (rød)Kapitel 1 Tilslut 15 Trin 2: Tilslut netledningen Sæt den ene ende af netledningen i stikket på bagsiden af Apple TV, og den anden ende i en stikkontakt. Vigtigt: Anbring ingen genstande oven på Apple TV. Genstande, der anbringes oven på enheden, kan forårsage forstyrrelse af det trådløse signal. Trin 3: Tænd fjernsynet, og vælg indgang Første gang du bruger Apple TV, bliver du ført gennem en række trin, inklusive valg af sprog, valg af netværk, konfiguration af Apple TV til netværket og oprettelse af forbindelse til iTunes. Se Kapitel 2, “Konfigurer,” på side 17. Bemærk: Hvis du kun ser en sort skærm, første gang du bruger Apple TV, skal du kontrollere, at kablerne er tilsluttet den indgang, der er valgt på fjernsynet eller modtageren. Hvis det er den rigtige indgang, skal du måske vælge en skærmopløsning, som fjernsynet understøtter. Der findes oplysninger om fjernsynets indgang i “Problemer? Ingen problemer” på side 27 og i den dokumentation, der fulgte med fjernsynet. Port til strømforsyning optical audio £ d G audio video R L2 2 Konfigurer www.apple.com/dk/support/appletv18 Kapitel 2 Konfigurer Apple TV hjælper dig med at vælge og konfigurere din trådløse netværksforbindelse og med at oprette forbindelse til iTunes på computeren, hvis du vil se eller høre indholdet i dit iTunes-bibliotek. Netværkskonfiguration Du skal have adgangskoden til netværket (hvis du bruger en) og Apple Remote ved hånden for at konfigurere Apple TV. Sørg for, at der ikke er nogen forhindringer mellem fjernbetjeningen og Apple TV. Der findes oplysninger om brug af fjernbetjeningen i “Klar, parat, se” på side 21. Hvis du:  Bruger et Ethernet-netværk, finder Apple TV automatisk netværket.  Bruger et trådløst netværk, hjælper Apple TV dig med at vælge og konfigurere netværksforbindelsen. Oprette forbindelse til det trådløse netværk Apple TV hjælper dig med at oprette forbindelse til det trådløse netværk. Hvis du bruger en adgangskode til netværket, skal du have den parat. Brug Apple Remote til at:  Vælge netværket på listen, eller skriv navnet på netværket, hvis netværket er skjult  Indtaste din adgangskode (hvis du har en)  Indtaste din IP-adresse, subnetmaske, router- og DNS-adresse (hvis du konfigurerer netværket manuelt) Hvis du opretter forbindelse vha. DHCP, skal du måske skrive IP-adressen, subnetmasken samt router- og DNS-adressen. Du færdiggør indstilling af netværksforbindelsen ved at følge instruktionerne på skærmen.Kapitel 2 Konfigurer 19 Oprette forbindelse til iTunes Før du kan få adgang til indholdet i dit iTunes-bibliotek med Apple TV, skal iTunes 7.6 eller en nyere version være installeret på computeren. Der findes en komplet liste over systemkrav i “Computer og software” på side 9. Opdatere iTunes-software Du kan hente den nyeste version af iTunes fra www.apple.com/dk/itunes/download. På en Mac kan du også bruge Softwareopdatering til at opdatere til den nyeste version af iTunes. For at bruge Softwareopdatering skal du vælge Apple () > Softwareopdatering. Før du kan bruge iTunes 7.6 på en Mac, skal du opdatere System-software til Mac OS v10.3.9 eller v10.4.7 eller en nyere version og opdatere til QuickTime 7.4 eller en nyere version. På en Windows-computer kan du også hente den nyeste version af iTunes via iTuneshjælp. Åbn iTunes, og vælg Hjælp > Søg efter opdateringer. Før du kan bruge iTunes 7.6 på en Windows-computer, skal du have Windows XP eller en nyere version.20 Kapitel 2 Konfigurer Oprette par med iTunes Når du har indstillet netværksforbindelsen, vises der på fjernsynet en adgangskode på fem tegn, som du skal skrive i iTunes for at synkronisere eller streame indhold fra computeren til Apple TV. Du indstiller Apple TV til dit iTunes-bibliotek på følgende måde: 1 Åbn iTunes på computeren. 2 Vælg på listen Enheder symbolet for Apple TV, hvor der ved siden af står “Klik for at indstille”. 3 Skriv adgangskoden på 5 tegn fra fjernsynet. Når du skriver adgangskoden, kan du give Apple TV et navn og indstille iTunes til at administrere indholdet. Du kan få flere oplysninger om iTunes, hvis du åbner iTunes og vælger Hjælp > iTunes-hjælp.3 3 Klar, parat, se www.apple.com/dk/support/appletv22 Kapitel 3 Klar, parat, se Læs videre, hvis du vil vide, hvordan du parrer og bruger fjernbetjeningen med Apple TV. Bruge Apple Remote Brug Apple Remote til at justere Apple TV-indstillinger og navigere gennem dit indhold. Sørg for, at der ikke er nogen forhindringer mellem fjernbetjeningen og Apple TV. Næste/spol frem Vælg/afspil/pause Batterirum Flyt op på menu/ rul IR-vindue Flyt ned på menu/ rul Forrige/spol tilbage Menu MENUKapitel 3 Klar, parat, se 23 Fjernbetjeningens funktioner i grundtræk Apple Remote har de grundlæggende funktioner, som beskrives nedenfor. Bemærk: ∂ og D på Apple Remote justerer ikke lydstyrken på fjernsynet eller modtageren. Brug den fjernbetjening, der fulgte med fjernsynet eller modtageren, til at ændre lydstyrken. Parre Apple TV med en fjernbetjening Apple Remote arbejder vha. den indbyggede IR-modtager på Apple TV. Du kan indstille Apple TV til kun at arbejde med den medfølgende fjernbetjening ved at parre Apple TV og fjernbetjeningen. Du parrer Apple TV med den medfølgende fjernbetjening på følgende måde: 1 Vælg Indstillinger på hovedmenuen på Apple TV. Hvis du vil... Skal du gøre følgende: Blade gennem kommandoer på menuer Tryk på ∂ eller D Vælge en kommando på en menu Tryk på ’ Tilbage til forrige menu Tryk på » Tilbage til hovedmenuen Tryk på og hold » nede Sætte Apple TV på standby Tryk på og hold ’ nede i omkring 6 sekunder Nulstille Apple TV Tryk på og hold » og D nede i omkring 6 sekunder Parre Apple TV og en fjernbetjening Tryk på og hold » og ‘ nede i omkring 6 sekunder24 Kapitel 3 Klar, parat, se 2 Vælg Par med fjernbetjening. Du kan også trykke på og holde » og ‘ nede i 6 sekunder for at parre Apple TV og fjernbetjeningen. Når du har dannet et par med Apple Remote, viser Apple TV et kædesymbol ( ) over et billede af en fjernbetjening. Apple TV kan nu kun arbejde med den fjernbetjening, du har oprettet et par med. Ophæve pardannelsen mellem Apple TV og en fjernbetjening Hvis du mister den Apple Remote, som er parret med Apple TV, kan du vha. en hvilken som helst Apple Remote annullere pardannelsen mellem Apple TV og den mistede fjernbetjening ved at trykke på og holde » og ] nede i 6 sekunder. Du kan også følge disse trin. Du ophæver pardannelsen mellem Apple TV og en fjernbetjening på følgende måde: 1 Vælg Indstillinger på hovedmenuen på Apple TV. 2 Vælg Annuller pardannelse. Når du har ophævet pardannelsen med den fjernbetjening, du har mistet, viser Apple TV et brudt kædesymbol ( ) over et billede af en fjernbetjening. Nu kan du parre Apple TV med en ny Apple Remote.Kapitel 3 Klar, parat, se 25 Udskifte batteriet i fjernbetjeningen Når spændingen på batteriet i Apple Remote bliver lav, viser Apple TV et billede af en fjernbetjening og et advarselssymbol (·). Udskift batteriet med et CR2032-batteri. Du indsætter batteriet igen på følgende måde: 1 Åbn batterirummet ved at trykke på knappen med en lille genstand, indtil batterirummet skubbes delvist ud. 2 Træk batterirummet ud, og fjern batteriet. 3 Sæt det nye batteri i med den positive side (∂) opad. 4 Sæt batterirummet i fjernbetjeningen igen. 5 Sørg for, at det brugte batteri bliver genbrugt eller destrueret i henhold til gældende regler. Tryk på denne knap med en lille genstand. Positiv (+) side opad. Træk batterirummet helt ud. MENU26 Kapitel 3 Klar, parat, se Leje film Du kan leje film i SD-format (Standard Definition) med stereolyd og HD-film (High Definition) med Dolby Digital 5.1 surround sound direkte fra Apple TV. Når du lejer en film, kan du vente 30 dage, før du begynder at se den. Men når du har trykket på Afspil, har du 24 timer til at se den, før lejeperioden udløber. Menuen Lejede film viser, hvornår lejeperioden for filmen udløber. Når lejeperioden udløber, slettes filmen, så der spares lagringsplads på Apple TV. Bemærk: Det er ikke i alle områder, at man kan leje film. 4 4 Problemer? Ingen problemer www.apple.com/dk/support/appletv28 Kapitel 4 Problemer? Ingen problemer De fleste problemer med Apple TV kan hurtigt løses ved at følge instruktionerne i dette kapitel. Der findes flere gode råd og oplysninger om fejlfinding på siden om support til Apple TV på www.apple.com/dk/support/appletv. Fejlfinding Når der opstår et problem med Apple TV, er der som regel en hurtig og nem løsning. Først skal du sikre dig, at:  Lyd- og videokablerne mellem Apple TV og fjernsynet er tilsluttet korrekt.  Netledningen til Apple TV og fjernsynet er sluttet korrekt til en stikkontakt.  Fjernsynet er tændt og indstillet til den korrekte indgang.  Apple TV er tilsluttet netværket. Gå til menuen Indstillinger på Apple TV, vælg Netværk, og se efter, om Apple TV har en IP-adresse.  Netværks- og Internetforbindelsen er slået til og fungerer korrekt. Hvis der stadig er problemer, kan du prøve at nulstille udstyret ved at afmontere netledningen til Apple TV, fjernsynet, det trådløse netværksudstyr eller AirPort-basen og routeren. Vent 30 sekunder, og tilslut derefter alle enhederne igen.Kapitel 4 Problemer? Ingen problemer 29 Hvis fjernbetjeningen ikke virker:  Hvis du har parret Apple TV med en Apple Remote, skal du huske at bruge den rigtige fjernbetjening.  Hvis du bruger den rigtige fjernbetjening, og statusindikatoren på Apple TV blinker hvidt, når du trykker på knapperne på fjernbetjeningen, skyldes problemet ikke fjernbetjeningen. Se “Hvis du kan se et billede, men Apple TV ikke svarer” på side 30.  Hvis du bruger en forkert fjernbetjening, blinker indikatorlampen på Apple TV orange.  Hvis du har parret Apple TV og en Apple Remote og ikke kan finde den rigtige fjernbetjening, kan du indstille Apple TV til at arbejde med alle Apple Remotefjernbetjeninger ved at trykke på og holde » og ] nede i 6 sekunder.  Peg direkte på Apple TV med fjernbetjeningen.  Sørg for, at IR-modtageren på forsiden af Apple TV ikke er dækket.  Hvis Apple TV viser et billede af en fjernbetjening og et advarselssymbol (·), skal du udskifte batteriet i fjernbetjeningen. Se “Udskifte batteriet i fjernbetjeningen” på side 25. Hvis Apple TV ikke kan få adgang til netværket  Se, hvilken IP-adresse Apple TV bruger. Hvis den begynder med 169.x.x.x, er routeren eller basen måske ikke konfigureret korrekt. Se efter, om det er muligt at bruge DHCP-adgang, eller konfigurer Apple TV med en manuel IP-adresse.  Se efter evt. forhindringer, og flyt basen eller Apple TV.  Hvis netværkssikkerhed er slået til, kan du prøve at slå den midlertidigt fra på basen og derefter prøve at oprette forbindelse igen.30 Kapitel 4 Problemer? Ingen problemer  Apple TV kan ikke oprette forbindelse til et trådløst netværk, hvis netværkets navn eller adgangskode indeholder udvidede ASCII-tegn eller tegn med to byte (Unicode), f.eks. japansk, koreansk eller kinesisk.  Hvis sikkerhed er slået til på netværket, skal du sikre dig, at du har indtastet den korrekte adgangskode. Hvis billedet på fjernsynsskærmen er uskarpt eller sort  Kontroller, at du bruger de korrekte videokabler, og at de sidder korrekt i Apple TV og fjernsynet.  Sørg for, at videokablerne er sluttet til den indgang, der er valgt på fjernsynet. Der findes flere oplysninger i den dokumentation, der fulgte med fjernsynet. Hvis billedet på fjernsynsskærmen stadig er uskarpt eller sort, skal du måske vælge en videofunktion, som fjernsynet understøtter. Du vælger en videofunktion på følgende måde: 1 Tryk på og hold » og ∂ på Apple Remote nede i omkring 6 sekunder. 2 Tryk på ∂ eller D på Apple Remote for at blade gennem skærmopløsningerne. 3 Når Apple TV viser en acceptabel skærmopløsning, og meddelelsen “Klik på OK, hvis du kan se Apple-logoet” vises på fjernsynet, skal du trykke på ’ . Hvis du kan se et billede, men Apple TV ikke svarer  Prøv at holde » nede på Apple Remote for at vende tilbage til hovedmenuen på Apple TV.  Sørg for, at fjernsynet er tilsluttet og virker korrekt. Der findes flere oplysninger i den dokumentation, der fulgte med fjernsynet.Kapitel 4 Problemer? Ingen problemer 31  Hvis du har parret en Apple Remote med Apple TV, skal du huske at bruge den rigtige fjernbetjening. Se “Parre Apple TV med en fjernbetjening” på side 23.  Nulstil Apple TV ved at afmontere netledningen, og vent omkring 5 sekunder, før du tilslutter den igen. Du kan også trykke på og holde » og D på Apple Remote nede i omkring 6 sekunder for at nulstille Apple TV. Film og andet indhold bevares på Apple TV. Hvis Apple TV stadig ikke svarer, kan du prøve at gendanne de originale fabriksindstillinger ved at nulstille enheden  Tryk på og hold » og D på Apple Remote nede i 6 sekunder, eller indtil indikatorlampen blinker orange.  Vælg sprog.  Vælg Nulstil enhed. Under gendannelse af fabriksindstillingerne roterer statusindikatoren (et tandhjul) et stykke tid. Hav tålmodighed.  Hvis netværket ikke bruger DHCP, skal du vælge Konfigurer TCP/IP og anføre TCP/IP-konfigurationen.  Hvis Apple TV stadig ikke vises på kildelisten i iTunes, kan du finde flere oplysninger på siden om support til Apple TV: www.apple.com/dk/support/appletv Hvis du ikke kan høre lyden  Hvis Apple TV er sluttet til en A/V-modtager, skal du sørge for, at modtageren er tændt.  Sørg for, at lydkablerne er sluttet til den indgang, der er valgt på modtageren. Der findes flere oplysninger i den dokumentation, der fulgte med modtageren.32 Kapitel 4 Problemer? Ingen problemer  Sørg for, at der er skruet op for lyden på fjernsynet eller modtageren, og at lyden ikke er slået fra.  Sørg for, at du bruger det korrekte lydkabel (se side 13), og at det sidder korrekt i Apple TV og fjernsynet.  Hvis du bruger HDMI-porten på fjernsynet og Apple TV, skal du sikre dig, at fjernsynet understøtter lyd via HDMI-porten. HDMI-portene på nogle ældre fjernsyn understøtter kun video. Hvis Apple TV ikke vises i iTunes  Sørg for, at Apple TV er tændt og sluttet til netværket. Gå til menuen Indstillinger på Apple TV, vælg Netværk, og se efter, om Apple TV har en IP-adresse.  Vælg Indstillinger i iTunes, klik på Apple TV, og sørg for, at “Søg efter Apple TVenheder” er valgt.  Hvis Firewall er slået til (i vinduet Deling i Systemindstillinger), skal du sørge for, at “Apple TV-deling” er valgt, så indholdet kan passere firewallen. Hvis andre Apple TV-enheder af og til vises på listen Enheder i iTunes  Det betyder, at iTunes har fundet andre Apple TV-enheder på netværket. Du kan forhindre dette ved at vælge Indstillinger i iTunes, klikke på Apple TV og sørge for, at “Søg efter Apple TV-enheder” ikke er valgt. Hvis Apple TV ikke afspiller fotoalbum eller lysbilledshow  Sørg for, at fotografierne ligger i fotobiblioteket eller i en mappe på computeren.Kapitel 4 Problemer? Ingen problemer 33 Indikatorlampe Apple TV har en indikatorlampe på forsiden, så du kan se, hvad der sker. Apple TV Indikatorlampen Tændt Lyser hvidt Slukket eller på standby Slukket Starter Blinker orange Modtager en kommando fra fjernbetjeningen Blinker hvidt en gang Afviser en kommando fra fjernbetjeningen (du har parret en fjernbetjening med Apple TV, men bruger ikke den rigtige fjernbetjening) Blinker orange en gang Har problemer Skifter mellem hvid og orange34 Kapitel 4 Problemer? Ingen problemer Service og support Der findes flere oplysninger om brug af Apple TV i hjælpen på skærmen og på Internet. Den følgende tabel beskriver, hvor du kan få software og serviceoplysninger. Serienummer Serienummeret er trykt i bunden af Apple TV. Du kan også se serienummeret på menuen Indstillinger på Apple TV. Vælg Indstillinger > Om på Apple TV. Hvis du vil læse om Skal du gøre følgende: Service og support, diskussioner, øvelser og Apple-softwareoverførsler Gå til: www.apple.com/dk/support/appletv Brug af iTunes Åbn iTunes, og vælg Hjælp > iTunes-hjælp. Du kan finde en iTunes-øvelse på Internet (findes kun i nogle lande) på adressen: www.apple.com/dk/support/itunes Brug af iPhoto (med Mac OS X) Åbn iPhoto, og vælg Hjælp > iPhoto-hjælp. Sidste nyt om Apple TV Gå til: www.apple.com/dk/support/appletv Oplysninger om sikkerhed og overholdelse af regler Se Vejledning med vigtige produktoplysninger, der følger med Apple TV. Service i henhold til garanti Følg først rådene i hæftet Vejledning med vigtige produktoplysninger, hjælpen på skærmen og ressourcerne på Internet. Hvis enheden ikke fungerer, kan du på www.apple.com/dk/ support/appletv få oplysninger om, hvordan du får service i henhold til garantien. Registrering af Apple TV Gå til: www.apple.com/dk/registerKapitel 4 Problemer? Ingen problemer 35 Vedligeholdelse og rengøring Bruge stik og porte Tving aldrig et stik ind i en port. Se efter evt. forhindringer i porten. Hvis stikket ikke kan sættes i porten uden besvær, passer de sandsynligvis ikke sammen. Sørg for, at du bruger det rigtige stik, og hold stikket korrekt i forhold til porten. Holde Apple TV inden for acceptable temperaturer Brug kun Apple TV på steder, hvor temperaturen er mellem 0º og 40º C. BEMÆRK: Hvis du ikke følger disse instruktioner til vedligeholdelse og rengøring, risikerer du at beskadige Apple TV eller andre genstande.36 Kapitel 4 Problemer? Ingen problemer Rengøre det ydre af Apple TV Når du vil rengøre Apple TV , skal du afmontere netledningen og alle kabler. Brug derefter en blød, fnugfri klud. Sørg for, at der ikke kommer fugt i nogen åbninger. Brug ikke vinduesrens, rengøringsmidler, aerosolspraydåser, opløsningsmidler, alkohol, ammoniak eller slibemidler til rengøring af Apple TV. Bortskaffe Apple TV Der findes oplysninger om korrekt bortskaffelse af Apple TV og andre vigtige oplysninger om godkendelser i Vejledning med vigtige produktoplysninger.K Apple Inc. © 2008 Apple Inc. Alle rettigheder forbeholdes. I henhold til loven om ophavsret må dele af eller hele dette materiale ikke kopieres uden skriftlig tilladelse fra Apple. Apple-logoet er et varemærke tilhørende Apple Inc. og registreret i USA og andre lande. Brugen af Apple-logoet på tastaturet til kommercielle formål uden skriftlig tilladelse fra Apple Computer kan krænke varemærkerettighederne samt være konkurrenceforvridende og i strid med dansk lovgivning. Alle oplysningerne i denne håndbog var korrekte på udgivelsestidspunktet. Apple påtager sig intet ansvar for evt. oversættelses- eller trykfejl. Apple 1 Infinite Loop Cupertino, CA 95014-2084 408-996-1010 www.apple.com Apple, Apple-logoet, AirPort, Apple TV, iLife, iPhoto, iTunes, Mac, Macintosh, Mac OS og QuickTime er varemærker tilhørende Apple Inc. og registreret i USA og andre lande. Apple Store og .Mac er servicemærker tilhørende Apple Inc. og registreret i USA og andre lande. iTunes Store er et servicemærke tilhørende Apple Inc. Fremstillet iht. licens fra Dolby Laboratories. “Dolby”, “Pro Logic” og det dobbelte D-symbol er varemærker tilhørende Dolby Laboratories. Fortroligt, ikke publiceret materiale, © 1992-1997 Dolby Laboratories, Inc. Alle rettigheder forbeholdes. Det produkt, der beskrives i denne håndbog, indeholder teknologi til beskyttelse af ophavsret, og denne teknologi er beskyttet af metodekrav i visse amerikanske patenter og immaterielle rettigheder ejet af Macrovision Corporation og andre rettighedsindehavere. Brug af denne teknologi til beskyttelse af ophavsret skal godkendes af Macrovision Corporation og er kun beregnet til hjemmebrug og andre begrænsede formål, medmindre andet er godkendt af Macrovision Corporation. Det er forbudt at foretage strukturelle ændringer og dekompilering. Apparaturkrav i henhold til de amerikanske patentnumre 4.631.603, 4.577.216, 4.819.098 og 4.907.093 gives kun i licens til begrænset fremvisning. Andre firma- og produktnavne kan være varemærker tilhørende deres respektive ejere. Omtale af tredjeparters produkter har kun oplysende karakter og skal ikke opfattes som en anbefaling. Apple påtager sig ikke noget ansvar for produkternes funktionsdygtighed. DK034-4570-B iPod classic Features Guide2 2 Contents Chapter 1 4 iPod classic Basics 5 iPod classic at a Glance 5 Using iPod classic Controls 8 Disabling iPod classic Controls 9 Using iPod classic Menus 10 Connecting and Disconnecting iPod classic 14 About the iPod classic Battery Chapter 2 17 Music Features 17 About iTunes 18 Importing Music into Your iTunes Library 22 Organizing Your Music 22 Adding Music and Podcasts to iPod classic 26 Playing Music 31 Watching and Listening to Podcasts 32 Listening to Audiobooks 32 Listening to FM Radio Chapter 3 33 Video Features 33 Purchasing or Renting Videos and Downloading Video Podcasts 34 Converting Your Own Videos to Work with iPod classic 35 Adding Videos to iPod classic 37 Viewing and Listening to Videos Chapter 4 40 Photo Features 40 Importing Photos 43 Viewing Photos Chapter 5 46 Extra Features and Accessories 46 Using iPod classic as an External Disk 47 Using Extra Settings 51 Syncing Contacts, Calendars, and To-Do Lists 53 Storing and Reading NotesContents 3 54 Recording Voice Memos 54 Learning About iPod classic Accessories Chapter 6 56 Tips and Troubleshooting 56 General Suggestions 61 Updating and Restoring iPod Software Chapter 7 62 Safety and Cleaning 62 Important Safety Information 64 Important Handling Information Chapter 8 65 Learning More, Service, and Support Index 681 4 1 iPod classic Basics Congratulations on purchasing iPod classic. Read this chapter to learn about the features of iPod classic, how to use its controls, and more. To use iPod classic, you put music, videos, photos, and other files on your computer and then add them to iPod classic. iPod classic is a music player and much more. Use iPod classic to:  Sync songs, videos, and digital photos for listening and viewing on the go  Listen to podcasts, downloadable audio and video shows delivered over the Internet  View video on iPod classic, or on a TV using an optional cable  View photos as a slideshow with music on iPod classic, or on a TV using an optional cable  Listen to audiobooks purchased from the iTunes Store or audible.com  Store or back up files and other data, using iPod classic as an external disk  Sync contact, calendar, and to-do list information from your computer  Play games, store text notes, set an alarm, and moreChapter 1 iPod classic Basics 5 iPod classic at a Glance Get to know the controls on iPod classic: Using iPod classic Controls The controls on iPod classic are easy to find and use. Press any button to turn on iPod classic. The main menu appears. Use the Click Wheel and Center button to navigate through onscreen menus, play songs, change settings, and view information. Move your thumb lightly around the Click Wheel to select a menu item. To choose the item, press the Center button. To go back to the previous menu, press Menu on the Click Wheel. Hold switch Menu Previous/Rewind Play/Pause Dock connector Headphones port Click Wheel Next/Fast-forward Center button6 Chapter 1 iPod classic Basics Here’s what else you can do with iPod classic controls. To Do this Turn on iPod classic Press any button. Turn off iPod classic Press and hold Play/Pause (’). Turn on the backlight Press any button or use the Click Wheel. Disable the iPod classic controls (so nothing happens if you press them accidentally) Slide the Hold switch to HOLD (an orange bar appears). Reset iPod classic (if it isn’t responding) Slide the Hold switch to HOLD and back again. Press the Menu and Center buttons at the same time for about 6 seconds, until the Apple logo appears. Choose a menu item Scroll to the item and press the Center button. Go back to the previous menu Press Menu. Go directly to the main menu Press and hold Menu. Browse for a song From the main menu, choose Music. Browse for a video From the main menu, choose Videos. Play a song or video Select the song or video and press the Center or Play/Pause (’) button. iPod classic has to be ejected from your computer to play songs and videos. Pause a song or video Press Play/Pause (’) or unplug your headphones. Change the volume From the Now Playing screen, use the Click Wheel. Play all the songs in a playlist or album Select the playlist or album and press Play/Pause (’). Play all songs in random order From the main menu, choose Shuffle Songs. You can also shuffle songs from the Now Playing screen. Skip to any point in a song or video From the Now Playing screen, press the Center button to show the scrubber bar (a diamond icon on the bar shows the current location), and then scroll to any point in the song or video. Skip to the next song or chapter in an audiobook or podcast Press Next/Fast-forward (‘). Start a song or video over Press Previous/Rewind (]). Play the previous song or chapter in an audiobook or podcast Press Previous/Rewind (]) twice. Fast-forward or rewind a song Press and hold Next/Fast-forward (‘) or Previous/Rewind (]). Add a song to the On-The-Go playlist Select a song in a playlist, and then press and hold the Center button until the song title flashes. Find the iPod classic serial number From the main menu, choose Settings > About and press the Center button until you get to the serial number, or look on the back of iPod classic.Chapter 1 iPod classic Basics 7 Browsing Music Using Cover Flow You can browse your music collection using Cover Flow, a visual way to flip through your library. To use Cover Flow: 1 From the Music menu, choose Cover Flow. 2 Use the Click Wheel to move through your album art or press the Next/Fast-forward and Previous/Rewind buttons. 3 Select an album and press the Center button. 4 Use the Click Wheel to select a song and press the Center button to play it. Scrolling Quickly Through Long Lists If you have more than 100 songs, videos, or other items, you can scroll quickly through a long list by moving your thumb quickly on the Click Wheel. Note: Not all languages are supported. To scroll quickly: 1 Move your thumb quickly on the Click Wheel, to display a letter of the alphabet on the screen. 2 Use the Click Wheel to navigate the alphabet until you find the first letter of the item you’re looking for. This takes you to the first item in the list beginning with that letter. Items beginning with a symbol or number appear before the letter “A.” 3 Lift your thumb momentarily to return to normal scrolling. 4 Use the Click Wheel to finish navigating to the item you want. Searching Music You can search iPod classic for songs, playlists, album titles, artist names, audio podcasts, and audiobooks. The search feature doesn’t search videos, notes, calendar items, contacts, or lyrics. Note: Not all languages are supported. To search iPod classic: 1 From the Music menu, choose Search. 2 Enter a search string by using the Click Wheel to navigate the alphabet and pressing the Center button to enter each character. iPod classic starts searching as soon as you enter the first character, displaying the results on the search screen. For example, if you enter “b,” then iPod classic displays all music items containing the letter “b.” If you enter “ab,” iPod classic displays all items containing that sequence of letters. To enter a space, press the Next/Fast-forward button.8 Chapter 1 iPod classic Basics To delete the previous character, press the Previous/Rewind button. 3 Press Menu to display the results list, which you can now navigate. Items appear in the results list with icons identifying their type: song, video, artist, album, audiobook, or podcast. To return to Search (if Search is highlighted in the menu), press the Center button. Turning off the Click Wheel Sound When you scroll through menu items, you can hear a clicking sound through the iPod classic internal speaker. If you like, you can turn the Click Wheel sound off. To turn off the Click Wheel sound: m Choose Settings and set Clicker to Off. To turn the Click Wheel sound on again, set Clicker to On. Disabling iPod classic Controls If you don’t want to turn iPod classic on or activate controls accidentally, you can make them inactive using the Hold switch. m Slide the Hold switch to HOLD (so you can see the orange bar).Chapter 1 iPod classic Basics 9 Using iPod classic Menus When you turn on iPod classic, you see the main menu. Choose menu items to perform functions or go to other menus. Icons along the top of the screen show iPod classic status. Adding or Removing Items from the Main Menu You might want to add often-used items to the iPod classic main menu. For example, you can add a Songs item to the main menu, so you don’t have to choose Music before you choose Songs. To add or remove items from the main menu: 1 Choose Settings > Main Menu. 2 Choose each item you want to appear in the main menu. A checkmark indicates which items have been added. Setting the Backlight Timer You can set the backlight to turn on and illuminate the screen for a certain amount of time when you press a button or use the Click Wheel. The default is 10 seconds. m Choose Settings > Backlight Timer, and then choose the time you want. Choose “Always On” to prevent the backlight from turning off. Display item Function Menu title Displays the title of the current menu. Lock icon The Lock icon appears when the Hold switch (on top of iPod classic) is set to HOLD. This indicates that the iPod classic controls are disabled. Play status The Play (“) icon appears when a song, video, or other item is playing. The Pause (1) icon appears when the item is paused. Battery status The Battery icon shows the approximate remaining battery charge. Menu items Use the Click Wheel to scroll through menu items. Press the Center button to choose an item. An arrow next to a menu item indicates that choosing it leads to another menu or screen. Menu title Menu items Battery status Play status Lock icon10 Chapter 1 iPod classic Basics Setting the Screen Brightness You can adjust the brightness of the iPod classic screen by moving a slider. m Choose Settings > Brightness, and then use the Click Wheel to move the slider. Moving it to the left dims the screen; moving it to the right increases the screen brightness. You can also set the brightness during a slideshow or video. Press the Center button to bring up or dismiss the brightness slider. Setting the Language iPod classic can be set to use different languages. m Choose Settings > Language, and then choose a language from the list. Getting Information About iPod classic You can get details about your iPod classic, such as how much space is available, how many songs, videos, photos, and other items you have, and the serial number, model, and software version. To get information about iPod classic: m Choose Settings > About, and press the Center button to cycle through the screens of information. Resetting All Settings You can reset all the items on the Settings menu to their default setting. m Choose Settings > Reset Settings, and then choose Reset. Connecting and Disconnecting iPod classic You connect iPod classic to your computer to add music, videos, photos, and files, and to charge the battery. Disconnect iPod classic when you’re done. Connecting iPod classic To connect iPod classic to your computer: m Plug the included iPod Dock Connector to USB 2.0 cable into a high-powered USB 2.0 port on your computer, and then connect the other end to iPod classic. If you have an iPod Dock, you can connect the cable to a USB 2.0 port on your computer, connect the other end to the Dock, and then put iPod classic in the Dock.Chapter 1 iPod classic Basics 11 Note: The USB port on most keyboards doesn’t provide enough power. You must connect iPod classic to a USB 2.0 port on your computer, unless your keyboard has a high-powered USB 2.0 port. By default, iTunes syncs songs on iPod classic automatically when you connect it to your computer. When iTunes is finished, you can disconnect iPod classic. Note: You can sync songs while your battery is charging. If you connect iPod classic to a different computer and it’s set to sync music automatically, iTunes prompts you before syncing any music. If you click Yes, the songs and other audio files already on iPod classic will be erased and replaced with songs and other audio files on the computer iPod classic is connected to. For more information about adding music to iPod classic and using iPod classic with more than one computer, see Chapter 2, “Music Features,” on page 17.12 Chapter 1 iPod classic Basics Disconnecting iPod classic It’s important not to disconnect iPod classic from your computer while music is being synced. You can easily see if it’s OK to disconnect iPod classic by looking at the iPod classic screen. Important: Don’t disconnect iPod classic if you see the “Connected” or “Sync in Progress” messages. You could damage files on iPod classic. If you see one of these messages, you must eject iPod classic before disconnecting it. If you set iPod classic to manage songs manually (see “Managing iPod classic Manually” on page 24) or enable iPod classic for disk use (see “Using iPod classic as an External Disk” on page 46), you must always eject iPod classic before disconnecting it. If you see the main menu or a large battery icon, you can disconnect iPod classic. Important: If you see one of these messages, you must eject iPod classic before disconnecting it.Chapter 1 iPod classic Basics 13 To eject iPod classic: m Click the Eject (C) button next to iPod classic in the list of devices in the iTunes source list. If you’re using a Mac, you can also eject iPod classic by dragging the iPod classic icon on the desktop to the Trash. If you’re using a Windows PC, you can also eject iPod classic in My Computer or by clicking the Safely Remove Hardware icon in the Windows system tray and selecting iPod classic. To disconnect iPod classic: m Disconnect the cable from iPod classic. If iPod classic is in the Dock, simply remove it. If your Dock connector is larger than the one shown, squeeze both sides of the connector while removing. You can safely disconnect iPod classic while either of these messages is displayed.14 Chapter 1 iPod classic Basics About the iPod classic Battery iPod classic has an internal, non-user-replaceable battery. For best results, the first time you use iPod classic, let it charge for about four hours or until the battery icon in the status area of the display shows that the battery is fully charged. If iPod classic isn’t used for a while, the battery might need to be charged. The iPod classic battery is 80-percent charged in about two hours and fully charged in about four hours. If you charge iPod classic while adding files, playing music, viewing videos, or viewing a slideshow, it might take longer. Charging the iPod classic Battery You can charge the iPod classic battery in two ways:  Connect iPod classic to your computer.  Use the Apple USB Power Adapter, available separately. To charge the battery using your computer: m Connect iPod classic to a USB 2.0 port on your computer. The computer must be turned on and not in sleep mode (some Mac models can charge iPod classic while in sleep mode). If the battery icon on the iPod classic screen shows the Charging screen, the battery is charging. If it shows the Charged screen, the battery is fully charged. If you don’t see the charging screen, iPod classic might not be connected to a high-power USB port. Try another USB port on your computer. Chapter 1 iPod classic Basics 15 Important: If a “Charging, Please Wait” or “Connect to Power” message appears on the iPod classic screen, the battery needs to be charged before iPod classic can communicate with your computer. See “If iPod classic displays a “Connect to Power” message” on page 58. If you want to charge iPod classic when you’re away from your computer, you can purchase the Apple USB Power Adapter. To charge the battery using the Apple USB Power Adapter: 1 Connect the AC plug adapter to the power adapter (they might already be connected). 2 Connect the iPod Dock Connector to USB 2.0 cable to the power adapter, and plug the other end of the cable into iPod classic. 3 Plug the power adapter into a working electrical outlet. WARNING: Make sure the power adapter is fully assembled before plugging it into an electrical outlet. AC plug adapter (The plug on your Power Adapter may look different.) USB Power Adapter iPod Dock Connector to USB 2.0 Cable16 Chapter 1 iPod classic Basics Understanding Battery States When iPod classic isn’t connected to a power source, a battery icon in the top-right corner of the iPod classic screen shows approximately how much charge is left. If iPod classic is connected to a power source, the battery icon changes to show that the battery is charging or fully charged. You can disconnect and use iPod classic before it’s fully charged. Note: Rechargeable batteries have a limited number of charge cycles and might eventually need to be replaced. Battery life and number of charge cycles vary by use and settings. For more information, go to www.apple.com/batteries. Battery less than 20% charged Battery about halfway charged Battery fully charged Battery charging (lightning bolt) Battery fully charged (plug)2 17 2 Music Features With iPod classic, you can take your music and audio collection with you wherever you go. Read this chapter to learn about adding music and listening to iPod classic. You use iPod classic by importing songs, audiobooks, movies, TV shows, music videos, and podcasts into your computer and then adding them to iPod classic. Read on to learn more about the steps in this process, including:  Getting music from your CD collection, hard disk, or the iTunes Store (part of iTunes and available in some countries only) into the iTunes application on your computer  Organizing your music and other audio into playlists, if you want  Adding playlists, songs, audiobooks, videos, and podcasts to iPod classic  Listening to music or other audio on the go About iTunes iTunes is the software application you use with iPod classic. iTunes can sync music, audiobooks, podcasts, and more with iPod classic. When you connect iPod classic to your computer, iTunes opens automatically. This guide explains how to use iTunes to download songs and other audio and video to your computer, create personal compilations of your favorite songs (called playlists), add them to iPod classic, and adjust iPod classic settings. iTunes also has many other features. You can make your own CDs that play in standard CD players (if your computer has a CD-recordable drive); listen to streaming Internet radio; watch videos and TV shows; rate songs according to preference; and much more. For information about using these iTunes features, open iTunes and choose Help > iTunes Help.18 Chapter 2 Music Features Importing Music into Your iTunes Library To listen to music on iPod classic, you first need to get that music into iTunes on your computer. There are three ways of getting music and other audio into iTunes:  Purchase music, audiobooks, and videos, or download podcasts online from the iTunes Store.  Import music and other audio from audio CDs.  Add music and other audio that’s already on your computer to your iTunes library. Purchasing Songs and Downloading Podcasts Using the iTunes Store If you have an Internet connection, you can easily purchase and download songs, albums, audiobooks, and videos online using the iTunes Store. You can also subscribe to and download podcasts. To purchase music online using the iTunes Store, you set up an Apple account in iTunes, find the songs you want, and then buy them. If you already have an Apple account, or if you have an America Online (AOL) account (available in some countries only), you can use that account to sign in to the iTunes Store and buy songs. Note: You don’t need an iTunes Store account to download or subscribe to podcasts. To sign in to the iTunes Store: m Open iTunes and then:  If you already have an iTunes account, choose Store > Sign In.  If you don’t already have an iTunes account, choose Store > Create Account and follow the onscreen instructions to set up an Apple account or enter your existing Apple account or AOL account information.Chapter 2 Music Features 19 To find songs, audiobooks, videos, and podcasts: You can browse or search the iTunes Store to find the album, song, or artist you’re looking for. Open iTunes and select iTunes Store in the source list.  To browse the iTunes Store, choose a category (for example, Music) on the left side of the main page in the iTunes Store. You can choose a genre, look at new releases, click one of the featured songs, look at Top Songs and more, or click Browse under Quick Links in the main iTunes Store window.  To browse for podcasts, click the Podcasts link on the left side of the main page in the iTunes Store.  To browse for videos, click the Movies, TV Shows, or Music Videos link on the left side of the main page in the iTunes Store.  To search the iTunes Store, type the name of an album, song, artist, or composer in the search field.  To narrow your search, type something in the search field, press Return or Enter on your keyboard, and then click links in the Search Bar at the top of the results page. For example, to narrow your search to songs and albums, click the Music link.  To search for a combination of items, click Power Search in the Search Results window.  To return to the main page of the iTunes Store, click the Home button in the status line at the top of the window. To buy a song, album, movie, TV show, music video, or audiobook: 1 Select iTunes Store in the source list, and then find the item you want to buy. You can double-click a song or other item to listen to a portion of it and make sure it’s what you want. You can view movie trailers or TV show previews. (If your network connection is slower than 128 kbps, choose iTunes > Preferences, and in the Store pane, select the “Load complete preview before playing” checkbox.) 2 Click Buy Song, Buy Album, Buy Movie, Buy Episode, Buy Video, or Buy Book. Some items have other options, such as TV shows that let you buy a season pass for all episodes. The song or other item is downloaded to your computer and charged to the credit card listed on your Apple or AOL account. To download or subscribe to a podcast: 1 Select iTunes Store in the source list. 2 Click the Podcasts link on the left side of the main page in the iTunes Store. 3 Browse for the podcast you want to download.  To download a single podcast episode, click the Get Episode button next to the episode.20 Chapter 2 Music Features  To subscribe to a podcast, click the Subscribe button next to the podcast graphic. iTunes downloads the most recent episode. As new episodes become available, they are automatically downloaded to iTunes when you connect to the Internet. For more information, see “Adding Podcasts to iPod classic” on page 25 and “Watching and Listening to Podcasts” on page 31. Adding Songs Already on Your Computer to Your iTunes Library If you have songs on your computer encoded in file formats that iTunes supports, you can easily add the songs to iTunes. To add songs on your computer to your iTunes library: m Drag the folder or disk containing the audio files to Library in the iTunes source list (or choose File > Add to Library and select the folder or disk). If iTunes supports the song file format, the songs are automatically added to your iTunes library. You can also drag individual song files to iTunes. Note: Using iTunes for Windows, you can convert nonprotected WMA files to AAC or MP3 format. This can be useful if you have a library of music encoded in WMA format. For more information, open iTunes and choose Help > iTunes Help. Importing Music From Your Audio CDs Into iTunes Follow these instructions to get music from your CDs into iTunes. To import music from an audio CD into iTunes: 1 Insert a CD into your computer and open iTunes. If you have an Internet connection, iTunes gets the names of the songs on the CD from the Internet (if available) and lists them in the window. If you don’t have an Internet connection, you can import your CDs and, later, when you’re connected to the Internet, choose Advanced > Get CD Track Names. iTunes will bring in the track names for the imported CDs. If the CD track names aren’t available online, you can enter the names of the songs manually. For more information, see “Entering Song Names and Other Details” on page 21. With song information entered, you can browse for songs in iTunes or on iPod by title, artist, album, and more. 2 Click to remove the checkmark next to any song you don’t want to import. 3 Click the Import button. The display area at the top of the iTunes window shows how much time it will take to import each song. Note: By default, iTunes plays songs as they are imported. If you’re importing a lot of songs, you might want to stop the songs from playing to improve performance.Chapter 2 Music Features 21 4 To eject the CD, click the Eject (C) button. You cannot eject a CD until the import is done. 5 Repeat these steps for any other CDs with songs you want to import. Entering Song Names and Other Details To enter CD song names and other information manually: 1 Select the first song on the CD and choose File > Get Info. 2 Click Info. 3 Enter the song information. 4 Click Next to enter information for the next song. 5 Click OK when you finish. Adding Lyrics You can enter song lyrics in plain text format into iTunes so that you can view the song lyrics on iPod classic while the song is playing. To enter lyrics into iTunes: 1 Select a song and choose File > Get Info. 2 Click Lyrics. 3 Enter song lyrics in the text box. 4 Click Next to enter lyrics for the next song. 5 Click OK when you finish. For more information, see “Viewing Lyrics on iPod classic” on page 30. Adding Album Artwork Music you purchase from the iTunes Store includes album artwork, which your iPod classic can display. You can add album artwork for music you’ve imported from CDs, if you have the album art on your computer. To add album artwork to iTunes: 1 Select a song and choose File > Get Info. 2 Click Artwork. 3 Click Add, navigate to the artwork file, and click Choose. 4 Use the slider to adjust the size of the artwork. 5 Click Next to add artwork for the next song or album. 6 Click OK when you finish. For more information, see “Viewing Album Artwork on iPod classic” on page 31.22 Chapter 2 Music Features Organizing Your Music Using iTunes, you can organize songs and other items into lists, called playlists, in any way you want. For example, you can make playlists with songs to listen to while exercising, or playlists with songs for a particular mood. You can also make Smart Playlists that update automatically based on rules you define. When you add songs to iTunes that match the rules, they automatically get added to the Smart Playlist. You can make as many playlists as you like using any of the songs in your iTunes library. Adding a song to a playlist or later removing it doesn’t remove it from your library. To make a playlist in iTunes: 1 Click the Add (+) button or choose File > New Playlist. 2 Type a name for the playlist. 3 Click Music in the Library list, and then drag a song or other item to the playlist. To select multiple songs, hold down the Shift key or the Command (x) key on a Mac, or the Shift key or the Control key on a Windows PC, as you click each song. To make a Smart Playlist: m Choose File > New Smart Playlist and define the rules for your playlist. Note: To make playlists on iPod classicwhen iPod classic isn’t connected to your computer, see “Making On-The-Go Playlists on iPod classic” on page 27. Adding Music and Podcasts to iPod classic After your music is imported and organized in iTunes, you can easily add it to iPod classic. To set how music is added from your computer to iPod classic, you connect iPod classic to your computer, and then use iTunes preferences to choose iPod classic settings.Chapter 2 Music Features 23 You can set iTunes to add music to iPod classic in three ways:  Sync all songs and playlists: When you connect iPod classic, it’s automatically updated to match the songs and other items in your iTunes library. Any other songs on iPod classic are deleted.  Sync selected playlists: When you connect iPod classic, it’s automatically updated to match the songs in playlists you select in iTunes.  Manually add music to iPod classic: When you connect iPod classic, you can drag songs and playlists individually to iPod classic, and delete songs and playlists individually from iPod classic. Using this option, you can add songs from more than one computer without erasing songs from iPod classic. When you manage music yourself, you must always eject iPod classic from iTunes before you can disconnect it. Syncing Music Automatically By default, iPod classic is set to sync all songs and playlists when you connect it to your computer. This is the simplest way to add music to iPod classic. You just connect iPod classic to your computer, let it add songs, audiobooks, videos, and other items automatically, and then disconnect it and go. If you added any songs to iTunes since the last time you connected iPod classic, they are synced with iPod classic. If you deleted songs from iTunes, they are removed from iPod classic. To sync music with iPod classic: m Simply connect iPod classic to your computer. If iPod classic is set to sync automatically, the update begins. Important: The first time you connect iPod classic to a computer, a message asks if you want to sync songs automatically. If you accept, all songs, audiobooks, and videos are erased from iPod classic and replaced with the songs and other items from that computer. If you don’t accept, you can still add songs to iPod classic manually without erasing any of the songs already on iPod classic. While music is being synced from your computer onto iPod classic, the iTunes status window shows progress, and you see a sync icon next to the iPod classic icon in the source list. When the update is done, a message in iTunes says “iPod update is complete.” Syncing Music From Selected Playlists onto iPod classic Setting iTunes to sync selected playlists to iPod classic is useful if the music in your iTunes library doesn’t all fit on iPod classic. Only the music in the playlists you select is synced to iPod classic. To set iTunes to sync music from selected playlists onto iPod classic: 1 In iTunes, select iPod classic in the source list and click the Music tab. 2 Select “Sync music” and then choose “Selected playlists.”24 Chapter 2 Music Features 3 Select the playlists you want. 4 To include music videos and display album artwork, select those options. 5 Click Apply. Note: If “Sync only checked songs and videos” is selected in the Summary pane, iTunes syncs only items that are checked. Managing iPod classic Manually Setting iTunes to let you manage iPod classic manually gives you the most flexibility for managing music and video on iPod classic. You can add and remove individual songs (including music videos) and videos (movies and TV shows). Also, you can add music and videos from multiple computers to iPod classic without erasing items already on iPod classic. Note: Setting iPod classic to manually manage music and video turns off the automatic sync options in the Music, Movies, and TV Shows panes. You cannot manually manage one and automatically sync another at the same time. To set iTunes to let you manage music and video on iPod classic manually: 1 In iTunes, select iPod classic in the source list and click the Summary tab. 2 In the Options section, select “Manually manage music and video.” 3 Click Apply. Note: When you manage songs and video yourself, you must always eject iPod classic from iTunes before you disconnect it. To add a song, video, or other item to iPod classic: 1 Click Music or another Library item in the iTunes source list. 2 Drag a song or other item to the iPod classic icon in the source list. To remove a song, video, or other item from iPod classic: 1 In iTunes, select iPod classic in the source list. 2 Select a song or other item on iPod classic and press the Delete or Backspace key on your keyboard. If you manually remove a song or other item from iPod classic, it isn’t deleted from your iTunes library. To make a new playlist on iPod classic: 1 In iTunes, select iPod classic in the source list, and then click the Add (+) button or choose File > New Playlist. 2 Type a name for the playlist. 3 Click an item, such as Music, in the Library list, and then drag songs or other items to the playlist.Chapter 2 Music Features 25 To add songs to or remove songs from a playlist on iPod classic: m Drag a song to a playlist on iPod classic to add the song. Select a song in a playlist and press the Delete key on your keyboard to delete the song. If you set iTunes to manage music manually, you can reset it later to sync automatically. To reset iTunes to sync all music automatically on iPod classic: 1 In iTunes, select iPod classic in the source list and click the Music tab. 2 Select “Sync music” and then choose “All songs and playlists.” 3 Click Apply. The update begins automatically. Note: If “Only sync checked items” is selected in the Summary pane, iTunes syncs only items that are checked in your Music and other libraries. Adding Podcasts to iPod classic The settings for adding podcasts to iPod classic are unrelated to the settings for adding songs. Podcast update settings don’t affect song update settings, and vice versa. You can set iTunes to automatically sync all or selected podcasts, or you can add podcasts to iPod classic manually. To set iTunes to update the podcasts on iPod classic automatically: 1 In iTunes, select iPod classic in the source list and click the Podcasts tab. 2 In the Podcasts pane, select “Sync … episodes” and choose the number of episodes you want in the pop-up menu. 3 Click “All podcasts” or “Selected podcasts.” If you click “Selected podcasts,” also select the podcasts in the list that you want to sync. 4 Click Apply. When you set iTunes to sync iPod classic podcasts automatically, iPod classic is updated each time you connect it to your computer. Note: If “Only sync checked items” is selected in the Summary pane, iTunes syncs only items that are checked in your Podcasts and other libraries. To manually manage podcasts: 1 In iTunes, select iPod classic in the source list and click the Summary tab. 2 Select “Manually manage music and videos” and click Apply. 3 Select the Podcasts library in the source list and drag the podcasts you want to iPod classic.26 Chapter 2 Music Features Playing Music After you add music and other audio to iPod classic, you can listen to it. Use the Click Wheel and Center button to browse for a song, audiobook, video, or podcast. To browse for and play a song: m Choose Music, browse for a song, and press the Play/Pause button. Note: When you browse for music videos in the Music menu, you only hear the music. When you browse for them in the Videos menu, you also see the video. When a song is playing, the Now Playing screen appears. The following table describes the elements on the Now Playing screen of iPod classic. When you see the Now Playing screen, you can use the Click Wheel to change the volume. You can press the Center button multiple times from the Now Playing screen to get to other information and options, such as the scrubber bar, rating bullets, shuffle settings, lyrics, podcast information, and more. The scrubber bar displays a diamond to show where you are in the track, along with elapsed and remaining times. Press the Menu button to return to the previous screen. Now Playing screen item Function Shuffle (¡) icon Appears if iPod classic is set to shuffle songs or albums. Repeat (⁄) icon Appears if iPod classic is set to repeat all songs. The Repeat Once (!) icon appears if iPod classic is set to repeat one song. Album art Shows the album art, if it’s available. Song information Displays the song title, artist, and album title. Rating Displays stars if you rate the song. Song number Shows the number of the song that’s playing within the current sequence of songs. Song time progress bar Shows the elapsed and remaining times for the song that’s playing. Shuffle icon Repeat icon Song time Song information, rating, and sequence number Album artChapter 2 Music Features 27 Setting iPod classic to Shuffle Songs You can set iPod classic to play songs, albums, or your entire library in random order. To set iPod classic to shuffle and play all your songs: m Choose Shuffle Songs from the iPod classic main menu. iPod classic begins playing songs from your entire music library in random order, skipping audiobooks and podcasts. To set iPod classic to always shuffle songs or albums: 1 Choose Settings from the iPod classic main menu. 2 Set Shuffle to either Songs or Albums. When you set iPod classic to shuffle songs by choosing Settings > Shuffle, iPod classic shuffles songs within the list (for example, album or playlist) you choose to play. When you set iPod classic to shuffle albums, it plays all the songs on an album in order, and then randomly selects another album in the list and plays through it in order. To set shuffle options from the Now Playing screen: m Press the Center button until you see the shuffle icon. Choose Songs, Albums, or Off. Setting iPod classic to Repeat Songs You can set iPod classic to repeat a song over and over, or repeat songs within the list you choose to play. To set iPod classic to repeat songs: m Choose Settings from the iPod classic main menu.  To repeat all songs in the list, set Repeat to All.  To repeat one song over and over, set Repeat to One. Customizing the Music Menu You can add items to or remove them from the Music menu, just as you do with the main menu. For example, you can add a Compilations item to the Music menu, so you can easily choose compilations that are put together from various sources. To add or remove items from the Music menu: 1 Choose Settings > Music Menu. 2 Choose each item you want to appear in the main menu. A checkmark indicates which items have been added. To revert to the original Music menu settings, choose Reset Menu. Making On-The-Go Playlists on iPod classic You can make playlists on iPod classic, called On-The-Go Playlists, when iPod classic isn’t connected to your computer.28 Chapter 2 Music Features To make an On-The-Go playlist: 1 Select a song, and then press and hold the Center button until the song title flashes. 2 Choose other songs you want to add. 3 Choose Music > Playlists > On-The-Go to view and play your list of songs. You can also add a list of songs. For example, to add an album, highlight the album title and press and hold the Center button until the album title flashes. To play songs in the On-The-Go playlist: m Choose Music > Playlists > On-The-Go and choose a song. To remove a song from the On-The-Go playlist: m Select a song in the playlist, and hold down the Center button until the song title flashes. To clear the entire On-The-Go playlist: m Choose Music > Playlists > On-The-Go > Clear Playlist and then click Clear. To save the On-The-Go playlists on iPod classic: m Choose Music > Playlists > On-The-Go > Save Playlist. The first playlist is saved as “New Playlist 1” in the Playlists menu. The On-The-Go playlist is cleared. You can save as many playlists as you like. After you save a playlist, you can no longer remove songs from it. To copy the On-The-Go playlists to your computer: m If iPod classic is set to update songs automatically (see “Syncing Music Automatically” on page 23), and you make an On-The-Go playlist, the playlist is automatically copied to iTunes when you connect iPod classic. You see the new On-The-Go playlist in the list of playlists in iTunes. You can rename, edit, or delete the new playlist, just as you would any playlist in iTunes. Rating Songs You can assign a rating to a song (from 1 to 5 stars) to indicate how much you like it. You can use song ratings to help you create Smart Playlists automatically in iTunes. To rate a song: 1 Start playing the song. 2 From the Now Playing screen, press the Center button until the five Rating bullets appear. 3 Use the Click Wheel to choose a rating (represented by stars). Note: You cannot assign ratings to video podcasts.Chapter 2 Music Features 29 Setting the Maximum Volume Limit You can choose to set a limit for the maximum volume on iPod classic and assign a combination to prevent the setting from being changed. To set the maximum volume limit for iPod classic: 1 Choose Settings > Volume Limit. The volume control shows the current volume. 2 Use the Click Wheel to select the maximum volume limit. You can press Play to hear the currently selected song play while you select the maximum volume limit. 3 Press Play/Pause to set the maximum volume limit. A triangle on the volume bar indicates the maximum volume limit. 4 Press the Menu button to accept the maximum volume limit without requiring a combination to change it. Or, on the Enter Combination screen, set a combination to require that the combination be entered to change the maximum volume limit. 5 To enter a combination:  Use the Click Wheel to select a number for the first position. Press the Center button to confirm your choice and move to the next position.  Use the same method to set the remaining numbers of the combination. You can use the Next/Fast-forward button to move to the next position and the Previous/Rewind button to move to the previous position. Press the Center button in the final position to confirm the entire combination. Note: The volume of songs and other audio may vary depending on how the audio was recorded or encoded. See “Setting Songs to Play at the Same Volume Level” on page 30 for information about how to set a relative volume level in iTunes and on iPod classic. Volume level may also vary if you use different earphones or headphones. With the exception of the iPod Radio Remote, accessories that connect through the iPod Dock Connector don’t support volume limits. If you set a combination, you must enter it before you can change or remove the maximum volume limit. To change the maximum volume limit: 1 Choose Settings > Volume Limit. 2 If you set a combination, enter it by using the Click Wheel to select the numbers and pressing the Center button to confirm them. 3 Use the Click Wheel to change the maximum volume limit. 4 Press the Play/Pause button to accept the change.30 Chapter 2 Music Features To remove the maximum volume limit: 1 If you’re currently listening to iPod classic, press Pause. 2 Choose Settings > Volume Limit. 3 If you set a combination, enter it by using the Click Wheel to select the numbers and pressing the Center button to confirm them. 4 Use the Click Wheel to move the volume limit to the maximum level on the volume bar. This removes any restriction on volume. 5 Press the Play/Pause button to accept the change. Note: If you forget the combination, you can restore iPod classic. See “Updating and Restoring iPod Software” on page 61 for more information. Setting Songs to Play at the Same Volume Level iTunes can automatically adjust the volume of songs, so they play at the same relative volume level. You can set iPod classic to use the iTunes volume settings. To set iTunes to play songs at the same sound level: 1 In iTunes, choose iTunes > Preferences if you’re using a Mac, or choose Edit > Preferences if you’re using a Windows PC. 2 Click Playback and select Sound Check, and then click OK. To set iPod classic to use the iTunes volume settings: m Choose Settings and set Sound Check to On. If you haven’t activated Sound Check in iTunes, setting it on iPod classic has no effect. Using the Equalizer You can use equalizer presets to change the sound on iPod classic to suit a particular music genre or style. For example, to make rock music sound better, set the equalizer to Rock. To use the equalizer to change the sound on iPod classic: m Choose Settings > EQ and choose an equalizer preset. If you assigned an equalizer preset to a song in iTunes and the iPod classic equalizer is set to Off, the song plays using the iTunes setting. See iTunes Help for more information. Viewing Lyrics on iPod classic If you enter lyrics for a song in iTunes (see “Adding Lyrics” on page 21) and then add the song to iPod classic, you can view the lyrics on iPod classic. To view lyrics on iPod classic while a song is playing: m On the Now Playing screen, press the Center button until you see the lyrics. The screen displays the lyrics, which you can scroll through as the song plays.Chapter 2 Music Features 31 Viewing Album Artwork on iPod classic By default, iTunes is set to allow you to view album artwork on iPod classic. If the artwork is available, you’ll see it on iPod classic in the album list and when you play music from the album. To set iTunes to display album artwork on iPod classic: 1 In iTunes, select iPod classic in the source list and click the Music tab. 2 Choose “Display album artwork on your iPod.” To see album artwork on iPod classic: m Play a song that has album artwork. For more information about album artwork, open iTunes and choose Help > iTunes Help. Watching and Listening to Podcasts Podcasts are downloadable audio or video shows you get at the iTunes Store. You can listen to audio podcasts and watch video podcasts. Podcasts are organized by shows, episodes within shows, and chapters within episodes. If you stop watching or listening to a podcast and go back to it later, the podcast begins playing from where you left off. To watch or listen to a podcast: 1 From the main menu, choose Podcasts, and then choose a show. Shows appear in reverse chronological order so that you can watch or listen to the most recent one first. You see a blue dot next to shows and episodes you haven’t watched or listened to yet. 2 Choose an episode to play it. The Now Playing screen displays the show, episode, and date information, along with elapsed and remaining time. Press the Center button to see more information about the podcast. If the podcast includes artwork, you also see a picture. Podcast artwork can change during an episode, so you might see several pictures during the podcast. If the podcast you’re watching or listening to has chapters, you can press the Next/Fast-forward or Previous/Rewind button to skip to the next chapter or the beginning of the current chapter in the podcast. For more information about podcasts, open iTunes and choose Help > iTunes Help. Then search for “podcasts.”32 Chapter 2 Music Features Listening to Audiobooks You can purchase and download audiobooks from the iTunes Store or from audible.com and listen to them on iPod classic. You can use iTunes to add audiobooks to iPod classic the same way you add songs. If you stop listening to an audiobook on iPod classic and go back to it later, the audiobook begins playing from where you left off. iPod classic skips audiobooks when set to shuffle. If the audiobook you’re listening to has chapters, you can press the Next/Fast-forward or Previous/Rewind button to skip to the next chapter or the beginning of the current chapter in the audiobook. You can play audiobooks at speeds faster or slower than normal. To set audiobook play speed: m Choose Settings > Audiobooks and choose a speed. Setting the play speed only affects audiobooks purchased from the iTunes Store or audible.com. Listening to FM Radio You can listen to radio using the optional iPod Radio Remote accessory for iPod classic. iPod Radio Remote attaches to iPod classic using the Dock connector cable. When you’re using iPod Radio Remote, you see a Radio menu item on the iPod classic main menu. For more information, see the iPod Radio Remote documentation.3 33 3 Video Features You can purchase movies, TV shows, and music videos, rent movies, and download video podcasts at the iTunes Store, and then add them to your iPod classic. You can watch videos on iPod classic or on a TV connected to iPod classic. Read this chapter to learn about downloading and viewing videos. Purchasing or Renting Videos and Downloading Video Podcasts To purchase videos—movies, TV shows, and music videos—or rent movies online from the iTunes Store (part of iTunes and available in some countries only), you set up an Apple account in iTunes, find the videos you want, and then buy or rent them. If you already have an Apple account, or if you have an America Online (AOL) account (available in some countries only), you can use that account to sign in to the iTunes Store and buy videos or rent movies. To sign in to the iTunes Store: m Open iTunes and then:  If you already have an iTunes account, choose Store > Sign In.  If you don’t already have an iTunes account, choose Store > Create Account and follow the onscreen instructions to set up an Apple account or enter your existing Apple account or AOL account information.34 Chapter 3 Video Features To browse videos in the iTunes Store: 1 In iTunes, select iTunes Store in the source list. 2 Click an item (Movies, TV Shows, or Music Videos) in the iTunes Store list on the left. You can also find some music videos as part of an album or other offer. Videos in iTunes and in the iTunes Store have a display ( ) icon next to them. To buy or rent a video: 1 Select iTunes Store in the source list, and then find the item you want to buy or rent. 2 Click Buy Video, Buy Episode, Buy Season, Buy Movie, or Rent Movie. Purchased videos appear when you select Movies (under Library) or Purchased (under Store) in the source list. Rented videos appear when you select Rented Movies (under Library). To download a video podcast: Video podcasts appear alongside other podcasts in the iTunes Store. You can subscribe to them and download them just as you would other podcasts. You don’t need an iTunes Store account to download podcasts. See “Purchasing Songs and Downloading Podcasts Using the iTunes Store” on page 18 for instructions. Converting Your Own Videos to Work with iPod classic You can view other video files on iPod classic, such as videos you create in iMovie on a Mac or videos you download from the Internet. Import the video into iTunes, convert it for use with iPod classic, if necessary, and then add it to iPod classic. iTunes supports all the video formats that QuickTime supports. For more information, choose Help > QuickTime Player Help from the QuickTime Player menu bar. To import a video into iTunes: m Drag the video file to your iTunes library. Some videos may be ready for use with iPod classic after you import them to iTunes. If you try to add a video to iPod classic (see “Syncing Videos Automatically” on page 35 for instructions), and a message says the video can’t play on iPod classic, then you must convert the video for use with iPod classic. To convert a video for use with iPod classic: 1 Select the video in your iTunes library. 2 Choose Advanced > “Convert Selection to iPod.” Depending on the length and content of a video, converting it for use with iPod classic can take several minutes to several hours. Note: When you convert a video for use with iPod classic, the original video remains in your iTunes library. Chapter 3 Video Features 35 For more information about converting video for iPod classic, go to www.info.apple.com/kbnum/n302758. Adding Videos to iPod classic You add movies and TV shows to iPod classic much the same way you add songs. You can set iTunes to sync all movies and TV shows to iPod classic automatically when you connect iPod classic, or you can set iTunes to sync only selected playlists. Alternatively, you can manage movies and TV shows manually. Using this option, you can add videos from more than one computer without erasing videos already on iPod classic. Note: Music videos are managed with songs, under the Music tab in iTunes. See “Adding Music and Podcasts to iPod classic” on page 22. Important: If you rent a movie from the iTunes Store and add it to iPod classic, you will only be able to view it on iPod classic. Once you add a rented movie to iPod classic, it can’t be transferred again. Syncing Videos Automatically By default, iPod classic is set to sync all videos when you connect it to your computer. This is the simplest way to add videos to iPod classic. You just connect iPod classic to your computer, let it add videos and other items automatically, and then disconnect it and go. If you added any videos to iTunes since the last time you connected iPod classic, they are added to iPod classic. If you deleted videos from iTunes, they are removed from iPod classic. You can set iPod classic to sync videos automatically when you connect it to your computer. To sync videos to iPod classic: m Simply connect iPod classic to your computer. If iPod classic is set to sync automatically, the syncing begins.36 Chapter 3 Video Features Important: The first time you connect iPod classic to a different computer and have the automatic sync option set, a message asks if you want to sync songs and videos automatically. If you accept, all songs, videos, and other items are deleted from iPod classic and replaced with the songs, videos, and other items in the iTunes library on that computer. If you don’t accept, you can still add videos to iPod classic manually without deleting any of the videos already on iPod classic. iTunes includes a feature to sync purchased items from iPod classic to another computer. For more information, see iTunes Help. While videos are being synced from your computer to iPod classic, the iTunes status window shows progress and the iPod classic icon in the source list flashes red. When the update is done, a message in iTunes says “iPod update is complete.” Syncing Selected Videos to iPod classic Setting iTunes to sync selected videos to iPod classic is useful if you have more videos in your iTunes library than will fit on iPod classic. Only the videos you specify are synced with iPod classic. You can sync selected videos or selected playlists that contain videos. To set iTunes to sync unwatched or selected movies to iPod classic: 1 In iTunes, select iPod classic in the source list and click the Movies tab. 2 Select “Sync movies.” 3 Select the movies or playlists you want. Unwatched movies: Select “… unwatched movies” and choose the number you want from the pop-up menu. Selected movies or playlists: Click “Selected …,” choose “movies” or “playlists” from the pop-up menu, and then select the movies or playlists you want. 4 Click Apply. Note: If “Only sync checked items” is selected in the Summary pane, iTunes syncs only items that are checked in your Movies and other libraries. To set iTunes to sync most recent episodes or selected TV shows to iPod classic: 1 In iTunes, select iPod classic in the source list and click the TV Shows tab. 2 Select “Sync … episodes” and choose the number of episodes you want from the popup menu. 3 Click “Selected …” and choose “TV shows” or “playlists” from the pop-up menu. 4 Select the movies or playlists you want to sync. 5 Click Apply.Chapter 3 Video Features 37 Note: If “Only sync checked items” is selected in the Summary pane, iTunes syncs only items that are checked in your TV Shows and other libraries. Managing Videos Manually Setting iTunes to let you manage iPod classic manually gives you the most flexibility for managing videos on iPod classic. You can add and remove movies, TV shows, and other items individually. You can also add videos from multiple computers to iPod classic without removing videos already on iPod classic. See “Managing iPod classic Manually” on page 24. Adding Video Podcasts to iPod classic You add video podcasts to iPod classic the same way you add other podcasts (see page 25). If a podcast has a video component, the video plays when you choose it from Podcasts. If you set iTunes to manage movies and TV shows manually, you can reset iTunes later to sync them automatically. If you set iTunes to sync automatically after you’ve been manually managing iPod classic, you lose any items on iPod classic that aren’t part of your iTunes library. To reset iTunes to sync all movies automatically on iPod classic: 1 In iTunes, select iPod classic in the source list and click the Movies tab. 2 Select “Sync movies” and then select “All movies.” 3 Click Apply. Note: If “Only sync checked items” is selected in the Summary pane, iTunes syncs only items that are checked in your Movies and other libraries. To reset iTunes to sync all TV shows automatically on iPod classic: 1 In iTunes, select iPod classic in the source list and click the TV Shows tab. 2 Select “Sync … episodes” and choose “all” from the pop-up menu. 3 Select “All TV shows.” 4 Click Apply. Note: If “Only sync checked items” is selected in the Summary pane, iTunes syncs only items that are checked in your TV Shows and other libraries. Viewing and Listening to Videos You can view and listen to videos on iPod classic. If you have an AV cable from Apple (available separately at www.apple.com/ipodstore), you can watch videos from iPod classic on TV.38 Chapter 3 Video Features Viewing and Listening to Videos on iPod classic Videos you add to iPod classic appear in the Videos menus. Music videos also appear in Music menus. To view a video on iPod classic: m Choose Videos and browse for a video. When you play the video, you see and hear it. To listen to a music video’s sound or a video podcast’s sound without playing the video: m Choose Music and browse for a music video or a video podcast. When you play the video, you hear it but don’t see the video. Watching Videos on a TV Connected to iPod classic If you have an AV cable from Apple, you can watch videos on a TV connected to your iPod classic. First you set iPod classic to display videos on a TV, then connect iPod classic to your TV, and then play a video. Note: Use the Apple Component AV Cable, the Apple Composite AV Cable, or the Apple AV Connection Kit. Other similar RCA-type cables might not work. You can purchase the cables at www.apple.com/ipodstore. To set iPod classic to display videos on a TV: m Choose Videos > Settings, and then set TV Out to Ask or On. If you set TV Out to Ask, iPod classic gives you the option of displaying videos on TV or on iPod classic every time you play a video. You can also set video to display full screen or widescreen, and set video to display on PAL or NTSC devices. To set TV settings: m Choose Videos > Settings, and then follow the instructions below. To set Do this Video to display on PAL or NTSC TVs Set TV Signal to PAL or NTSC. PAL and NTSC refer to TV broadcast standards. Your TV might use either of these, depending on the region where it was purchased. If you aren’t sure which your TV uses, check the documentation that came with your TV. The format of your external TV Set TV Screen to Widescreen for 16:9 format or Standard for 4:3 format. Video to fit to your screen Set “Fit to Screen” to On. If you set “Fit to Screen” to Off, widescreen videos display in letterbox format on iPod classic or a standard (4:3) TV screen. Captions to display Set Captions to On.Chapter 3 Video Features 39 To use the Apple Component AV Cable to connect iPod classic to your TV: 1 Plug the red, green, and blue video connectors into the component video input (Y, Pb, and Pr) ports on your TV. You can also use the Apple Composite AV cable. If you do, plug in the yellow video connector into the video input port on your TV. Your TV must have RCA video and audio ports. 2 Plug the white and red audio connectors into the left and right analog audio input ports, respectively, on your TV. 3 Plug the iPod Dock Connector into your iPod classic or Universal Dock. 4 Plug the USB connector into your USB Power Adapter or your computer to keep your iPod classic charged. 5 Turn on iPod classic and your TV or receiver to start playing. Make sure you set TV Out on your iPod classic to On. Note: The ports on your TV or receiver may differ from the ports in the illustration. To view a video on your TV: 1 Connect iPod classic to your TV (see above). 2 Turn on your TV and set it to display from the input ports connected to iPod classic. See the documentation that came with your TV for more information. 3 On iPod classic, choose Videos and browse for a video. USB Power Adapter iPod Left audio (white) Dock Connector USB connector Television Video in (Y, Pb, Pr) Right audio (red)4 40 4 Photo Features You can import digital photos to your computer and add them to iPod classic. You can view your photos on iPod classic or as a slideshow on your TV. Read this chapter to learn about importing and viewing photos. Importing Photos You can import digital photos from a digital camera to your computer, and then add them to iPod classic for viewing. You can connect iPod classic to a TV and view photos as a slideshow with music. Importing Photos from a Camera to Your Computer You can import photos from a digital camera or a photo card reader. To import photos to a Mac using iPhoto: 1 Connect the camera or photo card reader to your computer. Open iPhoto (located in the Applications folder) if it doesn’t open automatically. 2 Click Import. Images from the camera are imported into iPhoto. You can import other digital images into iPhoto, such as images you download from the web. For more information about importing and working with photos and other images, open iPhoto and choose Help > iPhoto Help.Chapter 4 Photo Features 41 iPhoto is available for purchase as part of the iLife suite of applications at www.apple.com/ilife. iPhoto might already be installed on your Mac, in the Applications folder. If you don’t have iPhoto, you can import photos using Image Capture. To import photos to a Mac using Image Capture: 1 Connect the camera or photo card reader to your computer. 2 Open Image Capture (located in the Applications folder) if it doesn’t open automatically. 3 To choose specific items to import, click Download Some. Or to download all items, click Download All. To import photos to a Windows PC: m Follow the instructions that came with your digital camera or photo application. Adding Photos From Your Computer to iPod classic You can add photos to iPod classic from a folder on your hard disk. If you have a Mac and iPhoto 4.0.3 or later, you can sync iPhoto albums automatically. If you have a Windows PC and Adobe Photoshop Album 2.0 or later, or Adobe Photoshop Elements 3.0 or later, you can sync photo collections automatically. Adding photos to iPod classic the first time might take some time, depending on how many photos are in your photo library. To sync photos from a Mac or Windows PC to iPod classic using a photo application: 1 In iTunes, select iPod classic in the source list and click the Photos tab. 2 Select “Sync photos from: …”  On a Mac, choose iPhoto from the pop-up menu.  On a Windows PC, choose Photoshop Album or Photoshop Elements from the pop-up menu. Note: Some versions of Photoshop Album and Photoshop Elements don’t support collections. You can still use them to add all your photos.42 Chapter 4 Photo Features 3 If you want to add all your photos, select “All photos and albums.” If you want to keep your photos organized by event, select “… events” and choose an option from the popup menu. If you want to add photos from only certain albums, select “Selected albums” and select the albums you want. 4 Click Apply. Each time you connect iPod classic to your computer, photos are synced automatically. To add photos from a folder on your hard disk to iPod classic: 1 Drag the images you want into a folder on your computer. If you want images to appear in separate photo albums on iPod classic, create folders inside the main image folder, and drag images into the new folders. 2 In iTunes, select iPod classic in the source list and click the Photos tab. 3 Select “Sync photos from:…” 4 Choose “Choose Folder” from the pop-up menu and select your image folder. 5 Click Apply. When you add photos to iPod classic, iTunes optimizes the photos for viewing. Full-resolution image files aren’t transferred by default. Adding full-resolution image files is useful, for example if you want to move them from one computer to another, but isn’t necessary for viewing the images at full quality on iPod classic. To add full-resolution image files to iPod classic: 1 In iTunes, select iPod classic in the source list and click the Photos tab. 2 Select “Include full-resolution photos.” 3 Click Apply. iTunes copies the full-resolution versions of the photos to the Photos folder on iPod classic. To delete photos from iPod classic: 1 In iTunes, select iPod classic in the source list and click the Photos tab. 2 Select “Sync photos from: …”  On a Mac, choose iPhoto from the pop-up menu.  On a Windows PC, choose Photoshop Album or Photoshop Elements from the pop-up menu. 3 Choose “Selected albums” and deselect the albums you no longer want on iPod classic. 4 Click Apply.Chapter 4 Photo Features 43 Adding Photos from iPod classic to a Computer If you add full-resolution photos from your computer to iPod classic using the previous steps, they’re stored in a Photos folder on iPod classic. You can connect iPod classic to a computer and put these photos onto the computer. iPod classic must be enabled for disk use (see “Using iPod classic as an External Disk” on page 46). To add photos from iPod classic to a computer: 1 Connect iPod classic to the computer. 2 Drag image files from the Photos folder or DCIM folder on iPod classic to the desktop or to a photo editing application on the computer. Note: You can also use a photo editing application, such as iPhoto, to add photos stored in the Photos folder. See the documentation that came with the application for more information. To delete photos from the Photos folder on iPod classic: 1 Connect iPod classic to the computer. 2 Navigate to the Photos folder on iPod classic and delete the photos you no longer want. Viewing Photos You can view photos on iPod classic manually or as a slideshow. If you have an optional AV cable from Apple (for example, Apple Component AV Cable), you can connect iPod classic to a TV and view photos as a slideshow with music. Viewing Photos on iPod classic To view photos on iPod classic: 1 On iPod classic, choose Photos > All Photos. Or choose Photos and a photo album to see only the photos in the album. Thumbnail views of the photos might take a moment to appear. 2 Select the photo you want and press the Center button to view a full-screen version.44 Chapter 4 Photo Features From any photo-viewing screen, use the Click Wheel to scroll through photos. Press the Next/Fast-forward or Previous/Rewind button to skip to the next or previous screen of photos. Press and hold the Next/Fast-forward or Previous/Rewind button to skip to the last or first photo in the library or album. Viewing Slideshows You can view a slideshow, with music and transitions if you choose, on iPod classic. If you have an optional AV cable from Apple, you can view the slideshow on a TV. To set slideshow settings: m Choose Photos > Settings, and then follow these instructions: To set Do this Slideshows to display on iPod classic Set TV Out to Ask or Off. Slideshows to display on TV Set TV Out to Ask or On. If you set TV Out to Ask, iPod classic gives you the option of showing slideshows on TV or on iPod classic every time you start a slideshow. How long each slide is shown Choose Time Per Slide and pick a time. The music that plays during slideshows Choose Music and choose a playlist. If you’re using iPhoto, you can choose From iPhoto to copy the iPhoto music setting. Only the songs that you’ve added to iPod classic play. Slides to repeat Set Repeat to On. Slides to display in random order Set Shuffle Photos to On. Slides to display with transitions Choose Transitions and choose a transition type. Slides to show on PAL or NTSC TVs Set TV Signal to PAL or NTSC. PAL and NTSC refer to TV broadcast standards. Your TV might use either of these, depending on the region where it was purchased. If you aren’t sure which your TV uses, check the documentation that came with your TV.Chapter 4 Photo Features 45 To view a slideshow on iPod classic: m Select any photo, album, or roll, and press the Play/Pause button. Or select any full-screen photo and press the Center button. To pause, press the Play/Pause button. To skip to the next or previous photo, press the Next/Fast-forward or Previous/Rewind button. To connect iPod classic to a TV: 1 Connect the optional Apple Component or Composite AV cable to iPod classic. Note: Use the Apple Component AV Cable, Apple Composite AV Cable, or Apple AV Connection Kit. Other similar RCA-type cables won’t work. You can purchase the cables at www.apple.com/ipodstore. 2 Connect the video and audio connectors to the ports on your TV (for an illustration, see page 39). Your TV must have RCA video and audio ports. To view a slideshow on a TV: 1 Connect iPod classic to a TV (see above). 2 Turn on your TV and set it to display from the input ports connected to iPod classic. See the documentation that came with your TV for more information. 3 On iPod classic, select any photo or album and press the Play/Pause button. Or select any full-screen photo and press the Center button. To pause, press the Play/Pause button. To skip to the next or previous photo, press the Next/Fast-forward or Previous/ Rewind button. If you selected a playlist in Photos > Settings > Music, the playlist plays automatically when you start the slideshow. The photos display on your TV and advance automatically according to settings in the Slideshow > Settings menu.5 46 5 Extra Features and Accessories iPod classic can do a lot more than play songs. And you can do a lot more with it than listen to music. Read this chapter to find out more about the extra features of iPod classic, including how to use it as an external disk, alarm, or sleep timer; show the time of day in other parts of the world; display notes; and sync contacts, calendars, and to-do lists. Learn about how to use iPod classic as a stopwatch and to lock the screen, and about the accessories available for iPod classic. Using iPod classic as an External Disk You can use iPod classic as an external disk to store data files. Note: To add music and other audio or video files to iPod classic, you must use iTunes. For example, you won’t see songs you add using iTunes in the Mac Finder or in Windows Explorer. Likewise, if you copy music files to iPod classic in the Mac Finder or Windows Explorer, you won’t be able to play them on iPod classic. To enable iPod classic as an external disk: 1 In iTunes, select iPod classic in the source list and click the Summary tab. 2 In the Options section, select “Enable disk use.” 3 Click Apply. When you use iPod classic as an external disk, the iPod classic disk icon appears on the desktop on Mac, or as the next available drive letter in Windows Explorer on a Windows PC. Note: Clicking Summary and selecting “Manually manage music and videos” in the Options section also enables iPod classic to be used as an external disk. Drag files to and from iPod classic to copy them. If you use iPod classic primarily as a disk, you might want to keep iTunes from opening automatically when you connect iPod classic to your computer.Chapter 5 Extra Features and Accessories 47 To prevent iTunes from opening automatically when you connect iPod classic to your computer: 1 In iTunes, select iPod classic in the source list and click the Summary tab. 2 In the Options section, deselect “Open iTunes when this iPod is connected.” 3 Click Apply. Using Extra Settings You can set the date and time, clocks in different time zones, and alarm and sleep features on iPod classic. You can use iPod classic as a stopwatch or to play games, and you can lock the iPod classic screen. Setting and Viewing the Date and Time The date and time are set automatically from your computer’s clock when you connect iPod classic, but you can change the settings. To set date and time options: 1 Choose Settings > Date & Time. 2 Choose one or more of the following options: Adding Clocks for Other Time Zones To add clocks for other time zones: 1 Choose Extras > Clocks. 2 On the Clocks screen, click the Center button and choose Add. 3 Choose a region and then choose a city. The clocks you add appear in a list. The last clock you added appears last. To Do this Set the date Choose Date. Use the Click Wheel to change the selected value. Press the Center button to move to the next value. Set the time Choose Time. Use the Click Wheel to change the selected value. Press the Center button to move to the next value. Specify the time zone Choose Time Zone and use the Click Wheel to select a city in another time zone. Specify the status of Daylight Savings Time (DST) Choose DST and press the Center button to turn DST on or off. Display the time in 24-hour format Choose 24 Hour Clock and press the Center button to turn the 24-hour format on or off. Display the time in the title bar Choose Time in Title and press the Center button to turn the option on or off. 48 Chapter 5 Extra Features and Accessories To delete a clock: 1 Choose Extras > Clocks. 1 Choose the clock. 2 Choose Delete. Setting the Alarm You can set an alarm for any clock on iPod classic. To use iPod classic as an alarm clock: 1 Choose Extras > Alarms. 2 Choose Create Alarm and set one or more of the following options: To delete an alarm: 1 Choose Extras > Alarms. 2 Choose the alarm and then choose Delete. Setting the Sleep Timer You can set iPod classic to turn off automatically after playing or other content for a specific period of time. To set the sleep timer: 1 Choose Extras > Alarms. 2 Choose Sleep Timer and choose how long you want iPod classic to play. Using the Stopwatch You can use the stopwatch as you exercise to track your overall time and, if you’re running on a track, your lap times. You can play music while you use the stopwatch. To Do this Turn the alarm on Choose Alarm and choose On. Set the time Choose Time. Use the Click Wheel to change the selected value. Press the Center button to move to the next value. Set the date Choose Date. Use the Click Wheel to change the selected value. Press the Center button to move to the next value. Choose a sound Choose Tones or a playlist. If you choose Tones, select Beep to hear the alarm through the internal speaker. If you choose a playlist, you’ll need to connect iPod classic to speakers or headphones to hear the alarm. Set a repeat option Choose Repeat and choose an option (for example, “weekdays”). Name the alarm Choose Label and choose an option (for example, “Wake up”).Chapter 5 Extra Features and Accessories 49 To use the stopwatch: 1 Choose Extras > Stopwatch. 2 Press the Play/Pause button to start the timer. 3 Press the Center button to record lap times. Up to three lap times show beneath the overall time. 4 Press the Play/Pause button to stop the overall timer, or choose Resume to start the timer again. 5 Choose New Timer to start a new stopwatch session. Note: After you start the stopwatch, iPod classic stays on as long as you display the Timer screen and the timer continues to run. If you start the stopwatch and then go to another menu, and iPod classic isn’t playing music or a video, the stopwatch timer stops and iPod classic turns off automatically after a few minutes. To review or delete a logged stopwatch session: 1 Choose Extras > Stopwatch. The current log and a list of saved sessions appear. 2 Choose a log to view session information. iPod classic stores stopwatch sessions with dates, times, and lap statistics. You see the date and time the session started; the total time of the session; the shortest, longest, and average lap times; and the last several lap times. 3 Press the Center button and choose Delete Log to delete the chosen log, or Clear Logs to delete all current logs. Playing Games iPod classic comes with three games: iQuiz, Klondike, and Vortex. To play a game: m Choose Extras > Games and choose a game. You can purchase additional games from the iTunes Store (in some countries) to play on iPod classic. After purchasing games in iTunes, you can add them to iPod classic by syncing them automatically or by managing them manually. To buy a game: 1 In iTunes, select iTunes Store in the source list. 2 Choose iPod Games from the iTunes Store list. 3 Select the game you want and click Buy Game.50 Chapter 5 Extra Features and Accessories To sync games automatically to iPod classic: 1 In iTunes, select iPod classic in the source list and click the Games tab. 2 Select “Sync games.” 3 Click “All games” or “Selected games.” If you click “Selected games,” also select the games you want to sync. 4 Click Apply. Locking the iPod classic Screen You can set a combination to prevent iPod classic from being used by someone without your permission. When you lock an iPod classic that isn’t connected to a computer, you must enter a combination to unlock and use it. Note: This is different from the Hold button in that the Hold button prevents iPod classic buttons from being pressed accidentally. The combination prevents another person from using iPod classic. To set a combination for iPod classic: 1 Choose Extras > Screen Lock. 2 On the New Combination screen, enter a combination:  Use the Click Wheel to select a number for the first position. Press the Center button to confirm your choice and move to the next position.  Use the same method to set the remaining numbers of the combination. You can use the Next/Fast-forward button to move to the next position and the Previous/Rewind button to move to the previous position. Press the Center button in the final position. 3 On the Confirm Combination screen, enter the combination to confirm it, or press Menu to exit without locking the screen. When you finish, you return to the Screen Lock screen, where you can lock the screen or reset the combination. Press the Menu button to exit without locking the screen. To lock the iPod classic screen: m Choose Extras > Screen Lock > Lock. If you just finished setting your combination, Lock will already be selected on the screen. Just press the Center button to lock iPod. When the screen is locked, you see a picture of a lock. Note: You might want to add the Screen Lock menu item to the main menu so that you can quickly lock the iPod classic screen. See “Adding or Removing Items from the Main Menu” on page 9.Chapter 5 Extra Features and Accessories 51 When you see the lock on the screen, you can unlock the iPod classic screen in two ways:  Press the Center button to enter the combination on iPod classic. Use the Click Wheel to select the numbers and press the Center button to confirm them. If you enter the wrong combination, the lock remains. Try again.  Connect iPod classic to the primary computer you use it with, and iPod classic automatically unlocks. Note: If you try these methods and you still can’t unlock iPod classic, you can restore iPod classic. See “Updating and Restoring iPod Software” on page 61. To change a combination you’ve already set: 1 Choose Extras > Screen Lock > Reset. 2 On the Enter Combination screen, enter the current combination. 3 On the New Combination screen, enter and confirm a new combination. Note: If you can’t remember the current combination, the only way to clear it and enter a new one is to restore the iPod classic software. See “Updating and Restoring iPod Software” on page 61. Syncing Contacts, Calendars, and To-Do Lists iPod classic can store contacts, calendar events, and to-do lists for viewing on the go. If you’re using Mac OS X v10.4 or later, you can use iTunes to sync the contact and calendar information on iPod classic with Address Book and iCal. If you’re using any version of Mac OS X earlier than 10.4, you can use iSync to sync your information. Syncing information using iSync requires iSync 1.1 or later, and iCal 1.0.1 or later. If you’re using Windows 2000 or Windows XP, and you use Windows Address Book or Microsoft Outlook 2003 or later to store your contact information, you can use iTunes to sync the address book information on iPod classic. If you use Microsoft Outlook 2003 or later to keep a calendar, you can also sync calendar information. To sync contacts or calendar information using Mac OS X v10.4 or later: 1 Connect iPod classic to your computer. 2 In iTunes, select iPod classic in the source list and click the Contacts tab. 3 Do one of the following:  To sync contacts, in the Contacts section, select “Sync Address Book contacts,” and select an option:  To sync all contacts automatically, select “All contacts.”  To sync selected groups of contacts automatically, select “Selected groups” and select the groups you want to sync.52 Chapter 5 Extra Features and Accessories  To copy contacts’ photos to iPod classic, when available, select “Include contacts’ photos.” When you click Apply, iTunes updates iPod classic with the Address Book contact information you specified.  To sync calendars, in the Calendars section, select “Sync iCal calendars,” and choose an option:  To sync all calendars automatically, choose “All calendars.”  To sync selected calendars automatically, choose “Selected calendars” and select the calendars you want to sync. When you click Apply, iTunes updates iPod classic with the calendar information you specified. To sync contacts and calendars with a Mac and iSync using a version of Mac OS X earlier than v10.4: 1 Connect iPod classic to your computer. 2 Open iSync and choose Devices > Add Device. You need to do this step only the first time you use iSync with iPod classic. 3 Select iPod classic and click Sync Now. iSync puts information from iCal and Mac Address Book onto iPod classic. The next time you want to sync iPod classic, you can simply open iSync and click Sync Now. You can also choose to have iPod classic sync automatically when you connect it. Note: iSync syncs information from your computer with iPod classic. You can’t use iSync to sync information from iPod classic to your computer. To sync contacts or calendars using Windows Address Book or Microsoft Outlook for Windows: 1 Connect iPod classic to your computer. 2 In iTunes, select iPod classic in the source list and click the Contacts tab. 3 Do one of the following:  To sync contacts, in the Contacts section, select “Sync contacts from” and choose Windows Address Book or Microsoft Outlook from the pop-up menu. Then select which contact information you want to sync.  To sync calendars from Microsoft Outlook, in the Calendars section, select “Sync calendars from Microsoft Outlook.” 4 Click Apply. You can also add contact and calendar information to iPod classic manually. iPod classic must be enabled as an external disk (see “Using iPod classic as an External Disk” on page 46).Chapter 5 Extra Features and Accessories 53 To add contact information manually: 1 Connect iPod classic and open your favorite email or contacts application. You can add contacts using Palm Desktop, Microsoft Outlook, Microsoft Entourage, and Eudora, among others. 2 Drag contacts from the application’s address book to the Contacts folder on iPod classic. In some cases, you might need to export contacts and then drag the exported file or files to the Contacts folder. See the documentation for your email or contacts application. To add appointments and other calendar events manually: 1 Export calendar events from any calendar application that uses the standard iCal format (filenames end in .ics) or vCal format (filenames end in .vcs). 2 Drag the files to the Calendars folder on iPod classic. Note: To add to-do lists to iPod classic manually, save them in a calendar file with a .ics or .vcs extension. To view contacts on iPod classic: m Choose Extras > Contacts. To sort contacts by first or last name: m Choose Settings > Sort By, and press the Center button to choose First or Last. To view calendar events: m Choose Extras > Calendars. To view to-do lists: m Choose Extras > Calendars > To Do’s. Storing and Reading Notes You can store and read text notes on iPod classic if it’s enabled as an external disk (see page 46). 1 Save a document in any word-processing application as a text (.txt) file. 2 Place the file in the Notes folder on iPod classic. To view notes: m Choose Extras > Notes.54 Chapter 5 Extra Features and Accessories Recording Voice Memos You can record voice memos using an optional iPod classic-compatible microphone (available for purchase at www.apple.com/ipodstore). You can store voice memos on iPod classic and sync them with your computer. You can set iPod classic to record at low-quality mono (22.05 kHz) to save space, or high-quality stereo (44.1 kHz) for better sound. Note: Voice memos cannot be longer than two hours. If you record for more than two hours, iPod classic automatically starts a new voice memo to continue your recording. To record a voice memo: 1 Connect a microphone to the Dock connector port on iPod classic. 2 Set Quality to Low or High. 3 To begin recording, choose Record. 4 Hold the microphone a few inches from your mouth and speak. To pause recording, choose Pause. 5 When you finish, choose Stop and Save. Your saved recording is listed by date and time. To play a recording: m Choose Extras > Voice Memos and select the recording. Note: You won’t see a Voice Memos menu item if you’ve never connected a microphone to iPod classic. To sync voice memos with your computer: Voice memos are saved in a Recordings folder on iPod in the WAV file format. If you enable iPod classic for disk use, you can drag voice memos from the folder to copy them. If iPod classic is set to sync songs automatically (see “Syncing Music Automatically” on page 23) and you record voice memos, the voice memos are automatically synced to a playlist in iTunes (and removed from iPod classic) when you connect iPod classic. You see the new Voice Memos playlist in the source list. Learning About iPod classic Accessories iPod classic comes with some accessories, and many other accessories are available at www.apple.com/ipodstore. To purchase iPod classic accessories, go to www.apple.com/ipodstore. Chapter 5 Extra Features and Accessories 55 Available accessories include:  iPod Radio Remote  Apple Universal Dock  Apple Component AV Cable  Apple Composite AV Cable  Apple AV Connection Kit  Apple USB Power Adapter  iPod In-Ear Headphones  World Travel Adapter Kit  Leather Case for iPod classic  iPod Socks  iPod Earphones  Third-party accessories—such as speakers, headsets, cases, car stereo adapters, power adapters, and more To use the earphones: m Plug the earphones into the Headphones port. Then place the earbuds in your ears as shown. WARNING: Permanent hearing loss may occur if earbuds or headphones are used at high volume. You can adapt over time to a higher volume of sound that may sound normal but can be damaging to your hearing. If you experience ringing in your ears or muffled speech, stop listening and have your hearing checked. The louder the volume, the less time is required before your hearing could be affected. Hearing experts suggest that to protect your hearing:  Limit the amount of time you use earbuds or headphones at high volume.  Avoid turning up the volume to block out noisy surroundings.  Turn the volume down if you can’t hear people speaking near you. For information about setting a maximum volume limit on iPod, see “Setting the Maximum Volume Limit” on page 29. The earphones cord is adjustable.6 56 6 Tips and Troubleshooting Most problems with iPod classic can be solved quickly by following the advice in this chapter. General Suggestions Most problems with iPod classic can be solved by resetting it. First, make sure iPod classic is charged. To reset iPod classic: 1 Toggle the Hold switch on and off (slide it to HOLD and then back again). 2 Press and hold the Menu and Center buttons for at least 6 seconds, until the Apple logo appears. If iPod classic won’t turn on or respond  Make sure the Hold switch isn’t set to HOLD.  The iPod classic battery might need to be recharged. Connect iPod classic to your computer or to an Apple USB Power Adapter and let the battery recharge. Look for the lightning bolt icon on the iPod classic screen to verify that iPod classic is receiving a charge. The 5 Rs: Reset, Retry, Restart, Reinstall, Restore Remember these five basic suggestions if you have a problem with iPod classic. Try these steps one at a time until your issue is resolved. If one of the following doesn’t help, read on for solutions to specific problems.  Reset iPod classic. See “General Suggestions,” below.  Retry with a different USB port if you cannot see iPod classic in iTunes.  Restart your computer, and make sure you have the latest software updates installed.  Reinstall iTunes software from the latest version on the web.  Restore iPod classic. See “Updating and Restoring iPod Software” on page 61.Chapter 6 Tips and Troubleshooting 57 To charge the battery, connect iPod classic to a USB 2.0 on your computer. Connecting iPod classic to a USB port on your keyboard won’t charge the battery, unless your keyboard has a high-powered USB 2.0 port.  Try the 5 Rs, one by one, until iPod classic responds. If you want to disconnect iPod classic, but you see the message “Connected” or “Sync in Progress”  If iPod classic is syncing music, wait for it to complete.  Select iPod classic in the iTunes source list and click the Eject (C) button.  If iPod classic disappears from the list of devices in the iTunes source list, but you still see the “Connected” or “Sync in Progress” message on the iPod classic screen, disconnect iPod classic.  If iPod classic doesn’t disappear from the list of devices in the iTunes source list, drag the iPod classic icon from the desktop to the Trash (if you’re using a Mac) or, if you’re using a Windows PC, eject the device in My Computer or click the Safely Remove Hardware icon in the system tray and select iPod classic. If you still see the “Connected” or “Sync in Progress” message, restart your computer and eject iPod classic again. If iPod classic isn’t playing music  Make sure the Hold switch isn’t set to HOLD.  Make sure the headphone connector is pushed in all the way.  Make sure the volume is adjusted properly. A maximum volume limit might have been set. You can change or remove it by using Settings > Volume Limit. See “Setting the Maximum Volume Limit” on page 29.  iPod classic might be paused. Try pressing the Play/Pause button.  Make sure you’re using iTunes 7.4 or later (go to www.apple.com/ipod/start). Songs purchased from the iTunes Store using earlier versions of iTunes won’t play on iPod classic until you upgrade iTunes.  If you’re using the iPod Universal Dock, make sure the iPod classic is seated firmly in the Dock and make sure all cables are connected properly. If you connect iPod classic to your computer and nothing happens  Make sure you have installed the latest iTunes software from www.apple.com/ipod/start.  Try connecting to a different USB port on your computer. Note: A USB 2.0 port is recommended to connect iPod classic. USB 1.1 is significantly slower than USB 2.0. If you have a Windows PC that doesn’t have a USB 2.0 port, in some cases you can purchase and install a USB 2.0 card. For more information, go to www.apple.com/ipod.  iPod classic might need to be reset (see page 56). 58 Chapter 6 Tips and Troubleshooting  If you’re connecting iPod classic to a portable or laptop computer using the iPod Dock Connector to USB 2.0 Cable, connect the computer to a power outlet before connecting iPod classic.  Make sure you have the required computer and software. See “If you want to doublecheck the system requirements” on page 60.  Check the cable connections. Unplug the cable at both ends and make sure no foreign objects are in the USB ports. Then plug the cable back in securely. Make sure the connectors on the cables are oriented correctly. They can be inserted only one way.  Try restarting your computer.  If none of the previous suggestions solves your problems, you might need to restore iPod classic software. See “Updating and Restoring iPod Software” on page 61. If iPod classic displays a “Connect to Power” message This message may appear if iPod classic is exceptionally low on power and the battery needs to be charged before iPod classic can communicate with your computer. To charge the battery, connect iPod classic to a USB 2.0 port on your computer. Leave iPod classic connected to your computer until the message disappears and iPod classic appears in iTunes or the Finder. Depending on how depleted the battery is, you may need to charge iPod classic for up to 30 minutes before it will start up. To charge iPod classic more quickly, use the optional Apple USB Power Adapter. Note: Connecting iPod classic to a USB port on your keyboard won’t charge the battery, unless your keyboard has a high-powered USB 2.0 port. If iPod classic displays a “Use iTunes to restore” message  Make sure you have the latest version of iTunes on your computer (download it from www.apple.com/ipod/start).  Connect iPod classic to your computer. When iTunes opens, follow the onscreen prompts to restore iPod classic.  If restoring iPod classic doesn’t solve the problem, iPod classic may need to be repaired. You can arrange for service at the iPod Service & Support website: www.apple.com/support/ipod If songs or data sync more slowly over USB 2.0  If you sync a large number of songs or amount of data using USB 2.0 and the iPod classic battery is low, iPod classic syncs the information at a reduced speed in order to conserve battery power.  If you want to sync at higher speeds, you can stop syncing and keep the iPod classic connected so that it can recharge, or connect it to the optional iPod USB 2.0 Power Adapter. Let iPod classic charge for about an hour, and then resume syncing your music or data.Chapter 6 Tips and Troubleshooting 59 If you can’t add a song or other item to iPod classic The song may have been encoded in a format that iPod classic doesn’t support. The following audio file formats are supported by iPod classic. These include formats for audiobooks and podcasting:  AAC (M4A, M4B, M4P, up to 320 Kbps)  Apple Lossless (a high-quality compressed format)  MP3 (up to 320 Kbps)  MP3 Variable Bit Rate (VBR)  WAV  AA (audible.com spoken word, formats 2, 3, and 4)  AIFF A song encoded using Apple Lossless format has full CD-quality sound, but takes up only about half as much space as a song encoded using AIFF or WAV format. The same song encoded in AAC or MP3 format takes up even less space. When you import music from a CD using iTunes, it’s converted to AAC format by default. Using iTunes for Windows, you can convert nonprotected WMA files to AAC or MP3 format. This can be useful if you have a library of music encoded in WMA format. iPod classic doesn’t support WMA, MPEG Layer 1, MPEG Layer 2 audio files, or audible.com format 1. If you have a song in iTunes that isn’t supported by iPod classic, you can convert it to a format iPod classic supports. For more information, see iTunes Help. If you accidentally set iPod classic to use a language you don’t understand You can reset the language. 1 Press and hold Menu until the main menu appears. 2 Choose the sixth menu item (Settings). 3 Choose the last menu item (Reset Settings). 4 Choose the left item (Reset) and select a language. Other iPod classic settings, such as song repeat, are also reset. Note: If you added or removed items from the iPod classic main menu (see “Adding or Removing Items from the Main Menu” on page 9) the Settings menu item may be in a different place. If you can’t find the Reset Settings menu item, you can restore iPod classic to its original state and choose a language you understand. See “Updating and Restoring iPod Software” on page 61. If you can’t see videos or photos on your TV  You must use RCA-type cables made specifically for iPod classic, such as the Apple Component or Apple Composite AV cables, to connect iPod classic to your TV. Other similar RCA-type cables won’t work.60 Chapter 6 Tips and Troubleshooting  Make sure your TV is set to display images from the correct input source (see the documentation that came with your TV for more information).  Make sure all cables are connected correctly (see “Watching Videos on a TV Connected to iPod classic” on page 38).  Make sure the yellow end of the Apple Composite AV Cable is connected to the video port on your TV.  If you’re trying to watch a video, go to Videos > Settings and set TV Out to On, and then try again. If you’re trying to view a slideshow, go to Photos > Slideshow Settings and set TV Out to On, and then try again.  If that doesn’t work, go to Videos > Settings (for video) or Photos > Settings (for a slideshow) and set TV Signal to PAL or NTSC, depending on which type of TV you have. Try both settings. If you want to double-check the system requirements To use iPod classic, you must have:  One of the following computer configurations:  A Mac with a USB 2.0 port  A Windows PC with a USB 2.0 or a USB 2.0 card installed  One of the following operating systems:  Mac OS X v10.4.9 or later  Windows Vista  Windows XP Home or Professional with Service Pack 2 or later  iTunes 7.6 or later (iTunes can be downloaded from www.apple.com/ipod/start) If your Windows PC doesn’t have a USB 2.0 port, you can purchase and install a USB 2.0 card. For more information on cables and compatible USB cards, go to www.apple.com/ipod. On the Mac, iPhoto 4.0.3 or later is recommended for adding photos and albums to iPod classic. This software is optional. iPhoto might already be installed on your Mac. Check the Applications folder. If you have iPhoto 4 you can update it by choosing Apple () > Software Update. On a Windows PC, iPod classic can sync photo collections automatically from Adobe Photoshop Album 2.0 or later, and Adobe Photoshop Elements 3.0 or later, available at www.adobe.com. This software is optional. On both Mac and Windows PC, iPod classic can sync digital photos from folders on your computer’s hard disk.Chapter 6 Tips and Troubleshooting 61 If you want to use iPod classic with a Mac and a Windows PC If you’re using iPod classic with a Mac and you want to use it with a Windows PC, you must restore the iPod software for use with the PC (see “Updating and Restoring iPod Software” on page 61). Restoring the iPod software erases all data from iPod classic, including all songs. You cannot switch from using iPod classic with a Mac to using it with a Windows PC without erasing all data on iPod classic. If you lock the iPod classic screen and can’t unlock it Normally, if you can connect iPod classic to the computer it’s authorized to work with, iPod classic automatically unlocks. If the computer authorized to work with iPod classic is unavailable, you can connect iPod classic to another computer and use iTunes to restore iPod software. See the next section for more information. If you want to change the screen lock combination and you can’t remember the current combination, you must restore the iPod software and then set a new combination. Updating and Restoring iPod Software You can use iTunes to update or restore iPod software. It’s recommended that you update iPod classic to use the latest software. You can also restore the software, which puts iPod classic back to its original state.  If you choose to update, the software is updated, but your settings and songs aren’t affected.  If you choose to restore, all data is erased from iPod classic, including songs, videos, files, contacts, photos, calendar information, and any other data. All iPod classic settings are restored to their original state. To update or restore iPod classic: 1 Make sure you have an Internet connection and have installed the latest version of iTunes from www.apple.com/ipod/start. 2 Connect iPod classic to your computer. 3 In iTunes, select iPod classic in the source list and click the Summary tab. The Version section tells you whether iPod classic is up to date or needs a newer version of the software. 4 Click Update to install the latest version of the software. 5 If necessary, click Restore to restore iPod classic to its original settings (this erases all data from iPod classic). Follow the onscreen instructions to complete the restore process.7 62 7 Safety and Cleaning Read the following important safety and handling information for Apple iPods. Keep the iPod Safety Guide and the features guide for your iPod handy for future reference. Important Safety Information Handling iPod Do not bend, drop, crush, puncture, incinerate, or open iPod. Avoiding water and wet locations Do not use iPod in rain, or near washbasins or other wet locations. Take care not to spill any food or liquid into iPod. In case iPod gets wet, unplug all cables, turn iPod off, and slide the Hold switch (if available) to HOLD before cleaning, and allow it to dry thoroughly before turning it on again. Repairing iPod Never attempt to repair iPod yourself. iPod does not contain any userserviceable parts. For service information, choose iPod Help from the Help menu in iTunes or go to www.apple.com/support/ipod. The rechargeable battery in iPod should be replaced only by an Apple Authorized Service Provider. For more information about batteries, go to www.apple.com/batteries. ± Read all safety information below and operating instructions before using iPod to avoid injury. WARNING: Failure to follow these safety instructions could result in fire, electric shock, or other injury or damage.Chapter 7 Safety and Cleaning 63 Using the Apple USB Power Adapter (available separately) If you use the Apple USB Power Adapter (sold separately at www.apple.com/ipodstore) to charge iPod, make sure that the power adapter is fully assembled before you plug it into a power outlet. Then insert the Apple USB Power Adapter firmly into the power outlet. Do not connect or disconnect the Apple USB Power Adapter with wet hands. Do not use any power adapter other than an Apple iPod power adapter to charge your iPod. The iPod USB Power Adapter may become warm during normal use. Always allow adequate ventilation around the iPod USB Power Adapter and use care when handling. Unplug the iPod USB Power Adapter if any of the following conditions exist:  The power cord or plug has become frayed or damaged.  The adapter is exposed to rain, liquids, or excessive moisture.  The adapter case has become damaged.  You suspect the adapter needs service or repair.  You want to clean the adapter. Avoiding hearing damage Permanent hearing loss may occur if earbuds or headphones are used at high volume. Set the volume to a safe level. You can adapt over time to a higher volume of sound that may sound normal but can be damaging to your hearing. If you experience ringing in your ears or muffled speech, stop listening and have your hearing checked. The louder the volume, the less time is required before your hearing could be affected. Hearing experts suggest that to protect your hearing:  Limit the amount of time you use earbuds or headphones at high volume.  Avoid turning up the volume to block out noisy surroundings.  Turn the volume down if you can’t hear people speaking near you. For information about how to set a maximum volume limit on iPod, see “Setting the Maximum Volume Limit” on page 29. Using headphones safely Use of headphones while operating a vehicle is not recommended and is illegal in some areas. Be careful and attentive while driving. Stop using iPod if you find it disruptive or distracting while operating any type of vehicle or performing any other activity that requires your full attention. Avoiding seizures, blackouts, and eye strain If you have experienced seizures or blackouts, or if you have a family history of such occurrences, please consult a physician before playing video games on iPod (if available). Discontinue use and consult a physician if you experience: convulsion, eye or muscle twitching, loss of awareness, involuntary movements, or disorientation. When watching videos or playing games on iPod (if available), avoid prolonged use and take breaks to prevent eye strain.64 Chapter 7 Safety and Cleaning Important Handling Information Carrying iPod iPod contains sensitive components, including, in some cases, a hard drive. Do not bend, drop, or crush iPod. If you are concerned about scratching iPod, you can use one of the many cases sold separately. Using connectors and ports Never force a connector into a port. Check for obstructions on the port. If the connector and port don’t join with reasonable ease, they probably don’t match. Make sure that the connector matches the port and that you have positioned the connector correctly in relation to the port. Keeping iPod within acceptable temperatures Operate iPod in a place where the temperature is always between 0º and 35º C (32º to 95º F). iPod play time might temporarily shorten in low-temperature conditions. Store iPod in a place where the temperature is always between -20º and 45º C (-4º to 113º F). Don’t leave iPod in your car, because temperatures in parked cars can exceed this range. When you’re using iPod or charging the battery, it is normal for iPod to get warm. The exterior of iPod functions as a cooling surface that transfers heat from inside the unit to the cooler air outside. Keeping the outside of iPod clean To clean iPod, unplug all cables, turn iPod off, and slide the Hold switch (if available) to HOLD. Then use a soft, slightly damp, lint-free cloth. Avoid getting moisture in openings. Don’t use window cleaners, household cleaners, aerosol sprays, solvents, alcohol, ammonia, or abrasives to clean iPod. Disposing of iPod properly For information about the proper disposal of iPod, including other important regulatory compliance information, see “Regulatory Compliance Information” on page 66. NOTICE: Failure to follow these handling instructions could result in damage to iPod or other property.8 65 8 Learning More, Service, and Support You can find more information about using iPod classic in onscreen help and on the web. The following table describes where to get more iPod-related software and service information. To learn about Do this Service and support, discussions, tutorials, and Apple software downloads Go to: www.apple.com/support/ipod Using iTunes Open iTunes and choose Help > iTunes Help. For an online iTunes tutorial (available in some areas only), go to: www.apple.com/support/itunes Using iPhoto (on Mac OS X) Open iPhoto and choose Help > iPhoto Help. Using iSync (on Mac OS X) Open iSync and choose Help > iSync Help. Using iCal (on Mac OS X) Open iCal and choose Help > iCal Help. The latest information on iPod classic Go to: www.apple.com/ipod Registering iPod classic To register iPod classic, install iTunes on your computer and connect iPod classic. Finding the iPod classic serial number Look at the back of iPod classic or choose Settings > About and press the Center button. In iTunes (with iPod classic connected to your computer), select iPod classic in the source list and click the Settings tab. Obtaining warranty service First follow the advice in this booklet, the onscreen help, and online resources. Then go to: www.apple.com/support/ipod/ service66 Regulatory Compliance Information FCC Compliance Statement This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. See instructions if interference to radio or TV reception is suspected. Radio and TV Interference This computer equipment generates, uses, and can radiate radio-frequency energy. If it is not installed and used properly—that is, in strict accordance with Apple’s instructions—it may cause interference with radio and TV reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in Part 15 of FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. You can determine whether your computer system is causing interference by turning it off. If the interference stops, it was probably caused by the computer or one of the peripheral devices. If your computer system does cause interference to radio or TV reception, try to correct the interference by using one or more of the following measures:  Turn the TV or radio antenna until the interference stops.  Move the computer to one side or the other of the TV or radio.  Move the computer farther away from the TV or radio.  Plug the computer in to an outlet that is on a different circuit from the TV or radio. (That is, make certain the computer and the TV or radio are on circuits controlled by different circuit breakers or fuses.) If necessary, consult an Apple Authorized Service Provider or Apple. See the service and support information that came with your Apple product. Or, consult an experienced radio/TV technician for additional suggestions. Important: Changes or modifications to this product not authorized by Apple Inc. could void the EMC compliance and negate your authority to operate the product. This product was tested for EMC compliance under conditions that included the use of Apple peripheral devices and Apple shielded cables and connectors between system components. It is important that you use Apple peripheral devices and shielded cables and connectors between system components to reduce the possibility of causing interference to radios, TV sets, and other electronic devices. You can obtain Apple peripheral devices and the proper shielded cables and connectors through an Apple Authorized Reseller. For non-Apple peripheral devices, contact the manufacturer or dealer for assistance. Responsible party (contact for FCC matters only): Apple Inc. Product Compliance, 1 Infinite Loop M/S 26-A, Cupertino, CA 95014-2084, 408-974-2000. Industry Canada Statement This Class B device meets all requirements of the Canadian interference-causing equipment regulations. Cet appareil numérique de la classe B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. VCCI Class B Statement Korea Class B Statement (૶ ૺૺဧ ઠધබ 67 Russia European Community Disposal and Recycling Information Your iPod must be disposed of properly according to local laws and regulations. Because this product contains a battery, the product must be disposed of separately from household waste. When your iPod reaches its end of life, contact Apple or your local authorities to learn about recycling options. For information about Apple’s recycling program, go to: www.apple.com/environment/recycling Deutschland: Dieses Gerät enthält Batterien. Bitte nicht in den Hausmüll werfen. Entsorgen Sie dieses Gerätes am Ende seines Lebenszyklus entsprechend der maßgeblichen gesetzlichen Regelungen. Nederlands: Gebruikte batterijen kunnen worden ingeleverd bij de chemokar of in een speciale batterijcontainer voor klein chemisch afval (kca) worden gedeponeerd. China: Taiwan: European Union—Disposal Information: This symbol means that according to local laws and regulations your product should be disposed of separately from household waste. When this product reaches its end of life, take it to a collection point designated by local authorities. Some collection points accept products for free. The separate collection and recycling of your product at the time of disposal will help conserve natural resources and ensure that it is recycled in a manner that protects human health and the environment. Apple and the Environment At Apple, we recognize our responsibility to minimize the environmental impacts of our operations and products. For more information, go to: www.apple.com/environment © 2008 Apple Inc. All rights reserved. Apple, the Apple logo, FireWire, iCal, iLife, iPhoto, iPod, iPod Socks, iTunes, Mac, Macintosh, and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries. Finder, the FireWire logo, and Shuffle are trademarks of Apple Inc. iTunes Store is a service mark of Apple Inc. Other company and product names mentioned herein may be trademarks of their respective companies. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the performance or use of these products. All understandings, agreements, or warranties, if any, take place directly between the vendors and the prospective users. Every effort has been made to ensure that the information in this manual is accurate. Apple is not responsible for printing or clerical errors. The product described in this manual incorporates copyright protection technology that is protected by method claims of certain U.S. patents and other intellectual property rights owned by Macrovision Corporation and other rights owners. Use of this copyright protection technology must be authorized by Macrovision Corporation and is intended for home and other limited viewing uses only unless otherwise authorized by Macrovision Corporation. Reverse engineering or disassembly is prohibited. Apparatus Claims of U.S. Patent Nos. 4,631,603, 4,577,216, 4,819,098 and 4,907,093 licensed for limited viewing uses only. 019-1148/01-2008Index 68 Index A accessories for iPod 54 adding album artwork 21 adding menu items 9, 27 adding music disconnecting iPod 12 from more than one computer 23, 35 manually 24 methods 22 On-The-Go playlists 28 tutorial 65 adding photos about 40 all or selected photos 41, 42 automatically 41 from computer to iPod 41 from iPod to computer 43 full-resolution image 42 address book, syncing 51 Adobe Photoshop Album 60 Adobe Photoshop Elements 60 alarms deleting 48 setting 48 album artwork adding 21 viewing 31 albums, purchasing 19 audiobooks purchasing 19 setting play speed 32 AV cables 38, 39, 45 B backlight setting timer 9 turning on 6, 9 battery charge states when disconnected 16 charging 14 rechargeable 16 replacing 16 very low 15, 58 viewing charge status 14 brightness setting 10 browsing iTunes Store 19 podcasts 19 quickly 7 songs 6, 26 videos 6, 19 with Cover Flow 7 buttons Center 5 disabling with Hold switch 6 Eject 13 buying. See purchasing C calendar events, syncing 51 Center button, using 5, 26 Charging, Please Wait message 15, 58 charging the battery about 14 using the iPod USB Power Adapter 15 using your computer 14 when battery very low 15, 58 cleaning iPod 64 Click Wheel browsing songs 26 turning off the Click Wheel sound 8 using 5 clocks adding for other time zones 47 settings 47 close captions 38 compilations 27 component AV cable 38, 39, 45 composite AV cable 38, 39, 45 computer adding photos to iPod 41 charging the battery 14 connecting iPod 10 getting photos from iPod 43 importing photos from camera 40Index 69 problems connecting iPod 57 requirements 60 connecting iPod about 10 charging the battery 14 to a TV 39, 45 Connect to Power message 15 contacts sorting 53 syncing 51 controls disabling with Hold switch 8 using 5 converting unprotected WMA files 59 converting videos for use with iPod 34 Cover Flow 7 customizing the Music menu 27 D data files, storing on iPod 46 date and time setting 47 viewing 47 determining battery charge 16 diamond icon on scrubber bar 6 digital photos. See photos disconnecting iPod about 10 during music update 12 ejecting first 12 instructions 13 troubleshooting 57 disk, using iPod as 46 displaying time in title bar 47 downloading podcasts 19 video podcasts 34 See also adding; syncing E Eject button 13 ejecting before disconnecting 12 external disk, using iPod as 46 F fast-forwarding a song or video 6 features of iPod 4 file formats, supported 59 finding your iPod serial number 6 fit video to screen 38 full-resolution images 42 G games 49 getting help 65 getting information about your iPod 10 getting started with iPod 60 H handling information 62 hearing loss warning 55 help, getting 65 Hold switch 6, 8 I iCal, getting help 65 Image Capture, importing photos to a Mac 41 images. See photos importing contacts, calendars, and to-do lists. See syncing importing photos from camera to computer 40 See also adding photos importing videos 34 iPhoto getting help 40, 65 importing photos from camera 40 recommended version 60 iPod Dock 10 iPod Dock Connector 10 iPod Updater application 61 iPod USB power adapter 14 iSync, getting help 65 iTunes ejecting iPod 13 getting help 65 setting not to open automatically 46 Sound Check 30 Store 19 iTunes Library, adding songs 20 iTunes Store browsing 19 browsing videos 34 searching 19 signing in 18, 33 L language resetting 59 specifying 10 letterbox 38 library, adding songs 20 lightning bolt on battery icon 14 locating your iPod serial number 6 locking iPod screen 50 lyrics adding 21 viewing on iPod 3070 Index M Mac OS X operating system 60 main menu adding or removing items 9 opening 5 settings 9, 27 main menu, returning to 6 managing iPod manually 24 manually adding 24 maximum volume limit, setting 29 memos, recording 54 menu items adding or removing 9, 27 choosing 6 returning to main menu 6 returning to previous menu 6 modifying playlists 24 movies syncing 37 syncing selected 36 See also videos music iPod not playing 57 purchasing 19 rating 28 setting for slideshows 44 tutorial 65 See also adding music; songs Music menu, customizing 27 music videos syncing 24 See also videos N navigating quickly 7 notes, storing and reading 53 Now Playing screen moving to any point in a song or video 6 scrubber bar 6 shuffling songs or albums 27 NTSC TV 38, 44 O On-The-Go playlists copying to computer 28 making 27 rating songs 28 saving 28 operating system requirements 60 overview of iPod features 4 P PAL TV 38, 44 pausing a song 6 a video 6 phone numbers, syncing 51 photo collections, adding automatically 41 photo library 41 photos adding and viewing 40 deleting 42, 43 full-resolution 42 importing to Windows PC 41 importing using Image Capture 41 syncing 41, 42 viewing on iPod 43 playing games 49 songs 6 videos 6 playlists adding songs 6, 24 making on iPod 27 modifying 24 On-The-Go 27 setting for slideshows 45 plug on battery icon 14 podcasting 31 podcasts browsing 19 downloading 19 downloading video podcasts 34 listening 31 subscribing 19 updating 25 ports RCA video and audio 39, 45 USB 60 power adapter safety 63 Power Search in iTunes Store 19 previous menu, returning to 6 problems. See troubleshooting purchasing songs, albums, audiobooks 19 purchasing videos 34 Q quick navigation 7 R radio accessory 32 random play 6 rating songs 28 RCA video and audio ports 39, 45 rechargeable batteries 16 recording voice memos 54 registering iPod 65 relative volume, playing songs at 30 removing menu items 9, 27 repairing iPod 62Index 71 replacing battery 16 replaying a song or video 6 requirements computer 60 operating system 60 reset all settings 10 resetting iPod 6, 56 resetting the language 59 restore message 58 restoring iPod software 61 rewinding a song or video 6 S Safely Remove Hardware icon 13 safety considerations setting up iPod 62 safety information 62 saving On-The-Go playlists 28 screen lock 50 scrolling quickly 7 scrubber bar 6 searching iPod 7 iTunes Store 19 Select button. See Center button serial number 6, 10 serial number, locating 65 service and support 65 sets of songs. See playlists setting combination for iPod 50 settings about your iPod 10 alarm 48 audiobook play speed 32 backlight timer 9 brightness 10 Click Wheel sound 8 date and time 47 language 10 main menu 9, 27 PAL or NTSC TV 38, 44 playing songs at relative volume 30 repeating songs 27 reset all 10 shuffle songs 27 sleep timer 48 slideshow 44 TV 38 volume limit 29 shuffling songs on iPod 6, 27 sleep mode and charging the battery 14 sleep timer, setting 48 slideshows background music 44 random order 44 setting playlist 45 settings 44 viewing on iPod 45 software getting help 65 iPhoto 60 iPod Updater 61 support versions 60 updating 61 songs adding to On-The-Go playlists 6 browsing 6 browsing and playing 26 entering names 21 fast-forwarding 6 pausing 6 playing 6 playing at relative volume 30 purchasing 19 rating 28 repeating 27 replaying 6 rewinding 6 shuffling 6, 27 skipping ahead 6 viewing lyrics 21 See also music sorting contacts 53 Sound Check 30 standard TV 38 stopwatch 48, 49 storing data files on iPod 46 notes on iPod 53 subscribing to podcasts 19 supported operating systems 60 suppressing iTunes from opening 46 syncing address book 51 movies 37 music 22 music videos 24 photos 41, 42 selected movies 36 selected videos 36 to-do lists 51 TV shows 37 videos 35 See also adding T third-party accessories 55 time, displaying in title bar 47 timer, setting for backlight 9 time zones, clocks for 4772 Index title bar, displaying time 47 to-do lists, syncing 51 transitions for slides 44 troubleshooting connecting iPod to computer 57 cross-platform use 61 disconnecting iPod 57 iPod not playing music 57 iPod won’t respond 56 resetting iPod 56 restore message 58 safety considerations 62 setting incorrect language 59 slow syncing of music or data 58 software update and restore 61 TV slideshows 59 unlocking iPod screen 61 turning iPod on and off 6 tutorial 65 TV connecting to iPod 39, 45 PAL or NTSC 38, 44 settings 38 viewing slideshows 39, 45 TV shows syncing 37 See also videos U unlocking iPod screen 51, 61 unresponsive iPod 56 unsupported audio file formats 59 updating and restoring software 61 USB 2.0 port recommendation 60 slow syncing of music or data 58 USB port on keyboard 11, 57 Use iTunes to restore message in display 58 V video captions 38 video podcasts downloading 33, 34 viewing on a TV 38 videos adding to iPod 35 browsing 6 browsing in iTunes Store 19, 34 converting 34 fast-forwarding 6 importing into iTunes 34 pausing 6 playing 6 purchasing 33, 34 replaying 6 rewinding 6 skipping ahead 6 syncing 35 viewing on a TV 38 viewing on iPod 38 viewing album artwork 31 viewing lyrics 30 viewing music videos 38 viewing photos 43 viewing slideshows on a TV 39, 45 on iPod 45 settings 44 troubleshooting 59 voice memos recording 54 syncing with your computer 54 volume changing 6 setting maximum limit 29 W warranty service 65 widescreen TV 38 Windows importing photos 41 supported operating systems 60 troubleshooting 61 WMA files, converting 59 Mac OS X Server Server Administration For Version 10.5 LeopardK Apple Inc. © 2007 Apple Inc. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written consent of Apple. The Apple logo is a trademark of Apple Inc., registered in the U.S. and other countries. Use of the “keyboard” Apple logo (Option-Shift-K) for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and state laws. Every effort has been made to ensure that the information in this manual is accurate. Apple is not responsible for printing or clerical errors. Apple 1 Infinite Loop Cupertino, CA 95014-2084 408-996-1010 www.apple.com Apple, the Apple logo, AirPort, AppleTalk, Final Cut Pro, FireWire, iCal, iDVD, iMovie, iPhoto, iPod, iTunes, Mac, Macintosh, the Mac logo, Mac OS, PowerBook, QuickTime and SuperDrive are trademarks of Apple Inc., registered in the U.S. and other countries. Finder, the FireWire logo and Safari are trademarks of Apple Inc. AppleCare and Apple Store are service marks of Apple Inc., registered in the U.S. and other countries. .Mac is a service mark of Apple Inc. PowerPC is a trademark of International Business Machines Corporation, used under license therefrom. Other company and product names mentioned herein are trademarks of their respective companies. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the performance or use of these products. The product described in this manual incorporates copyright protection technology that is protected by method claims of certain U.S. patents and other intellectual property rights owned by Macrovision Corporation and other rights owners. Use of this copyright protection technology must be authorized by Macrovision Corporation and is intended for home and other limited viewing uses only unless otherwise authorized by Macrovision Corporation. Reverse engineering or disassembly is prohibited. Apparatus Claims of U.S. Patent Nos. 4,631,603, 4,577,216, 4,819,098 and 4,907,093 licensed for limited viewing uses only. Simultaneously published in the United States and Canada. 019-0932/2007-09-01 3 1 Contents Preface 11 About This Guide 11 What’s New in Server Admin 12 What’s in This Guide 12 Using Onscreen Help 13 Mac OS X Server Administration Guides 14 Viewing PDF Guides Onscreen 14 Printing PDF Guides 15 Getting Documentation Updates 15 Getting Additional Information Chapter 1 17 System Overview and Supported Standards 17 System Requirements for Installing Mac OS X Server 18 Understanding Server Configurations 19 Advanced Configuration in Action 20 Mac OS X Server Leopard Enhancements 21 Supported Standards 23 Mac OS X Server’s UNIX Heritage Chapter 2 25 Planning 25 Planning 26 Planning for Upgrading or Migrating to Mac OS X Server v10.5 26 Setting Up a Planning Team 27 Identifying the Servers You’ll Need to Set Up 27 Determining Services to Host on Each Server 28 Defining a Migration Strategy 28 Upgrading and Migrating from an Earlier Version of Mac OS X Server 29 Migrating from Windows NT 29 Defining an Integration Strategy 30 Defining Physical Infrastructure Requirements 30 Defining Server Setup Infrastructure Requirements 31 Making Sure Required Server Hardware Is Available 31 Minimizing the Need to Relocate Servers After Setup 32 Defining Backup and Restore Policies4 Contents 32 Understanding Backup and Restore Policies 34 Understanding Backup Types 34 Understanding Backup Scheduling 35 Understanding Restores 36 Other Backup Policy Considerations 37 Command-Line Backup and Restoration Tools Chapter 3 39 Administration Tools 39 Server Admin 40 Opening and Authenticating in Server Admin 40 Server Admin Interface 41 Customizing the Server Admin Environment 42 Server Assistant 42 Workgroup Manager 43 Workgroup Manager Interface 44 Customizing the Workgroup Manager Environment 44 Directory 45 Directory Interface 46 Directory Utility 46 Server Monitor 48 System Image Management 49 Media Streaming Management 49 Command-Line Tools 50 Xgrid Admin 51 Apple Remote Desktop Chapter 4 53 Security 53 About Physical Security 54 About Network Security 54 Firewalls and Packet Filters 54 Network DMZ 55 VLANs 55 MAC Filtering 56 Transport Encryption 56 Payload Encryption 57 About File Security 57 File and Folder Permissions 57 About File Encryption 58 Secure Delete 58 About Authentication and Authorization 60 Single Sign-On 60 About Certificates, SSL, and Public Key Infrastructure 61 Public and Private KeysContents 5 61 Certificates 62 Certificate Authorities (CAs) 62 Identities 62 Self-Signed Certificates 62 Certificate Manager in Server Admin 64 Readying Certificates 64 Requesting a Certificate From a Certificate Authority 65 Creating a Self-Signed Certificate 65 Creating a Certificate Authority 67 Using a CA to Create a Certificate for Someone Else 68 Importing a Certificate 68 Managing Certificates 68 Editing a Certificate 69 Distributing a CA Public Certificate to Clients 69 Deleting a Certificate 70 Renewing an Expired Certificate 70 Using Certificates 70 SSH and SSH Keys 71 Key-Based SSH Login 71 Generating a Key Pair for SSH 73 Administration Level Security 73 Setting Administration Level Privileges 73 Service Level Security 74 Setting SACL Permissions 74 Security Best Practices 76 Password Guidelines 76 Creating Complex Passwords Chapter 5 77 Installation and Deployment 77 Installation Overview 79 System Requirements for Installing Mac OS X Server 79 Hardware-Specific Instructions for Installing Mac OS X Server 79 Gathering the Information You Need 80 Preparing an Administrator Computer 80 About The Server Installation Disc 81 Setting Up Network Services 81 Connecting to the Directory During Installation 81 Installing Server Software on a Networked Computer 81 About Starting Up for Installation 82 Before Starting Up 82 Remotely Accessing the Install DVD 84 Starting Up from the Install DVD 84 Starting Up from an Alternate Partition6 Contents 88 Starting Up from a NetBoot Environment 89 Preparing Disks for Installing Mac OS X Server 96 Identifying Remote Servers When Installing Mac OS X Server 97 Installing Server Software Interactively 97 Installing Locally from the Installation Disc 99 Installing Remotely with Server Assistant 100 Installing Remotely with VNC 101 Using the installer Command-Line Tool to Install Server Software 103 Installing Multiple Servers 104 Upgrading a Computer from Mac OS X to Mac OS X Server 104 How to Keep Current Chapter 6 105 Initial Server Setup 105 Information You Need 105 Postponing Server Setup Following Installation 106 Connecting to the Network During Initial Server Setup 106 Configuring Servers with Multiple Ethernet Ports 107 About Settings Established During Initial Server Setup 107 Specifying Initial Open Directory Usage 109 Not Changing Directory Usage When Upgrading 109 Setting Up a Server as a Standalone Server 109 Setting Up a Server to Connect to a Directory System 110 Using Interactive Server Setup 111 Setting Up a Local Server Interactively 112 Setting Up a Remote Server Interactively 113 Setting Up Multiple Remote Servers Interactively in a Batch 115 Using Automatic Server Setup 116 Creating and Saving Setup Data 117 Setup Data Saved in a File 118 Setup Data Saved in a Directory 119 Keeping Backup Copies of Saved Setup Data 120 Providing Setup Data Files to Servers 121 How a Server Searches for Saved Setup Data 122 Setting Up Servers Automatically Using Data Saved in a File 125 Setting Up Servers Automatically Using Data Saved in a Directory 128 Determining the Status of Setups 128 Using the Destination Pane for Setup Status Information 128 Handling Setup Failures 128 Handling Setup Warnings 129 Getting Upgrade Installation Status Information 129 Setting Up Services 129 Adding Services to the Server View 130 Setting Up Open DirectoryContents 7 130 Setting Up User Management 130 Setting Up File Services 131 Setting Up Print Service 132 Setting Up Web Service 132 Setting Up Mail Service 133 Setting Up Network Services 133 Setting Up System Image and Software Update Services 133 Setting Up Media Streaming and Broadcasting 133 Setting Up Podcast Producer 134 Setting Up WebObjects Service 134 Setting Up iChat Service 134 Setting Up iCal Service Chapter 7 135 Management 136 Ports Used for Administration 136 Ports Open By Default 136 Computers You Can Use to Administer a Server 137 Setting Up an Administrator Computer 137 Using a Non-Mac OS X Computer for Administration 138 Using the Administration Tools 138 Opening and Authenticating in Server Admin 139 Adding and Removing Servers in Server Admin 140 Grouping Servers Manually 140 Grouping Servers Using Smart Groups 141 Working With Settings for a Specific Server 143 Changing the IP Address of a Server 144 Changing the Server’s Host Name After Setup 144 Changing Server Configuration Type 145 Administering Services 145 Adding and Removing Services in Server Admin 146 Importing and Exporting Service Settings 146 Controlling Access to Services 147 Using SSL for Remote Server Administration 148 Managing Sharing 149 Tiered Administration Permissions 149 Defining Administrative Permissions 150 Workgroup Manager Basics 151 Opening and Authenticating in Workgroup Manager 151 Administering Accounts 151 Working with Users and Groups 152 Defining Managed Preferences 154 Working with Directory Data 154 Customizing the Workgroup Manager Environment8 Contents 155 Working With Pre-Version 10.5 Computers From Version 10.5 Servers 155 Service Configuration Assistants 155 Critical Configuration and Data Files 159 Improving Service Availability 159 Eliminating Single Points of Failure 160 Using Xserve for High Availability 160 Using Backup Power 161 Setting Up Your Server for Automatic Reboot 162 Ensuring Proper Operational Conditions 162 Providing Open Directory Replication 163 Link Aggregation 164 The Link Aggregation Control Protocol (LACP) 164 Link Aggregation Scenarios 166 Setting Up Link Aggregation in Mac OS X Server 167 Monitoring Link Aggregation Status 168 Load Balancing 169 Daemon Overview 169 Viewing Running Daemons 169 Daemon Control Chapter 8 171 Monitoring 171 Planning a Monitoring Policy 172 Planning Monitoring Response 172 Server Status Widget 172 Server Monitor 173 RAID Admin 173 Console 173 Disk Monitoring Tools 174 Network Monitoring Tools 175 Notification in Server Admin 176 Monitoring Server Status Overviews Using Server Admin 177 Simple Network Management Protocol (SNMP) 178 Enabling SNMP reporting 178 Configuring snmpd 180 Notification and Event Monitoring Daemons 182 Logging 182 Syslog 183 Directory Service Debug Logging 183 Open Directory Logging 184 AFP Logging 184 Additional Monitoring AidsContents 9 Chapter 9 185 Sample Setup 185 A Single Mac OS X Server in a Small Business 186 How to Set Up the Server Appendix 195 Mac OS X Server Advanced Worksheet Glossary 207 Index 22510 Contents 11 Preface About This Guide This guide provides a starting point for administering Mac OS X Leopard Server in advanced configuration mode. It contains information about planning, practices, tools, installation, deployment, and more by using Server Admin. Server Administration is not the only guide you need when administering advanced mode server, but it gives you a basic overview of planning, installing, and maintaining Mac OS X Server using Server Admin. What’s New in Server Admin Included with Mac OS X Server v10.5 is Server Admin, Apple’s powerful, flexible, fullfeatured server administration tool. Server Admin is reinforced with improvements in standards support and reliability. Server Admin also delivers a number of enhancements:  Newly refined and streamlined interface  Share Point management (functionality moved from Workgroup Manager)  Event notification  Tiered administration (delegated administrative permissions)  Ability to hide and show services as needed  Easy and detailed server status overviews for one or many servers  Groups of servers  Smart Groups of servers  Ability to save and restore service configurations easily  Ability to save and restore Server Admin preferences easily12 Preface About This Guide What’s in This Guide This guide includes the following chapters:  Chapter 1, “System Overview and Supported Standards,” provides a brief overview of Mac OS X Server systems and standards.  Chapter 2, “Planning,” helps you plan for using Mac OS X Server.  Chapter 3, “Administration Tools,” is a reference to the tools used to administer servers.  Chapter 4, “Security,” is a brief guide to security policies and practices.  Chapter 5, “Installation and Deployment,” is an installation guide for Mac OS X Server.  Chapter 6, “Initial Server Setup,” provides a guide to setting up your server after installation.  Chapter 7, “Management,” explains how to work with Mac OS X Server and services.  Chapter 8, “Monitoring,” shows you how to monitor and log into Mac OS X Server. Note: Because Apple periodically releases new versions and updates to its software, images shown in this book may be different from what you see on your screen. Using Onscreen Help You can get task instructions onscreen in Help Viewer while you’re managing Leopard Server. You can view help on a server or an administrator computer. (An administrator computer is a Mac OS X computer with Leopard Server administration software installed on it.) To get help for an advanced configuration of Mac OS X Leopard Server: m Open Server Admin or Workgroup Manager and then:  Use the Help menu to search for a task you want to perform.  Choose Help > Server Admin Help or Help > Workgroup Manager Help to browse and search the help topics. The onscreen help contains instructions taken from Server Administration and other advanced administration guides described in “Mac OS X Server Administration Guides,” next. To see the most recent server help topics: m Make sure the server or administrator computer is connected to the Internet while you’re getting help. Help Viewer automatically retrieves and caches the most recent server help topics from the Internet. When not connected to the Internet, Help Viewer displays cached help topics.Preface About This Guide 13 Mac OS X Server Administration Guides Getting Started covers installation and setup for standard and workgroup configurations of Mac OS X Server. For advanced configurations, Server Administration covers planning, installation, setup, and general server administration. A suite of additional guides, listed below, covers advanced planning, setup, and management of individual services. You can get these guides in PDF format from the Mac OS X Server documentation website: www.apple.com/server/documentation This guide... tells you how to: Getting Started and Installation & Setup Worksheet Install Mac OS X Server and set it up for the first time. Command-Line Administration Install, set up, and manage Mac OS X Server using UNIX commandline tools and configuration files. File Services Administration Share selected server volumes or folders among server clients using the AFP, NFS, FTP, and SMB protocols. iCal Service Administration Set up and manage iCal shared calendar service. iChat Service Administration Set up and manage iChat instant messaging service. Mac OS X Security Configuration Make Mac OS X computers (clients) more secure, as required by enterprise and government customers. Mac OS X Server Security Configuration Make Mac OS X Server and the computer it’s installed on more secure, as required by enterprise and government customers. Mail Service Administration Set up and manage IMAP, POP, and SMTP mail services on the server. Network Services Administration Set up, configure, and administer DHCP, DNS, VPN, NTP, IP firewall, NAT, and RADIUS services on the server. Open Directory Administration Set up and manage directory and authentication services, and configure clients to access directory services. Podcast Producer Administration Set up and manage Podcast Producer service to record, process, and distribute podcasts. Print Service Administration Host shared printers and manage their associated queues and print jobs. QuickTime Streaming and Broadcasting Administration Capture and encode QuickTime content. Set up and manage QuickTime streaming service to deliver media streams live or on demand. Server Administration Perform advanced installation and setup of server software, and manage options that apply to multiple services or to the server as a whole. System Imaging and Software Update Administration Use NetBoot, NetInstall, and Software Update to automate the management of operating system and other software used by client computers. Upgrading and Migrating Use data and service settings from an earlier version of Mac OS X Server or Windows NT.14 Preface About This Guide Viewing PDF Guides Onscreen While reading the PDF version of a guide onscreen:  Show bookmarks to see the guide’s outline, and click a bookmark to jump to the corresponding section.  Search for a word or phrase to see a list of places where it appears in the document. Click a listed place to see the page where it occurs.  Click a cross-reference to jump to the referenced section. Click a web link to visit the website in your browser. Printing PDF Guides If you want to print a guide, you can take these steps to save paper and ink:  Save ink or toner by not printing the cover page.  Save color ink on a color printer by looking in the panes of the Print dialog for an option to print in grays or black and white.  Reduce the bulk of the printed document and save paper by printing more than one page per sheet of paper. In the Print dialog, change Scale to 115% (155% for Getting Started). Then choose Layout from the untitled pop-up menu. If your printer supports two-sided (duplex) printing, select one of the Two-Sided options. Otherwise, choose 2 from the Pages per Sheet pop-up menu, and optionally choose Single Hairline from the Border menu. (If you’re using Mac OS X v10.4 or earlier, the Scale setting is in the Page Setup dialog and the Layout settings are in the Print dialog.) You may want to enlarge the printed pages even if you don’t print double sided, because the PDF page size is smaller than standard printer paper. In the Print dialog or Page Setup dialog, try changing Scale to 115% (155% for Getting Started, which has CD-size pages). User Management Create and manage user accounts, groups, and computers. Set up managed preferences for Mac OS X clients. Web Technologies Administration Set up and manage web technologies, including web, blog, webmail, wiki, MySQL, PHP, Ruby on Rails, and WebDAV. Xgrid Administration and High Performance Computing Set up and manage computational clusters of Xserve systems and Mac computers. Mac OS X Server Glossary Learn about terms used for server and storage products. This guide... tells you how to:Preface About This Guide 15 Getting Documentation Updates Periodically, Apple posts revised help pages and new editions of guides. Some revised help pages update the latest editions of the guides.  To view new onscreen help topics for a server application, make sure your server or administrator computer is connected to the Internet and click “Latest help topics” or “Staying current” in the main help page for the application.  To download the latest guides in PDF format, go to the Mac OS X Server documentation website: www.apple.com/server/documentation Getting Additional Information For more information, consult these resources:  Read Me documents—important updates and special information. Look for them on the server discs.  Mac OS X Server website (www.apple.com/server/macosx)—gateway to extensive product and technology information.  Mac OS X Server Support website (www.apple.com/support/macosxserver)—access to hundreds of articles from Apple’s support organization.  Apple Discussions website (discussions.apple.com)—a way to share questions, knowledge, and advice with other administrators.  Apple Mailing Lists website (www.lists.apple.com)—subscribe to mailing lists so you can communicate with other administrators using email.16 Preface About This Guide 1 17 1 System Overview and Supported Standards Mac OS X Server gives you everything you need to provide standards-based workgroup and Internet services — delivering a world-class UNIX-based server solution that’s easy to deploy and easy to manage. This chapter contains information you need to make decisions about where and how you deploy Mac OS X Server. It contains general information about configuration options, standard protocols used, it’s UNIX roots, and network and firewall configurations necessary for Mac OS X Server administration. System Requirements for Installing Mac OS X Server The Macintosh desktop computer or server onto which you install Mac OS X Server v10.5 Leopard must have:  An Intel or PowerPC G4 or G5 processor, 867 MHz or faster  Built-in FireWire  At least 1 gigabyte (GB) of random access memory (RAM)  At least 10 gigabytes (GB) of available disk space  A new serial number for Mac OS X Server10.5 The serial number used with any previous version of Mac OS X Server will not allow registration in v10.5. A built-in DVD drive is convenient but not required. A display and keyboard are optional. You can install server software on a computer that has no display and keyboard by using an administrator computer. For more information, see “Setting Up an Administrator Computer” on page 137. 18 Chapter 1 System Overview and Supported Standards Understanding Server Configurations Mac OS X Server can operate in three different configurations: advanced, workgroup, and standard. Servers in advanced configurations are the most flexible, and require the most skill to administer. They can be customized for a variety of purposes and needs. An advanced configuration of Mac OS X Server gives the experienced system administrator complete control of service configuration to accommodate a wide variety of business needs. After performing initial setup with Setup Assistant, you use powerful administration applications such as Server Admin and Workgroup Manager, or command-line tools, to configure advanced settings for services the server must provide. The other two configurations are subsets of the possible services and capabilities of an advanced configuration. They have a simplified administration application, named Server Preferences, and are targeted at more specific roles in an organization. The workgroup configuration of Mac OS X Server is used for a workgroup in an organization with an existing directory server. A workgroup configuration connects to an existing directory server in your organization and uses the users and groups from the organization’s directory in a workgroup server directory. The standard configuration of Mac OS X Server features automated setup and simplified administration for an independent server in a small organization. The following table highlights the features and capabilities of each configuration. Feature Advanced Workgroup Standard Service settings changed with... Server Admin Server Preferences Server Preferences Service settings are... Unconfigured Preset to a few common defaults Preset to common defaults Users and groups managed with... Workgroup Manager Server Preferences Server Preferences User service settings automatically provisioned No Yes Yes Usable as a standalone server Yes No Yes Usable as an Open Directory Master Yes No Yes Usable as an Open Directory Replica Yes Yes No Usable as a dedicated network Gateway Yes No YesChapter 1 System Overview and Supported Standards 19 For more information about the Standard and Workgroup configurations and what services are enabled by default for them, see Getting Started. Advanced Configuration in Action The following illustration depicts several advanced configurations of Mac OS X Server that serve a large organization. Each server is set up to provide some of the services. For example, one server provides iCal, iChat, and mail service for the organization. Another provides QuickTime media streaming and Podcast Producer. To ensure high availability of home folders and share points, a master file server and a backup file server have IP failover configured so that if the master fails, the backup transparently takes over. The master and backup file servers use an Xsan storage area network to access the same RAID storage without corrupting it. Usable as an Active Directory Replica Yes No No Monitored and backed up using... Whatever method implemented by the system administrator Server Preferences Server Preferences Dependant on an existing service infrastructure No Yes No Dependant on an existing well-formed DNS system Yes Yes No Feature Advanced Workgroup Standard The Internet AirPort Extreme DCHP, DNS, RADIUS, VPN Open Directory replica File sharing Home folders System imaging and software update QuickTime streaming iCal, iChat, and mail Open Directory master Web with wiki and blog20 Chapter 1 System Overview and Supported Standards For high availability of directory services, Open Directory replicas provide directory service if the Open Directory master goes offline. The Open Directory domain has user, group, individual computer, and computer group accounts. This allows Mac OS X user preferences to be managed at the group and computer group level. The web service hosts a website on the Internet for the organization. It also provides wiki websites on the intranet for groups in the organization. Mac OS X Server Leopard Enhancements Mac OS X Server includes more than 250 new features, making it the biggest improvement to the server operating system since Mac OS X Server was launched. Here are a few enhancements:  Xgrid 2 service: Xgrid 2 service lets you achieve supercomputer performance levels by distributing computations over collections of dedicated or shared Mac OS X computers. Xgrid 2 features GridAnywhere, allowing Xgrid-enabled software to run where you choose, even if you haven’t set up a controller or agents; and Scoreboard for prioritizing which agents are used for each job. Cluster controller provides centralized access to the distributed computing pool, referred to as a computational cluster.  File services: Improved file services includes improved performance and security for each network file service, notably enhanced SMB support and secure NFS v3 using Kerberos authentication and AutoFS.  iChat Server 2: iChat Server 2 can federate its community of users with communities of other Extensible Messaging and Presence Protocol (XMPP) messaging systems, such as Google Talk, allowing members of the iChat server community to chat with members of the federated communities.  Mail service: Mail service has added support for mail store clustering when used with Xsan. It also has integrated vacation message functionality. It features improved performance with 64-bit mail services with SMTP, IMAP, and POP.  Open Directory 4: This new version of Open Directory includes new LDAP proxy capability, cross-domain authorization, cascading replication, and replica sets.  RADIUS authentication: RADIUS allows authentication for clients connecting to the network via AirPort Base Stations.  QuickTime Streaming Server 6: Enhanced QuickTime Streaming Server supports 3GPP Release 6 bit-rate adaptation for smooth streaming to mobile phones regardless of network congestion. It integrates with Open Directory on your server when authenticating content delivery, and features improved performance with 64-bit service.Chapter 1 System Overview and Supported Standards 21  Web services: Web server administrators now have Apache 2.2 (for clean and service upgrade installations) or 1.3 (for system upgraded servers). MySQL 5, PHP, and Apache are integrated. Ruby on Rails with Mongrel has been included for simplified development of web-based applications. Supported Standards Mac OS X Server provides standards-based workgroup and Internet services. Instead of developing proprietary server technologies, Apple has built on the best open source projects: Samba 3, OpenLDAP, Kerberos, Postfix, Apache, Jabber, SpamAssassin, and more. Mac OS X Server integrates these robust technologies and enhances them with a unified, consistent management interface. Because it is built on open standards, Mac OS X Server is compatible with existing network and computing infrastructures. It uses native protocols to deliver directory services, file, printer sharing, and secure network access to Mac, Windows, and Linux clients. A standards-based directory services architecture offers centralized management of network resources using any LDAP server—even proprietary servers such as Microsoft Active Directory. The open source UNIX-based foundation makes it easy to port and deploy existing tools to Mac OS X Server. The following are some of the standards-based technologies that power Mac OS X Server:  Kerberos: Mac OS X Server integrates an authentication authority based on MIT’s Kerberos technology (RFC 1964) to provide users with single sign-on access to secure network resources. Using strong Kerberos authentication, single sign-on maximizes the security of network resources while providing users with easier access to a broad range of Kerberos-enabled network services. For services that have not yet been Kerberized, the integrated SASL service negotiates the strongest possible authentication protocol.  OpenLDAP: Mac OS X Server includes a robust LDAP directory server and a secure Kerberos password server to provide directory and authentication services to Mac, Windows, and Linux clients. Apple has built the Open Directory server around OpenLDAP, the most widely deployed open source LDAP server, so it can deliver directory services for both Mac-only and mixed-platform environments. LDAP provides a common language for directory access, enabling administrators to consolidate information from different platforms and define one namespace for all network resources. This means a single directory for all Mac, Windows, and Linux systems on the network.22 Chapter 1 System Overview and Supported Standards  RADIUS: Remote Authentication Dial-In User Service (RADIUS) is an authentication, authorization and accounting protocol used by the 802.1x security standard for controlling network access by clients in mobile or fixed configurations. Mac OS X Server uses RADIUS to integrate with AirPort Base Stations serving as a central MAC address filter database. By configuring RADIUS and Open Directory you can control who has access to your wireless network. Mac OS X Server uses the FreeRADIUS Server Project. FreeRADIUS supports the requirements of a RADIUS server, shipping with support for LDAP, MySQL, PostgreSQL, Oracle databases, EAP, EAP-MD5, EAP-SIM, EAP-TLS, EAP-TTLS, EAP-PEAP, and Cisco LEAP subtypes. Mac OS X Server supports proxying, with failover and load balancing.  Mail Service: Mac OS X Server uses robust technologies from the open source community to deliver comprehensive, easy-to-use mail server solutions. Full support for Internet mail protocols—Internet Message Access Protocol (IMAP), Post Office Protocol (POP), and Simple Mail Transfer Protocol (SMTP)—ensures compatibility with standards-based mail clients on Mac, Windows, and Linux systems.  Web Technologies: Mac OS X Server web technologies are based on the open source Apache web server, the most widely used HTTP servers on the Internet. With performance optimized for Mac OS X Server, Apache provides fast, reliable web hosting and an extensible architecture for delivering dynamic content and sophisticated web services. Because web service in Mac OS X Server is based on Apache, you can add advanced features with plug-in modules. Mac OS X Server includes everything professional web masters need to deploy sophisticated web services: integrated tools for collaborative publishing, inline scripting, Apache modules, custom CGIs, and JavaServer Pages and Java Servlets. Database-driven sites can be linked to the included MySQL database. ODBC and JDBC connectivity to other database solutions is also supported. Web service also includes support for Web-based Distributed Authoring and Versioning, known as WebDAV.  File Services: You can configure Mac OS X Server file services to allow clients to access shared files, applications, and other resources over a network. Mac OS X Server supports most major service protocols for maximum compatibility including:  Apple Filing Protocol (AFP), to share resources with clients who use Macintosh computers.  Server Message Block (SMB), protocol to share resources with clients who use Windows computers. This protocol is provided by the Samba open source project.  Network File System (NFS), to share files and folders with UNIX clients.  File Transfer Protocol (FTP), to share files with anyone using FTP client software.Chapter 1 System Overview and Supported Standards 23  IPv6: IPv6 is short for “Internet Protocol Version 6 (RFC 2460). IPv6 is the Internet’s next-generation protocol designed to replace the current Internet Protocol, IP Version 4 (IPv4, or just IP). IPv6 improves routing and network autoconfiguration. It increases the number of network addresses to over 3 x1038 , and eliminates the need for NAT. IPv6 is expected to gradually replace IPv4 over a number of years, with the two coexisting during the transition. Mac OS X Server’s network services are fully IPv6 capable and ready to transition to the next generation addressing as well as being fully able to operate with IPv4.  SNMP: The Simple Network Management Protocol (SNMP) is used to monitor network–attached devices’ operational status. It is a set of Internet Engineering Task Force (IETF)–designed standards for network management, including an Application Layer protocol, a database schema, and a set of data objects. Mac OS X Server uses the open source net-snmp suite to provide SNMPv3 (i.e. RFCs 3411-3418) service. Mac OS X Server’s UNIX Heritage Mac OS X Server has a UNIX-based foundation built around the Mach microkernel and the latest advances from the Berkeley Software Distribution (BSD) open source community. This foundation provides Mac OS X Server with a stable, high-performance, 64-bit computing platform for deploying server-based applications and services. Mac OS X Server is built on an open source operating system called Darwin, which is part of the BSD family of UNIX-like systems. BSD is a family of UNIX variants descended from Berkeley’s version of UNIX. Also, Mac OS X Server incorporates more than 100 open source projects in addition to proprietary enhancements and extended functionality created by Apple. The BSD portion of the Mac OS X kernel is derived primarily from FreeBSD, a version of 4.4BSD that offers advanced networking, performance, security, and compatibility features. In general, BSD variants are derived (sometimes indirectly) from 4.4BSD-Lite Release 2 from the Computer Systems Research Group (CSRG) at the University of California at Berkeley. Although the BSD portion of Mac OS X is primarily derived from FreeBSD, some changes have been made. To find out more about the low-level changes made see Apple’s Developer documentation for Darwin.24 Chapter 1 System Overview and Supported Standards 2 25 2 Planning Before installing and setting up Mac OS X Server do a little planning and become familiar with your options. The major goals of the planning phase are to make sure that:  Server user and administrator needs are addressed by the servers you deploy  Server and service prerequisites that affect installation and initial setup are identified Installation planning is especially important if you’re integrating Mac OS X Server into an existing network, migrating from earlier versions of Mac OS X Server, or preparing to set up multiple servers. But even single-server environments can benefit from a brief assessment of the needs you want a server to address. Use this chapter to stimulate your thinking. It doesn’t present a rigorous planning guide, nor does it provide the details you need to determine whether to implement a particular service and assess its resource requirements. Instead, view this chapter as an opportunity to think about how to maximize the benefits of Mac OS X Server in your environment. Planning, like design, isn’t necessarily a linear process. The sections in this chapter don’t require you to follow a mandatory sequence. Different sections in this chapter present suggestions that could be implemented simultaneously or iteratively. Planning During the planning stage, determine how you want to use Mac OS X Server and identify whether there’s anything you need to accomplish before setting it up. For example, you might want to convert an existing server to v10.5 and continue hosting directory, file, and mail services for clients on your network. Before you install server software, you might need to prepare data to migrate to your new server, and perhaps consider whether it’s a good time to implement a different directory services solution. 26 Chapter 2 Planning During the planning stage, you’ll also decide which installation and server setup options best suit your needs. For example, Getting Started contains an example that illustrates server installation and initial setup in a small business scenario with the server in standard configuration mode. Planning for Upgrading or Migrating to Mac OS X Server v10.5 If you’re using a previous version of Mac OS X Server and you want to reuse data and settings, you can upgrade or migrate to v10.5. You can upgrade to Leopard Server if you’re using Mac OS X Server v10.4 Tiger or v10.3 Panther and you don’t need to replace server hardware. Upgrading is simple because it preserves existing settings and data. You can perform an upgrade using any of the installation methods described in this chapter or the advanced methods described in this guide. If you can’t perform an upgrade, for example when you need to reformat the startup disk or replace your server hardware, you can migrate data and settings to a computer that you’ve installed Leopard Server on. Migration is supported from the latest version of Mac OS X Server v10.4 Tiger, Mac OS X Server v10.3.9 Panther, Mac OS X Server v10.2.8 Jaguar, and Windows NT 4 or later. For complete information about migrating data and settings to a different Mac or Xserve, see Upgrading and Migrating. The upgrading and migrating guide provides complete instructions for reusing data and settings in both these scenarios. Setting Up a Planning Team Involve individuals in the installation planning process who represent various points of view, and who can help answer the following questions:  What day-to-day user requirements must be met by a server? What activities will server users and workgroups depend on the server for? If the server is used in a classroom, make sure the instructor who manages its services and administers it daily provides input.  What user management requirements must be met? Will user computers be diskless and therefore need to be started up using NetBoot? Will Macintosh client management and network home folders be required? Individuals with server administration experience should work with server users who might not have a technical background, so they’ll understand how certain services might benefit them.Chapter 2 Planning 27  What existing non-Apple services, such as Active Directory, will the server need to integrate with? If you’ve been planning to replace a Windows NT computer, consider using Mac OS X Server with its extensive built-in support for Windows clients. Make sure that administrators familiar with these other systems are part of the planning process.  What are the characteristics of the network into which the server will be installed? Do you need to upgrade power supplies, switches, or other network components? Is it time to streamline the layout of facilities that house your servers? An individual with systems and networking knowledge can help with these details as well as completing the Mac OS X Server Advanced Worksheet in the appendix. Identifying the Servers You’ll Need to Set Up Conduct a server inventory:  How many servers do you have?  How are they used?  How can you streamline the use of servers you want to keep?  Are there existing servers that need to be retired? Which ones can Mac OS X Server replace?  Which non-Apple servers will Mac OS X Server need to be integrated with? Why?  Do you have Mac OS X Server computers that need to be upgraded to version 10.5?  How many new Mac OS X Server computers will you need to set up? Determining Services to Host on Each Server Identify which services you want to host on each Mac OS X Server and non-Apple server you decide to use. Distributing services among servers requires an understanding of both users and services. Here are a few examples of how service options and hardware and software requirements can influence what you put on individual servers:  Directory services implementations can range from using directories and Kerberos authentication hosted by non-Apple servers to setting up Open Directory directories on servers distributed throughout the world. Directory services require thoughtful analysis and planning. Open Directory Administration can help you understand the options and opportunities.  Home folders for network users can be consolidated onto one server or distributed among various servers. Although you can move home folders, you might need to change a large number of user and share point records, so devise a strategy that will persist for a reasonable amount of time. For information about home folders, see User Management.28 Chapter 2 Planning  Some services offer ways to control the amount of disk space used by individual users. For example, you can set up home folder and mail quotas for users. Consider whether using quotas will offer a way to maximize the disk usage on a server that stores home folders and mail databases. User Management describes home folder and user mail quotas, and Mail Service Administration describes service-wide mail quotas.  Disk space requirements are also affected by the type of files a server hosts. Creative environments need high-capacity storage to accommodate large media files, but elementary school classrooms have more modest file storage needs. File Services Administration describes file sharing.  If you’re setting up a streaming media server, allocate enough disk space to accommodate a certain number of hours of streamed video or audio. For hardware and software requirements and for a setup example, see QuickTime Streaming and Broadcasting Administration.  The number of NetBoot client computers you can connect to a server depends on the server’s Ethernet connections, the number of users, the amount of available RAM and disk space, and other factors. DHCP service needs to be available. For NetBoot capacity planning guidelines, see System Imaging and Software Update Administration.  Mac OS X Server offers extensive support for Windows users. You can consolidate Windows user support on servers that provide PDC services, or you can distribute services for Windows users among different servers. The Open Directory Administration and File Services Administration describe the options available to you.  If you want to use software RAID to stripe or mirror disks, you’ll need two or more drives (they can’t be FireWire drives) on a server. For more information, see online Disk Utility Help. Before finalizing decisions about which servers will host particular services, familiarize yourself with information in the administration guides for services you want to deploy. Defining a Migration Strategy If you’re using Mac OS X Server v10.2–10.4 or a Windows NT server, examine the opportunities for moving data and settings to Mac OS X Server v10.5. Upgrading and Migrating from an Earlier Version of Mac OS X Server If you’re using computers with Mac OS X Server versions 10.2, 10.3, or 10.4, consider upgrading or migrating them to an advanced configuration of Mac OS X Server v10.5 Leopard. If you’re using Mac OS X Server v10.4 or v10.3 and you don’t need to move to different computer hardware, you can perform an upgrade installation. Upgrading is simple because it preserves your existing settings and data.Chapter 2 Planning 29 When you can’t use the upgrade approach, you can migrate data and settings. You’ll need to migrate, not upgrade, when:  A version 10.3 or 10.4 server’s hard disk needs reformatting or the server doesn’t meet the minimum Leopard Server system requirements. For more information, see “Understanding System Requirements for Installing Mac OS X Server” on page 66.  You want to move data and settings you’ve been using on a v10.3 or 10.4 server to different server hardware.  You want to move data and settings you’ve been using on a v10.2 server. Migration is supported from the latest versions of Mac OS X Server v10.4, v10.3, and v10.2. When you migrate, you install and set up an advanced configuration of Leopard Server, restore files onto it from the earlier server, and make manual adjustments as required. For complete information, read Upgrading and Migrating. Migrating from Windows NT An advanced configuration of Leopard Server can provide a variety of services to users of Microsoft Windows 95, 98, ME, XP, NT 4, and 2000 computers. By providing these services, Leopard Server can replace Windows NT servers in small workgroups. For information about migrating users, groups, files, and more from a Windows NT server to Mac OS X Server, see Upgrading and Migrating. Defining an Integration Strategy Integrating Mac OS X Server into a heterogeneous environment has two aspects:  Configuring Mac OS X Server to take advantage of existing services  Configuring non-Apple computers to use Mac OS X Server The first aspect primarily involves directory services integration. Identify which Mac OS X Server computers will use existing directories (such as Active Directory, LDAPv3, and NIS directories) and existing authentication setups (such as Kerberos). For options and instructions, see Open Directory Administration. Integration can be as easy as enabling a Directory Utility option, or it might involve adjusting existing services and Mac OS X Server settings. The second aspect is largely a matter of determining the support you want Mac OS X Server to provide to Windows computer users. File Services Administration and Open Directory Administration tell you what’s available. 30 Chapter 2 Planning Defining Physical Infrastructure Requirements Determine whether you need to make site or network topology adjustments before installing and setting up servers.  Who will administer the server, and what kind of server access will administrators need? Classroom servers might need to be conveniently accessible for instructors, while servers that host network-wide directory information should be secured with restricted access in a district office building or centralized computer facility. Because Mac OS X Server administration tools offer complete remote server administration support, there are few times when an administrator should need physical access to a server.  Are there air conditioning or power requirements that must be met? For this kind of information, see the documentation that comes with server hardware.  Are you considering upgrading elements such as cables, switches, and power supplies? Now may be a good time to do it.  Is your TCP/IP network and its subnets configured to support the services and servers you want to deploy? Defining Server Setup Infrastructure Requirements The server setup infrastructure consists of the services and servers you must set up in advance because other services or servers depend on them. For example, If you’ll use Mac OS X Server to provide DHCP, network time, or BootP services to other servers, you should set up the server or servers that provide these services and initiate the services before you set up servers that depend on those services. Or if you want to automate server setup by using setup data stored in a directory, you should set DHCP and directory servers. The amount of setup infrastructure you require depends on the complexity of your site and what you want to accomplish. In general, DHCP, DNS, and directory services are desirable or required for medium-sized and larger server networks:  The most fundamental infrastructure layer comprises network services like DHCP and DNS. All services run better if DNS is on the network, and many services require DNS to work properly. If you’re not hosting DNS, work with the administrator responsible for the DNS server you’ll use when you set up your own servers. DNS requirements for individual services are published in the service-specific administration guides. Setting up DHCP will reflect the physical network topology you’ll be using.Chapter 2 Planning 31  Another crucial infrastructure component is directory services, required for sharing data among services, servers, and user computers. The most common data you need to share is for users and groups, but configuration information such as mount records and other directory data is also shared. A directory services infrastructure is necessary when you want to host cross-platform authentication and when you want different services to share the same names and passwords. Here’s an example of the sequence in which you might set up a server infrastructure that includes DNS, DHCP, and directory services. The services can be set up on the same server or on different servers: 1 Set up the DNS server. 2 Set up DHCP. 3 Configure DHCP to specify the DNS server address so it can be served to DHCP clients. 4 Set up a directory server, including Windows PDC service if required. 5 Populate the directory with data, such as users, groups, and home folder data. This process can involve importing users and groups, setting up share points, setting up managed preferences, and so forth. 6 Configure DHCP to specify the address of the directory server so it can be served to DHCP clients. Your particular needs may affect this sequence. For example, if you want to use VPN, NAT, or IP firewall services, you would factor their setup into the DNS and DHCP setups. Making Sure Required Server Hardware Is Available You might want to postpone setting up a server until all its hardware is in place. For example, you might not want to set up a server whose data you want to mirror until all the disk drives that you need to set up for mirroring are available. You might also want to wait until a RAID subsystem is set up before setting up a home folder server or other server that will use it. Minimizing the Need to Relocate Servers After Setup Try to place a server in its final network location (IP subnet) before setting it up for the first time. If you’re concerned about preventing unauthorized or premature access during setup, you can set up a firewall to protect the server while finalizing its configuration.32 Chapter 2 Planning If you can’t avoid moving a server after initial setup, you must change settings that are sensitive to network location before it can be used. For example, the server’s IP address and host name, stored in both directories and configuration files on the server, must be updated. When you move a server, follow these guidelines:  Minimize the time the server is in its temporary location so the amount of information you need to change is limited.  Postpone configuring services that depend on network settings until the server is in its final location. Such services include Open Directory replication, Apache settings (such as virtual domains), DHCP, and other network infrastructure settings that other computers depend on.  Wait to import final user accounts. Limit accounts to test accounts so you minimize the user-specific network information (such as home folder location) that must change after the move.  After you move the server, you can change its IP address in the Network pane of System Preferences (or use the networksetup tool). Within a few minutes after you change the server’s IP address or name, Mac OS X Server automatically uses the changeip command-line tool to update the name, address, other data stored in the Open Directory domain, local directory domain, and service configuration files on the server. You may need to manually adjust network configurations such as the server’s DNS entries its DHCP static mapping. For information about the changeip tool, see its man page and Command-Line Administration.  Reconfigure the search policy of computers (such as user computers and DHCP servers) that have been configured to use the server in its original location. Defining Backup and Restore Policies All storage systems will fail eventually. Either through equipment wear and tear, accident, or disaster, your data and configuration settings are vulnerable to loss. Before installing any data system, you should have a plan in place to prevent or minimize your data loss. Understanding Backup and Restore Policies There are many reasons to have a backup and restore policy. Your data is subject to material failure through wear, natural or man-made disasters, or just data corruption. Some data loss is beyond your control to prevent, but with a backup and restore plan, you’ll have your data again.Chapter 2 Planning 33 These backup and restore policies must be customized to your situation, your needs, and your own determination of what data needs to be saved, how often, and how much time and effort is used to restore it. Backups are an investment of time, money, administration effort, and often performance. However, there is a clear return on investment in the form of data integrity. You can avoid substantial financial, legal, and organizational costs with a wellplanned and executed backup and restore policy. These policies specify the procedures and practices that fulfill your restoration needs. There are essentially three kinds of restoration needs:  Restoring a deleted or corrupt file  Recovering from disk failure (or catastrophic file deletion)  Archiving data for some organization need (financial, legal, and so forth) Each restoration need determines what type, frequency, and method you use to back up your data. You may want to keep daily backups of all files. This allows for quick restoration of individual overwritten or deleted files. In such a case you have file-level granularity every day: any single file can be restored the following day. There are other levels of granularity as well. For example, you may need to restore and entire day’s data at once. This is a daily snapshot-level granularity: you could restore the entire set of your organization’s data as it was on a given day. These daily snapshots may not be practical to maintain for every day for the life of the organization, so you might choose to keep a set of rolling snapshots that give you daily snapshot-level granularity for only the preceding month. Other levels of restoration you might want or need could be quarter-yearly, semi-annually, or so forth. You may also need archival storage, which is data stored only to be accessed in uncommon circumstances. Archival storage can be in a permanent state, meaning the data is kept for the foreseeable future. Your organization must determine:  What needs to be backed up?  How granular are the restoration needs?  How often is the data backed up?  How accessible is the data (how much time will it take to restore it?  What processes are in place to recover from a disaster during a backup or restore procedure? The answers to these questions are an integral part of your backup and restore policy.34 Chapter 2 Planning Understanding Backup Types There are many different types of backup files (explained below), and within each type there are many different formats and methods. Each backup type serves a different purpose and has different considerations.  Full Images: Full images are byte-level copies of data. They capture the entire state of the hard disk down to the most basic storage unit. These backups also keep copies of the disk filesystem and the unused or erased portion of the disk in question.They can be used for forensic study of the source disk medium. Such fidelity often makes individual file restoration more unwieldy. They are often compressed and are only decompressed to restore the entire file set.  Full File-level Copies: Full file-level copies are backup files that are kept as duplicates. They do not capture the finest detail of unused portions of the source disk, but they do provide a full record of the files as they existed at the time of backup. If a single file changes, the next full file-level backup will make a copy of the whole data set in addition to the file that changed.  Incremental Backups: Incremental backups start with file-level copies, but they only copy changed files since the last backup. This has the benefit of saving storage space, and capturing all applicable changes as they happen.  Snapshots: Snapshots are a copy of data as it was in the past. Snapshots can be made from collections of files, or more often made from links to other files within a backup file set. Snapshots are useful for making backups of volatile data (data that changes quickly, like databases in use or mail servers sending and receiving mail). These backup types are not mutually exclusive; they only exemplify different approaches to copying data for backup purposes. For example, Mac OS X’s Time Machine uses a full file-level copy as a base backup; then it uses incremental backups to create snapshots of a computer’s data on any given day. Understanding Backup Scheduling Backing up files requires time and resources. Before deciding on a backup plan, consider some of the following questions:  How much data will be backed up?  How much time will the backup take?  When does the backup need to happen?  What else is the computer doing during that time?  What sort of resource allocation will be necessary? For example, how much network bandwidth will be necessary to accommodate the load? How much space on backup drives, or how many backup tapes will be required? What sort of drain on computing resources will occur during backup? What personnel will be necessary for the backup?Chapter 2 Planning 35 You will find that different kinds of backup require different answers to these questions. For example, an incremental file copy might take less time and copy less data than a full file copy (because only a fraction of any given data set will have changed since the last backup). Therefore an incremental backup might be scheduled during a normal use period because the impact to users and systems may be very low. However, a full image backup might have a very strong impact for users and systems, if done during the normal use period. Choosing a Backup Rotation Scheme A backup rotation scheme determines the most efficient way to back up data over a specific period of time. An example of a rotation scheme is the grandfather-father-son rotation scheme. In this scheme, you perform incremental daily backups (son), and full weekly (father) and monthly (grandfather) backups. In the grandfather-father-son rotation scheme, the number of media sets you use for backup determines how much backup history you have. For example, if you use eight backup sets for daily backups, you have eight days of daily backup history because you’ll recycle media sets every eight days. Understanding Restores No backup policy or solution is complete without having accompanying plans for data restoration. Depending on what is being restored, you may have different practices and procedures. For example, your organization may have specific tolerances for how long critical systems can be out of use while the data is restored. You may want to consider the following questions:  How long will it take to restore data at each level of granularity? For example, how long will a deleted file or email take to restore? How long will a full hard disk image take to restore? How long would it take to return the whole network to its state three days ago?  What process is most effective for each type of restore? For example, why would we roll back the entire server for a single lost file?  How much administrator action is necessary for each type of restore? How much automation must be developed to best use administrators’ time?  Under what circumstances are the restores initiated? Who and what can start a restore and for what reasons? Restore practices and procedures must be tested regularly. A backup data set that has not been proven to restore correctly cannot be considered a trustworthy backup. Backup integrity is measured by restore fidelity.36 Chapter 2 Planning Defining a Backup Verification Mechanism A backup is no good if you can’t use it to restore lost data. You should have a strategy for regularly conducting test restorations. Some third-party software providers support this functionality. However, if you’re using your own backup solutions, you need to develop the necessary test procedures. Other Backup Policy Considerations Consider the following additional items for your backup policy:  Should file compression be used? If so, what kind?  Are there onsite and offsite backups and archives?  Are there any special considerations for the type of data being stored? For example, for Mac OS X files, can the backup utility preserve file metadata, resource forks, and Access Control List (ACL) privileges? Choosing Backup Media Type Several factors help you determine what type of media to choose:  Cost. Use cost per GB to determine what media to choose. For example, if your storage needs are limited, you can justify higher cost per GB, but if you need a large amount of storage, cost becomes a big factor in your decision. One of the most cost-effective storage solutions is a hard drive RAID. Not only does it provide you with a low cost per GB, but it doesn’t require the special handling needed by other cost-effective storage types, such as tape drives.  Capacity. If you back up only a small amount of data, low-capacity storage media can do the job. But if you need to back up large amounts of data, use high-capacity devices, such as a RAID.  Speed. When your goal is to keep your server available most of the time, restoration speed becomes a big factor in deciding which type of media to choose. Tape backup systems can be very cost-effective, but they are much slower than a RAID.  Reliability. Successful restoration is the goal of a good backup strategy. If you can’t restore lost data, all the effort and cost you spent in backing up data is wasted and the availability of your services compromised. Therefore, it’s important that you choose highly reliable media to prevent data loss. For example, tapes are more reliable than hard disks because they don’t contain moving parts.  Archive life. You never know when you’ll need your backed up data. Therefore, choose media that is designed to last for a long time. Dust, humidity, and other factors can damage storage media and result in data loss.Chapter 2 Planning 37 Command-Line Backup and Restoration Tools Mac OS X Server provides several command-line tools for data backup and restoration:  rsync. Use this command to keep a backup copy of your data in sync with the original. The tool rsync only copies the files that have changed.  ditto. Use this command to perform full backups.  asr. Use this command to back up and restore an entire volume. For more information about these commands, see Command-Line Administration. Leopard’s Time Machine feature is not recommended for server file and system backup of advanced configuration servers. Note: You can use the launchdctl command to automate data backup using the aforementioned commands. For more information about using launchd, see Command-Line Administration.38 Chapter 2 Planning 3 39 3 Administration Tools Manage Mac OS X Server using graphical applications or command-line tools. Mac OS X Server tools offer diverse approaches to server administration:  You can administer servers locally (directly on the server you’re using) or remotely, from another server, a Mac OS X computer, or a UNIX workstation.  Graphical applications, such as Server Admin and Workgroup Manager, offer easy-touse server administration and secure communications for remote server management. You can use these applications on Mac OS X Server (they’re in /Applications/Server/) or on a Mac OS X computer where you’ve installed them, as described in “Setting Up an Administrator Computer” on page 137.  Command-line tools are available for administrators who prefer to use commanddriven server administration. For remote server management, you can submit commands in a Secure Shell (SSH) session. You can type commands on Mac OS X Server computers and Mac OS X computers using the Terminal application, located in /Applications/Utilities/. You can also submit commands from a non-Macintosh computer that’s been set up as described in “Using a Non-Mac OS X Computer for Administration” on page 137. Server Admin You use Server Admin to administer services on one or more Mac OS X Server computers. Server Admin also lets you specify settings that support multiple services, such as creating and managing SSL certificates, manage file sharing, and specifying which users and groups can access services. Information about using Server Admin to manage services appears in the individual administration guides and in onscreen information accessible by using the Help menu in Server Admin.40 Chapter 3 Administration Tools Information about using Server Admin to manage services appears in the individual administration guides and in the following sections. Opening and Authenticating in Server Admin Server Admin is installed in /Applications/Server/, from which you can open it in the Finder. Or you can open Server Admin by clicking the Server Admin icon in the Dock or clicking the Server Admin button on the Workgroup Manager toolbar. To select a server to work with, enter its IP address or DNS name in the login dialog box, or click Available Servers to choose from a list of servers. Specify the user name and password for a server administrator, then click Connect. Server Admin Interface The Server Admin interface is shown here, with each element explained in the following table. A B C D O K L M N E G F H I JChapter 3 Administration Tools 41 Customizing the Server Admin Environment To control the Server Admin environment, you have the following options.  To control the list of services to administer, see “Adding and Removing Services in Server Admin” on page 145.  To control the appearance of Server Admin lists, refresh rates, and other behaviors, choose Server Admin > Preferences. A Server List: Shows servers, groups, smart groups, and if desired, the administered services for each server You select a group to view a status summary for all grouped computers. You select a computer for its overview and server settings. You select a server’s service to control and configure the service. B Context Buttons: Shows available information and configuration panes. C Tool Bar: Shows available context buttons. If a button is greyed out or can’t be clicked, you do not have the administrative permissions to access it. D Main Work Area: Shows status and configuration options. This looks different for each service and for each context button selected. E Available servers: Lists the local-network scanner, which you can use to discover servers to add to your server list. F All Servers: Shows all computers that have been added to Server Admin, regardless of status. G Server: Shows the hostname of the managed server. Select to show a hardware, operating system, active service, and system status summary. H Service: Shows an administered service for a given server. Select to get service status, logs, and configuration options. I Group: Shows an administrator created group of servers. Select to view a status summary for all grouped computers For more information, see “Grouping Servers Manually” on page 140. J Smart Group: Shows an automatic group, populated with servers that meet a predetermined criteria. For more information, see “Grouping Servers Using Smart Groups” on page 140. K Add button: Shows a pop-up menu of items to add to the Server list: servers, groups, and smart groups. L Action button: Shows a pop-up menu of actions possible for a selected service, or server, including disconnect server, share the server’s screen, and so forth. M Refresh button: Allows you to send a status request to all computers visible in the Server list. N Service Start/Stop button: When a service is selected, this button allows you to start or stop the service, as appropriate. O Action bar: Shows buttons and pop-up menus with commands to act on selected servers or services in the Server list. Click this to save or revert setting changes you’ve made. this contains the Add button, Action button, service start and stop buttons, and save and revert buttons.42 Chapter 3 Administration Tools Server Assistant Server Assistant is used for:  Remote server installations  Initial setup of a local server  Initial setup of remote servers  Preparing data for automated setup of an advanced configuration The Server Assistant initla page is shown here. Server Assistant is located in /Applications/Server/. For information about using Server Assistant, use its Help buttons, or see Chapter 6, “Initial Server Setup,” on page 105. Workgroup Manager Mac OS X Server includes Workgroup Manager, a user management tool you can use to create and manage user, group, computer, and computer group accounts. You also use it to access the Inspector, an advanced feature that lets you do raw editing of Open Directory entries. Workgroup Manager is installed in /Applications/Server/, from which you can open it in the Finder. Or you can open Workgroup Manager by clicking View > Workgroup Manager in the Server Admin menu bar.Chapter 3 Administration Tools 43 Workgroup Manager works closely with a directory domain. Directory domains are like databases, and are geared towards storing account information and handling authentication. Information about using Workgroup Manager appears in several documents:  User Management explains how to use Workgroup Manager for account and preference management. This guide also explains how to how to import and export accounts.  Open Directory Administration describes how to use the Inspector. After opening Workgroup Manager, you can open a Workgroup Manager window by choosing Server > New Workgroup Manager Window. Important: When connecting to a server or authenticating in Workgroup Manager, make sure the capitalization of the name you enter matches the name of a server administrator or domain administrator account. Workgroup Manager Interface The Workgroup Manager interface is shown here, with each element explained in the following table. A B C E D F G H I J44 Chapter 3 Administration Tools Customizing the Workgroup Manager Environment There are several ways to tailor the Workgroup Manager environment:  To open Workgroup Manager Preferences, choose Workgroup Manager > Preferences. You can configure options such as if DNS names are resolved, if the Inspector is enabled, if you need to enter a search query to list records, and what the maximum number of displayed records is.  To customize the toolbar, choose View > Customize Toolbar.  To include predefined users and groups in the user and group lists, choose View > Show System Users and Groups.  To open Server Admin, click the Server Admin toolbar button. Directory Directory gives users access to shared information about people, groups, locations, and resources within the organization. They can use Directory to share contacts, set up group services, and manage their own contact information. When users look up information for other people, they’ll see more than just contact information. If the person provides a picture, the user will see what he or she looks like. The user can view the person’s supervisor and direct reports. The user can see the public groups the person belongs to. The user can also print a map with the person’s location pinpointed on it. A Server Admin: Click to launch the Server Admin application. B Settings Buttons: Click Accounts to view or edit account settings, or click Preferences to view or edit preference settings. C Tool Bar: Click the icons to accomplish the various commands. The toolbar is customizable. D Directory path: Use to view the directory you are editing. Click the globe icon to select a directory domain. Click the lock to authenticate. E Record Type tabs: Use to view records for users, groups, computers, and all records. If the Inspector is enabled, this also contains the Inspector tab. F Text filters: Use to enter text to filter record names. G Record list display: Use to view all record names for a selected record type. H Selection bar: Use to view the number of records found and selected. I Main Work Area: Use to work with account, preference, and configuration options. This looks different for each user, group, or preference type. J Action zone: Use to save and revert changes, and to make and apply preset configurations to selected records.Chapter 3 Administration Tools 45 Directory takes advantage of several Mac OS X applications. Users can create shared contacts from Address Book entries, click mail addresses to send mail using Mail, or load group web services in Safari. Directory Interface The Directory interface is shown here, with each element explained in the following table. A Search field: Use to search record types. Numbers appear to the left of the Record Type buttons to indicate the number of matching records. B Record Type buttons: Click to show the type of directory records desired. C Results list: Use to view the results of the record search. D Record view: USe to view the record selected in the Results list. E Add button: Use to add a person, group, location, or resource record. F Edit button: Click to edit the selected record. A B C E D F46 Chapter 3 Administration Tools Directory Utility Directory Utility is the primary application for setting up a Mac OS X computer’s connections to Open Directory, Active Directory, and other directory domains, and for defining the computer’s search policy and service discovery protocols. The Directory Utility interface is below here with advanced configuration options. Directory Utility is installed on both Mac OS X Server computers and Mac OS X computers in /Applications/Utilities/. For information about how to use Directory Utility, see Open Directory Administration or Directory Utility Help. Server Monitor You use Server Monitor to monitor local or remote Xserve hardware and trigger mail notifications when circumstances warrant attention. Server Monitor provides information about the installed operating system, drives, power supply, enclosure and processor temperature, cooling blowers, security, and network.Chapter 3 Administration Tools 47 The Server Monitor interface is shown below. Server Monitor is installed in /Applications/Server/ when you install your server or set up an administrator computer. To open Server Monitor, click the Server Monitor icon in the Dock or double-click the Server Monitor icon in /Applications/Server/. From within Server Admin, choose View > Server Monitor. To identify the Xserve server to monitor, click Add Server, identify the server, and enter user name and password information for an administrator of the server. To specify how often you want to refresh data, use the “Update every” pop-up menu in the Info pane. To manage different lists of Xserve servers you want to monitor, choose File > Export or File > Import. To consolidate lists into one, choose File > Merge. The system identifier lights on the front and back of an Xserve server light when service is required. Use Server Monitor to understand why the lights are on. You can also turn the lights on to identify a particular Xserve server in a rack of servers by selecting the server and clicking “System identifier light” in the Info pane. To set up Server Monitor to notify you by mail when an Xserve server’s status changes, click Edit Notifications. For each server, you set up the conditions for which you want notification. The mail message can come from Server Monitor or from the server. Server Monitor keeps logs of Server Monitor activity for each Xserve server. To view a log, click Show Log. The log shows, for example, Server Monitor attempts to contact the server and whether a connection was successful. The log also shows server status changes. (The logs don’t include system activity on the server.)48 Chapter 3 Administration Tools For additional information, see Server Monitor Help. System Image Management You can use the following Mac OS X Server applications to set up and manage NetBoot and NetInstall images:  System Image Utility creates Mac OS X disk images. It’s installed with Mac OS X Server software in the /Applications/Server/ folder.  Server Admin enables and configures NetBoot service and supporting services. It’s installed with Mac OS X Server software in the /Applications/Server/ folder.  PackageMaker creates package files that you use to add software to disk images. Access PackageMaker from Xcode Tools. An installer for Xcode Tools is on the server Install DVD in the Other Installs folder.  Property List Editor edits property lists such as NBImageInfo.plist. Access Property List Editor from Xcode Tools. The System Image Utility interface is shown below. System Imaging and Software Update Administration provides instructions for using all these applications.Chapter 3 Administration Tools 49 Media Streaming Management QuickTime Streaming and Broadcasting Administration provides instructions for administering QuickTime Streaming Server (QTSS) using Server Admin. QuickTime Streaming and Broadcasting Administration also describes QTSS Publisher, an easy-to-use application for managing media and preparing it for streaming or progressive download. Command-Line Tools If you’re an administrator who prefers to work in a command-line environment, you can do so with Mac OS X Server. From the Terminal application in Mac OS X, you can use the built-in UNIX shells (sh, csh, tsh, zsh, bash) to use tools for installing and setting up server software and for configuring and monitoring services. You can also submit commands from a nonMac OS X computer. When managing remote servers, you conduct secure administration by working in a Secure Shell (SSH) session. Command-Line Administration describes Terminal, SSH, server administration commands, and configuration files.50 Chapter 3 Administration Tools Xgrid Admin You can use Xgrid Admin to monitor local or remote Xgrid controllers, grids, and jobs. You can add controllers and agents to monitor and specify agents that have not yet joined a grid. You also use Xgrid Admin to pause, stop, or restart jobs. The System Image Utility interface is shown here. Xgrid Admin is installed in /Applications/Server/ when you install your server or set up an administrator computer. To open Xgrid Admin, double-click the Xgrid Admin icon in /Applications/Server/. For additional information, see Xgrid Admin help.Chapter 3 Administration Tools 51 Apple Remote Desktop Apple Remote Desktop (ARD), which you can optionally purchase, is an easy-to-use network-computer management application. It simplifies the setup, monitoring, and maintenance of remote computers and lets you interact with users. The Apple Remote Desktop interface is shown here. You can use ARD to control and observe computer screens. You can configure computers and install software. You can conduct one-to-one or one-to-many user interactions to provide help or tutoring. You can perform basic network troubleshooting. And you can generate reports that audit computer hardware characteristics and installed software. You can also use ARD to control installation on a computer that you start up from an installation disc for Mac OS X Server v10.5 or later, because ARD includes VNC viewer capability. For more information about Apple Remote Desktop, go to www.apple.com/remotedesktop/.52 Chapter 3 Administration Tools 4 53 4 Security Vigilant security policies and practices can minimize the threat to system integrity and data privacy. Mac OS X Server is built on a robust UNIX foundation that contains many security features in its core architecture. State-of-the-art, standards-based technologies protect your server, network, and data. These technologies include a built-in firewall with stateful packet analysis, strong encryption and authentication services, data security architectures, and support for access control lists (ACLs). Use this chapter to stimulate your thinking. It doesn’t present a rigorous planning outline, nor does it provide the details you need to determine whether to implement a particular security policy and assess its resource requirements. Instead, view this chapter as an opportunity to plan and institute the security policies necessary for your environment. More information can be found in Mac OS X Server Security Configuration and Mac OS X Security Configuration. About Physical Security The physical security of a server is an often overlooked aspect of computer security. Remember that anyone with physical access to a computer (for example, to open the case, or plug in a keyboard, and so forth) has almost full control over the computer and the data on it. For example, someone with physical access to a computer can:  Restart the computer from another external disc, bypassing any existing login mechanism.  Remove hard disks and use forensic data recovery techniques to retrieve data.  Install hardware-based key-loggers on the local administration keyboard.54 Chapter 4 Security In your own organization and environment, you must decide which precautions are necessary, effective, and cost-effective to protect the value of your data and network. For example, in an organization where floor-to-ceiling barriers might be appropriate to protect a server room, securing the air ducts leading to the room might also need to be considered. Other organizations may merely choose a locked server rack or an Open Firmware password. About Network Security Network security is as important to data integrity as physical security. Although someone might immediately see the need to lock down an expensive server, he or she might not immediately see the need to restrict access to the data on that same server. The following sections provide considerations, techniques, and technologies to assist you in securing your network. Firewalls and Packet Filters Much like a physical firewall that acts as a physical barrier to provide heat and heat damage protection in a building or for a vehicle, a network firewall acts as a barrier for your network assets, preventing data tampering from external sources. Mac OS X Server’s Firewall service is software that protects the network applications running on your Mac OS X Server. Turning on firewall service is similar to erecting a wall to limit access. Firewall service scans incoming IP packets and rejects or accepts these packets based on the set of rules you create. You can restrict access to any IP service running on the server, and you can customize rules for all incoming clients or for a range of client IP addresses. Services such as Web and FTP are identified on your server by a Transmission Control Protocol (TCP) or User Datagram Protocol (UDP) port number. When a computer tries to connect to a service, firewall service scans the rule list for a matching port number. When a rule matches the packet transmission in the connection, the action specified in the rule (such as allow or deny) is taken. Then, depending on the action, additional rules may be checked. Network DMZ In computer network security, a demilitarized zone (DMZ) is a network area (a subnetwork) that is between an organization’s internal network and an external network like the Internet.Chapter 4 Security 55 Connections from the internal and the external network to the DMZ are permitted, but connections from the DMZ are not permitted to the internal network—they are limited to the external network. This allows an organization to provide services to the external network while protecting the internal network from case compromise by a host in the DMZ. If someone compromises a DMZ host, he or she cannot connect to the internal network. The DMZ is often used to connect servers that need to be accessible from the external network or Internet, such as mail, web, and DNS servers. Connections from the external network to the DMZ are often controlled using firewalls and address translation. A DMZ can be created through firewall configuration: each network is connected to a different port on the firewall, called a three-legged firewall setup. This has the benefit of simplicity but the weakness of a single point of failure. Another approach is to use two firewalls, with DMZ in the middle and connected to both firewalls, and with one firewall connected to the internal network and the other to the external network. This has the added benefit of preventing accidental misconfiguration, allowing access from the external network to the internal network. This type of setup is called a screened-subnet firewall. VLANs Mac OS X Server provides 802.1q Virtual Local Area Network (VLAN) support on the Ethernet ports and secondary PCI gigabit Ethernet cards available or included with Xserves. VLAN allows multiple computers on different physical LANs to communicate with each other as if they were on the same LAN. Benefits include more efficient network bandwidth utilization and greater security, because broadcast or multicast traffic is only sent to computers on the common network segment. Xserve G5 VLAN support conforms to the IEEE standard 802.1q. MAC Filtering MAC Filtering (or layer 2 address filtering) refers to a security access control where a network interface’s MAC address, or Ethernet Address (the 42-bit address assigned to each network interface), is used to determine access to the network. MAC addresses are unique to each card, so using MAC filtering on a network permits and denies network access to specific devices, rather than to specific users or network traffic types. Individual users are not identified by a MAC address, only a device, so an authorized person must have an allowed list of devices that he or she would use to access the network.56 Chapter 4 Security In theory, MAC filtering allows a network administrator to permit or deny network access to hosts and devices associated with the MAC address, though in practice there are methods to avoid this form of access control through address modification (spoofing) or the physical exchange of network cards between hosts. Transport Encryption Transferring data securely across a network involves encrypting the packet contents sent between two computers. Mac OS X Server can provide Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL) as the cryptographic protocols that provide secure communications on the Internet for such things as web browsing, mail, and other data transfers. These encryption protocols allow client and server applications to communicate in a way designed to prevent eavesdropping, tampering, and message forgery. TLS provides endpoint authentication and communications privacy over the Internet using cryptography. These encrypted connections authenticate the server (that its identity is ensured) but the client remains unauthenticated. To have mutual authentication (where each side of the connection is assured of the identity of the other), you must use a public key infrastructure (PKI) on the connecting clients. Mac OS X Server makes use of OpenSSL and has integrated transport encryption into the following tools and services:  SSH  VPN  Web Service  Mail Service  Directory Services  iChat Server Payload Encryption Rather than encrypting the transfer of a file across the network, you can encrypt the contents of the file instead. Files with strong encryption might be captured in transit, but would still be unreadable. Most transport encryption requires the participation of both parties in the transaction. Some services (such as SMTP mail service) can’t reliably use such techniques, so encrypting the file itself is the only method of reliably securing the file content. To learn more about file encryption, see “About File Encryption” on page 57.Chapter 4 Security 57 About File Security By default, files and folders are owned by the user who creates them. After they’re created, items keep their privileges (a combination of ownership and permissions) even when moved, unless the privileges are explicitly changed by their owners or an administrator. Therefore, new files and folders you create are not accessible by client users if they are created in a folder that the users don’t have privileges for. When setting up share points, make sure that items allow appropriate access privileges for the users you want to share them with. File and Folder Permissions Mac OS X Server supports two kinds of file and folder permissions:  Standard Portable Operating System Interface (POSIX) permissions  Access Control Lists (ACLs) POSIX permissions let you control access to files and folders based on three categories of users: Owner, Group, and Everyone. Although these permissions give you adequate control over who can access a file or a folder, they lack the flexibility and granularity that many organizations require to deal with elaborate user environments. ACL permissions provide an extended set of permissions for a file or folder and allow you to set multiple users and groups as owners. In addition, ACLs are compatible with Windows Server 2003 and Windows XP, giving you added flexibility in a multiplatform environment. For more information about file permissions, see File Services Administration and Mac OS X Server Security Configuration. About File Encryption Mac OS X has a number of technologies that can perform file encryption, including:  FileVault: FileVault performs on-the-fly encryption on each user’s home folder. This encrypts the entire directory in one virtual volume, which is mounted and the data is unencrypted as needed.  Secure VM: Secure VM performs encryption of system virtual memory (memory data temporarily written to the hard disk for storage). As such it isn’t used for encrypting user’s files, but it does give your system more security by keeping virtual memory files from being read and exploited.  Disk Utility: Disk Utility can create disk images whose contents are encrypted and password protected. Disk images act like removable media such as external hard drives or USB memory sticks, but they exist only as a file on the computer. After you create the encrypted disk image, you double-click it to mount it on your system. All files you drag onto the mounted image are encrypted and stored on the disk image. You can send this disk image to other Mac OS X users. With the unlocking password, they can retrieve the files you locked in the disk image.58 Chapter 4 Security For additional information, the following methods of encrypting files can be found in the Mac OS X Server Security Configuration Guide:  Creating a New Encrypted Disk Image  Creating an Encrypted Disk Image from Existing Data Secure Delete When a file is put in the Trash and the Trash is emptied, or when a file is removed using the UNIX tool “rm,” the files themselves are not removed from the hard disk. Instead, they are removed from the list of files the operating system (OS) tracks of and does not write over. Any space on your hard disk that is free space (places the OS can put a file) most likely contains previously deleted files. Such files can be retrieved using undelete utilities and forensic analysis. To truly remove the data from disk, you must use a more secure delete method. Security experts advise writing over deleted files and free space multiple times with random data. Mac OS X Server provides the following tools to allow you to securely delete files:  Secure Empty Trash (a command in the Finder menu to use instead of “Empty Trash”  srm (a UNIX utility that securely deletes files, used in place of “rm”) About Authentication and Authorization Authentication is verifying a person’s identity, but authorization is verifying that an authenticated person has the authority to perform a certain action. Authentication is necessary for authorization. In a computing context, when you provide a login name and password, you are authenticated to the computer because it assumes only one person (you) knows both the login name and the password. After you are authenticated, the operating system checks lists of people who are permitted to access certain files, and if you are authorized to access them, you are permitted to. Because authorization can’t occur without authentication, authorization is sometimes used to mean the combination of authentication and authorization. In Mac OS X Server, users trying to use various services (like logging in to a directoryaware workstation, or trying to mount a remote volume) must authenticate by providing a login name and password before any privileges for the users can be determined.Chapter 4 Security 59 You have several options for authenticating users:  Open Directory authentication. Based on the standard Simple Authentication and Security Layer (SASL) protocol, Open Directory authentication supports many authentication methods, including CRAM-MD5, APOP, WebDAV, SHA-1, LAN Manager, NTLMv1, and NTLMv2. It’s the preferred way to authenticate Windows users. Authentication methods can be selectively disabled to make password storage on the server more secure. For example, if no clients will use Windows services, you can disable the NTLMv1 and LAN Manager authentication methods to prevent storing passwords on the server using these methods. Then someone who somehow gains access to your password database can’t exploit weaknesses in these authentication methods to crack passwords. Open Directory authentication lets you set up password policies for individual users or for all users whose records are stored in a particular directory, with exceptions if required. Open Directory authentication also lets you specify password policies for individual directory replicas. For example, you can specify a minimum password length or require a user to change the password the next time he or she logs in. You can also disable login for inactive accounts or after a specified number of failed login attempts.  Kerberos v5 authentication. Using Kerberos authentication allows integration into existing Kerberos environments. The Key Distribution Center (KDC) on Mac OS X Server offers full support for password policies you set up on the server. Using Kerberos also provides a feature known as single sign-on, described in the next section. The following services on Mac OS X Server support Kerberos authentication: Apple Filing Protocol (AFP), mail, File Transfer Protocol (FTP), Secure Shell (SSH), login window, LDAPv3, Virtual Private Network (VPN), iChat Server, screen saver, and Apache (via the SPNEGO Simple and Protected GSS-API Negotiation Mechanism protocol).  Storing passwords in user accounts. This approach might be useful when migrating user accounts from earlier server versions. However, this approach may not support clients that require certain network-secure authentication protocols, such as APOP.  Non-Apple LDAPv3 authentication. This approach is available for environments that have an LDAPv3 server set up to authenticate users.  RADIUS (an authentication protocol for controlling network access by clients in mobile or fixed configurations). For more information about RADIUS in Mac OS X Server, see Network Services Administration.60 Chapter 4 Security Single Sign-On Mac OS X Server uses Kerberos for single sign-on authentication, which relieves users from entering a user name and password separately for every service. With single sign- on, a user always enters a user name and password in the login window. Thereafter, the user does not have to enter a name and password for Apple file service, mail service, or other services that use Kerberos authentication. To use the single sign-on feature, users and services must be Kerberized—configured for Kerberos authentication—and must use the same Kerberos Key Distribution Center (KDC) server. User accounts that reside in an LDAP directory of Mac OS X Server and have a password type of Open Directory use the server’s built-in KDC. These user accounts are automatically configured for Kerberos and single sign-on. This server’s Kerberized services also use the server’s built-in KDC and are automatically configured for single sign-on. This Mac OS X Server KDC can also authenticate users for services provided by other servers. Having additional servers with Mac OS X Server use the Mac OS X Server KDC requires only minimal configuration. Kerberos was developed at MIT to provide secure authentication and communication over open networks like the Internet. Kerberos provides proof of identity for two parties. It enables you to prove who you are to network services you want to use. It also proves to your applications that network services are genuine, not spoofed. Like other authentication systems, Kerberos does not provide authorization. Each network service determines for itself what it will allow you to do based on your proven identity. Kerberos allows a client and a server to unambiguously identify each other much more securely than the typical challenge-response password authentication methods traditionally deployed. Kerberos also provides a single sign-on environment where users must authenticate only once a day, week, or other period of time, easing authentication loads for users. Mac OS X Server and Mac OS X versions 10.3 through10.5 support Kerberos version 5. About Certificates, SSL, and Public Key Infrastructure Mac OS X Server supports many services that use SSL (Secure Socket Layer) to ensure encrypted data transfer. It uses a Public Key Infrastructure (PKI) system to generate and maintain certificates of identity for use with SSL-enabled services. PKI systems allow the two parties in a data transaction to be authenticated to each other, and to use encryption keys and other information in identity certificates to encrypt and decrypt messages traveling between them.Chapter 4 Security 61 PKI enables multiple communicating parties to establish confidentiality, message integrity and message source authentication without exchanging secret information in advance. SSL technology relies on a PKI system for secure data transmission and user authentication. It creates an initial secure communication channel to negotiate a faster, secret key transmission. Mac OS X Server uses SSL to provide data encrypted data transmission for mail, web, and directory services. The following sections contain more background information about key aspects of PKI:  “Public and Private Keys” on page 61  “Certificates” on page 61  “Certificate Authorities (CAs)” on page 62  “Identities” on page 62 Public and Private Keys Within a PKI, two digital keys are created: the public key and the private key. The private key isn’t distributed to anyone and is often encrypted by a passphrase. The public key is distributed to other communicating parties. Basic key capabilities can be summed up as: Web, mail, and directory services use the public key with SSL to negotiate a shared key for the duration of the connection. For example, a mail server will send its public key to a connecting client and initiate negotiation for a secure connection. The connecting client uses the public key to encrypt a response to the negotiation. The mail server, because it has the private key, can decrypt the response. The negotiation continues until both the mail server and the client have a shared secret to encrypt traffic between the two computers. Certificates Public keys are often contained in certificates. A user can digitally sign messages using his or her private key, and another user can verify the signature using the public key contained in signer’s certificate that was issued by a Certificate Authority (CA) within the PKI. Key type Capabilities Public  Can encrypt messages that can only by decrypted by the holder of the corresponding Private key.  Can verify the signature on a message originating as coming from a Private key. Private  Can digitally sign a message or certificate, claiming authenticity.  Can decrypt messages that were encrypted with the Public key.  Can encrypt messages that can only be decrypted by the Private key itself.62 Chapter 4 Security A public key certificate (sometimes called an identity certificate) is a file in a specified format (Mac OS X Server uses the x.509 format) that contains:  The public key half of a public-private key pair  The key user’s identity information, such as a person’s name and contact information  A validity period (how long the certificate can be trusted to be accurate)  The URL of someone with the power to revoke the certificate (its revocation center)  The digital signature of a CA, or the key user Certificate Authorities (CAs) A Certificate Authority (CA) is an entity and its accompanying certificate that signs and issues digital identity certificates claiming trust of the identified party. In this sense, it’s a trusted third party between two transactions. In x.509 systems, CAs are hierarchical in nature, with CAs being certified by CAs, until you reach a root authority. A root authority is a CA that’s trusted by enough or all of the interested parties, so it doesn’t need to be authenticated by yet another trusted third party. The hierarchy of certificates is always a top-down, with a root authority’s certificate at the top. A CA can be a company that, for a fee, signs and issues a public key certificate which states that the CA attests that the public key in the certificate belongs to its owner, as recorded in the certificate. In a sense, CA is a digital notary public. One applies to the CA for a certificate by providing identity and contact information, as well as the public key. A CA must check an applicant’s identity so that users can trust certificates issued by that CA to belong to the identified applicant. Identities Identities, in the context of the Mac OS X Server Certificate Manager, are the combination of a signed certificate for both keys of a PKI key pair. The identities are used by the system keychain, and are available for use by various services that support SSL. Self-Signed Certificates Self-signed certificates are certificates that are digitally signed by the private key of the keypair included in the certificate. This is done in place of a CA signing the certificate. By self-signing a certificate, you’re attesting that you are who you say you are. No trusted third party is involved. Certificate Manager in Server Admin Mac OS X Server’s Certificate Manager is integrated into Server Admin to help you create, use, and maintain identities for SSL-enabled services.Chapter 4 Security 63 The Server Admin interface is shown below, with the Certificate Manager selected. Certificate Manager provides integrated management of SSL certificates in Mac OS X Server for all services that allow the use of SSL certificates. Certificate Manager allows the creation of self-signed certificates, and certificatesigning requests (CSRs) to obtain a certificate signed by a CA. The certificates, either self-signed or signed by a CA, are accessible by the services that support SSL. Identities that were previously created and stored in OpenSSL files can also be imported into Certificate Manager, and are then accessible to all services that support SSL. Certificate Manager in Server Admin doesn’t allow you to sign and issue certificates as a CA, nor does it allow you to sign and issue certificates as a root authority. If you need these functions, you can use Apple’s CA Assistant in /Applications/Utilities/. It allows these functions, and others. Self-signed and CA-issued certificates created in Apple’s CA Assistant can be used in Certificate Manager by importing the certificate. Certificate Manager displays the following for each certificate:  The domain name that the certificate was issued for  The dates of validity  The signing authority (such as the CA entity, or if the certificate is self-signed, it reads “Self-Signed”)64 Chapter 4 Security Readying Certificates Before you can use SSL in Mac OS X Server’s services, the certificates must be created or imported. You can create your own self-signed certificate, generate a Certificate Signing Request (CSR) to send to a CA, or import a certificate previously created with OpenSSL. Select a CA to sign your certificate request. If you don’t have a CA to sign your request, consider becoming your own CA, and then import your CA certificates into the root trust database of all your managed machines. If you’re using a self-signed certificate, consider using a self-signed CA to sign a CSR for your service usage, then import the public certificate of your CA into the System keychain on all client computers. These two options assume you have control of the client computers. Requesting a Certificate From a Certificate Authority Certificate Manager helps you create a certificate signing request (CSR) to send to your designated CA. To request a signed certificate: 1 In Server Admin, select the server that has services that support SSL. 2 Click Certificates. 3 Click the Add (+) button below the Certificates list. 4 Fill out identity information. The common name is the fully qualified domain name of the server that will use SSLenabled services. 5 Enter starting and ending validity dates. 6 Select a private key size (the default is1024 bits). 7 Enter a passphrase for the private key. This passphrase should be more secure than a normal password. It is recommended you use at least 20 characters, include mixed case, numbers and/or punctuation, have no characters repeat, and having no dictionary terms. 8 Click the Gear button and choose “Generate Certificate Signing Request” 9 Follow the onscreen directions for requesting a signed certificate from your chosen CA. For example, you may need to do it online or enter the email address. 10 Click Send Request. 11 Click Done to save the identity information. When the CA replies to the email, it will include it in the text of an email. 12 Make sure the Certificate is selected in the Certificates field again.Chapter 4 Security 65 13 Click the Gear button, then choose Add Signed or Renewal Certificate from Certificate Authority. 14 Copy the characters from “==Begin CSR==” to “==End CSR==” into the text box. 15 Click OK. 16 Click Save. Creating a Self-Signed Certificate When you create an identity in Certificate Manager, you’re creating a self-signed certificate. Certificate Manager creates a private–public key pair in the system keychain with the key size specified (512 - 2048 bits). It then creates the corresponding selfsigned certificate in the system keychain. A Certificate Signing Request (CSR) is also generated at the same time that the selfsigned certificate is created. This isn’t stored in the keychain but is written to disk at /etc/certificates/cert.common.name.tld.csr, where “common.name.tld” is the Common Name of the certificate that was issued. To create a self-signed certificate: 1 In Server Admin, select the server that has services that support SSL. 2 Click Certificates. 3 Click the Add (+) button. 4 Fill out identity information. The common name is the fully qualified domain name of the server that will use SSLenabled services. 5 Enter starting and ending validity dates. 6 Select a private key size (1024 bits is the default). 7 Enter a passphrase for the private key. This passphrase should be more secure than a normal password. It is recommended you use at least 20 characters, include mixed case, numbers and punctuation, have no characters repeat, and having no dictionary terms. 8 Click Done to save the identity information. 9 Click Save. Creating a Certificate Authority If you want to be able to sign another’s certificate, you must create a Certificate Authority (CA). Sometimes this is referred to as a root certificate. By using the root certificate, you will then become the trusted third party in that certificate’s transactions, vouching for the identity of the certificate holder.66 Chapter 4 Security If you are a large organization, you may decide to issue or sign certificates for people in your organization in order to use the security benefits of certificates with your own computing services. However, external organizations may not trust or recognize your signing authority. To create a CA: 1 Start Keychain Access. Keychain Access is a utility found in the /Applications/Utilities/ directory. 2 In the Keychain Access menu, select Certificate Assistant > Create a Certificate Authority. The Certificate Assistant will start. It will guide you through the process of making the CA. 3 Choose to create a Self Signed Root CA. 4 Provide the Certificate Assistant with the requested information and click Continue. You will need the following information to create a CA:  An email address  The name of the issuing authority (you or your organization) You also need to decide if you want to override the defaults, and you will decide whether to make this CA the organization’s default CA. If you do not have a default CA for the organization, allow the Certificate Assistant to make this one the default for you. In most circumstances, you do not want to override the defaults. If you do not override the defaults, skip to step 16. 5 If you chose to override the defaults, provide the following information in the next few screens:  A unique serial number for the root certificate  The number of days that the certificate authority will function before expiring  The type of user certificate that this CA is signing  Whether you want to create a CA website for users to access for CA certificate distribution 6 Click Continue. 7 Provide the Certificate Assistant with the requested information and click Continue. You need the following information to create a CA:  An email address of the responsible party for certificates  The name of the issuing authority (you or your organization)  The organization name  The organization unit name  The location of the issuing authorityChapter 4 Security 67 8 Select a key size and an encryption algorithm for the CA certificate and then click Continue. A larger key size is more computationally intensive to use, but much more secure. The algorithm chosen depends more on your organizational needs than any technical consideration. Both DSA and RSA are strong encryption algorithms. DSA is a United States Federal Government standard for digital signatures. RSA is a more recent advance in algorithms. 9 Select a key size and an encryption algorithm for the certificates to be signed and then click Continue. 10 Select the Key Usage Extensions you need for the CA certificate and then click Continue. At a minimum, you must select Signature and Certificate Signing. 11 Select the Key Usage Extensions you need for the certificates to be signed and then click Continue. Default key use selections are based on the type of key selected earlier in the Assistant. 12 Specify other extensions to add the CA certificate and click Continue. You must select “Include Basic Constraints” and “Use this certificate as a certificate authority” 13 Specify other extensions to add the CA certificate as desired and then click Continue. None are required. 14 Select the keychain “System” to store the CA certificate. 15 Choose to trust certificates on this computer signed by the created CA. 16 Click continue and authenticate as an administrator to create the certificate and key pair. 17 Read and follow the instructions on the last page of the Certificate Assistant. You can now issue certificates to trusted parties and sign certificate signing requests. Using a CA to Create a Certificate for Someone Else You can use your CA certificate to issue a certificate to someone else. This is sometimes referred to as signing a Certificate Signing Request (CSR). By doing so you are stating you are a trusted party and can verify the identity of the certificate holder. Before you can create a certificate for someone, that person must first generate a CSR. The user can use the Certificate Assistant to generate the CSR and email the request to you. You then use the CSR’s text to make the certificate. To create a certificate for someone else: 1 Start Keychain Access. Keychain Access is a utility found in the /Applications/Utilities/ directory.68 Chapter 4 Security 2 In the Keychain Access menu, select Certificate Assistant > Create a Certificate for Someone Else as a Certificate Signing Authority. The Certificate Assistant starts, and guides you through the process of making the CA. 3 Drag and drop the CSRt on the target area. 4 Choose the CA that is the issuer and sign the request. Also, you can also choose to override the reqest defaults. 5 Click Continue. If youoverride the request defaults, provide the Certificate Assistant with the requested information and click Continue. The Certificate is now signed. The default mail application launches with the signed certificate as an attachment. Importing a Certificate You can import a previously generated OpenSSL certificate and private key into Certificate Manager. The items are stored as available in the list of identities and are available to SSL-enabled services. To import an existing OpenSSL style certificate: 1 In Server Admin, select the server that has services that support SSL. 2 Click Certificates. 3 Click the Import button. 4 Enter the existing certificate’s file name and path. Alternately, browse for its location. 5 Enter the existing private key file’s name and path. Alternately, browse for its location. 6 Enter the private key passphrase. 7 Click Import. Managing Certificates After a certificate is created and signed, you shouldn’t have to do much more with it. Certificates are editable only in Server Admin, and cannot be changed after a CA signs them. Self-signed certificates can be changed. You should delete certificates if the information they possess (contact information and so forth) is no longer accurate or if you believe the keypair has been compromised. Editing a Certificate After a certificate signature of a CA is added, it can’t be edited. Chapter 4 Security 69 However, a self-signed certificate can be edited. All fields of the certificate (including domain name and private key passphrase, private key size, and so forth) can be modified. If the identity was exported to disk from the system keychain, it must be reexported. To edit a certificate: 1 In Server Admin, select the server that has services that support SSL. 2 Click Certificates. 3 Select the Certificate Identity to edit. It must be a self-signed certificate. 4 Click the Edit (/) button. 5 Click Edit. Distributing a CA Public Certificate to Clients If you’re using self-signed certificates, a warning pops up in most user applications saying that the certificate authority is not recognized. Other software, such as the LDAP client, simply refuses to use SSL if the server’s CA is unknown. Mac OS X Server ships only with certificates from well-known commercial CAs. To prevent this warning, your CA certificate must be exported to every client computer that connects to the secure server. To distribute the self-signed CA certificate: 1 Copy the self-signed CA certificate (the file named ca.crt) onto each client computer. This is preferably distributed using nonrewritable media, such as a CD-R. Using nonrewritable media prevents the certificate from being corrupted. 2 Open the Keychain Access tool, by double-clicking the ca.crt icon where the certificate was copied onto the client computer. 3 Add the certificate to the Systems keychain using Keychain Access. Alternatively, use the certtool command in Terminal: sudo certtool i ca.crt k=/System/Library/Keychains/Systems Now, any client application that checks against the System keychain (such as Safari and Mail) recognizes any certificate signed by your CA. Deleting a Certificate When a certificate has expired or been compromised, you must delete it. To delete a certificate: 1 In Server Admin, select the server that has services that support SSL. 2 Click Certificates.70 Chapter 4 Security 3 Select the Certificate Identity to delete. 4 Click the Remove (-) button, and select Delete. 5 Click Save. Renewing an Expired Certificate All certificates have an expiration date, so you must update certificates when they expire. To renew an expired certificate: 1 Request a new certificate from the CA. If you are your own CA, create a new one using your own root certificate. 2 In Server Admin in the Server list, select the server that has the expiring certificate. 3 Click Certificates. 4 Select the Certificate Identity to edit. 5 Click the action button and select “Add signed or renewed certificate from certificate authority.” 6 Paste the renewed certificate into the text field and click OK. 7 Click the Edit button to make the certificate editable. 8 Adjust the dates for the certificate. 9 Click Save. Using Certificates In Server Admin, the various services like Web, Mail, VPN, and so on will display a popup list of certificates that the administrator can choose from. The services vary in appearance and therefore the pop-up list location varies. Consult the administration guide for the service you’re trying to use with a certificate. SSH and SSH Keys SSH is a network protocol that establishes a secure channel between your computer and a remote computer. It uses public-key cryptography to authenticate the remote computer. It also provides traffic encryption and data integrity exchanged between the two computers. SSH is frequently used to log in to a remote machine to execute commands but it can also create a secure data tunnel, forwarding through an arbitrary TCP port. Additionally, it can transfer files using the associated SFTP and SCP protocols. By default, an SSH server listens on the standard TCP port 22. Mac OS X Server uses OpenSSH as the basis for its SSH tools.Chapter 4 Security 71 Key-Based SSH Login Key-based authentication is helpful for tasks such as automating file transfers and backups and for creating failover scripts because it allows computers to communicate without a user needing to enter a password. It is not secure to copy the private key of one computer to another computer. Important: Key-based authentication has risks. If the private key you generate becomes compromised, unauthorized users can access your computers. You must determine whether the advantages of key-based authentication are worth the risk. Generating a Key Pair for SSH This section outlines the process of setting up key-based SSH login on Mac OS X and Mac OS X Server. To set up key-based SSH, you must generate the keys the two computers will use to establish and validate the identity of each other. To do this, run the following commands in Terminal: 1 Check to see whether a .ssh folder exists in your home folder by entering the command: ls -ld ~/.ssh. If .ssh is listed in the output, move to step 2. If .ssh is not listed in the output, run mkdir ~/.ssh and continue to step 2. 2 Change directories in the shell to the hidden ssh by entering the following command: cd ~/.ssh 3 Generate the public and private keys by entering the following command: ssh-keygen -b 1024 -t dsa -f id_dsa -P '' The -b flag sets the length of the keys to 1,024-bits, -t indicates to use the DSA hashing algorithm, -f sets the file name as id_dsa, and -P followed by two single-quote marks sets the private key password to be null. The null private key password allows for automated SSH connections. 4 Create an empty authorized key file by entering the following command: touch authorized_keys2 5 Copy the public key into the authorized key file by entering the following command: cat id_dsa.pub >> authorized_keys2 6 Change the psermissions of the private key by entering the following command: chmod 400 id_dsa The permissions on the private key must be set so the file is not world-readable. 7 Copy the public key and the authorized key lists to the specified user’s home folder on the remote computer by entering the following command: scp authorized_keys2 username@remotemachine:~/.ssh/72 Chapter 4 Security If you need to establish two-way communication between servers, repeat the above process on the second computer. This process must be repeated for each user that needs to be able to open a key-based SSH session. The root user is not excluded from this requirement. The home folder for the root user on Mac OS X Server is located at /var/root/. Key-Based SSH with Scripting Sample A cluster of servers is an ideal environment for using key-based SSH. The following Perl script is a trivial scripting example that should not be implemented. It demonstrates connecting over an SSH tunnel to all servers defined in the variable serverList, running softwareupdate, installing available updates, and restarting the computer if necessary. The script assumes that key-based SSH has been properly set up for the root user on all servers to be updated. #!/usr/bin/perl # \@ is the escape sequence for the "@" symbol. my @serverList = ('root\@exampleserver1.example.com', 'root\@exampleserver2.example.com'); foreach $server (@serverList) { open SBUFF, "ssh $server -x -o batchmode=yes 'softwareupdate -i -a' |"; while() { my $flag = 0; chop($_); #check for restart text in $_ my $match = "Please restart immediately"; $count = @{[$_ =~ /$match/g]}; if($count > 0) { $flag = 1; } } close SBUFF; if($flag == 1) { `ssh $server -x -o batchmode=yes shutdown -r now` } }Chapter 4 Security 73 Administration Level Security Mac OS X Server can use another level of access control for added security. Administrators can be assigned to services they can configure. These limitations are enacted on a server-by-server basis. This method can be used by an administrator with no restrictions to assign administrative duties to other admin group users. This results in a tiered administration model, where some administrators have more privileges than others for assigned services. This results in a method of access control for individual server features and services. For example, Alice (the lead administrator) has control over all services on a given server and can limit the ability of other admin group users (like Bob and Cathy) to change settings on the server. She can assign DNS and firewall service administration to Bob, while leaving mail service administration to Cathy. In this scenario, Cathy can’t change the firewall or any service other than mail. Likewise, Bob can’t change any services outside of his assigned services. Tiered administration controls are effective in Server Admin and the serveradmin command-line tool. They are not effective against modifying the various UNIX configuration files throughout the system. The UNIX configuration files must be protected with POSIX-type permissions or ACLs. Setting Administration Level Privileges You can determine which services other admin group users can modify. To do this, the administrator making the determination must have full, unmodified access. The process for setting administration level privileges is found in “Tiered Administration Permissions” on page 149. Service Level Security You use a Service Access Control List (SACL) to enforce who can use a given service. It is not a means authentication; it is a list of who has the appropriate access rights to use a given service. SACLs allow you to add another layer of access control on top of standard and ACL permissions. Only users and groups listed in a SACL have access to its corresponding service. For example, to prevent users from accessing AFP share points on a server, including home folders, remove the users from the AFP service’s SACL. Server Admin in Mac OS X Server allows you to configure SACLs. Open Directory authenticates user accounts and SACLs authorize use of services. If Open Directory authenticates you, the SACL for login window determines whether you can log in, the SACL for AFP service determines whether you can connect for Apple file service, and so on.74 Chapter 4 Security Setting SACL Permissions SACLs (Service access control lists) allow you to specify which users and groups have access to Mac OS X Server services, including AFP, FTP, and Windows file services. To set SACL permissions for a service: 1 Open Server Admin. 2 Select the server from the Servers list. 3 Click Settings. 4 Click Access. 5 To restrict access to all services or deselect this option to set access permissions per service, select “For all services”. 6 If you have deselected “For all services,” select a service from the Service list. 7 To provide unrestricted access to services, click “Allow all users and groups” . If you want to restrict access to certain users and groups: a Select “Allow only users and groups below.” b Click the Add (+) button to open the Users & Groups drawer. c Drag users and groups from the Users & Groups drawer to the list. 8 Click Save. Security Best Practices Server administrators are responsible for making sure that reasonable security measures are taken to protect a server from an attack. A compromised server risks the resources and data on the server and also risks the resources and data on other connected systems. A compromised system can be used as a base to launch an attack on other systems within or outside your network. Maintaining the security of servers requires a balance of the cost of implementing security measures versus the likelihood of a successful attack and the impact of the attack. It is not be possible to eliminate all security risks to a server on a network, but it is possible to reduce the chances of a breach and more efficiently deal with realized attacks. Best Practices for server system administration include, but are not limited to:  Updating your systems with critical security patches and updates.  Checking for updates regularly.  Installing appropriate antivirus tools and use them regularly and updating virus definition files and software regularly. Although viruses are far less prevalent on the Mac platform than on Windows, viruses still pose a risk.Chapter 4 Security 75  Restricting physical access to the server. Because local access generally allows an intruder to bypass most system security, secure the server room, server racks, and network junctures. Use security locks. Locking your systems is a prudent thing to do.  Making sure there is adequate protection against physical damage to servers and ensuring the functioning of the climate control of the server room.  Taking all additional precautions to secure servers. For example, enable Open firmware passwords, encrypt passwords where possible, and secure backup media.  Securing logical access to the server. For example, remove or disable unnecessary accounts. Accounts for outside parties should be disabled when not in use.  Configuring SACLS as needed. Use SACLS to specify who can access services.  Configuring ACLs as needed. Use ACLs to control who can access share points and their contents.  Protecting any account with root or system administrator privileges by following recommended password practices using strong passwords. For more specific information about passwords, see “Password Guidelines” on page 76 .  Not using administrator (UNIX “admin” group) accounts for daily use. Restrict the use of administration privileges by keeping the admin login and password separate from daily use.  Backing up critical data on the system regularly, with a copy stored at a secure offsite location. Backup media is of little use in recovery if it is destroyed along with the computer during a machine room fire. Backup/Recovery contingency plans should be tested to ensure that recovery actually works.  Reviewing system audit logs regularly and questioning any unusual traffic patterns.  Disabling services that are not required on your system. A vulnerability that occurs in any service on your system can compromise the entire system. In some cases, the default configuration (out of the box) of a system leads to exploitable vulnerabilities in services that were enabled implicitly and with poor default options. Turning on a service opens up a port from which users can access your system. Although enabling firewall service helps fend off unauthorized access, an inactive service port remains a vulnerability that an attacker might be able to exploit.  Enabling firewall service on servers, especially at the network frontier.76 Chapter 4 Security Your server’s firewall is the first line of defense against unauthorized access. For more information, see the chapter on setting up firewall service in Network Services Administration. Consider also a third-party hardware firewall as an additional line of defense if your server is highly prone to attack.  If needed, installing a local firewall on critical or sensitive servers. Implementing a local firewall protects the system from an attack that might originate from within the organization’s network or from the Internet.  For additional protection, implementing a local Virtual Private Network (VPN) that provides a secure encrypted tunnel for all communication between a client computer and your server application. Some network devices provide a combination of functions: firewall, intrusion detection, and VPN.  Administering servers remotely. Manage your servers remotely using applications like Server Admin, Server Monitor, RAID Admin, and Apple Remote Desktop. Minimizing physical access to the systems reduces the possibility of mischief. Password Guidelines Many applications and services require that you create passwords to authenticate. Mac OS X includes applications that help create complex passwords (using Password Assistant), and securely store your passwords (using Keychain Access). Creating Complex Passwords Use the following tips to create complex passwords:  Use a mix of alphabetic (upper and lower case), numeric, and special characters (such as ! and @).  Don’t use words or combinations of words found in a dictionary of any language.  Don’t append a number to an alphabetic word (for example, “wacky2”) to fulfill the constraint of having a number.  Don’t substitute “look alike” numbers or symbols for letters (for example, “GR33N” instead of “GREEN”).  Don’t use proper names.  Don’t use dates.  Create a password of at least 12 characters. Longer passwords are generally more secure than shorter passwords.  Use passwords that can’t be guessed even by someone who knows you and your interests well.  Create as random a password as possible. You can use Password Assistant (located in /System/Library/CoreServices/ to verify the complexity of your password.5 77 5 Installation and Deployment Whether you install Mac OS X Server on a single server or a cluster of servers, there are tools and processes to help the installation and deployment succeed. Some computers come with Mac OS X Server software already installed. Other computers need to have the server software installed. For example, installing Leopard Server on a computer with Mac OS X makes the computer a server with Mac OS X Server. Installing Leopard Server on an existing server with an Mac OS X Server v10.2–10.4 upgrades the server software to v10.5. If Leopard Server is already installed, installing it again refreshes the server environment. This chapter includes instructions for a fresh installation of Leopard Server using a variety of methods. Installation Overview You’ve already planned and decided how many and what kind of servers you are going to install. Step 1: Confirm you meet the requirements Make sure your target server meets the minimum system requirements. For more information see:  “System Requirements for Installing Mac OS X Server” on page 79  “Hardware-Specific Instructions for Installing Mac OS X Server” on page 79 Step 2: Gather your information Gather all the information you need before you begin. This not only helps to make sure the installation goes smoothly, but it can help you make certain planning decisions. For further information, see:  Chapter 2, “Planning,” on page 25  Appendix , “Mac OS X Server Advanced Worksheet,” on page 19578 Chapter 5 Installation and Deployment  “About The Server Installation Disc” on page 80 Step 3: Set up the environment If you are not in complete control of the network environment (DNS servers, DHCP server, firewall, and so forth) you need to coordinate with your network administrator before installing. A functioning DNS system, with full reverse lookups, and a firewall to allow configuration constitute a bare minimum for the setup environment. If you are planning on connecting the server to an existing directory system, you also need to coordinate efforts with the directory administrator. See the following:  “Connecting to the Directory During Installation” on page 81  “Installing Server Software on a Networked Computer” on page 81 If you are administering the server from another computer, you must create an administration computer. For more information, see “Preparing an Administrator Computer” on page 80. Step 4: Start up the computer from an installation disk You can’t install onto the disk the computer is booted from, but you can upgrade. For clean installations and upgrades, you must start up the server from an installation disk, not from the target disk. See the following:  “About Starting Up for Installation” on page 81  “Remotely Accessing the Install DVD” on page 82  “Starting Up from the Install DVD” on page 84  “Starting Up from an Alternate Partition” on page 84  “Starting Up from a NetBoot Environment” on page 88 Step 5: Prepare the target disk If you are doing a clean installation, you must prepare the target disk by making sure it has the right format and partition scheme. See the following:  “Preparing Disks for Installing Mac OS X Server” on page 89  “Choosing a File System” on page 89  “Partitioning a Hard Disk” on page 91  “Creating a RAID Set” on page 92  “Erasing a Disk or Partition” on page 95 Step 6: Start the installer The installer application takes software from the startup disk and server software packages and installs them on the target disk. See the following:  “Identifying Remote Servers When Installing Mac OS X Server” on page 96  “Installing Server Software Interactively” on page 97  “Installing Locally from the Installation Disc” on page 97  “Installing Remotely with Server Assistant” on page 99 Chapter 5 Installation and Deployment 79  “Installing Remotely with VNC” on page 100  “Using the installer Command-Line Tool to Install Server Software” on page 101 Step 7: Set Up Services Restart from the target disk to proceed to setup. For more information about server setup, see “Initial Server Setup” on page 105. System Requirements for Installing Mac OS X Server The Macintosh desktop computer or server where you install Mac OS X Server v10.5 Leopard must have:  An Intel or PowerPC G4 or G5 processor, 867 MHz or faster  Built-in FireWire  At least 1 gigabyte (GB) of random access memory (RAM)  At least 10 gigabytes (GB) of disk space available  A new serial number for Mac OS X Server 10.5. The serial number used with any previous version of Mac OS X Server will not allow registration in v10.5. A built-in DVD drive is convenient but not required. A display and keyboard are optional. You can install server software on a computer that has no display and keyboard by using an administrator computer. For more information, see “Preparing an Administrator Computer” on page 80. If you’re using an installation disc for Mac OS X Server v10.5 or later, you can control installation from another computer using VNC viewer software. Open source VNC viewer software is available. Apple Remote Desktop, described on page 51, includes VNC viewer capability. Hardware-Specific Instructions for Installing Mac OS X Server When you install server software on Xserve systems, the procedure you use when starting the computer for installation is specific to the kind of Xserve hardware you have. You may need to refer to the Xserve User’s Guide or Quick Start that came with your Xserve, where these procedures are documented. Gathering the Information You Need Use the Mac OS X Server Advanced Worksheet to record information for each server you want to install. The information below provides supplemental explanations for items on the Mac OS X Server Advanced Worksheet. The Mac OS X Server Advanced Worksheet is located in the appendix on page 195.80 Chapter 5 Installation and Deployment Preparing an Administrator Computer You can use an administrator computer to install, set up, and administer Mac OS X Server on another computer. An administrator computer is a computer with Mac OS X v10.5 Leopard or Mac OS X Server Leopard that you use to manage remote servers. When you install and set up Mac OS X Server on a computer that has a display and keyboard, it’s already an administrator computer. To make a computer with Mac OS X into an administrator computer, you must install additional software. Important: If you have administrative applications and tools from Mac OS X Server v10.4 Tiger or earlier, do not use them with Leopard Server. To enable remote administration of Mac OS X Server from a Mac OS X computer: 1 Make sure the Mac OS X computer has Mac OS X v10.5 Leopard installed. 2 Make sure the computer has at least 1 GB of RAM and 1 GB of unused disk space. 3 Insert the Administration Tools CD. 4 Open the Installers folder. 5 Open ServerAdministrationSoftware.mpkg to start the Installer, and then follow the onscreen instructions. About The Server Installation Disc You can install the server software using the Mac OS X Server Install Disc. This installation disc contains everything you must install Mac OS X Server. It also contains an Other Installs folder, which has installers for upgrading a Mac OS X computer to Mac OS X Server and for separately installing server administration software, the Directory application, the Podcast Capture application, X11 software, and Xcode developer tools. In addition to the installation disc, Mac OS X Server includes the Administration Tools CD. You use this disc to set up an administrator computer. This disc also contains installers for the Directory application, the Podcast Capture application, and the QTSS Publisher application. For advanced administrators, this disc contains installers for PackageMaker and Property List Editor.Chapter 5 Installation and Deployment 81 Setting Up Network Services Before you can install, you must set up or have the following settings for your network service:  DNS: You must have a fully qualified domain name for each server’s IP addess in the DNS system. The DNS zone must have the reverse-lookup lookup record for the name and address pair. Not having a stable, functioning DNS system with reverse lookup leads to service failures and unexpected behaviors.  DHCP: It is not recommended to assign dynamic IP addresses to servers. If your server gets its IP address through DHCP, set up a static mapping in the DHCP server, so your server gets (via its Ethernet address) the same IP address every time.  Firewall or routing: In addition to any firewall running on your server, the subnet router may have certain network traffic restrictions in place. Make sure you server’s IP address is available for the traffic you are planning to handle and the services you are planning to run. Connecting to the Directory During Installation If you want to use a server as an Open Directory master, make sure it has an active Ethernet connection to a secure network before installation and initial setup. Installing Server Software on a Networked Computer When you start up a computer from a server installation disc, SSH starts so that remote installations can be performed. Important: Before you install or reinstall Mac OS X Server, make sure the network is secure because SSH gives others access to the computer over the network. For example, design the network topology so you can make the server computer’s subnet accessible only to trusted users. About Starting Up for Installation The computer can’t install to its own startup volume, so you must start up in some other way, such as:  Optical Media, DVDs  Alternate volumes (second partitions on the hard disk, or external FireWire disks)  Netboot The computer must install from the same disk or image that started up the computer. Mounting another share point with an installer won’t work. The installer uses some of the files currently active in the booted system partition for the new installation.82 Chapter 5 Installation and Deployment Before Starting Up If you’re performing a clean installation rather than upgrading an existing server, back up any user data that’s on the disk or partition where you’ll install the server software. If you’re upgrading an existing server, make sure that saved setup data won’t be inadvertently detected and used to automatically set up an advanced configuration. Server Assistant looks for saved setup data on all mounted disks and in all directories the server is configured to access. The saved setup data will overwrite the server’s existing settings. For more information about automatic server setup, see “Using Automatic Server Setup” on page 115. Remotely Accessing the Install DVD When used as the startup disc, the Install DVD provides some services for remote access. After you start up from the DVD, both SSH and VNC are available for use. VNC enables you to use a VNC viewer (like Apple Remote Desktop) to view the user interface as if you were using the remote computer’s keyboard, mouse, and monitor. All the things you could do at the computer using the keyboard and mouse are available remotely, as well as locally. This excludes hard resets, other hardware manipulation, or holding down keys during startup. SSH enables you to have command-line access to the computer with administrator privileges. To access the computer with VNC: 1 Start the target computer from the Install DVD for Mac OS X Server v10.5 or later. The procedure you use depends on the target server hardware. To learn more about startup disk options, see “About Starting Up for Installation” on page 81. 2 Use your VNC viewer software to open a connection to the target server. 3 Identify the target server. If the VNC viewer includes the target server in a list of available servers, select it in the list. Otherwise, enter an IP address in IPv4 format (000.000.000.000). If you don’t know the IP address and the remote server is on the local subnet, you can use the sa_srchr command to identify computers on the local subnetwhere you can install server software. Enter the following from an existing computer with Mac OS X Server Tools installed: /System/Library/Serversetup/sa_srchr 224.0.0.1Chapter 5 Installation and Deployment 83 This command returns the IP address and the EthernetID (in addition to other information) of servers on the local subnet that started up from the installation disk. 4 When prompted for a password, enter the first eight digits of the server’s built-in hardware serial number. To find a server’s serial number, look for a label on the server. If you’re installing on an older computer that has no built-in hardware serial number, use 12345678 for the password. If you’re using Apple Remote Desktop as a VNC viewer, enter the password but don’t specify a user name. To access the computer with SSH: 1 Start the target computer from the Install DVD for Mac OS X Server v10.5 or later. The procedure you use depends on the target server hardware. To learn more about startup disk options, see “About Starting Up for Installation” on page 81. 2 Use the Terminal to open a secure shell connection to the target server. The user name is root and the password is the first eight digits of the server’s built-in hardware serial number. To find a server’s serial number, look for a label on the server. If you’re installing on an older computer that has no built-in hardware serial number, use 12345678 for the password. If you don’t know the IP address and the remote server is on the local subnet, you can use the sa_srchr command to identify computers on the local subnet where you can install server software. Enter the following from an existing computer with Mac OS X Server Tools installed: /System/Library/Serversetup/sa_srchr 224.0.0.1 This command will return the IP address, and the EthernetID (in addition to other information) of servers on the local subnet which have started up from the installation disk.84 Chapter 5 Installation and Deployment Starting Up from the Install DVD This is the simplest method of starting the computer, if you have physical access the server, and it has an optical drive. If the target server is an Xserve with a built-in DVD drive, start the server using the Install DVD by following the instructions in the Xserve User’s Guide for starting from a system disc. If the target server has no built-in DVD drive, you can use an external FireWire DVD drive. You can also install server software on an Xserve system that lacks a DVD drive by moving its drive module to another Xserve system that has a DVD drive. To start up the computer with the installation disc. 1 Turn on the computer and insert the Mac OS X Server installation disc into the DVD drive. 2 If you’re using a built-in DVD drive, restart the computer while holding down the C key. You can release the C key when you see the Apple logo. Alternatively, you can restart the computer by holding down the Option key, selecting the icon representing the installation disc, and then clicking the right arrow. You must use this method if you are starting up from an external DVD drive. 3 If you’re installing on an Xserve, the procedure for starting up from a DVD may be different. For more information, see the User’s Guide or Quick Start that came with your Xserve. 4 After the computer restarts, choose the language you want to use during installation and then click the arrow button. The Installer is now running. Starting Up from an Alternate Partition For a single server installation, preparing to start up from an alternate partition can be more time-consuming than simply using the Install DVD. The time required to image, scan, and restore the image to a startup partition may exceed the time taken to install once from the DVD. However, if you are reinstalling regularly, or if you are creating an external Firewire drive-based installation to take to various computers, or if you need some other kind mass distribution (such as clustered Xserves without DVD drives installed), this method can be very efficient. Installer application or installer tool in Terminal applicationChapter 5 Installation and Deployment 85 This method is well suited to installing on computers that you may not have easy physical access to. With sufficient preparation, this method can be modified for easy mass deployment of appropriately licensed copies of Mac OS X Server. To use this method, you must have an existing installation of some kind on the computer in order to use this method. It is intended for environments where a certain level of existing infrastructure of Mac OS X Server is present, and may be unsuitable for a first server installation. To start from an alternate partition, there are four basic steps. Step 1: Prepare the disks and partitions on the target computer Before you proceed, you must have at least two partitions on the target computer. The first is going to be the initial and the final startup partition; the second is the temporary installer partition. You can use a single disk with multiple partitions, or you can use multiple disks. You use Disk Utility to prepare the disks. For more information about preparing and partitioning a hard disk, see the Disk Utility help. Step 2: Create a restorable image of the Install DVD This step doesn’t need to be done on the target computer. It can be done on an administrator computer, but there must be enough free space to image the entire Install DVD. To create an image of the Install DVD: 1 Insert the Install DVD. 2 Launch Disk Utility. 3 Select the first session icon under the optical drive icon. This is in the list of devices on the left side of the window. 4 Select File > New > Disk Image from . 5 Give the image a name, select Read-only, Read/Write, or Compressed as the image type, and then click Save. 6 After the image is complete, select the image from list on the left. 7 In the menu, select Images > Scan Images for Restore. 8 Provide an administrator login and password as needed. The installer disk image can now be restored to your extra partition. ∏ Tip: If you prefer to use the command-line, you can use hdiutil to create the disk image, and asr to scan the image for restore. All commands must be done with superuser or root privileges.86 Chapter 5 Installation and Deployment For example, this command creates a disk image “Installer.dmg” from the device at disk1s1: hdiutil create -srcdevice disk1s1 Installer.dmg This command scans the image “Installer.dmg” and readies it for restore: asr imagescan --source Installer.dmg Step 3: Restore the image to the alternate partition You can restore the disk image to a partition within the computer or to an external hard disk. When complete, the newly restored partition functions like the Install DVD. Make sure the alternate partition is at least the size of the disk image. Restoring the disk image to the partition will erase all existing data on the partition. To restore the image: 1 Start up the target computer. 2 Make sure the image does not reside on the partition that is to be erased. 3 Launch Disk Utility. 4 In the list of devices on the left side of the window, select the installer DVD image. 5 Click Restore. 6 Drag the installer image from the left side of the window to the Source field. 7 Drag the alternate partition from the list of devices on the left side of the window to the Destination field. 8 Select Erase Destination. 9 Click Restore. If you prefer to use the command-line, you use the asr tool to restore the image to the partition. Using asr requires the use of superuser or root privileges. The basic syntax is: sudo asr restore -s -t --erase For example, restoring an image called “Installer.dmg” to the partition “ExtraHD” would be: asr restore -s Installer.dmg -t ExtraHD --erase For more information about asr and its capabilities, see the tool’s man page. ∏ Tip: You can use asr to restore a disk over a network, multicasting the blocks to client computers. Using the multicast server feature of asr, you could put a copy of the installer image on a partition of all computers that can receive the multicast packets. To successfully configure this, you’ll need the information in the tool’s man page.Chapter 5 Installation and Deployment 87 The asr tool can also fetch the target image from an HTTP server using http or https URLs as its source, so the image doesn’t need to reside on the target computer computer. Step 4: Select the alternate partition as the startup disk. After the partition is restored, it’s a startup and installer disk for your server. You now need to start up the computer from that partition. After the computer is up and running, it is a Mac OS X Server installer, exactly as if you had started the computer from the DVD. To start up the computer with the installation disc: 1 Turn on the computer and hold down the Option key. 2 Select the icon representing the installation partition and then click the right arrow. You must use this method if you are starting up from an external DVD drive. If you’re installing on an Xserve, the procedure for starting up from a DVD may be different. For more information, see the Xserve User’s Guide or Quick Start that came with your Xserve. 3 After the computer restarts, choose the language you want to use during installation, and click the arrow button. The Installer is now running. If you prefer to do this with the command-line, you can set the startup volume using the systemsetup tool. In version of Mac OS X Server since v10.4 or later, the systemsetup tool is at /usr/sbin/systemsetup. If you are currently using the Mac OS X client during this process, the tool is at /System/ Library/CoreServices/RemoteManagement/ARDAgent.app/Contents/Support/ systemsetup. You’ll need to use the -liststartupdisks, and -setstartupdisk command options to find the newly restored installer volume, and select it as the startup disk. All commands issued with systemsetup must be run with superuser or root privileges. The following is an example command to select the startup disk: systemsetup -setstartupdisk “/Volumes/Mac OS X Server Install Disk” Then issue the shutdown -r command to restart. For more information about systemsetup, see Command-Line Administration and the tool’s man page.88 Chapter 5 Installation and Deployment Starting Up from a NetBoot Environment If you have an existing NetBoot infrastructure, this is the easiest way to perform mass installation and deployment. This method can be used for clusters that have no optical drive or existing system software, as shown in the following illustration: It can also be used in environments where carrying large numbers of servers must be deployed in an efficient manner. This section won’t tell you how to create the necessary NetBoot infrastructure. If you want to set up NetBoot and NetInstall options for your network, servers, and client computers, see System Imaging and Software Update Administration. This section has instructions to create a NetInstall image from the Mac OS X Server Install Disk, and start a server from it. There is no need to make preparations to the hard disk. Step 1: Create a NetInstall image from the Install DVD This step doesn’t need to be done on the target computer. It can be done on an administrator computer that has enough free space to image the entire Install DVD. 1 Launch System Image Utility, in /Applications/Server/. 2 Select the Install DVD on the left, and choose NetInstall image on the right. 3 Click Continue. 4 Enter a name for the image, and a description. This information is seen by clients selecting it a startup disk. 5 Click Create and then choose a save location for the disk image. Upon completion, this image can be used with an existing NetBoot server to start up a server for installation. Target servers NetBoot target servers Mac OS X Server Initiate server installation Administrator computer DestinationChapter 5 Installation and Deployment 89 For more information about NetInstall images and System Image Utility, including customization options, see System Imaging and Software Update Administration. Step 2: Start up the computer from the NetBoot server There are four ways of doing this, depending on your environment.  In the target computer GUI, select the NetInstall disk from the Startup Disk pane of the System Preferences.  Restart the computer, holding down the “n” key. The first NetBoot server to respond to the computer will start up the computer with its default image.  Restart the computer, holding down the Option key. The computer will show you the available startup disks, locally on the computer and remotely from NetBoot and NetInstall servers. Select a disk and continue the startup.  Use the command-line locally or remotely to specify the NetBoot server that the computer will start up from: sudo bless --netboot --server bsdp://server.example.com Preparing Disks for Installing Mac OS X Server Before performing a clean installation of Mac OS X Server, you can partition the server computer’s hard disk into multiple volumes, create a RAID set, or erase the target disk or partition. If you’re using an installation disc for Mac OS X Server v10.5 or later, you can perform these tasks from another networked computer using VNC viewer software, such as Apple Remote Desktop, before beginning a clean installation. Choosing a File System A file system is a method for storing and organizing computer files and the data they contain on a storage device such as a hard disk. Mac OS X Server supports several kinds of file systems to be used for hard disk storage. Each file system has its own strengths. You must decide which system fits your organization’s needs. For more information, see the following: developer.apple.com/technotes/tn/tn1150.html The following systems are available for use: WARNING: Before partitioning a disk, creating a RAID set, or erasing a disk or partition on an existing server, preserve any user data you want to save by copying it to another disk or partition.90 Chapter 5 Installation and Deployment Mac OS Extended (Journaled) aka HFS+J An HFS+J volume is the default file system for Mac OS X Server. An HFS+J volume has an optional journal to speed recovery when mounting a volume that was not unmounted safely (for example, as the result of a power outage or crash). The journal makes it quick and easy to restore the volume structures to a consistent state, without having to scan all of the structures. The journal is used only for the volume structures and metadata; it does not protect the contents of a fork. In other words, this journal protects the integrity of the underlying disk structures, but not any data that is corrupted due to a write failure or catastrophic power loss. More information about HFS+J can be found in Apple’s Developer Documentation at: developer.apple.com/documentation/MacOSX/Conceptual/BPFileSystem/Articles/ Comparisons.html Mac OS Extended (Journaled, Case-Sensitive) aka HFSX HFSX is an extension to HFS Plus and allows volumes to have case-sensitive file and directory names. Case-sensitive names means that you can have two objects whose names differ only by the case of the letters, in the same directory at the same time. For example, you could have Bob, BOB, and bob in the same directory as uniquely named files. A case-sensitive volume is supported as a boot volume format. An HFSX file system for Mac OS X Server must be specifically selected when erasing a volume and preparing for initial installation. HFSX is an available format for the “erase and install” option for local installs. HFSX is not an available format for remotely controlled installations. If you are planning to use NFS, you should use case-sensitive HFSX. An HFSX volume can be either case-sensitive or case-insensitive. Case sensitivity (or lack thereof) is global to the volume; the setting applies to all file and directory names on the volume. To determine whether an HFSX volume is case-sensitive, use the keyCompareType field of the B-tree header of the catalog file. A value of kHFSBinaryCompare means the volume is case-sensitive. A value of kHFSCaseFolding means the volume is case-insensitive. Note: Do not assume that an HFSX volume is case-sensitive. Always use the keyCompareType to determine case sensitivity or case insensitivity. Additionally, don’t assume your third-party software solutions work correctly with case sensitivity. Important: Case-sensitive names do not ignore Unicode ignorable characters. This means that a single directory can have several names that would be considered equivalent using Unicode comparison rules, but they are considered distinct on a casesensitive HFSX volume.Chapter 5 Installation and Deployment 91 Partitioning a Hard Disk Partitioning the hard disk creates a volume for server system software and one or more additional volumes for data and other software. Partitioning erases previous contents of the disk. The minimum recommended size for an installation partition is 20 GB. A larger volume is recommended for a standard or workgroup configuration because they keep shared folders and group websites on the startup volume together with the server software. Erasing a disk is another way of saying that you have given a disk a single volume partition and erased that volume. Consider dedicating a hard disk or a volume of a partitioned hard disk to the server software. Put additional software, share points, websites, and so forth on other disks or volumes. With this approach, you can upgrade or reinstall the server software without affecting your other software or user data. If you must store additional software or data on the system volume, consider mirroring it to another drive. ∏ Tip: Having an extra, empty partition or two on the target installation disk can give you additional flexibility in installation and deployment. For example, additional space can give you a place to temporarily mirror your current installation before performing an in-place update, or it can give you a fast installer disk. Partitioning a Disk Using Disk Utility You can use the Installer to open the Disk Utility application and then use Disk Utility to erase the installation target volume or another volume. You can erase the target volume using the Mac OS Extended format, Mac OS Extended (Journaled) format, Mac OS Extended format (Case-Sensitive) format, and Mac OS Extended (Journaled, CaseSensitive) format. You cannot partition the active startup disk or erase the active startup volume. 1 Launch Disk Utility. If you are in the Installer, Disk Utility is available from the Utilities menu. Otherwise, launch the application from /Applications/Utilities/Disk Utility. 2 Select the disk to be partitioned. You can’t select your current startup disk. Selecting a volume on the disk will allow you to erase the volume but will not create a different partition scheme. 3 Click Partition. 4 Choose your partition scheme and follow the instructions in the window to set all necessary parameters. 5 Click Apply.92 Chapter 5 Installation and Deployment You can find instructions for partitioning the hard disk into multiple volumes, creating a RAID set, and erasing the target disk or partition by viewing Disk Utility Help. To view Disk Utility Help, open Disk Utility on another Macintosh computer with Mac OS X v10.5 and choose Help > Disk Utility Help. Partitioning a Disk Using the Command-line You can use the diskutil command-line tool to partition and erase a hard disk. Normally, you would use a remote shell (SSH) to log in to the newly-started computer to use this method. The tool to partition disks is diskutil. Just like using Disk Utility, you can erase the target volume using the Mac OS Extended format, Mac OS Extended (Journaled) format, Mac OS Extended format (Case-Sensitive) format, and Mac OS Extended (Journaled, Case-Sensitive) format.  You cannot partition the active startup disk or erase the active startup volume.  All potentially destructive diskutil operations must be done with superuser or root privileges. Additional information about diskutil and other uses can be found in Command-Line Administration. For complete command syntax for diskutil, consult the tool’s man page. The specific command issued depends on your disk format needs and the hardware in use. Take care to use command-line arguments that apply to your specific needs. The following command is a sample, which partitions a computer’s only 120 GB hard disk into two equal 60 GB journaled HFS+ volumes (“BootDisk” and “DataStore”), which can start up a PowerPC-based Macintosh computer. The basic syntax is: diskutil partitionDisk device numberOfPartitions APMFormat So the command is: diskutil partitionDisk disk0 2 APMFormat JournaledHFS+ BootDisk 50% JournaledHFS+ DataStore 50% Creating a RAID Set If you’re installing Mac OS X Server on a computer with multiple internal hard disk drives, you can create a Redundant Array of Independent Disks (RAID) set to optimize storage capacity, improve performance, and increase reliability in case of a disk failure. For example, a mirrored RAID set increases reliability by writing your data to two or more disks at once. If one disk fails, your server automatically starts using one of the other disks in the RAID set. Chapter 5 Installation and Deployment 93 You can use Disk Utility to set up a RAID set. There are two types of RAID sets and one additional disk option available in Disk Utility:  A striped RAID set (RAID 0) splits files across the disks in the set. A striped RAID set improves the performance of your software because it can read and write on all disks in the set at the same time. You might use a striped RAID set if you are working with large files, such as digital video.  A mirrored RAID set (RAID 1) duplicates files across the disks in the set. Because this scheme maintains two or more copies of the files, it provides a continuous backup of them. In addition, it can help keep data available if a disk in the set fails. Mirroring is recommended if you have shared files or applications that must be accessed frequently. You can set up RAID mirroring after installing Mac OS X Server if you install on a disk that isn’t partitioned. To prevent data loss, you should set up RAID mirroring as soon as possible.  A concatenated disk set lets you use several disks as a single volume. This is not a true RAID set and offers no redundancy or performance increase. You can combine different RAID sets to combine their benefits. For example, you can create a RAID set that combines the fast disk access of a striped RAID set and the data protection of a mirrored RAID set. To do this, create two RAID sets of one type and then create a RAID set of another type, using the first two RAID sets as the disks. The RAID sets you combine must all be created with Disk Utility or diskutil in Mac OS X v10.4 or later. The method of partitioning used on the disks cannot be mixed (PPC platform is APMFormat, Intel platform is GPTFormat) in a RAID set. Mac Pro desktop computers and Intel-based Xserves can boot from a software RAID volume. Some Intel-based Macs do not support booting from software RAID volumes. If you try to start these Intel-based Macs from a software RAID volume, the computer may start up to a flashing question mark. The following computers do not support booting from software RAID volumes:  iMac (Early 2006)  Mac mini (Early 2006) No PPC-based Macs support booting from software RAID volumes. If you need more sophisticated RAID support, consider a hardware RAID. It has specially dedicated RAID hardware and can contain over 5 terabytes of storage.94 Chapter 5 Installation and Deployment Creating a RAID Set Using Disk Utility You can use the Installer to open the Disk Utility application and then use Disk Utility to create the RAID set from available disks. It isn’t necessary to erase the disks before creating the set. Creating a RAID set erases the previous contents of the disks involved. The RAID set volumes can be Mac OS Extended format, Mac OS Extended (Journaled) format, Mac OS Extended format (Case-Sensitive) format, Mac OS Extended (Journaled, Case-Sensitive) format, and MS-DOS FAT format. For more information about volume formats, see “Preparing Disks for Installing Mac OS X Server” on page 89. You cannot create a RAID set from the active startup disk. 1 Launch Disk Utility. If you are in the Installer, Disk Utility is Available from the Utilities menu; otherwise, launch the application from /Applications/Utilities/Disk Utility. 2 Select the disk to be part of the RAID set. You can’t select your current startup disk. When creating RAID sets or adding disks, it is recommended to specify the entire disk instead of a partition on that disk. 3 Click RAID. 4 Choose your RAID set type. 5 Drag the disks to the window. 6 Follow the instructions in the window to set all necessary parameters. 7 Click Create. You can find instructions for partitioning the hard disk into multiple volumes, creating a RAID set, and erasing the target disk or partition by viewing Disk Utility Help. To view Disk Utility Help, open Disk Utility on another Macintosh computer with Mac OS X v10.5 and choose Help > Disk Utility Help. Creating a RAID Set Using the Command-line You can use the diskutil command-line tool to create a RAID set. Normally, you would use a remote shell (SSH) to log in to the newly-started computer to use this method. The tool to create a RAID set is diskutil. Just like using Disk Utility, with diskutil you can create a RAID volume that is Mac OS Extended format, Mac OS Extended (Journaled) format, Mac OS Extended format (CaseSensitive) format, Mac OS Extended (Journaled, Case-Sensitive) format, or MS-DOS FAT format. However keep in mind the following:  You cannot create a RAID from the active startup disk.  When creating RAID sets or adding disks, specify the entire disk instead of a partition on that disk.Chapter 5 Installation and Deployment 95  All potentially destructive diskutil operations must be done with superuser or root privileges. Additional information about diskutil and other uses can be found in Command-Line Administration. For complete command syntax for diskutil, consult the tool’s man page. The specific command issued depends on your RAID needs. Use command-line arguments that apply to your specific needs. The following command is a sample, which creates a single mirrored RAID set (RAID 1) from the first two disks installed in the computer (disk0 and disk1), with the resulting RAID volume called MirrorData. The basic syntax is: diskutil createRAID mirror setName format device device ... So the command is: diskutil createRAID mirror MirrorData JournaledHFS+ disk0 disk1 Erasing a Disk or Partition You have several options for erasing as disk, depending on your preferred tools and your computing environment:  Erasing a Disk Using the Installer: You can erase a disk or partition while using the Mac OS X Server Installer. When you select the target volume in the Installer, you can also select an option to have the target disk or partition erased during installation using the Mac OS Extended (Journaled) format. This is the most recommended format for a Mac OS X Server startup volume.  Erasing a Disk Using Disk Utility: You can use the Installer to open the Disk Utility application and then use it to erase the target volume or another volume. You can erase the target volume using the Mac OS Extended format or Mac OS Extended (Journaled) format. You can erase other volumes using either of those formats, Mac OS Extended format (Case-Sensitive) format, or Mac OS Extended (Journaled, Case-Sensitive) format. You can erase but not partition a disk or partition while using the Mac OS X Server Installer. When you select the target volume in the Installer, you can also select an option to have the target disk or partition erased during installation using the Mac OS Extended (Journaled) format. This is the recommended format for a Mac OS X Server startup volume. You can find instructions for partitioning the hard disk into multiple volumes, creating a RAID set, and erasing the target disk or partition by viewing Disk Utility Help. To view Disk Utility Help, open Disk Utility on another Macintosh computer with Mac OS X v10.5 and choose Help > Disk Utility Help.  Erasing a Disk Using the Command-line: Finally you can use the command-line to erase disks using the tool diskutil. Erasing a disk using diskutil results in losing all of the volume partitions. The command to erase a complete disk is:96 Chapter 5 Installation and Deployment diskutil eraseDisk format name [OS9Drivers | APMFormat | MBRFormat | GPTFormat] device For example: diskutil eraseDisk JournaledHFS+ MacProHD GPTFormat disk0 There is also an option to securely delete data by overwriting the disk with random data multiple times. For more details, see diskutil’s man page. To erase a single volume on a disk, a slightly different command is used: diskutil eraseVolume format name device For example: diskutil eraseVolume JournaledHFS+ UntitledPartition /Volumes/ OriginalPartition Additional information about diskutil and other uses can be found in Command-Line Administration. For complete command syntax for diskutil, consult the tool’s man page. Identifying Remote Servers When Installing Mac OS X Server For remote server installations, you need to know this information about the target server:  The identity of the target server: When using Server Assistant, you must be able to recognize the target server in a list of servers on your local subnet or you must enter the IP address of the server (in IPv4 format: 000.000.000.000) if it resides on a different subnet. Information provided for servers in the list includes IP address, host name, and Media Access Control (MAC) address (also called hardware or Ethernet address). If you use VNC viewer software to remotely control installation of Mac OS X Server v10.5 or later, it may let you select the target server from a list of available VNC servers. If not, you must enter the IP address of the server (in IPv4 format: 000.000.000.000). The target server’s IP address is assigned by a DHCP server on the network. If no DHCP server exists, the target server uses a 169.xxx.xxx.xxx address unique among servers on the local subnet. Later, when you set up the server, you can change the IP address. If you don’t know the IP address and the remote server is on the local subnet, you can use the sa_srchr command to identify computers on the local subnet where you can install server software. Enter the following from an existing computer with Mac OS X Server Tools installed: /System/Library/Serversetup/sa_srchr 224.0.0.1 This command will return the IP address, and the EthernetID (in addition to other information) of servers on the local subnet which have started up from the installation disk.Chapter 5 Installation and Deployment 97  The preset password for the target server: The password consists of the first eight digits of the server’s built-in hardware serial number. To find a server’s serial number, look for a label on the server. Older computers have no built-in hardware serial numbers; for these systems, use 12345678. Installing Server Software Interactively You can use the installation disc to install server software interactively on a local server, on a remote server, or on a computer with Mac OS X pre-installed. Installing Locally from the Installation Disc You can install Mac OS X Server directly onto a computer with a display, a keyboard, and an optical drive attached, as shown in the following illustration: If you have an Install DVD, the optical drive must be able to read DVD discs. You can also install directly onto a computer that lacks a display, keyboard, and optical drive capable of reading your installation disc. In this case, you start the target computer in target disk mode and connect it to an administrator computer using a FireWire cable. You use the administrator computer to install the server software on the target computer’s disk or partition, which appears as a disk icon on the administrator computer. These instructions assume you have started up the computer using the Install DVD, installer partition, or NetInstall disk. If you have not, see the relevant instructions beginning at “About Starting Up for Installation” on page 81. To install server software locally: 1 After the computer starts, choose the language you want the server to use and click Continue. 2 When the Installer opens, if you want to perform a clean installation, optionally use the Utilities menu to open Disk Utility to prepare the target disk or partition before proceeding. If you have not previously prepared your disk for installation, you can do so now with DIsk Utility. For more instructions on preparing your disk for installation, see “Preparing Disks for Installing Mac OS X Server” on page 89. Installer application or installer tool in Terminal application98 Chapter 5 Installation and Deployment 3 Proceed through the Installer’s panes by following the onscreen instructions. 4 When the Select a Destination pane appears, select a target disk or volume (partition) and make sure it’s in the expected state. If you’re doing a clean installation, you can click Options to format the destination disk or volume in Mac OS Extended (Journaled) format. Select Erase to format the disk in Mac OS Extended (Journaled) format; then click OK. If the volume you selected contains Mac OS X Server v10.3.9 or 10.2.8 and you want to upgrade, click Options, select “Don’t erase,” and then click OK. Important: When you perform an upgrade, make sure that saved setup data won’t be inadvertently detected and used by the server. If saved setup data is used, the server settings are not compatible with the saved settings and can cause unintended consequences. For more information, see “How a Server Searches for Saved Setup Data” on page 121. 5 Proceed through the Installer’s panes by following the onscreen instructions. After installation is complete, the computer restarts and you can perform initial server setup. 6 If you’re using an administrator computer to install onto a server that’s in target disk mode and connected using a FireWire cable: a Quit Server Assistant when it starts automatically on the administrator computer. b Shut down the administrator computer and the server. c Start up the administrator computer and the server normally (not in target disk mode). Now you can use Server Assistant from the administrator computer to remotely set up the server. Chapter 6, “Initial Server Setup,” on page 105 describes how to set up a server locally or remotely. Chapter 5 Installation and Deployment 99 Installing Remotely with Server Assistant To install Mac OS X Server on a remote server from the server Install DVD, installation partition, or NetInstall disk, you need an administrator computer from which to use Server Assistant to manage the installation, as shown in the following illustration: After the computer has started up, you can control and manage any number of servers from an administration computer. Important: If you have administrative applications and tools from Mac OS X Server v10.4 Tiger or earlier, do not use them with Leopard Server. If you want to use the Installer user interface, you can use VNC to view and interact with the remote installer. For more information, see “Installing Remotely with VNC” on page 100. These instructions assume you have successfully started up the computer using the Install DVD, installer partition, or NetInstall disk. If you have not, see the relevant instructions beginning at “About Starting Up for Installation” on page 81. To install on a remote server by using Server Assistant: 1 After the target computer has started from the server Install DVD, installation partition, or NetInstall disk, launch Server Assistant in the /Applications/Server/ folder on the administrator computer. You don’t need to be an administrator on the local computer to use Server Assistant. 2 Select “Install software on a remote server.” Administrator computer Subnet 1 Subnet 2 Welcome >installer >installer100 Chapter 5 Installation and Deployment 3 For every intended target server, identify the target server and add it to the list. If it’s on the local subnet, select it in the list; otherwise, click the Add (+) button and enter an IP address in IPv4 format (000.000.000.000). If you already have a saved server list, load it now by selecting File > Load Server List. 4 When prompted for a password, enter the first eight digits of the server’s built-in hardware serial number. To find a server’s serial number, look for a label on the server. If you’re installing on an older computer that has no built-in hardware serial number, use 12345678 for the password. 5 After you finish adding all servers to the list, save this list for future use by selecting File > Save Server List. 6 Proceed by following the onscreen instructions. 7 When the Volumes pane appears, select a target disk or volume (partition), make sure it’s in the expected state, and click Continue. If the volume you selected contains Mac OS X Server v10.4.10 or 10.3.9 and you want to upgrade, select “Don’t erase.” Otherwise, you can select Erase to format the disk in Mac OS Extended (Journaled) format. Click OK. 8 Proceed by following the onscreen instructions. While installation proceeds, you can open another Server Assistant window to install server software on other computers. Choose File > New Window to do so. After installation is complete, the target server restarts and you can perform initial server setup. Chapter 6, “Initial Server Setup,” on page 105 describes how. Installing Remotely with VNC If you’re using an installation disc for Mac OS X Server v10.5 or later, you can control installation from another computer using open source VNC viewer software or Apple Remote Desktop. This allows you to remotely control preparation of the target disk or partition before beginning installation. You can partition the hard disk into multiple volumes, create a RAID set, or erase the target disk or partition. WARNING: When you perform an upgrade, make sure that saved setup data won’t be inadvertently detected and used by the server. If saved setup data is used, the server settings are not compatible with the saved settings and can cause unintended consequences. For more information, see “How a Server Searches for Saved Setup Data” on page 121.Chapter 5 Installation and Deployment 101 The process for remotely installing with VNC is the same as installing locally at the keyboard and monitor, except that you must first connect to the VNC server on the target computer with a VNC client, like Apple Remote Desktop. For information about connecting to a computer running from an Install DVD, see “Remotely Accessing the Install DVD” on page 82. For information about running the installer locally, see “Installing Locally from the Installation Disc” on page 97. Using the installer Command-Line Tool to Install Server Software You use the installer tool to install server software on a local or remote computer from the command-line. For information about installer:  See Command-Line Administration.  Open the Terminal application and type installer, installer -help, or man installer. These instructions assume you have started up the computer using the Install DVD, installer partition, or NetInstall disk. If you have not, see the relevant instructions beginning at “About Starting Up for Installation” on page 81. To use installer to install server software: 1 Start a command-line session with the target server by choosing from the following:  Installing a local server: When the Installer opens choose Utilities > Open Terminal to open the Terminal application.  Installing a remote server: From Terminal on an administrator computer or from a UNIX workstation, establish an SSH session as the root user with the target server, substituting the target server’s actual IP address for : ssh root@ ∏ If you don’t know the IP address and the remote server is on the local subnet, you can use the sa_srchr command to identify computers on the local subnet where you can install server software: /System/Library/Serversetup/sa_srchr 224.0.0.1 mycomputer.example.com#PowerMac4,4###Mac OS X Server 10.5#RDY4PkgInstall#2.0#512 You can also use Server Assistant to generate information for computers on the local subnet. Open Server Assistant, select “Install software on a remote computer,” and click Continue to access the Destination pane and generate a list of servers awaiting installation.102 Chapter 5 Installation and Deployment 2 When prompted for a password, enter the first eight digits of the server’s built-in hardware serial number. To find a server’s serial number, look for a label on the server. If the target computer had been set up as a server, you’ll also find the hardware serial number in /System/ Library/Serversetup/SerialNumber. If you’re installing on an older computer that has no built-in hardware serial number, use 12345678 for the password. 3 Identify the target-server volume where you want to install the server software. To list the volumes available for server software installation from the installation disc, type this command: /usr/sbin/installer -volinfo -pkg /System/Installation/Packages/ OSInstall.mpkg You can also identify a NetInstall image you’ve created and mounted: /usr/sbin/installer -volinfo -pkg /Volumes/ServerNetworkImage10.5/ System/Installation/Packages/OSInstall.mpkg The list displayed reflects your particular environment, but here’s an example showing three available volumes: /Volumes/Mount 01 /Volumes/Mount1 /Volumes/Mount02 4 If you haven’t already done so, prepare the disks for installation. For more information about preparing the disks for installation, see “Preparing Disks for Installing Mac OS X Server” on page 89. If the target volume has Mac OS X Server v10.4.10 or 10.3.9 installed, when you run installer it will upgrade the server to v10.5 and preserve user files. If you’re not upgrading but performing a clean installation, back up the user files you want to preserve, then use diskutil to erase the volume and format it to enable journaling: /usr/sbin/diskutil eraseVolume HFS+ "Mount 01" "/Volumes/Mount 01" /usr/sbin/diskutil enableJournal "/Volumes/Mount 01" You can also use diskutil to partition the volume and to set up mirroring. For more information about the command, see the diskutil man page. Important: Don’t store data on the hard disk or hard disk partition where the operating system is installed. With this approach, you won’t risk losing data if you need to reinstall or upgrade system software. If you must store additional software or data on the system partition, consider mirroring the drive.Chapter 5 Installation and Deployment 103 5 Install the operating system on a volume from the list generated in step 3. For example, to use Mount 01 in the example in step 4 to install from a server installation disc, enter: /usr/sbin/installer -verboseR -lang en -pkg /System/Installation/ Packages/OSInstall.mpkg -target "/Volumes/Mount 01" If you’re using a NetInstall image, the command identifies them as step 3 shows. When you enter the -lang parameter, use one of the following values: en (for English), de (for German), fr (for French), or ja (for Japanese). During installation, progress information is displayed. While installation proceeds, you can open another Terminal window to install server software on another computer. 6 When installation from the disc is complete, restart the server by entering: /sbin/reboot or /sbin/shutdown -r Server Assistant opens when installation is complete. You can now proceed to set up the server. For more information, see “Initial Server Setup” on page 105. Installing Multiple Servers You can use Server Assistant, VNC viewer software, or the installer tool to initiate multiple server software installations. After using Server Assistant to initiate server software installation on more than one remote computer, you can choose File > New Window to install the software on another batch of computers. When running Server Assistant from an administration computer to install on multiple machines, group the same hardware configurations together. For example, choose all Intel Xserve machines or all G4 Mac minis. After using a VNC viewer to control installation of Mac OS X Server v10.5 or later on one remote computer, you can use the VNC viewer to open a connection to another remote computer and control installation on it. Because this involves interacting with each server individually, it is a less efficient method of installing on multiple servers. The most efficient method of installation would be completely automated. Opening the Terminal application and using the installer tool to initiate each server software installation doesn’t accomplish this efficiently. However, scripting the command-line tool (using known values for server IP addresses, for example) to automate multiple simultaneous installations can be very efficient. To completely automate server installation, you must script the installer tool and have a high measure of control over the network infrastructure.104 Chapter 5 Installation and Deployment For example, to have known IP addresses and the appropriate hardware serial numbers included in your script, you cannot rely on the randomly assigned IP addresses. You can use DHCP assigned static addresses to remove that uncertainty and ease your scripting considerations. The methods, scripting languages, and possibilities are too many to list in this guide. Upgrading a Computer from Mac OS X to Mac OS X Server You can use the Install DVD for Mac OS X Server v10.5 to upgrade a desktop computer that has the following characteristics:  Has Mac OS X v10.5 or later installed  Has an Intel processor  Was introduced in summer 2006 or later  Meets the system requirements in “System Requirements for Installing Mac OS X Server” on page 79 To upgrade a computer from Mac OS X to Mac OS X Server: 1 Start up the computer from the hard disk, as you would for normal use. Do not use an installation disc. 2 Insert the Install DVD, open the Other Installs folder, and double-click MacOSXServerInstall.mpkg to run the Installer. When the Installer finishes, your computer restarts automatic[ally and Server Assistant opens to let you set up the server. 3 After the server restarts, use Software Update to install server software updates. How to Keep Current After you’ve set up your server, you’ll want to update it when Apple releases server software updates. There are several ways to access update releases of Mac OS X Server:  In Server Admin, select a server in the Servers list, then click the Server Updates button.  Use the Software Update pane of System Preferences.  Use the softwareupdate command-line tool.  Use the server’s software update service.  Download a disk image of the software update from: www.apple.com/support/downloads6 105 6 Initial Server Setup Basic characteristics of your Mac OS X Server are established during server setup. The server can operate in three different configurations: advanced, standard, and workgroup. These instructions assume you have chosen the advanced configuration. After installing server software, the next task is to set up the server. There are several ways to set up a server:  Set up one or more servers interactively.  Automate the setup by using setup data you’ve saved in a file or in a directory the servers are configured to access. Information You Need To understand and record information for each server you want to set up, see the Mac OS X Server Advanced Worksheet in the appendix on page 195. The following information provides supplemental explanations for some items on the worksheet. When you’re upgrading from Mac OS X Server v10.4.10 or v10.3.9, Server Assistant displays the existing server settings, but you can change them. Use the Mac OS X Server Advanced Worksheet to record settings you want the v10.5 server to use. Postponing Server Setup Following Installation Server Assistant opens automatically on a server that hasn’t been set up, and waits for you to begin the setup process. To set up the server later, you can postpone the setup process by using the server’s keyboard, mouse, and display. 106 Chapter 6 Initial Server Setup To postpone setting up Mac OS X Server: m In Server Assistant, press Command-Q on the server’s keyboard, and then click Shut Down. When you restart the server, Server Assistant opens again. If you’re setting up a server without a keyboard or display, you can enter commands in the Terminal application to shut down the server remotely. For information about using the command-line to connect to a remote computer and shut it down, see CommandLine Administration. Connecting to the Network During Initial Server Setup Try to place a server in its final network location (subnet) before setting it up for the first time. If you’re concerned about preventing unauthorized or premature access during setup, you can set up a firewall to protect the server while you’re finalizing its configuration. If you can’t avoid moving a server after initial setup, you must change settings that are sensitive to network location before it can be used. For example, the server’s IP address and host name, stored in directories and configuration files on the server, must be updated. For more information, see “Changing the Server’s Host Name After Setup” on page 144. Configuring Servers with Multiple Ethernet Ports Your server has a built-in Ethernet port and may have additional Ethernet ports built in or added on. When you’re using Server Assistant to interactively set up one or more servers, all of a server’s available Ethernet ports are listed and you select one or more to activate and configure. When you work in Server Assistant’s offline mode, you click an Add button to manually create a list of ports to configure. If you enable more than one port, you specify the order in which the ports should be used by the server when routing traffic to the network. Although the server receives network traffic on any active port, network traffic initiated by the server is routed through the first active port. For a description of port configuration attributes, see the Mac OS X Server Advanced Worksheet located in the appendix. Chapter 6 Initial Server Setup 107 About Settings Established During Initial Server Setup During server setup, the following basic server settings are established:  The language to use for server administration and the computer keyboard layout is defined.  The server software serial number is set.  A server administrator user is defined and the user’s home folder is created.  Default AFP and FTP share points, such as Shared Items, Users, and Groups, are defined.  Basic Open Directory information is set up. At a minimum, a local directory domain is created. You can also set up an LDAP directory for other computers to use or configure the server to obtain directory information from other servers.  The server’s host name, computer name, and local hostname are set. You can specify the computer name and local hostname, but Server Assistant sets the host name to AUTOMATIC in /etc/hostconfig. This setting causes the server’s host name to be the first name that’s true in this list:  The name provided by the DHCP or BootP server for the primary IP address  The first name returned by a reverse DNS (address-to-name) query for the primary IP address  The local hostname  The name “localhost”  Network interfaces (ports) are configured. TCP/IP and Ethernet settings are defined for each port you want to activate.  Network time service can be set up. If you’re upgrading, the current basic settings are displayed during the setup process, but you can change them. Other settings, such as share points you’ve defined and services you’ve configured, are preserved. For a complete description of what’s upgraded and actions, see Upgrading and Migrating. You can perform initial server setup only once without reinstalling a server. To change settings established during setup, you have alternative means to do so. For example, you can use Server Admin or Directory Utility to manage Open Directory settings. Specifying Initial Open Directory Usage During setup of an advanced configuration, you specify how the server initially stores and accesses user accounts and other directory information. You choose whether the server connects to a directory system or works as a standalone server. 108 Chapter 6 Initial Server Setup After setup, you can create or change a connection to a directory system by using Directory Utility, or you can make the server an Open Directory master or replica by using Server Admin to change the server’s Open Directory service settings. For information about changing directory services, see Open Directory Administration. When you set up a server initially, you specify its directory services configuration. Choices are:  No change, available only when upgrading from Mac OS X Server v10.4.10 or 10.3.9.  Standalone Server, used to set up only a local directory domain on the server.  Connected to a Directory System, used to set up the server to obtain directory information from a shared directory domain that’s already been set up on another server. In all these cases, Open Directory authentication is set up on the server and used by default for any new users added to domains that reside on the server. If you’re setting up multiple servers and one or more of them will host a shared directory, set up those servers before setting up servers that will use those shared directories. Note: If you connect Mac OS X Server v10.5 to a directory domain of Mac OS X Server v10.2 or earlier, users defined in the older directory domain cannot be authenticated with the MS-CHAPv2 method. This method may be required to securely authenticate users for the VPN service of Mac OS X Server v10.5. Open Directory in Mac OS X Server v10.5 supports MSCHAPv2 authentication, but Password Server in Mac OS X Server v10.2 doesn’t support MSCHAPv2. After setup, use the Directory Utility or Server Admin applications to refine the server’s directory configuration, if necessary. Directory Utility lets you set up connections to multiple directories, including Active Directory and other non-Apple directory systems, and specify a search policy (the order in which the server should search through the domains). Server Admin lets you set up replicas of an Open Directory master and manage other aspects of a server’s directory service configuration. Open Directory Administration can help you decide which directory usage setup option is right for you. If you’re upgrading, the best choice is usually “No change.” If you’re setting up a new server, the simplest choice is “Standalone Server.” After initial server setup, you can use Directory Utility or Server Admin to adjust and finalize the directory setup.Chapter 6 Initial Server Setup 109 Not Changing Directory Usage When Upgrading When setting up a server that you’re upgrading to v10.5 from v10.3.9 or 10.2.8, and you want the server to use the same directory setup it’s been using, choose “No change” in the Directory Usage pane in Server Assistant. Even when you want to change the server’s directory setup, selecting “No change” is the safest option, especially if you’re considering changing a server’s shared directory configuration. Changing from hosting a directory to using another server’s shared directory or vice versa, or migrating a shared NetInfo domain to LDAP are examples of directory usage changes you should make after server setup in order to preserve access to directory information about your network. For information about all the directory usage options available to you and how to use Directory Utility and Server Admin to make directory changes, see Open Directory Administration. For information about how to continue using existing directory data when you change directory service settings, see Upgrading and Migrating. If you choose the “No change” option and the server wasn’t using a Password Server, Open Directory authentication is set up. When you add users to any Apple directory domain residing on the server, their passwords are validated by default using Open Directory authentication. Setting Up a Server as a Standalone Server A standalone server stores and accesses account information in its local directory domain. The standalone server uses its local directory domain to authenticate clients for its file, mail, and other services. Other servers and client computers can’t access the standalone server’s local directory domain. Open Directory authentication is also set up on the server. By default, Open Directory authentication is used when a user is added to the local domain. When a user attempts to log in to the server or use one of its services that require authentication, the server authenticates the user by consulting the local database. If the user has an account on the system and supplies the appropriate password, authentication succeeds. Setting Up a Server to Connect to a Directory System If it’s connected to another directory system, your server stores and accesses account information in another server’s shared directory and can use the other directory system to authenticate clients for file, mail, and other services. Your server can also use its local directory domain for accounts and authentication.110 Chapter 6 Initial Server Setup You can integrate your server with a variety of directory systems by choosing one of the following options during setup:  Open Directory Server: Your server can store and access directory information about an Open Directory server using LDAP. With this option, you need to know the DNS name or IP address of the Open Directory server.  As Specified by DHCP Server: Your server will obtain information for connecting to a directory system from a DHCP server. The DHCP server must be set up to provide the address and search base of an LDAP server (DHCP option 95). The directory service and DHCP service are independent. They don’t need to be provided by the same server.  Other Directory Server: If you need to integrate the server with another kind of directory system or with multiple directory systems, choose this option and set up the connections later using the Directory Utility application. This option lets you integrate your server into almost any existing directory service, including Microsoft Active Directory, Novell eDirectory, another non-Apple directory, or an NIS domain. For information about using Directory Utility, see Open Directory Administration or open Directory Utility and then use the Help menu. If you set up your server to connect to an Open Directory server that has Mac OS X Server v10.3 or earlier, you may not be able to take advantage of some features:  VPN service requires MS-CHAP2 authentication, which isn’t available in v10.2 or earlier.  Replication isn’t supported by v10.2 or earlier.  Kerberos configuration is much more complex in v10.2. In addition, automatic synchronization of Kerberos and Password Server requires v10.3 or later.  In v10.3 and earlier, trusted directory binding, support for LDAP subdomains, and Directory Utility controls aren’t available. Using Interactive Server Setup The simplest way to set up a small number of servers is to use Server Assistant’s guided interview process after establishing a connection with each server in turn. You provide server setup data interactively, then initiate setup immediately. If you have only a few servers to set up, the interactive approach is useful. You can use the interactive approach to set up a local server, a remote server, or several remote servers. To use this approach, open Server Assistant, connect to one or more target servers, supply setup data, and then initiate the setup immediately. This is the technique you use to set up a local server, as “Setting Up a Local Server Interactively” on page 111 describes. You can also use this interactive approach to set up a remote server from an administrator computer. For instructions, see “Setting Up a Remote Server Interactively” on page 112.Chapter 6 Initial Server Setup 111 When multiple remote servers can use the same setup data, you can supply the data and then initiate setup of all the servers at once, using a batch approach. When running Server Assistant from an administration computer to set up multiple servers, group the same hardware configurations together. For example, choose all Intel Xserve machines or all G4 Mac minis. This technique, shown on the left side of the following illustration, requires that network identifiers for all target servers be set using DHCP or BootP. For instructions, see “Setting Up Multiple Remote Servers Interactively in a Batch” on page 113. To customize the setup of individual servers, you can manage each setup individually from a different Server Assistant window. This approach is shown on the right side of the illustration above. For instructions, see “Setting Up a Remote Server Interactively” on page 112. Although the previous illustration shows target servers on the same subnet as the administrator computer in one scenario and target servers on a different subnet in the other scenario, both setup scenarios can be used to set up servers on the same and different subnets. If a target server is on a different subnet, you must supply its IP address. Servers on the same subnet are listed by Server Assistant, so you select one or more servers in the list. Setting Up a Local Server Interactively After server software is installed on a server, you can use the interactive approach to set it up locally if you have physical access to the computer. This setup assumes you are using the Advanced server configuration mode. Don’t try to use these instructions with Standard or Workgroup modes. Subnet 1 Subnet 2 Welcome Welcome Welcome112 Chapter 6 Initial Server Setup To set up a local server interactively: 1 Fill out the Mac OS X Server Advanced Worksheet located in the appendix. Supplemental information appears in “Information You Need” on page 105. When the server restarts, Server Assistant opens. 2 Enter the setup data you’ve recorded on the Mac OS X Server Advanced Worksheet as you move through the Assistant’s panes, following the onscreen instructions. Make sure that any DHCP or DNS servers you specify for the server you’re setting up to use are running. After all setup data is entered, Server Assistant displays a summary of the data. 3 Review the setup data you entered and if necessary click Go Back to change it. 4 To save the setup data as a text file or in a form you can use for automatic server setup (a saved setup file or saved directory record), click Save As. To encrypt a configuration file or directory record, select “Save in Encrypted Format” and then enter and verify a passphrase. You must supply the passphrase before an encrypted setup file can be used by a target server. 5 To initiate setup of the local server, click Apply. 6 When server setup is complete, click Restart Now. Now you can log in as the server administrator user created during setup to configure services. Setting Up a Remote Server Interactively After server software is installed on a server, you can use the interactive approach to set it up remotely from an administrator computer that can connect to the target server. To set up a remote server interactively: 1 Fill out the Mac OS X Server Advanced Worksheet located in the appendix. Supplemental information appears in “Information You Need” on page 105. 2 Make sure the target server is running. 3 On an administrator computer, open Server Assistant in /Applications/Server/. You don’t need to be an administrator on the administrator computer to use Server Assistant. 4 In the Welcome pane, select “Set up a remote server” and click Continue. 5 In the Destination pane, put a check in the Apply column for the remote server you want to set up, enter its preset password in the Password field, and click Continue to connect to the server. If you don’t see the target server on the list, click Add to add it or Refresh to determine whether it’s available. Chapter 6 Initial Server Setup 113 6 Select the server configuration type “Advanced.” 7 In the Language pane, specify the language you want to use to administer the target server. 8 If you are using saved setup data, do the following: In the Language pane, choose File > Open Configuration File or File > Open Directory Record to load the saved setup data you want to use. If the saved setup data is encrypted, enter the passphrase when prompted. Optionally choose View > Jump to Review to review the setup data, then use Go Back as necessary to change it. 9 If you are entering setup data, do the following: Click Continue and enter the setup data as you move through the Assistant’s panes, following the onscreen instructions, and click Continue. Make sure that any DHCP or DNS servers you specify for the server you’re setting up to use are running. 10 After all setup data is specified, review the summary displayed by Server Assistant and optionally click Go Back to change data. 11 To save the setup data as a text file or in a form you can use for automatic server setup (as a saved setup file or saved directory record), click Save As. To encrypt a configuration file or directory record, select “Save in Encrypted Format” and then enter and verify a passphrase. You must supply the passphrase before an encrypted setup file can be used by a target server. 12 To initiate setup of the remote target server, click Apply. 13 When server setup is complete, click Continue Now. The target server restarts and you can log in as the server administrator user created during setup to configure services. Setting Up Multiple Remote Servers Interactively in a Batch You can use the interactive approach to set up multiple servers as a batch if:  All the servers are accessible from an administrator computer  All the servers use the same chip platform (for example, Intel-based or PowerPCbased)  All the servers use the same setup data except for server software serial numbers and network identities (host name, computer name, and local hostname)  Network identities are provided by a DHCP or BootP server114 Chapter 6 Initial Server Setup When running Server Assistant from an administration computer to set up multiple servers, group the same hardware configurations together. For example, choose all Intel Xserve machines or all G4 Mac minis. If you have several servers with different configuration files, you can open a new Server Assistant window for each batch of servers. This way you can group servers by platform, settings, subnet, or any other criteria you choose. To set up multiple remote servers interactively in a batch: 1 Fill out the Mac OS X Server Advanced Worksheet with settings you want to use for all servers you want to set up. The Mac OS X Server Advanced Worksheet is located on the Mac OS X Server installation disc in the Documentation folder. Supplemental information appears in “Information You Need” on page 105. The Preface tells you where else you can find the Mac OS X Server Advanced Worksheet. 2 Make sure the target servers and any DHCP or DNS servers you want them to use are running. 3 On an administrator computer that can connect to all the target servers, open Server Assistant. It’s located in /Applications/Server/. You don’t have to be an administrator on the administrator computer to use Server Assistant. 4 In the Welcome pane, select “Set up a remote server” and click Continue. 5 In the Destination pane, put a check in the Apply column for each remote server you want to set up. Then enter the preset password in the Password field for each server, and click Continue to connect to the servers. If you don’t see a target server you want to set up on the list, click Add to add it. 6 In the Language pane, specify the language you want to use to administer the target servers. 7 If you are using saved setup data, do the following: In the Language pane, choose File > Open Configuration File or File > Open Directory Record to load the saved setup data you want to use. If the saved setup data is encrypted, enter the passphrase when prompted. Optionally choose View > Jump to Review to review the setup data, then use Go Back as necessary to change it. 8 If you are entering setup data, do the following: Click Continue and enter the setup data as you move through the Assistant’s panes, following the onscreen instructions, and click Continue. Make sure that any DHCP or DNS servers you specify for the server you’re setting up to use are running.Chapter 6 Initial Server Setup 115 9 After all setup data is specified, review the summary displayed by Server Assistant and optionally click Go Back to change data. 10 To save the setup data as a text file or in a form you can use for automatic server setup (as a saved setup file or saved directory record), click Save As. To encrypt a configuration file or directory record, select “Save in Encrypted Format” and then enter and verify a passphrase. You must supply the passphrase before an encrypted setup file can be used by a target server. 11 To initiate server setup, click Apply. 12 To initiate setup of the remote target server, click Apply. 13 When server setup is complete, click Continue Now. The target servers restart and you can log in as the server administrator user created during setup to configure their services. Using Automatic Server Setup When you have more than a few servers to set up, consider using automatic server setup. This approach also provides a way to preserve setup data so it can be reused if you need to reinstall server software. The automatic approach is useful when you:  Have more than a few servers to set up  Want to prepare for setting up servers that aren’t yet available  Want to save setup data for backup purposes  Need to reinstall servers frequently To use automatic server setup, you use Server Assistant to specify setup data for each computer or batch of computers; then you save the data in a file or in a directory to create setup data, as shown in the following illustration: Finally, you provide that setup data to the target servers. You can provide the data using a variety of methods, like storing files on the hard disk, removable storage, or saving it in directory entries. By default, saved setup data is encrypted for extra security. Administrator computer Setup data in a directory Setup data in a file116 Chapter 6 Initial Server Setup When a server starts up for the first time, it searches for automatic setup data to configure itself before it starts the interactive Setup Assistant. Automatic server setup requires two main steps: Step 1: Create the setup data files The following sections can help you create setup data files.  “Setup Data Saved in a File” on page 117  “Setup Data Saved in a Directory” on page 118  “Creating and Saving Setup Data” on page 116  “Keeping Backup Copies of Saved Setup Data” on page 119 Step 2: Make the setup data files available to a freshly installed server The following sections can help you make the data available to the servers:  “How a Server Searches for Saved Setup Data” on page 121  “Setting Up Servers Automatically Using Data Saved in a File” on page 122  “Setting Up Servers Automatically Using Data Saved in a Directory” on page 125 Creating and Saving Setup Data When you want to work with saved setup data, determine a strategy for naming, encrypting, storing, and serving the data. One way to create setup data is to use Server Assistant’s offline mode, which lets you work with setup data without connecting to specific servers. You specify setup data, then save it in a file or directory accessible from target servers, as the next two sections describe. Target servers where Mac OS X Server v10.5 software has been installed automatically detect the presence of the saved setup information and use it to set themselves up. You can define generic setup data that can be used to set up any server. For example, you might want to define generic setup data for a server that’s on order, or to configure 50 Xserve computers you want to be identically configured. Alternatively, you can save setup data that’s specifically tailored for a particular server. Important: When you perform an upgrade installation, make sure that saved setup data won’t be inadvertently detected and used by the server. If saved setup data is used, existing server settings will be overwritten by the saved settings. For more information, see “How a Server Searches for Saved Setup Data” on page 121.Chapter 6 Initial Server Setup 117 Setup Data Saved in a File When you save setup data in a file, a target server detects and uses the file if:  Setup data the target server recognizes isn’t found in a directory the server is configured to use. For information about how a server detects and uses directory data to set itself up, see “Setup Data Saved in a Directory” on page 118.  The setup file is on a volume mounted locally in /Volumes/*/Auto Server Setup/, where * is any device mounted under /Volumes. A target server searches through volumes alphabetically by device name. The device that is mounted as a file system can be the server’s hard disk or an iPod, DVD, CD, FireWire drive, USB drive, or other device plugged in to the server (for example, /Volumes/AdminiPod/Auto Server Setup/myserver.example.com.plist).  The setup file name is one of the following, when searching for setup files, target servers search for names in the order listed. .plist (include leading zeros but omit colons. for example, 0030654dbcef.plist). .plist (for example, 10.0.0.4.plist). .plist (for example, myserver.plist). .plist (first 8 characters only, for example, ABCD1234.plist). .plist (for example, myserver.example.com.plist). .plist (for example, 10.0.plist matches 10.0.0.4 and 10.0.1.2). generic.plist (a file that any server will recognize, used to set up servers that need the same setup values). If the serial number specified in the file isn’t site licensed, after setup you need to manually set it. Use Server Admin or the following command in the Terminal application: serversetup -setServerSerialNumber.  The correct passphrase is provided to the server when setup data is encrypted. You can use Server Assistant to supply a passphrase interactively, or you can supply the passphrase in a text file. Place the passphrase file on a volume mounted locally on the target server in /Volumes/*/Auto Server Setup/. The passphrase file can have one of these names. Target servers search for names in the order listed. .pass (include leading zeros but omit colons, for example, 0030654dbcef.pass). .pass (for example, 10.0.0.4.pass). .pass (for example, myserver.pass). .pass (first 8 characters only, for example, ABCD1234.pass.118 Chapter 6 Initial Server Setup .pass (for example, myserver.example.com.pass). .pass (for example, 10.0.pass matches 10.0.0.4 and 10.0.1.2). generic.pass (a file that any server will recognize). If the server software serial number isn’t site licensed, after setup you need to manually set it. Use Server Admin or the following command in Terminal: serversetup -setServerSerialNumber. If you want to reuse saved setup data after reinstalling a server, you can store the server’s setup files in a small local partition that isn’t erased when you reinstall the server. The setup files are detected and reused after each reinstallation. Setup Data Saved in a Directory Using this approach offers the most unattended way to set up multiple servers but it requires that you have a DHCP and directory infrastructure in place. Using Server Assistant, you save setup data to an existing directory that the computer you’re using is configured to access and that you want newly installed servers to retrieve setup data from. The schema of the directory must support stored setup data. Open Directory has built-in support for stored setup data. If you want to store setup data in a non-Apple directory, you first must extend its schema as Open Directory Administration describes. When you save setup data in a directory, a target server detects and uses the setup data if:  The target server receives its network names (host name, computer name, and local hostname) and its port configuration from a DHCP server.  The DHCP server is configured to identify the IP address of the directory server where the setup data resides. For DHCP server configuration instructions, see Network Services Administration.  The directory and DHCP servers are running.  The setup data is stored in the directory in a path named /AutoServerSetup/ and a record having one of the following names. Target servers search for names in the order listed. (include leading zeros but omit colons, for example, 0030654dbcef). (for example, 10.0.0.4). (for example, myserver). (first 8 characters only, for example, ABCD1234). (for example, myserver.example.com).Chapter 6 Initial Server Setup 119 (for example, 10.0 matches 10.0.0.4 and 10.0.1.2). generic (a record that any server will recognize, used to set up servers that need the same setup values). If the serial number specified in the file isn’t site licensed, after setup you need to manually set it. Use Server Admin or the following command in the Terminal application: serversetup -setServerSerialNumber.  The correct passphrase is provided to the server (setup data stored in a directory should always be encrypted). You can use Server Assistant to supply a passphrase interactively or you can supply the passphrase in a text file. Place the passphrase file on a volume mounted locally on the target server in /Volumes/*/Auto Server Setup/, where * is any device mounted under /Volumes. A target server searches through volumes alphabetically by device name. The passphrase file can have one of the following names. Target servers search for names in the order listed. .pass (include leading zeros but omit colons, for example, 0030654dbcef.pass). .pass (for example, 10.0.0.4.pass). .pass. (for example, myserver.pass). .pass (first 8 characters only, for example, ABCD1234.pass). .pass (for example, myserver.example.com.pass). .pass (for example, 10.0.pass matches 10.0.0.4 and 10.0.1.2). generic.pass (a file that any server will recognize). If the server software serial number isn’t site licensed, after setup you need to manually set it. Use Server Admin or the following command in Terminal: serversetup -setServerSerialNumber. Keeping Backup Copies of Saved Setup Data Saved setup data isn’t only useful for automating the setup of multiple servers. It also provides a way to set up servers again if you need to reinstall server software on them. You can keep backup copies of setup data files on a network file server. Alternatively, you can store setup data files in a local partition that won’t be erased when you reinstall server software. Using Encryption with Setup Data Files By default, saved setup data is encrypted for extra security. Before server sets itself up using encrypted data, it must have access to the passphrase used when the data was encrypted. 120 Chapter 6 Initial Server Setup The passphrase can be provided either interactively (using Server Assistant) or in a file on a local volume of the target server. For example, you can store the file with the passphrase on an iPod, then plug the iPod into each server that needs the passphrase. A server with the IP address 10.0.0.4 would use /Volumes/MyIPod/Auto Server Setup/ 10.0.0.4.pass. Providing Setup Data Files to Servers Using Files in the File System When you place a setup file on a volume (CD, DVD, iPod, USB solid-state drive, disk partition) mounted locally on a server you’ve installed but not set up, the server detects the file and uses it to set itself up. For example, you could store multiple setup files on an iPod and then plug the iPod into the first server that a setup file exists for, as shown in the following illustration: Then you could plug the iPod into the next server: Each target server recognizes its own file, because it’s been named using one of its identifiers and resides in a known location. For example, a server with WXYZ1234 as the first eight characters of its built-in serial number would use this setup file to set itself up: /Volumes/MyIPod/Auto Server Setup/ WXYZ1234.plist. A server’s IP address can also be used as an identifier. A server with the IP address of 10.0.0.4 would use the following file: /Volumes/MyIPod/Auto Server Setup/10.0.0.4.plist. iPod iPodChapter 6 Initial Server Setup 121 You could also use a single file, which you’d name “generic.plist”, to set up multiple servers if the setup data does not need to be unique and the servers’ network identities are provided using DHCP. For more information about setup file naming and use, see “How a Server Searches for Saved Setup Data” on page 121. Using Settings in the Directory A target server can set itself up using setup data you’ve stored in a directory the server is configured to access. Although storing setup data in a directory is the most automated way to set up multiple servers, this approach requires that you set up an infrastructure first so that target servers can locate the setup data stored in the directory. The most critical components of the infrastructure are DHCP and Open Directory, as the following picture illustrates: The Open Directory server in this example hosts an LDAP directory in which setup data has been saved. The address of the Open Directory server is registered with DHCP service, running on another server in this example. The DHCP service provides the Open Directory server address to the target servers when it assigns IP addresses to those servers. The target servers detect setup data that has been stored for them in the LDAP directory and use it to set themselves up. You can save setup data in an Apple OpenLDAP directory or in another directory that supports Apple’s schema extensions for saved setup data, documented in Open Directory Administration. For more information about setup file naming and use, see “How a Server Searches for Saved Setup Data” on page 121. How a Server Searches for Saved Setup Data A freshly installed server sets itself up using saved setup data it finds while using the following search sequence. When the server finds saved setup data that matches the criteria described, it stops searching and uses the data to set itself up. Open Directory server DHCP server122 Chapter 6 Initial Server Setup 1 The server searches through locally mounted volumes for setup files in /Volumes/*/ Auto Server Setup/, where * is a file system (device) name. It searches through volumes alphabetically by device name, looking for a file with the extension “.plist” that’s named using its MAC address, its IP address, its partial DNS name, its built-in hardware serial number, its fully qualified DNS name, its partial IP address, or generic.plist, in that order. 2 Next, the server looks in a directory it’s configured to use for a setup record in a path named “AutoServerSetup”. It searches for records named using its MAC address, its IP address, its partial DNS name (myserver), its built-in hardware serial number, its fully qualified DNS name (myserver.example.com), its partial IP address, or “generic,” in that order. If the setup data is encrypted, the server needs the correct passphrase before setting itself up. You can use Server Assistant to supply the passphrase interactively, or you can supply the passphrase in a text file in /Volumes/*/Auto Server Setup/. The target server searches through volumes alphabetically by file system name, looking for a file with the extension “.pass” that’s named using its MAC address, its IP address, its partial DNS name, its built-in hardware serial number, its fully qualified DNS name, its partial IP address, or generic, in that order. Important: When you perform an upgrade, make sure that saved setup data won’t be inadvertently detected and used by the server you’re upgrading. If saved setup data is used, existing server settings are overwritten by the saved settings. The next two sections provide more details about how to use saved setup data. Setting Up Servers Automatically Using Data Saved in a File After server software has been installed on a server, you can set it up automatically using data saved in a file. To save and apply setup data from a file: 1 Fill out the Mac OS X Server Advanced Worksheet for each server you want to set up. The Mac OS X Server Advanced Worksheet is located in the appendix. 2 On an administrator computer, open Server Assistant in /Applications/Server/. You don’t need to be an administrator on the administrator computer to use Server Assistant. 3 In the Welcome pane, select “Save advanced setup information in a file or directory record” to work in offline mode, which doesn’t require a server connection. 4 In the Language pane, specify the language you want to use to administer the target servers.Chapter 6 Initial Server Setup 123 5 If you want to create a setup file, go to step 6; if you want to work with an existing setup file, go to 7. If you intend to create a generic setup file because you want to use the file to set up more than one server, don’t specify network names (computer name and local hostname) and make sure that each network interface (port) is set to be configured Using DHCP or Using BootP. 6 Click Continue and enter the setup data as you move through the Assistant’s panes, following the onscreen instructions. 7 In the Language pane, choose File > Open Configuration File or File > Open Directory Record to load the saved setup data you want to work with. If the saved setup data is encrypted, enter the passphrase when prompted. Optionally choose View > Jump to Review to review the setup data, then use Go Back as necessary to change it. 8 In the Network Interfaces pane, click Add to specify network interfaces. 9 After the setup data is specified, review the summary displayed by Server Assistant and optionally click Go Back to change data. 10 Click Save As, then select Configuration File. 11 To encrypt the file, select Save in Encrypted Format, and then enter and verify a passphrase. You must supply the passphrase before an encrypted setup file can be used by a target server. 12 Click OK, navigate to the location where you want to save the file, name the file using one of the following options, and click Save. When searching for setup files, target servers search for names in the order listed. .plist (include leading zeros but omit colons. for example, 0030654dbcef.plist). .plist (for example, 10.0.0.4.plist). .plist (for example, myserver.plist). .plist (first 8 characters only, for example, ABCD1234.plist). .plist (for example, myserver.example.com.plist). .plist (for example, 10.0.plist matches 10.0.0.4 and 10.0.1.2). generic.plist (a file that any server will recognize, used to set up servers that need the same setup values). 124 Chapter 6 Initial Server Setup 13 Place the file in a location where target servers can detect it. A server can detect a setup file if it resides on a volume mounted locally in /Volumes/*/ Auto Server Setup/, where * is any device mounted under /Volumes. The device can be the server’s hard disk or an iPod, DVD, CD, FireWire drive, USB drive, or other device plugged into the server. For example, if you have an iPod named AdminiPod, the path used would be /Volumes/ AdminiPod/Auto Server Setup/. 14 If the setup data is encrypted, make the passphrase available to the target servers. You can supply the passphrase interactively using Server Assistant, or you can provide it in a text file. To provide the passphrase in a file, use step 15. To provide it interactively, use step 16. 15 To provide a passphrase in a file, create a text file and enter the passphrase for the saved setup file on the first line, and then save the file using one of the following names; target servers search for names in the order listed. .pass (include leading zeros but omit colons, for example, 0030654dbcef.pass). .pass (for example, 10.0.0.4.pass). .pass. (for example, myserver.pass). .pass (first 8 characters only, for example, ABCD1234.pass). .pass (for example, myserver.example.com.pass). .pass (for example, 10.0.pass matches 10.0.0.4 and 10.0.1.2). generic.pass (a file that any server will recognize). Save the passphrase file on a volume mounted locally on the target server in /Volumes/ */Auto Server Setup/, where * is any device mounted under / Volumes. 16 To provide a passphrase interactively, use Server Assistant on an administrator computer that can connect with the target server. a In the Welcome or Destination pane, choose File > Supply Passphrase. b In the dialog box, enter the target server’s IP address, password, and the passphrase. c Click Send. 17 If you’re using a generic setup file, and the serial number isn’t site licensed, after setup you must specify the server’s serial number by using Server Admin or the commandline.Chapter 6 Initial Server Setup 125 In Server Admin, select the server, click Settings, and click General. Alternatively, in the Terminal application, use ssh to connect with the server and enter the serversetup - setServerSerialNumber command. For a description of the layout of a saved setup file and more information about the serversetup command, see Command-Line Administration. Setting Up Servers Automatically Using Data Saved in a Directory After server software is installed on a server, you can set it up automatically using data saved in a directory. This method requires a preexisting directory and DHCP infrastructure, as the procedure below describes. To save and apply setup data in a directory record: 1 Make sure the directory where you want to save setup data exists, that its schema supports stored setup data, and that it’s accessible from the administrator computer you’re using. Open Directory Administration describes how to set up and access directories. It also describes the schema for stored setup data. Stored setup data support is built into Apple OpenLDAP directories, but the schema of other directories needs to be extended to support stored setup data. 2 Fill out the Mac OS X Server Advanced Worksheet for each server you want to set up. The Mac OS X Server Advanced Worksheet is located in the appendix. 3 On an administrator computer, open Server Assistant in /Applications/Server/. You don’t need to be an administrator on the administrator computer to use Server Assistant. 4 In the Welcome pane, select “Save advanced setup information in a file or directory record” to work in offline mode, which doesn’t require a server connection. 5 In the Language pane, specify the language you want to use to administer the target servers. 6 If you want to create a new setup, use step 7. If you want to work with a setup that exists, use step 8. If you’re creating generic setup data, don’t specify network names (computer name and local hostname) and make sure that each network interface (port) is set to be configured Using DHCP or Using BootP. 7 Click Continue and enter the setup data as you move through the Assistant’s panes, following the onscreen instructions.126 Chapter 6 Initial Server Setup 8 In the Language pane, choose File > Open Configuration File or File > Open Directory Record to load the saved setup data you want to work with. If the saved setup data is encrypted, enter the passphrase when prompted. Optionally choose View > Jump to Review to review the setup data, then use Go Back as necessary to change it. 9 In the Network Interfaces pane, click Add to specify network interfaces. 10 After all setup data is specified, review the summary displayed by Server Assistant and optionally click Go Back to change data. 11 Click Save As, then select Directory Record. 12 To encrypt the file, select Save in Encrypted Format, and then enter and verify a passphrase. You must supply the passphrase before an encrypted directory record can be used by a target server. 13 Specify the directory where you want to save the setup, name the setup record, and click OK; when prompted, enter information required to authenticate yourself as a directory domain administrator. Settings are saved in the directory in AutoServerSetup. Target servers search for record names in the following order: (include leading zeros but omit colons. for example, 0030654dbcef). (for example, 10.0.0.4). (for example, myserver). (first 8 characters only, for example, ABCD1234). (for example, myserver.example.com). (for example, 10.0 matches 10.0.0.4 and 10.0.1.2). generic (a record that any server will recognize, used to set up servers that need the same setup values). 14 Make sure the proper infrastructure is in place so servers that you want to use the stored setup record for can find it. The directory server storing the setup record must be running. DHCP must be configured to identify the directory server to the target servers using Option 95. In addition, you may need to have DNS configured if your directory data includes DNS names. For some additional infrastructure information, see “Defining Server Setup Infrastructure Requirements” on page 30. Open Directory Administration and Network Services Administration provide instructions for setting up directories and DHCP.Chapter 6 Initial Server Setup 127 15 If the setup data is encrypted, make the passphrase available to the target serverrs. You can supply the passphrase interactively, using Server Assistant, or you provide it in a text file. To provide the passphrase in a file, use step 16. To provide it interactively, use step 17. 16 To provide a passphrase in a file, create a text file and enter the passphrase for the saved setup file on the first line, and then save the file using one of the following names: Target servers search for names in the order listed. .pass (include leading zeros but omit colons, for example, 0030654dbcef.pass). .pass (for example, 10.0.0.4.pass). .pass. (for example, myserver.pass). .pass (first 8 characters only, for example, ABCD1234.pass). .pass (for example, myserver.example.com.pass). .pass (for example, 10.0.pass matches 10.0.0.4 and 10.0.1.2). generic.pass (a file that any server will recognize). Put the passphrase file on a volume mounted locally on the target server in /Volumes/ */Auto Server Setup/, where * is any device that is mounted under the directory /Volumes. 17 To provide a passphrase interactively, use Server Assistant on an administrator computer that can connect with the target server. a In the Welcome or Destination pane, choose File > Supply Passphrase. b In the dialog box, enter the target server’s IP address, password, and the passphrase. c Click Send. 18 If you’re using a generic setup record and the server serial number isn’t site licensed, you must specify the server’s serial number by using Server Admin or the commandline after setup. In Server Admin, select the server, click Settings, and click General. To use the command-line, in the Terminal application use ssh to connect with the server and enter the serversetup -setServerSerialNumber command. For a description of the schema of setup data saved in a directory, see Open Directory Administration. For information about serversetup, see Command-Line Administration.128 Chapter 6 Initial Server Setup Determining the Status of Setups Normally, when setup is complete, the server restarts, and it starts up to the login window. If setup isn’t successful, there are several methods by which you’re notified. Using the Destination Pane for Setup Status Information Server Assistant displays error information in its Destination pane. To access this pane, on the Welcome pane select “Set up a remote server” and click Continue. If the server isn’t listed, click Add to list it. Select the server and review the information displayed. You can save a list of servers you’re interested in monitoring in the Destination pane using File > Save Server List. When you want to monitor the status of those servers, choose File > Load Server List. Handling Setup Failures When a server’s setup fails, an error log is created as /System/Library/ServerSetup/ Configured/POR.err on the target server. The contents of this log can be displayed and the log file deleted on a remote administrator computer. Double-click the error icon for a server on Server Assistant’s Destination pane. If prompted, supply the preset password and click Send. The log contents are displayed, and you can click Delete to delete the log file. Setup can’t be reinitiated until this file has been deleted. If setup fails because a passphrase file can’t be found when using setup data saved in a file or directory record, you can:  Use Server Assistant to supply a passphrase interactively. On the Destination pane, choose File > Supply Passphrase.  Supply the passphrase in a text file. Place the passphrase file on a volume mounted locally on the target server in /Volumes/*/Auto Server Setup/, where * is any device mounted under /Volumes/. A target server searches through volumes alphabetically by device name. If a remote server setup fails for any other reason, reinstall the server software and repeat initial setup. If a local server setup fails, restart the computer, rerun Server Assistant, and reinitiate setup, or reinstall the server software. Handling Setup Warnings When setup completes but a condition that warrants your attention exists, a warning log is created as /Library/Logs/ServerAssistant.POR.status on the target server. Click the target server’s desktop link named ServerAssistant.status to open this file.Chapter 6 Initial Server Setup 129 Here are some messages you may encounter in the log:  The server software serial number is invalid. Open Server Admin, select the server in the Servers list, click Settings, and click General. Enter the correct serial number, and click Save.  Because this server was set up using a generic file or directory record and the serial number isn’t site licensed, you must enter the server software serial number using Server Admin. Open Server Admin, select the server in the Servers list, click Settings, and click General. Enter the correct serial number, and click Save.  The server administrator user defined in the setup data already exists on the server you’ve upgraded. Getting Upgrade Installation Status Information When you perform an upgrade, log files may be placed on the target server. For information about upgrade logs, see the information about upgrading in Upgrading and Migrating. Setting Up Services After setting up an advanced configuration, you must configure services using Server Admin and add users and groups using Workgroup Manager. The following sections survey initial setup of individual services and tell you where to find instructions for tailoring services to support your needs. Adding Services to the Server View Before you can set up services, you must add the service to the server view in Server Admin. For example, by default, no services can be seen for your server. As you select services to administer, the appropriate configuration panes become accessible in a list underneath your computer name. The first time you launch Server Admin and connect to a newly installed server, you are prompted to select the services you want to set up and configure on that server. When you select the desired services in the list, those services appear underneath the server hostname in the server list. Before you can enable or configure and service, it must be added to the administered service list. To change services to administer: 1 Open Server Admin. 2 Select a server, click the Settings button in the toolbar, and then click the Services tab. 3 Select the checkbox for each service you want to turn on. 130 Chapter 6 Initial Server Setup Setting Up Open Directory Unless your server must be integrated with another vendor’s directory system or the directory architecture of a server you’re upgrading needs changing immediately, you can begin using the directories you configured during server setup. Open Directory Administration provides instructions for all aspects of Open Directory domain and authentication setup, including:  Setting up client computer access to shared directory data  Replicating LDAP directories and authentication information of Open Directory masters  Integrating with Active Directory and other non-Apple directories  Configuring single sign-on  Using Kerberos and other authentication techniques Setting Up User Management Unless you’re using a server exclusively to host Internet content (such as web pages) or perform computational clustering, you probably want to set up user accounts in addition to the administrator accounts created during server setup. User Management tells you how to use Workgroup Manager to connect to the directory, define user settings, set up group accounts and computer lists, define managed preferences, and import accounts. To set up a user account: 1 Open Workgroup Manager. 2 Authenticate to the directory as the directory administrator. 3 At the top of the application window, click the Accounts button to select the directory you want to add users to. 4 Click the New User button. 5 Specify user settings in the panes that appear. You can set up user accounts by using Workgroup Manager to import settings from a file. Setting Up File Services When you turn on file sharing services, users can share items in selected folders. You enable and configure File Services and share points using Server Admin. In versions of Mac OS X Server before to Leopard server, share points were created using Workgroup Manager. This functionality has now migrated to Server Admin. File Services Administration provides instructions for creating, configuring, and managing share points for file sharing using all the protocols.Chapter 6 Initial Server Setup 131 To set up file sharing: 1 Open Server Admin. 2 Select a server, click the Settings button in the toolbar, and then click the Services tab. 3 Select the appropriate checkbox for each file service you want to turn on. To share with Macintosh computers, turn on Apple file service (AFP service). To share with Windows computers, turn on SMB service. To provide File Transfer Protocol (FTP) access, turn on FTP service. To share with UNIX computers, turn on NFS service. 4 Select File Sharing in the toolbar. 5 Select a volume or folder you want to share. 6 Select “Share this item” for each folder or volume you want to share. 7 Click the other tabs to specify attributes for the share point. Setting Up Print Service When you turn on print service, server users can share network PostScript printers or Postscript and non-Postscript printers connected directly to the server. A queue is set up automatically for any USB printer connected to the server. No printer queues are set up automatically for network printers, but they’re easy to add. To set up a shared printer queue: 1 Open Server Admin. 2 Select a server, click the Settings button in the toolbar, and then click the Services tab. 3 Select the checkbox for Print service. 4 In the list beneath the server, select Print service. If it isn’t running, click the Start Print button. 5 Click Queues. 6 Click the Add (+) button. 7 Choose a connection protocol, identify a printer, then click OK. Users of Mac OS X computers can now add the printer using Printer Setup Utility. For more information about setting up print services, see Print Service Administration.132 Chapter 6 Initial Server Setup Setting Up Web Service You can use the Apache HTTP Server that comes with Mac OS X Server to host server and user websites. If you turned on web service in Server Assistant, your server can begin serving HTML pages from server and user folders.  To view the main server site, open a web browser on any computer with access to the server and enter the server’s IP address or domain name.  To view a user site, add a slash (/), a tilde (~), and the user’s short name after the server address. For example, enter http://192.268.2.1/~someuser To turn on web service if it’s not running: 1 If you have the HTML files for your main site, copy them into the Documents folder in the /Library/WebServer/ directory. If the files that make up your site are organized in folders, copy the entire folder structure to the Documents folder. For a user site, the files go into the Sites folder in the user’s home folder. Make sure the web content files and folders have the required permissions and ownership. For normal web access, and for WebDAV Read-Only access, the files must be readable by user www, and the folders (including all ancestral folders) must be readable and searchable by user www. In addition, for WebDAV Read/Write access, the files must be writable by user named “www,” and the immediately enclosing folder must be writable by user named “www.” If you don’t have your own HTML files yet, you can still turn on web service to see how it works using the default start pages provided with Mac OS X Server. 2 Open Server Admin. 3 Select a server, click the Settings button in the toolbar, and then click the Services tab. 4 Select the checkbox for Web service. 5 In the list beneath the server, click the button for web service. 6 If it isn’t running, click the Start Service button in the toolbar. Web Technologies Administration describes the many features of web service, including how to set up SSL for a site, enable WebMail, and use WebDAV for file sharing. Setting Up Mail Service Providing full mail service for your users requires additional configuration beyond what can be described here. Mail Service Administration provides instructions for setting up and managing a mail server.Chapter 6 Initial Server Setup 133 Setting Up Network Services If you want a server to host any of the following network services, see Network Services Administration for setup instructions:  DHCP service  DNS  Firewall service  Network Address Translation (NAT)  RADIUS  VPN  Network time service Setting Up System Image and Software Update Services For details on using NetBoot and NetInstall to simplify the management and installation of client operating systems and other software, see System Imaging and Software Update Administration. It tells you how to create disk images and set up Mac OS X Server so other Macintosh computers can start up from, or install, those images over the network. The same guide describes how to set up software update service, which lets you customize updates of Apple software on client computers. To enable NetBoot and NetInstall service for administration: 1 Open Server Admin. 2 Select a server, click the Settings button in the toolbar, and then click the Services tab. 3 Select the checkbox for NetBoot service. Setting Up Media Streaming and Broadcasting For information about how to manage a streaming server that delivers media streams live or on demand to client computers, see QuickTime Streaming and Broadcasting Administration. To enable QuickTime Streaming Service for administration: 1 Open Server Admin. 2 Select a server, click the Settings button in the toolbar, and then click the Services tab. 3 Select the checkbox for QuickTime Streaming service. Setting Up Podcast Producer For information about how to manage a a podcast production server that delivers syndicated media to client computers, see Podcast Producer Administration.134 Chapter 6 Initial Server Setup To enable Podcast Producer service for administration: 1 Open Server Admin. 2 Select a server, click the Settings button in the toolbar, and then click the Services tab. 3 Select the checkbox for Podcast Producer service. Setting Up WebObjects Service If you want to develop WebObjects applications, see the WebObjects Reference Library, available at developer.apple.com/referencelibrary/WebObjects/. If you want to set up a WebObjects application server, see the Deployment section of the WebObjects Reference Library. More information about WebObject service can be found in Web Technologies Administration. To enable WebObject service for administration: 1 Open Server Admin. 2 Select a server, click the Settings button in the toolbar, and then click the Services tab. 3 Select the checkbox for WebObject service Setting Up iChat Service In addition to services already discussed that help users stay in touch (for example, mail and file services and group accounts and preferences), you can set up an iChat server. How you use Server Admin to set up iChat service is described in iChat Service Administration. To enable iChat service for administration: 1 Open Server Admin. 2 Select a server, click the Settings button in the toolbar, and then click the Services tab. 3 Select the checkbox for iChat service. Setting Up iCal Service When you turn on iCal Service, you can share and edit calendars for individuals and groups. Using a CalDAV enabled calendar application, you can share, view, and edit calendars with others. To use Server Admin to set up iCal service, see iCal Service Administration. To enable iCal service for administration: 1 Open Server Admin. 2 Select a server, click the Settings button in the toolbar, and then click the Services tab. 3 Select the checkbox for iCal service.7 135 7 Management This chapter shows you how to complete ongoing management for your systems, including setting up administrator computers, designating administrators, and maintaining service uptime. Sections include:  “Ports Used for Administration” on page 136  “Ports Open By Default” on page 136  “Computers You Can Use to Administer a Server” on page 136  “Using the Administration Tools” on page 138  “Opening and Authenticating in Server Admin” on page 138  “Adding and Removing Servers in Server Admin” on page 139  “Grouping Servers Manually” on page 140  “Grouping Servers Using Smart Groups” on page 140  “Working With Settings for a Specific Server” on page 141  “Administering Services” on page 145  “Tiered Administration Permissions” on page 149  “Workgroup Manager Basics” on page 150  “Administering Accounts” on page 151  “Working With Pre-Version 10.5 Computers From Version 10.5 Servers” on page 155  “Service Configuration Assistants” on page 155  “Critical Configuration and Data Files” on page 155  “Improving Service Availability” on page 159  “Setting Up Your Server for Automatic Reboot” on page 161  “Load Balancing” on page 168  “Daemon Overview” on page 169136 Chapter 7 Management Ports Used for Administration For Apple’s administration applications to function, the following ports must be enabled. In addition, other ports must be enabled for each service you want to run on your server. For a port reference guide, see Network Services Administration and the manual for the appropriate service. Ports Open By Default After Setup, the firewall is off by default in Advanced Server mode, and therefore all ports are open. When the firewall is turned on, all ports are blocked except the following for all originating IP addresses: Computers You Can Use to Administer a Server To administer a server locally using the graphical administration applications (in / Applications/Server/) log in to the server as a server administrator and open them. To administer a remote server, open the applications on an administrator computer. An administrator computer is any Mac OS X Server or Mac OS X v10.5 or later computer where the administration tools have been installed from the Mac OS X Server Admin Tools CD. See “Setting Up an Administrator Computer” on page 137. Port number and type Tool used 22 TCP SSH command-line shell 311 TCP Server Admin (with SSL) 625 TCP Workgroup Manager 389, 686 TCP Directory 80 TCP QuickTime Streaming Management 4111 TCP Xgrid Admin Port number and type Service 22 TCP SSH command-line shell 311 TCP Server Admin (with SSL) 626 UDP Serial number support 625 TCP Remote Directory Access ICMP incoming and outgoing standard ping 53 UDP DNS name resolutionChapter 7 Management 137 You can run command-line tools from the Terminal Application (in /Applications/ Utilities/) on any Mac OS X Server or Mac OS X computer. You can also run commandline tools from a UNIX workstation. Setting Up an Administrator Computer An administrator computer is a computer with Mac OS X or Mac OS X Server v10.5 or later that you use to manage remote servers. In the following illustration, the arrows originate from administrator computers and point to servers the administrator computers might be used to manage. When you’ve installed and set up a Mac OS X Server that has a display, keyboard, and optical drive, it’s already an administrator computer. To make a computer with Mac OS X into an administrator computer, you must install additional software. To enable remote administration of Mac OS X Server from a Mac OS X computer: 1 Make sure the Mac OS X computer has Mac OS X v10.5 or later installed., and in addition, make sure the computer has at least 512 MB of RAM and 1 GB of unused disk space. 2 Insert the Mac OS X Server Admin Tools CD. 3 Open the Installer folder. 4 Start the installer (ServerAdministrationSoftware.mpkg) and follow the onscreen instructions. Using a Non-Mac OS X Computer for Administration You can use a non-Mac OS X computer that offers SSH support, such as a UNIX workstation, to administer Mac OS X Server using command-line tools. For more information, see Command-Line Administration. You can also use any computer which can run a VNC viewer to administer Mac OS X Server. Administering the server via VNC is the same as using the server’s keyboard, mouse, and monitor locally. Mac OS X Servers Mac OS X administrator computer138 Chapter 7 Management You enable a VNC server on the Mac OS X Server by enabling Screen Sharing in the Sharing pane of System Preferences. Using the Administration Tools Information about administration tools can be found on the pages indicated in the following table. You use Server Admin to administer services on one or more Mac OS X Server computers. Server Admin also lets you specify settings that support multiple services, such as creating and managing SSL certificates and specifying which users and groups can access services. Opening and Authenticating in Server Admin Server Admin is installed in /Applications/Server/. You can open it in the Finder, or you can open it by clicking the Server Admin icon in the Dock, or by clicking the Admin button on the Workgroup Manager toolbar. Use this application or tool To See Installer Install server software or upgrade it from v10.2 or 10.3. page 77 Server Assistant Set up a v10.5 server. page 110 Workgroup Manager Administer accounts and their managed preferences.. page 150 Server Admin Configure and monitor services and administrator access, and configure share points. Set up and manage QuickTime media streaming. page 141 page 39 System image tools Manage NetBoot and NetInstall disk images. page 48 Server Monitor Monitor Xserve hardware. page 172 QTSS Publisher Manage media and prepare it for streaming or progressive download. page 49 Apple Remote Desktop (optional) Monitor and control other Macintosh computers. page 49 Command-line tools Administer a server using a UNIX command shell. page 49 Xgrid Admin Monitor local or remote Xgrid controllers, grids, and jobs. page 50Chapter 7 Management 139 To select a server to work with, enter its IP address or DNS name in the login dialog box, or click Browse to choose from a list of servers. Specify the user name and password for a server administrator, then click Connect. Adding and Removing Servers in Server Admin The servers you can administer using Server Admin appear in the Servers list on the left side of the application window. You can add a server to the Servers list and log in to it in two ways:  Click the Add (+) button in the bottom action bar and choose Add Server.  Choose Server > Add Server from the menu bar. The next time you open Server Admin, any server you’ve added is displayed in the list. To change the order of servers in the list, drag a server to the new location in the list. You can remove a server from the Servers list in a similar fashion. First you select the server to remove, then you do one of the following:  Click the Perform Action button in the bottom action bar and choose Disconnect then Remove Server.  Choose Server > Disconnect, and then choose Server > Remove Server from the menu bar.140 Chapter 7 Management If a server in the Servers list appears gray, double-click the server or click the Connect button in the toolbar to log in again. Select the “Remember this password in my keychain” option while you log in to enable auto-reconnect the next time you open Server Admin. Grouping Servers Manually Server Admin displays computers in groups in the Server List section of the application’s window. The default server list is called the All Servers list. This is a list of all possible administered computers that you have added and authenticated to. You can create other groups to organize the computers on your network in any way you wish. Server groups have the following capabilities:  You can create as many lists as you want.  Servers can appear in more than one list.  Groups can be made in any organization scheme you can imagine: geographic, functional, hardware configuration, even color.  You can click a group name to see a status overview of all servers in the group. You can make more specific, targeted groups of servers from your All Servers list. First, you can create blank lists and then add servers to them later from the All Servers list. To create a server group: 1 Click the Add (+) button under the Server list at the bottom of the Server Admin window. 2 Select Add Group, and name the group. You can rename groups by clicking the group and letting the mouse hover over the name for a few seconds. the name should become editable. 3 Drag the servers from the All Servers group to the newly created group. Grouping Servers Using Smart Groups Server Admin displays computers in groups in the Server List section of the application’s window. The default server list is called the All Servers list. This is a list of all possible administered computers that you have added and authenticated to.You can create a server list that automatically populates based on custom criteria. After you create a smart group, any server added to the All Server list (or other specified list) that matches the criteria is dynamically added to the smart group. You can match any or all of the following criteria:  Visible services  Running servicesChapter 7 Management 141  Network throughput  CPU utilization  IP address  OS version To create a server smart group: 1 Click the Add (+) button under the Server list at the bottom of the Server Admin window. 2 Select Add Smart Group. 3 Name the smart group. 4 Define the criteria by which servers will appear in the list, and click OK. The group will appear in the Server list. Working With Settings for a Specific Server To work with general server settings, select a server in the Servers list. You then have a number of buttons in the toolbar that show configuration options or tabs of configuration options. The following shows the Settings pane for a server:142 Chapter 7 Management The following table contains a summary of what you find for each button: When you click Settings, you have access to the following panes:  General pane: Click General to work with the server serial number or to enable SNMP, NTP, SSH, Remote Management, and server side mobile home sync feature support. SNMP is the abbreviation for Simple Network Management Protocol, a standard that facilitates computer monitoring and management. The server uses the open source net-snmp project for its SNMP implementation. Although none of the server administration tools use or require SNMP, enabling it lets the server be monitored and managed from third-party SNMP software such as HP OpenView. Use the NTP (Network Time Protocol) checkbox to enable NTP service. For information about NTP, see Network Services Administration. SSH is the abbreviation for Secure Shell. The server uses the open source OpenSSH project for its SSH implementation. When you enable SSH, you can use commandline tools to remotely administer the server. SSH is also used for other remote server administration tasks, such as initial server setup, Sharing management, and displaying file system paths and the contents of folders in the server administration tools. SSH must be enabled while creating an Open Directory replica, but it can be disabled afterwards. Remote Management allows the server to be administered by Apple Remote Desktop. You enable and disable Apple Remote Desktop administration in this pane instead of the Sharing pane of System Preferences. Server side file tracking for mobile home sync is a feature of mobile home folders. See User Management for information about when to enable this feature.  Network pane: Click Network to view or change the server’s computer name or local hostname, or see a list of network interfaces for this server and their addressing information. The computer name is what a user sees when browsing the network (/Network). The local hostname is usually derived from the computer name, but can be changed. Toolbar button Shows Overview Information about the server’s hardware, software, services, and status Logs The system log and security systems log Graphs A pictorial history of server activity Sharing Configuration options for defining file sharing folders, share points, and automounts Server Updates Software updates available from Apple to update the server’s software Certificates The server’s security certificates Settings The server’s network settings, server software serial number, service access controls, and other information.Chapter 7 Management 143 The network interfaces table shows the name of the interface, the type of addressing (IPv4, or IPv6), the IP address, and the DNS name found by reverse lookup for the address.  Date & Time pane: Click Date & Time to set the server’s date and time, NTP source preference, and time zone. More information about NTP can be found in Network Services Administration.  Notifications pane: Click Notifications to configure Mac OS X Server’s automatic event notifications. You set the email address and notification trigger in this pane. More detailed information about notifications, see “Notification in Server Admin” on page 175.  Access pane: Click Access to control user access to some services and to designate administration privileges for users. When you select the Services tab, you set up access to services to users and groups (service ACLs). You can set up the same access to all services, or you can select a service and customize its access settings. Access controls are simple. Choose between letting all users and groups use services or letting only selected users and groups use services. When you select the Administrators tab, you designate users to have administration or monitoring privileges for the services on the server. For more detailed information about these settings, see “Defining Administrative Permissions” on page 149.  Services pane: Click Services to show or hide services in Server Admin for this server. Changing the IP Address of a Server You can change the IP address of a server using the Network pane of System Preferences or the networksetup tool. When a network address change is detected, no matter how the change happened, changeip is invoked. The tool changeip goes through all configuration files and places where the Server’s IP address is stored, and changes the address to conform to the new address. The server’s IP address can be changed without changeip being invoked from the command-line.144 Chapter 7 Management Changing the Server’s Host Name After Setup When you perform an initial server setup for new installations, Server Assistant sets the host name value by assigning AUTOMATIC to the hostname parameter in /etc/ hostname. This setting causes the server’s host name to be the first name that’s true in this list:  The name provided by the DHCP or BootP server for the primary IP address  The first name returned by a reverse DNS (address-to-name) query for the primary IP address  The local hostname  The name “localhost” After initial setup, if you want to change the host name, don’t use the System Preferences Sharing pane to modify the server’s computer name; use the changeip command-line tool. For details, see Command-Line Administration or the man page for changeip. Changing Server Configuration Type If you have previously installed a standard or workgroup configuration server, you can change the server type to an advanced configuration server. All of the settings previously set with System Preferences are retained in the new configuration. No automatic provisioning of user’s services will occur again. The Server Preferences firewall is separate from the Server Admin firewall, and converting to advanced configuration server will disable the Server Preferences firewall. You will need to enable and configure the firewall accessed through Server Admin. From the time of the conversion, you use Server Admin and the other related tools to administer your server. System Preferences cannot be used; this is a one-way, one-time conversion. To change your server configuration: 1 Set up an administration computer, which has Server Admin, Workgroup Manager, and other administrative tools installed. For specific instructions, see “Setting Up an Administrator Computer” on page 137. 2 Launch Server Admin and log in to the switching server. For detailed instructions on logging in, see “Opening and Authenticating in Server Admin” on page 138. A dialog sheet will appear, asking if you intend to convert the server configuration mode to Advanced. 3 Click “Convert to Advanced.” The server is now no longer in standard or workgroup configuration mode.Chapter 7 Management 145 Administering Services To work with a particular service on a server selected in the Servers list of Server Admin, click the service in the list under the server. You can view information about a service (logs, graphs, and so forth) and manage its settings. The following is a sample service configuration pane in Server Admin. To start or stop a service, select it and then click Start or Stop in the bottom action bar. Adding and Removing Services in Server Admin Server Admin can only show you the services you are administering, hiding all other service configuration panes until needed. Before you can administer a service, it must be enabled for the specific server; then that service appears under the server name in the main Server list. To add or remove a service in Server Admin: 1 Select the server that will host the desired service. 2 Click the Settings button in the toolbar. 3 Click Services. 4 Select the desired service, and click Save. The service now appears in the list, ready for configuration.146 Chapter 7 Management Importing and Exporting Service Settings To copy service settings from one server to another or to save service settings in a property-list file for reuse later, use the Export Service Settings command in Server Admin. To export settings: 1 Select the desired server. 2 Choose Server > Export > Service Settings from the menu bar. 3 Select the services whose settings you want to copy. 4 Click Save. The file that was created contains all service configuration information as a plist XML document. To import settings: 1 Select the target server to receive the settings. 2 Choose Server > Import > Service Settings from the menu bar. 3 Find and select the saved service file. The only file you can use with this function is a properly formatted XML-based plist file, like the one generated from the settings export. 4 Click Open. Controlling Access to Services You can use Server Admin to configure which users and groups can use services hosted by a server. You set up access to services to users and groups (SACLs). You can set up the same access to all services, or you can select a service and customize its access settings. Access controls are simple. Choose between allowing all users and groups use services or allowing only selected users and groups use services.Chapter 7 Management 147 The following shows the Service Access Control List pane in Server Admin: Select a server in the Servers list, click Settings, click Access, then click Services. You can separately specify access controls for individual services, or you can define one set of controls that applies for all services that the server hosts. Using SSL for Remote Server Administration You can control the level of security of communications between Server Admin and remote servers by choosing Server Admin > Preferences. By default, Server Admin treats all communications with remote servers as encrypted using SSL. This uses a self-signed 128-bit certificate installed in /etc/servermgrd/ssl.crt when you install the server. Communications use HTTPS (port 311). If this option isn’t possible, HTTP (port 687) is used and clear text is sent between Server Admin and the remote server. If you want a greater level of security, also select “Require valid digital signature (SSL).” By default, “Require valid digital signature (SSL)” is disabled. This option uses an SSL certificate installed on a remote server to ensure that the remote server is a valid server. 148 Chapter 7 Management Before enabling this option, use the instructions in “Requesting a Certificate From a Certificate Authority” for generating a Certificate Signing Request (CSR), obtaining an SSL certificate from an issuing authority, and installing the certificate on each remote server. Instead of placing files in /etc/httpd/, place them in /etc/servermgrd/. You can also generate a self-signed certificate and install it on the remote server. You can use Server Admin to set up and manage self-signed or -issued SSL certificates used by mail, web, Open Directory, and other services that support them. “Certificate Manager in Server Admin” on page 62 provides instructions for using Server Admin to create, organize, and use security certificates for SSL-enabled services. Individual service administration guides describe how to configure specific services to use SSL. If you’re interested in higher levels of SSL authentication, see the information at www.modssl.org. Managing Sharing To work with share points and access control lists, click the File Sharing icon in the Server Admin toolbar. Learn more in File Services Administration. The following is the File Sharing configuration pane in Server Admin.Chapter 7 Management 149 Tiered Administration Permissions In previous releases of Mac OS X Server, there were two classes of users: admin and everyone else. Admin users could make any change to the settings of any service or change any directory data as well as passwords and password policies. In Mac OS X Server v10.5, you can now grant individuals and groups certain administrative permissions, without adding them to the UNIX “admin” group (in other words, you can make them administrator users). There are two levels of permissions:  Administer: This level of permission is analogous to being in the UNIX admin group. You can change any setting on the server for the designated server and service only.  Monitor: This level of permission allows you to view Overview panes, Log panes, and other information panes in Server Admin, as well as general server status data in server status lists. You do not have access to any saved service settings. Any user or group can be given these permissions for either all services or for only selected services. The permissions are stored on a per-server basis. The only users that can change the tiered administration access list are users that are truly in the UNIX admin group. The Server Admin application will update to reflect what operations are possible for a user’s permissions. For example, some services are hidden or the Settings pane is dimmed when you can only monitor that service. Because the feature is enforced on the server side, the permissions also impact the usage of serveradmin, dscl, dsimport, and pwpolicy command-line tools because all of these tools are limited to the permissions configured for the administrator in use. Defining Administrative Permissions You can decide if a user or group can monitor or administer a server or service without giving them the full power of a UNIX administrative user. Assigning effective permissions to users creates a tiered administration, where some but not all administrative duties can be carried out by designated individuals. To assign permissions: 1 Open Server Admin. 2 Select a server, click the Settings button in the toolbar, and then click the Access tab. 3 Click the Administrators tab. 4 Select whether to define administrative permissions for all services on the server or for select services.150 Chapter 7 Management 5 If you choose to define permissions by service, select the appropriate checkbox for each service you want to turn on. If you define permissions by service, be sure to assign administrators to all the active services on the server. 6 Click the Add (+) button to add a user or group from the users and group window. To remove administrative permissions, select a user or group and click the Remove (-) button. 7 For each user or group, select the permissions level next to the user or group name. You can choose Monitor or Administer. The capabilities of Server Admin to administer the server are limited by this setting, when the server is added to the Server list. Workgroup Manager Basics You use Workgroup Manager to administer the following accounts: user accounts, group accounts, and computer lists. You also use it to set preferences for Mac OS X user accounts, group accounts, computers, and access the Inspector, an advanced feature that lets you do raw editing of Open Directory entries. The following topics describe general Workgroup Manager usage. Instructions for conducting specific administration tasks are available in Workgroup Manager help and in several guides:  User Management tells you how to use Workgroup Manager for managing user accounts, group accounts, computer lists, preferences, and how to import and export accounts.  File Services Administration explains how to use Sharing in Workgroup Manager to manage share points.  Open Directory Administration provides information about using the Inspector.Chapter 7 Management 151 Opening and Authenticating in Workgroup Manager Workgroup Manager is installed in /Applications/Server/, you can open it in the Finder, the Dock, or you can open Workgroup Manager by selcting View > Workgroup Manager in the menu bar of Server Admin:  When you open Workgroup Manager on the server you’re using without authenticating, you have read-only access to information displayed in the local domain. To make changes, click the lock icon to authenticate as a server administrator. This approach is most useful when you’re administering various servers and working with several directory domains.  To authenticate as an administrator for a server, local or remote, enter the server’s IP address or DNS name in the login dialog box, or click the directory path area of the Workgroup Manager window to choose another directory server. Specify the user name and password for an administrator of the server, then click Connect. Use this approach when you’ll be working most of the time with a particular server. After opening Workgroup Manager, you can open a Workgroup Manager window for a different computer by clicking New Window in the toolbar or choosing Server > Connect. Important: When you connect to a server in Workgroup Manager, make sure the long or short user name you specify matches the capitalization in the user account. Administering Accounts User accounts and group memberships are not administered in Server Admin. You need to use Workgroup Manager to add and remove users and groups. For information about account administration, see User Management. What follows is a brief synopsis of account administration using Workgroup Manager. Do not use this section as your only source of information about accounts. Working with Users and Groups After you log in to Workgroup Manager, the account window appears, showing a list of user accounts. Initially, accounts listed are those stored in the last directory node of the server’s search path. When you use other Workgroup Manager windows, such as Preferences, click Accounts in the toolbar to return to the account window.152 Chapter 7 Management The following is a sample user record configuration pane in Workgroup Manager: To specify the directories that store accounts you want to work with, click the small globe icon. To work with different accounts in different Workgroup Manager windows, click New Window in the toolbar. To administer the accounts listed, click the Users, Groups, or Computers, or Computer Groups button on the left side of the window. You can filter the accounts listed by using the pop-up search list above the accounts list. To refresh the accounts list, click the Refresh button in the toolbar. To simplify defining an account’s initial attributes when you create the account, use presets. A preset is an account template. To create a preset, select an account, set up all the values the way you want them, then choose Save Preset from the Presets pop-up menu at the bottom of the window. To work with only accounts that meet specific criteria, click Search in the toolbar. The Search features include the option for batch editing selected accounts. To import or export accounts, select the accounts, then choose Server > Import or Server > Export, respectively. Defining Managed Preferences To work with managed preferences for user accounts, group accounts, or computer lists, click the Preferences icon in the Workgroup Manager toolbar.Chapter 7 Management 153 The following is the User Preference Management Overview pane in Workgroup Manager: Click Details to use the preference editor to work with preference manifests. The following is a sample of the preference editor sheet in Workgroup Manager:154 Chapter 7 Management Working with Directory Data To work with raw directory data, use Workgroup Manager’s Inspector. The following is the record Inspector pane in Workgroup Manager: To display the inspector: 1 Choose Workgroup Manager > Preferences. 2 Enable “Show “All Records” tab and inspector” and click OK. 3 Select the “All records” button (which looks like a bull’s-eye) to access the Inspector. 4 Use the pop-up menu above the Name list to select the records of interest. For example, you can work with users, groups, computers, share points, and many other directory objects. Customizing the Workgroup Manager Environment There are several ways to tailor the Workgroup Manager environment:  You can control the way Workgroup Manager lists accounts and other behaviors by choosing Workgroup Manager > Preferences.  To customize the toolbar, choose View > Customize Toolbar.  To include predefined users and groups in the user and group lists, choose View > Show System Users and Groups.  To open Server Admin so you can monitor and work with services on particular servers, click the Server Admin icon in the toolbar. Chapter 7 Management 155 Working With Pre-Version 10.5 Computers From Version 10.5 Servers Mac OS X Server v10.4 servers can be administered using v10.5 server administration tools. Workgroup Manager on a v10.5 server can be used to manage Mac OS X clients running Mac OS X v10.3 or later. After you edit a user record using Workgroup Manager on v10.5, it can be accessed only by using Workgroup Manager on v10.5. Preferences of Mac OS 9 clients can be managed from a v10.5 server using Macintosh Manager only when you perform an upgrade of v10.5. You can use an upgrade to install v10.5 on a v10.3.9 or 10.2.8 server. Service Configuration Assistants Server Admin has configuration assistants to guide you through setting up services that require more setup than a single configuration pane. The assistants present you with all configuration panes necessary to fully enable a service. Assistants are available for the following services:  Gateway Setup: This assistant helps you set up your server as a network gateway. Launch the assistant using a button in the lower right side of NAT service’s Overview page.  Mail: This assistant helps you set up both incoming and outgoing email service. Launch the assistant using a button in the lower right side of Mail service’s Overview page.  RADIUS: This assistant helps you set up RADIUS authentication for Apple Airport wireless access points. Launch the assistant using a button in the lower right side of RADIUS service’s Overview page.  Xgrid: This assistant helps you set up Xgrid controllers. Launch the assistant using a button in the lower right side of Xgrid service’s Overview page. Critical Configuration and Data Files When backing up system settings and data, take special care to make sure all your critical configuration files are backed up. The nature and frequency of your backups depend on your organization’s backup, archive and restore policies. For more information about creating a backup and restore policy, see “Defining Backup and Restore Policies” on page 32. The following is a list of configuration and data files for services available on Mac OS X Server.156 Chapter 7 Management General iCal Service iChat Server Notifications QuickTime Streaming Server Firewall Service File type Location Service states /System/Library/LaunchDaemons/* SSH configuration files and host’s public / private keys /etc/ssh/* System keychain /Library/Keychains/System.keychain File type Location Configuration files /etc/caldavd/caldavd.plist Data /Library/CalendarServer/Documents/ File type Location Configuration files /etc/jabberd/* Data mysqldump jabberd2 > jabberd2.backup.sql File type Location Configuration files /etc/emond.d/ /etc/emond.d/rules/ /Library/Keychains/System.keychain File type Location Configuration files /Library/QuickTimeStreamingServer/Config/* /Library/QuickTimeStreamingServer/Playlists/* /Library/Application Support/Apple/QTSS Publisher/* Data: (default locations) /Library/QuickTimeStreamingServer/Movies/* ~user/Sites/Streaming/* File type Location Configuration files /etc/ipfilter/*Chapter 7 Management 157 NAT Service Mail Services The following are the configuration files and data stores for mail services. Mail—SMTP Server Postfix Mail—POP/IMAP Server Cyrus Custom locations are defined in /etc/impad.conf using the following keys with default values: Mail—Amavisd Mail—Clam AV File type Location Configuration files /etc/nat/* File type Location Configuration files /etc/postfix/ Data: (default locations) /var/spool/postfix/ File type Location Configuration files /etc/imapd.conf /etc/cyrus.conf Data: (mail database default location) /var/imap (mail data store) /var/spool/imap Custom locations Key: Value pair Mail database location configdirectory: /var/imap Mail data store location partition-default: /var/spool/imap Additional data store partitions (no default value) partition-xxx: /var/spool/mail_xxx There can be multiple additional data store partitions File type Location Configuration files /etc/amavisd.conf Data: (default locations) /var/amavis/ File type Location Configuration files /etc/clamav.conf /etc/freshclam.conf158 Chapter 7 Management Mail—Mailman Mail—SpamAssassin MySQL Service PHP Web Service Data: (default locations) /var/clamav/ /var/virusmails/ File type Location File type Location Configuration files /var/mailman/ Data: (default locations) /var/mailman/ File type Location Configuration files /etc/mail/spamassassin/local.cf Data: (default locations) /etc/mail/spamassassin/ File type Location Configuration files There is no config file for MySQL, but the administrator can create one, which should be backed up if present: /etc/my.cnf Data: (default locations) /var/mysql/ mysqldump --all-databases > all.sql File type Location Configuration files There is no config file for PHP, but the administrator can create one (copying /etc/php.ini.default to /etc/php.ini and modifying it), which should be backed up if present: /etc/php.ini Data: (default locations) as designated by administrator File type Location Configuration files /etc/httpd/* (for Apache 1.3) /etc/apache2/* (for Apache 2.2) /etc/webperfcache/* /Library/Keychains/System.keychain Data: (default locations) /Library/WebServer/Documents/Chapter 7 Management 159 The default location for web content is configurable and is most likely modified and extended to include multiple virtual host content and WebDAV directories. Note: Log files for web service are a critical source of revenue for some sites and should be considered for backup. The location is configurable and can be determined using Server Admin. Wiki and Blog Server Improving Service Availability Eliminating single points of failure and using Xserve and hardware RAID are some of the things that can boost your server availability. Other things you can do range from simple solutions like using power backup, automatic reboot, and ensuring proper operational conditions (for example, adequate temperature and humidity levels) to more advanced solutions involving link aggregation, load balancing, Open Directory replication, and data backup. Eliminating Single Points of Failure To improve the availability of your server, reduce or eliminate single points of failure. A single point of failure is any component in your server environment that, if it fails, causes your server to fail. Some single points of failure include:  Computer system  Hard disk  Power supply /Library/Logs/WebServer/* /Library/Logs/Migration/webconfigmigrator.log (Apache config migration log) File type Location File type Location Configuration files /etc/wikid/* /Library/Application Support/Apple/WikiServer (wiki themes and template files) Data: (default locations) /Library/Collaboration/ Log files: (default location) /Library/Logs/wikid/*160 Chapter 7 Management Although it is almost impossible to eliminate all single points of failure, you should minimize them as much as possible. For example, using a backup system and the IP failover in Mac OS X Server eliminates the computer as a single point of failure. Although both the master and backup computers can fail at once or one after the other, the possibility of such an event happening is negligible. Another way to prevent a computer from failing is to use a backup power source and take advantage of hardware RAID to mirror the hard disk. With hardware RAID, if the main disk fails, the system can still access the same data on the mirror drive, as is the case with Xserve. Using Xserve for High Availability Xserve is designed for extra reliability and hence, high availability. Although you can use desktop systems like the Power Mac G5 or Mac Pro to provide Mac OS X Server services very reliably, Xserve has the following additional features that make it ideal for high availability situations.  Xserve has eight fans. In the case of a single fan failure, the other fans speed up to compensate, allowing your server to keep running.  An independent drive architecture isolates the drives electrically, preventing a single drive failure from causing unavailability or performance degradation of the surviving drives—a common problem with multidrive SCSI implementations.  Xserve uses Error Correction Code (ECC) logic to protect the system from corrupt data and transmission errors. Each DIMM has an extra memory module that stores checksum data for every transaction. The system controller uses this ECC data to identify single-bit errors and corrects them on the fly, preventing unplanned system shutdowns. In the rare event of multiple-bit errors, the system controller detects the error and triggers a system notification to prevent bad data from corrupting further operations. You can set the Server Monitor software to alert you if error rates exceed the defined threshold.  Xserve has built-in hardware RAID mirroring, which protects your server from failing if the main drive fails. For more information about Xserve, visit www.apple.com/xserve/. Using Backup Power In the architecture of a server solution, power is a single point of failure. If power goes out, your servers go down without warning. To prevent a sudden disruption in services, consider adding a backup source of power.Chapter 7 Management 161 Depending on your application, you might choose to use a standby electrical generator or Uninterruptible Power Supply (UPS) devices to gain enough time to notify users of an impending shutdown of services. Using UPS with Xserve Xserve does not provide serial port connectivity to UPS, but it can monitor UPS power through the network if the UPS unit has a management network card. For more information, check with UPS vendors. The following illustration is an example of an Xserve connected to a UPS via a network: Setting Up Your Server for Automatic Reboot You can set up Energy Saver options on your Mac OS X Server computer to automatically restart if it goes down due to a power failure or system freeze. The following is the Energy Saver panel of System Preferences: Xserve UPS device Power source Backup power connection Local network162 Chapter 7 Management The automatic reboot options are:  Restart automatically after a power failure. The power management unit automatically starts up the server after a power failure.  Restart automatically if the computer freezes. The power management unit automatically starts up the server after the server stops responding, has a kernel panic, or freezes. When you select the option to restart after a freeze, Mac OS X Server spawns the wdticklerd daemon, which every 30 seconds commands your computer to reboot after 5 minutes. Each time the command is sent, the restart timer is reset. Thus, the timer won’t reach 5 minutes as long as the server is running. If the computer does freeze, the power management unit will restart it after 5 minutes. To enable automatic reboot: 1 Log in to the server as an administrator. 2 Open System Preferences and click Energy Saver. 3 Click Options. 4 Under Other Options, select restart options. 5 Close System Preferences. Ensuring Proper Operational Conditions One factor that can cause your servers to malfunction is overheating. This is especially a problem when you cluster computers in a small space. Other factors such as humidity and power surges can also adversely impact your server. To protect your servers, make sure you house them in a place where you can control these factors and provide ideal operating conditions. Check the electrical and environmental requirements for your systems to find what these conditions are. In addition, make sure the facility you deploy your server has a fire alarm, and prepare a contingency plan to deal with this risk. Providing Open Directory Replication If you plan to provide Open Directory services, consider creating replicas of your Open Directory master. If the master server fails, client computers can access the replica. For more information, see the section on setting up Open Directory replicas in Open Directory Administration.Chapter 7 Management 163 Link Aggregation Although not common, the failure of a switch, cable, or network interface card can cause your server to become unavailable. To eliminate these single points of failure, you can use link aggregation or trunking. This technology, also known as IEEE 802.3ad, is built into Mac OS X and Mac OS X Server. Link aggregation allows you to aggregate or combine multiple physical links connecting your Mac to a link aggregation device (a switch or another Mac) into a single logical link. The result is a fault-tolerant link with a bandwidth equal to the sum of the bandwidths of the physical links. For example, you can set up an Xserve with four 1-Gbit/s ports (en1, en2, en3, and en4) and use the Network pane of System Preferences to create a link aggregate port configuration (bond0) that combines en1, en2, en3, and en4 into one logical link. The resulting logical link will have a bandwidth of 4 Gbit/s. This link will also provide fault tolerance. If one or more physical links fail, your Xserve’s bandwidth will shrink, but the Xserve can still service requests as long as not all physical links fail at once. The following illustration shows four Ethernet ports aggregated as a single interface: Link aggregation also allows you to take advantage of existing or inexpensive hardware to increase the bandwidth of your server. For example, you can form a link aggregate from a combination of multiple 100-Mbit/s links or 1-Gbit/s links. server1.example.com 400 Mbit/s 4 x 100 Mbit/s bond0 en1 en2 en3 en4 Switch164 Chapter 7 Management The Link Aggregation Control Protocol (LACP) IEEE 802.3ad Link Aggregation defines a protocol called Link Aggregation Control Protocol (LACP) that is used by Mac OS X Server to aggregate (combine) multiple ports into a link aggregate (a virtual port) that can be used for TCP and UDP connections. When your define a link aggregate, the nodes on each side of the aggregate (for example, a computer and a switch) use LACP over each physical link to:  Determine whether the link can be aggregated  Maintain and monitor the aggregation If a node doesn’t receive LACP packets from its peer (the other node in the aggregate) regularly, it assumes that the peer is no longer active and removes the port from the aggregate. In addition to LACP, Mac OS X Server uses a frame distribution algorithm to map a conversation to a particular port. This algorithm sends packets to the system on the other end of the aggregate only if it has packet reception enabled. In other words, the algorithm won’t send packets if the other system isn’t listening. Mapping a conversation to a particular port guarantees that packet reordering will not occur. Link Aggregation Scenarios Following are three common aggregation scenarios that you can set up:  Computer-to-computer  Computer-to-switch  Computer-to-switch-pair These scenarios are described in the following sections. Computer-to-Computer In this scenario, you connect the two servers directly (as shown in the following illustration) using the physical links of the link aggregate. This allows the two servers to communicate at a higher speed without the need for a switch. This configuration is ideal for ensuring back-end redundancy. 4 x 100 Mbit/sChapter 7 Management 165 Computer-to-Switch In this scenario shown in the following illustration, you connect your server to a switch configured for 802.3ad link aggregation. The switch should have a bandwidth for handling incoming traffic equal to or greater than that of the link aggregate (logical link) you define on your server. For example, if you create an aggregate of four 1-Gbit/s links, you should use a switch that can handle incoming traffic (from clients) at 4 Gbit/s or more. Otherwise, the increased bandwidth advantage in the link aggregate won’t be fully realized. Note: For information about how to configure your switch for 802.3ad link aggregation, see the documentation provided by the switch manufacturer. Computer-to-Switch-Pair In this scenario shown in the following illustration, you improve on the computer-toswitch scenario by using two switches to eliminate the switch as a single point to failure: server1.example.com Clients 4 x 1 Gbit/s 10 Gbit/s server1.example.com 3 x 1 Gbit/s 2 x 1 Gbit/s166 Chapter 7 Management For example, you can connect two links of the link aggregate to the master switch and the remaining links to the backup switch. As long as the master switch is active, the backup switch remains inactive. If the master switch fails, the backup switch takes over transparently to the user. Although this scenario adds redundancy that protects the server from becoming unavailable if the switch fails, it results in decreased bandwidth. Setting Up Link Aggregation in Mac OS X Server To set up your Mac OS X Server for link aggregation, you need a Mac with two or more IEEE 802.3ad-compliant Ethernet ports. In addition, you need at least one IEEE 802.3adcompliant switch or another Mac OS X Server computer with the same number of ports. You create a link aggregate on your computer in the Network pane of System Preferences (as shown in the following example): To create a link aggregate: 1 Log in to the server as an administrative user. 2 Open System Preferences. 3 Click Network. 4 Click the Gear button and choose Manage Virtual Interfaces in the pop-up menu. 5 Click the Add (+) button, and select New Link Aggregate in the pop-up menu. Note: You’ll only see this option if you have two or more Ethernet interfaces on your system. 6 Enter the name of the link aggregate in the Name field.Chapter 7 Management 167 7 Select the ports to aggregate from the list. 8 Click Create. 9 Click Done. By default the system gives the link aggregate the interface name bond, where is a number indicating precedence. For example, the first link aggregate is named bond0, the second bond1, and the third bond2. The interface name bond assigned by the system is different from the name you give to the link aggregate port configuration. The interface name is for use in the command-line, but the port configuration name is for use in the Network pane of System Preferences. For example, if you enter the command ifconfig -a, the output refers to the link aggregate using the interface name and not the port configuration name: … bond0: flags=8843 mtu 1500 inet6 fe80::2e0:edff:fe08:3ea6 prefixlen 64 scopeid 0xc inet 10.0.0.12 netmask 0xffffff00 broadcast 10.0.0.255 ether 00:e0:ed:08:3e:a6 media: autoselect (100baseTX ) status: active supported media: autoselect bond interfaces: en1 en2 en3 en4 You do not delete or remove a link bond from the Network Pane of System Preferences. You remove the bond through the Manage Viritual Interfaces sheet used to create the bond. Monitoring Link Aggregation Status You can monitor the status of a link aggregate in Mac OS X and Mac OS X Server using the Status pane of the Network pane of System Preferences. To monitor the status of a link aggregate: 1 Open System Preferences. 2 Click Network. 3 From the list of network interfaces on the left, choose the link aggregate port virtual interface. 4 Click Advanced in the lower right side of thre window. 5 Select the Bond Status tab. The Status pane displays a list containing a row for each physical link in the link aggregate. For each link, you can view the name of the network interface, its speed, its duplex setting, the status indicators for incoming and outgoing traffic, and an overall assessment of the status.168 Chapter 7 Management Note: The Sending and Receiving status indicators are color-coded. Green means the link is active (turned on) and connected. Yellow means the link is active but not connected. Red means the link can’t send or receive traffic. 6 To view more information about a link, click the corresponding entry in the list. Load Balancing One factor that can cause services to become unavailable is server overload. A server has limited resources and can service a limited number of requests simultaneously. If the server gets overloaded, it slows down and can eventually crash. One way to overcome this problem is to distribute the load among a group of servers (a server farm) using a third-party load-balancing device. Clients send requests to the device, which then forwards the request to the first available server based on a predefined algorithm. The clients see only a single virtual address, that of the loadbalancing device. Many load-balancing devices also function as switches (as shown in the following illustration), providing two functions in one, which reduces the amount of hardware you need to use. Note: A load-balancing device must be able to handle the aggregate (combined) traffic of the servers connected to it. Otherwise, the device becomes a bottleneck, which reduces the availability of your servers. Server farm Clients Server loadbalancing switchChapter 7 Management 169 Load balancing provides several advantages:  High availability. Distributing the load among multiple servers helps you reduce the chances that a server will fail due to server overload.  Fault tolerance. If a server fails, traffic is transparently redirected to other servers. There might be a brief disruption of service if, for example, a server fails while a user is downloading a file from shared storage, but the user can reconnect and restart the file download process.  Scalability. If demand for your services increases, you can transparently add more servers to your farm to keep up with the demand.  Better performance. By sending requests to the least-busy servers, you can respond faster to user requests. Daemon Overview By the time a user logs in to a Mac OS X system, a number of processes are already running. Many of these processes are known as daemons. A daemon is a background process that provides a service to users of the system. For example, the cupsd daemon coordinates printing requests, and the httpd daemon responds to requests for web pages. Viewing Running Daemons If you want to see the daemons running on your system, use the Activity Monitor application (in /Applications/Utilities/). This application lets you view information about all processes, including their resource usage. You will see the following daemons, regardless of what services are enabled:  launchd (timed job and watchdog process)  servermgrd (administration tool interface process)  serialnumberd (license compliance process)  mDNSresponder (local network service discovery process) Daemon Control Although some UNIX-like systems use other tools, Mac OS X Server uses a daemon called launchd to control process initialization and timed jobs. launchd The launchd daemon is an alternative to the following common UNIX tools: init, rc, the init.d and rc.d scripts, SystemStarter, inetd and xinetd, atd, crond and watchdogd. All of these services should be considered deprecated and administrators are strongly encouraged to move process management duties to launchd. There are two utilities in the launchd system: launchd daemon and launchctl utility.170 Chapter 7 Management The launchd daemon also has replaced init as the first process spawned in Mac OS X and is therefore responsible for starting the system at startup. The launchd daemon manages the daemons at both a system and user level. It can:  Start daemons on demand  Monitor daemons to make sure they keep running Configuration files are used by launchd to define the parameters of services and daemons run. The configuration files are property list files stored in the LaunchAgents and LaunchDaemons subdirectories of the Library folders. For more information about creating the launchd configuration files, see the following Developer Documentation page: developer.apple.com/documentation/MacOSX/Conceptual/BPSystemStartup/Articles/ LaunchOnDemandDaemons.html The launchctl utility is the command-line tool used to:  Load and unload daemons  Start and stop launchd controlled jobs  Get system utilization statistics for launchd and its child processes  Set environment settings8 171 8 Monitoring Effective monitoring allows you to detect potential problems before they occur and gives you early warning when they occur. Detecting potential problems allows you to take steps to resolve them before they impact the availability of your servers. In addition, getting early warning when a problem occurs allows you to take corrective action quickly and minimize disruption to your services. This chapter briefly describes planning a monitoring policy, how to use monitoring tools, and how to find more information. Planning a Monitoring Policy Gathering data about your systems is a basic function of good administration. Different types of data gathering are used for different purposes.  Historical data collection: Historical data is gathered for analysis. This could be used for IT planning, budgeting, and getting a baseline for normal server conditions and operations. What kinds of data do you need for these purposes? How long does it need to be kept? How often does it need to be updated? How far in the past does it need to be collected?  Real-time monitoring: Real-time monitoring is for alerts and detecting problems as they happen. What are you monitoring? How often? Does that data tell you what you need to know? Are some of these real-time collections actually for historical purposes?172 Chapter 8 Monitoring Planning Monitoring Response The response to your monitoring is as important as the data collection. In the same way a backup policy is pointless without a restore strategy, a monitoring policy makes little sense without a response policy. Several factors can be considered for a monitoring response:  What are appropriate response methods? In other words, how will the response take place?  What is the time to response? What is an acceptable interval between failure and response?  What are the scaling considerations? Can the response plan work with all expected (and even unexpected) frequencies of failure?  Are there testing monitoring systems in place? How do you know the monitoring policy is catching the data you need, and how do you know the responses are timely and appropriate? Have you tested the monitoring system recently? Server Status Widget The Server Status Dashboard widget is provided for quick access and information about a single system. The Server Status widget lets you monitor Mac OS X Server v10.5 activity from any computer with Leopard or Leopard Server. Server Status shows you graphs of processor activity, network load, disk usage, polled hourly, daily, or weekly. You can also see up to six running services and their status reports. By clicking on the service, you can open Server Admin to the appropriate service overview panel. To configure the Server Status widget: 1 Add the widget to the Dashboard like any other widget. 2 Enter the server IP address or domain name. 3 Supply an administrative or monitoring login name and password. 4 Click Done. To change the server address, login name, or password, click the information button (i) at the top of the widget and change the settings. Server Monitor The Server Monitor application can issue alerts via mail, cell phone, or pager notification as soon as it detects critical problems. Built-in sensors detect and report essential operating factors like power, temperature, and the condition of several key components. Chapter 8 Monitoring 173 The Server Monitor interface allows you to quickly detect problems. In the main window, Server Monitor lists each server on a separate line, with temperature information and the status of each of its components, including fans, disk drives, memory modules, power supplies, and Ethernet connections. A green status indicator shows the component is OK, a yellow status indicator notes a warning, and a red status indicator notes an error. Server Monitor works for Xserves only. For more information about Server Monitor, choose Server Monitor Help from Server Monitor’s Help menu. RAID Admin Like Server Monitor, you can configure RAID Admin to send an email or page when a component is in trouble. For every unit, RAID Admin displays the status of the unit and each of its components, including disk drives, fibre channel, and network connections. RAID Admin uses green, yellow, or red status indicators. You can also configure it to send you an email or page when a component is in trouble. In addition, RAID Admin provides you with an overview of the status of the Xserve RAID units that appear in the main window. For more information about RAID Admin, choose RAID Admin Help from RAID Admin’s Help menu. Console Use Console to monitor relevant log files for potential problems that might cause your server to fail. For example, you can monitor your web server’s /var/log/httpd/access_log file for signs of denial of service attacks. If you detect these signs, you can immediately implement a planned response to prevent your web server from becoming unavailable. To improve your log monitoring efficiency, consider automating the monitoring process using AppleScript or Terminal commands like grep and cron. For more information about using grep and cron, see Command-Line Administration Disk Monitoring Tools Running out of disk space can cause your server to become unreliable and probably fail. To prevent this from happening, you must constantly monitor disk space usage on your servers and delete or back up files to clear disk space.174 Chapter 8 Monitoring Mac OS X Server ships with a number of command-line tools that you can use to monitor disk space on your computer:  df. This command tells you how much space is used and how much is available on every mounted volume. For example, the following command lists local volumes and displays disk usage: df -Hl Filesystem Size Used Avail Capacity Mounted on /dev/disk0s9 40G 38G 2.1G 95% / In this example, the hard disk is almost full with only 2.1 GB left. This tells you that you should act immediately to free space on your hard disk before it fills up and causes problems for your users.  du. This command tells you how much space is used by specific folders or files. For example, the following command tells you how much space is used by each user’s home folder: sudo du -sh /Users/* 3.2M /Users/Shared 9.3M /Users/omar 8.8M /Users/jay 1.6M /Users/lili … Knowing who’s using most of the space on the hard disk lets you contact users and have them delete unused files. Note: With Workgroup Manager, you can set disk quotas for users and generate disk usage reports. For more information, see User Management.  diskspacemonitor. This command lets you automate the process of monitoring disk space usage. When the amount of free disk space drops below the level you specify, diskspacemonitor executes shell scripts that send you a notification. This command defines two action levels:  Alert—Sends you a warning message when disk space usage reaches 75%.  Recover—Archives rarely used files and deletes unneeded files when disk space usage reaches 85%. For more information about these commands, see the corresponding man page or Command-Line Administration. Network Monitoring Tools Degradation in network performance or other network problems can adversely affect the availability of your services. The following network monitoring tools can alert you to possible problems early, so you can take corrective action to avoid or minimize down time.Chapter 8 Monitoring 175  To monitor network activity, use the tcpdump utility in Mac OS X Server. This utility prints out the headers of incoming and outgoing packets on a network interface that match the specified parameters. Using tcpdump to monitor network traffic is especially useful when trying to detect denial of service attacks. For example, the following command monitors all incoming traffic on port 80 on your computer: sudo tcpdump -i en0 dst port 80 If you detect an unusual number of requests coming from the same source, you can use the firewall service to block traffic from that source. For more information about tcpdump, see the corresponding man page or CommandLine Administration.  Consider using Ruby, Perl, shell scripts, or AppleScripts to automate the monitoring process. For example, using tcpdump to monitor traffic can be time-consuming, so automation is necessary.  Consider using Ethereal, an X11 open source packet sniffing tool that you can run in the X11 environment on Mac OS X Server. This tool, unlike tcpdump, has a graphical user interface and a set of powerful network analysis tools. For more information about Ethereal, visit www.ethereal.com/.  You can use other third-party tools that automatically analyze network traffic and alert you to problems. Notification in Server Admin Server Admin has an easy to use notification system that can keep you informed of your server’s hard disk or software status. Server Admin will send an email to any address (local or not) when:  There is less than a certain percentage of free space left on any system hard disk.  There are Software Update packages are available from Apple. To use the email functionality, the server will start the SMTP (outgoing mail) process on the server. Make sure the firewall allows SMTP traffic from the server. To set a notification: 1 Open Server Admin. 2 Select a server, click the Settings button in the toolbar, and then click the Notifications tab. 3 Click the Add (+) button below the “Addresses to notify” field and add an address. 4 Repeat as needed, then click Save.176 Chapter 8 Monitoring Monitoring Server Status Overviews Using Server Admin Server Admin has several ways to see a status overview, from detailed information for a single server to a simplified overview for many servers at once. To see a status overview for one server: m Select a server in the Server list. The following shows a sample Overview pane for a single server. This overview shows basic hardware, operating system versions, active services, and graphs of CPU history, network throughput history, and disk space. To see status overview of many servers at once: m Select a server group, smartgroup, All Servers group, or Available Servers group.Chapter 8 Monitoring 177 The following shows a sample Overview pane for a group of servers. This overview shows the:  Hostname  OS version  Current CPU usage graph (a mouseover reveals more specific numbers)  Current network throughput  Disk space used (a mouseover reveals more specific numbers)  Uptime  Number of connected file services users You can sort the list by column. Simple Network Management Protocol (SNMP) Simple Network Management Protocol (SNMP) is a common protocol for monitoring the status of network equipment (for example, routers and smart switches), computers, and other networkable devices like Uninterruptable Power Supplies. Mac OS X Server uses Net-SNMP to implement SNMP v1, SNMP v2c, and SNMP v3 using both IPv4 and IPv6. SNMPv2 is the default access protocol and the default read-only community string is “public.”178 Chapter 8 Monitoring Enabling SNMP reporting SNMP access isn’t enabled by default on Mac OS X Server. To use SNMP tools to poll your Mac OS X Server for data you must configure and then enable the service. To enable SNMP 1 Open Server Admin. 2 Select a server, click the Settings button in the toolbar, and then click the General tab. 3 Select Network Management Server (SNMP). 4 Click Save. When SNMP is active, anyone with a route to the SNMP host can collect SNMP data from it. 5 Configure the basic SNMP parameters from the command-line. The SNMP process will not start unless /etc/snmpd.conf has been configured for the current site. To configure, see “Configuring snmpd” on page 178. Note: The default configuration of snmpd uses privileged port 161. For this reason and others, it must be executed by root or using setuid. You should only use setuid as root if you understand the ramifications. If you do not, seek assistance or additional information. Flags available for snmpd will change the uid and gid of the process after it starts. For more information, see the snmpd man page. Configuring snmpd The configuration (.conf) file for snmpd is typically at /etc/snmpd.conf. If you have an environment variable SNMPCONF, snmpd will read any files named snmpd.conf and snmpd.local.conf in these directories. The snmpd process can be started with a -c flag to indicate other conf files. For more information about which conf files can be used, see the snmpd man page. Configuration files can be created and installed more elegantly using the included script /usr/bin/snmpconf. As root, use this script with the -i flag to install the file at /usr/share/snmp/. Otherwise the default location for the file to be written is the user’s home folder (~/). Only root has write permission for /usr/share/snmp/. Because snmpd reads its configuration files at startup, changes to configuration files require that the process be stopped and restarted. You can stop snmpd with ProcessViewer or at the command-line (kill -HUP ). To enable and configure SNMP: m Use the /usr/bin/snmpconf command, which takes you through a basic text-based setup assistant for configuring the community name and saves the info in the configuration file. The snmp config file is located in /usr/share/snmp/snmpd.conf.Chapter 8 Monitoring 179 SNMP Configuration Example Step 1: Customize data 1 To customize the data provided by snmpd, add an snmpd.conf file using /usr/bin/ snmpconf as root or using sudo, by executing this command: /usr/bin/snmpconf -i If there are existing configuration files, you can reading them into the asistant and incorporate their contents with the output of the assistant. 2 Choose to read in the file by indicating the file at /etc/snmp/snmpd.conf. You will then see a series of text menus. 3 Make these choices in this order: a Select File: 1 (snmpd.conf) b Select section: 5 (System Information Setup) c Select section: 1 (The [typically physical] location of the system.) d The location of the system: type text string here — such as “server_room” e Select section: f (finish) f Select section: f (finish) g Select File: q (quit) You have created an snmpd.conf file with a creation date of today. Verify its creation by entering ls -l /usr/share/snmpd.conf. Step 2: Restart snmpd to take changes 1 Open Server Admin. 2 Select a server, click the Settings button in the toolbar, and then click the General tab. 3 Deselect Network Management Server (SNMP). 4 Click Save. You can also do this via the command-line by killing and restarting the smnpd process as root: /usr/sbin/snmpd180 Chapter 8 Monitoring Step 3: Collect SNMP information from the host m To get the SNMP-available information you just added, execute this command from a host that has SNMP tools installed: /usr/bin/snmpget -c public system.sysLocation.0 Replace “” with the actual name of the target host. You should see location you provided. In this example, you would see: SNMPv2_MIB::system.sysLocation.0 = STRING:\”server_room\” The other options in the menu you were working in are: /usr/bin/snmpget -c public system.sysContact.0 /usr/bin/snmpget -c public system.sysServices.0 The final .0 indicates you are looking for the index object. The word public is the name of the snmp community that you did not alter. If you need information about either of these or if you need explanations of snmp syntax, tutorials are available at net-snmp.sourceforge.net. Tools to Use with SNMP Other than snmpget, there are other snmp based tools installed, and third-party suites (both free and commercial) are available with varying complexity and reporting. Additional Information Additional information about SNMP can be had from the following sources. Man pages Entering man -k snmp in the Terminal will provide a list of the known man pages. Web sites The Net SNMP-Project:  www.net-snmp.org  net-snmp.sourceforge.net Books Essential SNMP by Douglas Mauro, Kevin Schmidt Publisher: O’Reilly (Second Edition Sept 2005) ISBN: 0-596-00840-6, 460 pages Notification and Event Monitoring Daemons To monitor and log system events, the operating system runs several daemons that intercept application messages and log them or act on them. Chapter 8 Monitoring 181 There are two main notification daemons: syslogd and emond.  syslogd: The syslogd daemon is a standard UNIX method of monitoring systems. It logs messages in accordance with the settings found in /etc/syslog.conf. You can examine the output files specified in that configuration by using a file printing or editing utility because they are plain text files. Administrators can edit these settings to fine-tune what is being monitored. Many administrators will tail or scrape the log file, meaning they will have scripts parse the log files and perform some action if a designated bit of information is present in the log. These home-grown notifications vary in quality and usefulness and are tailored to the script-writer’s specific needs. The syslogd deamon can be configured to send and recieve log file information to or from a remote server (by editing the /System/Library/LaunchDaemons/ com.apple.syslogd.plist). This is not recommended because syslogd does not use secure means to send log messages across the net.  emond: The daemon emond is the event monitoring system for Mac OS X Server v10.5. It is a unified process that handles events passed from other processes, acts on the events as designiated in defined rule set, and then notifies the administrator. Currently, emond is the engine used for Server Admin’s email notification system. It is not used for Server Monitor’s notifications. The high-level service receives events from the registered client, analyzes whether the event requires handing based on rules provided by the service at the time it registered and, if handling is required, the action related to that event is performed. To accomplish this the daemon emond has three main parts: the rules engine, the events it can respond to, and the actions it can take. The emond rules engine works in the following manner. It:  Reads the config info from /etc/emond.d/emond.conf.  Reads in the rules from plist files in the /etc/emond.d/rules/ directory.  Processes the startup event.  Accepts events until terminated.  Processes the rules associated with the event, triggering as needed.  Performs actions specified by the rules that were triggered.  Runs as the least privileged possible (nobody). WARNING: The file formats and settings in emond.conf and rules plists are not documented for customer use. Tampering could result in an unusable notification system and is unsupported.182 Chapter 8 Monitoring Logging Mac OS X Server maintains standard UNIX log files and Apple-specific process logs. Logs for the OS can be found in:  /var/log  /Library/Logs  ~/Library/Logs Each process is responsible for its own logs, the log level, and verbosity. Each process or application can write its own log file or use a system standard log, like syslog. You can use the Console application (in /Applications/Utilities) to read these and other plaintext log files regardless of location. Most services in Mac OS X Server have a logging pane in Server Admin. You can use these panes to set logging levels and view the logs for any particular service. Syslog The system log, syslog, is a consolidated catch-all location for process log messages. syslog has serveral levels of available log detail. If low detail logging is selected, detailed messages are not saved, but high detail logging results in large and possibly unhelpfully large log files. The level of logging you use for syslog can be tuned by process and should be appropriate to the level necessary for successful notification and debugging. Syslog log levels (in ascending order from least to most detail) Syslog Configuration File The configuration file can be found at /etc/syslog.conf. Each line has the following format: . Level name Level indicator in syslog.conf Amount of detail None .none None Emergency .emerg Least Alert .alert Error .err Warning .warn Notice .notice Info .info Debug .debug MostChapter 8 Monitoring 183 Facility is the process name writing to the log, and the path is the standard POSIX path to the log file. Asterisks (*) can be used as wildcards. For example, the setting for the kernel is: kern.* /var/log/system.log This shows that all messages to the log of all levels from the kernel are to be written in the file /var/log/system.log. Likewise, the following setting is an example of all emergency messages from all processes being sent to a custom emergencies log file: *.emerg /var/log/emergencies.log Directory Service Debug Logging If you are using Open Directory and you want debugging information from Directory Services processes, you must use a different logging method than systemlog. You must enable debug logging on the process manually. When enabled, this debug logging writes messages to the log file at: /Library/Logs/DirectoryService/DirectoryService.debug.log The following commands must be performed with superuser permissions (sudo or root): To manually turn on/off debug logging for Directory Services: killall -USR1 DirectoryService To start debugging at startup: touch /Library/Preferences/DirectoryService/.DSLogAPIAtStart Note: The debug log is not self-documented and is not intended for normal logging. It is very verbose and very opaque. It shows API calls, plugin queries, and responses. Open Directory Logging The configuration file can be found at /etc/openldap and the logs are found in /var/log/slapd.log. Each directory transaction generates a separate transaction log in the OpenLDAP databse. The database and transaction logs can be found at /var/db/openldap/openldap-data. The slapd process, which governs Open Directory usage, has an additional parameter for extra logging. The following command enables the additional logging: slapconfig -enablesslapdlog184 Chapter 8 Monitoring To run slapd in debugging mode: 1 Stop and remove slapd from launchd’s watch list: launchctl unload /System/Library/LaunchDaemons/org.openldap.plist 2 Restart slapd in debug mode: sudo /usr/libexec/slapd -d 99 AFP Logging The server side of Apple File Service Protocol (AFP) keeps track of access and errors, but it does not have much debugging information. However, you can add client-side logging to AFP clients to help monitor and troubleshoot AFP connections. To enable client-side logging: Perform all these actions on the AFP client computer. 1 Set the client debug level (levels 0-8): defaults write com.apple.AppleShareClientCore -dict-add afp_debug_level 4 2 Set the client log message recipient (in this case, syslog): defaults write com.apple.AppleShareClientCore -dict-add afp_debug_syslog 1 3 Enable syslog to catch the debugging messages from the client: You do this by adding *.debug /var/log/debug.log to the syslogd.conf file. 4 Restart the syslog process. Additional Monitoring Aids You can use additional aids for monitoring Mac OS X Server. There are a number of third-party server monitoring packages, as well as an additional Apple monitoring tool. The inclusion of third-party tools in the following list does not constitute an endorsement of or support for these products. They are listed for informational purposes only.  Apple Remote Desktop: This software package contains many features that allow you to to interact with, get reports on, and track computers running Mac OS X and Mac OS X Server. It has several powerful administration features and excellent reporting capabilities.  Nagios (third-party): This tool is an open source computer system and network monitoring application.  Growl (third-party): This tool is a centralized, extensible notification service that supports local and remote notification.9 185 9 Sample Setup The setup example in this chapter illustrates one way to set up the directory and network infrastructure of Mac OS X Server in a small business scenario. A Single Mac OS X Server in a Small Business In this example, Mac OS X Server provides directory, network, and productivity services to employees in a small business: The small business has been using an office LAN to share files and a printer. Acquiring Mac OS X Server made it possible to implement an intranet that uses an ISP’s DNS and digital subscriber line (DSL) services. Mac OS X Server (example.com) DSL The Internet Shared printer Windows clients Mac OS X clients Switch ISP’s DNS server Mac OS X client 192.168.0.1 VPN 186 Chapter 9 Sample Setup Here’s a summary of the scenario’s characteristics:  An Open Directory master LDAP directory on the server centralizes user management, including authentication of Mac OS X and Windows users.  The ISP’s DNS service provides a DNS domain name for the company (example.com).  A DNS server running on Mac OS X Server provides name services for the server, the printer, and any other intranet device that has a static IP address.  A firewall between the server and the Internet protects the intranet from unauthorized access.  NAT service lets intranet users share the ISP’s IP address for Internet access, while VPN lets employees access the intranet securely over the Internet when employees work away from the office.  DHCP service on Mac OS X Server provides dynamic IP addresses to intranet client computers. The server and printer have static addresses, but client computers have dynamic addresses. How to Set Up the Server The following steps summarize how to set up Mac OS X Server in this hypothetical small business. For complete information about setting up directory services, see Open Directory Administration. For details about network service setup (IP firewall, DHCP, and so forth), see Network Services Administration. Step 1: Set up the network 1 Make sure the server has two Ethernet interfaces (ports): one for the intranet (LAN) connection and one for the DSL modem connection. Use the faster interface for the server connection. A 10-Mbit connection is more than sufficient for the DSL connection. 2 Connect the server to the LAN using the faster interface. In this example, the server is plugged in to a switch used to connect client computers and shared printer. We’ll refer to this interface as the internal interface. Intranet devices should be connected to a hub or switch using good-quality CAT-5 Ethernet cables. A high-speed 10/100/1000 megabit switch can support advanced server features such as NetBoot that work best over a fast connection. 3 Connect the server to the DSL modem using the other Ethernet interface. We’ll refer to this interface as the external interface.Chapter 9 Sample Setup 187 Step 2: Contact the ISP to set up external DNS The ISP’s Name Servers should be serving the company zone example.com containing all public IPs of all servers and services available to the Internet (for example, the company web server and the VPN gateway). This means that the zone handled by the ISP contains only the public IP addresses and the ISP’s name server provides the necessary redundancy. The ISP should also provide Forward and Reverse DNS lookup for the zone’s domain for any external IP Address being used. Step 3: Set up an administration computer 1 Install the server administration tools from the Server Tools DVD. Choose a computer running Mac OS X Leopard to install the tools on. Make sure the network communication between the administrator computer and the target server is functioning. For more instructions, see “Preparing an Administrator Computer” on page 80. 2 Fill out the Mac OS X Server Advanced Worksheet in the appendix on page 195. You’ll need the information as you move through the Assistant’s panes. Step 4: Set up the server and the master directory 1 Start the server from the Install DVD. The procedure you use depends on the server hardware. In this example, assume the computer has a keyboard and a DVD drive. Turn on the computer, insert the Install DVD into the optical drive, and restart the computer while holding down the C key on the keyboard. Chapter 5, “Installation and Deployment,” on page 77 has instructions for other installation methods, such as installing on a server without an optical drive and installing from a NetInstall environment. 2 Start up Setup Assistant on the administrator computer. 3 When the Setup Assistant opens, choose “Install Mac OS X Server on a remote computer.” WARNING: This example assumes that the ISP is providing Forward and Reverse DNS resolution for the public IP address and machine name of the server. If this is not the case (for example, if your ISP’s setup is not done yet or you plan to run your own name server on the server itself), choose Standalone Server in Step 4 and promote it to an Open Directory Master or Replica only after there is a working DNS setup.188 Chapter 9 Sample Setup 4 Proceed by following the onscreen instructions. If you need to format the target disk, see “Preparing Disks for Installing Mac OS X Server” on page 89 for instructions on preparing disks for installing Mac OS X Server. When installation is complete, the server restarts. 5 After restarting, use Server Assistant again and choose “Set up a remote computer.” 6 Use the Language and Keyboard panes to reflect the server’s administration language. 7 In the Administrator Account pane, enter the server administrator’s names and password, and then click Continue. 8 In the Network Names pane, if you don’t see the newly installed server, click the Add (+) button, enter the IP address, and enter the default administrator name and password, and click Continue. For more information, see “Connecting to the Network During Initial Server Setup” on page 106. 9 Proceed by following the onscreen instructions. 10 Make sure the Network Interfaces pane lists external and internal Ethernet interfaces. 11 Make sure the external interface is the first one listed in the Network Interfaces pane. The first interface listed is the primary, or default, interface. Network traffic initiated by the server is routed through the primary interface. VPN uses it as the Public network, treating all others listed as Private. 12 Click Continue. The TCP/IP Connection pane appears for each Ethernet interface. 13 For the external interface, choose Manually from the Configure IPv4 pop-up list, then enter the IP address, subnet mask, and DNS server IP address or addresses provided to you by the ISP. With a dual interface setup like the one in this example, all DNS requests are routed to the primary interface. So when running DNS on your server, enter the gateway’s public IP in the Name Servers field as well. In a manual configuration, make it appear first in the list so it is consulted before your ISP’s servers, then click Continue. 14 If you’ll be using Gateway Setup Assistant (from the NAT service section of Server Admin) to configure network settings, you don’t need to set up an internal interface. Otherwise, enter these values for the internal interface then click Continue:  Configure IPv4: Manually  IP Address: 192.168.0.1 (192.168 values are reserved for internal LANs)  Subnet Mask: 255.255.0.0  Router: 192.168.0.1  DNS servers: 192.168.0.1Chapter 9 Sample Setup 189 15 In the Directory Usage Pane, choose Open Directory Master to set up a shared LDAP directory on the server; then Select Enable Windows Primary Domain Controller and enter a Domain/Workgroup name. These settings will set up a Windows PDC so that employees who use Windows NT, Windows 2000, and Windows XP workstations can log in to the PDC, change passwords during login, and have roaming user profiles and network home folders on the server. With one user account, a user can log in from a Windows workstation or a Mac OS X computer and access the same network home folder. 16 Click Continue. 17 Proceed through the remaining Assistant panes, then click Apply to initiate server setup. When setup is complete, the server restarts. 18 Log in to the server as the administrator you defined when using Server Assistant. 19 Configure the server’s network settings. The simplest way to do this is to use the Gateway Setup Assistant, as Step 4 describes. Alternatively, you can individually configure each network service using Server Admin, as Steps 5 through 8 describe. Step 5: Use Gateway Setup Assistant to automate the server’s network configuration 1 Open Server Admin on the administrator computer. 2 If you have not already done so, connect and authenticate to the server as the administrator you defined when using Server Assistant. 3 Select the server and add the services you are going to use. For this step, select NAT service and Firewall service. 4 In the Overview pane of the server you’re setting up, click on the NAT service. 5 Open Gateway Setup Assistant by clicking the button on the NAT overview pane. 6 Proceed through the panes, specifying information when prompted. On the WAN Port pane, select the port you configured during initial setup as the external interface. On the VPN settings pane, enable VPN and specify a shared secret for client connections to use. On the LAN Ports pane, select the port you want to use as the internal interface. 7 When Gateway Setup Assistant has completed network setup and you’ve quit the application, go to Step 9.190 Chapter 9 Sample Setup Step 6: Set up the firewall 1 Open Server Admin on the administrator computer. 2 If you have not already done so, connect and authenticate to the server as the administrator you defined when using Server Assistant. 3 In the service list, click Firewall. 4 Click Start Firewall in the bottom action bar. 5 Click Settings and select Services. 6 Choose Edit Services for the address group named “192.168-net.” 7 Select “Allow” for services you want employees working at the office to be able to access. At a minimum, select Domain Name Service, DHCP, and NetBoot. 8 Choose to Edit Services for the address group named “any.” 9 Click Services and select Allow for services you want external clients to be able to access behind the firewall. At a minimum, select L2TP VPN, IKE, and DHCP. 10 Click Save. Step 7: Set up DNS service The DNS of Leopard Server handles zone information (for example, all fully qualified host names for the local site like “site1.example.com”), mapping this private zone to private, local IPs. This avoids the need to add public servers to the local DNS. Additionally, a DNS forwarder zone is set up to query the ISP’s DNS records for anything not found in the local DNS zone (for example, the IP addresses of other organization’s web servers like www.apple.com). Note: As noted in Step 2 this example assumes that your ISP is providing Forward and Reverse DNS for your company’s zone , including resolution of the server’s public IP. As a result, the inhouse name server uses an internal zone like , which holds the private IP addresses of the server and all other devices on the LAN. 1 In Server Admin, select DNS in the service list. 2 Click Zones, click the Add button (+) under the Zones list, and select Add Primary Zone. 3 Select the default zone, and customize it to fit your organization. In this case, settings are:  Primary Zone Name: example.com  Nameservers Address: 192.168.0.1  Administrator email: admin@example.comChapter 9 Sample Setup 191 4 Add a machine record to the zone, by selecting the zone, clicking “Add Record,” and selecting “Add Machine (A)” from the pop-up button. 5 Using the following settings, select the machine record which is under the zone name to edit the record, and clicking Save when finished.  Machine name: myserver  IP Address: 192.168.0.1 6 Using the following settings, continue to add machines to the zone. For example, to add a printer, click the Add button, specify values for the printer, then click OK:  IP address: 192.168.100.2  Name: laserprinter_2000 7 Set the server to look outside the server for any domain name it doesn’t control, by clicking Settings. 8 In the Forwarder IP Addresses list, click the Add (+) button to add the DNS addresses provided by the ISP. 9 Click Save, then click Start DNS. Step 8: Set up DHCP service This step sets up a DHCP server that provides employee computers with dynamic IP addresses as well as the identity of the DNS, LDAP, and WINS servers they should use. When a client computer’s search policy is set to Automatic (using the Directory Utility application on the client computer), the identity of the DNS, LDAP, and WINS servers is supplied when an IP address is supplied. 1 In Server Admin, make sure DNS is running. 2 Select DHCP in the service list. 3 Click Subnets. 4 Click the Add (+) button to define the range of addresses to dynamically assign. The range should be large enough to accommodate current and future client computers. Make sure you exclude some addresses (at the start or end of the range) so they’re reserved for devices that need static IP addresses or for VPN users. Here are some sample values:  Subnet Mask: 255.255.0.0  Starting IP Address: 192.168.0.2  Ending IP Address: 192.168.0.102  Network Interface: en1  Router: 192.168.0.1192 Chapter 9 Sample Setup 5 Make sure the DNS pane contains the following values:  Default Domain: example.com  Name Servers: 192.168.0.1 6 Click LDAP to configure DHCP to identify the server you’re configuring as the source of directory information for clients who are served dynamic IP addresses. The server you’re setting up should be identified in the Server Name field because you set up the server as an Open Directory master when you used Server Assistant. Other settings are optional for this example. 7 Click WINS to configure DHCP to serve Windows-specific settings to clients who are served dynamic IP addresses; then supply these values:  WINS/NBNS Primary Server: 192.168.0.1  NBT Node Type: Broadcast (b-node) 8 Click Save, enable the internal Ethernet interface, then click Start DHCP. Step 9: Set up NAT service 1 In Server Admin, select NAT in the service list. 2 Click Settings. 3 Select the external interface from the “External network interface” pop-up menu. 4 Click Save, then click Start NAT. Step 10: Set up VPN service 1 In Server Admin, select VPN in the service list. 2 Click Settings. 3 Enable L2TP over IPSec (Layer Two Tunneling Protocol, Secure Internet Protocol) for Mac OS X v10.5 computer users, Linux or UNIX workstation users, and Windows XP users. Although PPTP can also be used, L2TP provides the greatest security because it runs over IPSec. 4 Enter a starting and ending IP address to indicate the addresses the VPN server can assign to clients. Avoid addresses the DHCP server is set up to serve. Also avoid addresses you specify if you enable PPTP. 5 Specify the shared secret by entering a string in “Shared secret” that isn’t intuitive. For example, specify digits, symbols, and uppercase and lowercase characters in unusual combinations. The recommended length is 8 to 12 characters.Chapter 9 Sample Setup 193 6 Enable Point to Point Tunneling Protocol (PPTP) if employees will need to access the intranet from Windows workstations other than Windows XP computers or from Mac OS X v10.2 computers when they’re away from the office. If you need to support older Windows clients that don’t have 128-bit PPTP support, select “Allow 40-bit encryption keys in addition to 128-bit.” 7 Enter a starting and ending IP address to indicate the addresses the VPN server can assign to clients. Avoid addresses the DHCP server is set up to serve. Also avoid addresses you specified when you enabled L2TP over IPSec. 8 Click Save, then click Start VPN. Step 11: Set up productivity services The infrastructure you need to set up file, print, and other productivity services is now available. Follow the instructions in the relevant administration guides, listed on page 13, to configure the services of interest. Many services, such as Apple File service, require minimal setup. Simply start them using Server Admin. Step 12: Create user accounts and home folders 1 Open Workgroup Manager. 2 If you have not already done so, connect and authenticate to the server as the administrator you defined when using Server Assistant. The Open Directory master LDAP directory is available for editing. You’ll add an account for each employee to this master directory. 3 Click the New User button. 4 Specify user settings in the panes that appear. User Management tells you how to set up all user account attributes, including home folders. It also describes how to manage users by setting up group accounts and computer lists and how to set up preference settings that customize the work environments of Macintosh clients. User Management and Open Directory Administration show how to implement support specifically for Windows workstation users.194 Chapter 9 Sample Setup Step 13: Configure client computers The information that follows applies to Mac OS X v10.5 computers. 1 If necessary, configure Mac OS X clients to retrieve information from the DHCP server. Mac OS X v10.5 computers are configured to use DHCP to obtain IP addresses and retrieve information about an LDAP directory from the DHCP server. After you configure DHCP service with information about an LDAP directory, that information is delivered to Mac OS X clients when they receive IP addresses from the DHCP server. These settings are preconfigured:  Network preferences are set to use DHCP. To access the setting, select System Preferences, open Network preferences, select the internal Ethernet interface, and select “Using DHCP with manual address” or “Using DHCP” from the Configure IPv4 pop-up menu.  The computer’s search policy is set to be defined automatically. To access this setting, open Directory Utility (in /Applications/Utilities/) and click Authentication. If the lock icon is locked, click it and authenticate as an administrator. Choose Automatic from the Search pop-up menu, then click Apply.  The use of DHCP-supplied LDAP information is enabled. To access this setting, open Directory Utility and click Services. If the lock icon is locked, click it and authenticate as an administrator. Select LDAPv3 in the list of services, then click Configure. Click “Use DHCP-supplied LDAP Server,” then click OK. 2 Configure Mac OS X clients so they can use the VPN server. 3 Open the Internet Connect application (in /Applications/) and click VPN in the toolbar. 4 Select L2TP over IPSec or PPP and click Continue. 5 From the Configurations pop-up menu., choose Edit Configurations 6 Enter the external IP address from the ISP, the user name and password for the computer user and, for L2TP over IPSec, the shared secret. 7 Click OK. 195 Appendix Mac OS X Server Advanced Worksheet Enter settings for the server in the tables below: Server name: Item Description Your information Identity of remote server for installation and setup For interactive installation and setup of a remote server on the local subnet, one of these values for the server: - IP address in IPv4 format (000.000.000.000) - host name (someserver.example.com) - MAC address (00:03:93:71:26:52). For command-line or remote-subnet installations and setups, the target server’s IP address, in IPv4 format. Preset password (for remote installation and setup) The first eight digits of the target server’s built-in hardware serial number, printed on a label on the computer. For older computers with no such number, use 12345678 for the password. Type of installation Upgrade from the latest 10.4 version or from v10.3.9, complete installation without disk formatting, or clean installation. The target volume (partition) is erased when you do a clean installation. Target disk or partition Name of the target disk or partition (volume). Disk format (when erasing the disk is OK) A format for the target disk. In most cases, use Mac OS Extended (Journaled). You can also use Mac OS Extended or casesensitive HFS+. Disk partitioning (when erasing the disk is OK) Indicate whether you want to partition the target disk. The minimum recommended size of a target disk partition is 4 GB.196 Appendix Mac OS X Server Advanced Worksheet RAID mirroring (when erasing the disk is OK and you have a second physical drive on the target server) Indicate whether you want to set up RAID mirroring. The second disk is used automatically if the primary disk isn’t available. If the target disk has a single partition and the second physical drive has a single partition and no data, you can set up RAID mirroring after installation. However, to prevent data loss, set up RAID mirroring as soon as possible. Using saved setup data If you want to use saved setup data to set up this server, identify the file or directory storing the data you want to use. If the data is encrypted, also identify the passphrase. If you want to save settings in a file or directory, use one of the next two rows. Saving setup data in a file Name the file using one of these options:  .plist (include leading zeros but omit colons, for example, 0030654dbcef.plist).  .plist (for example, 10.0.0.4.plist).  .plist (for example, myserver.plist).  .plist (first eight characters, for example, ABCD1234.plist).  .plist (for example, myserver.example.com.plist).  .plist (for example, 10.0.plist matches 10.0.0.4 and 10.0.1.2).  generic.plist (a file that any server will recognize, used to set up servers that need the same setup values) If you encrypt the file, you can save the passphrase in a file named using the above conventions, except use the extension .pass, not .plist. Place the files in a location where the target server or servers can detect it. A server can detect files that reside on a volume mounted locally in /Volumes/*/Auto Server Setup/, where * is any device mounted under /Volumes. Item Description Your informationAppendix Mac OS X Server Advanced Worksheet 197 Saving setup data in a directory Navigate to the directory where you want to save the setup, and name the setup record using one of these options:  (include leading zeros but omit colons, for example, 0030654dbcef).  (for example, 10.0.0.4).  (for example, myserver).  (first eight characters, for example, ABCD1234).  (for example, myserver.example.com).  (for example, 10.0 matches 10.0.0.4 and 10.0.1.2).  generic (a record that any server will recognize, used to set up servers that need the same setup values) If you encrypt the file, you can save the passphrase in a file named using the above conventions, except add the extension .pass. Place the passphrase file in a location where the target server or servers can detect it. A server can detect the file if it resides on a volume mounted locally in /Volumes/*/Auto Server Setup/, where * is any device mounted under /Volumes. Language The language to use for server administration (English, Japanese, French, or German). The language affects the server’s time and date formats, displayed text, and the default encoding used by the AFP server. Keyboard layout The keyboard for server administration. Item Description Your information198 Appendix Mac OS X Server Advanced Worksheet Serial number The serial number for your copy of Mac OS X Server. You need a new serial number for Mac OS X Server v10.5. The format is xsvr-999-999-x-xxx-xxx-xxx-xxx-xxxxxx-x, where x is a letter and 9 is a digit. The first element (xsvr) and the fourth one (x) must be lower case. Unless you have a site license, you need a unique serial number for each server. You’ll find the server software serial number printed on the materials provided with the server software package. If you have a site license, you must enter the registered owner name and organization as specified by your Apple representative. If you set up a server using a generic setup file or directory record and the serial number isn’t sitelicensed, you must enter the server’s serial number using Server Admin. Administrator’s long name (sometimes called full name or real name) A long name can contain no more than 255 bytes. The number of characters ranges from 255. Roman characters to as few as 85 3-byte characters. It can include spaces. It can’t be the same as any predefined user name, such as System Administrator. This name is case sensitive in the login window, but not when accessing file servers. Administrator’s short name A short name can contain as many as 255 Roman characters, typically eight or fewer. Use only a through z, A through Z, 0 through 9, _ (underscore), or - (hyphen). Avoid short names that Apple assigns to predefined users, such as “root.” Administrator’s password This value is case sensitive and must contain at least 4 characters. It is also the password for the root user. If you record this value, be sure to keep this worksheet in a safe place. After setup, use Workgroup Manager to change the password for this account. Item Description Your informationAppendix Mac OS X Server Advanced Worksheet 199 Host name You can’t specify this name during server setup. Server Assistant sets the host name to AUTOMATIC in /etc/hostconfig. This setting causes the server’s host name to be the first name that’s true in this list: - The name provided by the DHCP or BootP server for the primary IP address - The first name returned by a reverse DNS (address-to-name) query for the primary IP address - The local hostname - The name “localhost” Computer name The AppleTalk name and the default name used for SLP/DA. Specify a name 63 characters or fewer but avoid using =, :, or @. The Network browser in the Finder uses SMB to find computers that provide Windows file sharing. Spaces are removed from a computer name for use with SMB, and the name can contain no more than 15 characters, no special characters, and no punctuation. Local hostname The name that designates a computer on a local subnet. It can contain lowercase letters, numbers, and/or hyphens (but not at the ends). The name ends with “.local” and must be unique on a local subnet. Network interface data Your server has a built-in Ethernet port and can have an additional Ethernet port built in or added on. Record information for each port you want to activate. Use the table provided later in this worksheet to record data for each port. Directory usage Select one: - Standalone Server (use only the local directory). - Connected to a Directory System (get information from another server’s shared directory). If you choose this option, use one of the next four rows in this table to indicate how the server will connect with the directory. - Open Directory Master (provide directory information to other computers). If you choose this option, use the row for “Using Open Directory Master.” - No change (for upgrades only). Using “As Specified by DHCP Server” The directory to use is identified by a DHCP server set up to provide the address and search base of an LDAP server (DHCP option 95). Item Description Your information200 Appendix Mac OS X Server Advanced Worksheet Configuration settings for the following port appear in the table below: Using “Open Directory Server” The directory to use is an LDAP directory identified by a DHCP server or identified by specifying an IP address or domain name for the LDAP server. Using “Other Directory Server” The directories to use is configured using the Directory Utility application after you finish setting up the server. Using “Open Directory Master” Optionally indicate if you want to enable a Windows Primary Domain Controller on the server. Provide a Windows computer name and domain for the server. The computer name and domain can contain a-z, A-Z, 0-9, -, but no . or space and can’t contain only numbers. Finish setting up the directory you want to host by using Server Admin after completing server setup. Time zone Choose the time zone you want the server to use. Network time Optionally indicate a Network Time Server for the server. Apple recommends that you keep your server’s clock accurate by synchronizing it with a network time server. Item Description Your information Port Name: Built-in Ethernet Item Description Your information Device name A UNIX name for the port in the format enx, where x starts with 0. For the value of x for the port you’re describing, see your hardware manual. The value en0 always designates a built-in Ethernet port. en0 Ethernet address The Media Access Control (MAC) address of the port (00:00:00:00:00:00). This value is usually on a sticker on the server hardware, but you can run Apple System Profiler or a command-line tool such as networksetup to discover the value. TCP/IP and AppleTalk Indicate whether you want to enable the port for TCIP/IP and/or AppleTalk. You can connect a port to the Internet by enabling TCP/IP and use the same or a different port for AppleTalk. Enable no more than one port for AppleTalk. Order of ports If you enable more than one port, indicate the order in which the ports should be accessed when trying to connect to a network. All nonlocal network traffic uses the first active port.Appendix Mac OS X Server Advanced Worksheet 201 TCP/IP settings Use one of the next four rows in this table. “Manually” Specify these settings to manually specify TCP/IP settings: - IP address (000.000.000.000). A unique static address. - Subnet mask (000.000.000.000). Used to locate the subnet on the local area network where the server resides. This mask is used to derive the network part of the server’s address. What remains identifies the server computer on that network. - Router (000.000.000.000) that supports the subnet the server’s on. The router is the machine on the local subnet that messages are sent to the target IP address isn’t on the local subnet. - DNS servers (000.000.000.000) used to convert IP addresses to fully qualified DNS names and vice versa for the port. - Search domains (optional). Names to automatically append to Internet addresses when you don’t fully qualify them. For example, if you specify campus.univ.edu as a search domain, you can enter server1 in the Finder’s Connect To Server dialog box to connect to server1.campus.univ.edu. “Using DHCP with Manual IP address” Specify these settings to use a DHCP server to assign a static IP address and optionally other settings for the port. Make sure the DHCP server is set up and DHCP service running when you initiate server setup: - IP address (000.000.000.000). A unique static address. - DNS servers (000.000.000.000) used to convert IP addresses to fully qualified DNS names and vice versa for the port. - Search domains (optional). Names to automatically append to Internet addresses when you don’t fully qualify them. For example, if you specify campus.univ.edu as a search domain, you can enter server1 in the Finder’s Connect To Server dialog box to connect to server1.campus.univ.edu. Item Description Your information202 Appendix Mac OS X Server Advanced Worksheet “Using DHCP” Specify these settings if you want to use a DHCP server to assign a dynamic IP address and optionally other settings for the port. Make sure the DHCP server is set up and DHCP service running when you initiate server setup: - DHCP client ID (optional). A string that’s useful for recognizing a port when its IP address changes. Don’t specify a DHCP client ID when using Server Assistant to set up the server remotely. Instead, after setup, use the server’s Network preferences to define a DHCP client ID. - DNS servers (000.000.000.000) used to convert IP addresses to fully qualified DNS names and vice versa for the port. - Search domains (optional). Names to automatically append to Internet addresses when you don’t fully qualify them. For example, if you specify campus.univ.edu as a search domain, you can enter server1 in the Finder’s Connect To Server dialog box to connect to server1.campus.univ.edu. “Using BootP” Specify these settings if you want to use a Bootstrap Protocol server to assign an IP address for the identified port. With BootP, the same IP address is always assigned to a particular network interface. It’s used primarily for computers that start up from a NetBoot image: - DNS servers (000.000.000.000) used to convert IP addresses to fully qualified domain names and vice versa for the port. - Search domains (optional). Names to automatically append to Internet addresses when you don’t fully qualify them. For example, if you specify campus.univ.edu as a search domain, you can enter server1 in the Finder’s Connect To Server dialog box to connect to server1.campus.univ.edu. Item Description Your informationAppendix Mac OS X Server Advanced Worksheet 203 IPv6 To configure IPv6 addressing for the port, select Automatically or Manually. Choose Automatically if you want the server to automatically generate an IPv6 address for the port. Choose Manually to specify IPv6 settings: - IPv6 address. Generally written in the form 0000:0000:0000:0000:0000:0000:0000:0000. - Router. The IPv6 address of the router on the local subnet. - Prefix length. The number of significant bits in the subnet mask that are used to identify the network. Ethernet settings To automatically configure Ethernet settings for the port, choose Automatically. Choose Manually (Advanced) to specify settings if you have specific requirements for the network the server’s connected to. Incorrect Ethernet settings can affect network performance or render a port unusable: - Speed. The maximum Ethernet speed, in number of bits per second, that can be transmitted using the port. Select one of these options: autoselect, 10baseT/UTP, 100baseTX, and 1000baseTX. - Duplex. Determine whether input and output packets are transmitted at the same time (full-duplex) or alternately (half-duplex). - Maximum Packet Transfer Unit Size (MTU). The largest packet the port will send or receive.s, expressed in bytes. Increasing the packet size improves throughput, but the devices that receive the packet (switches, routers, and so forth) must support the packet size. Select one of these options: Standard (1500), Jumbo (9000), or Custom (enter a value from 72 to 1500). Item Description Your information204 Appendix Mac OS X Server Advanced Worksheet Configuration settings for the following port appear in the table below: Port Name: Item Description Your information Device name A UNIX name for the port in the format enx, where x starts with 0. For the value of x for the port you’re describing, see your hardware manual. The value en0 always designates a built-in Ethernet port. Ethernet address The Media Access Control (MAC) address of the port (00:00:00:00:00:00). This value is usually on a sticker on the server hardware, but you can run Apple System Profiler or a command-line tool such as networksetup to discover the value. TCP/IP and AppleTalk Indicate whether you want to enable the port for TCIP/IP and/or AppleTalk. You can connect a port to the Internet by enabling TCP/IP and use the same or a different port for AppleTalk. Enable no more than one port for AppleTalk. Order of ports If you enable more than one port, indicate the order in which the ports should be accessed when trying to connect to a network. All nonlocal network traffic uses the first active port. TCP/IP settings Use one of the next four rows in this table. “Manually” Specify these settings to manually specify TCP/IP settings: - IP address (000.000.000.000). A unique static address. - Subnet mask (000.000.000.000). Used to locate the subnet on the local area network where the server resides. This mask is used to derive the network part of the server’s address. What remains identifies the server computer on that network. - Router (000.000.000.000) that supports the subnet the server’s on. The router is the machine on the local subnet that messages are sent to the target IP address isn’t on the local subnet. - DNS servers (000.000.000.000) used to convert IP addresses to fully qualified DNS names and vice versa for the port. - Search domains (optional). Names to automatically append to Internet addresses when you don’t fully qualify them. For example, if you specify campus.univ.edu as a search domain, you can enter server1 in the Finder’s Connect To Server dialog box to connect to server1.campus.univ.edu.Appendix Mac OS X Server Advanced Worksheet 205 “Using DHCP with Manual IP address” Specify these settings to use a DHCP server to assign a static IP address and optionally other settings for the port. Make sure the DHCP server is set up and DHCP service running when you initiate server setup: - IP address (000.000.000.000). A unique static address. - DNS servers (000.000.000.000) used to convert IP addresses to fully qualified DNS names and vice versa for the port. - Search domains (optional). Names to automatically append to Internet addresses when you don’t fully qualify them. For example, if you specify campus.univ.edu as a search domain, you can enter server1 in the Finder’s Connect To Server dialog box to connect to server1.campus.univ.edu. “Using DHCP” Specify these settings if you want to use a DHCP server to assign a dynamic IP address and optionally other settings for the port. Make sure the DHCP server is set up and DHCP service running when you initiate server setup: - DHCP client ID (optional). A string that’s useful for recognizing a port when its IP address changes. Don’t specify a DHCP client ID when using Server Assistant to set up the server remotely. Instead, after setup, use the server’s Network preferences to define a DHCP client ID. - DNS servers (000.000.000.000) used to convert IP addresses to fully qualified DNS names and vice versa for the port. - Search domains (optional). Names to automatically append to Internet addresses when you don’t fully qualify them. For example, if you specify campus.univ.edu as a search domain, you can enter server1 in the Finder’s Connect To Server dialog box to connect to server1.campus.univ.edu. Item Description Your information206 Appendix Mac OS X Server Advanced Worksheet “Using BootP” Specify these settings if you want to use a Bootstrap Protocol server to assign an IP address for the identified port. With BootP, the same IP address is always assigned to a particular network interface. It’s used primarily for computers that start up from a NetBoot image: - DNS servers (000.000.000.000) used to convert IP addresses to fully qualified domain names and vice versa for the port. - Search domains (optional). Names to automatically append to Internet addresses when you don’t fully qualify them. For example, if you specify campus.univ.edu as a search domain, you can enter server1 in the Finder’s Connect To Server dialog box to connect to server1.campus.univ.edu. IPv6 To configure IPv6 addressing for the port, select Automatically or Manually. Choose Automatically if you want the server to automatically generate an IPv6 address for the port. Choose Manually to specify IPv6 settings: - IPv6 address. Generally written in the form 0000:0000:0000:0000:0000:0000:0000:0000. - Router. The IPv6 address of the router on the local subnet. - Prefix length. The number of significant bits in the subnet mask that are used to identify the network. Ethernet settings To automatically configure Ethernet settings for the port, choose Automatically. Choose Manually (Advanced) to specify settings if you have specific requirements for the network the server’s connected to. Incorrect Ethernet settings can affect network performance or render a port unusable: - Speed. The maximum Ethernet speed, in number of bits per second, that can be transmitted using the port. Select one of these options: autoselect, 10baseT/UTP, 100baseTX, and 1000baseTX. - Duplex. Determine whether input and output packets are transmitted at the same time (full-duplex) or alternately (half-duplex). - Maximum Packet Transfer Unit Size (MTU). The largest packet the port will send or receive.s, expressed in bytes. Increasing the packet size improves throughput, but the devices that receive the packet (switches, routers, and so forth) must support the packet size. Select one of these options: Standard (1500), Jumbo (9000), or Custom (enter a value from 72 to 1500). Item Description Your information 207 Glossary Glossary administrator A user with server or directory domain administration privileges. Administrators are always members of the predefined “admin” group. administrator computer A Mac OS X computer onto which you’ve installed the server administration applications from the Mac OS X Server Admin CD. AFP Apple Filing Protocol. A client/server protocol used by Apple file service to share files and network services. AFP uses TCP/IP and other protocols to support communication between computers on a network. alphanumeric Containing characters that include letters, numbers, and punctuation characters (such as _ and ?). Apache An open source HTTP server integrated into Mac OS X Server. You can find detailed information about Apache at www.apache.org. application server Software that runs and manages other applications, usually web applications, that are accessed using a web browser. The managed applications reside on the same computer where the application server runs. authentication The process of proving a user’s identity, typically by validating a user name and password. Usually authentication occurs before an authorization process determines the user’s level of access to a resource. For example, file service authorizes full access to folders and files that an authenticated user owns. authorization The process by which a service determines whether it should grant a user access to a resource and how much access the service should allow the user to have. Usually authorization occurs after an authentication process proves the user’s identity. For example, file service authorizes full access to folders and files that an authenticated user owns. back up (verb) The act of creating a backup. backup (noun) A collection of data that’s stored for the purpose of recovery in case the original copy of data is lost or becomes inaccessible.208 Glossary bandwidth The capacity of a network connection, measured in bits or bytes per second, for carrying data. BIND Berkeley Internet Name Domain. The program included with Mac OS X Server that implements DNS. The program is also called the name daemon, or named, when the program is running. blog A webpage that presents chronologically ordered entries. Often used as an electronic journal or newsletter. boot ROM Low-level instructions used by a computer in the first stages of starting up. BSD Berkeley Software Distribution. A version of UNIX on which Mac OS X software is based. cache A portion of memory or an area on a hard disk that stores frequently accessed data in order to speed up processing times. Read cache holds data in case it’s requested by a client; write cache holds data written by a client until it can be stored on disk. See also buffer caching, controller cache, disk cache. certificate Sometimes called an “identity certificate” or “public key certificate.” A file in a specific format (Mac OS X Server uses the X.509 format) that contains the public key half of a public-private keypair, the user’s identity information such as name and contact information, and the digital signature of either a Certificate Authority (CA) or the key user. Certificate Authority An authority that issues and manages digital certificates in order to ensure secure transmission of data on a public network. See also certificate, public key infrastructure. certification authority See Certificate Authority. cleartext Data that hasn’t been encrypted. client A computer (or a user of the computer) that requests data or services from another computer, or server. command line The text you type at a shell prompt when using a command-line interface. command-line interface A way of interacting with the computer (for example, to run programs or modify file system permissions) by entering text commands at a shell prompt. See also shell; shell prompt. computer list A set of computers that all receive the managed preference settings defined for the list, and that are all available to a particular set of users and groups. A computer can be a member of only one computer list. Computer lists are created in Mac OS X Server version 10.4 or earlier. See also computer group.Glossary 209 computer name The default name used for SLP and SMB service registrations. The Network Browser in the Finder uses SLP to find computers advertising Personal File Sharing and Windows File Sharing. It can be set to bridge subnets depending on the network router settings. When you turn on Personal File Sharing, users see the computer name in the Connect to Server dialog in the Finder. Initially it is “’s Computer” (for example, “John’s Computer”) but can be changed to anything. The computer name is used for browsing for network file servers, print queues, Bluetooth® discovery, Apple Remote Desktop clients, and any other network resource that identifies computers by computer name rather than network address. The computer name is also the basis for the default local host name. CUPS Common UNIX Printing System. A cross-platform printing facility based on the Internet Printing Protocol (IPP). The Mac OS X Print Center, its underlying print system, and the Mac OS X Server print service are based on CUPS. For more information, visit www.cups.org. daemon A program that runs in the background and provides important system services, such as processing incoming email or handling requests from the network. decryption The process of retrieving encrypted data using some sort of special knowledge. See also encryption. default The automatic action performed by a program unless the user chooses otherwise. DHCP Dynamic Host Configuration Protocol. A protocol used to dynamically distribute IP addresses to client computers. Each time a client computer starts up, the protocol looks for a DHCP server and then requests an IP address from the DHCP server it finds. The DHCP server checks for an available IP address and sends it to the client computer along with a lease period—the length of time the client computer may use the address. DHCP lease time See lease period. digital signature An electronic signature that can be used to verify the identity of the sender of a message. directory See folder. directory domain A specialized database that stores authoritative information about users and network resources; the information is needed by system software and applications. The database is optimized to handle many requests for information and to find and retrieve information quickly. Also called a directory node or simply a directory. directory node See directory domain.210 Glossary directory services Services that provide system software and applications with uniform access to directory domains and other sources of information about users and resources. disc Optical storage media, such as a CD or DVD. disk A rewritable data storage device. See also disk drive, logical disk. disk drive A device that contains a disk and reads and writes data to the disk. disk image A file that, when opened, creates an icon on a Mac OS X desktop that looks and acts like an actual disk or volume. Using NetBoot, client computers can start up over the network from a server-based disk image that contains system software. Disk image files have a filename extension of either .img or .dmg. The two image formats are similar and are represented with the same icon in the Finder. The .dmg format cannot be used on computers running Mac OS 9. DNS Domain Name System. A distributed database that maps IP addresses to domain names. A DNS server, also known as a name server, keeps a list of names and the IP addresses associated with each name. DNS domain A unique name of a computer used in the Domain Name System to translate IP addresses and names. Also called a domain name. DNS name A unique name of a computer used in the Domain Name System to translate IP addresses and names. Also called a domain name. domain Part of the domain name of a computer on the Internet. It does not include the top-level domain designator (for example, .com, .net, .us, .uk). Domain name “www.example.com” consists of the subdomain or host name “www,” the domain “example,” and the top-level domain “com.” domain name See DNS name. Domain Name System See DNS. DSL Digital subscriber line. A broadband data transmission technology that operates over telephone lines. Dynamic Host Configuration Protocol See DHCP. dynamic IP address An IP address that’s assigned for a limited period of time or until the client computer no longer needs it. EFI Extensible Firmware Interface. Software that runs automatically when an Intelbased Macintosh first starts up. It determines the computers hardware configuration and starts the system software.Glossary 211 encryption The process of obscuring data, making it unreadable without special knowledge. Usually done for secrecy and confidential communications. See also decryption. Ethernet A common local area networking technology in which data is transmitted in units called packets using protocols such as TCP/IP. Ethernet ID See MAC address. everyone Any user who can log in to a file server: a registered user or guest, an anonymous FTP user, or a website visitor. export In the Network File System (NFS), a way of sharing a folder with clients on a network. failover In Xsan, the automatic process by which a standby metadata controller becomes the active metadata controller if the primary controller fails. Fast Ethernet A group of Ethernet standards in which data is transmitted at 100 megabits per second (Mbit/s). file server A computer that serves files to clients. A file server may be a generalpurpose computer that’s capable of hosting additional applications or a computer capable only of serving files. file system A scheme for storing data on storage devices that allows applications to read and write files without having to deal with lower-level details. filter A screening method to control access to a server. A filter is made up of an IP address and a subnet mask, and sometimes a port number and access type. The IP address and the subnet mask determine the range of IP addresses that the filter applies to. firewall Software that protects the network applications running on your server. IP firewall service, which is part of Mac OS X Server software, scans incoming IP packets and rejects or accepts these packets based on a set of filters you create. FireWire A hardware technology for exchanging data with peripheral devices, defined by IEEE Standard 1394. format (verb) In general, to prepare a disk for use by a particular file system. forward zone The DNS zone that holds no records of its own, but forwards DNS queries to another zone.212 Glossary FTP File Transfer Protocol. A protocol that allows computers to transfer files over a network. FTP clients using any operating system that supports FTP can connect to a file server and download files, depending on their access privileges. Most Internet browsers and a number of freeware applications can be used to access an FTP server. gateway A network node that interfaces one network to another. Often, it refers to a computer that links a private LAN to a public WAN, with or without Network Address Translation (NAT). A router is a special kind of gateway that links related network segments. GB Gigabyte. 1,073,741,824 (2 30 ) bytes. Gigabit Ethernet A group of Ethernet standards in which data is transmitted at 1 gigabit per second (Gbit/s). Abbreviated GbE. gigabyte See GB. group A collection of users who have similar needs. Groups simplify the administration of shared resources. group folder A folder that organizes documents and applications of special interest to group members and allows group members to pass information among themselves. guest computer A computer that doesn’t have a computer account. guest user A user who can log in to your server without a user name or password. high availability The ability of a system to perform its function continuously, without interruption. home directory See home folder. home folder A folder for a user’s personal use. Mac OS X also uses the home folder to store system preferences and managed user settings for Mac OS X users. Also known as a home directory. host Another name for a server. host name A unique name for a computer, historically referred to as the UNIX hostname. HTML Hypertext Markup Language. The set of symbols or codes inserted in a file to be displayed on a web browser page. The markup tells the web browser how to display a webpage’s words and images for the user. HTTP Hypertext Transfer Protocol. The client/server protocol for the World Wide Web. HTTP provides a way for a web browser to access a web server and request hypermedia documents created using HTML.Glossary 213 Hypertext Markup Language See HTML. Hypertext Transfer Protocol See HTTP. IANA Internet Assigned Numbers Authority. An organization responsible for allocating IP addresses, assigning protocol parameters, and managing domain names. ICMP Internet Control Message Protocol. A message control and error-reporting protocol used between host servers and gateways. For example, some Internet software applications use ICMP to send a packet on a round trip between two hosts to determine round-trip times and discover problems on the network. identity certificate See certificate. IGMP Internet Group Management Protocol. An Internet protocol used by hosts and routers to send packets to lists of hosts that want to participate in a process known as multicasting. QuickTime Streaming Server (QTSS) uses multicast addressing, as does Service Location Protocol (SLP). image See disk image. installer package A file package with the filename extension .pkg. An installer package contains resources for installing an application, including the file archive, Read Me and licensing documents, and installer scripts. Internet A set of interconnected computer networks communicating through a common protocol (TCP/IP). The Internet is the most extensive publicly accessible system of interconnected computer networks in the world. Internet service provicer See ISP. intranet A network of computers operated by and for the benefit of an organization’s internal users. Access is commonly restricted to members of the organization. Many times, it refers to a website for the organization which is accessible only from within the organization. Intranets use the same networking technologies as the Internet (TCP/IP), and sometimes bridge legacy information systems with modern networking technologies. IP Internet Protocol. Also known as IPv4. A method used with Transmission Control Protocol (TCP) to send data between computers over a local network or the Internet. IP delivers data packets and TCP keeps track of data packets. IP address A unique numeric address that identifies a computer on the Internet. IP subnet A portion of an IP network, which may be a physically independent network segment, that shares a network address with other portions of the network and is identified by a subnet number.214 Glossary IPP Internet Printing Protocol. A client-server protocol for printing over the Internet. The Mac OS X printing infrastructure and the Mac OS X Server print service that’s built on it support IPP. IPSec A security addition to IP. A protocol that provides data transmission security for L2TP VPN connections. IPSec acts at the network layer, protecting and authenticating IP packets between participating IPSec nodes. IPv4 See IP. IPv6 Internet Protocol version 6. The next-generation communication protocol to replace IP (also known as IPv4). IPv6 allows a greater number of network addresses and can reduce routing loads across the Internet. journal data In Xsan, data about file system transactions that occur on an Xsan volume. KB Kilobyte. 1,024 (2 10 ) bytes. KDC Kerberos Key Distribution Center. A trusted server that issues Kerberos tickets. Kerberos A secure network authentication system. Kerberos uses tickets, which are issued for a specific user, service, and period of time. After a user is authenticated, it’s possible to access additional services without retyping a password (called single signon) for services that have been configured to take Kerberos tickets. Mac OS X Server uses Kerberos v5. Kerberos Key Distribution Center See KDC. Kerberos realm The authentication domain comprising the users and services that are registered with the same Kerberos server. The registered users and services trust the Kerberos server to verify each other’s identities. kilobyte See KB. L2TP Layer Two Tunnelling Protocol. A network transport protocol used for VPN connections. It’s essentially a combination of Cisco’s L2F and PPTP. L2TP itself isn’t an encryption protocol, so it uses IPSec for packet encryption. LAN Local area network. A network maintained within a facility, as opposed to a WAN (wide area network) that links geographically separated facilities. layer A mechanism for prioritizing the tracks in a movie or the overlapping of sprites. When QuickTime plays a movie, it displays the movie’s images according to their layer. Images with lower layer numbers are displayed on top; images with higher layer numbers may be obscured by images with lower layer numbers.Glossary 215 LDAP Lightweight Directory Access Protocol. A standard client-server protocol for accessing a directory domain. lease period A limited period of time during which IP addresses are assigned. By using short leases, DHCP can reassign IP addresses on networks that have more computers than available IP addresses. Lightweight Directory Access Protocol See LDAP. link An active physical connection (electrical or optical) between two nodes on a network. link aggregation Configuring several physical network links as a single logical link to improve the capacity and availablility of network connections. With link aggregation, all ports are assigned the same ID. Compare to multipathing, in which each port keeps its own address. load balancing The process of distributing client computers’ requests for network services across multiple servers to optimize performance. local area network See LAN. local directory domain A directory of identification, authentication, authorization, and other administrative data that’s accessible only on the computer where it resides. The local directory domain isn’t accessible from other computers on the network. local domain A directory domain that can be accessed only by the computer it resides on. local home directory See local home folder. local home folder A home folder that resides on disk on the computer a user is logged in to. It’s accessible only by logging directly in to the computer where it resides, unless you log in to the computer using SSH. local hostname A name that designates a computer on a local subnet. It can be used without a global DNS system to resolve names to IP addresses. It consists of lowercase letters, numbers, or hyphens (except as the last characters), and ends with “.local” (For example, bills-computer.local). Although the default name is derived from the computer name, a user can specify this name in the Sharing pane of System Preferences. It can be changed easily, and can be used anywhere a DNS name or fully qualified domain name is used. It can only resolve on the same subnet as the computer using it.216 Glossary log in (verb) To start a session with a computer (often by authenticating as a user with an account on the computer) in order to obtain services or access files. Note that logging in is separate from connecting, which merely entails establishing a physical link with the computer. long name The long form of a user or group name. See also user name. LPR Line Printer Remote. A standard protocol for printing over TCP/IP. MAC Media access control. See MAC address. MAC address Media access control address. A hardware address that uniquely identifies each node on a network. For AirPort devices, the MAC address is called the AirPort ID. Mac OS X The latest version of the Apple operating system. Mac OS X combines the reliability of UNIX with the ease of use of Macintosh. Mac OS X Server An industrial-strength server platform that supports Mac, Windows, UNIX, and Linux clients out of the box and provides a suite of scalable workgroup and network services plus advanced remote management tools. managed network The items managed clients are allowed to see when they click the Network icon in a Finder window. Administrators control this setting using Workgroup Manager. Also called a network view. managed preferences System or application preferences that are under administrative control. Workgroup Manager allows administrators to control settings for certain system preferences for Mac OS X managed clients. master zone The DNS zone records held by a primary DNS server. A master zone is replicated by zone transfers to slave zones on secondary DNS servers. MB Megabyte. 1,048,576 (2 20 ) bytes. media access control See MAC address. megabyte See MB. migrate To transfer existing information, such as user and group accounts and user data, from one server or network to another server or network that’s managed using different software. mirrored Refers to a disk array that uses RAID 1, or mirroring. mirroring Writing identical copies of data to two physical drives. Mirroring protects data against loss due to disk failure, and is the simplest method of achieving data redundancy.Glossary 217 mount (verb) To make a remote directory or volume available for access on a local system. In Xsan, to cause an Xsan volume to appear on a client’s desktop, just like a local disk. mount point In streaming, a string used to identify a live stream, which can be a relayed movie stream, a nonrelayed movie stream, or an MP3 stream. Mount points that describe live movie streams always end with a .sdp extension. MS-CHAP Microsoft Challenge Handshake Authentication Protocol. The standard Windows authentication method for VPN. This authentication method encodes passwords when they are sent over the network and stores them in a scrambled form on the server. It offers good security during network transmission. MS-CHAP is a proprietary version of CHAP. multicast DNS A protocol developed by Apple for automatic discovery of computers, devices, and services on IP networks. Called Bonjour (previously Rendezvous) by Apple, this proposed Internet standard protocol is sometimes referred to as ZeroConf or multicast DNS. For more information, visit www.apple.com or www.zeroconf.org. To see how this protocol is used in Mac OS X Server, see local hostname. MySQL An open source relational database management tool frequently used by web servers. name server A server on a network that keeps a list of names and the IP addresses associated with each name. See also DNS, WINS. NAT Network address translation. A method of connecting multiple computers to the Internet (or any other IP network) using one IP address. NAT converts the IP addresses you assign to computers on your private, internal network into one legitimate IP address for Internet communications. network address translation See NAT. Network File System See NFS. Network Image Utility A utility provided with Mac OS X Server software that allows you to create disk images for NetBoot and Network Install services. Disk images can contain the Mac OS X operating system, applications, or both. network installation The process of installing systems and software on Mac OS X client computers over the network. Software installation can occur with an administrator attending the installations or completely unattended. network interface Your computer’s hardware connection to a network. This includes (but isn’t limited to) Ethernet connections, AirPort cards, and FireWire connections. network interface card See NIC.218 Glossary Network Time Protocol See NTP. NFS Network File System. A client/server protocol that uses Internet Protocol (IP) to allow remote users to access files as though they were local. NFS exports shared volumes to computers based on IP address, rather than user name and password. NTP Network Time Protocol. A network protocol used to synchronize the clocks of computers across a network to some time reference clock. NTP is used to ensure that all the computers on a network are reporting the same time. offline Refers to data that isn’t immediately available, or to a device that is physically connected but not available for use. online Refers to data, devices, or network connections that are available for immediate use. Open Directory The Apple directory services architecture, which can access authoritative information about users and network resources from directory domains that use LDAP, Active Directory protocols, or BSD configuration files, and network services. Open Directory master A server that provides LDAP directory service, Kerberos authentication service, and Open Directory Password Server. open source A term for the cooperative development of software by the Internet community. The basic principle is to involve as many people as possible in writing and debugging code by publishing the source code and encouraging the formation of a large community of developers who will submit modifications and enhancements. package install image A file that you can use to install packages. Using NetBoot, client computers can start up over the network using this image to install software. Unlike block copy disk images, you can use same package install image for different hardware configurations. partition A subdivision of the capacity of a physical or logical disk. Partitions are made up of contiguous blocks on the disk. password An alphanumeric string used to authenticate the identity of a user or to authorize access to files or services. password policy A set of rules that regulate the composition and validity of a user’s password. Password Server See Open Directory Password Server. permissions Settings that define the kind of access users have to shared items in a file system. You can assign four types of permissions to a share point, folder, or file: Read & Write, Read Only, Write Only, and No Access. See also privileges.Glossary 219 PHP PHP Hypertext Preprocessor (originally Personal Home Page). A scripting language embedded in HTML that’s used to create dynamic webpages. physical disk An actual, mechanical disk. Compare with logical disk. plaintext Text that hasn’t been encrypted. Point to Point Tunneling Protocol See PPTP. point-to-point One of three physical topologies that Fibre Channel uses to interconnect nodes. The point-to-point topology consists of a single connection between two nodes. See also arbitrated loop, fabric. port A sort of virtual mail slot. A server uses port numbers to determine which application should receive data packets. Firewalls use port numbers to determine whether data packets are allowed to traverse a local network. “Port” usually refers to either a TCP or UDP port. port name A unique identifier assigned to a Fibre Channel port. POSIX Portable Operating System Interface for UNIX. A family of open system standards based on UNIX, which allows applications to be written to a single target environment in which they can run unchanged on a variety of systems. PPTP Point to Point Tunneling Protocol. A network transport protocol used for VPN connections. It’s the Windows standard VPN protocol and uses the user-provided password to produce an encryption key. private key One of two asymmetric keys used in a PKI security system. The private key is not distributed and is usually encrypted with a passphrase by the owner. It can digitally sign a message or certificate, claiming authenticity. It can decrypt messages encrypted with the corresponding public key and it can encrypt messages that can only be decrypted by the private key. privileges The right to access restricted areas of a system or perform certain tasks (such as management tasks) in the system. process A program that has started executing and has a portion of memory allocated to it. process ID See PID. protocol A set of rules that determines how data is sent back and forth between two applications.220 Glossary public key One of two asymmetric keys used in a PKI security system. The public key is distributed to other communicating parties. It can encrypt messages that can be decrypted only by the holder of the corresponding private key, and it can verify the signature on a message originating from a corresponding private key. public key certificate See certificate. public key cryptography A method of encrypting data that uses a pair of keys, one public and one private, that are obtained from a certification authority. One key is used to encrypt messages, and the other is used to decrypt them. public key infrastructure A secure method of exchanging data over an unsecure public network, such as the Internet, by using public key cryptography. QTSS Publisher An Apple application (included with Mac OS X Server) for managing QuickTime media and playlists, and preparing media for streaming and downloading. QuickTime Streaming Server See QTSS. RADIUS Remote Authentication Dial-In User Service. RADIUS server A computer on the network that provides a centralized database of authentication information for computers on the network. RAID Redundant Array of Independent (or Inexpensive) Disks. A grouping of multiple physical hard disks into a disk array, which either provides high-speed access to stored data, mirrors the data so that it can be rebuilt in case of disk failure, or both. The RAID array is presented to the storage system as a single logical storage unit. See also RAID array, RAID level. RAID 0 A RAID scheme in which data is distributed evenly in stripes across an array of drives. RAID 0 increases the speed of data transfer, but provides no data protection. RAID 0+1 A combination of RAID 0 and RAID 1. This RAID scheme is created by striping data across multiple pairs of mirrored drives. RAID 1 A RAID scheme that creates a pair of mirrored drives with identical copies of the same data. It provides a high level of data availability. RAID 5 A RAID scheme that distributes both data and parity information across an array of drives one block at a time, with each drive operating independently. This enables maximum read performance when accessing large files. RAID array A group of physical disks organized and protected by a RAID scheme and presented by RAID hardware or software as a single logical disk. In Xsan, RAID arrays appear as LUNs, which are combined to form storage pools. RAID set See RAID array.Glossary 221 realm General term with multiple applications. See WebDAV realm, Kerberos realm. record type A specific category of records, such as users, computers, and mounts. For each record type, a directory domain may contain any number of records. recursion The process of fully resolving domain names into IP addresses. A nonrecursive DNS query allows referrals to other DNS servers to resolve the address. In general, user applications depend on the DNS server to perform this function, but other DNS servers do not have to perform a recursive query. root An account on a system that has no protections or restrictions. System administrators use this account to make changes to the system’s configuration. SACL Service Access Control List. Lets you specify which users and groups have access to specific services. See ACL. Samba Open source software that provides file, print, authentication, authorization, name resolution, and network service browsing to Windows clients using the SMB protocol. schema The collection of attributes and record types or classes that provide a blueprint for the information in a directory domain. search base A distinguished name that identifies where to start searching for information in an LDAP directory’s hierarchy of entries. search path See search policy. search policy A list of directory domains searched by a Mac OS X computer when it needs configuration information; also, the order in which domains are searched. Sometimes called a search path. Secure Sockets Layer See SSL. server A computer that provides services (such as file service, mail service, or web service) to other computers or network devices. Server Message Block See SMB. shared secret A value defined at each node of an L2TP VPN connection that serves as the encryption key seed to negotiate authentication and data transport connections. shell A program that runs other programs. You can use a shell to interact with the computer by typing commands at a shell prompt. See also command-line interface. short name An abbreviated name for a user. The short name is used by Mac OS X for home folders, authentication, and email addresses.222 Glossary slave zone The DNS zone records held by a secondary DNS server. A slave zone receives its data by zone transfers from the master zone on the primary DNS server. SLP DA Service Location Protocol Directory Agent. A protocol that registers services available on a network and gives users easy access to them. When a service is added to the network, the service uses SLP to register itself on the network. SLP DA uses a centralized repository for registered network services. SMB Server Message Block. A protocol that allows client computers to access files and network services. It can be used over TCP/IP, the Internet, and other network protocols. SMB services use SMB to provide access to servers, printers, and other network resources. SMTP Simple Mail Transfer Protocol. A protocol used to send and transfer mail. Its ability to queue incoming messages is limited, so SMTP is usually used only to send mail, and POP or IMAP is used to receive mail. SNMP Simple Network Management Protocol. A set of standard protocols used to manage and monitor multiplatform computer network devices. Spotlight A comprehensive search engine that searches across your documents, images, movies, PDF, email, calendar events, and system preferences. It can find something by its text content, filename, or information associated with it. SSL Secure Sockets Layer. An Internet protocol that allows you to send encrypted, authenticated information across the Internet. More recent versions of SSL are known as TLS (Transport Level Security). standalone server A server that provides services on a network but doesn’t get directory services from another server or provide directory services to other computers. static IP address An IP address that’s assigned to a computer or device once and is never changed. stripe (noun) A partition of a drive in a RAID array. stripe (verb) To write data to successive stripes in a RAID array or LUN. subdirectory A directory within a directory. subdomain Sometimes called the host name. Part of the domain name of a computer on the Internet. It does not include the domain or the top-level domain (TLD) designator (for example, .com, .net, .us, .uk). The domain name “www.example.com” consists of the subdomain “www,” the domain “example,” and the top-level domain “com.”Glossary 223 subnet A grouping on the same network of client computers that are organized by location (for example, different floors of a building) or by usage (for example, all eighthgrade students). The use of subnets simplifies administration. See also IP subnet. subnet mask A number used in IP networking to specify which portion of an IP address is the network number. TB Terabyte. 1,099,511,627,776 (2 40 ) bytes. TCP Transmission Control Protocol. A method used with the Internet Protocol (IP) to send data in the form of message units between computers over the Internet. IP handles the actual delivery of the data, and TCP keeps track of the units of data (called packets) into which a message is divided for efficient routing through the Internet. terabyte See TB. throughput The rate at which a computer can process data. tunneling A technology that allows one network protocol to send its data using the format of another protocol. two-factor authentication A process that authenticates through a combination of two independent factors: something you know (such as a password), something you have (such as a smart card), or something you are (such as a biometric factor). This is more secure than authentication that uses only one factor, typically a password. URL Uniform Resource Locator. The address of a computer, file, or resource that can be accessed on a local network or the Internet. The URL is made up of the name of the protocol needed to access the resource, a domain name that identifies a specific computer on the Internet, and a hierarchical description of a file location on the computer. user ID See UID. user name The long name for a user, sometimes referred to as the user’s real name. See also short name. Virtual Private Network See VPN. volume A mountable allocation of storage that behaves, from the client’s perspective, like a local hard disk, hard disk partition, or network volume. In Xsan, a volume consists of one or more storage pools. See also logical disk. VPN Virtual Private Network. A network that uses encryption and other technologies to provide secure communications over a public network, typically the Internet. VPNs are generally cheaper than real private networks using private lines, but they rely on having the same encryption system at both ends. The encryption may be performed by firewall software or by routers.224 Glossary WAN Wide area network. A network maintained across geographically separated facilities, as opposed to a LAN (local area network) within a facility. Your WAN interface is usually the one connected to the Internet. WebDAV Web-based Distributed Authoring and Versioning. A live authoring environment that allows client users to check out webpages, make changes, and then check the pages back in to the site while the site is running. WebDAV realm A region of a website, usually a folder or directory, that’s defined to provide access for WebDAV users and groups. weblog See blog. Weblog service The Mac OS X Server service that lets users and groups securely create and use blogs. Weblog service uses Open Directory authentication to verify the identity of blog authors and readers. If accessed using a website that’s SSL enabled, Weblog service uses SSL encryption to further safeguard access to blogs. wide area network See WAN. wiki A website that allows users to collaboratively edit pages and easily access previous pages using a web browser. Windows Internet Naming Service See WINS. WINS Windows Internet Naming Service. A name resolution service used by Windows computers to match client names with IP addresses. A WINS server can be located on the local network or externally on the Internet. workgroup A set of users for whom you define preferences and privileges as a group. Any preferences you define for a group are stored in the group account. zone transfer The method by which zone data is replicated among authoritative DNS servers. Slave DNS servers request zone transfers from their master servers to acquire their data. 225 Index Index A access ACLs 57, 73 IP address restrictions 54 Keychain Access Utility 66 LDAP 21 remote installation 82 SACLs 73, 74 user 143, 146 See also permissions accounts. See user accounts; Workgroup Manager ACLs (access control lists) 57, 73 addresses. See IP addresses Administer permission level 149 administrator 73, 74, 149 administrator computer 80, 136, 137 AFP (Apple Filing Protocol) service 22, 184 Apple Remote Desktop (ARD) 51, 142, 184 archiving server data 33, 36 ARD. See Apple Remote Desktop asr tool 37, 85 authentication Kerberos 21, 59, 60, 110 key-based SSH 71, 72 keychain services 156 MS-CHAPv2 108 Open Directory 59 overview 58 passwords 59, 76, 97 RADIUS 20, 22, 59, 155 SASL 59 Server Admin 40, 63, 138 single sign-on 60 standalone server 109 and TLS 56 users 58, 60, 72, 108 Workgroup Manager 151 See also certificates authorization 58 See also authentication B backups advanced configuration 19 command-line tools 37 critical files 155 media types 36 policy considerations 32, 36 rotation scheme 35 scheduling 34 server setup data 119 types 34 validation of 36 Berkeley Software Distribution. See BSD broadcasting setup 133 BSD (Berkeley Software Distribution) 23 C calendar service. See iCal service Certificate Authority (CA) creating 65 creating certificates from 67 distributing to clients 69 introduction 61 overview 62 requesting certificates from 63, 64, 65, 67 See also PKI Certificate Manager 62, 68 certificates creating 65, 67 deleting 69 editing 68 identities 62 importing 68 managing 68 overview 60, 61 preparing 64 private keys 61 public keys 61 renewing 70 requesting 64 root 65 self-signed 62, 65, 69226 Index and Server Admin 62, 147 and services 70 Certificate Signing Request. See CSR changeip tool 32 chat service. See iChat client computers and NetBoot 28 clients certificates 69 client-side logging 184 group accounts 152 and NetBoot 28 See also users command-line tools backup tools 37 daemon control 169 disk space monitoring 174 erasing disks 95 installing server software 101 partitioning disks 92 and permissions 149 restoration tools 37 server administration 49 computer lists 151, 152 computer name 107, 142 computers, administrator 80, 136, 137 computer-to-computer network 164 computer-to-switch network 165 computer-to-switch-pair network 165 concatenated RAID set 93 configuration advanced 19, 20, 110 authentication 59 automatic 115, 121, 122, 125 batch setup for multiple servers 113 connecting to network 106, 164, 165 DHCP 81, 110 directory connection 109, 110 Ethernet 106 interactive 110, 111, 112, 113 introduction 18, 105 link aggregation 166 logs 129 Open Directory 107, 108, 109, 110, 121, 125, 130 postponing 105 providing files to servers 120, 121 remote server 111, 112, 113 sample setup 185 saving setup data 116, 117, 118, 119, 122, 125 server infrastructure 30 server types 18 services 129, 130, 131, 132, 133, 134, 155 settings overview 107 SSL 147 standalone server 108 status checking 128, 129 troubleshooting 128, 129 types of 105, 144 worksheet for 195 Console 173 CSR (Certificate Signing Request) 63, 64, 65, 67 D daemons, overview 169 Darwin (core operating system) 23 Date & Time preferences 143 df tool 174 DHCP (Dynamic Host Configuration Protocol) service 30, 81, 110 digital signature 147 directories. See directory services; domains, directory; folders Directory, overview 44, 45 directory services advanced configuration 110 and automatic setup 118, 121, 125 directory domains 21, 81, 108, 110, 154 logs 183 planning of 27 See also Open Directory Directory Utility 46 disk images encrypting 57 installing with 28, 48, 85, 88 disks command-line management of 92, 95, 174 erasing free space 95 installation preparation 89, 91, 92, 94, 95 mirroring 93 monitoring tools 173 partitions 84, 91, 92, 94, 95 quotas 28 See also RAID diskspacemonitor tool 174 Disk Utility 57, 91, 94, 95 diskutil tool 92, 94, 95 ditto tool 37 DMZ, network 54 DNS (Domain Name System) service 30, 81 documentation 13, 14, 15 Domain Name System. See DNS domains, directory 21, 81, 108, 110, 154 See also Open Directory drives. See disks du tool 174 DVDs, installation 84 Dynamic Host Configuration Protocol. See DHCP E email. See mail service emond daemon 181 encryption 56, 57, 61, 119Index 227 See also SSL Ethereal packet sniffing tool 175 Ethernet 55, 106, 166 exporting service settings 146 F files backup 32, 36, 155 configuration 182 full file-level copies 34 security 57, 58 setup data 116, 117, 118, 122 shared secret 61 storage considerations 28 file services 20, 22, 130, 131, 184 file sharing 131, 148 file systems backing up 37 choosing 89 setup data 120 See also volumes File Transfer Protocol. See FTP FileVault 57 firewall service 54, 55, 81, 156 folders 27, 57, 142 FTP (File Transfer Protocol) service 22 full file-level copies 34 full image backup type 34 G Gateway Setup Assistant 155 group accounts 152 groups 140, 146, 149, 151 Growl application 184 H hardware requirements 17, 31, 79, 93 help, using 12 HFS+J volume 90 HFSX volume 90 historical data collection 171 home folders 27, 142 host name changing 144 local 107, 142 I iCal service 134, 156 iChat service 20, 134, 156 identity certificates. See certificates images. See disk images; NetBoot; NetInstall importing certificates 68 service settings 146 incremental backups 34 infrastructure requirements 30 Inspector 154 installation administrator computer 80 collecting information 79 command-line method 101 directory connections 81 with disk images 28, 48, 85, 88 disk preparation 89, 91, 92, 94, 95 from earlier OS versions 26, 28, 77, 80 host name changing 144 identifying servers 96 infrastructure requirements 30 integration strategy 29 interactive 97, 99, 100 multiple server 103 network services setup 81 overview 77 planning for 25, 26, 27, 28, 29 postponing setup after 105 remote access 80, 82, 96, 99 server installation disc 80 server software 81, 101 starting up for 81, 82, 84, 88 system requirements 79 updating 104 upgrading 104 installer tool 101, 103 IP addresses access restriction 54 changing server 32, 143 and firewalls 81 overview 23 remote server installation 82, 96 servers on different subnets 111 IPv6 addressing 23 J journaling, file system 90 K KDC (Kerberos Key Distribution Center). See Kerberos Kerberos 21, 59, 60, 110 key-based authentication 71, 72 Keychain Access Utility 66 keychain services 156 L LACP (Link Aggregation Control Protocol) 164 launchctl tool 170 launchd daemon 37, 169 LDAP (Lightweight Directory Access Protocol) service 21 LDAPv3 servers 59 link aggregation 163, 164, 165, 166, 167228 Index Link Aggregation Control Protocol. See LACP load balancing 168 local directory domain, standalone server 109 login, authenticating 70, 72 logs monitoring 173, 181, 182, 183, 184 troubleshooting setup 129 web services 159 M MAC (media access control) addresses 55, 96 Mac OS X administration from 137, 155 installation considerations 80 upgrading from 104 Mac OS X Server administrative tools 39 configuration 108 integration strategy 29 introduction 17, 18 supported standards 21 system requirements 17 and UNIX 23 See also configuration; installation mail service 20, 22, 132, 155, 157 managed preferences, defining 152 media, streaming. See streaming media migration 26, 28, 29 mirroring, disk 93 mobile accounts 142 Monitor permission level 149 MS-CHAPv2 authentication 108 MySQL service 158 N Nagios application 184 NAT (Network Address Translation) 157 NetBoot service 28, 48, 88 NetInstall 48, 88 Network Address Translation. See NAT Network File System. See NFS network interfaces 142 networks connection configurations 106, 164, 165 environment for installation 78 Ethernet 55, 106, 166 initial server setup connection 106 monitoring tools 174, 177, 178, 179, 180 security 54, 55, 56 network services DHCP 30, 81, 110 DNS 30, 81 installation 81 NAT 157 NTP 142, 143 planning for 30 setup 133 VLAN 55 VPN 110 See also IP addresses network time protocol. See NTP NFS (Network File System) 22 notification system 46, 143, 156, 175, 180 See also logs NTP (network time protocol) 142, 143 O Open Directory authentication 59 logs 183 overview 20 and SACLs 73 setup 107, 108, 109, 110, 121, 125, 130 Open Directory master 81 Open Directory replica 59, 110, 162 OpenLDAP 21 open source modules Kerberos 21, 59, 60, 110 OpenLDAP 21 OpenSSL 56 PHP 158 See also Open Directory OpenSSL 56 operating environment requirements 162 P PackageMaker 48 packets, data, filtering of 54 partitions, disk 84, 91, 92, 94, 95 passwords 59, 76, 97 permissions administrator 73, 149 files 57 folder 57 SACL 74 types 57 php configuration files 158 physical infrastructure requirements 30 PKI (public key infrastructure) 56, 60, 61 Podcast Producer 133 portable computers 142 Portable Operating System Interface. See POSIX ports Ethernet 106 list of 136 status of 136 TCP 70 POSIX (Portable Operating System Interface) 57 preferences 152 presets 152Index 229 print service 131 private key 61, 62 privileges, administrator 73, 149 See also permissions PropertyListEditor 48 protocols file service 22, 184 network service 30, 81, 110, 142, 143 overview 22 See also specific protocols public key certificates. See certificates public key cryptography 70 public key infrastructure. See PKI Q QuickTime Streaming Server (QTSS) 20, 49, 156 quotas, disk space 28 R RADIUS (Remote Authentication Dial-In User Service) 20, 22, 59, 155 RAID (Redundant Array of Independent Disks) 28, 92, 94 RAID Admin 173 real-time monitoring 171 Remote Authentication Dial-In User Service. See RADIUS remote servers accessing 82 Apple Remote Desktop 51, 142, 184 configuration 111, 112, 113 identifying 96 installing from or to 80, 82, 96, 99 replication 59, 110, 162 requirements hardware 17, 31, 79, 93 infrastructure 30 operating environment 162 software 79, 80 restart, automatic 161 restoration, data 32, 35 root certificate 65 rsync tool 37 S SACLs (service access control lists) 73, 74 SASL (Simple Authentication and Security Layer) 59 Secure Empty Trash 58 secure SHell. See SSH Secure Sockets Layer. See SSL Secure VM 57 security administrator 73 authorization 58 best practices 74 file 57, 58 firewall service 54, 55, 81, 156 installation 81 network 54, 55, 56 overview 53 physical 53 SASL 59 service level 73, 74 settings 147 SSH 70, 71, 72, 82, 83, 142, 156 SSL 56, 60, 61, 62, 147 TLS 56 See also access; authentication; certificates; SSL self-signed certificates 62, 65, 69 serial number, server 83 Server Admin access control 146 as administration tool 138, 139 authentication 40, 63, 138 certificates 62, 147 customizing 41 notification system 175 opening 40, 63, 138 overview 11, 39, 40, 63 server status 176 service management 145 and system imaging 48 Server Assistant 42, 99, 105, 110 Server Message Block protocol. See SMB Server Monitor 46, 172 servers adding 139 administration tools 39, 49, 50, 135, 138 basic settings 107, 141 groups of 140 infrastructure requirements 30 load balancing 168 reliability tools 159, 160, 161, 162, 163, 164, 166, 167 relocation considerations 31 removing 139 sample setup 185 serial numbers for 83 setup worksheet 195 standalone 107, 108, 109 startup 81, 88 status monitoring 171, 172, 173, 174, 175, 176 time 142, 143 troubleshooting 128, 129 See also configuration; installation; remote servers Server Status Dashboard widget 172 service access control lists. See SACLs services access control 143, 146 exporting settings 146 importing settings 146230 Index management of 155 planning for distribution of 27 security 70, 73, 74 setup 129, 130, 131, 132, 133, 134, 155 viewing 143, 145 See also specific services setup procedures. See configuration; installation shared directory domain 21, 108 shared secret files 61 share points 57, 148 Simple Network Management Protocol. See SNMP single points of failure 159 single sign-on authentication 60 slapd daemon 184 SMB (Server Message Block) protocol 22 snapshots, data 34 SNMP (Simple Network Management Protocol) definition 23 as monitoring tool 177, 178, 179, 180 settings 142 snmpd daemon 178 Software Update service 104, 133 srm UNIX utility 58 SSH (secure SHell host) 70, 71, 72, 82, 83, 142, 156 SSL (Secure Sockets Layer) 56, 60, 61, 62, 147 standalone server 107, 108, 109 standard configuration type 18 streaming media 20, 28, 49, 133, 156 striping 93 subnets 106, 111 syslog configuration file 182 syslogd daemon 181 System Image Utility 48 system imaging service 133 T TCP (Transmission Control Protocol) 54, 70 tcpdump tool 175 Time Machine 37 time server 142, 143 TLS (Transport Layer Security) protocol 56 Transmission Control Protocol. See TCP Transport Layer Security protocol. See TLS troubleshooting server operation 128, 129 U UDP (User Datagram Protocol) 54 UNIX 23 upgrading from Mac OS X 104 from previous server versions 26, 28 vs. migration 26, 29 and saved setup data 116 UPS (uninterruptible power supply) 160, 161 user accounts authentication 60 group 152 managed preferences 152 management of 151 mobile 142 passwords 59 setup 130 See also users User Datagram Protocol. See UDP users access control 143, 146 administrative access for 73 authentication 58, 60, 72, 108 certificates 62 and Directory 44 disk space quotas 28 groups 146, 149, 151 home folders 27, 142 management of 151 permissions 149 Windows 28, 59 See also clients; user accounts; Workgroup Manager V Virtual Private Network. See VPN VLAN (virtual local area network) 55 VNC (virtual network computing) 79, 82, 100, 103 volumes backing up 37 erasing 95 and partitioning 91, 92 RAID 93, 94 setup data 120 startup 82, 88 supported 90 VPN (Virtual Private Network) 110 W weblog service 159 WebObjects Application Server 134 web services 20, 21, 132, 158 web technologies 22 wikis 159 Windows NT 29 Windows users 28, 59 workgroup configuration type 18 Workgroup Manager administering accounts 151 administration overview 150 authentication 151 customizing 44, 154 opening 42, 151 overview 42, 43Index 231 X Xgrid 2 service 20, 155 Xgrid Admin 50 Xsan 19 Xserve hardware installation instructions 79 and Server Monitor 46 and server reliability 160, 161 VLAN support 55 Instructions de remplacement Respectez scrupuleusement les instructions de ce document. À défaut, vous risquez de détériorer votre matériel et d’invalider sa garantie. Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/. Avertissement : Durant cette procédure, mettez les petites pièces hors de portée des enfants. Avertissement : Il existe des bords tranchants à l’intérieur de l’ordinateur. Soyez vigilant. Outils requis Le seul outil requis pour cette procédure est un tournevis cruciforme. Ouverture de l’ordinateur Avertissement : Éteignez systématiquement l’ordinateur avant de l’ouvrir afin d’éviter d’endommager ses composants internes et de vous blesser. Après extinction, les composants internes risquent d’être très chauds. Attendez qu’ils refroidissent avant de poursuivre. 1. Placez l’ordinateur sur une surface propre et plane. 2. Si vous pensez que le mode Suspension d’activité est déclenché, appuyez sur le bouton d’alimentation en façade pour réactiver l’ordinateur. 3. Éteignez l’ordinateur et patientez cinq minutes avant de poursuivre. 4. Si vous avez installé un câble antivol, retirez-le. 5. Débranchez tous les autres câbles connectés à l’ordinateur, à l’exception du cordon d’alimentation. 1 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive F073-0624 Rev. D Lecteur Optique AppleCare6. Touchez les caches métalliques des connecteurs PCI, à l’arrière de l’ordinateur. (Figure 1) Important : Agissez toujours de même avant de toucher un élément ou d’installer un composant à l’intérieur de l’ordinateur. Pour éviter d’accumuler de l’électricité statique, ne vous déplacez pas dans la pièce avant d’avoir achevé l’installation et refermé l’ordinateur. 7. Débranchez le cordon d’alimentation. Avertissement : Ne branchez jamais le cordon d’alimentation et ne mettez jamais l’ordinateur sous tension tant que les composants internes et externes ne sont pas tous en place et que le capot est ouvert. En transgressant ces règles, vous risqueriez d’endommager l’ordinateur ou de vous blesser. Assurez-vous que le cordon d’alimentation reste débranché jusqu’à la fin de la procédure, tant que l’ordinateur n’est pas refermé. Avertissement : Le bloc d’alimentation de votre ordinateur est un composant haute tension à n’ouvrir sous aucun prétexte, même lorsque l’ordinateur est éteint. S’il nécessite une intervention, contactez votre revendeur Apple ou votre Société de maintenance agréée Apple. 8. Soulevez le loquet situé sur le panneau latéral droit. 9. Abaissez délicatement le panneau latéral jusqu’à ce qu’il repose à plat. Afin de ne pas érafler le boîtier, prévoyez un linge doux et propre. Avertissement : Si des voyants sont allumés sur la carte mère, cela signifie que l’ordinateur n’est pas éteint. Refermez le panneau d’accès latéral et éteignez l’ordinateur avant de poursuivre. F073-0624 Rev. D Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive 2 Figure 1 Power Mac G4 (QuickSilver 2002) Power Mac G4 (Mirrored Drive Doors_FW 800)Dépose du Lecteur Optique sur les modèles QuickSilver Avertissement : Manipulez le lecteur optique installé avec précaution. Tenez-le par ses deux côtés métalliques et n’exercez aucune pression sur son centre. Il ne faut jamais lever ou tenir le lecteur par le panneau avant. 1. A l’aide d’un tournevis cruciforme, enlevez les quatre vis qui fixent le berceau du lecteur au châssis. (Figure 2) 2. Tout en tenant la base du berceau, faites-le coulisser vers l’arrière et tourner de façon à pouvoir accéder aux câbles du lecteur. (Figure 3) 3 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive F073-0624 Rev. D Figure 2 Figure 33. Décollez soigneusement le ruban adhésif de la nappe de la partie supérieure du berceau. (Figure 4) 4. Déconnectez les câbles suivants, situés derrière les lecteurs CD/DVD/Zip : • câble en nappe des lecteurs CD/DVD et Zip • câble d’alimentation (P6) du lecteur CD/DVD • câble d’alimentation (P7) du lecteur Zip 5. Sortez le berceau et les lecteurs de l’ordinateur. 6. Enlevez les quatre vis de fixation du berceau du lecteur CD/DVD. (Figure 5) 7. Sortez le lecteur du berceau en le faisant glisser. F073-0624 Rev. D Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive 4 Figure 4 Figure 5Installation du Lecteur Optique dans les modèles QuickSilver Avertissement : Manipulez le lecteur optique de remplacement avec précaution. Tenez-le par ses deux côtés métallique et n’exercez aucune pression sur son centre. Il ne faut jamais lever ou tenir lecteur par le panneau avant. 1. Placez le lecteur dans la baie supérieure du berceau, insérez les vis de l’ancien lecteur dans les trous du berceau, et vissez-les afin de fixer le lecteur au berceau. 2. Connectez les câbles au lecteur Zip et au lecteur CD/DVD : • le connecteur du milieu du faisceau d’alimentation au lecteur Zip. • le connecteur du milieu de la nappe au lecteur Zip. • l’extrémité du faisceau d’alimentation au lecteur CD/DVD. • l’extrémité de la nappe au lecteur CD/DVD. 3. Recollez le ruban adhésif de la nappe sur la partie supérieure du berceau. 4. Insérez le berceau du lecteur dans l’ordinateur en vous assurant que les taquets de fixation situés sur le fond du berceau s’encastrent dans les deux encoches de l’étagère du lecteur. (Figure 6) 5. Reinsérez les quatre vis de fixation que vous avez enlevées auparavant, puis vissez-les afin de fixer le berceau du lecteur au châssis. 5 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive F073-0624 Rev. D Figure 6Dépose du Lecteur Optique sur les modèles Mirrored Drive Doors/FW 800 1. Retirez le cache arrière du berceau de lecteurs optiques en le faisant coulisser. (Figure 7) 2. Ôtez les deux vis fixant ce berceau au châssis. (Figure 8) F073-0624 Rev. D Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive 6 Figure 8 Figure 73. Faites-le coulisser vers l’arrière et tourner de façon à pouvoir accéder aux câbles du ou des lecteurs de disques optiques. 4. Débranchez les câbles données et alimentation (P6 et P7) à l’arrière du ou des lecteurs optiques et extrayez le berceau de l’ordinateur. (Figure 9) 5. Enlevez les quatre vis de fixation situées sur les côtés du berceau du lecteur. 6. Sortez le lecteur du berceau en le faisant coulisser vers l’avant. (Figure 10) 7 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive F073-0624 Rev. D Figure 9 Figure 10Installation du Lecteur Optique dans les modèles Mirrored Drive Doors/FW 800 1. Installez le lecteur optique de remplacement dans le berceau du lecteur optique. Remarque : Avant de réinstaller ce berceau sur son support, assurez-vous que le faisceau de câbles d’alimentation passe dans la goulotte prévue à cet effet sur le panneau latéral. (Figure 11) Remarque : Tout en faisant coulisser le berceau sur son support, assurez-vous que le loquet situé sous le berceau s’enclenche dans l’encoche du support. (Figure 12) F073-0624 Rev. D Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive 8 Figure 11 Figure 122. Connectez les câbles au lecteur optique. (Figure 13) Remarque : Avant de réinstaller le cache arrière, assurez-vous que le bord supérieur de celui-ci s’adapte sur le bord supérieur du berceau de lecteurs optiques. (Figure 14) Attention : Veillez à ne pas écraser le câble d’alimentation entre le panneau et le berceau. 9 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive F073-0624 Rev. D Figure 13 Figure 14 Figure 14Fermeture de l’ordinateur 1. Vérifiez que vous avez réinstallé toutes les vis et que tous les câbles internes sont connectés. 2. Relevez le panneau d’accès latéral, soulevez le loquet et pressez le panneau contre le boîtier jusqu’à ce qu’il s’enclenche. 3. Rebranchez tous les câbles et faites démarrer l’ordinateur. Avertissement : Ne mettez jamais l’ordinateur sous tension tant que ses composants internes et externes ne sont pas tous en place et que le capot est ouvert. En transgressant ces règles, vous risqueriez d’endommager l’ordinateur ou de vous blesser. ! Apple Computer, Inc. © 2003 Apple Computer, Inc. Tous droits réservés. Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option - I) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale. Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression. Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014-2084 USA + 1 408 996 1010 http://www.apple.com Apple, le logo Apple, Mac, Macintosh et le logo Mac sont des marques d’Apple Computer Inc., déposées aux États-Unis et dans d’autres pays. Power Mac est une marque d’Apple Computer, Inc. F073-0624 Rev. D Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Optical Drive 10 Instructions de Remplacement Merci de suivre attentivement ces instructions. Dans le cas contraire, vous pourriez endommager votre matériel et perdre le bénéfice de sa garantie. Le remplacement de la Carte AirPort nécessite sept étapes simples : • Extinction de l'ordinateur. • Ouverture de l'ordinateur. • Extraction du radiateur. • Enlèvement de la Carte AirPort installée, le cas échéant. • Installation de la Carte AirPort de remplacement. • Remise en place du radiateur. • Fermeture de l'ordinateur. Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/. Outils Requis • Tournevis plat de bijoutier • Tournevis Phillips Décharge d'Electricité Statique (DES) L'électricité statique, un phénomène normal et naturel, se charge dans votre corps lorsque vous vous déplacez. Une décharge d'électricité statique se produit lorsque vous touchez un objet et ressentez un choc électrique. Les DES peuvent endommager les composants internes de votre ordinateur. Pour les éviter, ne vous déplacez pas dans la pièce pendant cette procédure et suivez attentivement ces instructions. Installation d'une Carte AirPort Pour installer une Carte AirPort dans votre PowerBook, suivez ces étapes : 1. Placez votre ordinateur sur une surface propre et lisse. 2. Eteignez l'ordinateur, enlevez la batterie de sa baie d'extension et déconnectez l'adaptateur secteur, le modem et tout autre câble connecté à l'ordinateur. Attention : Eteignez toujours votre ordinateur avant de l'ouvrir sous peine d'endommager ses composants internes. Les composants internes de votre PowerBook peuvent être chauds.Si vous avez utilisé votre PowerBook, attendez 30 minutes après son extinction pour laisser les composants internes refroidir avant de poursuivre. PowerBook FireWire - AirPort Card 1 Carte AirPort ¤ AppleCare3. Assurez-vous que les vis de blocage du clavier ne soient pas en position bloquée. Un nouveau PowerBook est livré clavier débloqué. Par conséquent, à moins que vous ou quelqu'un d'autre n'ait bloqué le clavier, vous pouvez passer cette étape. 4. Libérez le clavier en le tirant vers le bas pour dégager ses attaches (situées à gauche des touches F1 et F9) jusqu'à ce que sa partie haute se libère. 5. Soulevez la partie haute du clavier du PowerBook en direction de la rangée supérieure de touches et tirez-le en arrière suffisament loin pour libérer les petites attaches retenant l'arrière du clavier en place. 2 PowerBook FireWire - AirPort Card ¤6. Retournez le clavier et déposez-le sur le repose-mains. 7. Si votre Carte AirPort était livrée avec un adaptateur AirPort, enlevez le clip en métal et glissez la Carte AirPort hors de l'adaptateur. (L'adaptateur et le clip en métal ne sont d'aucune utilité dans votre PowerBook.) 8. Afin d'éviter les décharges d'électricité statique, touchez une surface métallique à l'intérieur de l'ordinateur. Important : Pour éviter les décharges d'électricité statique, raccordez-vous toujours à la terre en touchant une surface métallique avant de toucher un composant interne de votre ordinateur ou d'y installer un nouveau composant. Afin d'éviter de vous recharger en électricité statique, ne vous déplacez pas dans la pièce avant d'avoir terminé l'installation et refermé l'ordinateur. 9. A l'aide d'un tournevis Phillips, enlevez les vis de fixation du radiateur interne. PowerBook FireWire - AirPort Card 3 AirPort Card AirPort Adapter Metal Clip Screws Heat Shield AirPort Card : Carte AirPort AirPort Adapter : Adaptateur AirPort Metal Clip : Clip en Métal Screws : Vis Heat Shield : Radiateur10. Enlevez le radiateur interne. 11. Positionnez la Carte AirPort Card (numéro ID AirPort et code barre face à vous) et branchez la Carte AirPort à l'extrémité du câble d'antenne. Assurez-vous que le connecteur à l'extrémité du câble d'antenne est droit avant de l'insérer dans la carte. 12. Glissez la carte dans le connecteur situé juste au dessus du connecteur pour PC Card. Assurez-vous de glisser la carte sur toute sa longueur jusqu'à ce que vous sentiez qu'elle est correctement fixée au connecteur. Remarque : Quand vous insérerez la Carte AirPort, vous devrez peut-être la plier sous l'ouverture du réceptacle en plastique (à l'endroit où est fixée la partie supérieure du clavier). Cette procédure simplifie l'alignement de la carte dans le connecteur et empêche l'extrémité de la carte de bouger après son insertion. 4 PowerBook FireWire - AirPort Card AirPort Card AirPort Antenna Cable AirPort Card Connector AirPort Card AirPort Card Connector AirPort Card AirPort Card Connector : Connecteur Carte AirPort AirPort Card : Carte AirPort AirPort Antenna Cable : Câble d’Antenne Carte AirPort AirPort Card : Carte AirPort AirPort Card Connector : Connecteur Carte AirPort13. Remmetez le radiateur en place et fixez les vis. Note : Lorsque vous remmetez le radiateur en place, assurez-vous qu'il ne recouvre pas les attaches en plastique du disque dur et de la Carte AirPort. L'attache en plastique du module processeur doit pas être placée dessous du radiateur. 14. Remettez le clavier à l'endroit et insérez les petites attaches de l'arrière du clavier dans les ouvertures du boîtier du PowerBook. 15. Tirez vers le bas les attaches de dégagement du clavier (situées à gauches des touches F1 et F9) et poussez vers le bas la partie supérieure du clavier. PowerBook FireWire - AirPort Card 5 Screws Hard Disk Tab AirPort Card Tab Heat Shield Processor Module Tab Heat Shield : Radiateur Screws : Vis AirPort Card Tab : Attache Carte AirPort Hard Disk Tab : Attache Disque Dur Processor Module Tab : Attache Module Processeur16. Laissez s'enclencher les attaches de libération du clavier pour qu'il se mette bien en place. Réinstallez la batterie du PowerBook ou branchez l'adaptateur secteur. Attention : N'allumez jamais l'ordinateur avant que tous ses composants internes et externes soient en place et que l'ordinateur soit correctement refermé. L'utilisation d'un ordinateur ouvert ou incomplet peut l'endommager et occasionner des blessures. 17. Redémarrez l'ordinateur.  Apple Computer, Inc. © 2002 Apple Computer, Inc. Tous droits réservés. Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option-Maj-K) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale. Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression. Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014-2084 USA + 1 408 996 1010 http://www.apple.com Apple, le logo Apple, FireWire et PowerBook sont des marques d'Apple Computer, Inc., déposées aux Etats-Unis et dans d'autres pays. 6 PowerBook FireWire - AirPort Card File Name: Job Number: Description: 034-4989-A_N82REV_inbox_sm_v5.indd PKG-09-0194 N82REV In-box Trim: Version: Live: Bleed: Scale: Fonts: 630mm x 116mm flat n/a n/a 1:1 (output at 100%) Myriad Set NOTES: •keylines/fold marks do NOT print •built at 100% •cyan type: 100% Cyan •red rings: 100% Magenta and 100% Yellow •black type: 100K •art: 4/c; fpo 5 Inks: 4/0 CMYK Studio Designer: Buddy Check (QC): Graphic Designer: GD Editor: Writer: Dan Talbert Leslie Brugal Yoo Lee Teri Thomas Project Manager: Traffic Manager: Production Manager: Creative Director: Caelan Stack Dan Cohen Kay Maston Jamie Roberts Project Manager: Product Manager: Marcom Editor: Legal: Evelyn Seto Teri Thomas Printout Scale: 100% Apple Computer 1 Infinite Loop Cupertino, CA 95014 phone: 408 974-1361 Date: 4/8/9 Marcom Date Initials OK ’s Date Initials OK ’s Date Initials OK ’s Apple Confidential Finger Tips Start Here Welcome to iPhone. This Quick Start guide tells you how to set up your iPhone and use its key features. Once you’re up and calling, you can learn even more about iPhone at www.apple.com/iphone. Ready, set up, go. 1. Download iTunes. Go to www.itunes.com/download and download the latest version of iTunes to install on your Mac or PC. 2. Connect to your computer. Connect your iPhone to the USB port on your computer. 3. Sync. When iPhone is connected, iTunes opens and guides you through setup. Select the contacts, calendars, music, videos, and photos you’d like to sync, then click Apply in the lower-right corner. If you’re new to iTunes or syncing, you can watch a quick tutorial at www.apple.com/ itunes/tutorials. Make a call. Tap a phone number in Contacts, Favorites, an email, a text message, or almost anywhere in iPhone to make a call. Or tap the Keypad button to dial manually. To answer a call while using the iPhone headset, press the center button once. Press it again to end your call. Magnify to edit text. Tap the text you want to edit. To reposition the insertion point, touch and hold to bring up the magnifying glass. Slide your finger to move the insertion point, then edit using the keyboard. Send messages. Tap the Messages icon. Type a name or phone number in the To field or select someone from your contacts. Write your message, then tap Send. To send photos, tap the Camera button. To delete or forward all or part of a message, tap Edit. To remove an entire conversation from your Messages list, swipe your finger across it, then tap Delete. Setting up email. To set up an email account directly on your iPhone, tap Add Account in Mail Settings. Then tap the account type you have, or tap Other to configure most any POP3 or IMAP account. Email account settings can also be synced from your Mac or PC using iTunes. Button basics. To turn iPhone on, firmly press the On/Off button. To turn off or restart iPhone, hold down the On/Off button, then slide to confirm. To put iPhone in sleep mode, press the On/Off button once. This turns off the screen but still allows iPhone to receive calls. To silence an incoming call, press once. To send a call directly to voicemail, press twice. Go Home. When using an application, press the Home button to close it and return to the Home screen. Press the Home button again to jump to your main Home screen. While on a call, you can access your email, calendar, or other applications, and even surf the web when you’re connected via Wi-Fi or 3G. Double-click the Home button anytime to go to Favorites. Double-click in sleep mode to bring up iPod controls. Intelligent keyboard. iPhone automatically corrects and suggests words as you type. So if you tap a wrong letter, just keep typing. To accept the suggested word, tap the space bar. Tap the “x” to dismiss the suggested word. The keyboard learns the words you type. It also inserts apostrophes into contractions for you. To switch to the number and symbol keyboard, tap the “.?123” key. Tap the space bar twice to add a period. Cut, copy, and paste. When typing, double-tap a word to select it. Drag the grab points to select more or less text, then tap to cut, copy, or paste. To copy text from web pages, email, or text messages, touch and hold to select the text. To undo an edit, shake iPhone, then tap the Undo button. Ring/Silent Volume Up/Down On/Off Sleep/Wake Status bar HomeThe Duchess is available on iTunes. © 2008 Paramount Vantage, a division of Paramount Pictures. All rights reserved. Google, the Google logo, and Google Maps are trademarks of Google Inc. Tele Atlas® Map data © 2009. All rights reserved. Google, the Google logo, and Google Maps are trademarks of Google Inc. Tele Atlas® Map data © 2009. All rights reserved. © 2009 Apple Inc. All rights reserved. Apple, Cover Flow, iPod, iTunes, Mac, and Safari are trademarks of Apple Inc., registered in the U.S. and other countries. iPhone and Spotlight are trademarks of Apple Inc. App Store is a service mark of Apple Inc. Other product and company names mentioned herein may be trademarks of their respective companies. Designed by Apple in California. Printed in China. 034-4989-A See the web up close. Double-tap any element on a web page— picture or text—to zoom in. Double-tap again to zoom back out. Tap the Multi-page button to flick between multiple web pages or open a new one. Rotate iPhone to see the web in widescreen. Find location. Search surroundings. To see where you are on a map, tap the Location button. A blue circle or dot appears at your current position. Find places around you by typing words like “Starbucks” or “pizza” in the search field. Double-tap to zoom in. Tap once with two fingers to zoom out. Video and song controls. Tap the screen to bring up onscreen controls. Tap again to hide them. Double-tapping a movie switches between widescreen and full screen. When listening to music with the wired headset, press the center button once to pause or play, and press it twice quickly to skip to the next song. Learn more. You can watch demos and learn even more about iPhone features at www.apple.com/ iphone. To read the iPhone User Guide on your iPhone, go to help.apple.com/iphone or the Safari bookmarks. For downloadable versions of the iPhone User Guide and Important Product Information Guide, visit www.apple.com/support/iphone. Get support. Visit www.att.com/WirelessHelp for technical support on network-related services, including Visual Voicemail and billing. Visit www.apple.com/support/ iphone for technical support on iPhone and iTunes. Browse your music in Cover Flow. Rotate iPhone to flick through your album art in Cover Flow. Tap any album to see its track list, then tap any track to play it. Tap outside the track list to flip back to the album artwork. Search with Spotlight. To use Spotlight search, go to the main Home screen and press the Home button or swipe the screen from left to right. Type in what you’d like to find—a name, keywords, song, artist, or movie title. iPhone offers suggestions as you type to make searching even faster. To search within an application like Mail, Contacts, or iPod, tap the status bar. Get directions. In Maps, tap Directions, then enter start and end points. You can use your current location, type in an address, or select an address from your contacts or bookmarked locations. Tap Route to display driving directions. Tap the Walk button for walking directions or the Bus button to view transit routes and times. iPhone can track and show your progress along whichever route you take. View photos. Load your favorite photos onto iPhone from your computer using iTunes or use the built-in camera to take pictures. Flick right or left to move between images. Double-tap or pinch to zoom. Tap once to bring up the onscreen controls. Tap the Action button to send a photo in an MMS or email, use it as wallpaper, or assign it to a contact. Access the App Store. Tap the App Store icon to wirelessly browse tens of thousands of applications in categories like games, business, travel, social networking, and more. Browse by Featured, Categories, or Top 25 or search by name. To purchase and download an application directly to your iPhone, tap Buy Now. Many applications are even free. F Instructions de Remplacement Merci de suivre attentivement ces instructions. Dans le cas contraire, vous pourriez endommager votre matériel et perdre le bénéfice de sa garantie. Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/. Attention : Durant cette opération, veillez à laisser les petites pièces hors de portée des enfants. Outils Requis • Tournevis Torx T10 • Chiffon doux ou serviette Décharge d'Electricité Statique (DES) L'électricité statique, un phénomène normal et naturel, se charge dans votre corps lorsque vous vous déplacez. Une décharge d'électricité statique se produit lorsque vous touchez un objet et ressentez un choc électrique. Les DES peuvent endommager les composants internes de votre ordinateur. Pour les éviter, suivez attentivement ces instructions. Enlèvement de la Partie Centrale de l'Ordinateur du Boîtier Attention : Eteignez toujours votre ordinateur avant de l'ouvrir sous peine d'endommager ses composants internes ou de vous blesser. Après avoir éteint votre ordinateur, ses composants internes peuvent être chauds. Laissez l’ordinateur refroidir avant de poursuivre. 1. Placez votre ordinateur sur une surface propre et lisse. 2. Eteignez votre ordinateur en déroulant le menu Spécial et en choisissant Eteindre. Attendez ensuite cinq minutes afin que les composants internes refroidissent. 3. Débranchez tous les câbles reliés à votre ordinateur à l'exception du cordon d'alimentation. Remarque : Si vous n'avez jamais branché votre ordinateur, branchez-le sur secteur à l'aide du cordon d'alimentation. 4. Déposez l'ordinateur sur le côté sur un chiffon propre et doux et raccordez-vous à la terre en touchant la barre métallique se situant entre les ports vidéo. (Figure 1) Important : Afin d'éviter toute décharge d'électricité statique, raccordez-vous toujours à la terre en touchant la barre métallique avant d'accéder à tout composant interne de votre ordinateur ou d'y installer un composant externe. Pour ne pas recharger votre corps en électricité statique, ne vous déplacez pas dans la pièce avant d'avoir terminé l'installation et refermé l'ordinateur. F073-0842 Rev. A G4 Cube - Top Plate Assembly 1 Couvercle AppleCare5. Débranchez le cordon d'alimentation. 6. Retournez l'ordinateur à l'envers et poussez le loquet vers le bas pour le libérer. Déployez complètement le loquet. (Figure 2) 7. Enlevez doucement la partie centrale de l'ordinateur de son boîtier et placez-la sur un chiffon doux. (Figure 3) 2 G4 Cube - Top Plate Assembly F073-0842 Rev. A Touch Bare Metal Latch Extended Latch Core Enclosure Touch Bare Metal : Touchez Barre Métallique Latch : Loquet Extended Latch : Loquet Déployé Core : Partie Centrale Enclosure : Boîtier Figure 1 Figure 2 Figure 3Dépose du couvercle 1. Appuyez sur le loquet et renversez le bloc central de sorte que le bouton d'alimentation se trouve en haut. 2. Enlevez les quatre vis d'angle qui permettent de fixer le couvercle sur les quatre montants verticaux. 3. Enlevez les quatre vis situées sur les deux côtés. (Les deux vis alignées avec les plaques verticales sont bien plus longues que les autres.) (Figure 4) 4. Soulevez le couvercle de la diode qui se trouve sur le témoin lumineux d'alimentation. Conservez-le en vue de le réinsérer ultérieurement sur le couvercle de rechange. (Figure 5) F073-0842 Rev. A G4 Cube - Top Plate Assembly 3 Figure 4 Figure 5 Long Screws : Vis longues LED Cover : Couvercle de la diode5. Soulevez le couvercle avec précaution et débranchez le connecteur à détrompage ( J1 sur la carte logique). (Figure 6) Installation du couvercle de rechange 1. Avec le couvercle dans une main, connectez le câble branché dessus au connecteur J1 sur la carte logique. (Figure 7) Avertissement : Pour éviter d'endommager la carte d'alimentation, assurez-vous que le connecteur à détrompage rentre parfaitement dans le connecteur J1, comme illustré. 2. Replacez le couvercle de diode sur le témoin lumineux d'alimentation qui se trouve sur le couvercle de rechange. 4 G4 Cube - Top Plate Assembly F073-0842 Rev. A Figure 6 Figure 7 Top Plate Assembly : Couvercle J1 at Logic Board : J1 sur la carte logique Keyed Side of Connector : Phase du connecteur comportant le détrompeur 3. Placez le couvercle sur le bloc central de l'ordinateur. Assurez-vous que les quatre languettes métalliques sont alignées avec les quatre trous du couvercle, et que le panneau du DVD-ROM est parfaitement inséré sous le bord. (Figure 8) 4. En commençant par les quatre vis d'angle, fixez le couvercle sur le bloc central à l'aide des huit vis. Réinsertion du bloc central de l'ordinateur dans le nouveau boîtier 1. Assurez-vous que le joint plat du bouton d'alimentation est correctement inséré dans l'encastrement du boîtier prévu à cet effet. (Figure 9) F073-0842 Rev. A G4 Cube - Top Plate Assembly 5 Figure 8 Figure 9 Top Plate : Couvercle Slots : Logements Panel : Panneau Gasket : Joint plat 2. Tenez la partie centrale par le loquet et insérez-la dans le boîtier. (Figure 10) Remarque : La partie centrale ne peut se placer dans le boîtier que d'une seule façon. Positionnez la partie centrale de façon à ce que les ports soient en regard de l'arrière du boîtier. 3. Tenez votre main à plat et poussez le loquet vers le bas jusqu'à ce qu'il se bloque en position. Appuyez ferment sur la partie centrale pour vous assurer qu'elle est parfaitement en place dans le boîtier. (Figure 11) Important : Il est déconseillé de soulever ou de déplacer votre ordinateur en le tenant par le loquet. Le boîtier pourrait se séparer de la partie centrale et s'endommager. 4. Remettez votre ordinateur à l'endroit et reconnectez tous les câbles. 5. Redémarrez votre ordinateur. Attention : N'allumez jamais votre ordinateur avant que tous ses composants internes et externes ne soient en place et qu'il soit fermé. Le fait d'utiliser un ordinateur qui est ouvert ou ne comprenant pas l'ensemble de ses composants peut l'endommager et occasionner des blessures. 6 G4 Cube - Top Plate Assembly F073-0842 Rev. A Core Enclosure Core : Partie Centrale Enclosure : Boîtier Figure 10 Latch Latch : Loquet Figure 11 Apple Computer, Inc. © 2001Apple Computer, Inc. Tous droits réservés. Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option-Maj-K) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale. Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression. Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014-2084 USA + 1 408 996 1010 http://www.apple.com Apple, le logo Apple, AirPort et Power Mac sont des marques d'Apple Computer, Inc., déposées aux Etats-Unis et dans d'autres pays. F073-0842 Rev. A G4 Cube - Top Plate Assembly 7 F Instructions de Remplacement Merci de suivre attentivement ces instructions. Dans le cas contraire, vous pourriez endommager votre matériel et perdre le bénéfice de sa garantie. Le remplacement de la pile nécessite cinq étapes simples : • Extinction de l'ordinateur. • Extraction de la partie centrale du boîtier. • Enlevez la pile installée. • Installez la pile de remplacement. • Réinsertion de la partie centrale de l'ordinateur dans le boîtier. Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/. Outils Requis Aucun outil n'est requis pour cette procédure. Décharge d'Electricité Statique (DES) L'électricité statique, un phénomène normal et naturel, se charge dans votre corps lorsque vous vous déplacez. Une décharge d'électricité statique se produit lorsque vous touchez un objet et ressentez un choc électrique. Les DES peuvent endommager les composants internes de votre ordinateur. Pour les éviter, suivez attentivement ces instructions. Enlèvement de la Partie Centrale de l'Ordinateur du Boîtier Attention : Eteignez toujours votre ordinateur avant de l'ouvrir sous peine d'endommager ses composants internes. 1. Placez votre ordinateur sur une surface propre et lisse. 2. Eteignez votre ordinateur en déroulant le menu Spécial et en choisissant Eteindre. Attendez ensuite cinq minutes afin que les composants internes refroidissent. 3. Débranchez tous les câbles reliés à votre ordinateur à l'exception du cordon d'alimentation. Remarque : Si vous n'avez jamais branché votre ordinateur, branchez-le sur secteur à l'aide du cordon d'alimentation. 4. Déposez l'ordinateur sur le côté sur un chiffon propre et doux et raccordez-vous à la terre en touchant la barre métallique se situant entre les ports vidéo. Important : Afin d'éviter toute décharge d'électricité statique, raccordez-vous toujours à la terre en touchant la barre métallique avant d'accéder à tout composant interne de votre ordinateur ou d'y installer un composant externe. Pour ne pas recharger votre corps en électricité statique, ne vous déplacez pas dans la pièce avant d'avoir terminé l'installation et refermé l'ordinateur. F073-0542 G4 Cube - Battery 1 Pile AppleCare5. Débranchez le cordon d'alimentation. 6. Retournez l'ordinateur à l'envers et poussez le loquet vers le bas pour le libérer. Déployez complètement le loquet. 7. Enlevez doucement la partie centrale de l'ordinateur de son boîtier et placez-la sur un chiffon doux. 2 G4 Cube - Battery F073-0542 Touch Bare Metal Latch Extended Latch Core Enclosure Touch Bare Metal : Touchez Barre Métallique Latch : Loquet Extended Latch : Loquet Déployé Core : Partie Centrale Enclosure : BoîtierRemplacement de la Pile 1. Notez l'orientation de la borne positive (+) de la pile installée. (Les signes positif et négatif peuvent également être marqués sur le réceptacle de la pile.) 2. Placez votre doigt entre la borne positive de la pile et son réceptacle. Tirez doucement la pile hors de son réceptacle puis de l'ordinateur. Attention : Les piles contiennent des produits chimiques pouvant porter préjudice à l'environnement. Merci de vou débarrasser des piles usagées selon la législation locale en vigueur. 3. Insérez la nouvelle pile dans le réceptacle, en vous assurant que ses bornes positive et négative soient en phase par rapport à celles du réceptacle. Attention : Une installation inappropriée de la pile peut causer une explosion. Assurez-vous que les bornes positive et négative soient correctement orientées dans le réceptacle. Utilisez uniquement la pile fournie dans ce kit. Replacer la Partie Centrale dans le Boîtier 1. Tenez la partie centrale par le loquet et insérez-la dans le boîtier. Remarque : La partie centrale ne peut se placer dans le boîtier que d'une seule façon. Positionnez la partie centrale de façon à ce que les ports soient en regard de l'arrière du boîtier. F073-0542 G4 Cube - Battery 3 Battery Positive End Core Enclosure Core : Partie Centrale Enclosure : Boîtier Positive End : Borne Positive Battery : Batterie2. Tenez votre main à plat et poussez le loquet vers le bas jusqu'à ce qu'il se bloque en position. Appuyez ferment sur la partie centrale pour vous assurer qu'elle est parfaitement en place dans le boîtier. Important : Il est déconseillé de soulever ou de déplacer votre ordinateur en le tenant par le loquet. Le boîtier pourrait se séparer de la partie centrale et s'endommager. 3. Remettez votre ordinateur à l'endroit et reconnectez tous les câbles. 4. Redémarrez votre ordinateur. Attention : N'allumez jamais votre ordinateur avant que tous ses composants internes et externes ne soient en place et qu'il soit fermé. Le fait d'utiliser un ordinateur qui est ouvert ou ne comprenant pas l'ensemble de ses composants peut l'endommager et occasionner des blessures. Réinitialisation de la Date et de l'Heure Le remplacement de la pile modifie les réglages de la date et de l'heure de votre ordinateur. Utilisez le tableau de bord Date & Heure pour régler la date et l'heure.  Apple Computer, Inc. © 2001Apple Computer, Inc. Tous droits réservés. Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions intern tionales applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option-Maj-K) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale. Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impre sion. Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014-2084 USA + 1 408 996 1010 http://www.apple.com Apple, le logo Apple, AirPort et Power Mac sont des marques d'Apple Computer, Inc., déposées aux Etats-Unis et dans d'autres pays. 4 G4 Cube - Battery F073-0542 Latch Latch : Loquet F Instructions de Remplacement Merci de suivre attentivement ces instructions. Dans le cas contraire, vous pourriez endommager votre matériel et perdre le bénéfice de sa garantie. Le changement du boîtier de l'ordinateur s'effectue en trois temps : • Extinction de l'ordinateur. • Extraction de la partie centrale du boîtier. • Réinsertion du bloc central de l'ordinateur dans le nouveau boîtier. Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/. Outils Requis Aucun outil n'est requis pour cette procédure. Décharge d'Electricité Statique (DES) L'électricité statique, un phénomène normal et naturel, se charge dans votre corps lorsque vous vous déplacez. Une décharge d'électricité statique se produit lorsque vous touchez un objet et ressentez un choc électrique. Les DES peuvent endommager les composants internes de votre ordinateur. Pour les éviter, suivez attentivement ces instructions. Enlèvement de la Partie Centrale de l'Ordinateur du Boîtier Attention : Eteignez toujours votre ordinateur avant de l'ouvrir sous peine d'endommager ses composants internes. 1. Placez votre ordinateur sur une surface propre et lisse. 2. Eteignez votre ordinateur en déroulant le menu Spécial et en choisissant Eteindre. Attendez ensuite cinq minutes afin que les composants internes refroidissent. 3. Débranchez tous les câbles reliés à votre ordinateur à l'exception du cordon d'alimentation. Remarque : Si vous n'avez jamais branché votre ordinateur, branchez-le sur secteur à l'aide du cordon d'alimentation. 4. Déposez l'ordinateur sur le côté sur un chiffon propre et doux et raccordez-vous à la terre en touchant la barre métallique se situant entre les ports vidéo. Important : Afin d'éviter toute décharge d'électricité statique, raccordez-vous toujours à la terre en touchant la barre métallique avant d'accéder à tout composant interne de votre ordinateur ou d'y installer un composant externe. Pour ne pas recharger votre corps en électricité statique, ne vous déplacez pas dans la pièce avant d'avoir terminé l'installation et refermé l'ordinateur. F073-0545 G4 Cube - Computer Enclosure 1 Boîtier de l'ordinateur AppleCare5. Débranchez le cordon d'alimentation. 6. Retournez l'ordinateur à l'envers et poussez le loquet vers le bas pour le libérer. Déployez complètement le loquet. 7. Enlevez doucement la partie centrale de l'ordinateur de son boîtier et placez-la sur un chiffon doux. 2 G4 Cube - Computer Enclosure F073-0545 Touch Bare Metal Latch Extended Latch Core Enclosure Touch Bare Metal : Touchez Barre Métallique Latch : Loquet Extended Latch : Loquet Déployé Core : Partie Centrale Enclosure : BoîtierRéinsertion du bloc central de l'ordinateur dans le nouveau boîtier 1. Tenez la partie centrale par le loquet et insérez-la dans le boîtier. Remarque : La partie centrale ne peut se placer dans le boîtier que d'une seule façon. Positionnez la partie centrale de façon à ce que les ports soient en regard de l'arrière du boîtier. 2. Tenez votre main à plat et poussez le loquet vers le bas jusqu'à ce qu'il se bloque en position. Appuyez ferment sur la partie centrale pour vous assurer qu'elle est parfaitement en place dans le boîtier. Important : Il est déconseillé de soulever ou de déplacer votre ordinateur en le tenant par le loquet. Le boîtier pourrait se séparer de la partie centrale et s'endommager. 3. Remettez votre ordinateur à l'endroit et reconnectez tous les câbles. 4. Redémarrez votre ordinateur. Attention : N'allumez jamais votre ordinateur avant que tous ses composants internes et externes ne soient en place et qu'il soit fermé. Le fait d'utiliser un ordinateur qui est ouvert ou ne comprenant pas l'ensemble de ses composants peut l'endommager et occasionner des blessures. F073-0545 G4 Cube - Computer Enclosure 3 Core Enclosure Core : Partie Centrale Enclosure : Boîtier Latch Latch : Loquet Apple Computer, Inc. © 2001Apple Computer, Inc. Tous droits réservés. Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option-Maj-K) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale. Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression. Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014-2084 USA + 1 408 996 1010 http://www.apple.com Apple, le logo Apple, AirPort et Power Mac sont des marques d'Apple Computer, Inc., déposées aux Etats-Unis et dans d'autres pays. 4 G4 Cube - Computer Enclosure F073-0545 Instructions de Remplacement Merci de suivre attentivement ces instructions. Dans le cas contraire, vous pourriez endommager votre matériel et perdre le bénéfice de sa garantie. Outils Requis • Tournevis cruciforme. Décharge d'Electricité Statique (DES) L'électricité statique, un phénomène normal et naturel, se charge dans votre corps lorsque vous vous déplacez. Une décharge d'électricité statique se produit lorsque vous touchez un objet et ressentez un choc électrique. Les DES peuvent endommager les composants internes de votre ordinateur. Pour les éviter, ne vous déplacez pas dans la pièce pendant cette procédure et suivez attentivement les instructions concernant la décharge d'électricité statique. Enlèvement du Clavier Installé 1. Placez votre ordinateur sur une surface propre et lisse. 2. Eteignez l'ordinateur, enlevez les modules des baies d’extension et déconnectez l'adaptateur secteur. Attention : Eteignez toujours votre ordinateur avant de l'ouvrir sous peine d'endommager ses composants internes. Les composants internes de votre PowerBook peuvent être chauds. Si vous avez utilisé votre PowerBook, attendez 30 minutes après son extinction pour laisser les composants internes refroidir avant de poursuivre. 3. Assurez-vous que les vis de blocage du clavier ne soient pas en position bloquée. Un nouveau PowerBook est livré clavier débloqué. Par conséquent, à moins que vous ou quelqu'un d'autre n'ait bloqué le clavier, vous pouvez passer cette étape. E081-1244 Rev. A PowerBook (Firewire) - Backup Battery 1 Pile Interne AppleCare4. Libérez le clavier en le tirant vers le bas pour dégager ses attaches (situées à gauche des touches F1 et F9) jusqu'à ce que sa partie haute se libère. 5. Soulevez la partie haute du clavier du PowerBook en direction de la rangée supérieure de touches et tirez-le en arrière suffisamment loin pour libérer les petites attaches retenant l'arrière du clavier en place. 6. Retournez le clavier et déposez-le sur le repose-mains. 7. Afin d'éviter les décharges d'électricité statique, touchez une surface métallique à l'intérieur de l'ordinateur. 8. Déconnectez la pile interne de la carte mère et sortez-la de son emplacement. 2 PowerBook (Firewire) - Backup Battery E081-1244 Rev. AInstallation de la Pile Interne de Remplacement 1. Insérez la pile interne dans son emplacement et connectez-la à la carte mère. 2. Remettez le clavier à l'endroit et insérez les petites attaches de l'arrière du clavier dans les ouvertures du boîtier du PowerBook. 3. Tirez vers le bas les attaches de dégagement du clavier (situées à gauches des touches F1 et F9) et poussez vers le bas la partie supérieure du clavier. 4. Laissez s'enclencher les attaches de libération du clavier pour qu'il se mette bien en place. 5. Réinstallez la batterie du PowerBook ou branchez l'adaptateur secteur. Attention : N'allumez jamais l'ordinateur avant que tous ses composants internes et externes soient en place et que l'ordinateur soit correctement refermé. L'utilisation d'un ordinateur ouvert ou incomplet peut l'endommager et occasionner des blessures. 6. Redémarrez l'ordinateur.  Apple Computer, Inc. © 2002 Apple Computer, Inc. Tous droits réservés. Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option-Maj-K) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale. Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression. Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014-2084 USA + 1 408 996 1010 http://www.apple.com Apple, le logo Apple, FireWire et PowerBook sont des marques d'Apple Computer, Inc., déposées aux Etats-Unis et dans d'autres pays. E081-1244 Rev. A PowerBook (Firewire) - Backup Battery 3 Instructions de remplacement Respectez scrupuleusement les instructions de ce document. À défaut, vous risquez de détériorer votre matériel et d’invalider sa garantie. Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/. Avertissement : Durant cette procédure, mettez les petites pièces hors de portée des enfants. Avertissement : Il existe des bords tranchants à l’intérieur de l’ordinateur. Soyez vigilant. Outils requis Aucun outil n’est requis pour cette procédure. Ouverture de l’ordinateur Avertissement : Éteignez systématiquement l’ordinateur avant de l’ouvrir afin d’éviter d’endommager ses composants internes et de vous blesser. Après extinction, les composants internes risquent d’être très chauds. Attendez qu’ils refroidissent avant de poursuivre. 1. Placez l’ordinateur sur une surface propre et plane. 2. Si vous pensez que le mode Suspension d’activité est déclenché, appuyez sur le bouton d’alimentation en façade pour réactiver l’ordinateur. 3. Éteignez l’ordinateur et patientez cinq minutes avant de poursuivre. 4. Si vous avez installé un câble antivol, retirez-le. 5. Débranchez tous les autres câbles connectés à l’ordinateur, à l’exception du cordon d’alimentation. 1 Power Mac G4 (QuickSilver 2002) - ATA Cable F073-0566 Rev. B Cable ATA AppleCare6. Touchez les caches métalliques des connecteurs PCI, à l’arrière de l’ordinateur. (Figure 1) Important : Agissez toujours de même avant de toucher un élément ou d’installer un composant à l’intérieur de l’ordinateur. Pour éviter d’accumuler de l’électricité statique, ne vous déplacez pas dans la pièce avant d’avoir achevé l’installation et refermé l’ordinateur. 7. Débranchez le cordon d’alimentation. Avertissement : Ne branchez jamais le cordon d’alimentation et ne mettez jamais l’ordinateur sous tension tant que les composants internes et externes ne sont pas tous en place et que le capot est ouvert. En transgressant ces règles, vous risqueriez d’endommager l’ordinateur ou de vous blesser. Assurez-vous que le cordon d’alimentation reste débranché jusqu’à la fin de la procédure, tant que l’ordinateur n’est pas refermé. Avertissement : Le bloc d’alimentation de votre ordinateur est un composant haute tension à n’ouvrir sous aucun prétexte, même lorsque l’ordinateur est éteint. S’il nécessite une intervention, contactez votre revendeur Apple ou votre Société de maintenance agréée Apple. 8. Soulevez le loquet situé sur le panneau latéral droit. 9. Abaissez délicatement le panneau latéral jusqu’à ce qu’il repose à plat. Afin de ne pas érafler le boîtier, prévoyez un linge doux et propre. Avertissement : Si des voyants sont allumés sur la carte mère, cela signifie que l’ordinateur n’est pas éteint. Refermez le panneau d’accès latéral et éteignez l’ordinateur avant de poursuivre. F073-0566 Rev. B Power Mac G4 (QuickSilver 2002) - ATA Cable 2 Figure 1Enlèvement du câble ATA 1. Déconnectez le câble ATA de la carte mère. (Figure 2A) 2. Déconnectez le câble ATA du disque dur (Figure 2B) et enlevez le câble de l’ordinateur. Remarque : Débarrassez-vous de ce câble ; ne le retournez pas à Apple. Installation du câble ATA de remplacement 1. Connectez le câble ATA de remplacement au disque dur. Remarque : Si vous connectez le câble à deux disques installés dans le berceau, fixez le connecteur situé à l’extrémité du câble sur le disque du bas. 2. Connectez l’autre extrémité du câble ATA à la carte mère. 3 Power Mac G4 (QuickSilver 2002) - ATA Cable F073-0566 Rev. B A B Figure 2Fermeture de l’ordinateur 1. Relevez le panneau d’accès latéral, soulevez le loquet et pressez le panneau contre le boîtier jusqu’à ce qu’il s’enclenche. 2. Rebranchez tous les câbles et faites démarrer l’ordinateur. Avertissement : Ne mettez jamais l’ordinateur sous tension tant que ses composants internes et externes ne sont pas tous en place et que le capot est ouvert. En transgressant ces règles, vous risqueriez d’endommager l’ordinateur ou de vous blesser.  Apple Computer, Inc. © 2002 Apple Computer, Inc. Tous droits réservés. Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option - I) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale. Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression. Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014-2084 USA + 1 408 996 1010 http://www.apple.com Apple, le logo Apple, Mac, Macintosh et le logo Mac sont des marques d’Apple Computer Inc., déposées aux États-Unis et dans d’autres pays. Power Mac est une marque d’Apple Computer, Inc. F073-0566 Rev. B Power Mac G4 (QuickSilver 2002) - ATA Cable 4 Instructions de remplacement Respectez scrupuleusement les instructions de ce document. À défaut, vous risquez de détériorer votre matériel et d’invalider sa garantie. Remarque: Des instructions sont disponibles en ligne à l’adresse http://www.apple.com/support/doityourself/. Avertissement : Durant cette procédure, mettez les petites pièces hors de portée des enfants. Avertissement : Il existe des bords tranchants à l’intérieur de l’ordinateur. Soyez vigilant. Outils requis • Tournevis cruciforme • Pince Ouverture de l’ordinateur Avertissement : Éteignez systématiquement l’ordinateur avant de l’ouvrir afin d’éviter d’endommager ses composants internes et de vous blesser. Après extinction, les composants internes risquent d’être très chauds. Attendez qu’ils refroidissent avant de poursuivre. 1. Placez l’ordinateur sur une surface propre et plane. 2. Si vous pensez que le mode Suspension d’activité est déclenché, appuyez sur le bouton d’alimentation en façade pour réactiver l’ordinateur. 3. Éteignez l’ordinateur et patientez cinq minutes avant de poursuivre. 4. Si vous avez installé un câble antivol, retirez-le. 5. Débranchez tous les autres câbles connectés à l’ordinateur, à l’exception du cordon d’alimentation. 1 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Video Card F073-0562 Rev. G Carte Vidéo AppleCare6. Touchez les caches métalliques des connecteurs PCI, à l’arrière de l’ordinateur. (Figure 1) Important : Agissez toujours de même avant de toucher un élément ou d’installer un composant à l’intérieur de l’ordinateur. Pour éviter d’accumuler de l’électricité statique, ne vous déplacez pas dans la pièce avant d’avoir achevé l’installation et refermé l’ordinateur. 7. Débranchez le cordon d’alimentation. Avertissement : Ne branchez jamais le cordon d’alimentation et ne mettez jamais l’ordinateur sous tension tant que les composants internes et externes ne sont pas tous en place et que le capot est ouvert. En transgressant ces règles, vous risqueriez d’endommager l’ordinateur ou de vous blesser. Assurez-vous que le cordon d’alimentation reste débranché jusqu’à la fin de la procédure, tant que l’ordinateur n’est pas refermé. Avertissement : Le bloc d’alimentation de votre ordinateur est un composant haute tension à n’ouvrir sous aucun prétexte, même lorsque l’ordinateur est éteint. S’il nécessite une intervention, contactez votre revendeur Apple ou votre Société de maintenance agréée Apple. 8. Soulevez le loquet situé sur le panneau latéral droit. 9. Abaissez délicatement le panneau latéral jusqu’à ce qu’il repose à plat. Afin de ne pas érafler le boîtier, prévoyez un linge doux et propre. Avertissement : Si des voyants sont allumés sur la carte mère, cela signifie que l’ordinateur n’est pas éteint. Refermez le panneau d’accès latéral et éteignez l’ordinateur avant de poursuivre. F073-0562 Rev. G Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Video Card 2 Figure 1 Power Mac G4 (QuickSilver 2002) Power Mac G4 (Mirrored Drive Doors_FW 800)Dépose de la Carte installée Important : Les cartes vidéo sont soit des cartes AGP (Accelerated Graphics Port) soit des cartes PCI (Peripheral Component Interconnect). Ces cartes s’encastrent dans des connecteurs d’extension situés sur la carte mère. Les étapes pour remplacer ces deux types de cartes sont identiques. Toutefois, les cartes AGP doivent être installées dans le petit connecteur 1 (Figure 2A), alors que les cartes PCI doivent être installées dans les connecteurs d’extension PCI longs. (Figure 2B) 1. A l’aide d’un tournevis cruciforme, enlevez la vis de fixation de la carte. (Figure 2C) 2. Si vous remplacez une carte vidéo PCI, tirez doucement la carte et enlevez-la de son connecteur d’extension PCI. 3. Si vous remplacez une carte vidéo AGP, abaissez le loquet de la carte vidéo qui retient le clip pour dégager la carte. Ensuite, tirez la carte vers le haut et enlevez-la du connecteur d’extension AGP. (Figure 3) Avertissement : Pour éviter d’endommager la carte mère ou le connecteur AGP, n’imprimez pas un mouvement de bascule à la carte lors de son enlèvement. Sortez-la du connecteur en la levant tout droit. 3 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Video Card F073-0562 Rev. G Figure 2 Power Mac G4 (QuickSiver 2002_Mirrored Drive Doors_FW 800) Figure 3Installation de la carte de remplacement 1. Sortez la carte vidéo de remplacement de son emballage anti-statique et tenez-la par les coins en évitant de toucher le connecteur doré ou tout autre composant de la carte. 2. Si une carte de remplacement ne possède pas de barre d’appui, encastrez la barre d’appui fournie dans le coffret. A l’aide d’un tournevis cruciforme, installez les deux petites vis Phillips : (Figure 4A) de chaque côté du connecteur ADC et les deux grandes vis Phillips (Figure 4B) sur les deux loquets de la barre d’appui. A l’aide d’une pince, vissez les deux écrous jack-nut (Figure 4C) de chaque côté du connecteur VGA. 3. Alignez le connecteur de la carte sur son connecteur d’extension et appuyez vers le bas jusqu’à ce que la carte soit complètement insérée dans le connecteur. • N’imprimez pas un mouvement de bascule à la carte, mais enfoncez-la directement dans le connecteur. • Ne forcez pas sur la carte. Si vous faites face à beaucoup de résistance, retirez la carte. Inspectez le connecteur afin de trouver d’éventuels dégâts ou obstacles, puis essayez d’insérer la carte à nouveau. • Tirez doucement la carte pour voir si elle est correctement connectée. Si elle résiste, reste en place et si ses connecteurs dorés sont à peine visibles, la carte est bien connectée. 4. Replacez la vis de fixation de la carte et vissez-la pour immobiliser la carte. F073-0562 Rev. G Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Video Card 4 C A B B Figure 4Fermeture de l’ordinateur 1. Vérifiez que vous avez réinstallé toutes les vis et que tous les câbles internes sont connectés. 2. Relevez le panneau d’accès latéral, soulevez le loquet et pressez le panneau contre le boîtier jusqu’à ce qu’il s’enclenche. 3. Rebranchez tous les câbles et faites démarrer l’ordinateur. Avertissement : Ne mettez jamais l’ordinateur sous tension tant que ses composants internes et externes ne sont pas tous en place et que le capot est ouvert. En transgressant ces règles, vous risqueriez d’endommager l’ordinateur ou de vous blesser.  Apple Computer, Inc. © 2003 Apple Computer, Inc. Tous droits réservés. Ce manuel est protégé par la loi du 11 mars 1957 sur la propriété littéraire et artistique, complétée par la loi du 3 juillet 1985 et par toutes les conventions internationales applicables aux droits d’auteurs. En vertu de ces lois et conventions, aucune reproduction totale ni partielle de ce manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Le logo Apple est une marque d’Apple Computer Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option - I) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale. Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression. Apple Computer, Inc. 1 Infinite Loop Cupertino, CA 95014-2084 USA + 1 408 996 1010 http://www.apple.com Apple, le logo Apple, Mac, Macintosh et le logo Mac sont des marques d’Apple Computer Inc., déposées aux États-Unis et dans d’autres pays. Power Mac est une marque d’Apple Computer, Inc. 5 Power Mac G4 (QuickSilver 2002_Mirrored Drive Doors_FW 800) - Video Card F073-0562 Rev. G AirPort Express Guide de configuration3 Table des matières 5 Chapitre 1 : Premiers contacts 6 À propos de l’AirPort Express 8 À propos du logiciel AirPort 8 Ce qu’il vous faut pour commencer 10 Branchement de l’AirPort Express 11 Voyants d’état de la borne AirPort Express 12 Étape suivante 13 Chapitre 2 : Utilisation de la borne AirPort Express 13 Utilisation de l’AirPort Express avec votre connexion Internet à large bande 15 Utilisation de l’AirPort Express avec AirTunes pour lire des morceaux de musique d’iTunes sur votre chaîne stéréo 16 Utilisation de l’AirPort Express sur un réseau sans fil existant pour diffuser de la musique sur votre chaîne stéréo 21 Utilisation de l’AirPort Express pour le partage d’une imprimante USB 22 Extension de la portée d’un réseau AirPort Extreme ou AirPort Express existant 24 Utilisation d’AirPort Express avec votre réseau AirPort Extreme 25 Chapitre 3 : Configuration de l’AirPort Express 27 Utilisation de l’Utilitaire AirPort4 Table des matières 29 Création d’un nouveau réseau sans fil 29 Configuration et partage de l’accès à Internet 31 Connexion à un réseau sans fil existant 32 Extension de la portée d’un réseau AirPort Extreme ou AirPort Express existant 33 Réglage des options avancées 35 Chapitre 4 : AirPort Express en déplacement 39 Chapitre 5 : Astuces et dépannage 45 Considérations sur le placement de l’AirPort Express 46 Éléments pouvant provoquer des interférences avec Airport 47 Chapitre 6 : En savoir plus, service après-vente et support 47 Ressources en ligne 48 Aide en ligne 48 Obtention d’un service de garantie 48 Où trouver le numéro de série de votre AirPort Express 49 Annexe : Caractéristiques de l’AirPort Express 50 Astuces de sécurité de l’AirPort Express 51 Évitez les endroits humides 52 N’effectuez pas vous-même les réparations 52 À propos de la manipulation 53 Regulatory Compliance Information1 5 1 Premiers contacts Félicitations pour l’achat de votre AirPort Express. Lisez ce guide pour commencer à l’utiliser. Vous pouvez utiliser l’AirPort Express pour partager votre accès à Internet à large bande avec des ordinateurs sans fil sur votre réseau, écouter de la musique iTunes sur votre chaîne stéréo et bien plus encore. Votre AirPort Express est livrée avec AirTunes, un logiciel permettant de lire des morceaux de musique d’iTunes à travers des haut-parleurs distants. Grâce à la borne AirPort Express, vous pouvez :  Créer un réseau sans fil à votre domicile, puis vous connecter à Internet et partager la connexion avec simultanément jusqu’à 10 ordinateurs. Tous les membres d’une famille peuvent, de cette manière, se connecter en même temps à Internet.  Connecter l’AirPort Express à votre chaîne stéréo ou à vos haut-parleurs sous tension et utiliser AirTunes pour lire vos morceaux de musique d’iTunes sur votre chaîne à partir d’un ordinateur Macintosh équipé d’une carte AirPort ou AirPort Extreme, ou d’un ordinateur sans fil compatible sous Windows XP ou Windows 2000.  Configurer une connexion sans fil vers votre réseau Ethernet. Les ordinateurs Macintosh équipés d’une carte AirPort et AirPort Extreme ou les ordinateurs Windows XP ou Windows 2000 ont alors accès à l’ensemble du réseau sans être reliés par un câble.6 Chapitre 1 Premiers contacts  Étendre la portée de votre réseau en ajoutant l’AirPort Express à votre réseau sans fil AirPort Extreme ou AirPort Express existant (ce que l’on appelle un système de distribution sans fil, ou WDS).  Connecter une imprimante USB à votre AirPort Express. Tous les ordinateurs compatibles du réseau AirPort, qu’ils soient avec ou sans fil, peuvent imprimer sur cette imprimante.  Créer des profils personnalisés afin de pouvoir stocker les réglages de cinq emplacements différents. Emportez AirPort Express partout et connectez-vous rapidement aux réseaux large bande, comme ceux que l’on trouve parfois dans les chambres d’hôtel. À propos de l’AirPort Express L’AirPort Express possède trois ports, situés sur la partie inférieure :  un port Ethernet (G) pour connecter un modem DSL ou câble, ou pour se connecter à un réseau Ethernet existant ;  un mini-jack audio stéréo numérique analogique et optique (-) pour connecter l’AirPort Express à une chaîne stéréo ou à des haut-parleurs ;Chapitre 1 Premiers contacts 7  un port USB (d) pour brancher une imprimante compatible à AirPort Express. À côté des ports se trouve un bouton de réinitialisation, utilisé pour le dépannage de votre AirPort Express. Sur le côté de la borne AirPort Express, le voyant d’état affiche l’état actuel. Voyant d’état Port USB Adaptateur pour prise CA Bouton de réinitialisation Port Ethernet Port de sortie (mini-jack audio numérique optique et analogique)8 Chapitre 1 Premiers contacts À propos du logiciel AirPort L’AirPort Express utilise le logiciel AirPort livré sur le CD de l’AirPort Express. Ce qu’il vous faut pour commencer Pour configurer l’AirPort Express à l’aide d’un Macintosh, vous devez disposer des éléments suivants :  Un ordinateur Macintosh avec une carte AirPort ou AirPort Extreme installée  Mac OS X 4 ou ultérieur Utilitaire AirPort L’utilitaire AirPort vous aide à configurer votre AirPort Express pour créer un réseau sans fil, à vous connecter à Internet et à partager une imprimante USB. Vous pouvez également connecter de votre AirPort Express à votre réseau sans fil AirPort Extreme ou AirPort Express existant pour étendre la portée de votre réseau grâce à WDS. Utilisez l’utilitiare AirPort pour configurer rapidement et facilement votre AirPort Express et votre réseau sans fil. L’Utilitaire AirPort est également un outil sophistiqué permettant de configurer et de gérer les bornes d’accès AirPort Extreme et AirPort Express. Employez l’Utilitaire AirPort pour définir les réglages de réseau, de routage et de sécurité, ainsi que d’autres options avancées. Menu d’état d’AirPort de la barre des menus Le menu d’état d’AirPort vous permet de passer instantanément d’un réseau AirPort à l’autre, de contrôler la qualité du signal du réseau sélectionné, de créer un réseau « ordinateur à ordinateur » et d’activer ou de désactiver AirPort. Le menu d’état est disponible sur les ordinateurs utilisant Mac OS X. ZChapitre 1 Premiers contacts 9 Pour configurer l’AirPort Express à l’aide d’un PC Windows, vous devez disposer des éléments suivants :  Un PC Windows doté d’une vitesse de processeur de 300 MHz ou supérieure  Windows XP Familial ou Professionel Vous devez disposer d’iTunes pour la lecture audio depuis votre ordinateur sur une chaîne stéréo connectée à la borne AirPort Express. Pour être certain de posséder la dernière version d’iTunes, rendez-vous sur le site www.apple.com/fr/itunes. Vous pouvez utiliser la borne AirPort Express avec n’importe quel ordinateur utilisant une technologie sans fil conforme à la norme IEEE 802.11b ou 802.11g. Pour pouvoir configurer l’AirPort Express, votre ordinateur doit répondre à toutes les conditions mentionnées ci-dessus.10 Chapitre 1 Premiers contacts Branchement de l’AirPort Express Avant de brancher votre AirPort Express, branchez tout d’abord les câbles appropriés dans les ports que vous souhaitez utiliser, notamment le câble Ethernet connecté à votre modem DSL ou câble (si vous souhaitez vous connecter à Internet), le câble audio connecté à votre chaîne stéréo (si vous souhaitez utiliser AirTunes pour écouter de la musique grâce à iTunes) et un câble USB connecté à une imprimante USB compatible (si vous souhaitez utiliser une imprimante USB). Après avoir branché les câbles de tous les périphériques que vous prévoyez d’utiliser, branchez si besoin un adaptateur pour prise CA. Branchez l’AirPort Express à une prise murale. Il n’y a pas d’interrupteur. Adaptateur pour prise CAChapitre 1 Premiers contacts 11 Lorsque vous branchez l’AirPort Express à une prise murale, le voyant d’état vert clignote et devient de couleur ambre pendant le démarrage. Une fois que le démarrage est complètement terminé, le voyant d’état reste vert mais ne clignote plus. Voyants d’état de la borne AirPort Express Le tableau ci-dessous répertorie les séquences des voyants lumineux de l’AirPort Express et explique ce qu’ils indiquent. Voyant État/Description Éteint L’AirPort Express est débranchée. Vert clignotant L’AirPort Express est en train de démarrer. Remarque : en sélectionnant Clignotement en cas d’activité dans le menu local Voyant d’état qui se trouve dans la sous-fenêtre de la borne d’accès de l’utilitaire AirPort via le menu de configuration, le voyant d’état vert clignote pour indiquer que l’activité est normale. Vert fixe L’AirPort Express est allumée et fonctionne correctement. Si vous choisissez Clignotement en cas d’activité dans le menu local Voyant d’état qui se trouve dans la sous-fenêtre de la borne d’accès de l’utilitaire AirPort, le voyant d’état vert clignote pour indiquer que l’activité est normale. Ambre clignotant La borne AirPort Express ne peut pas établir la connexion avec le réseau ou Internet. reportez-vous à la section « Le voyant d’état de votre AirPort Express est de couleur ambre et il clignote » à la page 42. Ambre L’AirPort Express termine sa séquence de démarrage. Clignotement ambre et vert Il peut y avoir un problème pour démarrer. L’AirPort Express va redémarrer. Réessayez ensuite.12 Chapitre 1 Premiers contacts Étape suivante Après avoir branché AirPort Express, vous devez utiliser l’Utilitaire AirPort pour le configurer afin de pouvoir l’utiliser avec votre connexion à Internet, votre chaîne stéréo, une imprimante USB ou un réseau existant. Reportez-vous à la section « Utilisation de la borne AirPort Express » à la page 13 pour obtenir des exemples de toutes les possibilités d’utilisation de l’AirPort Express et des informations sur la configuration de votre réseau sans fil. Consultez ensuite la rubrique « Configuration de l’AirPort Express » à la page 25 pour en savoir plus sur le processus de configuration.2 13 2 Utilisation de la borne AirPort Express Dans ce chapitre, vous trouverez des explications sur les différentes façons d’utiliser l’AirPort Express. Ce chapitre contient des exemples des réglages à effectuer en fonction de la façon dont vous souhaitez utiliser l’AirPort Express. Il vous donne également une brève explication de ce qu’il faut faire pour pouvoir utiliser rapidement votre réseau AirPort Express. Utilisation de l’AirPort Express avec votre connexion Internet à large bande Lorsque vous configurez l’AirPort Express pour accéder à Internet et au réseau, les ordinateurs Macintosh équipés des cartes AirPort et AirPort Extreme et les ordinateurs équipés de la technologie sans fil 802.11b et 802.11g peuvent accéder au réseau sans fil AirPort pour partager des fichiers, jouer en réseau et utiliser des applications Internet telles que des navigateurs Web et des applications de messagerie électronique.14 Chapitre 2 Utilisation de la borne AirPort Express Schéma des connexions Configuration 1 Branchez votre modem DSL ou câble à votre AirPort Express en utilisant le port Ethernet (G). 2 Utilisez l’utilitaire AirPort pour créer un nouveau réseau (pour en savoir plus, reportez-vous à la page 25). Les ordinateurs utilisant AirPort et ceux utilisant d’autres cartes ou adaptateurs sans fil se connectent à Internet via la borne AirPort Express. Les ordinateurs sans fil communiquent entre eux via l’AirPort Express. Modem DSL ou câble Port Ethernet Vers Internet GChapitre 2 Utilisation de la borne AirPort Express 15 Utilisation de l’AirPort Express avec AirTunes pour lire des morceaux de musique d’iTunes sur votre chaîne stéréo Vous pouvez brancher votre AirPort Express à votre chaîne stéréo par un câble mini numérique à fibres optiques vers Toslink, un câble mini stéréo vers double RCA ou un câble mini stéréo vers mini stéréo (selon le type du connecteur de votre chaîne) et utiliser AirTunes pour écouter sans fil de la musique grâce à iTunes. Schéma des connexions Port d’entrée audio numérique optique ou ou Câble numérique à fibres optiques Toslink vers mini-jack ou Câble mini-jack stéréo vers RCA Chaîne stéréo Ordinateur équipé d’iTunes Port de sortie Ports d’entrée audio gauche et droit de type RCA16 Chapitre 2 Utilisation de la borne AirPort Express Configuration 1 Branchez votre AirPort Express à vos enceintes domestiques stéréo ou à vos enceintes alimentées par amplifiés grâce à un câble numérique à fibres optiques, un câble analogique mini stéréo vers double RCA ou un câble mini stéréo vers mini stéréo (selon le type du connecteur de votre chaîne), branché sur la prise mini stéréo (-). Remarque : vous ne pouvez pas utiliser des haut-parleurs USB amplifiés avec l’AirPort Express. Utilisez des haut-parleurs amplifiés avec un connecteur mini-jack stéréo. 1 Utilisez l’utilitaire AirPort pour créer un nouveau réseau (pour en savoir plus, reportez-vous à la page 25). 2 Ouvrez iTunes sur votre ordinateur et choisissez votre chaîne stéréo ou vos haut-parleurs dans le menu local des haut-parleurs situé en bas à droite de la fenêtre d’iTunes. Les ordinateurs sans fil se trouvant dans le rayon de détection de l’AirPort Express peuvent, sans fil, y diffuser de la musique à l’aide d’iTunes 4.6 ou ultérieur. Un seul ordinateur à la fois peut diffuser de la musique sur l’AirPort Express. Vous ne pouvez pas diffuser de la musique vers plus d’un AirPort Express à la fois. Remarque : ne connectez pas l’AirPort Express à la prise phono de votre stéréo. Utilisation de l’AirPort Express sur un réseau sans fil existant pour diffuser de la musique sur votre chaîne stéréo Vous avez également la possibilité de connecter l’AirPort Express à un réseau sans fil et d’utiliser AirTunes pour diffuser de la musique sur votre chaîne stéréo depuis iTunes. En connectant AirPort Express à votre réseau existant, vous pouvez placer AirPort Express dans une autre pièce, dans la portée de votre réseau.Chapitre 2 Utilisation de la borne AirPort Express 17 Schéma des connexions Pour accéder au réseau sans fil, utilisez le menu d’état d’AirPort dans la barre des menus de votre Mac. Sur un ordinateur Windows, maintenez le curseur sur l’icône de la connexion sans fil jusqu’à ce que vous voyiez apparaître le nom de votre réseau AirPort (SSID) et sélectionnez-le dans la liste si plusieurs réseaux sont disponibles. Modem DSL ou câble Vers Internet Chaîne stéréo Port de sortie Borne d’accès AirPort Extreme Vers port Ethernet18 Chapitre 2 Utilisation de la borne AirPort Express Il existe d’autres façons de connecter votre AirPort Express à votre chaîne stéréo. Si votre ordinateur est doté d’une carte AirPort Extreme ou d’une carte sans fil compatible pour Windows, vous pouvez utiliser AirTunes pour écouter de la musique issue d’iTunes sur une chaîne stéréo branchée à votre AirPort Express. Modem DSL ou câble Vers Internet Chaîne stéréo Port de sortieChapitre 2 Utilisation de la borne AirPort Express 19 Vous pouvez également connecter votre AirPort Express à Internet et fournir ainsi un accès à Internet aux ordinateurs qui se joignent au réseau. Connectez votre AirPort Express à votre chaîne stéréo afin que les ordinateurs du réseau dotés d’une carte AirPort Extreme ou dotés de cartes 802.11b ou 802.11g compatibles puissent utiliser iTunes pour diffuser de la musique sur la chaîne stéréo. Modem DSL ou câble Vers Internet Chaîne stéréo Port Ethernet Port de sortie20 Chapitre 2 Utilisation de la borne AirPort Express Câbles audio et câble d’alimentation facultatifs Vous pouvez vous procurer le kit de connexion stéréo facultatif de l’AirPort Express contenant des câbles Monster pour connecter votre AirPort Express à votre chaîne stéréo ou à vos haut-parleurs. Ce kit comprend des connecteurs analogiques mini-jack stéréo vers double RCA, un câble numérique à fibres optiques Toslink et un câble d’alimentation.  Connectez le câble analogique à votre chaîne stéréo si celle-ci utilise des câbles analogiques standard.  Connectez le câble numérique à fibres optiques si votre chaîne stéréo possède un port numérique Toslink.  Connectez le câble d’alimentation si vous configurez votre AirPort Express à distance d’une prise de courant. Câble mini-jack stéréo vers RCA Câble numérique à fibres optiques Toslink vers mini-jack Câble d’alimentationChapitre 2 Utilisation de la borne AirPort Express 21 Utilisation de l’AirPort Express pour le partage d’une imprimante USB Lorsque vous connectez une imprimante USB à votre AirPort Express, tous les ordinateurs du réseau sans fil peuvent l’utiliser. Schéma des connexions Port USB Imprimante partagée d22 Chapitre 2 Utilisation de la borne AirPort Express Configuration 1 Reliez l’imprimante au port USB (d) de la borne AirPort Express à l’aide d’un câble USB. 2 Utilisez l’utilitaire AirPort pour créer un réseau ou rejoignez un réseau sans fil existant. Pour partager l’imprimante, les ordinateurs sans fil doivent utiliser Mac OS X 10.2.7 ou ultérieur, ou bien Windows 2000 ou Windows XP. Pour utiliser l’imprimante depuis un ordinateur Mac OS X : 1 Ouvrez l’utilitaire de configuration d’imprimante (situé dans le dossier Utilitaires dans le dossier Applications). 2 Sélectionnez l’imprimante dans la liste. Si l’imprimante ne figure pas sur la liste, cliquez sur Ajouter, puis choisissez Bonjour dans le menu local avant de sélectionner l’imprimante dans la liste. Pour utiliser l’imprimante depuis un ordinateur Windows : 1 Installez Bonjour pour Windows à partir du disque fournit avec votre AirPort Express. 2 Suivez les instructions à l’écran pour connecter votre imprimante. Extension de la portée d’un réseau AirPort Extreme ou AirPort Express existant Vous avez la possibilité de connecter une borne AirPort Express supplémentaire pour étendre la portée de votre réseau AirPort Extreme ou AirPort Express existant. L’ajout d’une borne d’accès ou de l’AirPort Express à un réseau existant crée un système de distribution sans fil WDS. Si le réseau AirPort est connecté à Internet, les ordinateurs peuvent alors se connecter au réseau AirPort et partager la connexion Internet.Chapitre 2 Utilisation de la borne AirPort Express 23 Schéma des connexions Configuration 1 Vous devez posséder un réseau AirPort créé par une borne d’accès AirPort Extreme ou un AirPort Express connecté à Internet. Cette borne d’accès est appelée la borne d’accès principale et partage sa connexion Internet avec votre AirPort Express. 2 Utilisez l’utilitaire AirPort pour vous connecter à votre réseau et étendre sa portée (pour en savoir plus, reportez-vous à la page 25). Les deux bornes d’accès utilisent la technologie sans fil pour partager la connexion Internet avec les ordinateurs clients, ou la technologie Ethernet si les ordinateurs clients sont reliés par Ethernet. Salle de séjour Salle à manger Salon Vers Internet Borne d’accès AirPort Extreme Modem DSL ou cable24 Chapitre 2 Utilisation de la borne AirPort Express Utilisation d’AirPort Express avec votre réseau AirPort Extreme L’illustration ci-dessous montre un réseau sans fil regroupant tous les exemples précédemment cités. Configuration  Utilisez l’utilitaire AirPort pour créer un réseau et tirer profit de toutes les fonctionnalités de AirPort Express. Modem DSL Vers port de sortie Vers port USB ou câble Vers Internet Vers port Ethernet Salle de séjour Salon Borne d’accès AirPort Extreme3 25 3 Configuration de l’AirPort Express Ce chapitre contient des informations et des instructions sur l’utilisation du logiciel de l’AirPort pour configurer votre AirPort Express. Utilisez les schémas du chapitre précédent pour vous aider à décider de l’endroit où vous souhaitez utiliser votre AirPort Express, et des fonctionnalités que vous souhaitez configurer sur votre réseau AirPort. Utilisez ensuite les instructions de ce chapitre pour configurer facilement l’AirPort Express et votre réseau AirPort. Grâce à l’utilitaire AirPort, vous pouvez :  Configurer un nouveau réseau que des ordinateurs sans fil peuvent utiliser pour communiquer entre eux. Si vous configurez votre AirPort Express comme une borne d’accès et la connectez à Internet, des ordinateurs sans fil pourront également partager la connexion Internet.  Connecter votre AirPort Express à votre réseau sans fil existant et utiliser AirTunes pour écouter de la musique d’iTunes sur votre chaîne stéréo ou vos haut-parleurs amplifiés ainsi que partager une imprimante USB.  Connecter votre AirPort Express à votre réseau AirPort Extreme ou l’AirPort Express existant et étendre la portée de ce réseau en utilisant l’AirPort Express comme un pont sans fil. Cette méthode est appelée système de distribution sans fil (WDS). 26 Chapitre 3 Configuration de l’AirPort Express Vous pouvez utiliser AirTunes pour écouter des morceaux de musique d’iTunes et partager une imprimante USB quel que soit le type de réseau que vous configurez, qu’il s’agisse d’un nouveau réseau ou d’un accès à un réseau existant. Si vous possédez plusieurs bornes AirPort Express, vous pouvez en brancher une à la chaîne stéréo de votre salon et une autre aux haut-parleurs amplifiés de votre bureau. À l’aide d’AirTunes, vous pouvez diffuser votre musique d’iTunes sur l’une ou l’autre borne AirPort Express, selon la pièce de la maison dans laquelle vous vous trouvez. Choisissez pour cela le nom de la borne AirPort Express que vous souhaitez utiliser dans le menu local des haut-parleurs d’iTunes. Ce chapitre explique comment utiliser l’Assistant réglages dans l’utilitaire AirPort pour configurer votre réseau et d’autres fonctionnalités de votre AirPort Express. Pour en savoir plus sur la mise en réseau sans fil et sur les fonctionnalités avancées de l’utilitaire AirPort, consultez le document « Création de réseaux AirPort 802.11n » sur le site www.apple.com/fr/support/airport. Le document fournit de nombreux détails concernant les deux documents suivants :  l’utilisation de l’utilitaire AirPort avec la borne d’accès AirPort Extreme 802.11n ;  l’utilisation de l’utilitaire AirPort pour configurer votre borne d’accès AirPort Extreme 802.11g. Remarque : vous pouvez effectuer la plupart des opérations d’installation et de configuration de votre réseau à l’aide de l’Assistant réglages de l’utilitaire AirPort. Pour configurer les options avancées, choisissez Configuration manuelle dans le menu Borne d’accès de l’utilitaire AirPort. Voir « Réglage des options avancées » à la page 33.Chapitre 3 Configuration de l’AirPort Express 27 Utilisation de l’Utilitaire AirPort Pour configurer votre AirPort Express afin qu’elle utilise AirPort pour l’accès à Internet et la mise en réseau sans fil, utilisez l’Assistant réglages dans l’Utilitaire AirPort. Lutilitaire est automatiquement installé, à partir du CD AirPort Express, sur votre ordinateur en même temps que le logiciel. Sur un ordinateur Macintosh Mac OS X 10.4 ou ultérieur : 1 Ouvrez l’utilitaire AirPort situé dans le dossier Utilitaires dans votre dossier Applications. 2 Sélectionnez votre borne d’accès et cliquez sur Configurer. 3 Suivez les instructions à l’écran pour configurer votre AirPort Express et votre réseau sans fil. Sur un ordinateur Windows XP (Service Pack 2) : 1 Ouvrez l’Utilitaire AirPort, situé dans Démarrer > Tous les programmes > AirPort. 2 Sélectionnez votre borne d’accès et cliquez sur Configurer.28 Chapitre 3 Configuration de l’AirPort Express 3 Suivez les instructions à l’écran pour configurer votre AirPort Express et votre réseau sans fil. L’assistant de réglage de l’utilitaire AirPort vous pose une série de questions concernant le type de réseau que vous souhaitez utiliser et les services que vous souhaitez configurer. L’Assistant réglages vous aide à saisir les réglages adaptés au réseau que vous configurez. Si vous utilisez AirPort Express pour vous connecter à Internet, vous devez disposer d’un compte à haut débit (DSL ou modem câble) via un fournisseur d’accès à Internet ou une connexion utilisant un réseau Ethernet existant. Si vous avez reçu des informations particulières de votre fournisseur d’accès (telles qu’une adresse IP statique ou l’identifiant du client DHCP), il vous faudra les saisir dans l’utilitaire AirPort. Regroupez toutes ces informations avant de configurer votre AirPort Express.Chapitre 3 Configuration de l’AirPort Express 29 Création d’un nouveau réseau sans fil Vous pouvez utiliser l’Assistant réglages de l’utilitaire AirPort pour créer un réseau sans fil. L’Assistant réglages vous guidera tout au long des étapes nécessaires pour nommer votre réseau, protéger votre réseau avec un mot de passe et configurer d’autres options. Si vous prévoyez partager une imprimante USB sur votre réseau : 1 Reliez l’imprimante ou le disque dur au port USB (d) de la borne AirPort Express. 2 Ouvrez l’Utilitaire AirPort que vous trouverez dans le dossier Applications/Utilitaires sur un Macintosh, et dans Démarrer > Programmes > AirPort sur un ordinateur Windows XP. 3 Suivez les instructions à l’écran pour créer un réseau. Configuration et partage de l’accès à Internet Si vous prévoyez partager votre connexion Internet avec les ordinateurs du réseau configurés pour la communication sans fil, vous devez configurer votre AirPort Express en conséquence. Une fois qu’elle est configurée, les ordinateurs peuvent accéder à Internet via le réseau AirPort. La borne d’accès se connecte à Internet et transmet les informations aux ordinateurs via le réseau AirPort. Avant d’utiliser l’utilitaire AirPort pour configurer votre borne d’accès, branchez votre modem câble ou DSL au port Ethernet (G) d’AirPort Express. Si vous vous connectez à Internet via un réseau Ethernet existant, vous pouvez alors connecter l’AirPort Express au réseau Ethernet. Utilisez l’Assistant réglages de l’utilitaire AirPort pour saisir les réglages de votre FAI et configurer le mode de partage de ces réglages entre l’AirPort Express et les autres ordinateurs.30 Chapitre 3 Configuration de l’AirPort Express 1 Sélectionnez le réseau sans fil que vous souhaitez modifier. Sur un Mac, utilisez le menu d’état d’AirPort dans la barre des menus. Sur un ordinateur Windows XP, maintenez le curseur sur l’icône de la connexion sans fil jusqu’à ce que vous voyiez apparaître le nom de votre réseau AirPort (SSID) et sélectionnez-le dans la liste si plusieurs réseaux sont disponibles. Le nom de réseau par défaut d’une borne d’accès Apple est AirPortNetworkXXXXXX, où XXXXXX est remplacé par les six chiffres de l’identifiant AirPort, aussi appelé adresse MAC. L’identifiant AirPort est imprimé sur le côté de la prise électrique de l’AirPort Express. 2 Ouvrez l’Utilitaire AirPort que vous trouverez dans le dossier Applications/Utilitaires sur un Macintosh, et dans Démarrer > Programmes > AirPort sur un ordinateur Windows XP. 3 Sélectionnez votre borne d’accès et cliquez sur Configurer. 4 Suivez les instructions à l’écran pour configurer et partager l’accès Internet de votre AirPort Express. L’utilisation de l’utilitaire AirPort est un moyen rapide et facile de configurer votre borne d’accès et votre réseau sans fil. Si vous désirez configurer des options supplé- mentaires pour votre réseau, telles que des restrictions d’accès ou des réglages avancés d’options DHCP, vous pouvez choisir Configuration manuelle dans le menu Borne d’accès de l’utilitaire AirPort. Chapitre 3 Configuration de l’AirPort Express 31 Connexion à un réseau sans fil existant Vous pouvez utiliser l’utilitaire AirPort pour accéder à un réseau sans fil existant. Lorsque vous connectez la borne AirPort Express à votre chaîne stéréo, les ordinateurs de votre réseau sans fil peuvent alors utiliser AirTunes pour écouter des morceaux de musique d’iTunes sur la chaîne stéréo. Lorsque vous connectez une imprimante USB à votre AirPort Express, tous les ordinateurs du réseau peuvent l’utiliser. Avant d’utiliser l’Assistant réglages AirPort , vérifiez que le câble audio est bien branché à votre chaîne stéréo et que le câble USB est relié à votre imprimante. 1 Ouvrez l’Utilitaire AirPort que vous trouverez dans le dossier Applications/Utilitaires sur un Macintosh, et dans Démarrer > Programmes > AirPort sur un ordinateur Windows. 2 Suivez les instructions à l’écran pour connecter votre AirPort Express et votre réseau sans fil.32 Chapitre 3 Configuration de l’AirPort Express Extension de la portée d’un réseau AirPort Extreme ou AirPort Express existant Vous pouvez étendre la portée d’un réseau sans fil AirPort Express ou AirPort Extreme en le configurant comme membre d’un WDS. Les ordinateurs sans fil pourront alors se connecter au réseau et partager la connexion Internet et des fichiers ou jouer en réseau. Si vous connectez l’AirPort Express à votre chaîne stéréo, les ordinateurs de votre réseau sans fil peuvent alors utiliser AirTunes pour écouter des morceaux de musique d’iTunes sur la chaîne stéréo. Lorsque vous connectez une imprimante USB à votre AirPort Express, tous les ordinateurs du réseau peuvent l’utiliser. m Ouvrez l’utilitaire AirPort et suivez les instructions à l’écran pour étendre la portée de votre réseau AirPort Extreme ou AirPort Express. L’extension de la portée d’un réseau avec WDS peut réduire les performances globales du réseau.Chapitre 3 Configuration de l’AirPort Express 33 Réglage des options avancées Pour configurer manuellement des options avancées de votre AirPort Express, vous pouvez utilisez l’utilitaire AirPort. Parmi ces options avancées, vous pouvez configurer, par exemple, la sécurité, des réseaux fermés, la durée de bail DHCP, le contrôle d’accès, le contrôle de puissance, les comptes d’utilisateurs et bien plus encore. Pour régler les options avancées : 1 Sélectionnez le réseau sans fil que vous souhaitez modifier. Sur un Mac, utilisez le menu d’état d’AirPort dans la barre des menus. Sur un ordinateur Windows XP, maintenez le curseur sur l’icône de la connexion sans fil jusqu’à ce que vous voyiez apparaître le nom de votre réseau AirPort (SSID) et sélectionnez-le dans la liste si plusieurs réseaux sont disponibles. Le nom de réseau par défaut d’une borne d’accès Apple est AirPortNetwork XXXXXX, où XXXXXX est remplacé par les six chiffres de l’identifiant AirPort, aussi appelé adresse MAC. L’identifiant AirPort est imprimé sur le côté de la prise électrique de l’AirPort Express. 2 Ouvrez l’Utilitaire AirPort que vous trouverez dans le dossier Applications/Utilitaires sur un Macintosh, et dans Démarrer > Programmes > AirPort sur un ordinateur Windows XP. 3 Si plusieurs bornes d’accès figurent dans la liste, sélectionnez celle que vous souhaitez configurer. Si la borne que vous souhaitez configurer ne figure pas dans cette liste, cliquez sur Rescanner pour parcourir les bornes d’accès disponibles, puis sélectionnez la borne d’accès voulue.34 Chapitre 3 Configuration de l’AirPort Express 4 Choisissez Configuration manuelle dans le menu Borne d’accès. Si le système vous demande un mot de passe, saisissez-le. Pour plus d’informations et d’instructions détaillées au sujet de la configuration manuelle des fonctionnalités de l’utilitaire AirPort, consultez le document « Création de réseau AirPort Extreme 802.11n » sur le site www.apple.com/fr/airport. Le document fournit de nombreux détails concernant les deux documents suivants :  l’utilisation de l’utilitaire AirPort avec la borne d’accès AirPort Extreme 802.11n  l’utilisation de l’utilitaire AirPort pour configurer votre borne d’accès AirPort Extreme 802.11g4 35 4 AirPort Express en déplacement AirPort Express peut stocker des réglages pour différents emplacements afin que vous puissiez facilement le déplacer d’un endroit à l’autre. L’AirPort Express peut stocker jusqu’à cinq configurations, appelées profils. Un profil contient les réglages de votre AirPort Express, tels que le nom et le mot de passe du haut-parleur iTunes, ainsi que des informations sur le réseau, telles que le nom et le mot de passe réseau. Les profils sont utiles si vous déplacez votre AirPort Express d’un endroit à un autre. Par exemple, vous pouvez configurer un profil pour votre AirPort Express à votre domicile, où vous utilisez AirTunes pour diffuser de la musique sur votre chaîne stéréo à partir d’iTunes et vous connecter à Internet via le protocole PPPoe. Vous pouvez également configurer un autre profil pour utiliser AirPort Express à l’hôtel, où vous vous connectez à Internet via le protocole DHCP.36 Chapitre 4 AirPort Express en déplacement Utilisez l’Utilitaire Admin AirPort dans Applications/Utilitaires sur Mac, et dans Démarrer > Programmes > AirPort sur un ordinateur Windows XP pour créer, modifier, renommer et effacer des profils. Chapitre 4 AirPort Express en déplacement 37 Pour créer un profil : 1 Ouvrez l’utilitaire AirPort, sélectionnez votre AirPort Express dans la liste puis choisissez Configuration manuelle dans le menu Borne d’accès. 2 Saisissez un mot de passe pour la borne d’accès si nécessaire. 3 Choisissez Gérer les profils dans le menu Borne d’accès. 4 Cliquez sur Ajouter pour créer un nouveau profil, donnez-lui un nom puis cliquez sur OK. 5 Définissez les options, telles que le nom du réseau, le nom du haut-parleur distant, les mots de passe et le mode de connexion à Internet. 6 Une fois le réglage des options terminé, cliquez sur Mettre à jour. Dès que vous possédez un profil dans la liste, le menu local Profils devient disponible au bas de la fenêtre utilitaire AirPort. Pour modifier un profil existant : 1 Ouvrez l’utilitaire AirPort, sélectionnez votre AirPort Express dans la liste puis choisissez Configuration manuelle dans le menu Borne d’accès. 2 Saisissez un mot de passe si nécessaire. 3 Choisissez le profil à modifier dans le menu Profils du menu local. 4 Modifiez les options du profil. Une fois les options modifiées, cliquez sur Mettre à jour ou enregistrer le profil et le rendre actif sur votre AirPort Express.5 39 5 Astuces et dépannage Vous pouvez rapidement résoudre la plupart des problèmes liés à AirPort Express en suivant les conseils donnés dans ce chapitre. Le logiciel d’AirPort Express ne peut pas détecter le matériel AirPort approprié Assurez-vous que l’ordinateur que vous utilisez est équipé d’une carte AirPort ou d’une carte AirPort Extreme. Si vous avez installé la carte récemment, éteignez votre ordinateur et vérifiez que la carte est installée correctement. Vérifiez que l’antenne AirPort est connectée fermement à la carte (vous devez entendre un clic lorsque vous la connectez). Vérifiez que la carte est fermement insérée dans le connecteur du logement de la carte AirPort. Si vous utilisez un ordinateur Windows, assurez-vous que l’adaptateur ou la carte sans fil est installé correctement. Reportez-vous à la documentation livrée avec votre ordinateur pour vérifier la connexion.40 Chapitre 5 Astuces et dépannage Impossible de diffuser de la musique sur votre chaîne stéréo à partir d’iTunes Vérifiez les points suivants :  Vérifiez qu’AirPort Express est branchée sur une prise de courant, qu’elle se trouve dans le rayon de détection de votre ordinateur et que les câbles appropriés sont bien connectés. Il vous faudra pour cela accéder au réseau AirPort Express.  Veillez à sélectionner votre AirPort Express dans le menu local des haut-parleurs d’iTunes.  Vérifiez que vous utilisez iTunes 4.6 ou ultérieur. Impossible d’entendre la musique Si un morceau est en cours de lecture (la barre de progression en haut de la fenêtre iTunes avance) mais que vous n’entendez rien, vérifiez les points suivants :  Si vous essayez d’écouter de la musique avec des haut-parleurs connectés à une AirPort Express et que vous avez coché la case « Désactiver le contrôle de volume pour les haut-parleurs distants » dans la sous-fenêtre Audio des Préférences iTunes, vérifiez que vos haut-parleurs distants sont sélectionnés dans le menu local en bas de la fenêtre iTunes et que le contrôle du volume des haut-parleurs distants n’est pas au minimum. Vous avez oublié votre mot de passe réseau ou AirPort Express Vous pouvez effacer le mot de passe du réseau AirPort ou d’AirPort Express en réinitialisant AirPort Express. Pour cela, procédez comme suit : 1 Utilisez l’extrémité d’un trombone déplié pour appuyer sur le bouton de réinitialisation et le maintenir enfoncé pendant une seconde. Chapitre 5 Astuces et dépannage 41 2 Sélectionnez votre réseau AirPort.  Sur un Macintosh, utilisez le menu d’état d’AirPort dans la barre des menus pour sélectionner le réseau créé par l’AirPort Express (le nom du réseau reste inchangé).  Sur un ordinateur Windows 2000 ou Windows XP, maintenez le curseur sur l’icône de la connexion sans fil jusqu’à ce que vous voyiez apparaître le nom de votre réseau AirPort (SSID) et sélectionnez-le dans la liste si plusieurs réseaux sont disponibles. 3 Ouvrez l’Utilitaire AirPort (que vous trouverez dans le dossier Applications/Utilitaires sur un Macintosh, et dans Démarrer > Programmes > AirPort sur un ordinateur Windows XP ou Windows 2000). 4 Sélectionnez votre AirPort Express et cliquez sur Configurer. 5 Dans la zone de dialogue qui s’affiche, effectuez les changements suivants :  Réinitialisez le mot de passe AirPort Express.  Sélectionnez le cryptage pour activer la protection par mot passe de votre réseau AirPort. Si vous activez le cryptage, tapez un nouveau mot de passe pour votre réseau AirPort. 6 Cliquez sur OK. AirPort Express redémarre pour charger les nouveaux réglages. Votre AirPort Express ne répond pas Essayez de la débrancher puis de la rebrancher sur une prise électrique. Si votre AirPort Express ne répond plus du tout, vous devrez peut-être rétablir les réglages d’origine par défaut. Cette opération efface tous les réglages que vous avez effectués et rétablit ceux d’origine. 42 Chapitre 5 Astuces et dépannage Le voyant d’état de votre AirPort Express est de couleur ambre et il clignote Le câble Ethernet n’est peut-être pas connecté correctement ; l’AirPort Express est peut-être hors du rayon de détection du réseau AirPort, ou bien il se peut qu’il y ait un problème avec votre fournisseur d’accès Internet. Si vous êtes connecté à Internet avec un modem câble ou DSL, le modem n’est peut-être plus connecté au réseau ou à Internet. Même si le modem semble fonctionner correctement, débranchez le modem, attendez quelques secondes puis rebranchez-le. Assurez-vous que l’AirPort Express est directement connecté au modem via Ethernet avant de rebrancher le modem. Si votre AirPort Express est configuré comme membre d’un WDS, le lien WDS est peut-être interrompu. Remarque : si l’AirPort Express est configuré comme un client sans fil et que le réseau auquel il se joint est protégé par une liste de contrôle d’accès, l’AirPort Express doit faire partie de cette liste pour pouvoir se connecter au réseau. Pour savoir pourquoi la lumière brune clignote, ouvrez l’utilitaire AirPort, sélectionnez votre borne d’accès puis choisissez Configuration manuelle dans le menu Borne d’accès. Saisissez le mot de passe de la borne d’accès si nécessaire puis cliquez sur État de la borne d’accès pour en savoir plus sur la lumière clignotante. Pour revenir aux réglages d’origine de l’AirPort Express : m Utilisez l’extrémité d’un trombone déplié pour appuyer sur le bouton de réinitialisation et le maintenir enfoncé pendant dix secondes. AirPort Express redémarre avec les réglages suivants :  L’AirPort Express reçoit son adresse IP via DHCP.Chapitre 5 Astuces et dépannage 43  Le nom du réseau redevient Réseau Apple XXXXXX (où X est une lettre ou un chiffre).  Le mot de passe AirPort Express redevient public. Si vous avez utilisé l’Utilitaire AirPort pour créer des profils pour votre AirPort Express, ces profils sont conservés lorsque vous réinitialisez AirPort Express. Si vous souhaitez revenir aux réglages d’origine de l’AirPort Express et supprimer des profils que vous aviez configurés : 1 Débranchez l’AirPort Express. 2 Utilisez l’extrémité d’un trombone déplié pour maintenir le bouton de réinitialisation enfoncé pendant que vous branchez l’AirPort Express. Attendez de voir les lumières d’état clignoter puis réinitialiser la borne d’accès. Votre imprimante ne répond pas Si vous avez connecté une imprimante au port USB de l’AirPort Express et que les ordinateurs du réseau AirPort ne peuvent pas imprimer, procédez comme suit : 1 Assurez-vous que l’imprimante est branchée et allumée. 2 Assurez-vous que les câbles sont bien connectés à l’imprimante et au port USB de l’AirPort Express. 3 Assurez-vous que l’imprimante est bien sélectionnée dans la fenêtre Liste d’imprimantes des ordinateurs clients. Pour ce faire, sur un ordinateur Mac OS X 10.3 ou ultérieur :  Ouvrez l’utilitaire de configuration d’imprimante situé dans le dossier Utilitaires dans le dossier Applications.  Si l’imprimante n’est pas dans la liste, cliquez sur Ajouter.  Sélectionnez Bonjour dans le menu local.  Sélectionnez l’imprimante et cliquez sur Ajouter.44 Chapitre 5 Astuces et dépannage Pour sélectionner votre imprimante sur un ordinateur Windows XP ou Windows 2000 :  Ouvrez le Panneau de configuration depuis le menu Démarrer, puis double-cliquez sur Imprimantes et télécopieurs.  Sélectionnez l’imprimante. Si l’imprimante ne figure pas dans la liste, cliquez sur Ajouter une imprimante puis suivez les instructions à l’écran. 4 Éteignez l’imprimante, attendez quelques secondes puis rallumez-la. Pour en savoir plus sur la configuration d’une imprimante sur un ordinateur fonctionnant sous Windows, consultez la rubrique « Utiliser une imprimante via un ordinateur Windows » à la page 23. Vous souhaitez mettre à jour votre logiciel AirPort Apple met régulièrement à jour le logiciel AirPort. Pour mettre à jour votre borne d’accès AirPort : 1 Ouvrez l’utilitaire AirPort situé dans le dossier Utilitaires dans le dossier Applications. 2 Sélectionnez « Rechercher les mises à jour » dans le menu Utilitaire AirPort. 3 Cliquez sur Télécharger pour obtenir toutes les mises à jour de programme interne ou cliquez sur Afficher les détails pour sélectionner le programme interne spécifique à votre borne d’accès. 4 Après le téléchargement du programme interne, cliquez sur Mettre à jour pour l’installer sur votre borne d’accès. Si vous désirez mettre à jour plusieurs bornes d’accès, cliquez sur Afficher les détails pour sélectionner les bornes que vous souhaitez mettre à jour.Chapitre 5 Astuces et dépannage 45 Considérations sur le placement de l’AirPort Express Les recommandations suivantes peuvent permettre à votre AirPort Express d’atteindre une portée sans fil maximale et une couverture réseau optimale.  Placez votre AirPort Express dans un endroit dégagé avec peu d’obstacles tels que des meubles imposants ou des murs. Essayez de la tenir éloignée des surfaces métalliques.  Si vous placez votre AirPort Express derrière un meuble, laissez au moins trois centimètres entre la borne AirPort Express et le bord du meuble.  Évitez de placer votre AirPort Express dans des zones entourées de surfaces métalliques sur trois côtés ou plus.  Si vous placez votre AirPort Express à proximité d’autres appareils électriques tels que la chaîne stéréo, évitez d’entourer complètement l’AirPort Express de câbles d’alimentation, audio ou vidéo. Positionnez votre AirPort Express de façon que les câbles passent d’un seul côté. Laissez autant d’espace que possible entre l’AirPort Express et les câbles.  Si vous placez votre AirPort Express derrière votre équipement stéréo, placez-la sur le côté. Évitez de la centrer derrière la chaîne stéréo.  Essayez de placer votre AirPort Express à 7,5 mètres au moins d’un four à micro-ondes, d’un téléphone sans fil de 2,4 GHz, ou d’autres sources d’interférences.46 Chapitre 5 Astuces et dépannage Éléments pouvant provoquer des interférences avec Airport Plus la source d’interférences est éloignée, plus le risque de problème est faible. Les éléments suivants peuvent provoquer des interférences avec Airport :  Les fours à micro-ondes.  Les pertes de fréquence radio DSS (Direct Satellite Service).  Le câble coaxial d’origine fourni avec certains types d’antennes paraboliques. Contactez le fabricant du produit pour obtenir des câbles plus récents.  Certains dispositifs électriques tels que les lignes électriques, les voies ferrées électrifiées et les centrales électriques.  Les téléphones sans fil qui fonctionnent sur la fréquence porteuse de 2,4 GHz. Si vous rencontrez des problèmes avec votre téléphone ou avec la communication avec AirPort, changez le canal utilisé par votre borne d’accès ou par l’AirPort Express.  Des bornes d’accès adjacentes qui utilisent des canaux voisins. Ainsi, si une borne d’accès A est réglée sur le canal 1, la borne B doit être réglée sur le canal 4 ou supérieur.6 47 6 En savoir plus, service après-vente et support Vous trouverez davantage d’informations sur l’utilisation de la borne AirPort Express sur votre disque dur, sur le Web et dans l’aide en ligne. Ressources en ligne Pour obtenir les toutes dernières informations sur la borne AirPort Express, rendez-vous sur le site www.apple.com/fr/airportexpress. Pour enregistrer l’AirPort Express (si vous ne l’avez pas déjà fait lors de l’installation du logiciel à partir du CD de l’AirPort Express), rendez-vous sur le site www.apple.com/fr/register. Pour plus d’informations sur le service après-vente et le support d’AirPort, des forums avec des informations et des retours sur différents produits, et les versions les plus récentes des logiciels Apple à télécharger, rendez-vous sur le site www.apple.com/fr/support/airport. Pour le support en dehors des États-Unis, rendez-vous sur le site www.apple.com/fr/support et choisissez votre pays dans le menu local.48 Chapitre 6 En savoir plus, service après-vente et support Aide en ligne m Pour en savoir plus sur l’utilisation d’AirPort, ouvrez l’Utilitaire AirPort et choisissez Aide > Aide Utilitaire AirPort. Obtention d’un service de garantie Si le produit est endommagé ou ne fonctionne pas correctement, suivez les conseils de cette brochure, de l’aide à l’écran et des ressources en ligne. Si l’unité ne fonctionne toujours pas, rendez-vous sur le site www.apple.com/fr/support pour obtenir des instructions sur l’obtention d’un service de garantie. Où trouver le numéro de série de votre AirPort Express Le numéro de série est imprimé à l’arrière de votre AirPort Express.49 Annexe Caractéristiques de l’AirPort Express Caractéristiques de l’AirPort  Vitesse de transfert des données sans fil : jusqu’à 54 mégabits par seconde (Mbps)  Portée : jusqu’à 45 mètres en utilisation normale (selon l’environnement)  Bande de fréquence : 2,4 gigahertz (GHz)  Alimentation de la sortie radio : 15 dBm (nominale)  Normes : 802.11 DSSS 1 et 2 Mbps standard, 802.11b et caractéristique 802.11g Interfaces  Connecteur LAN Ethernet RJ-45 pour la mise en réseau 10/100Base-T intégrée (G)  Impression USB (Universal Serial Bus) (d)  Mini-jack optique analogique/numérique de 3,5 mm  AirPort Extreme Conditions ambiantes  Température de fonctionnement : de 0° à 35° C (32° à 95° F)  Température de stockage : de -25° à 60° C (-13° à 140° F)  Humidité relative (en fonctionnement) : de 20 % à 80 %  Humidité relative (en stockage) : de 10 % à 90 % (sans condensation)  Altitude de fonctionnement : de 0 à 3 048 m (de 0 à 10 000 pieds)  Altitude maximale de stockage : 4 572 m (15 000 pieds)50 Annexe Caractéristiques de l’AirPort Express Taille et poids  Hauteur : 94 mm  Largeur : 75 mm  Épaisseur : 28,5 mm  Poids : 188 grammes Adresses matérielles Deux adresses matérielles pour l’AirPort sont imprimées sur le côté du boîtier :  L’identifiant AirPort : adresse utilisée pour identifier l’AirPort Express sur un réseau sans fil.  Le numéro Ethernet : également appelé adresse MAC. Il vous faudra peut-être communiquer cette adresse à votre FAI pour connecter la borne AirPort Express à Internet. Astuces de sécurité de l’AirPort Express  La seule façon d’éteindre complètement votre AirPort Express est de la débrancher de sa source d’alimentation.  Lorsque vous branchez ou débranchez votre AirPort Express, tenez-la toujours par les côtés. Éloignez vos doigts de la partie métallique de la prise.  Votre AirPort Express est un composant haute tension et ne doit en aucun cas être ouverte, même lorsqu’elle est débranchée. Si votre AirPort Express doit être réparée, consultez la rubrique « En savoir plus, service après-vente et support » à la page 47. Annexe Caractéristiques de l’AirPort Express 51  N’insérez jamais de force un connecteur dans les ports. Si le connecteur ne s’emboîte pas facilement dans le port, c’est probablement qu’ils ne sont pas compatibles. Vérifiez que le connecteur est adapté au port et qu’il est correctement positionné par rapport à celui-ci.  Si vous utilisez le câble d’alimentation facultatif, évitez de laisser pendre la borne AirPort Express en la tenant par le câble.  Pendant que vous utilisez votre AirPort Express, il est normal que le boîtier chauffe. Le boîtier de l’AirPort Express agit comme une surface de refroidissement qui transfère la chaleur de l’intérieur de l’unité vers l’air extérieur plus frais. Évitez les endroits humides  Tenez l’AirPort Express à l’écart des sources de liquides, telles que les boissons, les lavabos, les baignoires, les cabines de douche, etc.  Protégez la borne AirPort Express de la lumière directe du soleil ou de la pluie ou d’autre source d’humidité.  Prenez garde à ne pas renverser de nourriture ou de liquide sur votre AirPort Express. Si tel est le cas, débranchez l’AirPort Express avant de nettoyer. Si c’est un liquide qui a été renversé, il faudra peut-être envoyer l’appareil à Apple pour réparation. Reportez-vous à la section « En savoir plus, service après-vente et support » à la page 47. AVERTISSEMENT : pour réduire le risque d’électrocution ou de blessure, n’utilisez pas votre AirPort Express dans des emplacements mouillés ou humides ni à proximité de ceux-ci.52 Annexe Caractéristiques de l’AirPort Express N’effectuez pas vous-même les réparations À propos de la manipulation Votre AirPort Express peut être endommagée à la suite d’une manipulation ou d’un stockage inapproprié. Prenez garde à ne pas laisser tomber votre AirPort Express en la transportant. AVERTISSEMENT : n’essayez pas d’ouvrir ou de démonter votre AirPort Express. Vous risqueriez de vous électrocuter et d’annuler la garantie. Aucune pièce réparable par l’utilisateur ne se trouve à l’intérieur.53 Regulatory Compliance Information FCC Declaration of Conformity This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. See instructions if interference to radio or television reception is suspected. Radio and Television Interference This computer equipment generates, uses, and can radiate radio-frequency energy. If it is not installed and used properly—that is, in strict accordance with Apple’s instructions—it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in Part 15 of FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. You can determine whether your computer system is causing interference by turning it off. If the interference stops, it was probably caused by the computer or one of the peripheral devices. If your computer system does cause interference to radio or television reception, try to correct the interference by using one or more of the following measures:  Turn the television or radio antenna until the interference stops.  Move the computer to one side or the other of the television or radio.  Move the computer farther away from the television or radio.  Plug the computer into an outlet that is on a different circuit from the television or radio. (That is, make certain the computer and the television or radio are on circuits controlled by different circuit breakers or fuses.) If necessary, consult an Apple Authorized Service Provider or Apple. See the service and support information that came with your Apple product. Or, consult an experienced radio/television technician for additional suggestions. Important: Changes or modifications to this product not authorized by Apple Inc. could void the EMC compliance and negate your authority to operate the product. This product was tested for FCC compliance under conditions that included the use of Apple peripheral devices and Apple shielded cables and connectors between system components. It is important that you use Apple peripheral devices and shielded cables and connectors between system components to reduce the possibility of causing interference to radios, television sets, and other electronic devices. You can obtain Apple peripheral devices and the proper shielded cables and connectors through an Apple-authorized dealer. For non-Apple peripheral devices, contact the manufacturer or dealer for assistance. Responsible party (contact for FCC matters only): Apple Inc., Product Compliance, 1 Infinite Loop M/S 26-A, Cupertino, CA 95014-2084, 408-974-2000.54 Industry Canada Statement This Class B device meets all requirements of the Canadian interference-causing equipment regulations. Cet appareil numérique de la Class B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. VCCI Class B Statement Europe — Déclaration de conformité EU Conforme aux directives européennes 72/23/EEC, 89/336/1999/5 Pour obtenir plus d’informations, rendez-vous sur www.apple.com/euro/compliance. Union européenne— Information concernant l’élimination des déchets Ce symbole signifie que, selon les normes et la législation de votre pays, vous devez vous débarrasser de votre produit sans le mélanger avec les ordures ménagères. Lorsque ce produit n’est plus utilisable, portez-le dans un centre de traitement des déchets agréé par les autorités locales. Certains centrent acceptent les produits gratuitement. Le traitement et le recyclage séparé de votre produit lors de son élimination aideront à préserver les ressources naturelles et à protéger l’environnement et la santé des êtres humains.www.apple.com/airport www.apple.com/support/airport © 2007 Apple Inc. Tous droits réservés. Apple, le logo Apple, AirPort, AirPort Express, Airport Extreme, Bonjour, iTunes, Mac, Macintosh et Mac OS sont des marques d’Apple Inc. déposées aux États-Unis et dans d’autres pays. AirTunes est une marque d’Apple Inc. F019-0989-A Félicitations, vous et votre iMac êtes faits l’un pour l’autre.Dites bonjour à votre iMac. www.apple.com/fr/imac finder Finder Parcourez vos fichiers de la même manière que vous naviguez parmi vos morceaux de musique avec Cover Flow. Aide Mac Caméra iSight intégrée avec iChat Discutez en vidéo avec vos amis et votre famille, où qu’ils soient dans le monde. Aide Mac isight Mail Gérez tous vos comptes de messagerie d'un même point. Aide Mac mail iCal et Carnet d’adresses Votre emploi du temps et vos contacts toujours synchronisés. Aide Mac isyncTime Machine Sauvegardez et restaurez automatiquement vos fichiers. Aide Mac Spotlight Trouvez tout ce que vous recherchez sur votre Mac immédiatement. time machine Aide Mac spotlight Safari Profitez pleinement du web grâce au navigateur le plus rapide du monde. Aide Mac safari Coup d’œil Prévisualisez vos fichiers en un clin d’œil. Aide Mac Mac OS X Snow Leopard www.apple.com/fr/macosx iLife ’11 www.apple.com/fr/ilife iPhoto Vos clichés avec ce quelque chose en plus. Aide iPhoto photos iMovie Vos films époustouflants en quelques minutes. Aide iMovie GarageBand Créez facilement un morceau au son peaufiné. Aide GarageBand coup d’œil film enregistrementTable des matières 5 Table des matières Chapitre 1 : Prêt, feu, configurez ! 9 Contenu de la boîte 10 Configuration de votre iMac 15 Extinction ou suspension d’activité de votre iMac Chapitre 2 : Votre iMac au quotidien 18 Caractéristiques de base de votre iMac 20 Ports présents sur votre iMac 22 Autres composants de votre iMac 24 Fonctionnalités du clavier sans fil Apple et de la souris Apple Magic Mouse 26 Utilisation du clavier sans fil Apple 28 Utilisation de la souris Apple Magic Mouse 30 Utilisation de la télécommande Apple Remote 32 Comment obtenir des réponses à vos doutes Chapitre 3 : Augmentez votre mémoire 37 L’installation de mémoire 42 Vérification de la reconnaissance de la nouvelle mémoire par votre iMac6 Table des matières Chapitre 4 : À tout problème sa solution 45 Problèmes vous empêchant d’utiliser votre iMac 47 Remplacement des piles 50 Utilisation d’Apple Hardware Test 51 Problèmes de connexion à Internet 54 Problèmes de communication sans fil avec AirPort 54 Maintien à jourde votre logiciel 55 Lorsqu’une application ne répond plus 56 Réinstallation des logiciels fournis avec votre iMac 57 Autres problèmes 59 Informations, services et assistance 62 Localisation du numéro de série de votre produit Chapitre 5 : Dernières recommandations 64 Informations importantes concernant la sécurité 68 Informations importantes concernant la manipulation 69 Entretien de votre iMac 71 Comprendre l’ergonomie 73 Apple et l’environnementAide Mac Assistant Migration www.apple.com/fr/imac Prêt, feu, configurez ! 18 Chapitre 1 Prêt, feu, configurez ! Votre iMac est conçu pour que vous puissiez le configurer facilement et commencer à travailler immédiatement. Si vous n’avez jamais utilisé d’ iMac ou si vous n’êtes pas familiarisé avec les ordinateurs Mac, vous trouverez dans ce chapitre des informations qui vous aideront à débuter. Important : lisez attentivement toutes les instructions d’installation de ce chapitre et les consignes de sécurité débutant à la page 64 avant de brancher votre iMac sur une prise de courant. Si vous êtes un utilisateur expérimenté, peut-être êtes-vous déjà en mesure d’utiliser votre nouvel ordinateur. Veillez néanmoins à consulter les informations du chapitre 2, « Votre iMac au quotidien, » pour découvrir les nouvelles fonctionnalités de cet iMac. L’Aide Mac contient de nombreuses réponses aux questions concernant votre iMac. Pour en savoir plus sur l’Aide Mac, consultez la rubrique « Comment obtenir des réponses à vos doutes » à la page 32. Retirez tout film de protection de votre iMac avant de le configurer.Chapitre 1 Prêt, feu, configurez ! 9 Contenu de la boîte Votre iMac est fourni avec un clavier sans fil Apple, une souris sans fil Apple Magic Mouse et un câble d’alimentation secteur CA. Si vous avez commandé une télécommande Apple Remote, elle est aussi contenue dans la boîte. Câble d’alimentation secteur CA Clavier Apple Wireless Keyboard Souris Apple Magic Mouse10 Chapitre 1 Prêt, feu, configurez ! Configuration de votre iMac Suivez les étapes ci-après pour configurer votre iMac. Attendez l’étape 4 pour allumer votre iMac. Étape 1 : faites passer le câble d’alimentation à travers le trou présent sur le socle, branchez-le sur le port d’alimentation au dos de votre iMac, puis insérez-le dans une prise de courant.Chapitre 1 Prêt, feu, configurez ! 11 Étape 2 : pour accéder à Internet ou à un réseau, connectez une extrémité d’un câble Ethernet au port Ethernet de votre iMac. Connectez l’autre extrémité à un modem câble, un modem DSL ou un réseau. Votre iMac est équipé de la technologie AirPort Extreme de mise en réseau sans fil. Pour en savoir plus sur la configuration d’une connexion sans fil, choisissez Aide > Aide Mac, puis recherchez le terme « AirPort ». Pour utiliser une connexion commutée, vous avez besoin d’un modem USB externe. Branchez le modem sur un port USB de votre iMac, puis utilisez un câble téléphonique pour connecter le modem à une prise de téléphone.12 Chapitre 1 Prêt, feu, configurez ! Étape 3 : allumez votre clavier et votre souris sans fil. Appuyez sur le bouton de mise sous tension situé sur le côté droit du clavier sans fil Apple faites glisser le commutateur se trouvant sur la partie inférieure de votre souris Apple Magic Mouse pour les activer. Votre clavier et votre souris sans fil, fournis avec des piles AA, sont déjà jumelés avec votre iMac. Le jumelage leur permet de communiquer sans fil avec votre iMac. Bouton Marche/Arrêt Lampe témoin Lampe témoin Interrupteur Marche/Arrêt Lorsque vous allumez votre clavier ou votre souris pour la première fois, la lampe témoin reste allumée pendant 5 secondes, indiquant que les piles sont en bon état. Si votre clavier ou souris ne fonctionne pas, vérifiez que les piles sont bien mises en place et chargées (voir la page 47). La lampe témoin clignote jusqu’à ce que vous allumiez votre iMac et qu’une connexion soit établie. Remarque : si vous avez acheté un clavier ou une souris USB, connectez le câble à un port USB (d) situé sur la partie arrière de votre iMac.Chapitre 1 Prêt, feu, configurez ! 13 Étape 4 : appuyez sur le bouton d’alimentation (®) situé au dos pour allumer votre iMac. Un signal sonore retentit lorsque vous allumez l’iMac. Faites un clic avec la souris afin de la connecter à votre iMac. ® ® ® Important : si votre clavier et votre souris ne sont pas jumelés, suivez les instructions à l’écran pour les jumeler avec votre iMac. Cliquez une fois avec la souris pour établir une connexion. Pour en savoir plus sur le jumelage, voir la page 27.14 Chapitre 1 Prêt, feu, configurez ! Étape 5 : utilisez l’Assistant réglages pour configurer votre iMac. La première fois que vous démarrez votre iMac, l’Assistant réglages se met en route. Il vous aide à saisir les informations de connexion à Internet et au courrier électronique ainsi qu’à configurer un compte d’utilisateur sur votre iMac. Si vous possédez déjà un ordinateur Macintosh, l’Assistant réglages peut vous aider à transférer automatiquement les fichiers, les applications et d’autres informations de votre ancien Mac vers votre nouvel iMac. Si vous n’avez pas l’intention de garder ou d’utiliser votre autre Mac, il est préférable de retirer l’autorisation pour lire de la musique, des vidéos ou des livres audio que vous avez achetés sur iTunes Store. Si vous retirer l’autorisation d’un ordinateur, il n’est pas possible à une autre personne de lire les morceaux, les vidéos ou les livres audio achetés cela libère de la place pour utiliser une autre autorisation. Pour en savoir plus sur le retrait de l’autorisation d’accès, choisissez Aide iTunes dans le menu Aide d’iTunes. Si vous n’utilisez pas l’Assistant réglages pour transférer vos informations lors du démarrage initial, vous pouvez le faire ultérieurement à l’aide de l’Assistant migration. Accédez au dossier Applications, ouvrez Utilitaires et double-cliquez sur Assistant migration. Une fois la configuration terminée, vérifiez les mises à jour de logiciels. Choisissez le menu Pomme () > « Mise à jour de logiciels…» dans la barre de menu et suivez les instructions à l’écran.Chapitre 1 Prêt, feu, configurez ! 15 Étape 6 : personnalisez votre bureau et configurer vos préférences. Vous pouvez facilement personnalisez votre bureau à l’aide des Préférences Système, votre centre de commandes pour la plupart des réglages de votre iMac. Choisissez le menu Pomme () > Préférences Système dans la barre de menu, ou cliquez sur l’icône Préférences Système dans le Dock. Pour en savoir plus, ouvrez l’Aide Mac et recherchez « Préférences Système » ou la préférence que vous souhaitez modifier. Extinction ou suspension d’activité de votre iMac Lorsque vous avez terminé de travailler avec votre iMac suspendez son activité ou éteignez-le. Suspension de l’activité de votre iMac Si vous envisagez de ne pas utiliser votre iMac pendant une période courte, suspendezen l’activité. Lorsque l’activité de votre iMac est suspendue, son écran est noir. Vous avez la possibilité de réactiver votre iMac rapidement sans passer par la procédure de démarrage. Pour suspendre l’activité de votre iMac, procédez de l’une des manières suivantes :  Choisissez le menu Pomme () > Suspendre, dans la barre des menus.  Appuyez sur le bouton d’alimentation (®) situé au dos de votre iMac.  Choisissez le menu Pomme () > Préférences Système, puis cliquez sur Économiseur d’énergie et réglez une minuterie de mise en veille.  Maintenez enfoncé le bouton Lecture/Pause (’) de la télécommande optionnelle Apple Remote pendant 3 secondes.16 Chapitre 1 Prêt, feu, configurez ! Pour réactiver votre iMac, procédez de l’une des manières suivantes :  Appuyez sur n’importe quelle touche du clavier.  Cliquez à l’aide de la souris.  Appuyez sur le bouton d’alimentation (®) situé au dos de votre iMac.  Appuyez sur un des boutons de la télécommande optionnelle Apple Remote. À la réactivation de votre iMac, vos applications, vos documents et vos réglages sont conservés tels que vous les aviez laissés. Extinction de votre iMac Si vous ne comptez pas utiliser votre iMac pendant plusieurs jours, éteignez-le. Choisissez Apple () > Éteindre. Pour rallumer votre iMac, appuyez sur le bouton (®) d’alimentation. AVIS : éteignez votre iMac avant de le déplacer. Tout déplacement de votre iMac lorsque le disque dur est en train de tourner risque d’endommager ce dernier et d’entraîner une perte de données ou l’impossibilité de démarrer à partir du disque dur.Aide Mac iLife www.apple.com/fr/macosx Votre iMac au quotidien 218 Chapitre 2 Votre iMac au quotidien Caractéristiques de base de votre iMac Lecteur SuperDrive à chargement par fente Caméra iSight intégrée Micro intégré Lampe témoin de la caméra Logement de la carte SD Haut-parleurs stéréo intégrés Récepteur à infrarouge (IR) intégréChapitre 2 Votre iMac au quotidien 19 Micro intégré Enregistrez des sons directement sur votre iMac ou utilisez l’application iChat incluse pour converser avec vos amis sur Internet. Lampe témoin de la caméra La lampe témoin de la caméra est allumée lorsque la caméra iSight est en marche. Caméra iSight intégrée Cette caméra permet d’organiser des vidéoconférences à l’aide de l’application iChat, de prendre des photos à travers Photo Booth ou de capturer de la vidéo avec iMovie. Lecteur SuperDrive à chargement par fente Le lecteur SuperDrive à chargement par fente lit et écrit sur des CD et des DVD de taille standard. Logement de carte SD Transférez facilement vos photos, vidéos et données vers et à partir de votre iMac avec une carte SD. Haut-parleurs stéréo intégrés Ces haut-parleurs diffusent le son de vos fichiers de musique, de vos vidéos, de vos jeux ou d’autres fichiers multimédias. Récepteur à infrarouge (IR) intégré Utilisez une télécommande Apple Remote optionnelle (disponible séparément) avec le récepteur infrarouge pour contrôler Front Row et Keynote sur votre iMac à des distances pouvant aller jusqu’à 9,1 mètres.20 Chapitre 2 Votre iMac au quotidien Ports présents sur votre iMac ® Port de sortie casque/audio numérique optique Port d’entrée audio/ audio numérique optique , f Port Mini DisplayPort £ d Ports USB 2.0 (4) Port Ethernet (10/100/1000 Base-T) G H Port FireWire 800Chapitre 2 Votre iMac au quotidien 21 G Port Ethernet (10/100/1000Base-T) Connectez-vous à un réseau Ethernet 10/100/1000 Base-T à grande vitesse ou à un modem câble ou DSL, ou bien connectez-vous à un autre ordinateur et transférez les fichiers. Le port Ethernet détecte automatiquement les autres périphériques Ethernet. £ Port Mini Display Port Port de sortie avec prise en charge DVI, VGA et DVI double liaison. Le modèle de 27 pouces prend aussi en charge l’entrée vidéo de sources d’affichage externes. Les câbles et adaptateurs nécessaires sont disponibles séparément. d Quatre port USB 2.0 (Universal Serial Bus) à haut débit Grâce à ces ports, vous pouvez brancher entre autres un iPod, un iPhone, un iPas, une souris, un clavier, une imprimante, un disque dur, un appareil photo numérique, une manette de jeu ou un modem externe USB sur votre iMac. Ces ports peuvent également accueillir des périphériques USB 1.1. , Port d’entrée audio/audio numérique optique Branchez-y un micro externe alimenté ou tout autre équipement audio numérique. Ce port peut également servir de mini-prise stéréo 3,5 S/PDIF. f Port de sortie casque/audio numérique optique Connect headphones, external powered speakers, or digital audio equipment. Ce port peut également servir de mini-prise stéréo 3,5 S/PDIF. H Port FireWire 800 Connectez-y des périphériques externes à haute vitesse, tels que des caméras vidéo numériques ou des périphériques de stockage externe. Ce port offre une puissance maximale de 7 watts.22 Chapitre 2 Votre iMac au quotidien Autres composants de votre iMac ® Bouton d’alimentation Port secteur ® Accès à la mémoire (par-dessous) Logement de sécuritéChapitre 2 Votre iMac au quotidien 23 Port secteur Utilisez-le pour brancher le câble d’alimentation à votre iMac. Logement de sécurité Attachez votre ordinateur à l’aide d’un câble et d’un cadenas pour décourager les tentatives de vol (disponible séparément). ® Bouton d’alimentation Il permet d’allumer votre iMac ou de suspendre son activité. Maintenez ce bouton enfoncé pour redémarrer votre lors des procédures de dépannage. Accès à la mémoire Votre iMac est équipé d’au moins 4 Go de mémoire installée sous la forme de deux modules de mémoire de 2 Go chacun. Z Technologie sans fil AirPort Extreme (interne) Connectez-vous à un réseau sans fil grâce à la technologie AirPort Extreme intégrée. ◊ Technologie sans fil Bluetooth ® 2.1+EDR (interne) Connectez les appareils sans fil, tels que le clavier sans file Apple, la souris Apple Magic Mouse, les téléphones portables Bluetooth et les assistants numériques personnels.24 Chapitre 2 Votre iMac au quotidien Fonctionnalités du clavier sans fil Apple et de la souris Apple Magic Mouse Touches de luminosité Clavier Apple Wireless Keyboard Touches de réglage du volume - Exposé Dashboard Souris Apple Magic Mouse Touche d’éjection de disque C Touches multimédiaChapitre 2 Votre iMac au quotidien 25 Souris Apple Magic Mouse Intègre un moteur de suivi laser, la technologie sans fil Bluetooth, un interpréteur transparent qui utilise la technologie Multi-Touch pour prendre en charge plusieurs boutons, le défilement 360°, l’agrandissement écran et le contrôle du curseur de votre iMac. Utilisez les préférences Souris pour ajuster le suivi, les clics et la vitesse de défilement ou pour ajouter la prise en charge d’un bouton secondaire (voir la page 29). Clavier sans fil Apple Combinez la liberté du sans fil avec les fonctions clés pré-programmées pour fonctionner avec vos applications. C Touche d’éjection de disque Maintenez cette touche enfoncée pour éjecter un disque. Vous pouvez aussi éjecter un disque en faisant glisser son icône dans la Corbeille. Touche Dashboard (F4) Vous permet d’ouvrir le Dashboard pour accéder à vos widgets. Touche Exposé (F3) Ouvrez Exposé pour afficher simultanément toutes les fenêtres ouvertes sur votre bureau. Touches de réglage de luminosité (F1, F2) Augmentez ( ) ou diminuez ( ) la luminosité de l’écran. ’ Clés d’accès (F7, F8, F9) Effectuez un retour rapide ( ), lancez la lecture ou mettez en pause (’), ou effectuez une avance rapide ( ) durant l’écoute d’un morceau de musique, le visionnage d’une vidéo ou la présentation d’un diaporama. - Touches de réglage du volume (F10, F11, F12) Coupez le son (—), baissez (–) ou augmentez (-) le volume du son diffusé par les hautparleurs ou à travers le port de sortie casque de votre iMac.26 Chapitre 2 Votre iMac au quotidien Utilisation du clavier sans fil Apple Votre clavier sans fil, fourni avec deux piles AA, est déjà jumelé avec votre iMac. Le jumelage signifie que votre clavier et votre iMac sont connectés sans fil et peuvent communiquer entre eux. À propos de la lampe témoin Le voyant DEL de votre clavier sans fil fonctionne comme indicateur de piles et comme voyant d’état. Lorsque vous allumez votre clavier pour la première fois, le voyant reste allumé pendant 5 secondes, indiquant que les piles sont en bon état, puis s’éteint. Si vous appuyez sur le bouton Marche/Arrêt (®) de votre clavier sans fil et que la lampe témoin ne s’allume pas, vous devez changer les piles. Consultez « Remplacement des piles » à la page 47. Lampe témoin Bouton Marche/ArrêtChapitre 2 Votre iMac au quotidien 27 Pour jumeler votre clavier sans fil Si votre clavier sans fil n’est pas jumelé avec votre , la lampe témoin se met à clignoter. Cela indique que votre clavier est en mode découverte et qu’il est prêt pour le jumelage avec votre iMac. Pour jumeler votre clavier sans fil : 1 Appuyez puis relâchez le bouton Marche/Arrêt (®) pour allumer votre clavier sans fil. 2 Choisissez le menu Pomme () > Préférences Système, puis cliquez sur Clavier. 3 Cliquez sur « Configurer le clavier Bluetooth… », situé dans l’angle inférieur droit. 4 Sélectionnez votre clavier sans fil, puis suivez les instructions à l’écran. Si vous ne jumelez pas votre clavier avec votre iMac au cours des 3 minutes, la lampe témoin et le clavier s’éteignent pour économiser la durée des piles. Appuyez sur le bouton Marche/Arrêt (®) pour allumer à nouveau votre clavier et le jumeler avec votre iMac. Une fois le jumelage entre votre clavier et votre iMac terminé, la lampe témoin reste allumée pendant 3 secondes puis s’éteint. Utilisation de votre clavier Personnalisez votre clavier en utilisant les préférences Clavier. Vous pouvez notamment changer les touches de modification et assigner les raccourcis clavier aux commandes du menu liées à une application Mac OS X ou au Finder. Pour personnaliser votre clavier : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur Clavier, puis sur Clavier ou Raccourcis clavier.28 Chapitre 2 Votre iMac au quotidien Utilisation de la souris Apple Magic Mouse Votre souris sans fil Apple Magic Mouse, fournie avec deux piles AA, est déjà jumelée avec votre iMac. Le jumelage signifie que votre Apple Magic Mouse et votre iMac peuvent communiquer grâce à une connexion sans fil établie entre eux. À propos de la lampe témoin Lorsque vous allumez votre souris Apple Magic Mouse pour la première fois, le voyant reste allumé pendant 5 secondes, indiquant que les piles sont en bon état. Lorsque vous allumez votre souris et que la lampe témoin ne s’allume pas, vous devez changer les piles. Consultez « Remplacement des piles » à la page 47. Lampe témoin Interrupteur Marche/ArrêtChapitre 2 Votre iMac au quotidien 29 Pour jumeler votre clavier sans fil : Si votre souris Apple Magic Mouse n’est pas jumelée avec votre iMac, la lampe témoin se met à clignoter. Cela indique que votre souris est en mode découverte et qu’elle est prête pour le jumelage. Pour jumeler votre souris : 1 Allumez la souris en faisant glisser l’interrupteur Marche/Arrêt situé sur sa partie inférieure. 2 Choisissez le menu Pomme () > Préférences Système, puis cliquez sur Souris. 3 Cliquez sur « Configurer la souris Bluetooth… », situé dans l’angle inférieur droit. 4 Sélectionnez votre souris sans fil, puis suivez les instructions à l’écran. Si vous ne jumelez pas votre souris avec votre iMac au cours des 3 minutes, la lampe témoin et la souris s’éteignent pour économiser la durée des piles. Faites glisser l’interrupteur Marche/Arrêt pour allumer à nouveau votre souris et la jumeler avec votre iMac. Une fois le jumelage entre votre souris et votre iMac terminé, la lampe témoin reste allumée. Utilisation de la souris Apple Magic Mouse Pour en savoir plus sur les gestes Multi-Touch que vous pouvez faire avec votre souris Apple_Magic Mouse ou pour modifier son fonctionnement, utilisez les Préférences Souris. Choisissez le menu Pomme () > Préférences Système, puis cliquez sur Souris.30 Chapitre 2 Votre iMac au quotidien Utilisation de la télécommande Apple Remote Si une télécommande Apple Remote vous a été fournie, vous pouvez l’utiliser avec tous les produits Apple disposant d’un récepteur à infrarouge (IR) intégré. Contrôlez et lisez un film DVD ou de la musique de votre bibliothèque iTunes, visionnez des diaporamas de photos, des bandes-annonces et bien plus. Haut Bas Menu Lecture/Pause Gauche Droite Sélection Pour jumeler votre télécommande : 1 Appuyez sur Lecture/Pause pour lancer lecture ou mettre en pause l’écoute d’un morceau de musique, le visionnage d’une vidéo ou la présentation d’un diaporama. 2 Appuyez sur Droite ou Gauche pour passer à la chanson suivante ou revenir à la précédente de votre bibliothèque iTunes ou au chapitre précédent ou suivant sur un DVD. 3 Maintenez Droite ou Gauche enfoncée pour l’avance ou le retour rapide dans un morceau ou une vidéo. 4 Appuyez sur Haut ou Bas pour ajuster le volume.Chapitre 2 Votre iMac au quotidien 31 Jumelage de votre télécommande Apple Remote Jumeler votre télécommande Apple Remote avec votre iMac ou un autre produit Apple. Une fois le jumelage avec votre iMac ou un autre produit Apple, l’appareil ne peut être contôlé qu’au moyen de cette télécommande. Pour jumeler votre télécommande : 1 Approchez-vous à 8 ou 10 cm de votre iMac ou autre produit Apple. 2 Dirigez votre télécommande vers le récepteur à infrarouge de votre iMac ou de votre produit Apple. 3 Maintenez les boutons Droite et Menu enfoncés 5 secondes. Une fois le jumelage effectué, une icône de maillon de chaîne s’affiche à l’écran. Pour désactiver le jumelage de votre télécommande et de votre iMac : 1 Choisissez le menu Pomme () > Préférences Système dans la barre de menu. 2 Cliquez sur Sécurité, puis sur « Désactiver le jumelage ». Pour l’Apple TV ou d’autres produits Apple, maintenez les boutons Menu et Gauche enfoncés pour désactiver le jumelage. Remplacement de la pile Pour remplacer la pile : 1 Utilisez une pièce pour retirer le couvercle du compartiment de la pile. 2 Insérez une pile CR2032, la face positive (+) tournée vers le haut.32 Chapitre 2 Votre iMac au quotidien 3 Remettez le couvercle en place et resserrez-le à l’aide d'une pièce de monnaie. Compartiment pour la pile Comment obtenir des réponses à vos doutes De plus amples informations concernant votre iMac sont disponibles dans l’aide Mac et sur Internet, à l’adresse www.apple.com/fr/support/imac. Pour ouvrir l’Aide Mac : 1 Cliquez sur l’icône du Finder dans le Dock (la barre des icônes située au bord de l’écran). 2 Choisissez Aide > Aide Mac (cliquez sur le menu Aide dans la barre des menus puis sélectionnez Aide Mac). 3 Cliquez dans le champ Rechercher, tapez votre question puis appuyez sur la touche Retour du clavier. Informations supplémentaires Pour en savoir plus sur l’utilisation de votre iMac, consultez le tableau suivant : Pour en savoir plus sur… Consultez L’installation de mémoire le chapitre 3, « Augmentez votre mémoire » à la page 35. Le dépannage de votre iMac en cas de problème le chapitre 4, « À tout problème sa solution » à la page 43.Chapitre 2 Votre iMac au quotidien 33 Pour en savoir plus sur… Consultez L’obtention de services et d’une assistance pour votre iMac « Informations, services et assistance » à la page 59. Vous pouvez également vous rendre sur le site web d’assistance Apple à l’adresse www.apple.com/fr/support. L’utilisation de Mac OS X Le site web de Mac OS X à l’adresse www.apple.com/fr/macosx ou recherchez « Mac OS X » dans l’Aide Mac. La migration depuis un PC vers un Mac « Pourquoi vous adorerez le Mac » sur www.apple.com/fr/getamac/whymac. L’utilisation des applications iLife Le site web d’iLife à l’adresse www.apple.com/fr/ilife. Vous pouvez aussi ouvrir une application iLife, ouvrir l’aide consacrée à cette application, puis saisir une question dans le champ de recherche. La modification des Préférences Système Les Préférences Système en choisissant le menu Pomme (K) > Préférences Système. Vous pouvez également rechercher « préférences système » dans l’Aide Mac. L’utilisation de la caméra iSight L’Aide Mac en recherchant « iSight ». Utilisation de votre clavier ou de votre souris Les Préférences Système en choisissant Clavier ou Souris. Vous pouvez également ouvrir l’Aide Mac et rechercher le terme « clavier » ou « souris ». L’utilisation de la technologie sans fil AirPort Extreme La page web d’assistance AirPort à l’adresse www.apple.com/support/airport. Vous pouvez également ouvrir l’Aide Mac et rechercher le terme « AirPort ». L’utilisation de la technologie sans fil Bluetooth Ouvrez l’Aide Mac et recherchez le terme « Bluetooth ». Vous pouvez également consulter la page web d’assistance Bluetooth à l’adresse www.apple.com/fr/support/bluetooth.34 Chapitre 2 Votre iMac au quotidien Pour en savoir plus sur… Consultez La connexion d’une imprimante L’Aide Mac en recherchant « impression ». Les connexions FireWire et USB. L’Aide Mac en recherchant « FireWire » ou « USB ». La connexion à Internet L’Aide Mac en recherchant « Internet ». Un moniteur externe Ouvrez l’Aide Mac et rechercher les termes « port de sortie vidéo » ou « mode moniteur externe ». La télécommande Apple Remote L’Aide Mac en recherchant « télécommande ». Front Row L’Aide Mac en recherchant « Front Row ». L’utilisation du lecteur SuperDrive L’Aide Mac en recherchant « lecteur optique ». Les caractéristiques La page des Caractéristiques à l’adresse www.apple.com/fr/support/specs pour les caractéristiques techniques standard. Vous pouvez également ouvrir Informations Système en choisissant le menu Pomme (K) > « À propos de ce Mac » dans la barre des menus, puis en cliquant sur Plus d’infos. Actualités Apple, téléchargements gratuits et catalogues en ligne de logiciels et de matériel Le site web d’Apple, à l’adresse www.apple.com/fr/. Instructions, assistance technique et manuels destinés aux produits Apple Le site d’assistance Apple, à l’adresse www.apple.com/fr/support.Aide Mac RAM www.apple.com/fr/store Augmentez votre mémoire 336 Chapitre 3 Augmentez votre mémoire Votre iMac est équipé d’au moins 4 gigaoctets (Go) de mémoire DRAM (Dynamic Random Access) DDR 3 (Double Data Rate 3) installés sous la forme de deux modules de mémoire de 2 Go chacun. Vous pouvez augmenter la mémoire jusqu’à 16 Go en remplaçant ou en installant de la mémoire supplémentaire par des modules de mémoire de 2 ou 4 Go. Les modules de mémoire doivent être conformes aux spécifications suivantes :  format Small Outline Dual Inline Memory Module (SO-DIMM) ;  1333 MHz, PC3-8500, compatible DDR3 (également appelé DDR3 1333) ;  sans tampon et non enregistrée. AVERTISSEMENT : Apple vous recommande de confier l’installation de mémoire à un technicien agréé Apple. Consultez les informations sur le dépannage et l’assistance qui accompagnent votre iMac pour savoir comment contacter Apple. Tout dommage causé à votre matériel en tentant d’installer vous-même de la mémoire n’est pas couvert par la garantie limitée de votre iMac.Chapitre 3 Augmentez votre mémoire 37 L’installation de mémoire Votre iMac possède quatre logements mémoire. Deux sont occupés respectivement par un module de mémoire d’au moins 2 Go. Vous pouvez installer de la mémoire supplémentaire dans les logements libres ou remplacer la mémoire des logements occupés par des modules de mémoire de 2 ou 4 Go. Vous pouvez acheter de la mémoire Apple supplémentaire chez un revendeur agréé Apple, dans un magasin Apple Store ou sur l’Apple Store en ligne à l’adresse www.apple.com/fr/store. AVERTISSEMENT : éteignez toujours votre iMac et retirez le câble d’alimentation avant d’installer de la mémoire. N’essayez pas d’installer de la mémoire alors que votre iMac est branché. Pour installer de la mémoire : 1 Éteignez votre iMac en choisissant le menu Pomme () > Éteindre. 2 Débranchez tous les câbles de votre iMac, y compris le câble d’alimentation. 3 Placez un linge ou un chiffon propre et doux sur votre surface de travail. Tout en tenant votre iMac par les côtés, posez-le à plat de manière à faire reposer l’écran contre la surface de la table et à tourner la partie inférieure de l’ordinateur vers vous.38 Chapitre 3 Augmentez votre mémoire 4 Soulevez le socle et utilisez un tournevis cruciforme n° 2 pour desserrer les trois vis imperdables sur le cache d’accès à la mémoire. Faites-les tourner dans le sens inverse des aiguilles d’une montre. Tournevis cruciforme Soulevez le socle ® Cache d’accès à la mémoire 5 Retirez le cache d’accès à la mémoire et mettez-le de côté.Chapitre 3 Augmentez votre mémoire 39 6 Sortez les languettes du compartiment de mémoire. 7 Pour remplacer un module de mémoire, vous devez tirer sur la languette afin d’éjecter le module de mémoire installé. Retirez les modules de mémoire que vous souhaitez remplacer. ® Sortez la languette Sortez la languette40 Chapitre 3 Augmentez votre mémoire 8 Insérez les nouveaux modules de mémoire dans les logements, avec l’encoche tournée vers la droite, comme indiqué sur l’illustration.  Si vous installez des modules de mémoires supplémentaires, insérez-les dans les logements vides.  Si vous remplacez des modules de mémoires existants, insérez un nouveau module dans chacun des logements se trouvant le loin du moniteur. 9 Enfoncez fortement chaque module de mémoire dans son logement. Vous entendrez un léger clic indiquant que le module de mémoire est correctement installé. 10 Remettez les languettes dans le compartiment de mémoire. ® Modules de mémoire Remettez la languetteChapitre 3 Augmentez votre mémoire 41 11 Remettez le cache d’accès à la mémoire en place et resserrez les trois vis imperdables à l’aide d’un tournevis cruciforme n° 2. AVERTISSEMENT : n’oubliez pas de remettre le cache d’accès à la mémoire en place après avoir installé la mémoire. Votre iMac ne fonctionnera pas correctement sans le cache d’accès à la mémoire. Tournevis cruciforme Soulevez le socle ® Cache d’accès à la mémoire 12 Tenez votre iMac par les côtés pour le remettre en position de marche. Reconnectez ensuite les câbles et le cordon d’alimentation. 13 Allumez votre iMac en appuyant sur le bouton d’alimentation (®) situé à l’arrière.42 Chapitre 3 Augmentez votre mémoire Vérification de la reconnaissance de la nouvelle mémoire par votre iMac Après avoir installé la mémoire, assurez-vous que l’ordinateur la reconnaît. Pour vérifier la mémoire installée sur votre iMac : 1 Démarrez votre iMac. 2 Lorsque le bureau Mac OS s’affiche, choisissez le menu Pomme () > À propos de ce Mac. La quantité totale de mémoire installée sur votre iMac s’affichera alors. Pour un aperçu plus détaillé de la quantité de mémoire installée, ouvrez Informations Système en cliquant sur Plus d’infos. Si la mémoire que vous avez installée n’atteint pas le niveau de la configuration requise (voir la page 36), votre iMac sonnera trois fois toutes les cinq secondes. Si tel est le cas, éteignez votre iMac et vérifiez à nouveau les instructions d’installation pour vous assurer que la mémoire est compatible avec votre iMac et qu’elle est correctement installée. Si les problèmes persistent, retirez la mémoire et consultez les informations d’assistance technique fournies avec la mémoire ou contactez le fournisseur de la mémoire.Aide Mac aide www.apple.com/fr/support À tout problème sa solution 444 Chapitre 4 À tout problème sa solution Il se peut que vous rencontriez à titre exceptionnel des problèmes en utilisant votre iMac. Ce chapitre vous propose des conseils de dépannage à essayer en cas de problème. Vous trouverez également d’autres informations de dépannage dans l’Aide Mac ou sur le site web d’assistance à l’adresse www.apple.com/fr/support/imac. Il existe généralement une solution simple et rapide aux problèmes qui peuvent survenir au cours de l’utilisation de votre iMac. Si vous rencontrez un problème, essayez de noter les opérations que vous avez effectuées avant que le problème ne survienne. Ce récapitulatif permet de restreindre les causes possibles du problème et de trouver la solution. Les éléments à noter comprennent :  Les applications que vous étiez en train d’utiliser quand le problème est apparu. Les problèmes qui ne surgissent qu’avec une application particulière peuvent indiquer que cette application n’est pas compatible avec la version de Mac OS installée sur votre iMac.  Tout logiciel que vous avez récemment installé.  Tout nouveau composant matériel connecté ou installé (mémoire supplémentaire ou périphérique, par exemple). AVERTISSEMENT : n’essayez pas d’ouvrir votre iMac,sauf pour y installer de la mémoire. Si votre iMac a besoin d’être inspecté, reportez-vous à la rubrique « Informations, services et assistance » à la page 59 pour savoir comment contacter Apple ou un fournisseur de services agréé Apple. L’utilisateur ne peut remplacer aucune pièce de l’iMac excepté la mémoire.Chapitre 4 À tout problème sa solution 45 Problèmes vous empêchant d’utiliser votre iMac Si votre iMac ne répond plus ou que le pointeur se fige  Vérifiez que votre clavier sans fil Apple ou votre souris Apple Magic Mouse est activé et que les pilessont en état de marche. (Consultez « Remplacement des piles » à la page 47.) Si vous utilisez un clavier ou une souris USB, assurez-vous qu’ils sont connectés. Débranchez puis rebranchez les connecteurs et vérifiez qu’ils sont correctement mis en place.  Essayez de forcer à quitter les applications qui rencontrent un problème. Maintenez les touches Option et Commande (x) enfoncées, puis appuyez sur Échap. Si une zone de dialogue apparaît, sélectionnez-y l’application et cliquez sur Forcer à quitter. Enregistrez alors le travail de toute application ouverte, puis redémarrez l’iMac afin de vous assurer que le problème est entièrement réglé.  Si vous ne parvenez pas à forcer la fermeture de l’application, éteignez votre ordinateur en maintenant enfoncé le bouton d’alimentation (®) situé à l’arrière de votre iMac pendant cinq secondes. Débranchez le câble d’alimentation de l’iMac. Rebranchez ensuite le câble, puis appuyez sur le bouton d’alimentation (®) pour rallumer l’iMac. Si le problème survient chaque fois que vous utilisez une application particulière, consultez le fabricant de cette application pour vérifier si elle est compatible avec votre iMac. Pour obtenir des informations de contact et d’assistance concernant les logiciels fournis avec votre ordinateur, consultez la page www.apple.com/guide ou rendez-vous sur le site du fabricant. Si le problème survient fréquemment, essayez de réinstaller votre logiciel système (consultez la rubrique « Réinstallation des logiciels fournis avec votre iMac » à la page 56).46 Chapitre 4 À tout problème sa solution Si votre iMac se bloque au démarrage ou si un point d’interrogation clignotant apparaît  Patientez quelques secondes. Si votre iMac ne démarre pas dans un bref délai, éteignez-le en maintenant le bouton d’alimentation (®) enfoncé pendant 5 secondes. Maintenez ensuite la touche Option enfoncée tout en appuyant à nouveau sur le bouton d’alimentation (®) pour démarrer votre ordinateur. Maintenez la touche Option enfoncée jusqu’au démarrage de votre iMac, puis cliquez sur la flèche située sous l’icône du disque dur que vous voulez utiliser.  Après le démarrage de votre iMac, ouvrez Préférences Système et cliquez sur Démarrage. Sélectionnez un dossier système local de Mac OS X.  Si le problème survient fréquemment, il se peut que vous deviez réinstaller votre logiciel système (consultez la rubrique « Problèmes vous empêchant d’utiliser votre iMac » à la page 45). Si votre iMac ne répond plus ou que le pointeur se fige  Assurez-vous que le câble d’alimentation est correctement connecté à l’iMac et branché sur une prise électrique en état de marche.  Appuyez sur le bouton d’alimentation (®) et maintenez immédiatement les touches Commande (x), Option, P et R enfoncées jusqu’à ce que vous entendiez une deuxième fois le signal sonore de démarrage. Cela permet de réinitialiser la mémoire RAM des paramètres (PRAM).  Si vous avez récemment installé de la mémoire et que votre iMac fait retentir une sonnerie toutes les cinq secondes, assurez-vous que la mémoire est correctement installée et qu’elle est compatible avec votre iMac. Vérifiez si le retrait de cette mémoire permet à l’iMac de démarrer (voir la page 42).Chapitre 4 À tout problème sa solution 47  Débranchez le câble d’alimentation et attendez au moins 30 secondes. Rebranchez le câble, puis appuyez sur le bouton d’alimentation (®) pour allumer votre iMac.  Si vous ne parvenez toujours pas à redémarrer votre iMac, consultez la rubrique « Informations, services et assistance » à la page 59 pour obtenir les coordonnées du service de réparation Apple. Remplacement des piles Votre clavier sans fil Appleet votre souris Apple Magic Mouse sont fournis avec deux piles AA déjà installées. Vous pouvez les remplacer par des piles AA alcalines, au lithium ou rechargeables. Conservez le couvercle du compartiment des piles hors de portée des enfants en bas âge. AVERTISSEMENT : lorsque vous remplacez les piles, remplacez-les toutes en même temps. Ne mélangez pas les anciennes piles avec les nouvelles et ne mélangez pas différents types de piles (par exemple, des piles alcalines et des piles au lithium). N’ouvrez pas les piles, ne les percez pas, ne les installez pas à l’envers ou ne les exposez pas à des flammes, à des températures élevées ou à de l’eau. Conservezles hors de portée des enfants.48 Chapitre 4 À tout problème sa solution Pour changer les piles de votre clavier sans fil : 1 Appuyez puis relâchez le bouton Marche/Arrêt (®) pour allumer votre clavier sans fil. 2 Utilisez une pièce pour retirer le couvercle du compartiment des piles. Couvercle du compartiment des piles 3 Placez deux piles AA dans le compartiment des piles comme illustré ci-dessous. Insérez les piles 4 Replacez le couvercle du compartiment des piles. Pour contrôler l’état des piles, appuyez sur le bouton Marche/Arrêt (®). Si la lampe témoin ne s’allume pas, vous devez changer les piles. Vous pouvez contrôler l’état des piles dans les Préférences Clavier. Choisissez le menu Pomme () > Préférences Système, puis cliquez sur Clavier. L’état des piles apparaît à gauche en bas.Chapitre 4 À tout problème sa solution 49 Pour remplacer les piles de la souris Apple Magic Mouse : 1 Allumez la souris en faisant glisser l’interrupteur Marche/Arrêt situé sur sa partie inférieure. 2 Faites glisser le loquet et retirez le couvercle des piles. Loquet Piles 3 Insérez les piles, face positive (+) vers le haut, comme illustré ci-dessous. 4 Replacez le couvercle et allumez votre souris. vous devez cliquer une fois avec votre souris Apple Magic Mouse pour la reconnecter avec votre iMac. Faites glisser l’interrupteur Marche/Arrêt (®) situé sur la partie inférieure de la souris pour vérifier l’état des piles. Si la lampe témoin ne s’allume pas, vous devez changer les piles. Vous pouvez contrôler l’état des piles dans les Préférences Souris. Choisissez le menu Pomme () > Préférences Système, puis cliquez sur Souris. L’état des piles apparaît à gauche en bas.50 Chapitre 4 À tout problème sa solution Utilisation d’Apple Hardware Test Si vous pensez que votre iMac souffre d’un problème matériel, utilisez l’application Apple Hardware Test pour vérifier s’il existe un problème avec l’un des composants de l’ordinateur (tels que la mémoire ou le processeur). Pour utiliser Apple Hardware Test : 1 Déconnectez tous les périphériques externes de votre iMac, exceptés le clavier et la souris USB si vous les utilisez. Si un câble Ethernet est connecté, déconnectez-le. 2 Redémarrez votre iMac en maintenant la touche D enfoncée. 3 Lorsque l’écran de sélection de langue de l’application Apple Hardware Test apparaît, sélectionnez la langue à utiliser. 4 Appuyez sur la touche Retour ou sur le bouton Continuer. 5 Lorsque l’écran principal Apple Hardware Test apparaît (environ 45 secondes plus tard), suivez les instructions affichées à l’écran. 6 Apple Hardware Test affiche un code d’erreur dès qu’un problème est détecté. Notez le code d’erreur avant d’entreprendre les démarches d’assistance. Si aucune panne matérielle n’est détectée par Apple Hardware Test, il s’agit peut-être d’un problème de logiciel. Si cette procédure ne donne aucun résultat, vous pouvez insérer le DVD d’installation d’applications fourni avec votre iMac pour utiliser l’application Apple Hardware Test. Pour en savoir plus, consultez le fichier Ouvrez-moi Apple Hardware Test disponible sur le DVD d’installation d’applications.Chapitre 4 À tout problème sa solution 51 Problèmes de connexion à Internet Votre iMac dispose de l’application Assistant réglages de réseau pour vous aider tout au long de la procédure de configuration d’une connexion Internet. Ouvrez Préférences Système, puis cliquez sur Réseau. Cliquez sur le bouton « Assistant » pour ouvrir l’Assistant réglages de réseau. En cas de problème avec votre connexion Internet, vous pouvez soit essayer les étapes de cette rubrique en fonction de votre type de connexion, soit utiliser Diagnostic réseau. Pour utiliser Diagnostic réseau : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur Réseau puis cliquez sur « Assistant ». 3 Cliquez sur Diagnostic pour lancer Diagnostic réseau. 4 Suivez les instructions à l’écran. Si Diagnostic réseau n’est pas en mesure de résoudre le problème, celui-ci se situe peut-être au niveau du fournisseur d’accès à Internet (FAI) auquel vous essayez de vous connecter, du périphérique externe utilisé pour la connexion au FAI ou du serveur auquel vous essayez d’accéder. Vous pouvez essayer les instructions décrites dans les rubriques suivantes. Connexion à Internet par modem câble, modem DSL et réseau local (LAN) Assurez-vous que tous les câbles du modem sont fermement branchés, y compris le câble d’alimentation du modem, le câble reliant le modem à l’ordinateur, ainsi que le câble reliant le modem à la prise murale. Vérifiez également les câbles et l’alimentation de vos éventuels routeurs et concentrateurs Ethernet.52 Chapitre 4 À tout problème sa solution Éteignez, puis rallumez le modem afin de réinitialiser le matériel du modem. Éteignez le modem câble ou DSL, puis rallumez-le après quelques minutes. Certains fournisseurs d’accès à Internet conseillent de débrancher le câble d’alimentation du modem. Si votre modem dispose d’un bouton de réinitialisation, vous pouvez l’actionner avant ou après avoir éteint puis rallumé le modem. Important : les instructions faisant référence à des modems ne concernent pas les utilisateurs de réseau local. Ces derniers peuvent disposer de concentrateurs, de commutateurs, de routeurs ou de blocs de connexion que les utilisateurs de modem DSL ne possèdent pas. Les utilisateurs de réseau local doivent s’adresser à leur administrateur réseau plutôt qu’à un fournisseur d’accès à Internet. Connexions PPPoE Si vous ne parvenez pas à vous connecter à votre fournisseur d’accès à Internet via PPPoE (Point to Point Protocol over Ethernet), assurez-vous que les données saisies dans les préférences Réseau sont correctes. Pour saisir les réglages PPPoE : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur Réseau. 3 Cliquez sur Ajouter (+) en bas de la liste des services de connexion réseau et choisissez PPPoE dans le menu local Interface. 4 Choisissez une interface pour le service PPPoE dans le menu local Ethernet. Choisissez Ethernet si vous vous connectez à un réseau câblé ou AirPort si vous vous connectez à un réseau sans fil.Chapitre 4 À tout problème sa solution 53 5 Saisissez les informations fournies par votre fournisseur d’accès, tel que le nom du compte, le mot de passe et le nom du service PPPoE (si votre fournisseur d’accès le demande). 6 Cliquez sur Appliquer pour activer les réglages. Connexions au réseau Assurez-vous que le câble Ethernet est branché sur votre iMac et sur le réseau. Vérifiez les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet. Si vous disposez de plusieurs ordinateurs partageant une connexion à Internet, assurez-vous que votre réseau est correctement configuré. Vous devez savoir si votre fournisseur d’accès à Internet fournit une seule ou plusieurs adresses IP, autrement dit, une pour chaque ordinateur. Si une seule adresse IP est utilisée, vous devez disposer d’un routeur capable de partager la connexion (on parle alors de conversion d’adresse réseau (NAT) ou de « masquage d’adresses IP »). Pour obtenir des informations sur la configuration, consultez la documentation fournie avec votre routeur ou contactez la personne qui a configuré votre réseau. La borne d’accès AirPort peut être utilisée pour partager plusieurs adresses IP entre plusieurs ordinateurs. Pour en savoir plus sur l’utilisation d’une borne d’accès AirPort, consultez l’Aide Mac ou rendez-vous sur le site web de l’AirPort Extreme, à l’adresse www.apple.com/fr/support/airport. Si ces informations ne vous permettent pas de résoudre le problème, adressez-vous à votre fournisseur d’accès à Internet ou à votre administrateur réseau.54 Chapitre 4 À tout problème sa solution Problèmes de communication sans fil avec AirPort En cas de problèmes avec les communications sans fil AirPort :  Vérifiez que l’ordinateur ou le réseau auquel vous souhaitez vous connecter est actif et dispose d’un point d’accès sans fil.  Assurez-vous que vous avez correctement configuré le logiciel en respectant les instructions fournies avec votre borne d’accès ou votre point d’accès.  Assurez-vous que l’autre ordinateur ou le point d’accès au réseau se trouve dans la zone de couverture de l’antenne de votre ordinateur. Des appareils électroniques ou des structures métalliques se trouvant à proximité peuvent interférer avec les communications sans fil et réduire la portée de votre antenne. Il est possible d’améliorer la réception en réorientant ou en faisant pivoter l’ordinateur.  Vérifiez le menu d’état AirPort (Z) dans la barre des menus. Ce menu affiche jusqu’à quatre barres indiquant la puissance du signal. Si le signal est faible, essayez de changer de place.  Consultez l’Aide AirPort (choisissez Aide > Aide Mac, puis Bibliothèque > Aide AirPort dans la barre des menus). Lisez également les instructions fournies avec le périphérique sans fil. Maintien à jourde votre logiciel Vous pouvez vous connecter à Internet pour télécharger et installer automatiquement les dernières versions de logiciels, gestionnaires et autres améliorations fournies par Apple.Chapitre 4 À tout problème sa solution 55 Chaque fois que vous vous connectez à Internet, Mise à jour de logiciels recherche des mises à jour disponibles pour votre ordinateur. Vous pouvez régler votre iMac pour que cette recherche soit effectuée de manière périodique, afin que vous puissiez télécharger et installer des logiciels mis à jour. Pour rechercher des mises à jour de logiciels : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur l’icône Mise à jour de logiciels, puis suivez les instructions à l’écran.  Pour en savoir plus, recherchez « Mise à jour de logiciels » dans l’Aide Mac.  Pour obtenir les toutes dernières informations sur Mac OS X, rendez-vous à l’adresse www.apple.com/fr/macosx. Lorsqu’une application ne répond plus Il peut arriver, très rarement, qu’une application se « fige » à l’écran. Avec Mac OS X, il est possible de quitter une application qui ne répond plus sans redémarrer votre iMac, ce qui permet d’enregistrer le travail effectué dans d’autres applications ouvertes. Pour forcer une application à quitter : 1 Appuyez sur Commande (x) + Option + Échap ou choisissez le menu Pomme () > Forcer à quitter. La boîte de dialogue Forcer à quitter des applications apparaît avec l’application sélectionnée. 2 Cliquez sur Forcer à quitter. L’application quitte, en laissant toutes les autres applications ouvertes.56 Chapitre 4 À tout problème sa solution Réinstallation des logiciels fournis avec votre iMac Les disques d’installation de logiciels fournis avec votre iMac permettent de réinstaller Mac OS X et toute application livrée avec votre ordinateur. Important : Apple vous recommande de sauvegarder les données de votre disque dur avant de restaurer le logiciel. Apple décline toute responsabilité en cas de perte de données. Installation de Mac OS X Pour installer Mac OS X : 1 Sauvegardez vos fichiers importants. 2 Insérez le DVD d’installation de Mac OS X fourni avec votre iMac. 3 Double-cliquez sur « Installer Mac OS X ». 4 Suivez les instructions à l’écran. Lorsque, dans la sous-fenêtre, vous êtes invité à sélectionner un disque, choisissez votre disque dur actuel Mac OS X (dans la plupart des cas, ce sera le seul disque disponible). 5 Pour choisir les parties de Mac OS X à installer, cliquez sur Personnaliser, puis sélectionnez les parties que vous souhaitez installer. Cliquez sur le triangle d’affichage situé à côté d’Applications pour cocher les cases des applications que vous souhaitez installer. 6 Une fois l’installation terminée, cliquez sur Redémarrer pour redémarrer votre iMac. 7 Suivez les instructions de l’Assistant réglages pour configurer votre nouveau compte utilisateur.Chapitre 4 À tout problème sa solution 57 Si vous souhaitez effacer et installer, assurez-vous de sauvegarder vos données d’utilisateur avant de commencer. Utilisez Utilitaire de disque sur votre DVD d’installation de Mac OS X pour effacer votre disque dur. Pour plus d’informations à propos d’Utilitaire de disque, consultez l’Aide Mac ou ouvrez Utilitaire de disque (dans Apllications / Utilitaires) et sélectionnez Aide > Aide Utilitaire de disque. Vous pouvez également trouver des informations détaillées dans l’article suivant : http://support.apple.com/kb/HT3910?viewlocale=fr_FR. L’installation des applications iLife Vous pouvez réinstaller les application iLife fournies avec votre iMac si vous les avez accidentellement supprimées ou après avoir effectué un effacer et installer. Pour installer les applications iLife fournies avec votre ordinateur : 1 Insérez le DVD d’installation d’applications fourni avec votre iMac. 2 Suivez les instructions à l’écran. Dans la sous-fenêtre Type d’installation, cliquez sur Personnaliser. 3 Une fois l’installation terminée, cliquez sur Fermer. Autres problèmes Pour les problèmes liés aux logiciels provenant d’éditeurs tiers, contactez l’éditeur concerné. Les fabricants de logiciels proposent souvent des mises à jour de leurs produits sur leur site web.58 Chapitre 4 À tout problème sa solution Vous pouvez utiliser la sous-fenêtre Mise à jour de logiciels des Préférences Système pour rechercher et installer les logiciels Apple les plus récents. Par défaut, votre iMac recherche automatiquement les mises à jour une fois par semaine, mais vous pouvez le configurer pour qu’il effectue cette recherche une fois par jour ou une fois par mois. Vous pouvez également rechercher manuellement les mises à jour. Pour plus d’informations, choisissez Aide > Aide Mac, puis recherchez « Mise à jour de logiciels ». En cas de problèmes avec l’insertion d’un disque  En effectuant un mouvement continu, enfoncez le disque dans le lecteur jusqu’à ce que vos doigts touchent le bord de votre iMac.  Utilisez uniquement un disque de taille standard. En cas de problèmes avec l’éjection d’un disque  Quitter toutes les applications susceptibles d’utiliser le disque, puis appuyez sur la touche d’éjection de disque (C) de votre clavier.  Ouvrez une fenêtre du Finder et cliquez sur l’icône d’éjection (située à côté de celle du disque dans la barre latérale), ou bien faites glisser l’icône du disque du bureau vers la Corbeille.  Fermez la session de votre compte utilisateur en choisissant le menu Pomme () > Fermer la session « Utilisateur » (votre nom de compte apparaît dans le menu), puis appuyez sur la touche d’éjection de disque (C) de votre clavier.  Redémarrez votre iMac en maintenant le bouton de la souris enfoncé. En cas de problème de défilement avec votre souris  Si votre souris est dotée d’une boule de défilement et que celle-ci ne défile pas vers le haut, vers le bas, ou latéralement, retournez la souris et faites rouler la boule énergiquement tout en la nettoyant.Chapitre 4 À tout problème sa solution 59  Pour en savoir plus, reportez-vous à la rubrique « Entretien de votre souris » à la page 70. En cas de problème de fonctionnement de votre iMac ou de Mac OS X  Si la réponse à votre question ne figure pas dans ce manuel, recherchez des instructions et des informations de dépannage dans l’Aide Mac. Dans le Finder, choisissez Aide > Aide Mac.  Pour obtenir les dernières informations de dépannage et des mises à jour de logiciels, consultez le site web d’assistance Apple, à l’adresse www.apple.com/fr/support. Si vous perdez continuellement vos réglages de date et d’heure  La batterie de secours interne de votre ordinateur a peut-être besoin d’être remplacée. Pour en savoir plus sur la manière de contacter Apple pour reportez-vous à la rubrique « Informations, services et assistance » ci-dessous. Informations, services et assistance Votre iMac ne contient aucune pièce susceptible d’être remplacée par l’utilisateur, à l’exception du clavier, de la souris et de la mémoire. Si vous avez besoin de services de réparation, adressez-vous à Apple ou portez votre iMac chez un fournisseur de services agréé Apple. Vous trouverez de plus amples informations sur votre iMac en ligne, dans l’aide à l’écran, dans Informations Système et via Apple Hardware Test. Informations en ligne Pour obtenir des informations en ligne sur le service et l’assistance, rendez-vous sur www.apple.com/fr/support. Choisissez votre pays dans le menu local. Vous pouvez faire des recherches dans la base de données AppleCare Knowledge Base, vérifiez si de nouvelles mises à jour de logiciels sont disponibles ou obtenir de l’aide dans les forums de discussion Apple.60 Chapitre 4 À tout problème sa solution Aide à l’écran Vous trouverez bien souvent des réponses à vos questions ainsi que des instructions et des informations concernant le dépannage dans l’Aide Mac. Choisissez Aide > Aide Mac. Informations Système Pour obtenir des informations sur votre iMac, utilisez Informations Système. Cette application vous fournit la liste des composants matériels et des logiciels installés, le numéro de série et de version du système d’exploitation, la quantité de mémoire installée, etc. Pour ouvrir Informations Système, choisissez le menu Pomme () > « À propos de ce Mac » dans la barre des menus, puis cliquez sur Plus d’infos. Service et assistance AppleCare Votre iMac est fourni avec 90 jours d’assistance technique et 1 an de couverture pour les réparations de matériel effectuées dans les magasins Apple Store ou les centres de réparations agréés Apple, tel qu’un fournisseur de services agréé Apple. Vous avez la possibilité d’étendre la durée de cette couverture en adhérant à un programme AppleCare Protection Plan. Pour en savoir plus, rendez-vous sur www.apple.com/fr/support/products ou bien visitez le site web de votre pays (dans la liste ci-dessous). Si vous avez besoin d’assistance, le personnel d’assistance par téléphone AppleCare peut vous aider à installer et à ouvrir les applications et offre des services de dépannage élémentaires. Appelez le centre d’assistance le plus proche de chez vous (gratuit pendant les 90 premiers jours). Gardez la date d’achat et le numéro de série de votre iMac à portée de main lorsque vous appelez. Remarque : la période de 90 jours d’assistance gratuite par téléphone débute à la date d’achat. Des frais téléphoniques peuvent éventuellement s’appliquer.Chapitre 4 À tout problème sa solution 61 Pays Téléphone Site web Allemagne (49) 01805 009 433 www.apple.com/de/support Autriche (43) 0810 300 427 www.apple.com/at/support Belgique (flamand) (français) (32) 070 700 772 (32) 070 700 773 www.apple.com/benl/support www.apple.com/befr/support France (Metropolitain) (DOM-TOM) (33) 0805 540 003 www.apple.com/fr/support Luxembourg (352) 800 24550 www.apple.com/befr/support Suisse (français) (allemand) (41) 0848 000 132 (41) 0848 000 132 www.apple.com/chfr/support www.apple.com/chde/support Les numéros de téléphone sont susceptibles d’être modifiés. Les tarifs téléphoniques locaux et nationaux peuvent s’appliquer. Une liste complète est disponible sur Internet : www.apple.com/support/contact/phone_contacts.html62 Chapitre 4 À tout problème sa solution Localisation du numéro de série de votre produit Utilisez l’une des méthodes suivantes pour trouver le numéro de série de votre iMac :  Choisissez le menu Pomme () > « À propos de ce Mac ». Cliquez sur le numéro de version sous les mots « Mac OS X » pour faire apparaître le numéro de version, la version et le numéro de série Mac OS X.  Cliquez sur l’icône du Finder et ouvrez /Applications/Utilitaires/Informations Système. Cliquez sur Matériel dans la sous-fenêtre Contenu.  Regardez sous le socle de l’iMac.Aide Mac ergonomie www.apple.com/fr/environment Dernières recommandations 564 Chapitre 5 Dernières recommandations Afin d’assurer votre sécurité et la préservation de votre matériel, veillez à observer ces consignes pour le nettoyage et la manipulation de votre iMac, ainsi que l’aménagement d’un espace de travail confortable. Gardez ces instructions dans un endroit facilement accessible par vous et par d’autres utilisateurs éventuels. AVIS : l’utilisation ou le rangement incorrect de votre ordinateur peut entraîner l’annulation de la garantie du fabricant. Informations importantes concernant la sécurité AVERTISSEMENT : le non-respect de ces consignes de sécurité peut entraîner un incendie, un choc électrique ou d’autres types de dommages ou de blessures corporelles. Manipulation correcte Installez votre iMac sur une surface de travail stable. N’insérez jamais d’objets dans les ouvertures de ventilation. Eau et endroits humides Gardez votre iMac à l’écart de toute source de liquide (boissons, éviers, baignoires, cabines de douche, etc.). Protégez votre iMac de l’humidité ou des intempéries comme la pluie, la neige et le brouillard. Alimentation La seule manière de couper complètement l’alimentation de l’ordinateur consiste à débrancher le câble d’alimentation. Veillez à tirer sur la fiche plutôt que sur le câble. Débranchez toujours le câble d’alimentation avant d’ouvrir l’ordinateur pour installer de la mémoire.Chapitre 5 Dernières recommandations 65 Débranchez le câble d’alimentation (en tirant sur la fiche plutôt que sur le câble) et déconnectez le câble Ethernet ou le cordon téléphonique si l’un des cas suivants se présente :  Vous souhaitez ajouter de la mémoire.  Le câble ou la fiche d’alimentation est usé(e) ou endommagé(e).  Vous avez renversé quelque chose dans le boîtier de l’ordinateur.  Votre iMac est exposé à la pluie ou à une humidité excessive.  Votre iMac a subi une chute ou le boîtier a été endommagé.  Vous pensez que votre iMac a besoin d’être inspecté ou réparé.  Vous souhaitez nettoyer le boîtier (pour ce faire, suivez à la lettre les instructions fournies plus bas). Important : la seule manière de couper complètement l’alimentation de l’ordinateur consiste à débrancher le câble d’alimentation. Assurez-vous de pouvoir aisément atteindre le câble d’alimentation pour débrancher votre iMac si besoin est. AVERTISSEMENT : votre câble CA dispose d’une fiche de terre à trois broches (fiche équipée d’une troisième broche de mise à la terre). Cette fiche ne peut être branchée que sur une prise CA reliée à la terre. Si vous ne pouvez pas brancher la fiche car la prise n’est pas reliée à la terre, contactez un électricien agréé pour qu’il remplace cette prise par une prise correctement reliée à la terre. Ne dérogez en aucun cas à cette consigne.66 Chapitre 5 Dernières recommandations Spécifications de l’alimentation :  Tension : 100 à 240 V CA  Courant : 3 A, maximum  Fréquence : 50 à 60 Hz Diminution de l’acuité auditive L’utilisation d’écouteurs ou d’un casque d’écoute à un niveau de volume trop élevé peut provoquer une perte d’acuité auditive irréversible. Réglez le volume à un niveau normal. L’oreille peut s’adapter petit à petit à des volumes sonores de plus en plus élevés qui peuvent sembler normaux, mais qui risquent à la longue d’endommager votre système auditif. Si vous percevez un sifflement dans vos oreilles ou s’il vous semble que le son des voix est étouffé, arrêtez immédiatement l’écoute et faites examiner votre audition. Plus le volume est élevé, plus votre audition risque d’être rapidement endommagée. Les spécialistes recommandent les mesures suivantes pour protéger votre audition :  Limitez la durée d’utilisation à volume élevé de vos écouteurs ou de votre casque d’écoute.  Évitez d’augmenter le volume pour ne pas entendre les bruits environnants.  Baissez immédiatement le volume si vous ne parvenez plus à entendre les personnes qui parlent autour de vous. Activités à haut risque Cet ordinateur n’est pas conçu pour être utilisé dans des installations nucléaires, pour la navigation ou la communication aérienne, pour le contrôle du trafic aérien, ni dans aucune autre situation où une panne du système informatique pourrait entraîner la mort, des blessures ou de graves dommages écologiques.Chapitre 5 Dernières recommandations 67 Informations concernant le laser des lecteurs de disque optique AVERTISSEMENT : l’exécution de réglages ou d’opérations qui ne sont pas spécifiés dans le manuel de votre équipement risque de vous exposer à des rayonnements dangereux. Le laser intégré au lecteur de disque optique de votre iMac ne présente aucun danger en cas d’utilisation normale, mais peut s’avérer dangereux pour la vue en cas de démontage du lecteur. Afin d’assurer votre sécurité, ce dispositif ne doit être réparé que par un fournisseur de services agréé Apple. Important : le matériel électrique peut s’avérer dangereux s’il n’est pas utilisé correctement. L’utilisation de ce produit ou de tout produit similaire doit toujours être supervisée par un adulte. Évitez que des enfants ne manipulent les composants internes ou les câbles de ces appareils. AVERTISSEMENT : n’introduisez jamais d’objets d’aucune sorte dans les ouvertures de ventilation du boîtier. Cela peut s’avérer dangereux et endommager votre ordinateur. Ne procédez à aucune réparation par vous-même Votre iMac ne contient aucune pièce susceptible d’être remplacée par l’utilisateur, à l’exception du clavier, de la souris et de la mémoire (voir « L’installation de mémoire » à la page 37). Si votre iMac a besoin d’être inspecté, contactez Apple ou un fournisseur de services agréé Apple. Consultez la rubrique « Informations, services et assistance » à la page 59.68 Chapitre 5 Dernières recommandations Si vous ouvrez votre iMac ou que vous installez d’autres éléments que la mémoire, vous risquez d’endommager votre matériel. Les dommages de ce type ne sont pas couverts par la garantie limitée de votre iMac. Informations importantes concernant la manipulation AVIS : le non-respect de ces instructions de manipulation peut provoquer des dommages pour votre iMac ou tout autre bien. Environnement d’utilisation L’utilisation de votre iMac en dehors de ces plages peut gêner son bon fonctionnement :  Température de fonctionnement : 10° à 35° C  Température de stockage : -20° à 47° C  Humidité relative : 5 % à 95 % (sans condensation)  Altitude maximale de fonctionnement : 3048 mètres N’utilisez pas votre iMac dans des endroits spécialement poussiéreux ou enfumés, près d’une cuisinière, d’une cheminée ou d’un humidificateur à ultrasons fonctionnant avec de l’eau du robinet non filtrée. Les fines particules produites par la fumée, la cusine, la combustion ou l’utilisation d’humidificateurs à ultrasons fonctionnant avec de l’eau non filtrée peuvent, dans de rares cas de figure, s'infiltrer dans les ouvertures de ventilation de votre iMac et, sous certaines conditions, entraîner la formation de poussières derrière la vitre de l’écran de votre iMac.Chapitre 5 Dernières recommandations 69 Mise sous tension de votre iMac N’allumez jamais le tant que tous ses composants internes ou externes ne sont pas en place. L’utilisation de l’ordinateur sans l’un de ses composants peut s’avérer dangereuse et risque de l’endommager. Transport de votre iMac Veillez à éteindre votre et à déconnecter tous les câbles et cordons qui y sont rattachés avant de le soulever ou de le changer de place. Pour soulever ou déplacer votre iMac, tenez-le par ses côtés. Utilisation des connecteurs et des ports Ne forcez jamais l’insertion d’un connecteur dans un port. Lorsque vous connectez un périphérique, assurez-vous que le port n’est pas obstrué, que le connecteur est adapté au port et qu’il est correctement orienté par rapport à ce dernier. Utilisation du lecteur optique Le lecteur SuperDrive de votre iMac prend en charge les disques standards (12 cm). Les disques de forme irrégulière ou de taille inférieure à 12 cm ne sont pas acceptés. Rangement de votre iMac Si vous comptez ranger votre iMac pendant une longue période, veillez à le conserver dans un endroit frais (idéalement, 22° C). Entretien de votre iMac Respectez les règles suivantes lors du nettoyage de votre iMac et de ses accessoires :  Éteignez votre iMac et débranchez tous les câbles.  Pour nettoyer la partie extérieure de l’Mac, utilisez un chiffon doux, légèrement humide et non pelucheux. Évitez les infiltrations d’humidité par quelque ouverture que ce soit. Ne vaporisez jamais de liquide directement sur l’iMac.  N’utilisez ni aérosols, ni dissolvant, ni abrasifs.70 Chapitre 5 Dernières recommandations Nettoyage de l’écran de votre iMac Utilisez le chiffon fourni avec votre iMac pour nettoyer l’écran. Pour nettoyer l’écran de votre iMac, procédez comme suit :  Éteignez votre iMac et débranchez tous les câbles.  Humidifiez, à l’eau seulement, le chiffon fourni avec votre iMac— (ou tout autre chiffon propre—, doux et non pelucheux), puis essuyez l’écran. Ne vaporisez jamais de liquide directement sur l’écran. Entretien de votre souris Vous devez nettoyer votre souris de temps en temps pour éliminer la saleté et la poussière qui se sont accumulées. Utilisez un chiffon non pelucheux légèrement humidifié avec de l’eau. Évitez que la moindre humidité ne pénètre dans une ouverture et n’utilisez pas d’aérosols, de dissolvants ou d’abrasifs. Si vous avez commandé une souris USB d’Apple avec votre iMac, tenez celle-ci à l’envers et faites rouler vigoureusement la boule de défilement avec le chiffon fourni avec votre iMac, ou tout autre chiffon propre, doux et non pelucheux, pour déloger les particules qui pourraient gêner le défilement.Chapitre 5 Dernières recommandations 71 Comprendre l’ergonomie Voici quelques conseils sur la mise en place d’un environnement de travail sain Clavier Veillez à maintenir vos épaules relâchées lorsque vous utilisez le clavier. Votre bras et votre avant-bras doivent former un angle plus ou moins droit, tandis que votre poignet et votre main doivent se trouver sur une ligne à peu près droite. Modifiez fréquemment la position de vos mains pour éviter la fatigue. Certains utilisateurs peuvent éprouver une certaine gêne au niveau des mains, des poignets ou des bras après avoir travaillé de manière intensive sans observer de pauses. Si ces douleurs persistent, consultez un spécialiste. Souris Veillez à ce que la souris se trouve à hauteur du clavier. Ménagez un espace suffisant pour la manipuler avec aisance. Écran Placez le moniteur de manière à ce que le haut de l’écran se trouve légèrement en dessous du niveau de vos yeux lorsque vous êtes assis au clavier. La distance idéale entre vos yeux et l’écran est une question d’appréciation personnelle, mais la plupart des utilisateurs semblent adopter une distance comprise entre 45 et 70 cm. Orientez l’écran de manière à ce qu’il reflète le moins possible la lumière provenant de l’éclairage et des fenêtres proches. Le pied vous permet d’orienter l’écran de façon à obtenir un angle de vision idéal et de réduire ou d’éliminer ainsi les reflets provoqués par des sources lumineuses que vous ne pouvez pas déplacer.72 Chapitre 5 Dernières recommandations Cuisses légèrement inclinées Épaules détendues Écran positionné de façon à éviter tout reflet éblouissant Avant-bras et mains en ligne droite Avant-bras légèrement inclinés Bas du dos soutenu Pieds fixes au sol ou sur un repose-pied Haut de l'écran au niveau des yeux ou juste en dessous Côté inférieur au plan de travail dégagé 45–70 cm Siège Optez pour un siège de bureau réglable et offrant un dossier et une assise confortables. Réglez la hauteur du siège de sorte que vos cuisses reposent à l’horizontale et vos pieds à plat sur le sol. Le dossier du siège doit soutenir votre région lombaire, c’est-à- dire la partie inférieure de votre dos. Suivez les instructions du fabricant de sorte que le réglage du dossier soit parfaitement adapté à votre morphologie.Chapitre 5 Dernières recommandations 73 Vous devrez peut-être remonter votre siège afin que vos avant-bras et vos mains forment un angle approprié par rapport au clavier. Si, dans ce cas, vos pieds ne reposent plus à plat sur le sol, utilisez un repose-pied inclinable et réglable en hauteur. Vous pouvez également abaisser le niveau du plan de travail pour éviter l’emploi d’un repose-pied. Une troisième solution consiste à utiliser un bureau dont le poste de saisie est situé plus bas que le plan de travail. Vous trouverez d’autres informations concernant l’ergonomie sur Internet : www.apple.com/fr/about/ergonomics Apple et l’environnement Apple Inc. reconnaît sa responsabilité en matière de réduction de l’impact de ses produits et de ses activités sur l’environnement. Des informations supplémentaires sont disponibles sur Internet : www.apple.com/fr/environment75 Regulatory Compliance Information FCC Compliance Statement This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. See instructions if interference to radio or television reception is suspected. L‘utilisation de ce dispositif est autorisée seulement aux conditions suivantes : (1) il ne doit pas produire de brouillage et (2) l’utilisateur du dispositif doit être prêt à accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. Radio and Television Interference This computer equipment generates, uses, and can radiate radio-frequency energy. If it is not installed and used properly—that is, in strict accordance with Apple’s instructions—it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in Part 15 of FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. You can determine whether your computer system is causing interference by turning it off. If the interference stops, it was probably caused by the computer or one of the peripheral devices. If your computer system does cause interference to radio or television reception, try to correct the interference by using one or more of the following measures: • Turn the television or radio antenna until the interference stops. • Move the computer to one side or the other of the television or radio. • Move the computer farther away from the television or radio. • Plug the computer into an outlet that is on a different circuit from the television or radio. (That is, make certain the computer and the television or radio are on circuits controlled by different circuit breakers or fuses.) If necessary, consult an Apple Authorized Service Provider or Apple. See the service and support information that came with your Apple product. Or, consult an experienced radio/television technician for additional suggestions. Important: Changes or modifications to this product not authorized by Apple Inc. could void the EMC compliance and negate your authority to operate the product. This product has demonstrated EMC compliance under conditions that included the use of compliant peripheral devices and shielded cables between system components. It is important that you use compliant peripheral devices and shielded cables (including Ethernet network cables) between system components to reduce the possibility of causing interference to radios, television sets, and other electronic devices.76 Responsible party (contact for FCC matters only): Apple Inc. Corporate Compliance 1 Infinite Loop, MS 26-A Cupertino, CA 95014 Wireless Radio Use This device is restricted to indoor use when operating in the 5.15 to 5.25 GHz frequency band. Cet appareil doit être utilisé à l’intérieur. この製品は、周波数帯域 5.18 ~ 5.32 GHz で動作しているときは、 屋内においてのみ使用可能です。 Exposure to Radio Frequency Energy The radiated output power of this device is well below the FCC and EU radio frequency exposure limits. However, this device should be operated with a minimum distance of at least 20 cm between its antennas and a person’s body and the antennas used with this transmitter must not be co-located or operated in conjunction with any other antenna or transmitter subject to the conditions of the FCC Grant. FCC Bluetooth Wireless Compliance The antenna used with this transmitter must not be co-located or operated in conjunction with any other antenna or transmitter subject to the conditions of the FCC Grant. Bluetooth Industry Canada Statement This Class B device meets all requirements of the Canadian interference-causing equipment regulations. Cet appareil numérique de la Class B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. Industry Canada Statement Complies with the Canadian ICES-003 Class B specifications. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. This device complies with RSS 210 of Industry Canada. Bluetooth Europe—EU Declaration of Conformity This wireless device complies with the R&TTE Directive. Europe—EU Declaration of Conformity Consultez www.apple.com/euro/compliance. Communauté européenne Conforme aux directives européennes 72/23/EEC et 89/336/EEC. Korea Warning Statements Singapore Wireless Certification77 Taiwan Wireless Statements Taiwan Class B Statement VCCI Class B Statement Russia Mouse Class 1 Laser Information The Apple Magic Mouse is a Class 1 laser product in accordance with IEC60825-1 A1 A2 and 21 CFR 1040.10 and 1040.11 except for deviations pursuant to Laser Notice No. Caution: Modification of this device may result in hazardous radiation exposure. For your safety, have this equipment serviced only by an Apple Authorized Service Provider. A Class 1 laser is safe under reasonably foreseeable conditions per the requirements in IEC 60825-1 AND 21 CFR 1040. However, it is recommended that you do not direct the laser beam at anyone’s eyes. However, it is recommended that you do not direct the laser beam at anyone’s eyes. External USB Modem Information When connecting your iMac to the phone line using an external USB modem, refer to the telecommunications agency information in the documentation that came with your modem.78 ENERGY STAR ® Compliance As an ENERGY STAR ® partner, Apple has determined that standard configurations of this product meet the ENERGY STAR ® guidelines for energy efficiency. The ENERGY STAR ® program is a partnership with electronic equipment manufacturers to promote energy-efficient products. Reducing energy consumption of products saves money and helps conserve valuable resources. This computer is shipped with power management enabled with the computer set to sleep after 10 minutes of user inactivity. To wake your computer, click the mouse or press any key on the keyboard. For more information about ENERGY STAR ® , visit: www.energystar.gov Türkiye 79 Informations relatives à l’élimination et au recyclage Ce symbole indique que votre produit doit être mis au rebus dans des conditions adéquates selon les lois et les réglementations locales. Lorsque votre produit arrive en fin de vie, contactez Apple ou vos autorités locales pour en savoir plus sur les options de recyclage. Pour plus d’informations sur le programme de recyclage Apple, consultez www.apple.com/fr/environment/recycling. Brazil—Disposal Information: Brasil: Informações sobre eliminação e reciclagem O símbolo indica que este produto e/ou sua bateria não devem ser descartadas no lixo doméstico. Quando decidir descartar este produto e/ou sua bateria, faça-o de acordo com as leis e diretrizes ambientais locais. Para informações sobre o programa de reciclagem da Apple, pontos de coleta e telefone de informações, visite www. apple.com/br/environment. Union européenne — Informations concernant l’élimination des déchets : Le symbole ci-dessus signifie que vous devez vous débarrasser de votre produit sans le mélanger avec les ordures ménagères, selon les normes et la législation de votre pays. Lorsque ce produit n’est plus utilisable, portez-le dans un centre de traitement des déchets agréé par les autorités locales. Certains centres acceptent les produits gratuitement. Le traitement et le recyclage séparé de votre produit lors de son élimination aideront à préserver les ressources naturelles et à protéger l’environnement et la santé des êtres humains. Caution: There is a risk of explosion if the battery is replaced by an incorrect type. Dispose of used batteries according to the instructions in this manual. Achtung: Wenn die Batterie nicht mit dem richtigen Batterietyp ersetzt wird, besteht Explosionsgefahr. Entsorgen Sie verbrauchte Batterien gemäß der Anweisungen in diesem Handbuch. Attenzione: C’è rischio di esplosione se la batteria viene sostituita con un tipo di batteria non corretto. Smaltire le batterie usate secondo le istruzioni riportate in questo manuale. VARNING: Om batteriet ersätts med ett batteri av fel typ finns det risk för explosion. Lämna in batteriet för återvinning i enlighet med anvisningarna i denna handbok.80 Informations sur l’enlèvement de la batterie Jetez vos batteries usagées en respectant les lois et les consignes environnementales de votre pays. California: The coin cell battery in the optional Apple Remote contains perchlorates. Special handling and disposal may apply. Refer to: www.dtsc.ca.gov/hazardouswaste/perchlorate Deutschland: Dieses Gerät enthält Batterien. Bitte nicht in den Hausmüll werfen. Entsorgen Sie dieses Gerätes am Ende seines Lebenszyklus entsprechend der maßgeblichen gesetzlichen Regelungen. Das Gerät enthält Batterien. Diese gehören nicht in den Hausmüll. Sie können verbrauchte Batterien beim Handel oder bei den Kommunen unentgeltlich abgeben. Um Kurzschlüsse zu vermeiden, kleben Sie die Pole der Batterien vorsorglich mit einem Klebestreifen ab. Nederlands: Gebruikte batterijen kunnen worden ingeleverd bij de chemokar of in een speciale batterijcontainer voor klein chemisch afval (kca) worden gedeponeerd. Taiwan:KApple Inc. © 2010 Apple Inc. Tous droits réservés. En application des lois et conventions en vigueur, aucune reproduction totale ni partielle du manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression. Apple 1 Infinite Loop Cupertino, CA 95014 408-996-1010 www.apple.com Le logo Apple est une marque d’Apple Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option + 1) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale. Apple, le Logo Apple, AirPort, AirPort Extreme, Cover Flow, Exposé, FireWire, GarageBand, iCal, iChat, iLife, iMac, iMovie, iPhone, iPhoto, iPod, iSight, iTunes, Keynote, Mac, Mac OS, Photo Booth, QuickTime, Safari, Snow Leopard, Spotlight, SuperDrive et Time Machine sont des marques déposées d’Apple Inc., déposées États-Unis et dans d’autres pays. Finder, le logo FireWire, iPad et Multi-Touch sont des marques d’Apple Inc. AppleCare, Apple Store et iTunes Store sont des marques de service d’Apple Inc. déposées aux États-Unis et dans d’autres pays. ENERGY STAR ® est une marque déposée aux États-Unis. La marque et les logos Bluetooth ® sont des marques déposées de Bluetooth SIG, Inc. et sont utilisés sous licence par Apple. Les autres noms de produits et de sociétés mentionnés dans ce document peuvent être des marques de leurs détenteurs respectifs. Les produits commercialisés par des entreprises tierces ne sont mentionnés que pour information,sans aucune intention de préconisation ni de recommandation. Apple décline toute responsabilité quant à l’utilisation et au fonctionnement de ces produits. Fabriqué sous licence de Dolby Laboratories. « Dolby », « Pro Logic » et le logo double-D sont des marques déposées de Dolby Laboratories. Ouvrages confidentiels inédits, © 1992–1997 Dolby Laboratories, Inc. Tous droits réservés. Publié simultanément aux États-Unis et au Canada. Félicitations, vous et votre MacBook êtes faits l’un pour l’autre.Dites bonjour à votre MacBook. www.apple.com/fr/macbook finder Finder Parcourez vos fichiers de la même manière que vous naviguez parmi vos morceaux de musique avec Cover Flow. Aide Mac Caméra iSight intégrée avec iChat Discutez en vidéo avec vos amis et votre famille, où qu’ils soient dans le monde. Aide Mac isight MacBook Mail Gérez tous vos comptes de messagerie d'un même point Aide Mac mail iCal et Carnet d’adresses Votre emploi du temps et vos contacts toujours synchronisés. Aide Mac isyncMac OS X Leopard www.apple.com/fr/macosx iLife ’09 www.apple.com/fr/ilife iPhoto Partagez vos photos sur le web ou créez des livres, des cartes et des calendriers. Aide iPhoto GarageBand Créez votre propre morceau avec des musiciens sur une scène virtuelle. Aide GarageBand iWeb Construisez des sites web avec des photos, des films, des blogs et des podcasts. Aide iWeb iMovie Réalisez un film et partagez-le facilement sur le web. Aide iMovie photos film enregistrement site web Time Machine Sauvegardez et restaurez automatiquement vos fichiers. Aide Mac Spotlight Trouvez tout ce que vous recherchez sur votre Mac immédiatement. time machine Aide Mac spotlight Safari Profitez pleinement du web grâce au navigateur le plus rapide du monde. Aide Mac safari Coup d’œil Prévisualisez vos fichiers en un clin d’œil. Aide Mac coup d’œilTable des matières 5 Table des matières Chapitre 1 : Prêt, feu, configurez ! 9 Contenu de la boîte 9 Configuration du MacBook 16 Extinction ou suspension d’activité de votre MacBook Chapitre 2 : Votre MacBook au quotidien 20 Caractéristiques de base de votre MacBook 23 Fonctionnalités du clavier de votre MacBook 25 Ports présents sur votre MacBook 27 Utilisation du Trackpad et du clavier 28 Utilisation de la batterie du MacBook 30 Comment obtenir des réponses à vos doutes Chapitre 3 : Augmentez votre mémoire 37 Installation de mémoire supplémentaire 44 Vérification de la reconnaissance de la nouvelle mémoire par votre MacBook Chapitre 4 : À tout problème sa solution 47 Problèmes vous empêchant d’utiliser votre MacBook 51 Utilisation d’Apple Hardware Test6 Table des matières 52 Problèmes de connexion à Internet 55 Problèmes de communication sans fil avec AirPort Extreme 56 Maintien à jour de vos logiciels 57 Réinstallation des logiciels fournis avec le MacBook 59 Informations, services et assistance 61 Localisation du numéro de série de votre produit Chapitre 5 : Dernières recommandations 64 Informations importantes concernant la sécurité 68 Informations importantes sur la manipulation 71 Ergonomie 73 Apple et l’environnement 75 Regulatory Compliance Information1 1 Prêt, feu, configurez ! www.apple.com/fr/macbook Aide Mac Assistant Migration8 Chapitre 1 Prêt, feu, configurez ! Votre MacBook est conçu pour pouvoir être configuré rapidement et utilisé immédiatement. Si vous n’avez jamais utilisé de MacBook ou si vous n’êtes pas familiarisé avec les ordinateurs Mac, vous trouverez dans ce chapitre des instructions qui vous aideront à débuter. Important : lisez attentivement toutes les instructions d’installation (et les consignes de sécurité débutant à la page 63) avant d’utiliser votre ordinateur pour la première fois. Si vous êtes un utilisateur expérimenté, peut-être êtes-vous déjà en mesure d’utiliser votre nouvel ordinateur. Veillez néanmoins à consulter les informations du chapitre 2, « Votre MacBook au quotidien » pour découvrir les nouvelles fonctionnalités de cet MacBook. Vous trouverez la plupart des réponses à vos questions dans l’Aide Mac. Pour en savoir plus sur l’utilisation de l’Aide Mac, consultez la rubrique « Comment obtenir des réponses à vos doutes » à la page 30. Comme Apple publie de temps à autres de nouvelles versions et mises à jour de ses logiciels système, il est possible que les images de ce manuel soient légèrement différentes de ce que vous voyez à l’écran. Important : retirez le film protecteur qui entoure l’adaptateur secteur MagSafe 60 W avant de configurer le MacBook.Chapitre 1 Prêt, feu, configurez ! 9 Contenu de la boîte Configuration du MacBook Votre MacBook est conçu pour pouvoir être configuré rapidement et utilisé immédiatement. Les pages suivantes contiennent des informations qui vous guideront tout au long du processus de configuration, notamment des opérations suivantes :  Le branchement de l’adaptateur secteur MagSafe 60 W.  Le branchement des câbles et l’accès à un réseau.  La mise sous tension du MacBook et l’utilisation du trackpad.  La configuration d’un compte d’utilisateur et d’autres paramètres via Assistant réglages.  La configuration des préférences et du bureau Mac OS X. Câble secteur Fiche secteur Adaptateur secteur MagSafe de 60 W10 Chapitre 1 Prêt, feu, configurez ! Étape 1 : Branchez l’adaptateur secteur MagSafe 60 W pour alimenter le MacBook et recharger sa batterie. Assurez-vous que la fiche CA est complètement insérée dans l’adaptateur et que les broches de la fiche sont complètement déployées. Branchez la fiche CA de votre adaptateur sur une prise secteur, puis branchez le connecteur MagSafe sur le port secteur MagSafe. En approchant le connecteur MagSafe du port, vous ressentirez la force d’un aimant l’attirant. Pour rallonger le câble de l’adaptateur secteur, tirez d’abord sur la fiche secteur pour la retirer de l’adaptateur. Connectez le câble secteur inclus à l’adaptateur, en vous assurant qu’il est fermement connecté. Branchez l’autre extrémité sur une prise de courant. Le câble d’alimentation secteur fournit une connexion avec mise à la terre. Lorsque vous déconnectez l’adaptateur secteur d’une prise de courant ou de l’ordinateur, débranchez la prise et non le câble. ¯ Câble secteur Fiche secteur Connecteur MagSafe Port secteur MagSafeChapitre 1 Prêt, feu, configurez ! 11 La première fois que vous branchez l’adaptateur secteur sur le MacBook, la lampe témoin du connecteur MagSafe s’illumine. Une lumière orange indique que la batterie est en charge. Une lumière verte indique que la batterie est rechargée ou qu’elle n’est pas installée. Si la lampe témoin ne s’allume pas, vérifiez que le connecteur est correctement branché. Étape 2 : Pour accéder à Internet ou à un réseau, branchez une extrémité du câble Ethernet sur le MacBook et l’autre extrémité sur un modem câble, un modem DSL ou un réseau. Pour une connexion commutée, vous aurez besoin d’un modem Apple USB Modem externe, disponible sur l’Apple Store en ligne à l’adresse www.apple.com/fr/store ou auprès des revendeurs agréés Apple. Branchez le modem Apple USB Modem sur un port USB du MacBook, puis reliez le modem à une prise téléphonique à l’aide d’un câble téléphonique (non inclus). G Câble Ethernet Port Ethernet Gigabit (10/100/1000Base-T)12 Chapitre 1 Prêt, feu, configurez ! Remarque : votre MacBook est également équipé de la technologie AirPort Extreme de mise en réseau sans fil. Pour en savoir plus sur la configuration d’une connexion sans fil, choisissez Aide > Aide Mac (dans la barre des menus), puis recherchez « AirPort ». Consultez « Comment obtenir des réponses à vos doutes » à la page 30. Étape 3 : Appuyez brièvement sur le bouton d’alimentation (®) pour allumer votre MacBook. Votre ordinateur émet un signal sonore lorsque vous l’allumez. Sa mise en route prend quelques instants. Après le démarrage, Assistant réglages s’ouvre automatiquement. Si l’ordinateur ne s’allume pas, consultez la rubrique « Si votre MacBook ne s’allume ou ne démarre pas » à la page 49. Trackpad Bouton du trackpad ® Bouton d’alimentationChapitre 1 Prêt, feu, configurez ! 13 Étape 4 : Configurez votre MacBook à l’aide d’Assistant réglages La première fois que vous démarrez votre MacBook, l’Assistant réglages se met en route. Il vous aide à saisir les informations de connexion à Internet et au courrier électronique ainsi qu’à configurer un compte d’utilisateur sur votre MacBook. Si vous possédez déjà un ordinateur Macintosh, l’Assistant réglages peut vous aider à transférer automatiquement les fichiers, les applications et d’autres informations de votre ancien ordinateur. Pour en savoir plus, consultez la rubrique suivante « Migration d’informations vers votre MacBook ». Si vous ne comptez pas conserver ou utiliser votre autre Mac, il est préférable de lui retirer son autorisation à lire la musique, les clips vidéo ou les livres audio achetés sur l’iTunes Store. Le retrait de l’autorisation d’un ordinateur empêche la lecture par un tiers de tout morceau, vidéo ou livre audio acheté et permet de libérer l’autorisation afin qu’elle puisse être utilisée. Pour plus d’informations sur le retrait d’autorisation, ouvrez iTunes et choisissez Aide > Aide iTunes14 Chapitre 1 Prêt, feu, configurez ! Migration d’informations vers votre MacBook Vous pouvez suivre les invites de l’Assistant réglages pour effectuer la migration des comptes d’utilisateurs, fichiers, applications existant(e)s, et d’autres informations à partir d’un autre Mac. Pour cela, procédez de l’une des manières suivantes :  Utilisez un câble FireWire pour brancher les deux ordinateurs ensemble et transférer les informations  Utilisez un câble Ethernet reliant directement les deux ordinateurs, ou connectez ces derniers au même réseau  Sans câble, directement entre les deux ordinateurs, ou en ayant les deux ordinateurs sur le même réseau sans fil Avant d’effectuer la migration, servez-vous de Mise à jour de logiciels sur votre autre Mac afin de vous assurer que vous possédez la dernière version du logiciel Mac OS X, à savoir Mac OS X v10.4.11 ou Mac OS X v10.5.6 (ou version ultérieure). Vous pouvez choisir les éléments (comptes d’utilisateur, documents, séquences, musique, photos, etc.) dont vous souhaitez effectuer la migration sur votre MacBook. Important : n’utilisez pas l’autre Mac tant que la migration n’est pas terminée. Si vous n’utilisez pas l’Assistant réglages pour transférer vos informations lors du premier démarrage de l’ordinateur, vous pouvez le faire ultérieurement. Si la connexion est interrompue pendant la migration, vous pouvez reprendre cette dernière ultérieurement en vous servant de l’Assistant migration de votre MacBook et de l’autre Mac. Allez dans le dossier Applications, ouvrez le dossier Utilitaires, puis double-cliquez sur Assistant migration.Chapitre 1 Prêt, feu, configurez ! 15 Étape 5 : Personnalisez le bureau Mac OS X et réglez les préférences. Barre des menus Dock Icône des Préférences Système Menu Aide Icône de recherche de Spotlight Icône du Finder16 Chapitre 1 Prêt, feu, configurez ! Grâce aux Préférences Système, vous pouvez donner à votre bureau l’apparence souhaitée sans perdre de temps. Choisissez le menu Pomme () > Préférences Système dans la barre des menus. À mesure que vous vous familiarisez avec votre ordinateur, explorez les Préférences Système, le centre de commandes de la plupart des réglages de votre MacBook. Pour en savoir plus, ouvrez l’Aide Mac et recherchez « Préférences Système » ou la préférence que vous souhaitez modifier. Extinction ou suspension d’activité de votre MacBook Lorsque vous avez terminé de travailler avec le MacBook, suspendez son activité ou éteignez-le. Suspension de l’activité de votre MacBook Suspendez l’activité de votre MacBook si vous ne comptez vous en éloigner que quelques instants. Vous pourrez ensuite le réactiver rapidement sans avoir à le redémarrer. Pour suspendre l’activité de votre MacBook, procédez de l’une des manières suivantes :  Rabattez l’écran.  Choisissez Pomme () > Suspendre l’activité, dans la barre des menus.  Appuyez sur le bouton d’alimentation (®) et cliquez sur Suspendre l’activité dans la zone de dialogue qui apparaît.Chapitre 1 Prêt, feu, configurez ! 17  Choisissez le menu Pomme () > Préférences Système, cliquez sur Économiseur d’énergie et définissez un délai pour la minuterie de mise en veille. Pour réactiver le MacBook :  Si l’écran est fermé, il suffit de l’ouvrir pour réactiver votre MacBook.  Si l’écran est déjà ouvert, appuyez sur le bouton d’alimentation (®) ou sur l’une des touches du clavier. À la réactivation de votre MacBook, vos applications, vos documents et vos réglages sont conservés tels que vous les aviez laissés. AVIS : patientez quelques secondes jusqu’à ce que la lampe témoin de suspension d’activité clignote (signalant que l’activité de l’ordinateur est suspendue et que le disque dur a cessé de tourner) avant de déplacer votre MacBook. Tout déplacement de votre ordinateur lorsque le disque dur est en train de tourner risque d’endommager ce dernier et d’entraîner une perte de données ou l’impossibilité de démarrer à partir du disque dur.18 Chapitre 1 Prêt, feu, configurez ! Extinction de votre MacBook Si vous ne comptez pas utiliser votre MacBook pendant un jour ou deux, il est préférable de l’éteindre. La lampe témoin de suspension d’activité reste allumée quelques instants au moment de l’extinction. Pour éteindre le MacBook, procédez de l’une des manières suivantes :  Choisissez Pomme () > Éteindre, dans la barre des menus.  Appuyez sur le bouton d’alimentation (®) et cliquez sur Éteindre dans la zone de dialogue qui apparaît. Si vous comptez ranger votre MacBook pour une durée prolongée, consultez la rubrique « Informations importantes sur la manipulation » à la page 68 afin d’obtenir des informations sur les mesures à prendre pour éviter que votre batterie ne se décharge complètement.2 2 Votre MacBook au quotidien www.apple.com/fr/macosx Aide Mac Mac OS X20 Chapitre 2 Votre MacBook au quotidien Caractéristiques de base de votre MacBook ® ® Bouton d’alimentation Lampe témoin de la caméra Caméra iSight Microphone Haut-parleurs stéréo Lampe témoin de suspension d’activité Récepteur à infrarouge Trackpad Batterie (en dessous) Bouton du trackpad Lecteur optique à chargement par fenteChapitre 2 Votre MacBook au quotidien 21 Microphone intégré Enregistrez du son à l’aide du micro (situé à gauche de la caméra iSight) ou profitez de l’application iChat AV incluse pour discuter en direct avec vos amis via une connexion à haut débit. Caméra iSight intégrée et lampe témoin de la caméra Cette caméra permet d’organiser des vidéoconférences avec d’autres utilisateurs à l’aide d’iChat AV, de prendre des photos à travers Photo Booth ou de capturer de la vidéo avec iMovie. La lampe témoin brille lorsque la caméra iSight fonctionne. Haut-parleurs stéréo intégrés Permettent d’écouter de la musique, des films, des jeux et d’autres types de données multimédia. Batterie Utilisez le MacBook en puisant l’énergie de la batterie lorsque vous n’êtes pas à proximité d’une prise de courant. Le retrait de la batterie permet d’accéder à la mémoire de votre MacBook. Trackpad et bouton du trackpad Permet de déplacer le pointeur à l’écran avec l’index ; inclut également une fonction de défilement en utilisant deux doigts sur le trackpad. Appuyez légèrement sur le trackpad pour cliquer ou double-cliquer sur une sélection.22 Chapitre 2 Votre MacBook au quotidien Lampe témoin de suspension d’activité Une lumière blanche clignote lorsque le MacBook est en suspension d’activité. Récepteur à infrarouge Associé à une télécommande Apple Remote (vendue séparément sur le site www.apple.com/fr/store), le récepteur à infrarouge vous permet de contrôler, jusqu’à une distance de 9 mètres, les applications Front Row et Keynote sur votre MacBook. SuperDrive à chargement par fente Le lecteur optique peut lire et écrire sur des CD et DVD de taille standard. ® Bouton d’alimentation Permet d’allumer ou d’éteindre votre MacBook ou d’en suspendre l’activité. Maintenez ce bouton enfoncé pour redémarrer le MacBook lors des procédures de dépannage.Chapitre 2 Votre MacBook au quotidien 23 Fonctionnalités du clavier de votre MacBook esc F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 — C - Touche de fonction (Fn) Touches de réglage du volume Touches de réglage de la luminosité Touches de fonction standard Touche d’éjection de disques Touche Silence Touche Exposé Touche Dashboard Commandes multimédia24 Chapitre 2 Votre MacBook au quotidien Touche de fonction (Fn) Maintenez cette touche enfoncée pour activer les actions personnalisées affectées aux touches de fonction (F1 à F12). Pour apprendre comment personnaliser les touches de fonction, choisissez Aide > Aide Mac dans la barre des menus, puis recherchez « touches de fonction ». Touches de réglage de luminosité (F1, F2) Permettent d’augmenter ( ) ou de réduire ( ) la luminosité de l’écran. Touche Exposé (F3) Vous permet d’ouvrir Exposé pour accéder rapidement à toutes vos fenêtres ouvertes. Touche Dashboard (F4) Vous permet d’ouvrir le Dashboard pour accéder à vos widgets. ’ Commandes multimédia (F7, F8, F9) Retour rapide ( ), lecture ou pause (’) ou avance rapide ( ) d’un morceau, d’un film ou d’un diaporama. — Touche silence (F10) Permet de désactiver le son provenant des haut-parleurs intégrés et du port de sortie casque. - Touches de réglage du volume (F11, F12) Permettent d’augmenter (-) ou de diminuer (–) le volume du son provenant du hautparleur intégré ou du port de sortie casque. C Touche d’éjection de disque Maintenez cette touche enfoncée pour éjecter un disque. Il est également possible d’éjecter un disque en faisant glisser son icône dans la Corbeille.Chapitre 2 Votre MacBook au quotidien 25 Ports présents sur votre MacBook ¯ Port Ethernet Gigabit G Logement de sécurité Port de sortie audio f Port d’entrée audio , Port Mini-DVI £ Port FireWire 400 H Ports USB 2.0 Port d d’adaptateur secteur MagSafe26 Chapitre 2 Votre MacBook au quotidien ¯ Port d’adaptateur secteur MagSafe Branchez-y l’adaptateur secteur MagSafe 60 W (inclus) pour recharger la batterie du MacBook. G Port Ethernet Gigabit Permet de se connecter à un réseau Ethernet haute vitesse, un modem câble ou DSL ou encore un autre ordinateur. Le port Ethernet détecte automatiquement les périphériques Ethernet sans avoir besoin de câble croisé Ethernet. £ Port Mini-DVI (sortie vidéo) Permet de connecter votre ordinateur à un écran ou à un système de projection externe doté d’un connecteur DVI ou VGA. Vous pouvez acheter des adaptateurs correspondant aux différents formats vidéo compatibles. H Port FireWire 400 Permettent de brancher sur l’ordinateur des périphériques externes à haute vitesse tels que des caméras vidéo numériques et des périphériques de stockage. d Deux ports USB (Universal Serial Bus) 2.0 Grâce à ses ports, vous pouvez brancher sur le MacBook un modem, un iPod, un iPhone, une souris, un clavier, une imprimante, un appareil photo numérique et plus encore. Vous pouvez connecter un appareil externe USB de grande puissance. Vous pouvez également y brancher des périphériques USB 1.1. , Port d’entrée audio Permet de connecter un micro ou un appareil audio numérique à votre MacBook. f Port de sortie audio Il permet de connecter des haut-parleurs externes, un casque ou des appareils audio numériques. Logement de sécurité Ce logement vous permet de protéger votre ordinateur contre le vol en y fixant un cadenas et un câble (disponible séparément).Chapitre 2 Votre MacBook au quotidien 27 Remarque : les adaptateurs et autres accessoires sont vendus séparément sur www.apple.com/fr/store. Utilisation du Trackpad et du clavier Utilisez le trackpad pour déplacer le pointeur ainsi que pour faire défiler, cliquer, double-cliquer et faire glisser. Le déplacement du pointeur à l’écran est proportionnel à la vitesse à laquelle vous déplacez votre doigt sur le trackpad. Pour effectuer un petit déplacement du pointeur, décalez votre doigt lentement sur le trackpad. Plus vous bougerez votre doigt rapidement, plus le déplacement du pointeur sera important. Pour régler avec plus de précision la vitesse de déplacement dans les Préférences Système, choisissez menu Pomme () > Préférences Système, cliquez sur Clavier et souris, puis sur Trackpad. Voici quelques astuces et raccourcis pour le trackpad et le clavier :  Un clic secondaire ou un « clic droit » vous permet d’accéder aux commandes de menu contextuel. Pour activer cette option, sélectionnez « Placez deux doigts sur le trackpad et cliquez sur le bouton pour effectuer un clic secondaire » dans la sous-fenêtre Trackpad des préférences Clavier et souris. Vous pouvez également effectuer un clic secondaire en maintenant enfoncer la touche Contrôle (ctrl) tout en cliquant.  Le défilement à deux doigts vous permet de faire glisser deux doigts pour faire défiler rapidement vers le haut, vers le bas ou vers les côtés dans la fenêtre active. Pour activer cette option, sélectionnez « Utilisez deux doigts pour faire défiler » et « Autoriser le défilement horizontal » dans la sous-fenêtre Trackpad des préférences Clavier et souris.28 Chapitre 2 Votre MacBook au quotidien  La suppression vers l’avant supprime des caractères situés à la droite du point d’insertion. La touche Suppr. élimine les caractères situés à gauche du point d’insertion. Pour supprimer vers l’avant, maintenez enfoncée la touche de fonction (fn) tout en pressant la touche Supprimer. Utilisation de la batterie du MacBook Lorsque l’adaptateur secteur MagSafe n’est pas branché, le MacBook est alimenté par sa batterie. L’autonomie du MacBook varie en fonction des applications utilisées et des périphériques externes qui sont connectés à votre MacBook. La désactivation de fonctions sans fil telles qu’AirPort Extreme ou Bluetooth® contribue à économiser l’énergie de votre batterie. Si votre batterie faiblit pendant que vous travaillez, branchez l’adaptateur secteur et laissez la batterie se recharger. Pour remplacer une batterie presque déchargée par une batterie chargée lorsque votre ordinateur n’est pas connecté à un adaptateur secteur, éteignez l’ordinateur. Pour connaître le niveau de charge de votre batterie, vous pouvez observer les lampes témoins de niveau de charge dont elle est dotée. Appuyez sur le bouton situé en regard des témoins lumineux afin que ces derniers brillent brièvement pour indiquer le niveau de charge de la batterie. Vous pouvez vérifier le niveau de charge, que la batterie soit ou non insérée dans votre MacBook. Important : si un seul témoin est allumé, le niveau restant est très faible. Si aucun témoin n’est allumé, c’est que la batterie est complètement vide et que le MacBook ne pourra démarrer sans l’adaptateur secteur. Branchez l’adaptateur secteur et laissez la batterie se recharger ou remplacez la batterie à plat par une batterie complètement rechargée (voir la page 37).Chapitre 2 Votre MacBook au quotidien 29 Vous pouvez également connaître la charge actuelle de la batterie en observant l’icône d’état de la batterie ( ) située dans la barre des menus. Le niveau affiché dépend de la quantité d’énergie restant dans la batterie, mais aussi des applications et des périphériques en cours d’utilisation, ainsi que des réglages actuels de votre système. Pour disposer de plus d’énergie, fermez des applications, déconnectez les périphériques non utilisés et réglez la fonction d’Économiseur d’énergie. Pour en savoir plus sur l’économie de la batterie et obtenir des astuces pour améliorer ses performances, rendez-vous à l’adresse www.apple.com/fr/batteries/notebooks.html. Batterie Témoins LED de la batterie Bouton ¥ Á30 Chapitre 2 Votre MacBook au quotidien Recharge de la batterie Lorsque l’adaptateur secteur fourni avec le MacBook est connecté, la batterie se recharge, que l’ordinateur soit éteint, allumé ou en mode de suspension d’activité. La recharge sera toutefois plus rapide si l’ordinateur est éteint ou en mode de suspension d’activité. Comment obtenir des réponses à vos doutes De plus amples informations sur l’utilisation du MacBook sont disponibles dans l’Aide Mac qui s’affiche sur votre ordinateur et sur Internet, à l’adresse www.apple.com/fr/support/macbook. Pour faire apparaître l’Aide Mac : 1 Cliquez sur l’icône du Finder dans le Dock (la barre des icônes située au bord de l’écran). 2 Cliquez sur le menu Aide dans la barre des menus et procédez de l’une des manières suivantes : a Saisissez une question ou un terme dans le champ de recherche, puis sélectionnez une rubrique dans la liste des résultats ou sélectionnez « Afficher tous les résultats » pour voir toutes les rubriques. b Choisissez Aide Mac pour ouvrir la fenêtre de l’Aide Mac, qui vous permet de cliquer sur des liens ou de saisir une question.Chapitre 2 Votre MacBook au quotidien 31 Informations supplémentaires Pour en savoir plus sur l’utilisation de votre MacBook, consultez le tableau suivant : Pour obtenir des informations sur : Reportez-vous aux sources suivantes : L’installation de mémoire le chapitre 3, « Augmentez votre mémoire, » à la page 35. Le dépannage de votre MacBook en cas de problème le chapitre 4, « À tout problème sa solution, » à la page 45. L’obtention de services et d’une assistance pour votre MacBook « Informations, services et assistance » à la page 59. Sinon, consultez le site web de support Apple à l’adresse www.apple.com/fr/support/macbook. L’utilisation de Mac OS X le site web de Mac OS X à l’adresse www.apple.com/fr/macosx. Vous pouvez également rechercher « Mac OS X » dans l’Aide Mac. La migration depuis un PC vers un Mac la page « Pourquoi vous adorerez le Mac » sur http://www.apple.com/fr/getamac/whymac/. L’utilisation des applications iLife le site web d’iLife à l’adresse www.apple.com/fr/ilife. Vous pouvez également ouvrir une application iLife, ouvrir l’Aide de cette application, puis saisir une question dans le champ de recherche. La modification des Préférences Système Préférences Système, accessibles en choisissant le menu Pomme (K) > Préférences Système. Vous pouvez également rechercher « préférences système » dans l’Aide Mac. L’utilisation de votre trackpad Recherchez « trackpad » dans l’Aide Mac. ou bien ouvrez Préfé- rences Système, cliquez sur Clavier et souris, puis sur Trackpad. L’utilisation de votre clavier Recherchez « clavier » dans l’Aide Mac. L’utilisation de la caméra iSight Recherchez « iSight » dans l’Aide Mac.32 Chapitre 2 Votre MacBook au quotidien L’utilisation de la technologie sans fil AirPort Extreme la page web d’assistance AirPort à l’adresse www.apple.com/fr/support/airport. L’utilisation de la technologie sans fil Bluetooth la page web d’assistance Bluetooth à l’adresse www.apple.com/fr/support/bluetooth. Vous pouvez aussi ouvrir l’utilitaire Échange de fichiers Bluetooth (dans le dossier Utilitaires du dossier Applications) et sélectionner Aide > Aide Bluetooth. L’entretien de la batterie Recherchez « batterie » dans l’Aide Mac. La connexion d’une imprimante Recherchez « impression » dans l’Aide Mac. Les connexions FireWire et USB Recherchez « USB » ou « FireWire » dans l’Aide Mac. La connexion à Internet Recherchez « Internet » dans l’Aide Mac. La connexion d’un moniteur externe Recherchez « port moniteur » dans l’Aide Mac. La télécommande Apple Recherchez « télécommande » dans l’Aide Mac. Front Row Recherchez « Front Row » dans l’Aide Mac La gravure d’un CD ou DVD Recherchez « graver disque » dans l’Aide Mac. Les caractéristiques la page web concernant les caractéristiques, à l’adresse www.apple.com/fr/support/specs. Vous pouvez également ouvrir Informations Système en choisissant le menu Pomme (K) > « À propos de ce Mac » dans la barre des menus, puis en cliquant sur Plus d’infos. Pour obtenir des informations sur : Reportez-vous aux sources suivantes :Chapitre 2 Votre MacBook au quotidien 33 Actualités, téléchargement gratuits et catalogues en ligne des logiciels et du matériel Apple le site web d’Apple à l’adresse www.apple.com/fr. Instructions, assistance technique et manuels des produits Apple le site web d’assistance Apple à l’adresse www.apple.com/fr/support. Pour obtenir des informations sur : Reportez-vous aux sources suivantes :3 3 Augmentez votre mémoire mémoire RAM www.apple.com/fr/store Aide Mac36 Chapitre 3 Augmentez votre mémoire Ce chapitre fournit des informations et des instructions pour installer de la mémoire supplémentaire et pour retirer et remettre en place la batterie de votre MacBook. Votre ordinateur est doté de deux logements de mémoire auxquels vous pouvez accéder en retirant sa batterie. Votre MacBook est fourni avec un minimum de 2 gigaoctets (Go) de mémoire DDR2 (Double Data Rate) SDRAM (Synchronous Dynamic Random-Access Memory) à 800 MHz. Les deux logements de mémoire peuvent accueillir un module SDRAM conforme aux spécifications suivantes :  format DDR2 SO-DIMM (Double Data Rate Small Outline Dual Inline Memory Module) ;  3,18 cm (soit 1,25 pouce) ;  1 Go ou 2 Go ;  200 broches ;  mémoire RAM de type PC2-5300 DDR2 à 800 MHz. Vous pouvez ajouter deux modules de mémoire de 2 Go pour un total de 4 Go de mémoire au maximum. Pour obtenir des performances optimales, ne laissez aucun des deux logements vides et installez-y des modules de mémoire identiques. AVERTISSEMENT : Apple vous recommande de confier l’installation de mémoire à un technicien agréé Apple. Consultez les informations sur le dépannage et l’assistance qui accompagnent votre ordinateur pour savoir comment contacter Apple. Tout dommage causé à votre matériel en tentant d’installer vous-même de la mémoire n’est pas couvert par la garantie limitée de votre ordinateur.Chapitre 3 Augmentez votre mémoire 37 Installation de mémoire supplémentaire Pour installer de la mémoire, il faut enlever la batterie puis la remettre en place. La procédure suivante inclut des instructions sur le retrait de la batterie, l’ajout de mémoire et la remise en place de la batterie. Étape 1 : Enlevez la batterie. 1 Éteignez le MacBook. Débranchez l’adaptateur secteur, le câble Ethernet, les câbles USB et tous les autres câbles connectés au MacBook afin d’éviter toute détérioration de ce dernier. AVERTISSEMENT : soyez prudent lorsque vous manipulez la batterie. Consultez les informations de sécurité sur la batterie à la page 66.38 Chapitre 3 Augmentez votre mémoire 2 Retournez le MacBook et repérez l’emplacement du verrou de la batterie. Utilisez une pièce de monnaie pour faire tourner le verrou d’un quart de tour vers la droite afin de débloquer la batterie, puis retirez cette dernière avec précaution. AVERTISSEMENT : les composants internes de votre MacBook risquent d’être chauds. Si vous venez d’utiliser votre MacBook, attendez 10 minutes après l’extinction afin de laisser aux composants internes le temps de se refroidir. ¥ Á ¥ ÁChapitre 3 Augmentez votre mémoire 39 Étape 2 : Installer la mémoire. 1 Desserrez les trois vis imperdables maintenant le support en L, tirez sur la barre la plus longue pour retirer le support et écartez celui-ci. Les leviers situés dans les logements de mémoire se soulèvent automatiquement lorsque vous retirez le support. 2 Touchez la surface métallique à l’intérieur de l’ordinateur afin de décharger toute électricité statique que vous pouvez avoir emmagasinée. Desserrez les trois vis Tirez sur cette barre ¥ Á40 Chapitre 3 Augmentez votre mémoire 3 Pour retirer un module de mémoire placé dans un logement, poussez le levier vers la gauche d’un mouvement rapide, ce qui fait apparaître le bord du module de mémoire. Retirez le module de mémoire. Répétez l’opération avec l’autre module de mémoire. Leviers ¥ ÁChapitre 3 Augmentez votre mémoire 41 4 Insérez les nouveaux modules de mémoire dans les logements : a Commencez par insérer le bord doré, avec l’encoche sur le côté gauche. b Poussez fermement avec deux doigts sur les modules de mémoire pour les mettre en place. Vous devez entendre un clic indiquant que la mémoire est correctement insérée. Remarque : il est possible qu’une sorte de lubrifiant soit présent sur le nouveau module de mémoire afin de faciliter le processus d’insertion. Ceci est normal et vous ne devez pas essuyer ou nettoyer le module pour tenter de l’éliminer. c Si les leviers ne reviennent pas en position fermée, déplacez-les vers la droite pour les fermer. Encoches ¥ Á42 Chapitre 3 Augmentez votre mémoire 5 Replacez le support en L en insérant d’abord le bras le plus court, puis resserrez les vis. Insérez Resserrez les trois vis d’abord ¥ ÁChapitre 3 Augmentez votre mémoire 43 Étape 3 : Remplacez la batterie. 1 Placez le bord droit de la batterie dans son compartiment, puis appuyez doucement sur le bord gauche pour la mettre en place. Utilisez une pièce de monnaie pour faire tourner le verrou d’un quart de tour vers la gauche afin d’immobiliser la batterie. 2 Reconnectez l’adaptateur secteur et tout autre câble connecté auparavant à l’ordinateur. ¥ Á ¥ Á44 Chapitre 3 Augmentez votre mémoire Vérification de la reconnaissance de la nouvelle mémoire par votre MacBook Après avoir ajouté de la mémoire au MacBook, vérifiez si elle est reconnue. Pour vérifier la mémoire de votre ordinateur : 1 Démarrez votre MacBook. 2 Lorsque le bureau Mac OS X s’affiche, choisissez le menu Pomme () > À propos de ce Mac. Pour plus de détails sur la mémoire installée sur votre ordinateur, ouvrez Informations Système en cliquant sur Plus d’infos puis sur Mémoire. Si le MacBook ne reconnaît pas la mémoire ou ne démarre pas correctement, vérifiez que la mémoire est compatible avec le MacBook et qu’elle est correctement installée.4 4 À tout problème sa solution www.apple.com/fr/support Aide Mac aide46 Chapitre 4 À tout problème sa solution Il se peut que vous rencontriez à titre exceptionnel des problèmes en utilisant le MacBook . Lisez ce chapitre pour trouver des idées de solution qui vous aideront à régler vos problèmes. Vous trouverez aussi des informations supplémentaires concernant le dépannage dans l’Aide Mac et sur le site web d’assistance consacré au MacBook, à l’adresse www.apple.com/fr/support/macbook. Il existe généralement une solution simple et rapide aux problèmes qui peuvent survenir au cours de l’utilisation de votre MacBook. Réfléchissez aux conditions qui ont entraîné l’apparition de ce problème. Ce récapitulatif de la totalité des opérations effectuées avant que le problème ne survienne permet de restreindre les causes possibles et de trouver la solution. Les éléments à noter comprennent:  les applications que vous étiez en train d’utiliser quand le problème est apparu ; les problèmes qui n’apparaissent qu’avec une application spécifique peuvent indiquer que cette application n’est pas compatible avec la version de Mac OS installée sur votre ordinateur ;  les nouveaux logiciels installés, notamment ceux qui ont ajouté des éléments à votre dossier Système ;  tout composant matériel installé (mémoire supplémentaire ou périphérique, par exemple).Chapitre 4 À tout problème sa solution 47 Problèmes vous empêchant d’utiliser votre MacBook Si votre MacBook ne répond plus ou que le pointeur se fige Il peut arriver, très rarement, qu’une application se « fige » à l’écran. Mac OS X permet de quitter une application figée sans redémarrer votre ordinateur. Pour forcer la fermeture d’une application : 1 Appuyez sur les touches Commande (x) + Option + Échap ou choisissez le menu Pomme () > Forcer à quitter dans la barre des menus. La boîte de dialogue « Forcer à quitter des applications » apparaît. L’application est sélectionnée. 2 Cliquez sur Forcer à quitter. L’application se ferme, en laissant toutes les autres applications ouvertes. Si nécessaire, vous pouvez également redémarrer le Finder à partir de cette zone de dialogue. Enregistrez ensuite votre travail dans les applications ouvertes, puis redémarrez l’ordinateur afin de vous assurer que le problème est entièrement réglé. Si le problème survient fréquemment, choisissez Aide > Aide Mac dans la barre des menus en haut de l’écran. Recherchez le mot « bloquer » pour obtenir de l’aide en cas de blocage de l’ordinateur ou s’il ne répond pas. Si le problème ne survient que lorsque vous utilisez une application particulière, vérifiez auprès de son éditeur si elle est compatible avec votre ordinateur. Pour obtenir des informations de contact et une assistance relatifs aux logiciels fournis avec votre MacBook, rendez-vous à l’adresse www.apple.com/guide.48 Chapitre 4 À tout problème sa solution Si vous savez qu’une application est compatible, vous devrez peut-être réinstaller le logiciel système de votre ordinateur. Consultez la rubrique « Réinstallation des logiciels fournis avec le MacBook » à la page 57. Si le MacBook se bloque au démarrage, si un point d’interrogation clignotant apparaît ou si l’écran est éteint et que la lampe témoin de suspension d’activité reste allumée (pas en mode de suspension d’activité) Le point d’interrogation clignotant signifie généralement que l’ordinateur ne parvient pas à localiser le logiciel système sur le disque dur interne ou sur tout disque externe relié à l’ordinateur.  Patientez quelques secondes. Si l’ordinateur ne démarre pas de suite, éteignez-le en maintenant le bouton d’alimentation (®) enfoncé pendant 8 à 10 secondes. Débranchez tous les périphériques externes puis tentez de redémarrer l’ordinateur en appuyant sur le bouton d’alimentation (®) tout en maintenant la touche Option enfoncée. Lorsque votre ordinateur démarre, cliquez sur l’icône du disque dur, puis sur la flèche droite. Une fois que l’ordinateur a démarré, ouvrez Préférences Système et cliquez sur Démarrage. Sélectionnez un dossier Système local de Mac OS X.  Si cela ne donne pas de résultats, tentez de réparer le disque à l’aide d’Utilitaire de disque :  Insérez le DVD d’installation de Mac OS X dans votre ordinateur.  Redémarrez ensuite votre ordinateur en maintenant la touche C enfoncée lors du démarrage.  Choisissez Programme d’installation dans la barre des menus, puis choisissez Ouvrir l’Utilitaire de disque. Lorsqu’Utilitaire de disque s’ouvre, suivez les instructions de la sous-fenêtre S.O.S pour savoir s’il est en mesure de réparer le disque.Chapitre 4 À tout problème sa solution 49 Si Utilitaire de disque ne résout pas le problème, vous devrez peut-être réinstaller le logiciel système de votre ordinateur. Consultez la rubrique « Réinstallation des logiciels fournis avec le MacBook » à la page 57. Si votre MacBook ne s’allume ou ne démarre pas Tentez les opérations suivantes dans l’ordre jusqu’à ce que votre ordinateur s’allume :  Assurez-vous que l’adaptateur secteur est connecté à l’ordinateur et branché sur une prise de courant en état de marche. Veillez à utiliser l’adaptateur secteur MagSafe 60 W fourni avec le MacBook. Si l’adaptateur secteur ne recharge plus l’ordinateur et que la lampe témoin de l’adaptateur secteur ne s’allume pas lorsque vous branchez le câble d’alimentation, essayez de le débrancher puis de le brancher à nouveau afin de le positionner correctement.  Vérifiez si votre batterie à besoin d’être rechargée. Appuyez sur le petit bouton situé sur la batterie. Vous devriez voir apparaître un à quatre voyants indiquant le niveau de charge de la batterie. Si une seule lampe témoin de niveau de la batterie clignote, branchez l’adaptateur secteur pour charger la batterie jusqu’à ce qu’au moins cette lampe témoin reste allumée en permanence.  Si le problème persiste, réinitialisez le gestionnaire d’alimentation de MacBook en débranchant l’adaptateur secteur, en retirant la batterie et en maintenant le bouton d’alimentation (®) enfoncé pendant au moins 5 secondes.  Si vous avez récemment ajouté de la mémoire, assurez-vous qu’elle est correctement installée et compatible avec votre ordinateur. Vérifiez si le retrait de cette mémoire et la remise en place de l’ancienne permet à l’ordinateur de démarrer (consultez la page 39). 50 Chapitre 4 À tout problème sa solution  Appuyez sur le bouton d’alimentation (®) et maintenez immédiatement les touches Commande (x), Option, P, et R enfoncées jusqu’à entendre une deuxième fois le son du démarrage. Cette action réinitialise le paramètre RAM (PRAM).  Si vous ne parvenez toujours pas à démarrer le MacBook, consultez la rubrique « Informations, services et assistance » à la page 59 qui contient les informations nécessaires pour prendre contact avec Apple. Si l’écran devient subitement noir ou que votre MacBook se bloque Essayez de redémarrer votre MacBook. 1 Débranchez tout périphérique connecté à votre MacBook excepté l’adaptateur secteur. 2 Appuyez sur le bouton d’alimentation (®) pour redémarrer le système. 3 Le niveau de charge de la batterie doit atteindre au moins 10 pour cent avant la connexion d’un périphérique et la reprise du travail. Pour vérifier le niveau de charge de la batterie, observez l’icône d’état de la batterie ( ) située dans la barre des menus. Le moniteur pourrait également s’assombrir si les fonctions d’économie d’énergie de la batterie sont en place. Si vous avez oublié votre mot de passe Vous pouvez réinitialiser votre mot de passe d’administrateur et les mots de passe de tous les autres comptes. 1 Insert the DVD d’installation de Mac OS X. Redémarrez ensuite votre ordinateur en maintenant la touche C enfoncée lors du démarrage. 2 Dans la barre des menus, choisissez Utilitaires > Réinitialiser le mot de passe. Suivez les instructions à l’écran.Chapitre 4 À tout problème sa solution 51 En cas de problème à l’éjection d’un disque  Fermez toutes les applications susceptibles d’utiliser le disque et essayez à nouveau.  Si cela ne donne pas de résultats, redémarrez l’ordinateur tout en maintenant le bouton du trackpad enfoncé. Utilisation d’Apple Hardware Test Si vous pensez qu’il y a un problème avec les composants matériels du MacBook, vous pouvez utiliser l’application Apple Hardware Test pour savoir si tel est le cas (les composants affectés peuvent être la mémoire ou le processeur, par exemple). Pour utiliser Apple Hardware Test : 1 Déconnectez tous les périphériques externes de votre ordinateur, sauf l’adaptateur secteur. Si un câble Ethernet est connecté, déconnectez-le. 2 Redémarrez votre MacBook tout en maintenant enfoncée la touche D. 3 Lorsque l’écran principal d’Apple Hardware Test s’affiche, sélectionnez votre langue. 4 Appuyez sur la touche Retour ou cliquez sur la flèche droite. 5 Lorsque l’écran principal d’Apple Hardware Test s’affiche (après 45 secondes environ), suivez les instructions à l’écran. 6 En cas de détection d’un problème, Apple Hardware Test affiche un code d’erreur. Notez le code d’erreur avant d’entreprendre les démarches d’assistance. Si Apple Hardware Test ne détecte pas de panne matérielle, il est probable que le problème soit lié aux logiciels. Pour en savoir plus sur l’Apple Hardware Test, consultez le fichier Ouvrez-moi d’Apple Hardware Test qui se trouve sur le DVD d’installation des applications fourni avec votre ordinateur.52 Chapitre 4 À tout problème sa solution Problèmes de connexion à Internet Le MacBook est équipé de l’application Assistant réglages, destinée à vous aider à configurer une connexion à Internet. Ouvrez Préférences Système, puis cliquez sur Réseau. Cliquez sur le bouton « Assistant » pour ouvrir Assistant réglages de réseau. En cas de problèmes avec votre connexion à Internet, vous pouvez essayer les méthodes proposées dans cette rubrique en commençant par Diagnostic réseau. Pour utiliser Diagnostic réseau : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur Réseau puis cliquez sur « Assistant ». 3 Cliquez sur Diagnostic pour lancer Diagnostic réseau. 4 Suivez les instructions à l’écran. Si Diagnostic réseau n’est pas en mesure de résoudre le problème, celui-ci se situe peut-être au niveau du fournisseur d’accès à Internet auquel vous essayez de vous connecter, du périphérique externe utilisé pour la connexion au fournisseur d’accès à Internet ou du serveur auquel vous essayez d’accéder. Vous pouvez également tenter de réaliser les opérations suivantes. Connexions à Internet par modem câble, ligne DSL et réseau local (LAN) Assurez-vous que tous les câbles du modem sont correctement branchés. Vérifiez le câble d’alimentation du modem, le câble reliant le modem à l’ordinateur et celui reliant le modem à la prise secteur. Vérifiez également les câbles et les sources d’alimentation de vos routeurs et concentrateurs Ethernet. Chapitre 4 À tout problème sa solution 53 Éteignez, puis rallumez le modem afin de réinitialiser le matériel du modem. Éteignez le modem câble ou DSL, puis rallumez-le après quelques minutes. Certains fournisseurs d’accès à Internet conseillent de débrancher le câble d’alimentation du modem. Si votre modem dispose d’un bouton de réinitialisation, vous pouvez l’actionner avant ou après avoir éteint puis rallumé le modem. Important : les instructions relatives aux modems ne concernent pas les utilisateurs de réseau LAN. Contrairement aux utilisateurs de modems câble et DSL, les utilisateurs de réseau LAN peuvent disposer de concentrateurs, commutateurs, routeurs et autres blocs de connexion. Ils doivent faire appel à leur administrateur réseau plutôt qu’à un FAI. Connexions PPPoE Si vous ne parvenez pas à vous connecter à votre fournisseur d’accès à Internet via PPPoE (Point to Point Protocol over Ethernet), assurez-vous que les informations que vous avez saisies dans les préférences Réseau sont correctes. Pour vérifier les réglages PPPoE : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur Réseau. 3 Cliquez sur Ajouter (+) en bas de la liste des services de connexion réseau et choisissez PPPoE dans le menu local Interface. 4 Choisissez une interface pour le service PPPoE dans le menu local Ethernet. Choisissez Ethernet si vous vous connectez à un réseau filaire ou AirPort s’il s’agit d’un réseau sans fil. 5 Saisissez les informations transmises par votre fournisseur d’accès, telles que le nom de compte, le mot de passe et le nom du service PPPoE (si votre fournisseur d’accès l’exige). 54 Chapitre 4 À tout problème sa solution 6 Cliquez sur Appliquer pour activer les réglages. Connexions au réseau Assurez-vous que le câble Ethernet est branché sur le MacBook et sur le réseau. Vérifiez les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet. Si vous disposez de plusieurs ordinateurs partageant une connexion à Internet, assurez-vous que votre réseau est correctement configuré. Vous devez savoir si votre FAI fournit une seule ou plusieurs adresses IP, autrement dit, une pour chaque ordinateur. Si une seule adresse IP est fournie, vous devez disposer d’un routeur capable de partager la connexion ; on parle alors de conversion d’adresse réseau (NAT) ou de masquage d’adresses IP. Pour obtenir des informations sur la configuration, consultez la documentation fournie avec votre routeur ou contactez la personne qui a configuré votre réseau. Vous pouvez utiliser une borne d’accès AirPort pour partager une adresse IP unique entre plusieurs ordinateurs. Pour obtenir plus d’informations sur l’utilisation d’une borne d’accès AirPort, consultez l’Aide Mac ou rendez-vous sur le site web AirPort d’Apple, à l’adresse www.apple.com/fr/support/airport. Si ces méthodes s’avèrent insuffisantes pour résoudre les problèmes rencontrés, adressez-vous à votre fournisseur d’accès à Internet ou à votre administrateur réseau.Chapitre 4 À tout problème sa solution 55 Problèmes de communication sans fil avec AirPort Extreme En cas de problèmes avec les communications sans fil AirPort Extreme :  Vérifiez que l’ordinateur ou le réseau auquel vous souhaitez vous connecter est activé et dispose d’un point d’accès sans fil.  Assurez-vous que le logiciel est correctement configuré conformément aux instructions incluses avec votre borne d’accès ou point d‘accès.  Assurez-vous que l’autre ordinateur ou le point d’accès au réseau se trouve dans la zone de couverture de l’antenne de votre ordinateur. Des appareils électroniques ou des structures métalliques se trouvant à proximité peuvent interférer avec les communications sans fil et réduire la portée de votre antenne. Vous pouvez éventuellement améliorer la réception en tournant et en réorientant l’ordinateur.  Vérifiez l’icône d’état AirPort (Z) dans la barre des menus. Jusqu’à quatre barres de mesure apparaissent pour afficher la puissance du signal. Si l’intensité du signal est faible, essayez de changer de place.  Pour plus d’informations, consultez l’Aide AirPort (choisissez Aide > Aide Mac, puis Bibliothèque > Aide AirPort dans la barre des menus) ainsi que les instructions fournies avec votre appareil sans fil.56 Chapitre 4 À tout problème sa solution Maintien à jour de vos logiciels Vous pouvez vous connecter à Internet pour télécharger et installer automatiquement les dernières versions de logiciels, gestionnaires et autres améliorations fournies par Apple. Chaque fois que vous vous connectez à Internet, « Mise à jour de logiciels » consulte les mises à jour disponibles pour votre ordinateur. Vous pouvez configurer le MacBook afin qu’il recherche régulièrement des mises à jour et que vous puissiez télécharger et installer les logiciels mis à jour. Pour rechercher des logiciels mis à jour : 1 Ouvrez les Préférences Système. 2 Cliquez sur l’icône « Mise à jour de logiciels » et suivez les instructions à l’écran.  Pour plus d’informations, recherchez « Mise à jour de logiciels » dans l’Aide Mac.  Pour obtenir les toutes dernières informations sur Mac OS X, rendez-vous à l’adresse www.apple.com/fr/macosx.Chapitre 4 À tout problème sa solution 57 Réinstallation des logiciels fournis avec le MacBook Utilisez les disques d’installation de logiciels fournis avec votre ordinateur pour réinstaller Mac OS X et les applications livrées avec votre ordinateur. Vous pouvez choisir soit « Archiver et installer » afin d’enregistrer vos fichiers et réglages existants, soit « Effacer et installer » pour effacer toutes vos données. Important : Apple vous recommande de sauvegarder les données de votre disque dur avant de procéder à la restauration des logiciels. Nous vous conseillons de sauvegarder vos fichiers essentiels avant d’installer Mac OS X et d’autres applications car l’option « Effacer et installer » efface les données du disque dur. Apple décline toute responsabilité en cas de perte de données. Installation de Mac OS X Pour installer Mac OS X : 1 Sauvegardez vos fichiers essentiels. 2 Assurez-vous que votre adaptateur secteur est connecté et branché sur une prise de courant. 3 Insérez le DVD d’installation de Mac OS X fourni avec votre ordinateur. 4 Double-cliquez sur Installer Mac OS X. 5 Suivez les instructions à l’écran. Remarque : pour rétablir les réglages d’origine de Mac OS X sur votre ordinateur, cliquez sur Options dans la sous-fenêtre « Sélectionner une destination » du programme d’installation, puis choisissez Effacer et installer. Si vous choisissez « Effacer et installer », un message vous rappelle d’utiliser le DVD d’installation des applications pour réinstaller les applications incluses avec votre ordinateur.58 Chapitre 4 À tout problème sa solution 6 Une fois l’installation terminée, cliquez sur Redémarrer pour redémarrer votre ordinateur. 7 Suivez les instructions données par l’Assistant réglages pour configurer votre nouveau compte utilisateur. Installation d’applications Si vous réinstallez Mac OS X sur votre ordinateur, puis que vous sélectionnez l’option « Effacer et installer », vous devez réinstaller les applications fournies avec votre ordinateur, telles que les applications iLife. Pour installer les applications fournies avec votre ordinateur : 1 Assurez-vous que votre adaptateur secteur est connecté et branché sur une prise de courant. 2 Insérez le DVD d’installation des applications fourni avec votre ordinateur. 3 Double-cliquez sur « Installer les logiciels inclus ». 4 Suivez les instructions à l’écran. 5 Cliquez sur Fermer une fois l’installation terminée.Chapitre 4 À tout problème sa solution 59 Informations, services et assistance Outre le disque dur et la mémoire, votre MacBook ne contient aucune pièce que vous puissiez réparer vous-même. Si vous avez besoin de services de réparation, adressezvous à Apple ou portez votre MacBook chez un fournisseur de services agréé Apple. Vous trouverez de plus amples informations sur le MacBook en ligne, dans l’aide à l’écran, dans Informations Système et via Apple Hardware Test. Informations en ligne Pour obtenir des informations en ligne sur le service et l’assistance, rendez-vous sur www.apple.com/fr/support. Choisissez votre pays dans le menu local. Vous pouvez faire des recherches dans la base de données AppleCare Knowledge Base, vérifiez si de nouvelles mises à jour de logiciels sont disponibles ou obtenir de l’aide dans les forums de discussion Apple. Aide à l’écran Vous pouvez chercher des réponses à vos questions ainsi que des instructions et des informations concernant le dépannage dans l’Aide Mac. Choisissez Aide > Aide Mac. Informations Système Pour obtenir des informations sur le MacBook, servez-vous d’Informations Système. Cette application vous fournit la liste des composants matériels et des logiciels installés, le numéro de série et de version du système d’exploitation, la quantité de mémoire installée, etc. Pour ouvrir Informations Système, choisissez le menu Pomme ( ) > « À propos de ce Mac » dans la barre des menus, puis cliquez sur Plus d’infos.60 Chapitre 4 À tout problème sa solution Service et assistance AppleCare Le MacBook est fourni avec 90 jours d’assistance technique et 1 an de garantie sur les réparations de matériel effectuées dans les magasins Apple Store ou dans des centres de réparations agréés Apple tels que les fournisseurs de services agréés Apple. Vous avez la possibilité d’étendre la durée de cette couverture en adhérant à un programme AppleCare Protection Plan. Pour en savoir plus, rendez-vous sur www.apple.com/fr/support/products ou bien visitez le site web adapté à votre pays (répertorié ci-dessous). Si vous avez besoin d’assistance, le personnel d’assistance par téléphone AppleCare peut vous aider à installer et à ouvrir les applications et offre des services de dépannage élémentaires. Appelez le centre d’assistance le plus proche de chez vous (gratuit pendant les 90 premiers jours). Gardez la date d’achat et le numéro de série de votre MacBook à portée de main lorsque vous appelez. Remarque : la période de 90 jours d’assistance gratuite par téléphone débute à la date d’achat. Des frais téléphoniques peuvent être applicables. Pays Téléphone Site web Allemagne (49) 01805 009 433 www.apple.com/de/support Autriche (43) 0810 300 427 www.apple.com/at/support Belgique (flamand) (français) (32) 070 700 772 (32) 070 700 773 www.apple.com/benl/support www.apple.com/befr/support France (33) 0805 540 003 www.apple.com/fr/support Luxembourg (352) 800 24550 www.apple.com/befr/supportChapitre 4 À tout problème sa solution 61 Les numéros de téléphone sont susceptibles d’être modifiés. Les tarifs téléphoniques locaux et nationaux peuvent s’appliquer. Une liste complète est disponible sur Internet: Localisation du numéro de série de votre produit Utilisez l’une des méthodes suivantes pour trouver le numéro de série de votre ordinateur :  Choisissez Apple () > À propos de ce Mac, puis cliquez sur le numéro de version sous les mots « Mac OS X » pour passer du numéro de version de Mac OS X à la version, puis au numéro de série.  Cliquez sur l’icône du Finder et ouvrez /Applications/Utilitaires/Informations Système. Cliquez sur Matériel dans la sous-fenêtre Contenu.  Retirez la batterie. Le numéro de série de votre MacBook se trouve dans la baie de la batterie. Pour en savoir plus sur l’extraction de la batterie, consultez la page 37. Suisse (français) (allemand) (41) 0848 000 132 (41) 0848 000 132 www.apple.com/chfr/support www.apple.com/chde/support Pays Téléphone Site web www.apple.com/contact/phone_contacts.html www.apple.com/contact/phone_contacts.html5 5 Dernières recommandations www.apple.com/fr/environment Aide Mac ergonomie64 Chapitre 5 Dernières recommandations Afin d’assurer votre sécurité et de préserver votre matériel, veillez à observer ces consignes concernant le nettoyage et la manipulation de votre MacBook ainsi que l’aménagement d’un espace de travail confortable. Gardez ces instructions dans un endroit facile d’accès pour vous et pour les utilisateurs éventuels. Informations importantes concernant la sécurité Manipulation Installez le MacBook sur un plan de travail stable qui laisse convenablement circuler l’air sous l’ordinateur et autour de celui-ci. N’utilisez pas le MacBook en le posant sur un coussin ou tout autre objet de structure non solide car cela pourrait empêcher les conduits d’aération de fonctionner correctement. Évitez également de placer des objets sur le clavier lorsque vous utilisez votre MacBook. N’introduisez jamais d’objets d’aucune sorte dans les ouvertures servant à la ventilation. La partie inférieure du MacBook peut chauffer au cours d’une utilisation normale de l’appareil. S’il est posé sur vos genoux et que la chaleur qu’il émane vous gêne, posezle plutôt sur un plan de travail stable. AVERTISSEMENT : un stockage ou un usage incorrect de votre ordinateur peut annuler la garantie du fabricant. AVERTISSEMENT : ne pas suivre ces consignes pourrait déclencher un feu, occasionner des décharges électriques ou entraîner tout type de blessure ou dommage.Chapitre 5 Dernières recommandations 65 Eau et endroits humides Évitez de placer votre MacBook à proximité de sources de liquide telles que des boissons, un évier, un lavabo, une baignoire ou une douche, par exemple. Protégez votre MacBook de l’humidité et des intempéries (neige, pluie et brouillard par exemple). Adaptateur secteur MagSafe 60 W Veillez à ce que la fiche ou le câble d’alimentation secteur CA soit totalement enclenché dans l’adaptateur secteur avant de brancher ce dernier sur une prise de courant. N’utilisez que l’adaptateur secteur qui accompagne le MacBook ou, au besoin, un adaptateur secteur agréé Apple compatible avec ce produit. L’adaptateur secteur peut chauffer au cours d’une utilisation normale de l’appareil. Branchez toujours l’adaptateur secteur directement sur la prise de courant ou posez-le par terre, dans un endroit correctement aéré. Débranchez l’adaptateur secteur, retirez la batterie et débranchez tous les autres câbles si l’un des cas suivants se présente :  Vous souhaitez ajouter de la mémoire.  Vous souhaitez nettoyer le boîtier (pour ce faire, suivez à la lettre les instructions fournies à la page 70).  La prise ou le câble d’alimentation est endommagé.  Le MacBook ou l’adaptateur secteur est exposé à la pluie ou à une humidité excessive, ou du liquide a été versé dans le boîtier.  Le MacBook ou l’adaptateur secteur a subi une chute, le boîtier a été endommagé ou vous pensez qu’une réparation est nécessaire.66 Chapitre 5 Dernières recommandations Le port secteur MagSafe contient un aimant qui peut effacer les données d’une carte de crédit, d’un iPod ou d’autres appareils. Pour protéger vos données, ne placez pas de matériaux ou d’appareils à sensibilité magnétique (comme ceux cités précédemment ou autres) à moins de 25 mm de ce port. Si des résidus quelconques se trouvent dans le port secteur MagSafe, enlevez-les doucement à l’aide d’un bâtonnet de coton. Caractéristiques du port d’alimentation MagSafe :  Fréquence : 50 à 60 Hz, monophasée  Tension : 100 à 240 V  Tension de sortie : 16,5 V CA, 3,65 A Batterie Évitez de la faire tomber, de la démonter, de l’écraser, de l’incinérer ou de l’exposer au feu ou à des températures supérieures à 100 ºC. N’utilisez plus la batterie si elle vous semble endommagée de quelque façon que ce soit. Remplacez la batterie de ce produit uniquement par une batterie autorisée par Apple. Éliminez rapidement les batteries usagées conformément aux directives d’environnement locales en vigueur.Chapitre 5 Dernières recommandations 67 Diminution de l’acuité auditive Vous risquez une perte d’audition irréparable si vous utilisez un casque ou des écouteurs à un volume sonore élevé. L’oreille peut s’adapter petit à petit à des volumes sonores de plus en plus élevés qui peuvent sembler normaux, mais qui risquent à la longue d’endommager votre système auditif. En cas de sifflements ou de perte d’acuité auditive, arrêtez d’utiliser le casque ou les écouteurs et consultez un médecin. Plus le volume est élevé, plus votre audition risque d’être affectée rapidement. Pour protéger votre système auditif, les spécialistes conseillent de prendre les mesures suivantes :  Limitez la durée d’utilisation à volume élevé de vos écouteurs ou de votre casque d’écoute.  Évitez d’augmenter le volume afin de bloquer les bruits environnants.  Baissez le volume si vous ne parvenez pas à entendre une personne qui parle à côté de vous. Activités à haut risque Cet ordinateur n’est pas conçu pour être utilisé dans des installations nucléaires, pour la navigation ou la communication aérienne, pour le contrôle du trafic aérien, ni dans aucune autre situation où une panne du système informatique pourrait entraîner la mort, des blessures ou de graves dommages écologiques.68 Chapitre 5 Dernières recommandations Informations concernant le laser pour lecteurs optiques Le lecteur optique de votre ordinateur contient un laser qui est entièrement sans danger si l’on en fait un usage normal mais qui peut s’avérer dangereux pour les yeux s’il est démonté. Afin d’assurer votre sécurité, ce dispositif ne doit être réparé que par un fournisseur de services agréé Apple. Informations importantes sur la manipulation Environnement de fonctionnement : toute utilisation de votre MacBook en dehors de ces plages peut affecter ses performances :  Température de fonctionnement : 10° à 35° C  Température de stockage : -20° à 45° C  Humidité relative : 5% à 90 % (sans condensation)  Altitude d’utilisation : 0 à 3 048 mètres AVERTISSEMENT : la mise en place de réglages ou la réalisation d’opérations qui ne sont pas spécifiés dans le manuel de votre appareil risque de vous exposer à des rayonnements dangereux. AVIS : ne pas suivre les présentes instructions sur la manipulation peut provoquer des dommages à votre MacBook ou à d’autres objets.Chapitre 5 Dernières recommandations 69 Mise sous tension de votre MacBook N’allumez jamais le MacBook tant que tous ses composants internes ou externes ne sont pas en place. L’utilisation de l’ordinateur alors que certains composants manquent peut s’avérer dangereuse et risque de l’endommager. Transport du MacBook Si vous transportez le MacBook dans un sac ou dans un attaché-case, assurez-vous que ce dernier ne contient pas d’objets non attachés (des trombones ou des pièces de monnaie, par exemple) qui pourraient pénétrer accidentellement dans l’ordinateur par une ouverture (comme la fente du lecteur optique) ou se coincer à l’intérieur d’un port. Maintenez également à l’écart du port secteur MagSafe tout objet à sensibilité magnétique. Utilisation des connecteurs et des ports Ne forcez jamais un connecteur à entrer dans un port. Lorsque vous branchez un appareil, assurez-vous que le port ne contient aucun résidu quelconque, que le connecteur correspond bien au port et qu’il est placé de manière à entrer correctement dans le port.70 Chapitre 5 Dernières recommandations Utilisation du lecteur optique Le SuperDrive de votre MacBook prend en charge les disques de 12 cm. Les disques de forme irrégulière et de moins de 12 cm ne peuvent pas être lus et peuvent rester coincés dans le lecteur. Stockage du MacBook Si vous décidez de ranger le MacBook pendant une longue période, placez-le dans un endroit frais (idéalement, à 22° C) et déchargez la batterie jusqu’à 50 pour cent. Avant de ranger votre ordinateur pour une période de temps supérieure à cinq mois, déchargez la batterie jusqu’à environ 50 pour cent, puis retirezla de votreMacBook. Pour conserver les capacités de la batterie, rechargez la batterie jusqu’à 50 pour cent tous les six mois environ. Nettoyage du MacBook Lorsque vous nettoyez le boîtier du MacBook et ses composants, éteignez d’abord le MacBook, débranchez l’adaptateur secteur et retirez la batterie. Puis, pour nettoyer le boîtier de l’ordinateur, utilisez un chiffon doux, humide et non pelucheux. Évitez les infiltrations d’humidité par quelque ouverture que ce soit. Ne vaporisez jamais de liquide directement sur l’ordinateur. N’utilisez ni aérosols, ni dissolvants, ni abrasifs qui pourraient endommager les finitions de l’appareil. Nettoyage de l’écran du MacBook Pour nettoyer l’écran du MacBook, éteignez tout d’abord votre MacBook, débranchez l’adaptateur secteur, puis retirez la batterie. Ensuite utilisez le chiffon fourni pour nettoyer l’écran. Humidifiez le chiffon à l’eau si nécessaire. Ne vaporisez jamais de liquide directement sur l’écran.Chapitre 5 Dernières recommandations 71 Ergonomie Voici quelques conseils pour la mise en place d’un environnement de travail sain. Clavier et trackpad Lorsque vous tapez au clavier ou que vous vous servez du trackpad, vos épaules doivent être détendues. Le bras et l’avant-bras doivent former un angle droit, la main étant placée dans le prolongement du poignet. Position à éviter Position recommandée72 Chapitre 5 Dernières recommandations Vous devez avoir les mains et les doigts détendus lorsque vous tapez au clavier ou que vous utilisez le trackpad. Évitez de replier les pouces à l’intérieur des paumes. Modifiez fréquemment la position de vos mains pour éviter la fatigue. Après un travail continu et intensif sur ordinateur, certains utilisateurs peuvent ressentir des douleurs aux mains, aux poignets ou aux bras. Si ces douleurs persistent, consultez un spécialiste. Souris externe Si vous utilisez une souris externe, veillez à ce qu’elle se trouve à hauteur du clavier. Ménagez un espace suffisant pour la manipuler avec aisance. Siège Optez pour un siège de bureau réglable et offrant un dossier et une assise confortables. Réglez la hauteur du siège de telle sorte que vos cuisses reposent à l’horizontale et vos pieds à plat sur le sol. Le dossier du siège doit soutenir votre région lombaire, c’est-à-dire la partie inférieure de votre dos. Suivez les instructions du fabricant de sorte que le réglage du dossier soit parfaitement adapté à votre morphologie. Position à éviter Position recommandéeChapitre 5 Dernières recommandations 73 Au besoin, relevez le siège de manière à ce que vos avant-bras et vos mains soient placés correctement par rapport au clavier. Si, dans ce cas, vos pieds ne reposent plus à plat sur le sol, utilisez un repose-pied inclinable et réglable en hauteur. Si vous disposez d’un bureau modulaire, vous pouvez abaisser le niveau du plan de travail pour éviter l’emploi d’un repose-pied. Une troisième solution consiste à utiliser un bureau dont le poste de saisie est situé plus bas que le plan de travail. Écran intégré Orientez l’écran de manière à réduire le plus possible les reflets de l’éclairage électrique et de la lumière du jour. Ne forcez pas l’écran si vous rencontrez une résistance. L’angle d’ouverture maximal de l’écran ne peut dépasser 130 degrés. Réglez la luminosité et le contraste de l’écran chaque fois que vous déplacez l’ordinateur ou que l’éclairage ambiant change. Vous trouverez d’autres informations concernant l’ergonomie sur Internet : Apple et l’environnement Apple Inc. reconnaît sa responsabilité en matière de réduction de l’impact de ses produits et de ses activités sur l’environnement. Des informations supplémentaires sont disponibles sur Interne www.apple.com/about/ergonomics www.apple.com/fr/environment75 Regulatory Compliance Information FCC Compliance Statement This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. See instructions if interference to radio or television reception is suspected. L‘utilisation de ce dispositif est autorisée seulement aux conditions suivantes: (1) il ne doit pas produire de brouillage et (2) l’utilisateur du dispositif doit étre prêt à accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. Radio and Television Interference This computer equipment generates, uses, and can radiate radio-frequency energy. If it is not installed and used properly—that is, in strict accordance with Apple’s instructions—it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in Part 15 of FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. You can determine whether your computer system is causing interference by turning it off. If the interference stops, it was probably caused by the computer or one of the peripheral devices. If your computer system does cause interference to radio or television reception, try to correct the interference by using one or more of the following measures:  Turn the television or radio antenna until the interference stops.  Move the computer to one side or the other of the television or radio.  Move the computer farther away from the television or radio.  Plug the computer in to an outlet that is on a different circuit from the television or radio. (That is, make certain the computer and the television or radio are on circuits controlled by different circuit breakers or fuses.) If necessary, consult an Apple Authorized Service Provider or Apple. See the service and support information that came with your Apple product. Or consult an experienced radio/television technician for additional suggestions. Important: Changes or modifications to this product not authorized by Apple Inc. could void the EMC compliance and negate your authority to operate the product. This product has demonstrated EMC compliance under conditions that included the use of compliant peripheral devices and shielded cables (including Ethernet network cables) between system components. It is important that you use compliant peripheral devices and shielded cables between system components to reduce the possibility of causing interference to radios, television sets, and other electronic devices.76 Responsible party (contact for FCC matters only): Apple Inc. Corporate Compliance 1 Infinite Loop, MS 26-A Cupertino, CA 95014 Utilisation de la radio sans fil Cet appareil est restreint à un usage intérieur lorsqu’il fonctionne à des bandes de fréquence de 5,15 to 5,25 GHz. Cet appareil doit être utilisé à l’intérieur. Exposure to Radio Frequency Energy The radiated output power of the AirPort Extreme technology is below the FCC radio frequency exposure limits. Nevertheless, it is advised to use the wireless equipment in such a manner that the potential for human contact during normal operation is minimized. FCC Bluetooth Wireless Compliance The antenna used with this transmitter must not be collocated or operated in conjunction with any other antenna or transmitter subject to the conditions of the FCC Grant. Bluetooth Industry Canada Statement This Class B device meets all requirements of the Canadian interference-causing equipment regulations. Cet appareil numérique de la Classe B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. Industry Canada Statement Complies with the Canadian ICES-003 Class B specifications. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. This device complies with RSS 210 of Industry Canada. Bluetooth Europe - Déclaration de conformité UE Cet appareil sans fil est conforme à la directive R&TTE. Europe : déclaration de conformité EU Cet appareil est conforme à la recommandation 1999/ 519/CE du Conseil de l’Union européenne, du 12 juillet 1999, relative à la limitation de l’exposition aux champs électromagnétiques (de 0 Hz à 300 GHz). Apple Inc. déclare par la présente que la carte Mini-PCIe 802.11a/b/g/n est conforme à la directive R&TTE. Conforme aux directives européennes Basse tension et CEM. Voir : www.apple.com/euro/compliance (en anglais) Korea Warning Statements Singapore Wireless Certification77 Taiwan Wireless Statements Taiwan Class B Statement VCCI Class B Statement Russia External USB Modem Information Si vous connectez votre MacBook à une ligne téléphonique par le biais d’un modem USB externe, veuillez vous reporter aux informations fournies par l’agence de télécommunications mentionnées dans la documentation livrée avec votre modem. ENERGY STAR® Compliance As an ENERGY STAR® partner, Apple has determined that standard configurations of this product meet the ENERGY STAR® guidelines for energy efficiency. The ENERGY STAR® program is a partnership with electronic equipment manufacturers to promote energy-efficient products. Reducing energy consumption of products saves money and helps conserve valuable resources. This computer is shipped with power management enabled with the computer set to sleep after 10 minutes of user inactivity. To wake your computer, click the mouse or trackpad button or press any key on the keyboard. For more information about ENERGY STAR®, visit: www.energystar.gov78 Informations sur l’élimination et le recyclage Le symbole ci-dessus signifie que vous devez vous débarrasser de votre produit selon les normes et la législation de votre pays. La lampe de rétro-éclairage de cet appareil contient du mercure, vous ne pouvez donc pas le mélanger avec les ordures ménagères. Lorsque votre produit n’est plus utilisable, contactez Apple ou les autorités locales afin de connaître les possibilités de recyclage. Pour en savoir plus sur le programme de recyclage d’Apple, consultez le site www.apple.com/fr/environment/recycling. Informations sur l’enlèvement de la batterie Jetez vos batteries usagées en respectant les lois et les consignes environnementales de votre pays. Deutschland: Dieses Gerät enthält Batterien. Bitte nicht in den Hausmüll werfen. Entsorgen Sie dieses Gerätes am Ende seines Lebenszyklus entsprechend der maßgeblichen gesetzlichen Regelungen. Nederlands: Gebruikte batterijen kunnen worden ingeleverd bij de chemokar of in een speciale batterijcontainer voor klein chemisch afval (kca) worden gedeponeerd. Taiwan:79 Union européenne—instructions concernant l’élimination des déchets : Le symbole ci-dessus signifie que vous devez vous débarrasser de votre produit sans le mélanger avec les ordures ménagères, selon les normes et la législation de votre pays. Lorsque ce produit n’est plus utilisable, portez-le dans un centre de traitement des déchets agréé par les autorités locales. Certains centres acceptent les produits gratuitement. Le traitement et le recyclage séparé de votre produit lors de son élimination aideront à préserver les ressources naturelles et à protéger l’environnement et la santé des êtres humains.K Apple Inc. © 2009 Apple Inc. Tous droits réservés. En application des lois et conventions en vigueur, aucune reproduction totale ni partielle du manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Tout a été mis en œuvre pour que les informations pré- sentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression. Apple 1 Infinite Loop Cupertino, CA 95014 408-996-1010 www.apple.com Apple, le logo Apple, AirPort, AirPort Extreme, Cover Flow, Exposé, FileVault, FireWire, GarageBand, iCal, iChat, iLife, iMovie, iPhoto, iPod, iSight, iTunes, Keynote, Mac, MacBook, Macintosh, Mac OS, MagSafe, Photo Booth, Safari, SuperDrive et Time Machine sont des marques d’Apple Inc. déposées aux États-Unis et dans d’autres pays. Finder, le logo FireWire, iPhone, iWeb et Spotlight sont des marques d’Apple Inc. AppleCare, Apple Store et iTunes Store sont des marques de service d’Apple Inc. déposées aux États-Unis et dans d’autres pays. ENERGY STAR® est une marque déposée aux États-Unis. Intel, Intel Core et Xeon sont des marques d’Intel Corp. aux États-Unis et dans d’autres pays. La marque et les logos Bluetooth® sont des marques déposées appartenant à Bluetooth SIG, Inc., utilisées sous licence par Apple Inc. Les autres noms de produits et de sociétés sont la propriété de leurs détenteurs respectifs. Les produits commercialisés par des entreprises tierces ne sont mentionnés que pour information, sans aucune intention de préconisation ni de recommandation. Apple décline toute responsabilité quant à l’utilisation et au fonctionnement de ces produits. Fabriqué sous licence de Dolby Laboratories. « Dolby », « Pro Logic » et le logo double-D sont des marques déposées de Dolby Laboratories. Travaux confidentiels inédits, © 1992–1997 Dolby Laboratories, Inc. Tous droits réservés. Le produit décrit dans le présent manuel intègre des technologies de protection de droits d’auteur ellesmêmes protégées par divers brevets américains ainsi que d’autres droits de propriété intellectuelle appartenant à Macrovision Corporation et à d’autres détenteurs. L’utilisation de ces technologies de protection des droits d’auteurs doit être autorisée par Macrovision Corporation et est destinée à un cadre privé ou de visualisation restreinte, sauf consentement de Macrovision Corporation. Tout démontage ou ingénierie inverse est interdit. L’appareil est couvert par les brevets des États-Unis portant les numéros 4 631 603, 4 577 216, 4 819 098 et 4 907 093 sous licence à des fins de visualisation limitée uniquement. Publié simultanément aux États-Unis et au Canada. Félicitations, vous et votre MacBook êtes faits l’un pour l’autre.Caméra iSight intégrée Réalisez des vidéoconférences avec 3 amis au maximum partout dans le monde et en temps réel. www.apple.com/macbook Front Row avec la télécommande Apple Remote Profitez de vos films, de votre musique et de vos photos depuis votre canapé. Spotlight Retrouvez n´importe quoi sur votre système à l’instant même où vous en saisissez le nom. www.apple.com/macbook www.apple.com/fr/macbook Aide Mac iSight www.apple.com/fr/macosx Aide Mac Spotlight Aide Mac Front Row www.apple.com/fr/macbook MusiqueAmusez-vous avec vos photos Importez, organisez et partagez jusqu’à 250 000 photos, puis faites-en d’élégants albums de photos. Widgets de Dashboard Obtenez les toutes dernières informations instantanément. Affichez l’état de la bourse, la météo, les prochains vols d’avions et autres. Podcasts Enregistrez des podcasts dotés d’un son professionnel grâce aux effets sonores et aux jingles. Des sites web en un clic Créez des sites web et des blogs en toute simplicité et agrémentez-les de vidéos, de podcasts et de photos. Publier www.apple.com/fr/macosx Aide Mac Dashboard Aide iPhoto photo www.apple.com/fr/ilife/garageband Aide GarageBand podcast www.apple.com/fr/ilife/iweb Aide iWeb site web www.apple.com/fr/ilife/iphotoTable des matières 5 Table des matières Chapitre 1 : Prêt, feu, configurez ! 9 Contenu de la boîte 9 Configuration du MacBook 15 Extinction ou suspension d’activité de votre MacBook Chapitre 2 : Votre MacBook au quotidien 22 Caractéristiques de base de votre MacBook 25 Fonctionnalités du clavier de votre MacBook 27 Ports présents sur votre MacBook 29 Utilisation de la batterie du MacBook 31 Comment obtenir des réponses à vos doutes Chapitre 3 : Augmentez votre mémoire 37 Installation de mémoire supplémentaire 44 Vérification de la reconnaissance de la nouvelle mémoire par votre MacBook Chapitre 4 : À tout problème sa solution 46 Problèmes vous empêchant d’utiliser votre MacBook 51 Utilisation d’Apple Hardware Test 52 Problèmes de connexion à Internet6 Table des matières 55 Problèmes de communication sans fil avec AirPort Extreme 56 Maintien à jour de vos logiciels 56 Réinstallation des logiciels fournis avec votre MacBook 58 Informations, services et assistance 60 Localisation du numéro de série de votre produit Chapitre 5 : Dernières recommandations 62 Informations importantes concernant la sécurité 65 Informations importantes sur la manipulation 67 Ergonomie 69 Apple et l’environnement 71 Regulatory Compliance Information1 1Prêt, feu, configurez ! www.apple.com/fr/macbook Aide Mac Assistant Migration8 Chapitre 1 Prêt, feu, configurez ! Votre MacBook est conçu pour pouvoir être configuré rapidement et utilisé immédiatement. Si vous n’avez jamais utilisé de MacBook ou si vous n’êtes pas familiarisé avec les ordinateurs Macintosh, vous trouverez dans ce chapitre des instructions qui vous aideront à débuter. Important : lisez attentivement toutes les instructions d’installation (et les consignes de sécurité débutant à la page 61) avant d’utiliser votre ordinateur pour la première fois. Si vous êtes un utilisateur expérimenté, peut-être êtes-vous déjà en mesure d’utiliser votre nouvel ordinateur. Veillez néanmoins à consulter les informations du chapitre 2, « Votre MacBook au quotidien », pour découvrir les nouvelles fonctionnalités de cet MacBook. Vous trouverez la plupart des réponses à vos questions dans l’Aide Mac. Pour en savoir plus sur l’accès à l’Aide Mac, consultez la section « Comment obtenir des réponses à vos doutes » à la page 31. Apple est susceptible de publier de nouvelles versions et mises à jour de ses logiciels système, il est possible que les images de ce manuel soient légèrement différentes de ce que vous voyez à l’écran. Important : retirez le film protecteur qui entoure l’adaptateur secteur MagSafe 60 W avant de configurer le MacBook.Chapitre 1 Prêt, feu, configurez ! 9 Contenu de la boîte Configuration du MacBook Votre MacBook est conçu pour pouvoir être configuré rapidement et utilisé immédiatement. Les pages suivantes contiennent des informations qui vous guideront tout au long du processus de configuration, notamment des opérations suivantes :  Le branchement de l’adaptateur secteur MagSafe 60 W.  Le branchement des câbles et l’accès à un réseau.  La mise sous tension du MacBook et l’utilisation du trackpad.  La configuration d’un compte d’utilisateur et d’autres paramètres via Assistant réglages.  La configuration des préférences et du bureau Mac OS X. Câble secteur Télécommande Apple Remote Fiche secteur Adaptateur secteur MagSafe de 60 W MENU10 Chapitre 1 Prêt, feu, configurez ! Étape 1 : Branchez l’adaptateur secteur MagSafe 60 W pour alimenter le MacBook et recharger sa batterie. Assurez-vous que la fiche secteur est complètement insérée dans l’adaptateur et que les broches de la fiche sont complètement déployées. Branchez la fiche secteur de votre adaptateur sur une prise secteur, puis branchez le connecteur MagSafe sur le port secteur MagSafe. En approchant le connecteur MagSafe du port, vous ressentirez la force d’un aimant l’attirant. Pour rallonger le câble de l’adaptateur secteur, tirez d’abord sur la fiche secteur pour la retirer de l’adaptateur. Connectez le câble secteur inclus à l’adaptateur, en vous assurant qu’il est fermement connecté. Branchez l’autre extrémité sur une prise de courant. Le câble secteur fournit une connexion avec mise à la terre. Lorsque vous déconnectez l’adaptateur secteur d’une prise de courant ou de l’ordinateur, débranchez la prise et non le câble. ¯ Câble secteur Fiche secteur Connecteur MagSafe Port secteur MagSafeChapitre 1 Prêt, feu, configurez ! 11 Remarque : la première fois que vous branchez l’adaptateur secteur sur le MacBook, la lampe témoin du connecteur MagSafe s’illumine. Une lumière orange indique que la batterie est alimentée. Une lumière verte indique que la batterie n’est pas alimentée, ce qui peut signifier qu’elle est complètement rechargée ou qu’elle n’est pas installée. Si la lampe témoin ne s’allume pas, vérifiez que le connecteur est correctement branché. Étape 2 : Pour accéder à Internet ou à un réseau, branchez une extrémité du câble Ethernet sur le MacBook et l’autre extrémité sur un modem câble, un modem DSL ou un réseau. Pour une connexion commutée, vous aurez besoin d’un modem Apple USB Modem externe, disponible sur l’Apple Store en ligne à l’adresse www.apple.com/fr/store ou auprès des revendeurs agréés Apple. Branchez le modem Apple USB Modem sur un port USB du MacBook, puis reliez le modem à une prise téléphonique à l’aide d’un câble téléphonique (non inclus). G Câble Ethernet Port Ethernet Gigabit (10/100/1000Base-T)12 Chapitre 1 Prêt, feu, configurez ! Remarque : votre MacBook est également équipé de la technologie AirPort Extreme de mise en réseau sans fil. Pour en savoir plus sur la configuration d’une connexion sans fil, choisissez dans la barre des menus Aide > Aide Mac, puis Bibliothèque > Aide AirPort. Consultez la section « Comment obtenir des réponses à vos doutes » à la page 31. Étape 3 : Appuyez brièvement sur le bouton d’alimentation (®) pour allumer votre MacBook. Votre ordinateur émet un signal sonore lorsque vous l’allumez. Sa mise en route prend quelques instants. Après le démarrage, Assistant réglages s’ouvre automatiquement. Si l’ordinateur ne s’allume pas, consultez la section « Si votre MacBook ne s’allume ou ne démarre pas » à la page 49. Trackpad Bouton du trackpad ® Bouton d’alimentationChapitre 1 Prêt, feu, configurez ! 13 Le trackpad du MacBook permet de sélectionner et de déplacer des éléments à l’écran de la même façon que la souris d’un ordinateur de bureau.  Pour déplacer le pointeur à l’écran, glissez votre index sur le trackpad. Appuyez sur le bouton du trackpad pour sélectionner un élément, cliquer ou faire un double-clic.  Faites glisser deux doigts sur le trackpad pour faire défiler. Pour plus d’informations, choisissez Aide > Aide Mac et recherchez « trackpad ». Étape 4 : Configurez votre MacBook à l’aide d’Assistant réglages La première fois que vous démarrez votre MacBook, l’Assistant réglages se met en route. Il vous aide à saisir les informations de connexion à Internet et au courrier électronique ainsi qu’à configurer un compte d’utilisateur sur votre MacBook. Si vous possédez déjà un ordinateur Macintosh, l’Assistant réglages peut vous aider à transférer automatiquement les fichiers, les applications et d’autres informations de votre ancien ordinateur. Si vous ne comptez pas conserver ou utiliser votre autre Mac, il est préférable de lui retirer son autorisation à lire la musique, les clips vidéo ou les livres audio achetés sur l’iTunes Store. Le retrait de l’autorisation d’un ordinateur empêche la lecture par un tiers de tout morceau, vidéo ou livre audio acheté et permet de libérer l’autorisation afin qu’elle puisse être utilisée. Pour plus d’informations sur le retrait d’autorisation, ouvrez iTunes et choisissez Aide > Aide iTunes. Si vous n’utilisez pas l’Assistant réglages pour transférer vos informations lors du premier démarrage de l’ordinateur, vous pouvez le faire ultérieurement. Allez dans le dossier Applications, ouvrez le dossier Utilitaires, puis double-cliquez sur Assistant migration.14 Chapitre 1 Prêt, feu, configurez ! Étape 5 : Personnalisez le bureau Mac OS X et réglez les préférences. Barre des menus Dock Icône des Préférences Système Icône de recherche de Spotlight Menu Aide Icône du FinderChapitre 1 Prêt, feu, configurez ! 15 Grâce aux Préférences Système, vous pouvez donner à votre bureau l’apparence souhaitée sans perdre de temps. Choisissez le menu Pomme () > Préférences Système dans la barre des menus. À mesure que vous vous familiarisez avec votre ordinateur, explorez les Préférences Système, le centre de commandes de la plupart des réglages de votre MacBook. Pour en savoir plus, ouvrez l’Aide Mac et recherchez « Préférences Système » ou la préférence que vous souhaitez modifier. Extinction ou suspension d’activité de votre MacBook Lorsque vous avez terminé de travailler avec le MacBook, suspendez son activité ou éteignez-le. Suspension de l’activité de votre MacBook Suspendez l’activité de votre MacBook si vous ne comptez vous en éloigner que quelques instants. Vous pourrez ensuite le réactiver rapidement sans avoir à le redémarrer. Pour suspendre l’activité de votre MacBook, procédez de l’une des manières suivantes :  Rabattez l’écran.  Choisissez Pomme () > Suspendre l’activité, dans la barre des menus.  Appuyez sur le bouton d’alimentation (®) et cliquez sur Suspendre l’activité dans la zone de dialogue qui apparaît.  Choisissez le menu Pomme () > Préférences Système, cliquez sur Économiseur d’énergie et définissez un délai pour la minuterie de mise en veille.16 Chapitre 1 Prêt, feu, configurez !  Maintenez enfoncé le bouton Lecture/Pause (’) de la télécommande Apple Remote pendant 3 secondes. Pour réactiver le MacBook :  Si l’écran est fermé, il suffit de l’ouvrir pour réactiver votre MacBook.  Si l’écran est déjà ouvert, appuyez sur le bouton d’alimentation (®), sur l’une des touches du clavier ou sur un bouton de la télécommande Apple Remote. À la réactivation de votre MacBook, vos applications, vos documents et vos réglages sont conservés tels que vous les aviez laissés. AVIS : patientez quelques secondes jusqu’à ce que la lampe témoin de suspension d’activité clignote (signalant que l’activité de l’ordinateur est suspendue et que le disque dur a cessé de tourner) avant de déplacer votre MacBook. Tout déplacement de votre ordinateur lorsque le disque dur est en train de tourner risque d’endommager ce dernier et d’entraîner une perte de données ou l’impossibilité de démarrer à partir du disque dur.Chapitre 1 Prêt, feu, configurez ! 17 Extinction de votre MacBook Si vous ne comptez pas utiliser votre MacBook pendant un jour ou deux, il est préférable de l’éteindre. La lampe témoin de suspension d’activité reste allumée quelques instants au moment de l’extinction. Pour éteindre le MacBook, procédez de l’une des manières suivantes :  Choisissez Pomme () > Éteindre, dans la barre des menus.  Appuyez sur le bouton d’alimentation (®) et cliquez sur Éteindre dans la zone de dialogue qui apparaît. Si vous comptez ranger votre MacBook pour une durée prolongée, consultez la section « Informations importantes sur la manipulation » à la page 65 afin d’obtenir des informations sur les mesures à prendre pour éviter que votre batterie ne se décharge complètement.2 2Votre MacBook au quotidien www.apple.com/fr/macosx Aide Mac Mac OS XChapitre 2 Votre MacBook au quotidien 21 Cette rubrique vous offre un aperçu des différentes parties et caractéristiques de votre MacBook. Le site web d’Apple, à l’adresse www.apple.com/fr/, vous donne accès aux actualités Apple, à des téléchargements gratuits et des catalogues en ligne des logiciels et matériaux Apple destinés à votre MacBook. Vous trouverez également les manuels de nombreux produits Apple, ainsi que l’assistance technique pour tous les produits Apple, sur le site web d’assistance Apple à l’adresse www.apple.com/fr/support.22 Chapitre 2 Votre MacBook au quotidien Caractéristiques de base de votre MacBook ®? ® Bouton d’alimentation Lampe témoin de la caméra Caméra iSight Microphone Haut-parleurs stéréo Lampe témoin de suspension d’activité Récepteur à infrarouge Trackpad Batterie (en dessous) Bouton du trackpad Lecteur optique à chargement par fenteChapitre 2 Votre MacBook au quotidien 23 Microphone intégré Capturez des données audio directement avec le micro (situé à gauche de la caméra iSight) ou bien, si vous disposez d’une connexion à haut débit, discutez avec vos amis en direct via l’application iChat AV, incluse. Caméra iSight intégrée et lampe témoin de la caméra Elle vous permet de réaliser des vidéoconférences avec d’autres utilisateurs grâce à l’application iChat AV, de prendre des photos avec Photo Booth ou de capturer des vidéos avec iMovie HD. La lampe témoin de la caméra s’allume lorsque la caméra iSight est en fonctionnement. Haut-parleurs stéréo intégrés Permettent d’écouter de la musique, des films, des jeux et d’autres types de données multimédia. Batterie Utilisez le MacBook en puisant l’énergie de la batterie lorsque vous n’êtes pas à proximité d’une prise de courant. En retirant la batterie, vous pouvez avoir accès à la mémoire du MacBook. Trackpad et bouton du trackpad Permet de déplacer le pointeur à l’écran avec l’index ; inclut également une fonction de défilement en utilisant deux doigts sur le trackpad. Appuyez légèrement sur le trackpad pour cliquer ou double-cliquer sur une sélection.24 Chapitre 2 Votre MacBook au quotidien Lampe témoin de suspension d’activité Une lumière blanche clignote lorsque le MacBook est en suspension d’activité. Récepteur à infrarouge Associé à la télécommande Apple Remote, le récepteur à infrarouge intégré vous permet de contrôler, jusqu’à une distance de 9 mètres, les applications Front Row et Keynote s’exé- cutant sur le MacBook. Lecteur de disque optique à chargement par fente Le lecteur optique peut lire des CD et DVD de taille standard et écrire sur des CD. Si vous disposez d’un lecteur SuperDrive, vous pouvez également écrire sur des disques DVD. ® Bouton d’alimentation Permet d’allumer ou d’éteindre votre MacBook ou d’en suspendre l’activité. Maintenez ce bouton enfoncé pour redémarrer le MacBook lors des procédures de dépannage.Chapitre 2 Votre MacBook au quotidien 25 Fonctionnalités du clavier de votre MacBook esc num F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 lock — i C - Touche de fonction (Fn) Touches de réglage du volume Touches de réglage de la luminosité Touche de verrouillage numérique Touche d’éjection de disques Touche Silence Touches de fonction standard Touche de bascule du mode vidéo26 Chapitre 2 Votre MacBook au quotidien Touche de fonction (Fn) Maintenez cette touche enfoncée pour activer les actions personnalisées affectées aux touches de fonction (F1 à F12). Pour apprendre comment personnaliser les touches de fonction, choisissez Aide > Aide Mac dans la barre des menus, puis recherchez « touches de fonction ». F1, F2 (touches de réglage de la luminosité) Permettent d’augmenter ( ) ou de diminuer ( ) la luminosité de l’écran de votre MacBook. — F3 (touche silence) Permet de désactiver le son provenant des haut-parleurs intégrés et du port de sortie casque. - F4, F5 (touches de réglage du volume) Permettent d’augmenter (-) ou de diminuer (–) le volume du son provenant des haut-parleurs intégrés et du port de sortie casque. F6 (touche verrouillage numérique) Permet d’activer et de désactiver le pavé numérique intégré au clavier du MacBook. Lorsque le pavé numérique est activé, une lumière verte brille sur la touche de verrouillage numérique. i F7 (touche de bascule du mode vidéo) Permet de passer du mode double-écran (affichage de votre bureau en mode étendu, à la fois sur l’écran intégré et sur un écran externe) au mode de recopie vidéo (affichage des mêmes informations sur les deux écrans), et vice versa. F11, F12 (touches Exposé et Dashboard) Par défaut, la touche F11 ouvre Exposé et la touche F12 ouvre Dashboard. C Touche d’éjection de disque Maintenez cette touche enfoncée pour éjecter un disque. Il est également possible d’éjecter un disque en faisant glisser son icône dans la Corbeille.Chapitre 2 Votre MacBook au quotidien 27 Ports présents sur votre MacBook ¯ Port Ethernet Gigabit (10/100/ 1000 Base-T) G Logement de sécurité Port de sortie casque/audio numérique optique f Port d’entrée de ligne audio/ audio numérique optique , Port Mini-DVI £ Port FireWire 400 H Ports USB 2.0 Port d d’adaptateur secteur MagSafe28 Chapitre 2 Votre MacBook au quotidien ¯ Port d’adaptateur secteur MagSafe Branchez-y l’adaptateur secteur MagSafe 60 W (inclus) pour recharger la batterie du MacBook. G Port Ethernet Gigabit (10/100/1000 Base-T) Permet de se connecter à un réseau Ethernet haute vitesse, un modem câble ou DSL ou encore un autre ordinateur. Le port Ethernet détecte automatiquement les périphériques Ethernet sans avoir besoin de câble croisé Ethernet. £ Port Mini-DVI (sortie vidéo) Permet de brancher un moniteur externe, un projecteur ou un téléviseur équipé d’un connecteur DVI, VGA, composite ou S-vidéo. Selon le type de périphérique externe auquel vous connectez votre ordinateur, utilisez un adaptateur Mini-DVI vers DVI, Mini-DVI vers VGA ou Mini-DVI vers Vidéo, tous vendus séparément à l’adresse www.apple.com/fr/store. H Port FireWire 400 Permettent de brancher sur l’ordinateur des périphériques externes à haute vitesse tels que des caméras vidéo numériques et des périphériques de stockage. d Deux ports USB (Universal Serial Bus) 2.0 Grâce à ses ports, vous pouvez brancher sur le MacBook un modem, un iPod, une souris, un clavier, une imprimante, un lecteur de disques, un appareil photo numérique, une manette de jeu et plus encore. Vous pouvez également y brancher des périphériques USB 1.1. , Port d’entrée de ligne audio/audio numérique optique Permet de connecter un micro ou un appareil audio numérique à votre MacBook. f Port de sortie casque/audio numérique optique Il permet de connecter des haut-parleurs externes, un casque ou des appareils audio numériques. Logement de sécurité Fixez-y un verrou et un câble antivol (disponibles sur le site www.apple.com/fr/store).Chapitre 2 Votre MacBook au quotidien 29 Utilisation de la batterie du MacBook Lorsque l’adaptateur secteur MagSafe n’est pas branché, le MacBook est alimenté par sa batterie. L’autonomie du MacBook varie en fonction des applications utilisées et des périphériques externes qui y sont connectés. La désactivation de fonctions sans fil telles qu’AirPort Extreme ou Bluetooth® contribue à économiser l’énergie de votre batterie. Si votre batterie faiblit pendant que vous travaillez, branchez l’adaptateur secteur et laissez la batterie se recharger. Pour remplacer une batterie presque déchargée par une batterie chargée lorsque votre ordinateur n’est pas connecté à un adaptateur secteur, éteignez l’ordinateur. Pour connaître le niveau de charge de votre batterie, vous pouvez observer les lampes témoins de niveau de charge dont elle est dotée. Appuyez sur le bouton situé en regard des témoins lumineux afin que ces derniers brillent brièvement pour indiquer le niveau de charge de la batterie. Vous pouvez vérifier le niveau de charge, que la batterie soit ou non insérée dans votre MacBook. Important : si un seul témoin est allumé, le niveau restant est très faible. Si aucun témoin n’est allumé, c’est que la batterie est complètement vide et que le MacBook ne pourra démarrer sans l’adaptateur secteur. Branchez l’adaptateur secteur et laissez la batterie se recharger ou remplacez la batterie à plat par une batterie complètement rechargée (voir « Retrait de la batterie » à la page 37).30 Chapitre 2 Votre MacBook au quotidien Vous pouvez également connaître la charge actuelle de la batterie en observant l’icône d’état de la batterie ( ) située dans la barre des menus. Le niveau affiché dépend de la quantité d’énergie restant dans la batterie, mais aussi des applications et des périphériques en cours d’utilisation, ainsi que des réglages actuels de votre système. Pour disposer de plus d’énergie, fermez des applications, déconnectez les périphériques non utilisés et réglez la fonction d’Économiseur d’énergie. Pour en savoir plus sur l’économie de la batterie et obtenir des astuces pour améliorer ses performances, rendez-vous à l’adresse www.apple.com/fr/batteries/notebooks.html. Batterie Témoins LED de la batterie Bouton ¥ ÁChapitre 2 Votre MacBook au quotidien 31 Recharge de la batterie Lorsque l’adaptateur secteur fourni avec le MacBook est connecté, la batterie se recharge, que l’ordinateur soit éteint, allumé ou en mode de suspension d’activité. La recharge sera toutefois plus rapide si l’ordinateur est éteint ou en mode de suspension d’activité. Comment obtenir des réponses à vos doutes De plus amples informations sur l’utilisation de votre sont disponibles dans l’Aide Mac et sur Internet, à l’adresse www.apple.com/fr/support/macbook. Pour faire apparaître l’Aide Mac : 1 Cliquez sur l’icône du Finder dans le Dock (la barre des icônes située au bord de l’écran). 2 Choisissez Aide > Aide Mac (cliquez sur le menu Aide dans la barre des menus puis sélectionnez Aide Mac). 3 Cliquez dans le champ de recherche, tapez votre question et appuyez sur la touche Retour du clavier.32 Chapitre 2 Votre MacBook au quotidien Informations supplémentaires Pour en savoir plus sur l’utilisation de votre MacBook, consultez le tableau suivant : Pour obtenir des informations sur : Effectuez l’opération suivante : L’installation de mémoire Consultez le chapitre 3, « Augmentez votre mémoire », à la page 35. Le dépannage de votre MacBook en cas de problème Consultez le chapitre 4, « À tout problème sa solution », à la page 45. L’obtention de services et d’une assistance pour votre MacBook Consultez la section « Informations, services et assistance » à la page 58. Sinon, consultez le site web de support Apple à l’adresse www.apple.com/fr/support/macbook. L’utilisation de Mac OS X Le site web de Mac OS X à l’adresse www.apple.com/fr/macosx/overview. Vous pouvez également consulter le document intitulé « Bienvenue dans Tiger », disponible dans le dossier /Bibliothèque/Documentation/User Guides And Information de votre disque dur, ou encore rechercher « Mac OS X » dans l’Aide Mac. La migration depuis un PC vers un Mac Consultez l’article « How To Move To Mac » (Comment passer au Mac) à l’adresse www.apple.com/fr/macosx/switch. Vous pouvez également cliquer sur le lien « Passage de Windows à Mac », qui se trouve dans la rubrique « Problèmes fréquemment rencontrés par les utilisateurs » de la page d’accueil de l’Aide Mac. L’utilisation des applications iLife Visitez le site web d’iLife à l’adresse www.apple.com/fr/ilife. Vous pouvez aussi ouvrir une application iLife, puis ouvrir l’Aide de l’application et saisir une question dans le champ de recherche.Chapitre 2 Votre MacBook au quotidien 33 La modification des Préférences Système Ouvrez Préférences Système en choisissant le menu Pomme (K) > Préférences Système. Vous pouvez également rechercher « préférences système » dans l’Aide Mac. L’utilisation de votre trackpad Recherchez « trackpad » dans l’Aide Mac ou bien ouvrez Préférences Système, cliquez sur Clavier et souris, puis sur Trackpad. L’utilisation de la caméra iSight Recherchez « iSight » dans l’Aide Mac. L’utilisation de la technologie sans fil AirPort Extreme Visitez la page web d’assistance AirPort à l’adresse www.apple.com/fr/support/airport. Vous pouvez également ouvrir l’Aide AirPort en cliquant sur le bouton d’accueil (situé en haut de la page de l’Aide Mac) et en le maintenant enfoncé, puis en sélectionnant Aide AirPort dans la liste. L’utilisation de la technologie sans fil Bluetooth Visitez la page web d’assistance Bluetooth à l’adresse www.apple.com/fr/support/bluetooth. Vous pouvez aussi ouvrir l’utilitaire Échange de fichiers Bluetooth (dans le dossier Utilitaires du dossier Applications) et sélectionner Aide > Aide Bluetooth. L’entretien de la batterie Recherchez « batterie » dans l’Aide Mac. La connexion d’une imprimante Recherchez « impression » dans l’Aide Mac. Les connexions FireWire et USB Recherchez « USB » ou « FireWire » dans l’Aide Mac. La connexion à Internet Recherchez « Internet » dans l’Aide Mac. La connexion d’un moniteur externe Recherchez « port de moniteur » dans l’Aide Mac. La télécommande Apple Remote Recherchez « télécommande » dans l’Aide Mac. Front Row Recherchez « Front Row » dans l’Aide Mac. Pour obtenir des informations sur : Effectuez l’opération suivante :34 Chapitre 2 Votre MacBook au quotidien La gravure d’un CD ou DVD Recherchez « graver un disque » dans l’Aide Mac. Les caractéristiques Visitez la page web concernant les caractéristiques, à l’adresse www.apple.com/fr/support/specs. Vous pouvez également ouvrir Informations Système en choisissant le menu Pomme (K) > « À propos de ce Mac » dans la barre des menus, puis en cliquant sur Plus d’infos. Pour obtenir des informations sur : Effectuez l’opération suivante :3 3Augmentez votre mémoire mémoire RAM www.apple.com/fr/store Aide Mac36 Chapitre 3 Augmentez votre mémoire Ce chapitre fournit des informations et des instructions pour installer de la mémoire supplémentaire et pour retirer et remettre en place la batterie de votre MacBook. Votre ordinateur est doté de deux logements de mémoire auxquels vous pouvez accéder en retirant sa batterie. Votre MacBook est fourni avec un minimum de 1 gigaoctet (Go) de mémoire DDR2 (Double Data Rate) SDRAM (Synchronous Dynamic Random-Access Memory) à 667 MHz. Les deux logements de mémoire peuvent accueillir un module SDRAM conforme aux spécifications suivantes :  format DDR2 SO-DIMM (Double Data Rate Small Outline Dual Inline Memory Module) ;  taille inférieure à 3,8 cm ;  512 Mo ou 1 Go ;  à 200 broches ;  mémoire RAM de type PC2-5300 DDR2 à 667 MHz. Pour obtenir des performances optimales, ne laissez aucun des deux logements vides et installez-y des modules de mémoire identiques. AVERTISSEMENT : Apple vous recommande de confier l’installation de mémoire à un technicien agréé Apple. Consultez les informations sur le dépannage et l’assistance qui accompagnent votre ordinateur pour savoir comment contacter Apple. Tout dommage causé à votre matériel en tentant d’installer vous-même de la mémoire n’est pas couvert par la garantie limitée de votre ordinateur.Chapitre 3 Augmentez votre mémoire 37 Installation de mémoire supplémentaire Pour installer de la mémoire, il faut enlever la batterie puis la remettre en place. La procédure suivante inclut des instructions sur le retrait de la batterie, l’ajout de mémoire et la remise en place de la batterie. Étape 1 : Retrait de la batterie 1 Éteignez le MacBook. Débranchez l’adaptateur secteur, le câble Ethernet et tous les autres câbles connectés au MacBook afin d’éviter toute détérioration de ce dernier. AVERTISSEMENT : soyez prudent lorsque vous manipulez la batterie. Consultez les informations de sécurité sur la batterie à la page 64.38 Chapitre 3 Augmentez votre mémoire 2 Retournez le MacBook et repérez l’emplacement du verrou de la batterie. Utilisez une pièce de monnaie pour faire tourner le verrou d’un quart de tour vers la droite afin de débloquer la batterie, puis retirez cette dernière avec précaution. AVERTISSEMENT : les composants internes de votre MacBook risquent d’être chauds. Si vous venez d’utiliser votre MacBook, attendez 10 minutes après l’extinction afin de laisser aux composants internes le temps de se refroidir. ¥ Á ¥ ÁChapitre 3 Augmentez votre mémoire 39 Étape 2 : Installation de la mémoire 1 Desserrez les trois vis imperdables maintenant le support en L, tirez sur la barre la plus longue pour retirer le support et écartez celui-ci. Les leviers situés dans les logements de mémoire se soulèvent automatiquement lorsque vous retirez le support. 2 Touchez la surface métallique de l’intérieur de l’ordinateur afin de décharger toute électricité statique que vous pouvez avoir emmagasinée. Desserrez les trois vis Tirez sur cette barre ¥ Á40 Chapitre 3 Augmentez votre mémoire 3 Pour retirer un module de mémoire placé dans un logement, poussez le levier vers la gauche d’un mouvement rapide, ce qui fait apparaître le bord du module de mémoire. Retirez le module de mémoire. Répétez l’opération avec l’autre module de mémoire. Leviers ¥ ÁChapitre 3 Augmentez votre mémoire 41 4 Insérez les nouveaux modules de mémoire dans les logements : a Commencez par insérer le bord doré, avec l’encoche sur le côté gauche. b Poussez fermement avec deux doigts sur les modules de mémoire pour les mettre en place. Vous devriez entendre un clic lorsque la mémoire s’enclenche. Remarque : il est possible qu’une sorte de lubrifiant soit présent sur le nouveau module de mémoire afin de faciliter le processus d’insertion. Ceci est normal et vous ne devez pas essuyer ou nettoyer le module pour tenter de l’éliminer. c Si les leviers ne reviennent pas en position fermée, déplacez-les vers la droite pour les fermer. Encoches ¥ Á42 Chapitre 3 Augmentez votre mémoire 5 Replacez le support en L en insérant d’abord le bras le plus court, puis resserrez les vis. Insérez Resserrez les trois vis d’abord ¥ ÁChapitre 3 Augmentez votre mémoire 43 Étape 3 : Remise en place de la batterie 1 Placez le bord droit de la batterie dans son compartiment, puis appuyez doucement sur le bord gauche pour la mettre en place. Utilisez une pièce de monnaie pour faire tourner le verrou d’un quart de tour vers la gauche afin d’immobiliser la batterie. 2 Reconnectez l’adaptateur secteur et tout autre câble connecté auparavant à l’ordinateur. ¥ Á ¥ Á44 Chapitre 3 Augmentez votre mémoire Vérification de la reconnaissance de la nouvelle mémoire par votre MacBook Après avoir ajouté de la mémoire au MacBook, vérifiez si elle est reconnue. Pour vérifier la mémoire de votre ordinateur : 1 Démarrez votre MacBook. 2 Lorsque le bureau Mac OS X s’affiche, choisissez le menu Pomme () > À propos de ce Mac. Pour plus de détails sur la mémoire installée sur votre ordinateur, ouvrez Informations Système en cliquant sur Plus d’infos puis sur Mémoire. Si le MacBook ne reconnaît pas la mémoire ou ne démarre pas correctement, vérifiez que la mémoire est compatible avec le MacBook et qu’elle est correctement installée.4 4À tout problème sa solution www.apple.com/fr/support Aide Mac aide46 Chapitre 4 À tout problème sa solution Il se peut que vous rencontriez à titre exceptionnel des problèmes en utilisant le MacBook . Lisez ce chapitre pour trouver des idées de solution qui vous aideront à régler vos problèmes. Vous trouverez aussi des informations supplémentaires concernant le dépannage dans l’Aide Mac et sur le site web d’assistance consacré au MacBook, à l’adresse www.apple.com/fr/support/macbook. Il existe généralement une solution simple et rapide aux problèmes qui peuvent survenir au cours de l’utilisation de votre MacBook. Réfléchissez aux conditions qui ont entraîné l’apparition de ce problème. Ce récapitulatif de la totalité des opérations effectuées avant que le problème ne survienne permet de restreindre les causes possibles et de trouver la solution. Les éléments à noter comprennent :  les applications que vous étiez en train d’utiliser quand le problème est apparu ; les problèmes qui n’apparaissent qu’avec une application spécifique peuvent indiquer que cette application n’est pas compatible avec la version de Mac OS installée sur votre ordinateur ;  les nouveaux logiciels installés, notamment ceux qui ont ajouté des éléments à votre dossier Système ;  tout composant matériel installé (mémoire supplémentaire ou périphérique, par exemple). Problèmes vous empêchant d’utiliser votre MacBook Si votre MacBook ne répond plus ou que le pointeur se fige Il peut arriver, très rarement, qu’une application se « fige » à l’écran. Mac OS X permet de quitter une application figée sans redémarrer votre ordinateur. Vous pouvez ainsi enregistrer le travail effectué dans d’autres applications ouvertes.Chapitre 4 À tout problème sa solution 47 Pour forcer une application à se fermer : 1 Appuyez sur les touches Commande (x) + Option + Échap ou choisissez le menu Pomme () > Forcer à quitter dans la barre des menus. La boîte de dialogue « Forcer à quitter des applications » apparaît. L’application est sélectionnée. 2 Cliquez sur Forcer à quitter. L’application se ferme, en laissant toutes les autres applications ouvertes. Si nécessaire, vous pouvez également redémarrer le Finder à partir de cette zone de dialogue. Enregistrez ensuite votre travail dans les applications ouvertes, puis redémarrez l’ordinateur afin de vous assurer que le problème est entièrement réglé. Si vous ne parvenez pas à forcer la fermeture d’une application, maintenez enfoncé le bouton d’alimentation (®) durant quelques secondes pour éteindre l’ordinateur. Attendez 10 secondes puis allumez l’ordinateur. Si le problème survient fréquemment, choisissez Aide > Aide Mac dans la barre des menus en haut de l’écran. Recherchez le mot « bloquer » pour obtenir de l’aide en cas de blocage de l’ordinateur ou s’il ne répond pas. Si le problème ne survient que lorsque vous utilisez une application particulière, vérifiez auprès de son éditeur si elle est compatible avec votre ordinateur. Pour obtenir des informations de contact et une assistance relatifs aux logiciels fournis avec votre MacBook, rendez-vous à l’adresse www.apple.com/fr/guide.48 Chapitre 4 À tout problème sa solution Si vous savez qu’une application est compatible, vous devrez peut-être réinstaller le logiciel système de votre ordinateur. Consultez « Réinstallation des logiciels fournis avec votre MacBook » à la page 56. Si le MacBook se bloque au démarrage, si un point d’interrogation clignotant apparaît ou si l’écran est éteint et que la lampe témoin de suspension d’activité reste allumée (pas en mode de suspension d’activité) Le point d’interrogation clignotant signifie généralement que l’ordinateur ne parvient pas à localiser le logiciel système sur le disque dur interne ou sur tout disque externe relié à l’ordinateur.  Patientez quelques secondes. Si l’ordinateur ne démarre pas de suite, éteignez-le en maintenant le bouton d’alimentation (®) enfoncé pendant 8 à 10 secondes. Débranchez tous les périphériques externes puis tentez de redémarrer l’ordinateur en appuyant sur le bouton d’alimentation (®) tout en maintenant la touche Option enfoncée. Lorsque votre ordinateur démarre, cliquez sur l’icône du disque dur, puis sur la flèche droite. Une fois que l’ordinateur a démarré, ouvrez Préférences Système et cliquez sur Démarrage. Sélectionnez un dossier Système local de Mac OS X.  Si cela ne donne pas de résultats, tentez de réparer le disque à l’aide d’Utilitaire de disque :  Insérez le CD « Mac OS X Install Disc 1 » dans votre ordinateur.  Redémarrez ensuite votre ordinateur en maintenant la touche C enfoncée lors du démarrage.  Choisissez Installation > Ouvrir Utilitaire de disque. Lorsque Utilitaire de disque s’ouvre, suivez les instructions de la sous-fenêtre S.O.S pour savoir s’il est en mesure de réparer le disque.Chapitre 4 À tout problème sa solution 49 Si Utilitaire de disque ne résout pas le problème, vous devrez peut-être réinstaller le logiciel système de votre ordinateur. Consultez « Réinstallation des logiciels fournis avec votre MacBook » à la page 56. Si votre MacBook ne s’allume ou ne démarre pas Tentez les opérations suivantes dans l’ordre jusqu’à ce que votre ordinateur s’allume :  Assurez-vous que l’adaptateur secteur est connecté à l’ordinateur et branché sur une prise de courant en état de marche. Veillez à utiliser l’adaptateur secteur MagSafe 60 W fourni avec le MacBook. Si l’adaptateur secteur ne recharge plus l’ordinateur et que la lampe témoin de l’adaptateur secteur ne s’allume pas lorsque vous branchez le câble d’alimentation, essayez de le débrancher puis de le brancher à nouveau afin de le positionner correctement.  Vérifiez si votre batterie a besoin d’être rechargée. Appuyez sur le petit bouton situé sur la batterie. Vous devriez voir apparaître un à quatre voyants indiquant le niveau de charge de la batterie. Si une seule lampe témoin de niveau de la batterie clignote, branchez l’adaptateur secteur pour charger la batterie jusqu’à ce qu’au moins cette lampe témoin reste allumée en permanence.  Si le problème persiste, rétablissez les réglages par défaut de l’ordinateur en débranchant l’adaptateur secteur, en retirant la batterie et en maintenant le bouton d’alimentation (®) enfoncé pendant au moins 5 secondes.  Si vous avez récemment ajouté de la mémoire, assurez-vous qu’elle est correctement installée et compatible avec votre ordinateur. Vérifiez si le retrait de cette mémoire et la remise en place de l’ancienne permet à l’ordinateur de démarrer (consultez la section « Installation de la mémoire » à la page 39). 50 Chapitre 4 À tout problème sa solution  Pour réinitialiser la PRAM, appuyez sur le bouton d’alimentation (®) et maintenez immédiatement les touches Commande (x), Option, P et R enfoncées jusqu’à ce que vous entendiez une deuxième fois le signal sonore de démarrage.  Si vous ne parvenez toujours pas à démarrer le MacBook, consultez la section « Informations, services et assistance » à la page 58 qui contient les informations nécessaires pour prendre contact avec Apple. Si l’écran devient subitement noir ou que votre MacBook se bloque Essayez de redémarrer votre MacBook. 1 Débranchez tout périphérique connecté à votre MacBook excepté l’adaptateur secteur. 2 Appuyez sur le bouton d’alimentation (®) pour redémarrer le système. 3 Le niveau de charge de la batterie doit atteindre au moins 10 pour cent avant la connexion d’un périphérique et la reprise du travail. Pour vérifier le niveau de charge de la batterie, observez l’icône d’état de la batterie ( ) située dans la barre des menus. Le moniteur pourrait également s’assombrir si les fonctions d’économie d’énergie de la batterie sont en place. Si vous avez oublié votre mot de passe Vous pouvez réinitialiser votre mot de passe d’administrateur et les mots de passe de tous les autres comptes. 1 Insérez le CD « Mac OS X Install Disc 1 ». Redémarrez ensuite votre ordinateur et maintenez la touche C enfoncée pendant le démarrage. 2 Dans la barre des menus, choisissez Utilitaires > Réinitialiser le mot de passe. Suivez les instructions à l’écran.Chapitre 4 À tout problème sa solution 51 En cas de problème à l’éjection d’un disque  Fermez toutes les applications susceptibles d’utiliser le disque et essayez à nouveau.  Si cela ne donne pas de résultats, redémarrez l’ordinateur tout en maintenant le bouton du trackpad enfoncé. Utilisation d’Apple Hardware Test Si vous pensez qu’il y a un problème avec les composants matériels du MacBook, vous pouvez utiliser l’application Apple Hardware Test pour savoir si tel est le cas (les composants affectés peuvent être la mémoire ou le processeur, par exemple). Pour utiliser Apple Hardware Test : 1 Déconnectez tous les périphériques externes de votre ordinateur, sauf l’adaptateur secteur. Si un câble Ethernet est connecté, déconnectez-le. 2 Insérez le CD « Mac OS X Install Disc 1 » livré avec votre ordinateur. 3 Redémarrez ensuite votre ordinateur en maintenant la touche D enfoncée lors du démarrage. 4 Lorsque l’écran principal d’Apple Hardware Test s’affiche, suivez les instructions à l’écran. 5 En cas de détection d’un problème, Apple Hardware Test affiche un code d’erreur. Notez le code d’erreur avant d’entreprendre les démarches d’assistance. Si Apple Hardware Test ne détecte pas de panne matérielle, il est probable que le problème soit lié aux logiciels. Pour en savoir plus sur Apple Hardware Test, consultez le fichier « À propos d’AHT » sur le disque « Mac OS X Install Disc 1 ».52 Chapitre 4 À tout problème sa solution Problèmes de connexion à Internet Le MacBook est équipé de l’application Assistant réglages, destinée à vous aider à configurer une connexion à Internet. Ouvrez Préférences Système, puis cliquez sur Réseau. Cliquez sur le bouton « Assistant » pour ouvrir Assistant réglages de réseau. En cas de problèmes avec votre connexion à Internet, vous pouvez essayer les méthodes proposées dans cette rubrique en commençant par Diagnostic réseau. Pour utiliser Diagnostic réseau : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur Réseau puis cliquez sur « Assistant ». 3 Cliquez sur Diagnostic pour lancer Diagnostic réseau. 4 Suivez les instructions à l’écran. Si Diagnostic réseau n’est pas en mesure de résoudre le problème, celui-ci se situe peut-être au niveau du fournisseur d’accès à Internet auquel vous essayez de vous connecter, du périphérique externe utilisé pour la connexion au fournisseur d’accès à Internet ou du serveur auquel vous essayez d’accéder. Vous pouvez également tenter de réaliser les opérations suivantes. Connexions à Internet par modem câble, ligne DSL et réseau local (LAN) Assurez-vous que tous les câbles du modem sont correctement branchés. Vérifiez le câble d’alimentation du modem, le câble reliant le modem à l’ordinateur et celui reliant le modem à la prise secteur. Vérifiez également les câbles et les sources d’alimentation de vos routeurs et concentrateurs Ethernet. Chapitre 4 À tout problème sa solution 53 Éteignez, puis rallumez le modem afin de réinitialiser le matériel du modem. Éteignez le modem câble ou DSL, puis rallumez-le après quelques minutes. Certains fournisseurs d’accès à Internet conseillent de débrancher le câble d’alimentation du modem. Si votre modem dispose d’un bouton de réinitialisation, vous pouvez l’actionner avant ou après avoir éteint puis rallumé le modem. Important : les instructions relatives aux modems ne concernent pas les utilisateurs de réseau LAN. Contrairement aux utilisateurs de modems câble et DSL, les utilisateurs de réseau LAN peuvent disposer de concentrateurs, commutateurs, routeurs et autres blocs de connexion. Ils doivent faire appel à leur administrateur réseau plutôt qu’à un FAI. Connexions PPPoE Si vous ne parvenez pas à vous connecter à votre fournisseur d’accès à Internet via PPPoE, assurez-vous que les informations que vous avez saisies dans les préférences Réseau sont correctes. Pour vérifier les réglages des Préférences Réseau : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur Réseau. 3 Dans le menu local Afficher, sélectionnez Configurations de ports réseau. 4 Sélectionnez Ethernet intégré, puis faites glisser cette configuration en haut de la liste des configurations de ports. 5 Dans le menu local Afficher, sélectionnez Ethernet intégré. 6 Cliquez sur PPPoE. 7 Sélectionnez Se connecter via PPPoE.54 Chapitre 4 À tout problème sa solution 8 Vérifiez le champ Nom de compte pour vous assurer que vous avez correctement saisi les informations fournies par votre fournisseur d’accès à Internet. 9 Si vous avez choisi d’enregistrer votre mot de passe, tapez-le à nouveau afin d’être sûr qu’il est correct. 10 Cliquez sur TCP/IP. Assurez-vous d’avoir saisi dans cette sous-fenêtre les informations correctes fournies par votre fournisseur d’accès à Internet. 11 Cliquez sur Appliquer. Connexions au réseau Assurez-vous que le câble Ethernet est branché sur le MacBook et sur le réseau. Vérifiez les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet. Si vous disposez de plusieurs ordinateurs partageant une connexion à Internet, assurez-vous que votre réseau est correctement configuré. Vous devez savoir si votre FAI fournit une seule ou plusieurs adresses IP, autrement dit, une pour chaque ordinateur. Si une seule adresse IP est fournie, vous devez disposer d’un routeur capable de partager la connexion ; on parle alors de conversion d’adresse réseau (NAT) ou de masquage d’adresses IP. Pour obtenir des informations sur la configuration, consultez la documentation fournie avec votre routeur ou contactez la personne qui a configuré votre réseau. Vous pouvez utiliser une borne d’accès AirPort pour partager une adresse IP unique entre plusieurs ordinateurs. Pour obtenir plus d’informations sur l’utilisation d’une borne d’accès AirPort, consultez l’Aide Mac ou rendez-vous sur le site web AirPort d’Apple, à l’adresse www.apple.com/fr/support/airport. Si ces méthodes s’avèrent insuffisantes pour résoudre les problèmes rencontrés, adressez-vous à votre fournisseur d’accès à Internet ou à votre administrateur réseau.Chapitre 4 À tout problème sa solution 55 Problèmes de communication sans fil avec AirPort Extreme En cas de problèmes avec les communications sans fil AirPort Extreme :  Vérifiez que l’ordinateur ou le réseau auquel vous souhaitez vous connecter est activé et dispose d’un point d’accès sans fil.  Assurez-vous que le logiciel est correctement configuré conformément aux instructions incluses avec votre borne d’accès ou point d‘accès.  Assurez-vous que l’autre ordinateur ou le point d’accès au réseau se trouve dans la zone de couverture de l’antenne de votre ordinateur. Des appareils électroniques ou des structures métalliques se trouvant à proximité peuvent interférer avec les communications sans fil et réduire la portée de votre antenne. Vous pouvez éventuellement améliorer la réception en tournant et en réorientant l’ordinateur.  Vérifiez le menu d’état AirPort (Z) dans la barre des menus. Jusqu’à quatre barres de mesure apparaissent pour afficher la puissance du signal. Si l’intensité du signal est faible, tentez de déplacer l’appareil.  Pour plus d’informations, consultez l’Aide AirPort (choisissez Aide > Aide Mac, puis Bibliothèque > Aide AirPort dans la barre des menus) ainsi que les instructions fournies avec votre appareil sans fil.56 Chapitre 4 À tout problème sa solution Maintien à jour de vos logiciels Vous pouvez vous connecter à Internet pour télécharger et installer automatiquement les dernières versions de logiciels, gestionnaires et autres améliorations fournies par Apple. Chaque fois que vous vous connectez à Internet, « Mise à jour de logiciels » consulte les serveurs Internet d’Apple pour rechercher les mises à jour disponibles pour votre ordinateur. Vous pouvez configurer le MacBook afin qu’il lance régulièrement des recherches sur les serveurs Apple, puis qu’il télécharge et installe les mises à jour de logiciels trouvées. Pour rechercher des logiciels mis à jour : 1 Ouvrez les Préférences Système. 2 Cliquez sur l’icône « Mise à jour de logiciels » et suivez les instructions à l’écran.  Pour plus d’informations, recherchez « Mise à jour de logiciels » dans l’Aide Mac.  Pour obtenir les toutes dernières informations sur Mac OS X, rendez-vous à l’adresse www.apple.com/fr/macosx. Réinstallation des logiciels fournis avec votre MacBook Les disques d’installation de logiciels fournis avec votre ordinateur permettent de réinstaller Mac OS X et les applications livrées avec votre ordinateur. Important : Apple vous recommande de sauvegarder les données de votre disque dur avant de procéder à la restauration du logiciel. Apple décline toute responsabilité en cas de perte de données.Chapitre 4 À tout problème sa solution 57 Installation de Mac OS X et des applications Pour installer Mac OS X et les applications qui accompagnent votre ordinateur : 1 Sauvegardez vos fichiers essentiels. Nous vous conseillons de sauvegarder vos fichiers essentiels avant d’installer Mac OS X et d’autres applications car l’option Effacer et installer efface les données du disque dur. 2 Assurez-vous que l’adaptateur secteur est correctement branché. 3 Insérez le CD « Mac OS X Install Disc 1 » livré avec votre ordinateur. 4 Double-cliquez sur « Install Mac OS X and Bundled Software ». Pour n’installer que les applications fournies avec l’ordinateur, double-cliquez sur « Install Bundled Software Only ». Remarque : pour installer iCal, iChat AV, iSync, iTunes, Safari et les applications iLife, double-cliquez sur « Install Mac OS X and Bundled Software ». 5 Suivez les instructions à l’écran. 6 Après avoir sélectionné le volume de destination pour l’installation, suivez les instructions à l’écran. Il se peut que votre ordinateur redémarre et vous invite à insérer le disque d’installation Mac OS X suivant. Remarque : pour rétablir les réglages d’origine de Mac OS X sur votre ordinateur, cliquez sur Options dans la fenêtre « Sélectionner une destination » du programme d’installation, puis choisissez Effacer et installer. 58 Chapitre 4 À tout problème sa solution Informations, services et assistance L’utilisateur ne peut remplacer aucune pièce du MacBook, excepté la mémoire. Si vous avez besoin de services de réparation, adressez-vous à Apple ou portez votre MacBook chez un fournisseur de services agréé Apple. Vous trouverez de plus amples informations sur le MacBook en ligne, dans l’aide à l’écran, dans Informations Système et via Apple Hardware Test. Informations en ligne Pour obtenir des informations en ligne sur le service et l’assistance, rendez-vous sur www.apple.com/fr/support. Choisissez votre pays dans le menu local. Vous pouvez faire des recherches dans la base de données AppleCare Knowledge Base, vérifiez si de nouvelles mises à jour de logiciels sont disponibles ou obtenir de l’aide dans les forums de discussion Apple. Aide à l’écran Vous trouverez bien souvent des réponses à vos questions ainsi que des instructions et des informations concernant le dépannage dans l’Aide Mac. Choisissez Aide > Aide Mac. Informations Système Pour obtenir des informations sur le MacBook, servez-vous d’Informations Système. Cette application vous fournit la liste des composants matériels et des logiciels installés, le numéro de série et de version du système d’exploitation, la quantité de mémoire installée, etc. Pour ouvrir Informations Système, choisissez le menu Pomme () > « À propos de ce Mac » dans la barre des menus, puis cliquez sur Plus d’infos.Chapitre 4 À tout problème sa solution 59 Service et assistance AppleCare Le MacBook est fourni avec 90 jours d’assistance technique et 1 an de couverture sur les, réparations de matériel effectuées dans les magasins Apple Store ou les centres de réparations agréés Apple, tels que les fournisseurs de services agréés Apple. Vous avez la possibilité d’étendre la durée de cette couverture en adhérant à un programme AppleCare Protection Plan. Pour en savoir plus, rendez-vous sur www.apple.com/fr/support/products ou bien visitez le site web de votre pays (dans la liste ci-dessous). Si vous avez besoin d’assistance, le personnel d’assistance par téléphone AppleCare peut vous aider à installer et à ouvrir les applications et offre des services de dépannage élémentaires. Appelez le centre d’assistance le plus proche de chez vous (gratuit pendant les 90 premiers jours). Gardez la date d’achat et le numéro de série de votre MacBook à portée de main lorsque vous appelez. Remarque : la période de 90 jours d’assistance gratuite par téléphone débute à la date d’achat. Des frais téléphoniques peuvent éventuellement s’appliquer. Pays Téléphone Site web Allemagne (49) 01805 009 433 www.apple.com/de/support Autriche (43) 0810 300 427 www.apple.com/at/support Belgique (flamand) (français) (32) 070 700 772 (32) 070 700 773 www.apple.com/benl/support www.apple.com/befr/support France (33) 0825 888 024 www.apple.com/fr/support Luxembourg (352) 800 24550 www.apple.com/befr/support Suisse (français) (allemand) (41) 0848 000 132 (41) 0848 000 132 www.apple.com/chfr/support www.apple.com/chde/support60 Chapitre 4 À tout problème sa solution Les numéros de téléphone sont susceptibles d’être modifiés. Les tarifs téléphoniques locaux et nationaux peuvent s’appliquer. Une liste complète est disponible sur Internet. Localisation du numéro de série de votre produit Utilisez l’une des méthodes suivantes pour trouver le numéro de série de votre ordinateur :  Choisissez Apple () > À propos de ce Mac puis cliquez sur le numéro de version, en dessous des mots « Mac OS X ». Cliquez à cet endroit de façon répétitive pour afficher l’un après l’autre la version de Mac OS X, le numéro de sous-version et le numéro de série.  Ouvrez Informations Système (dans /Applications/Utilitaires/), et cliquez sur Matériel.  Retirez la batterie. Le numéro de série de votre MacBook se trouve dans la baie de la batterie. Pour en savoir plus sur l’extraction de la batterie, consultez la section page 37 . www.apple.com/contact/phone_contacts.html www.apple.com/contact/phone_contacts.html5 5Dernières recommandations www.apple.com/fr/environment Aide Mac ergonomie62 Chapitre 5 Dernières recommandations Afin d’assurer votre sécurité et de préserver votre matériel, veillez à observer ces consignes concernant le nettoyage et la manipulation de votre MacBook ainsi que l’aménagement d’un espace de travail confortable. Gardez ces instructions dans un endroit facile d’accès pour vous et pour les utilisateurs éventuels. Informations importantes concernant la sécurité Utilisation près de l’eau et dans des endroits humides Évitez de placer votre ordinateur à proximité d’un évier, d’un lavabo, d’une baignoire ou d’une douche, par exemple. Protégez votre ordinateur de l’humidité et des intempéries (neige, pluie, brouillard par exemple). Manipulation du MacBook Installez le MacBook sur un plan de travail stable qui laisse convenablement circuler l’air sous l’ordinateur et autour de celui-ci. N’utilisez pas le MacBook en le posant sur un coussin ou tout autre objet de structure non solide car cela pourrait empêcher les conduits d’aération de fonctionner correctement. Évitez également de placer des objets sur le clavier lorsque vous utilisez l’ordinateur. N’introduisez jamais d’objets d’aucune sorte dans les ouvertures servant à la ventilation. La partie inférieure du MacBook peut chauffer au cours d’une utilisation normale de l’appareil. S’il est posé sur vos genoux et que la chaleur qu’il émane vous gêne, posezle plutôt sur un plan de travail stable. AVERTISSEMENT : ne pas suivre ces consignes pourrait déclencher un feu, occasionner des décharges électriques ou entraîner tout type de blessure ou dommage.Chapitre 5 Dernières recommandations 63 Utilisation de l’adaptateur secteur MagSafe 60 W Veillez à ce que la fiche secteur ou le câble d’alimentation secteur soit totalement inséré dans l’adaptateur secteur avant de le brancher sur une prise de courant. N’utilisez que l’adaptateur secteur qui accompagne le MacBook ou, au besoin, un adaptateur secteur agréé Apple compatible avec ce produit. L’adaptateur secteur peut chauffer au cours d’une utilisation normale de l’appareil. Branchez toujours l’adaptateur secteur directement sur la prise de courant ou posez-le par terre, dans un endroit correctement aéré. Débranchez l’adaptateur secteur, retirez la batterie et débranchez tous les autres câbles si l’un des cas suivants se présente :  Vous souhaitez ajouter de la mémoire.  Vous souhaitez nettoyer le boîtier (pour ce faire, suivez à la lettre les instructions fournies à la page 66).  La prise ou le câble d’alimentation est endommagé.  Le MacBook ou l’adaptateur secteur est exposé à la pluie ou à une humidité excessive, ou du liquide a été versé dans le boîtier.  Le MacBook ou l’adaptateur secteur a subi une chute, le boîtier a été endommagé ou vous pensez qu’une réparation est nécessaire. Le port secteur MagSafe contient un aimant qui peut effacer les données d’une carte de crédit, d’un iPod ou d’autres appareils. Pour protéger vos données, ne placez pas de matériaux ou d’appareils à sensibilité magnétique (comme ceux cités précédemment ou autres) à moins de 25 mm de ce port. Si des résidus quelconques se trouvent dans le port secteur MagSafe, enlevez-les doucement à l’aide d’un bâtonnet de coton.64 Chapitre 5 Dernières recommandations Manipulation de la batterie Évitez de la faire tomber, de la démonter, de l’écraser, de la brûler ou de l’exposer à des températures supérieures à 100° C. N’utilisez plus la batterie si elle est endommagée de quelque façon que ce soit. Ne remplacez la batterie que par une batterie certifiée par Apple pour ce produit. Éliminez rapidement les batteries usagées conformément aux directives d’environnement locales en vigueur. Prévention de la diminution de l’acuité auditive Vous risquez une perte d’audition irréparable si vous utilisez un casque ou des écouteurs à volume sonore élevé. L’oreille peut s’adapter petit à petit à des volumes sonores de plus en plus élevés qui peuvent sembler normaux, mais qui risquent à la longue d’endommager votre système auditif. En cas de sifflements ou de perte d’acuité auditive, arrêtez d’utiliser le casque ou les écouteurs et consultez un médecin. Plus le volume est élevé, plus votre audition risque d’être affectée rapidement. Pour protéger votre système auditif, les spécialistes conseillent de prendre les mesures suivantes :  Limitez la durée d’utilisation à volume élevé de vos écouteurs ou de votre casque d’écoute.  Évitez d’augmenter le volume afin de bloquer les bruits environnants.  Baissez le volume si vous ne parvenez pas à entendre une personne qui parle à côté de vous. Activités à haut risque Cet ordinateur n’est pas conçu pour être utilisé dans des installations nucléaires, pour la navigation ou la communication aérienne, pour le contrôle du trafic aérien, ni dans aucune autre situation où une panne du système informatique pourrait entraîner la mort, des blessures ou de graves dommages écologiques.Chapitre 5 Dernières recommandations 65 Informations concernant le laser pour lecteurs optiques Le lecteur optique de votre ordinateur contient un laser qui est entièrement sans danger si l’on en fait un usage normal mais qui peut s’avérer dangereux pour les yeux s’il est démonté. Afin d’assurer votre sécurité, ce dispositif ne doit être réparé que par un fournisseur de services agréé Apple. Informations importantes sur la manipulation Mise sous tension de votre MacBook N’allumez jamais le MacBook tant que tous ses composants internes ou externes ne sont pas en place. L’utilisation de l’ordinateur alors que certains composants manquent peut s’avérer dangereuse et risque de l’endommager. Transport du MacBook Si vous transportez le MacBook dans un sac ou dans un attaché- case, assurez-vous que ce dernier ne contient pas d’objets non attachés (des trombones ou des pièces de monnaie, par exemple) qui pourraient pénétrer accidentellement dans l’ordinateur par une ouverture (comme la fente du lecteur optique) ou se coincer à l’inté- rieur d’un port. Maintenez également à l’écart du port secteur MagSafe tout objet à sensibilité magnétique. AVERTISSEMENT : la mise en place de réglages ou la réalisation d’opérations qui ne sont pas spécifiés dans le manuel de votre appareil risque de vous exposer à des rayonnements dangereux. AVIS : ne pas suivre les présentes instructions sur la manipulation peut provoquer des dommages à votre MacBook ou à d’autres objets.66 Chapitre 5 Dernières recommandations Utilisation des connecteurs et des ports Ne forcez jamais un connecteur à entrer dans un port. Lorsque vous branchez un appareil, assurez-vous que le port ne contient aucun résidu quelconque, que le connecteur correspond bien au port et qu’il est placé de manière à entrer correctement dans le port. Utilisation du lecteur optique Le lecteur optique du MacBook prend en charge les disques de 12 cm. Les disques de forme irrégulière et de moins de 12 cm ne peuvent pas être lus. Stockage du MacBook Si vous décidez de ranger le MacBook pendant une longue période, placez-le dans un endroit frais (idéalement, à 22° C) et déchargez la batterie jusqu’à 50 pour cent. Avant de ranger votre ordinateur pour une période de temps supérieure à cinq mois, déchargez la batterie jusqu’à environ 50 pour cent, puis retirezla du MacBook. Pour conserver les capacités de la batterie, rechargez la batterie jusqu’à 50 pour cent tous les six mois environ. Nettoyage du MacBook Lorsque vous nettoyez le boîtier du MacBook et ses composants, éteignez l’ordinateur, débranchez l’adaptateur secteur et retirez la batterie. Puis, pour nettoyer le boîtier de l’ordinateur, utilisez un chiffon doux, humide et non pelucheux. Évitez les infiltrations d’humidité par quelque ouverture que ce soit. Ne vaporisez jamais de liquide directement sur l’ordinateur. N’utilisez ni aérosols, ni dissolvants, ni abrasifs qui pourraient endommager les finitions de l’appareil. Nettoyage de l’écran du MacBook Pour nettoyer l’écran du MacBook, éteignez tout d’abord votre MacBook, débranchez l’adaptateur secteur, puis retirez la batterie. Humidifiez ensuite, à l’eau seulement, un chiffon propre, doux et non pelucheux et essuyez l’écran. Ne vaporisez jamais de liquide directement sur l’écran.Chapitre 5 Dernières recommandations 67 Ergonomie Voici quelques conseils pour la mise en place d’un environnement de travail sain. Clavier et trackpad Lorsque vous tapez au clavier ou que vous vous servez du trackpad, vos épaules doivent être détendues. Le bras et l’avant-bras doivent former un angle droit, la main étant placée dans le prolongement du poignet. Position à éviter Position recommandée68 Chapitre 5 Dernières recommandations Vous devez avoir les mains et les doigts détendus lorsque vous tapez au clavier ou que vous utilisez le trackpad. Évitez de replier les pouces à l’intérieur des paumes. Modifiez fréquemment la position de vos mains pour éviter la fatigue. Après un travail continu et intensif sur ordinateur, certains utilisateurs peuvent ressentir des douleurs aux mains, aux poignets ou aux bras. Si ces douleurs persistent, consultez un spécialiste. Souris externe Si vous utilisez une souris externe, veillez à ce qu’elle se trouve à hauteur du clavier. Ménagez un espace suffisant pour la manipuler avec aisance. Siège Optez pour un siège de bureau réglable et offrant un dossier et une assise confortables. Réglez la hauteur du siège de telle sorte que vos cuisses reposent à l’horizontale et vos pieds à plat sur le sol. Le dossier du siège doit soutenir votre région lombaire, c’est-à-dire la partie inférieure de votre dos. Suivez les instructions du fabricant de sorte que le réglage du dossier soit parfaitement adapté à votre morphologie. Position à éviter Position recommandéeChapitre 5 Dernières recommandations 69 Au besoin, relevez le siège de manière à ce que vos avant-bras et vos mains soient placés correctement par rapport au clavier. Si, dans ce cas, vos pieds ne reposent plus à plat sur le sol, utilisez un repose-pied inclinable et réglable en hauteur. Si vous disposez d’un bureau modulaire, vous pouvez abaisser le niveau du plan de travail pour éviter l’emploi d’un repose-pied. Une troisième solution consiste à utiliser un bureau dont le clavier est situé plus bas que le plan de travail. Écran intégré Orientez l’écran de manière à réduire le plus possible les reflets de l’éclairage électrique et de la lumière du jour. Ne forcez pas l’écran si vous rencontrez une résistance. L’angle d’ouverture maximal de l’écran ne peut dépasser 130 degrés. Réglez la luminosité et le contraste de l’écran chaque fois que vous déplacez l’ordinateur ou que l’éclairage ambiant change. Vous trouverez d’autres informations concernant l’ergonomie sur Internet : Apple et l’environnement Apple Inc. reconnaît sa responsabilité en matière de réduction de l’impact de ses produits et de ses activités sur l’environnement. Des informations supplémentaires sont disponibles sur Internet : www.apple.com/about/ergonomics www.apple.com/fr/environment71 Regulatory Compliance Information FCC Compliance Statement This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. See instructions if interference to radio or television reception is suspected. L‘utilisation de ce dispositif est autorisée seulement aux conditions suivantes : (1) il ne doit pas produire de brouillage et (2) l’utilisateur du dispositif doit être prêt à accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. Radio and Television Interference This computer equipment generates, uses, and can radiate radio-frequency energy. If it is not installed and used properly—that is, in strict accordance with Apple’s instructions—it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in Part 15 of FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. You can determine whether your computer system is causing interference by turning it off. If the interference stops, it was probably caused by the computer or one of the peripheral devices. If your computer system does cause interference to radio or television reception, try to correct the interference by using one or more of the following measures :  Turn the television or radio antenna until the interference stops.  Move the computer to one side or the other of the television or radio.  Move the computer farther away from the television or radio.  Plug the computer in to an outlet that is on a different circuit from the television or radio. (That is, make certain the computer and the television or radio are on circuits controlled by different circuit breakers or fuses.) If necessary, consult an Apple-authorized service provider or Apple. See the service and support information that came with your Apple product. Or, consult an experienced radio/television technician for additional suggestions. Important: changes or modifications to this product not authorized by Apple Inc., could void the EMC compliance and negate your authority to operate the product. This product has demonstrated EMC compliance under conditions that included the use of compliant peripheral devices and shielded cables (including Ethernet network cables) between system components. It is important that you use compliant peripheral devices and shielded cables between system components to reduce the possibility of causing interference to radios, television sets, and other electronic devices.72 Responsible party (contact for FCC matters only): Apple Inc. Product Compliance, 1 Infinite Loop M/S 26-A, Cupertino, CA 95014-2084, 408-974-2000. Wireless Radio Use This device is restricted to indoor use when operating in the 5.15 to 5.25 GHz frequency band. Cet appareil doit être utilisé à l’intérieur. Exposure to Radio Frequency Energy The radiated output power of the AirPort Extreme technology is below the FCC radio frequency exposure limits. Nevertheless, it is advised to use the wireless equipment in such a manner that the potential for human contact during normal operation is minimized. FCC Bluetooth Wireless Compliance The antenna used with this transmitter must not be collocated or operated in conjunction with any other antenna or transmitter subject to the conditions of the FCC Grant. Bluetooth Industry Canada Statement This Class B device meets all requirements of the Canadian interference-causing equipment regulations. Cet appareil numérique de la Classe B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. Industry Canada Statement Complies with the Canadian ICES-003 Class B specifications. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. This device complies with RSS 210 of Industry Canada. Bluetooth Europe—EU Declaration of Conformity This wireless device complies with the specifications EN 300 328, EN 301-489, and EN 60950 following the provisions of the R&TTE Directive. Europe : déclaration de conformité EU The equipment complies with the RF Exposure Requirement 1999/519/EC, Council Recommendation of 12 July 1999 on the limitation of exposure of the general public to electromagnetic fields (0 Hz to 300 GHz). This equipment meets the following conformance standards: EN300 328, EN301 893, EN301 489-17, EN60950 Par la présente Apple Inc. déclare que l’appareil 802.11a/b/g Mini-PCIe card est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive. Complies with European Directives 72/23/EEC, 89/336/EEC, 1999/5/EC See http://www.apple.com/euro/compliance Korea Statements Singapore Wireless Certification73 Taiwan Wireless Statements Taiwan Class B Statement VCCI Class B Statement Russia Informations sur les modems USB Si vous connectez votre MacBook à une ligne téléphonique par le biais d’un modem USB externe, veuillez vous reporter aux informations fournies par l’agence de télécommunications mentionnées dans la documentation livrée avec votre modem. ENERGY STAR® Compliance As an ENERGY STAR® partner, Apple has determined that standard configurations of this product meet the ENERGY STAR® guidelines for energy efficiency. The ENERGY STAR® program is a partnership with electronic equipment manufacturers to promote energy-efficient products. Reducing energy consumption of products saves money and helps conserve valuable resources. This computer is shipped with power management enabled with the computer set to sleep after 10 minutes of user inactivity. To wake your computer, click the mouse or trackpad button or press any key on the keyboard. For more information about ENERGY STAR®, visit: www.energystar.gov74 Informations sur l’élimination et le recyclage Ce symbole indique que vous devez suivre les normes et la législation de votre pays pour jeter ce produit. La lampe de rétro-éclairage de cet appareil contient du mercure, vous ne pouvez donc pas le mélanger avec les ordures ménagères. Lorsque ce produit n’est plus utilisable, contactez Apple ou les autorités locales pour en savoir plus sur les possibilités de recyclage. Pour en savoir plus sur le programme de recyclage d’Apple, consultez le site www.apple.com/fr/environment/recycling/. Informations sur l’enlèvement de la batterie Jetez vos batteries usagées en respectant les lois et les consignes environnementales de votre pays. California: The coin cell battery in your product contains perchlorates. Special handling and disposal may apply. Refer to www.dtsc.ca.gov/hazardouswaste/perchlorate. Deutschland: Dieses Gerät enthält Batterien. Bitte nicht in den Hausmüll werfen. Entsorgen Sie dieses Gerätes am Ende seines Lebenszyklus entsprechend der maßgeblichen gesetzlichen Regelungen. Nederlands: Gebruikte batterijen kunnen worden ingeleverd bij de chemokar of in een speciale batterijcontainer voor klein chemisch afval (kca) worden gedeponeerd.75 Taïwan: Union européenne—instructions concernant l’élimination des déchets : Le symbole ci-dessus signifie que vous devez vous débarrasser de votre produit sans le mélanger avec les ordures ménagères, selon les normes et la législation de votre pays. Lorsque ce produit n’est plus utilisable, portezle dans un centre de traitement des déchets agréé par les autorités locales. Certains centres acceptent les produits gratuitement. Le traitement et le recyclage séparé de votre produit lors de son élimination aideront à préserver les ressources naturelles et à protéger l’environnement et la santé des êtres humains.K Apple Inc. © 2007 Apple Inc. Tous droits réservés. En application des lois et conventions en vigueur, aucune reproduction totale ni partielle du manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Tout a été mis en œuvre pour que les informations pré- sentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression. Apple 1 Infinite Loop Cupertino, CA 95014-2084 408-996-1010 www.apple.com Apple, le logo Apple, AirPort, AirPort Extreme, Exposé, FileVault, FireWire, iCal, iLife, iMovie, iPhoto, iPod, iSight, iTunes, Keynote, Mac, MacBook, Macintosh, Mac OS et SuperDrive sont des marques d’Apple Inc. déposées aux États-Unis et dans d’autres pays. AirPort Express, Finder, le logo FireWire, MagSafe, Safari, Spotlight et Tiger sont des marques d’Apple Inc. AppleCare et Apple Store sont des marques de service d’Apple Inc. déposées aux États-Unis et dans d’autres pays. iTunes Store est une marque de service d’Apple Inc. ENERGY STAR® est une marque déposée aux États-Unis. Intel et Intel Core sont des marques d’Intel Corp. aux États-Unis et dans d’autres pays. La marque et les logos Bluetooth® sont la propriété de Bluetooth SIG, Inc. et sont utilisés sous licence par Apple Inc. Les autres noms de produits et de sociétés sont la propriété de leurs détenteurs respectifs. Les produits de tierce partie ne sont mentionnés que pour information, sans aucune intention de préconisation ni de recommandation. Apple décline toute responsabilité quant à l’utilisation et au fonctionnement de ces produits. Fabriqué sous licence de Dolby Laboratories. « Dolby », « Pro Logic » et le logo double-D sont des marques déposées de Dolby Laboratories. Travaux confidentiels inédits, © 1992–1997 Dolby Laboratories, Inc. Tous droits réservés. Le produit décrit dans le présent manuel intègre des technologies de protection de droits d’auteur ellesmêmes protégées par divers brevets américains ainsi que d’autres droits de propriété intellectuelle appartenant à Macrovision Corporation et à d’autres détenteurs. L’utilisation de ces technologies de protection des droits d’auteurs doit être autorisée par Macrovision Corporation et est destinée à un cadre privé ou de visualisation restreinte, sauf consentement de Macrovision Corporation. Tout démontage ou toute ingénierie inverse sont interdits. Réclamations concernant l’appareillage aux États-Unis. Brevets n˚ 4 631 603, 4 577 216, 4 819 098 et 4 907 093 sous licence à des fins de visualisation limitée uniquement. Publié simultanément aux États-Unis et au Canada. Félicitations, vous et votre MacBook Pro êtes faits l’un pour l’autre.Finder Parcourez le contenu de votre ordinateur à l’aide de Cover Flow. www.apple.com/fr/macosx Aide Mac finder Caméra iSight intégrée Réalisez des vidéoconférences avec 3 amis au maximum partout dans le monde et en temps réel. www.apple.com/fr/macbookpro Aide Mac isight Time Machine Sauvegardez automatiquement vos fichiers sur un disque dur externe. www.apple.com/fr/macosx Aide Mac time machineGarageBand Créez de la musique en ajoutant des musiciens sur une scène virtuelle. Améliorez vos chansons pour jouer comme un pro. Aide GarageBand enregistrement iWeb Créez de magnifiques sites web avec photos, films, blogs, podcasts et widgets web dynamiques. iPhoto Organisez toutes vos photos par événements. Publiez-les sur une galerie web en un seul clic. iMovie Rassemblez toutes vos vidéos dans une seule vidéothèque. Créez et partagez vos films en quelques minutes. Aide iMovie film www.apple.com/fr/ilife/imovie Aide Help photo www.apple.com/fr/ilife/iphoto www.apple.com/fr/ilife/garageband www.apple.com/fr/ilife/iweb Aide iWeb site webTable des matières 5 Table des matières Chapitre 1 : Prêt, feu, configurez ! 9 Contenu de la boîte 9 Configuration du MacBook Pro 16 Extinction ou suspension d’activité de votre MacBook Pro Chapitre 2 : Votre MacBook Pro au quotidien 22 Caractéristiques de base de votre MacBook Pro 24 Autres fonctionnalités de votre MacBook Pro 26 Fonctionnalités du clavier de votre MacBook Pro 28 Ports présents sur votre MacBook Pro 30 Utilisation du trackpad et du clavier 31 Utilisation de la batterie du MacBook Pro 33 Comment obtenir des réponses à vos doutes Chapitre 3 : Augmentez votre mémoire 39 Installation de mémoire supplémentaire 47 Reconnaissance de la nouvelle mémoire par le MacBook Pro6 Table des matières Chapitre 4 : À tout problème sa solution 50 Problèmes vous empêchant d’utiliser votre MacBook Pro 55 Utilisation d’Apple Hardware Test 56 Problèmes de connexion à Internet 59 Problèmes de communication sans fil avec AirPort Extreme 60 Maintien à jour de vos logiciels 61 Réinstallation des logiciels fournis avec le MacBook Pro 62 Informations, services et assistance 64 Localisation du numéro de série de votre produit Chapitre 5 : Dernières recommandations 66 Informations importantes concernant la sécurité 69 Informations importantes sur la manipulation 71 Ergonomie 73 Apple et l’environnement 75 Regulatory Compliance Information1 1Prêt, feu, configurez ! www.apple.com/fr/macbookpro Aide Mac Assistant Migration8 Chapitre 1 Prêt, feu, configurez ! Votre MacBook Pro est conçu pour pouvoir être configuré rapidement et utilisé immé- diatement. Si vous n’avez jamais utilisé de MacBook Pro ou si vous n’êtes pas familiarisé avec les ordinateurs Macintosh, vous trouverez dans ce chapitre des instructions qui vous aideront à débuter. Important : lisez attentivement toutes les instructions d’installation (et les consignes de sécurité débutant à la page 65) avant d’utiliser votre ordinateur pour la première fois. Si vous êtes un utilisateur expérimenté, peut-être êtes-vous déjà en mesure d’utiliser votre nouvel ordinateur. Veillez néanmoins à consulter les informations du chapitre 2, « Votre MacBook Pro au quotidien », pour découvrir les nouvelles fonctionnalités de cet MacBook Pro. Vous trouverez la plupart des réponses à vos questions dans l’Aide Mac. Pour en savoir plus sur l’accès à l’Aide Mac, consultez la rubrique « Comment obtenir des réponses à vos doutes » à la page 33. Comme Apple publie de temps à autres de nouvelles versions et mises à jour de ses logiciels système, il est possible que les images de ce manuel soient légèrement différentes de ce que vous voyez à l’écran. Certaines illustrations d’ordinateur peuvent être légèrement différentes selon le modèle de votre MacBook Pro. Important : retirez le film protecteur qui entoure l’adaptateur secteur MagSafe 85 W avant de configurer le MacBook Pro.Chapitre 1 Prêt, feu, configurez ! 9 Contenu de la boîte Configuration du MacBook Pro Le MacBook Pro est conçu pour être configuré rapidement et utilisé immédiatement. Les pages suivantes contiennent des informations qui vous guideront tout au long du processus de configuration, notamment des opérations suivantes :  Le branchement de l’adaptateur secteur MagSafe 85 W.  Le branchement des câbles et l’accès à un réseau.  La mise sous tension du MacBook Pro et l’utilisation du trackpad.  La configuration d’un compte d’utilisateur et d’autres paramètres via Assistant réglages. Câble secteur Télécommande Apple Remote Adaptateur DVI vers VGA ® MENU Adaptateur secteur MagSafe de 85 W10 Chapitre 1 Prêt, feu, configurez !  La configuration des préférences et du bureau Mac OS X. Étape 1 : Branchez l’adaptateur secteur MagSafe 85 W pour alimenter le MacBook Pro et recharger sa batterie. Assurez-vous que la fiche CA est complètement insérée dans l’adaptateur et que les broches de la fiche sont complètement déployées. Branchez la fiche CA de votre adaptateur sur une prise secteur, puis branchez le connecteur MagSafe sur le port secteur MagSafe. En approchant le connecteur MagSafe du port, vous ressentirez la force d’un aimant l’attirant. Pour rallonger le câble de l’adaptateur secteur, tirez d’abord sur la fiche CA pour la retirer de l’adaptateur. Connectez le câble d’alimentation secteur inclus à l’adaptateur, en vous assurant qu’il est fermement connecté. Branchez l’autre extrémité sur une prise de courant. Le câble d’alimentation secteur fournit une connexion avec mise à la terre. Lorsque vous déconnectez l’adaptateur secteur d’une prise de courant ou de l’ordinateur, débranchez la prise et non le câble. Connecteur MagSafe ¯ Port secteur MagSafe Câble secteur ? ® Fiche secteurChapitre 1 Prêt, feu, configurez ! 11 Remarque : la première fois que vous branchez l’adaptateur secteur sur le MacBook Pro, la lampe témoin du connecteur MagSafe s’illumine. Si la lumière est orange, la batterie est en cours de rechargement. Si elle est verte, la batterie est complètement rechargée ou n’est pas installée. Si vous ne voyez pas de lampe témoin, vérifiez que le connecteur est correctement branché. Étape 2 : Pour accéder à Internet ou à un réseau, branchez une extrémité du câble Ethernet sur le MacBook Pro et l’autre extrémité sur un modem câble, un modem DSL ou un réseau. Câble ® Ethernet ® Port Ethernet Gigabit (10/100/1000 Base-T) G12 Chapitre 1 Prêt, feu, configurez ! Pour une connexion commutée, vous aurez besoin d’un modem Apple USB Modem externe, disponible sur l’Apple Store en ligne à l’adresse www.apple.com/fr/store ou auprès des revendeurs agréés Apple. Branchez le modem Apple USB Modem sur un port USB du MacBook Pro, puis reliez le modem à une prise téléphonique à l’aide d’un câble téléphonique (non inclus). Remarque : votre MacBook Pro est également équipé de la technologie AirPort Extreme de mise en réseau sans fil. Pour en savoir plus sur la configuration d’une connexion sans fil, choisissez dans la barre des menus Aide > Aide Mac, puis recherchez « AirPort ». Consultez la rubrique « Comment obtenir des réponses à vos doutes » à la page 33. Chapitre 1 Prêt, feu, configurez ! 13 Étape 3 : Appuyez brièvement sur le bouton d’alimentation (®) pour allumer votre MacBook Pro. Votre ordinateur émet un signal sonore lorsque vous l’allumez. Le démarrage du MacBook Pro prend quelques instants. Après le démarrage, Assistant réglages s’ouvre automatiquement. Si le MacBook Pro ne s’allume pas, consultez la rubrique « Si votre MacBook Pro ne s’allume ou ne démarre pas » à la page 53. ® Trackpad Lampe témoin de suspension d’activité Bouton du trackpad ® Bouton d’alimentation14 Chapitre 1 Prêt, feu, configurez ! Étape 4 : Configurez votre MacBook Pro à l’aide d’Assistant réglages. La première fois que vous démarrez votre MacBook Pro, l’Assistant réglages se met en route. Il vous aide à saisir les informations de connexion à Internet et au courrier électronique ainsi qu’à configurer un compte d’utilisateur sur votre MacBook Pro. Si vous possédez déjà un ordinateur Macintosh, l’Assistant réglages peut vous aider à transfé- rer automatiquement les fichiers, les applications et d’autres informations de votre ancien ordinateur. Si vous ne comptez pas conserver ou utiliser votre autre Mac, il est préférable de lui retirer son autorisation à lire la musique, les clips vidéo ou les livres audio achetés sur l’iTunes Store. Le retrait de l’autorisation d’un ordinateur empêche la lecture par un tiers de tout morceau, vidéo ou livre audio acheté et permet de libérer l’autorisation afin qu’elle puisse être utilisée. Pour en savoir plus sur le retrait de l’autorisation d’accès, choisissez Aide iTunes dans le menu Aide de l’application iTunes. Si vous n’utilisez pas l’Assistant réglages pour transférer vos informations lors du premier démarrage de l’ordinateur, vous pouvez le faire ultérieurement. Allez dans le dossier Applications, ouvrez le dossier Utilitaires, puis double-cliquez sur Assistant migration. Chapitre 1 Prêt, feu, configurez ! 15 Étape 5 : Personnalisez le bureau Mac OS X et réglez les préférences. Barre des menus Dock Icône des Préférences Système Icône de recherche de Spotlight Menu Aide Icône du Finder16 Chapitre 1 Prêt, feu, configurez ! Grâce aux Préférences Système, vous pouvez donner à votre bureau l’apparence souhaitée sans perdre de temps. Choisissez le menu Pomme () > Préférences Système dans la barre des menus. À mesure que vous vous familiarisez avec votre ordinateur, explorez les Préférences Système, le centre de commandes de la plupart des réglages de votre MacBook Pro. Pour en savoir plus, ouvrez l’Aide Mac et recherchez « Préférences Système » ou la préférence que vous souhaitez modifier. Extinction ou suspension d’activité de votre MacBook Pro Lorsque vous avez terminé de travailler avec le MacBook Pro, suspendez son activité ou éteignez-le. Suspension de l’activité de votre MacBook Pro Suspendez l’activité de votre MacBook Pro si vous ne comptez vous en éloigner que quelques instants. Vous pourrez ensuite le réactiver rapidement sans avoir à le redémarrer. Pour suspendre l’activité de votre MacBook Pro, procédez de l’une des manières suivantes :  Rabattez l’écran.  Choisissez Pomme () > Suspendre l’activité, dans la barre des menus.  Appuyez sur le bouton d’alimentation (®) et cliquez sur Suspendre l’activité dans la zone de dialogue qui apparaît.  Choisissez le menu Pomme () > Préférences Système, cliquez sur Économiseur d’énergie et définissez un délai pour la minuterie de mise en veille.Chapitre 1 Prêt, feu, configurez ! 17  Maintenez enfoncé le bouton Lecture/Pause (’) de la télécommande Apple Remote pendant 3 secondes. Pour réactiver le MacBook Pro :  Si l’écran est fermé, il suffit de l’ouvrir pour réactiver le MacBook Pro.  Si l’écran est déjà ouvert, appuyez sur le bouton d’alimentation (®), sur l’une des touches du clavier ou sur l’un bouton de la télécommande Apple Remote. À la réactivation de votre MacBook Pro, vos applications, vos documents et vos réglages sont conservés tels que vous les aviez laissés. AVIS : patientez quelques secondes jusqu’à ce que la lampe témoin de suspension d’activité clignote (signalant que l’activité de l’ordinateur est suspendue et que le disque dur a cessé de tourner) avant de déplacer le MacBook Pro. Tout déplacement de votre ordinateur lorsque le disque dur est en train de tourner risque d’endommager ce dernier et d’entraîner une perte de données ou l’impossibilité de démarrer à partir du disque dur.18 Chapitre 1 Prêt, feu, configurez ! Extinction de votre MacBook Pro Si vous ne comptez pas utiliser votre MacBook Pro pendant un jour ou deux, il est pré- férable de l’éteindre. La lampe témoin de suspension d’activité reste allumée quelques instants au moment de l’extinction. Pour éteindre le MacBook Pro, procédez de l’une des manières suivantes : m Choisissez Pomme () > Éteindre, dans la barre des menus. m Appuyez sur le bouton d’alimentation (®) et cliquez sur Éteindre dans la zone de dialogue qui apparaît. Si vous comptez ranger votre MacBook Pro pour une durée prolongée, consultez la rubrique « Informations importantes sur la manipulation » à la page 69 afin d’obtenir des informations sur les mesures à prendre pour éviter que votre batterie ne se décharge complètement.2 2Votre MacBook Pro au quotidien www.apple.com/fr/macosx Aide Mac Mac OS XChapitre 2 Votre MacBook Pro au quotidien 21 Cette rubrique vous offre un aperçu des différentes parties et caractéristiques de votre MacBook Pro. Le site web d’Apple, à l’adresse www.apple.com/fr/, vous donne accès aux actualités Apple, à des téléchargements gratuits et des catalogues en ligne des logiciels et matériaux Apple destinés à votre MacBook Pro. Vous trouverez également les manuels de nombreux produits Apple, ainsi que l’assistance technique pour tous les produits Apple, sur le site web d’assistance Apple à l’adresse www.apple.com/fr/support.22 Chapitre 2 Votre MacBook Pro au quotidien Caractéristiques de base de votre MacBook Pro ® Bouton d’alimentation Lampe témoin de suspension d’activité Batterie (en dessous) Trackpad Bouton d'ouverture de l'écran Bouton du trackpad Lecteur optique à chargement par fente ®Chapitre 2 Votre MacBook Pro au quotidien 23 ® Bouton d’alimentation Permet d’allumer, d’éteindre ou de suspendre l’activité du MacBook Pro. Trackpad et bouton du trackpad Permet de déplacer le pointeur sur l’écran du MacBook Pro avec l’index ; inclut également une fonction de défilement en utilisant deux doigts sur le trackpad. Appuyez sur le bouton du trackpad pour cliquer ou double-cliquer. SuperDrive à chargement par fente Ce lecteur optique permet de lire et de graver des CD et DVD de taille standard. Bouton d’ouverture de l’écran Appuyez sur ce bouton pour ouvrir l’écran et le MacBook Pro. Lampe témoin de suspension d’activité Une lumière blanche clignote lorsque le MacBook Pro est en suspension d’activité. Batterie Utilisez le MacBook Pro en puisant l’énergie de la batterie lorsque vous n’êtes pas à proximité d’une prise de courant. 24 Chapitre 2 Votre MacBook Pro au quotidien Autres fonctionnalités de votre MacBook Pro ® Haut-parleurs stéréo integrés Lampe témoin de la caméra Caméra iSight Microphone Récepteur à infrarougeChapitre 2 Votre MacBook Pro au quotidien 25 Caméra vidéo iSight intégrée Elle vous permet de réaliser des vidéoconférences avec d’autres utilisateurs grâce à l’application iChat AV intégrée, de prendre des photos avec Photo Booth ou de capturer des vidéos avec iMovie ‘08. Lampe témoin de la caméra vidéo La lampe témoin verte de la caméra brille lorsque la caméra iSight intégrée est en fonctionnement. Haut-parleurs stéréo intégrés Permettent d’écouter de la musique, des films, des jeux et d’autres types de données multimédias. Microphone (situé sous la grille du haut-parleur de gauche) Il vous permet de capturer des sons directement ou bien de discuter avec vos amis en direct à travers une connexion à haut débit et iChat AV. Récepteur à infrarouge Associé à votre télécommande Apple Remote, le récepteur à infrarouge intégré vous permet de contrôler, jusqu’à une distance de 9 mètres, les applications Front Row et Keynote (vendue séparément) s’exécutant sur le MacBook Pro. 26 Chapitre 2 Votre MacBook Pro au quotidien Fonctionnalités du clavier de votre MacBook Pro Touches de réglage du volume Touches de réglage de luminosité Touche de verrouillage numérique Touche d’éjection de disques Touche silence Touche de fonction (Fn) Touches de fonction standard Touche de bascule du mode vidéo Touches d'éclairage du clavier esc num F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 lock ® — i C - øChapitre 2 Votre MacBook Pro au quotidien 27 Touche de fonction (Fn) Maintenez cette touche enfoncée pour activer les actions personnalisées affectées aux touches de fonction (F1 à F12). Pour apprendre comment personnaliser les touches de fonction, choisissez Aide > Aide Mac dans la barre des menus, puis recherchez « touches de fonction ». ¤ Touches de réglage de luminosité (F1, F2) Permettent d’augmenter ( ) ou de réduire ( ) la luminosité de l’écran de votre MacBook Pro. — Touche silence (F3) Permet de désactiver le son provenant des haut-parleurs intégrés et du port de sortie casque. - Touches de réglage du volume (F4, F5) Permettent d’augmenter (+) ou de baisser (–) le volume du son provenant des haut-parleurs intégrés et du port de sortie casque. Touche de verrouillage numérique (F6) Permet d’activer et de désactiver le pavé numérique intégré au clavier du MacBook Pro. Lorsque le pavé numérique est activé, une lumière verte s’allume sur la touche. i Touche de bascule du mode vidéo (F7) Permet de passer du mode double-écran (affichage de votre bureau en mode étendu, à la fois sur l’écran intégré et sur un écran externe) au mode de recopie vidéo (affichage des mêmes informations sur les deux écrans), et vice versa. o Touches d’éclairage du clavier (F8, F9, F10) Permettent d’augmenter (o), de diminuer (ø) ou de désactiver (O) la luminosité de l’éclairage du clavier. Touches Exposé et Dashboard (F11, F12) La touche F11 est présélectionnée pour ouvrir Exposé et la touche F12 ouvre Dashboard. C Touche d’éjection de disque Maintenez cette touche enfoncée pour éjecter un disque. Il est également possible d’éjecter un disque en faisant glisser son icône dans la Corbeille.28 Chapitre 2 Votre MacBook Pro au quotidien Ports présents sur votre MacBook Pro HPort FireWire 800 £ Port DVI Port FireWire 400 Logement H de sécurité Gauche dPort USB 2.0 Port Ethernet Gigabit (10/100/1000 Base-T) G Port d’adaptateur secteur MagSafe ¯ Port d’entrée de ligne audio/ audio numérique optique , Logement ExpressCard/34 Ports USB 2.0 (1 port sur la gauche du modèle de 15 pouces) d Port de sortie casque/audio numérique optique f DroiteChapitre 2 Votre MacBook Pro au quotidien 29 ¯ Port secteur MagSafe Branchez-y l’adaptateur secteur MagSafe 85 W (inclus) pour recharger la batterie du MacBook Pro. d Ports haute vitesse USB (Universal Serial Bus) 2.0 Grâce à ses ports, vous pouvez brancher sur le MacBook Pro un modem, un iPod, une souris, un clavier, une imprimante, un lecteur de disques, un appareil photo numérique, une manette de jeu et plus encore. Vous pouvez également y brancher des périphériques USB 1.1. , Port d’entrée de ligne audio/ audio numérique optique Permet de connecter un micro ou un appareil audio numérique à votre MacBook Pro. f Port de sortie casque/audio numérique optique Il permet de connecter des haut-parleurs externes, un casque ou des appareils audio numériques. Logement ExpressCard/34 Développez les fonctionnalités de votre MacBook Pro grâce aux cartes ExpressCard standard de 34 mm. Pour éjecter une ExpressCard, appuyer doucement dessus pour activer le ressort puis retirez-la du logement. Logement de sécurité Fixez-y un verrou et un câble antivol (disponibles sur le site www.apple.com/fr/store). H Deux ports FireWire (FireWire 400 et FireWire 800) Permettent de brancher sur l’ordinateur des périphériques externes à haute vitesse tels que des caméras vidéo numériques et des périphériques de stockage. G Port Gigabit Ethernet (10/100/1000Base-T) Permet de se connecter à un réseau Ethernet haute vitesse, un modem câble ou DSL ou encore un autre ordinateur. Le port Ethernet détecte automatiquement les périphériques Ethernet sans avoir besoin de câble croisé Ethernet. £ Port DVI (moniteur externe) Permet de brancher un moniteur externe, un projecteur ou un téléviseur équipé d’un connecteur DVI ou de raccorder un moniteur VGA en utilisant l’adaptateur DVI vers VGA inclus.30 Chapitre 2 Votre MacBook Pro au quotidien Utilisation du trackpad et du clavier Utilisez le trackpad pour déplacer le curseur et faire défiler, taper, taper deux fois et faire glisser des éléments. La distance de déplacement du pointeur à l’écran est proportionnel à la vitesse de déplacement de votre doigt sur le trackpad. Pour déplacer légè- rement le pointeur, déplacez lentement votre doigt sur le trackpad. Plus vous faites glisser rapidement votre doigt, plus le pointeur se déplace loin. Pour ajuster la vitesse de déplacement dans les Préférences Système, choisissez le menu Pomme () > Préférences Système, cliquez sur Clavier et souris, puis sur Trackpad. Voici quelques astuces et raccourcis utiles du trackpad et du clavier :  Le clic secondaire ou « clic droit » vous permet d’accéder aux commandes du menu contextuel. Pour définir cette option, sélectionnez « Placer deux doigts sur le trackpad et cliquer sur le bouton pour effectuer un clic secondaire » dans la sous-fenêtre Trackpad des préférences Clavier et souris. Vous pouvez également effectuer un clic secondaire en maintenant la touche Contrôle (ctrl) enfoncée au moment où vous cliquez.  Le défilement à deux doigts vous permet de faire glisser deux doigts pour défiler rapidement vers le haut, le bas ou latéralement dans la fenêtre active. Pour définir cette option, sélectionnez « Utiliser deux doigts pour le défilement » et « Autoriser le défilement horizontal » dans la sous-fenêtre Trackpad des préférences Clavier et souris.  La suppression en avant supprime les caractères à droite du point d’insertion. En appuyant sur la touche Supprimer, vous supprimez les caractères se trouvant à gauche du point d’insertion.Chapitre 2 Votre MacBook Pro au quotidien 31 Pour supprimer en avant, maintenez la touche Fonction (fn) enfoncée tout en appuyant sur la touche Supprimer. Utilisation de la batterie du MacBook Pro Lorsque l’adaptateur secteur MagSafe n’est pas branché, le MacBook Pro est alimenté par sa batterie. L’autonomie du MacBook Pro varie en fonction des applications utilisées et des périphériques externes qui y sont connectés. MacBook ProLa désactivation de fonctions sans fil telles qu’AirPort Extreme ou Bluetooth® contribue à économiser l’énergie de votre batterie. Si votre batterie faiblit pendant que vous travaillez, branchez l’adaptateur secteur et laissez la batterie se recharger. Pour remplacer une batterie presque déchargée par une autre rechargée lorsque votre ordinateur n’utilise pas d’adaptateur secteur, il est préférable d’éteindre l’ordinateur et de suivre les étapes décrites à la page 39. Pour connaître le niveau de charge de votre batterie, vous pouvez observer les lampes témoins de niveau de charge dont elle est dotée. Appuyez sur le bouton situé en regard des témoins lumineux afin que ces derniers brillent brièvement pour indiquer le niveau de charge de la batterie. Vous pouvez vérifier le niveau de charge de la batterie qu’elle soit ou non insérée dans le MacBook Pro. Important : si un seul témoin est allumé, le niveau restant est très faible. Si aucun témoin n’est allumé, c’est que la batterie est complètement vide et que le MacBook Pro ne pourra démarrer sans l’adaptateur secteur. Branchez l’adaptateur secteur et laissez la batterie se recharger ou remplacez la batterie à plat par une batterie complètement rechargée (voir la page 46).32 Chapitre 2 Votre MacBook Pro au quotidien Vous pouvez également savoir quelle est la charge actuelle de la batterie en vérifiant l’icône d’état de la batterie ( ), située dans la barre des menus. Le niveau affiché dépend de la quantité d’énergie restant dans la batterie, mais aussi des applications et des périphériques en cours d’utilisation, ainsi que des réglages actuels de votre système. Pour disposer de plus d’énergie, fermez des applications, déconnectez les périphériques non utilisés et réglez la fonction d’Économiseur d’énergie. Pour en savoir plus sur l’économie de la batterie et obtenir des astuces pour améliorer ses performances, rendez-vous à l’adresse www.apple.com/fr/batteries/notebooks.html. Batterie Témoins LED de la batterie BoutonChapitre 2 Votre MacBook Pro au quotidien 33 Recharge de la batterie Lorsque l’adaptateur secteur fourni avec le MacBook Pro est connecté, la batterie se recharge, que l’ordinateur soit éteint, allumé ou en mode de suspension d’activité. La recharge sera toutefois plus rapide si l’ordinateur est éteint ou en mode de suspension d’activité. Comment obtenir des réponses à vos doutes De plus amples informations sur l’utilisation du MacBook Pro sont disponibles dans l’Aide Mac qui s’affiche sur votre ordinateur et sur Internet, à l’adresse www.apple.com/fr/support/macbookpro. Pour faire apparaître l’Aide Mac : 1 Cliquez sur l’icône du Finder dans le Dock (la barre des icônes située au bord de l’écran). 2 Choisissez Aide > Aide Mac (cliquez sur le menu Aide dans la barre des menus puis sélectionnez Aide Mac). 3 Cliquez dans le champ de recherche, tapez votre question et appuyez sur la touche Retour du clavier.34 Chapitre 2 Votre MacBook Pro au quotidien Informations supplémentaires Pour en savoir plus sur l’utilisation de votre MacBook Pro, consultez le tableau suivant : Pour obtenir des informations sur : Effectuez l’opération suivante : L’installation de mémoire Consultez le chapitre 3, « Augmentez votre mémoire », à la page 37. Le dépannage de votre MacBook Pro en cas de problème Consultez le chapitre 4, « À tout problème sa solution », à la page 49. L’obtention de services et d’une assistance pour votre MacBook Pro Consultez la rubrique « Informations, services et assistance » à la page 62. Vous pouvez également vous rendre sur le site web d’assistance Apple à l’adresse www.apple.com/fr/support/macbookpro. L’utilisation de Mac OS X Le site web de Mac OS X à l’adresse www.apple.com/fr/macosx ou encore rechercher « Mac OS X » dans l’Aide Mac. La migration depuis un PC vers un Mac Consultez l’article « How To Move To Mac » (Comment passer au Mac) à l’adresse www.apple.com/getamac/movetomac (en anglais). Utilisation des applications iLife ‘08 Visitez le site web d’iLife à l’adresse www.apple.com/fr/ilife. Vous pouvez également ouvrir une application iLife ‘08, ouvrir l’Aide de l’application, puis saisir une question dans le champ de recherche. La modification des Préférences Système Ouvrez Préférences Système en choisissant le menu Pomme (K) > Préférences Système. Vous pouvez également rechercher « préférences système » dans l’Aide Mac. L’utilisation de votre trackpad Recherchez « trackpad » dans l’Aide Mac ou bien ouvrez Préfé- rences Système, cliquez sur Clavier et souris, puis sur Trackpad. L’utilisation de la caméra iSight Recherchez « iSight » dans l’Aide MacChapitre 2 Votre MacBook Pro au quotidien 35 L’utilisation de la technologie sans fil AirPort Extreme Visitez la page web d’assistance AirPort à l’adresse www.apple.com/fr/support/airport. L’utilisation de la technologie sans fil Bluetooth Visitez la page web d’assistance Bluetooth à l’adresse www.apple.com/fr/support/bluetooth. Vous pouvez aussi ouvrir l’utilitaire Échange de fichiers Bluetooth (dans le dossier Utilitaires du dossier Applications) et sélectionner Aide > Aide Bluetooth. L’entretien de la batterie Recherchez « batterie » dans l’Aide Mac La connexion d’une imprimante Recherchez « impression » dans l’Aide Mac. Les connexions FireWire et USB Recherchez « USB » ou « FireWire » dans l’Aide Mac, La connexion à Internet Recherchez « Internet » dans l’Aide Mac. La connexion d’un moniteur externe Recherchez « port de moniteur » dans l’Aide Mac. La télécommande Apple Remote Recherchez « télécommande » dans l’Aide Mac. Front Row Recherchez « Front Row » dans l’Aide Mac. La gravure d’un CD ou DVD Recherchez « graver un disque » dans l’Aide Mac. Les caractéristiques Visitez la page web concernant les caractéristiques, à l’adresse www.apple.com/support/specs (en anglais). Vous pouvez également ouvrir Informations Système en choisissant le menu Pomme (K) > « À propos de ce Mac » dans la barre des menus, puis en cliquant sur Plus d’infos. Pour obtenir des informations sur : Effectuez l’opération suivante :3 3Augmentez votre mémoire mémoire RAM www.apple.com/fr/store Aide Mac38 Chapitre 3 Augmentez votre mémoire Ce chapitre fournit des informations et des instructions pour installer de la mémoire supplémentaire et pour retirer et remettre en place la batterie de votre MacBook Pro. Votre ordinateur est doté de deux logements de mémoire auxquels vous pouvez accé- der en retirant le cache de mémoire dans la baie de la batterie. Votre MacBook Pro est fourni avec un minimum de 2 gigaoctets (Go) de mémoire DDR2 (Double Data Rate) SDRAM (Synchronous Dynamic Random-Access Memory) à 667 MHz. Les deux logements de mémoire peuvent accueillir un module SDRAM conforme aux spécifications suivantes :  format DDR SO-DIMM (Double Data Rate Small Outline Dual Inline Memory Module)  taille inférieure à 3,8 cm  1 Go ou 2 Go  à 200 broches  mémoire RAM de type PC2-5300 DDR2 à 667 MHz Vous pouvez ajouter deux modules de mémoire de 2 Go pour un total de 4 Go de mémoire au maximum. AVERTISSEMENT : Apple vous recommande de confier l’installation de mémoire à un technicien agréé Apple. Consultez les informations sur le dépannage et l’assistance qui accompagnent votre ordinateur pour savoir comment contacter Apple. Tout dommage causé à votre matériel en tentant d’installer vous-même de la mémoire n’est pas couvert par la garantie limitée de votre ordinateur.Chapitre 3 Augmentez votre mémoire 39 Installation de mémoire supplémentaire Pour installer de la mémoire, il faut enlever la batterie puis la remettre en place. La procédure suivante inclut des instructions sur le retrait de la batterie, l’ajout de mémoire et le remise en place de la batterie. Étape 1 : Retirez la batterie. 1 Éteignez votre MacBook Pro. Débranchez l’adaptateur secteur, le câble Ethernet et tous les autres câbles connectés au MacBook Pro afin d’éviter toute détérioration de ce dernier. AVERTISSEMENT : soyez prudent lorsque vous manipulez la batterie. Consultez les informations de sécurité sur la batterie à la page 68.40 Chapitre 3 Augmentez votre mémoire 2 Retournez le MacBook Pro et repérez les loquets d’ouverture sur les côtés de la batterie. Faites glisser les deux loquets vers le haut. La batterie se dégagera légèrement. Retirez-la. AVERTISSEMENT : les composants internes de votre MacBook Pro risquent d’être chauds. Si vous venez d’utiliser votre MacBook Pro, attendez 10 minutes après l’avoir éteint afin de laisser aux composants internes le temps de se refroidir avant de continuer.Chapitre 3 Augmentez votre mémoire 41 Étape 2 : Installez la mémoire. 1 À l’aide d’un tournevis à pointe cruciforme de taille 00, dévissez les vis qui fixent le cache de la mémoire, puis détachez-le de la baie de la batterie de l’ordinateur. Selon le modèle de votre MacBook Pro, vous aurez trois ou quatre vis. MacBook Pro de 15 pouces MacBook Pro de 17 pouces42 Chapitre 3 Augmentez votre mémoire 2 Touchez la surface métallique de l’intérieur de l’ordinateur afin de décharger toute électricité statique que vous pouvez avoir emmagasinée.Chapitre 3 Augmentez votre mémoire 43 3 Si vous devez retirer une carte mémoire insérée dans le logement, écartez les languettes du logement de manière à libérer les encoches de la carte mémoire. Cette dernière se dégage alors légèrement. Inclinez la carte selon un angle de 25 degrés, puis retirezla doucement en la glissant hors du logement. 4 Insérez la carte mémoire selon un angle de 25 degrés. Alignez l’encoche de la carte avec la petite languette du logement mémoire puis faites glisser la carte dans ce logement jusqu’à ce que le bord doré soit presque invisible. Poussez alors fermement la carte mémoire dans le logement mémoire. Une légère résistance peut se faire sentir. 44 Chapitre 3 Augmentez votre mémoire 5 Écartez doucement les petites languettes du logement mémoire pour les séparer des encoches et appuyez sur la carte mémoire jusqu’à ce que les deux loquets latéraux de la carte soient enclenchés fermement. 25 O Bien insérée Mal inséréeChapitre 3 Augmentez votre mémoire 45 Remarque : assurez-vous que la mémoire est installée comme indiqué sur cette illustration ; les contacts dorés doivent être presque complètement insérés dans le connecteur. 6 Insérez toute autre mémoire dans le deuxième logement. 7 Remettez le cache de la mémoire en place et assurez-vous qu’il est bien à plat avant de resserrer les vis. MacBook Pro de 15 pouces MacBook Pro de 17 pouces46 Chapitre 3 Augmentez votre mémoire Étape 3 : Replacez la batterie. 1 Placez le bord inférieur de la batterie dans son compartiment. Appuyez doucement sur le bord supérieur de la batterie jusqu’à ce que les loquets soient bloqués. 2 Reconnectez l’adaptateur secteur et tout autre câble connecté auparavant à l’ordinateur.Chapitre 3 Augmentez votre mémoire 47 Reconnaissance de la nouvelle mémoire par le MacBook Pro Après avoir ajouté de la mémoire au MacBook Pro, vérifiez si elle est reconnue. Pour vérifier la mémoire de votre ordinateur : 1 Démarrez votre MacBook Pro. 2 Lorsque le bureau Mac OS X apparaît, choisissez le menu Pomme () dans la barre des menus, puis sélectionnez « À propos de ce Mac ». La mémoire totale inclut la quantité de mémoire d’origine intégrée à votre ordinateur et la mémoire que vous avez ajoutée. Pour plus de détails sur la quantité de mémoire installée sur votre ordinateur, ouvrez Informations système en cliquant sur Plus d’infos puis sur Mémoire. Si le MacBook Pro ne reconnaît pas la mémoire ou ne démarre pas correctement, vérifiez que la mémoire est compatible avec le MacBook Pro et qu’elle est correctement installée en la remettant en place.4 4À tout problème sa solution www.apple.com/fr/support Aide Mac aide50 Chapitre 4 À tout problème sa solution Vous pouvez rencontrer, à titre exceptionnel, des problèmes en utilisant le MacBook Pro . Lisez ce chapitre pour trouver des idées de solution qui vous aideront à régler vos problèmes. Vous trouverez des informations supplémentaires concernant le dépannage dans l’Aide Mac et sur le site web d’assistance consacré au MacBook Pro, à l’adresse www.apple.com/fr/support/macbookpro. Il existe généralement une solution simple et rapide aux problèmes que vous pouvez rencontrer à l’utilisation du MacBook Pro. Réfléchissez aux conditions qui ont entraîné l’apparition de ce problème. Ce récapitulatif de la totalité des opérations effectuées avant que le problème ne survienne permet de restreindre les causes possibles et de trouver la solution. Les éléments à noter comprennent:  les applications que vous étiez en train d’utiliser quand le problème est apparu ; les problèmes qui n’apparaissent qu’avec une application spécifique peuvent indiquer que cette application n’est pas compatible avec la version de Mac OS installée sur votre ordinateur ;  les nouveaux logiciels installés, notamment ceux qui ont ajouté des éléments à votre dossier Système ;  Tout nouveau composant matériel installé (mémoire supplémentaire ou périphérique, par exemple). Problèmes vous empêchant d’utiliser votre MacBook Pro Si votre MacBook Pro ne répond plus ou que le pointeur se fige Il peut arriver, très rarement, qu’une application se « fige » à l’écran. Mac OS X permet de quitter une application figée et d’enregistrer vos travaux dans d’autres applications en cours d’exécution sans redémarrer votre ordinateur.Chapitre 4 À tout problème sa solution 51 Pour forcer une application à se fermer : 1 Appuyez sur les touches Commande (x) + Option + Échap ou choisissez le menu Pomme () > Forcer à quitter dans la barre des menus. La boîte de dialogue « Forcer à quitter des applications » apparaît. L’application est sélectionnée. 2 Cliquez sur Forcer à quitter. L’application se ferme, en laissant toutes les autres applications ouvertes. Si nécessaire, vous pouvez également redémarrer le Finder à partir de cette zone de dialogue. Enregistrez ensuite votre travail dans les applications ouvertes, puis redémarrez l’ordinateur afin de vous assurer que le problème est entièrement réglé. Si vous ne parvenez pas à forcer la fermeture d’une application, maintenez enfoncé le bouton d’alimentation (®) durant quelques secondes pour éteindre l’ordinateur. Attendez 10 secondes puis allumez l’ordinateur. Si le problème survient fréquemment, choisissez Aide > Aide Mac dans la barre des menus en haut de l’écran. Recherchez le mot « bloquer » pour obtenir de l’aide en cas de blocage de l’ordinateur ou s’il ne répond pas. Si le problème ne survient que lorsque vous utilisez une application particulière, vérifiez auprès de son éditeur si elle est compatible avec votre ordinateur. Pour obtenir des informations de contact et une assistance concernant les logiciels fournis avec le MacBook Pro, rendez-vous à l’adresse www.apple.com/fr/guide.52 Chapitre 4 À tout problème sa solution Si vous savez qu’une application est compatible, vous devrez peut-être réinstaller le logiciel système de votre ordinateur. Consultez la rubrique « Réinstallation des logiciels fournis avec le MacBook Pro » à la page 61. Si le MacBook Pro se bloque au démarrage, si un point d’interrogation clignotant apparaît ou si l’écran est éteint et que la lampe témoin de suspension d’activité reste allumée (pas en mode de suspension d’activité) Le point d’interrogation clignotant signifie généralement que l’ordinateur ne parvient pas à localiser le logiciel système sur le disque dur interne ou sur tout disque externe relié à l’ordinateur.  Patientez quelques secondes. Si l’ordinateur ne démarre pas de suite, éteignez-le en maintenant le bouton d’alimentation (®) enfoncé pendant 8 à 10 secondes. Débranchez tous les périphériques externes puis tentez de redémarrer l’ordinateur en appuyant sur le bouton d’alimentation (®) tout en maintenant la touche Option enfoncée. Lorsque votre ordinateur démarre, cliquez sur l’icône du disque dur, puis sur la flèche droite. Une fois que l’ordinateur a démarré, ouvrez Préférences Système et cliquez sur Démarrage. Sélectionnez un dossier Système local de Mac OS X.  Si cela ne donne pas de résultats, tentez de réparer le disque à l’aide d’Utilitaire de disque :  Insérez le CD « Mac OS X Install Disc 1 » dans votre ordinateur.  Redémarrez ensuite votre ordinateur en maintenant la touche C enfoncée lors du démarrage.  Choisissez Installation dans la barre des menus puis sélectionnez Ouvrir Utilitaire de disque. Lorsque Utilitaire de disque s’ouvre, suivez les instructions de la sous-fenê- tre S.O.S pour savoir s’il est en mesure de réparer le disque.Chapitre 4 À tout problème sa solution 53 Si Utilitaire de disque ne résout pas le problème, vous devrez peut-être réinstaller le logiciel système de votre ordinateur. Consultez la rubrique « Réinstallation des logiciels fournis avec le MacBook Pro » à la page 61. Si votre MacBook Pro ne s’allume ou ne démarre pas Tentez les opérations suivantes dans l’ordre jusqu’à ce que votre ordinateur s’allume :  Assurez-vous que l’adaptateur secteur est connecté à l’ordinateur et branché sur une prise de courant en état de marche. Veillez à utiliser l’adaptateur secteur MagSafe 85 W fourni avec le MacBook Pro. Si l’adaptateur secteur ne recharge plus l’ordinateur et que la lampe témoin du connecteur MagSafe ne s’allume pas lorsque vous branchez le câble d’alimentation, essayez de débrancher le câble puis de le brancher à nouveau afin de le réinitialiser ou essayer à partir d’une autre prise.  Vérifiez si votre batterie à besoin d’être rechargée. Appuyez sur le petit bouton situé sur la batterie. Vous devriez voir apparaître un à quatre voyants indiquant le niveau de charge de la batterie. Si une seule lampe témoin de niveau de la batterie clignote, branchez l’adaptateur secteur pour charger la batterie jusqu’à ce qu’au moins cette lampe témoin reste allumée en permanence.  Si cela ne résout pas le problème, réinitialisez le système de gestion de l’alimentation du MacBook Pro en débranchant l’adaptateur secteur, en retirant la batterie puis en maintenant le bouton d’alimentation (®) enfoncé pendant au moins 5 secondes.  Si vous avez récemment ajouté de la mémoire, assurez-vous qu’elle est correctement installée et compatible avec votre ordinateur. Vérifiez si le retrait de cette mémoire et la remise en place de l’ancienne permet à l’ordinateur de démarrer (consultez la rubrique « Installation de mémoire supplémentaire » à la page 39). 54 Chapitre 4 À tout problème sa solution  Pour réinitialiser la PRAM, appuyez sur le bouton d’alimentation (®) et maintenez immédiatement les touches Commande (x), Option, P et R enfoncées jusqu’à ce que vous entendiez une deuxième fois le signal sonore de démarrage.  Si vous ne parvenez toujours pas à démarrer le MacBook Pro, consultez la rubrique « Informations, services et assistance » à la page 62 qui contient les informations nécessaires pour prendre contact avec Apple. Si l’écran devient subitement noir ou que votre MacBook Pro se bloque Essayez de redémarrer votre MacBook Pro. 1 Débranchez tout périphérique connecté à votre MacBook Pro excepté l’adaptateur secteur. 2 Appuyez sur le bouton d’alimentation (®) pour redémarrer le système. 3 Le niveau de charge de la batterie doit atteindre au moins 10 pour cent avant la connexion d’un périphérique et la reprise du travail. Pour vérifier le niveau de charge de la batterie, cliquez sur l’icône d’état de la batterie ( ) située dans la barre des menus. Le moniteur pourrait également s’assombrir si les fonctions d’économie d’énergie de la batterie sont en place. Si vous avez oublié votre mot de passe Vous pouvez réinitialiser votre mot de passe d’administrateur et les mots de passe de tous les autres comptes. 1 Insérez le CD « Mac OS X Install Disc 1 ». Redémarrez ensuite votre ordinateur et maintenez la touche C enfoncée pendant le démarrage. 2 Choisissez Utilitaires > « Réinitialiser le mot de passe » dans la barre des menus, puis suivez les instructions à l’écran.Chapitre 4 À tout problème sa solution 55 En cas de problème à l’éjection d’un disque  Fermez toutes les applications susceptibles d’utiliser le disque et essayez à nouveau. Si cela ne donne pas de résultats, redémarrez l’ordinateur puis immédiatement maintenez le bouton du trackpad enfoncé. Utilisation d’Apple Hardware Test Si vous pensez qu’il y a un problème avec les composants matériels du MacBook Pro, vous pouvez utiliser l’application Apple Hardware Test pour savoir si tel est le cas (les composants affectés peuvent être la mémoire ou le processeur, par exemple). Pour utiliser Apple Hardware Test : 1 Déconnectez tous les périphériques externes de votre ordinateur, sauf l’adaptateur secteur. Si un câble Ethernet est connecté, déconnectez-le. 2 Insérez le CD « Mac OS X Install Disc 1 » livré avec votre ordinateur. 3 Redémarrez ensuite votre ordinateur en maintenant la touche D enfoncée lors du démarrage. 4 Lorsque l’écran principal d’Apple Hardware Test s’affiche, suivez les instructions à l’écran. 5 En cas de détection d’un problème, Apple Hardware Test affiche un code d’erreur. Notez le code d’erreur avant d’entreprendre les démarches d’assistance. Si Apple Hardware Test ne détecte pas de panne matérielle, il est probable que le problème soit lié aux logiciels. Pour en savoir plus sur Apple Hardware Test, consultez le fichier « À propos de Apple Hardware Test » présent sur le CD « Mac OS X Install Disc 1 ».56 Chapitre 4 À tout problème sa solution Problèmes de connexion à Internet Le MacBook Pro est équipé de l’application Assistant réglages, destinée à vous aider à configurer une connexion à Internet. Ouvrez Préférences Système, puis cliquez sur Réseau. Cliquez sur le bouton « Assistant » pour ouvrir Assistant réglages de réseau. En cas de problème avec votre connexion à Internet, vous pouvez essayer les méthodes exposées dans cette rubrique pour votre type de connexion ou vous pouvez utiliser Diagnostic réseau. Pour utiliser Diagnostic réseau : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur Réseau puis cliquez sur « Assistant ». 3 Cliquez sur Diagnostic pour lancer Diagnostic réseau. 4 Suivez les instructions à l’écran. Si Diagnostic réseau n’est pas en mesure de résoudre le problème, celui-ci se situe peut-être au niveau du fournisseur d’accès à Internet auquel vous essayez de vous connecter, du périphérique externe utilisé pour la connexion au fournisseur d’accès à Internet ou du serveur auquel vous essayez d’accéder. Vous pouvez également tenter de réaliser les opérations suivantes.Chapitre 4 À tout problème sa solution 57 Connexions à Internet par modem câble, modem DSL ou réseau local (LAN) Assurez-vous que tous les câbles du modem sont correctement branchés, y compris le câble d’alimentation du modem, le câble reliant le modem à l’ordinateur et le câble raccordant le modem à la prise murale. Vérifiez également les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet. Éteignez puis rallumez le modem et réinitialisez les composants matériels du modem. Éteignez le modem câble ou DSL, puis rallumez-le après quelques minutes. Certains fournisseurs d’accès à Internet conseillent de débrancher le câble d’alimentation du modem. Si votre modem dispose d’un bouton de réinitialisation, vous pouvez l’actionner avant ou après avoir éteint puis rallumé le modem. Important : les instructions relatives aux modems ne concernent pas les utilisateurs de réseau LAN. Contrairement aux utilisateurs de modems câble et DSL, les utilisateurs de réseau LAN peuvent disposer de concentrateurs, commutateurs, routeurs et autres blocs de connexion. Ils doivent faire appel à leur administrateur réseau plutôt qu’à un FAI.58 Chapitre 4 À tout problème sa solution Connexions PPPoE Si vous ne parvenez pas à vous connecter à votre fournisseur d’accès à Internet via PPPoE (Point to Point Protocol over Ethernet), assurez-vous que les informations que vous avez saisies dans les préférences Réseau sont correctes. Pour vérifier les réglages de vos préférences Réseau : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur Réseau. 3 Cliquez sur Ajouter (+) en bas de la liste des services de connexion réseau et choisissez PPPoE dans le menu local Interface. 4 Choisissez une interface pour le service PPPoE dans le menu local Ethernet. Choisissez Ethernet si vous vous connectez à un réseau câblé ou AirPort si vous vous connectez à un réseau sans fil. 5 Saisissez les informations fournies par votre fournisseur d’accès, tel que le nom du compte, le mot de passe et le nom du service PPPoE (si votre fournisseur d’accès le demande). 6 Cliquez sur Appliquer pour activer les réglages. Connexions au réseau Assurez-vous que le câble Ethernet est branché sur le MacBook Pro et sur le réseau. Vérifiez les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet. Si vous disposez de plusieurs ordinateurs tentant de partager une connexion à Internet, assurez-vous que votre réseau est correctement configuré. Vous devez savoir si votre FAI fournit une seule ou plusieurs adresses IP, autrement dit, une pour chaque ordinateur.Chapitre 4 À tout problème sa solution 59 Si une seule adresse IP est fournie, vous devez disposer d’un routeur capable de partager la connexion ; on parle alors de conversion d’adresse réseau (NAT) ou de masquage d’adresses IP. Pour obtenir des informations sur la configuration, consultez la documentation fournie avec votre routeur ou contactez la personne qui a configuré votre réseau. La borne d’accès AirPort peut être utilisée pour que plusieurs ordinateurs partagent une adresse IP. Pour obtenir de plus amples informations sur l’utilisation d’une borne d’accès AirPort, consultez l’Aide Mac ou rendez-vous sur le site web d’Apple consacré à AirPort Extreme, à l’adresse www.apple.com/fr/support/airport. Si ces méthodes s’avèrent insuffisantes pour résoudre les problèmes rencontrés, adressez-vous à votre fournisseur d’accès à Internet ou à votre administrateur réseau. Problèmes de communication sans fil avec AirPort Extreme En cas de problème avec les communications sans fil AirPort Extreme  Vérifiez que l’ordinateur ou le réseau auquel vous souhaitez vous connecter est activé et dispose d’un point d’accès sans fil.  Assurez-vous que le logiciel est correctement configuré conformément aux instructions incluses avec votre borne d’accès ou point d‘accès.  Assurez-vous que l’autre ordinateur ou le point d’accès au réseau se trouve dans la zone de couverture de l’antenne de votre ordinateur. Des appareils électroniques ou des structures métalliques se trouvant à proximité peuvent interférer avec les communications sans fil et réduire la portée de votre antenne. Vous pouvez éventuellement améliorer la réception en tournant et en réorientant l’ordinateur.60 Chapitre 4 À tout problème sa solution  Vérifiez l’icône d’état AirPort (Z) dans la barre des menus. Jusqu’à quatre barres de mesure apparaissent pour afficher la puissance du signal. Si les barres ne s’affichent pas, tentez de changer de place.  Pour plus d’informations, consultez l’Aide AirPort (choisissez Aide > Aide Mac, puis Bibliothèque > Aide AirPort dans la barre des menus) ainsi que les instructions fournies avec votre appareil sans fil. Maintien à jour de vos logiciels Vous pouvez vous connecter à Internet pour télécharger et installer automatiquement les dernières versions de logiciels, gestionnaires et autres améliorations fournies par Apple. Chaque fois que vous vous connectez à Internet, « Mise à jour de logiciels » consulte les mises à jour disponibles pour votre ordinateur. Vous pouvez configurer votre MacBook Pro afin qu’il recherche régulièrement les mises à jour disponibles, pour que vous puissiez ensuite télécharger et installer les mises à jour de logiciels. Pour rechercher des logiciels mis à jour : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur l’icône « Mise à jour de logiciels » et suivez les instructions à l’écran.  Pour plus d’informations, recherchez « Mise à jour de logiciels » dans l’Aide Mac.  Pour obtenir les toutes dernières informations sur Mac OS X, rendez-vous à l’adresse www.apple.com/fr/macosx.Chapitre 4 À tout problème sa solution 61 Réinstallation des logiciels fournis avec le MacBook Pro Les disques d’installation de logiciels fournis avec votre ordinateur permettent de réinstaller Mac OS X et les applications livrées avec votre ordinateur. Important : Apple vous recommande de sauvegarder les données de votre disque dur avant de procéder à la réinstallation de logiciels. Apple décline toute responsabilité en cas de perte de données. Installation de Mac OS X et des applications Pour installer Mac OS X et les applications qui accompagnent le MacBook Pro : 1 Sauvegardez vos fichiers essentiels. Nous vous conseillons de sauvegarder vos fichiers essentiels avant d’installer Mac OS X et d’autres applications car l’option Effacer et installer efface les données du disque dur. 2 Assurez-vous que l’adaptateur secteur est correctement branché et que le témoin est allumé. 3 Insérez le CD « Mac OS X Install Disc 1 » livré avec votre ordinateur. 4 Double-cliquez sur « Install Mac OS X and Bundled Software ». Pour n’installer que les applications fournies avec l’ordinateur, double-cliquez sur « Bundled Software Only ». Remarque : pour installer iCal, iChat AV, iSync, iTunes, Safari et les applications iLife ‘08, double-cliquez sur « Install Mac OS X and Bundled Software ». 5 Suivez les instructions à l’écran. 6 Après avoir sélectionné le volume de destination pour l’installation, suivez les instructions à l’écran. Il se peut que votre ordinateur redémarre et vous invite à insérer le disque d’installation Mac OS X suivant.62 Chapitre 4 À tout problème sa solution Remarque : pour rétablir les réglages d’origine de Mac OS X sur votre ordinateur, cliquez sur Options dans la sous-fenêtre Sélectionner une destination du programme d’installation, puis choisissez Effacer et installer. Informations, services et assistance L’utilisateur ne peut remplacer aucune pièce du MacBook Pro, excepté la mémoire. Si vous avez besoin de services de réparation, adressez-vous à Apple ou portez votre MacBook Pro chez un fournisseur de services agréé Apple. Vous trouverez de plus amples informations sur le MacBook Pro en ligne, dans l’aide à l’écran, dans Informations Système et via Apple Hardware Test. Informations en ligne Pour obtenir des informations en ligne sur le service et l’assistance, rendez-vous sur www.apple.com/fr/support. Choisissez votre pays dans le menu local. Vous pouvez faire des recherches dans la base de données AppleCare Knowledge Base, vérifiez si de nouvelles mises à jour de logiciels sont disponibles ou obtenir de l’aide dans les forums de discussion Apple. Aide à l’écran Vous pouvez chercher des réponses à vos questions ainsi que des instructions et des informations concernant le dépannage dans l’Aide Mac. Choisissez Aide > Aide Mac. Informations Système Pour obtenir des informations sur le MacBook Pro, servez-vous d’Informations Système. Cette application vous fournit la liste des composants matériels et des logiciels installés, le numéro de série et de version du système d’exploitation, la quantité de mémoire installée, etc. Pour ouvrir Informations Système, choisissez le menu Pomme () > « À propos de ce Mac » dans la barre des menus, puis cliquez sur Plus d’infos.Chapitre 4 À tout problème sa solution 63 Service et assistance AppleCare Votre MacBook Pro est fourni avec 90 jours d’assistance technique et 1 an de couverture pour les réparations de matériel effectuées dans les magasins Apple Store ou les centres de réparations agréés Apple, tel qu’un fournisseur de services agréé Apple. Vous avez la possibilité d’étendre la durée de cette couverture en adhérant à un programme AppleCare Protection Plan. Pour en savoir plus, rendez-vous sur www.apple.com/fr/support/products ou bien visitez le site web de votre pays (dans la liste ci-dessous). Si vous avez besoin d’assistance, le personnel d’assistance par téléphone AppleCare peut vous aider à installer et à ouvrir les applications et offre des services de dépannage élémentaires. Appelez le centre d’assistance le plus proche de chez vous (gratuit pendant les 90 premiers jours). Gardez la date d’achat et le numéro de série de votre MacBook Pro à portée de main lorsque vous appelez. Remarque : la période de 90 jours d’assistance gratuite par téléphone débute à la date d’achat. Des frais téléphoniques peuvent éventuellement s’appliquer. Pays Téléphone Site web Allemagne (49) 01805 009 433 www.apple.com/de/support Autriche (43) 0810 300 427 www.apple.com/at/support Belgique (flamand) (français) (32) 070 700 772 (32) 070 700 773 www.apple.com/benl/support www.apple.com/befr/support France (33) 0825 888 024 www.apple.com/fr/support Luxembourg (352) 800 24550 www.apple.com/befr/support Suisse (français) (allemand) (41) 0848 000 132 (41) 0848 000 132 www.apple.com/chfr/support www.apple.com/chde/support64 Chapitre 4 À tout problème sa solution Les numéros de téléphone sont susceptibles d’être modifiés. Les tarifs téléphoniques locaux et nationaux peuvent s’appliquer. Une liste complète est disponible sur Internet: Localisation du numéro de série de votre produit Utilisez l’une des méthodes suivantes pour trouver le numéro de série de votre ordinateur :  Choisissez le menu Pomme () dans la barre des menus puis sélectionnez « À propos de ce Mac ». Cliquez sur le numéro de version situé sous les mots « Mac OS X ». Cliquez à cet endroit de façon répétitive pour afficher l’un après l’autre la version de Mac OS X, le numéro de sous-version et le numéro de série.  Cliquez sur l’icône du Finder puis ouvrez /Applications/Utilitaires/Informations Système. Cliquez alors sur Matériel dans le panneau Contenu.  Retirez la batterie. Le numéro de série de votre MacBook Pro se trouve dans la baie de la batterie. Pour en savoir plus sur l’extraction de la batterie, consultez la page 39 . www.apple.com/contact/phone_contacts.html5 5Dernières recommandations www.apple.com/fr/environment Aide Mac ergonomie66 Chapitre 5 Dernières recommandations Afin d’assurer votre sécurité et de préserver votre matériel, veillez à observer ces consignes concernant le nettoyage et la manipulation de votre MacBook Pro ainsi que l’aménagement d’un espace de travail confortable. Gardez ces instructions dans un endroit facile d’accès pour vous et pour les utilisateurs éventuels. Informations importantes concernant la sécurité Utilisation près de l’eau et dans des endroits humides Évitez de placer votre MacBook Pro à proximité d’un évier, d’un lavabo, d’une baignoire ou d’une douche, par exemple. Protégez votre MacBook Pro de l’humidité et des intempéries (neige, pluie et brouillard par exemple). Manipulation du MacBook Pro Installez le MacBook Pro sur un plan de travail stable qui laisse convenablement circuler l’air sous l’ordinateur et autour de celui-ci. N’utilisez pas le MacBook Pro en le posant sur un coussin ou tout autre objet de structure non solide car cela pourrait empêcher les conduits d’aération de fonctionner correctement. Évitez également de placer des objets sur le clavier lorsque vous utilisez votre MacBook Pro. N’introduisez jamais d’objets d’aucune sorte dans les ouvertures servant à la ventilation. La partie inférieure du MacBook Pro peut chauffer au cours d’une utilisation normale de l’appareil. S’il est posé sur vos genoux et que la chaleur qu’il émane vous gêne, posez-le plutôt sur un plan de travail stable. AVERTISSEMENT : ne pas suivre ces consignes pourrait déclencher un feu, occasionner des décharges électriques ou entraîner tout type de blessure ou dommage.Chapitre 5 Dernières recommandations 67 Utilisation de l’adaptateur secteur MagSafe 85 W Veillez à ce que la fiche CA ou le câble d’alimentation secteur soit totalement inséré dans l’adaptateur secteur avant de le brancher sur une prise de courant. N’utilisez que l’adaptateur secteur qui accompagne le MacBook Pro ou, au besoin, un adaptateur secteur agréé Apple compatible avec ce produit. L’adaptateur secteur peut chauffer au cours d’une utilisation normale de l’appareil. Branchez toujours l’adaptateur secteur directement sur la prise de courant ou posez-le par terre, dans un endroit correctement aéré. Débranchez l’adaptateur secteur, retirez la batterie et débranchez tous les autres câbles si l’un des cas suivants se présente :  Vous souhaitez ajouter de la mémoire.  Vous souhaitez nettoyer le boîtier (pour ce faire, suivez à la lettre les instructions fournies à la page 70).  La prise ou le câble d’alimentation est endommagé.  Le MacBook Pro ou l’adaptateur secteur est exposé à la pluie ou à une humidité excessive, ou du liquide a été versé dans le boîtier.  Le MacBook Pro ou l’adaptateur secteur a subi une chute, le boîtier a été endommagé ou vous pensez qu’une réparation est nécessaire. Le port secteur MagSafe contient un aimant qui peut effacer les données d’une carte de crédit, d’un iPod ou d’autres appareils. Pour protéger vos données, ne placez pas de matériaux ou d’appareils à sensibilité magnétique (comme ceux cités précédemment ou autres) à moins de 25 mm de ce port. Si des résidus quelconques se trouvent dans le port secteur MagSafe, enlevez-les doucement à l’aide d’un bâtonnet de coton.68 Chapitre 5 Dernières recommandations Manipulation de la batterie Évitez de la faire tomber, de la démonter, de l’écraser, de la brûler ou de l’exposer à des températures supérieures à 100° C. N’utilisez plus la batterie si elle est endommagée de quelque façon que ce soit. Ne remplacez la batterie que par une batterie certifiée par Apple pour ce produit. Éliminez rapidement les batteries usagées conformément aux directives d’environnement locales en vigueur. Prévention de la diminution de l’acuité auditive Vous risquez une perte d’audition irréparable si vous utilisez un casque ou des écouteurs à volume sonore élevé. L’oreille peut s’adapter petit à petit à des volumes sonores de plus en plus élevés qui peuvent sembler normaux, mais qui risquent à la longue d’endommager votre système auditif. En cas de sifflements ou de perte d’acuité auditive, arrêtez d’utiliser le casque ou les écouteurs et consultez un médecin. Plus le volume est élevé, plus votre audition risque d’être affectée rapidement. Pour protéger votre système auditif, les spécialistes conseillent de prendre les mesures suivantes :  Limitez la durée d’utilisation à volume élevé de vos écouteurs ou de votre casque d’écoute.  Évitez d’augmenter le volume afin de bloquer les bruits environnants.  Baissez le volume si vous ne parvenez pas à entendre une personne qui parle à côté de vous. Activités à haut risque Cet ordinateur n’est pas conçu pour être utilisé dans des installations nucléaires, pour la navigation ou la communication aérienne, pour le contrôle du trafic aérien, ni dans aucune autre situation où une panne du système informatique pourrait entraîner la mort, des blessures ou de graves dommages écologiques.Chapitre 5 Dernières recommandations 69 Informations concernant le laser pour lecteurs optiques Le lecteur optique de votre ordinateur contient un laser qui est entièrement sans danger si l’on en fait un usage normal mais qui peut s’avérer dangereux pour les yeux s’il est démonté. Afin d’assurer votre sécurité, ce dispositif ne doit être réparé que par un fournisseur de services agréé Apple. Informations importantes sur la manipulation Mise sous tension de votre MacBook Pro N’allumez jamais le MacBook Pro tant que tous ses composants internes ou externes ne sont pas en place. L’utilisation de l’ordinateur alors que certains composants manquent peut s’avérer dangereuse et risque de l’endommager. Transport du MacBook Pro Si vous transportez le MacBook Pro dans un sac ou dans un attaché-case, assurez-vous que ce dernier ne contient pas d’objets non attachés (des trombones ou des pièces de monnaie, par exemple) qui pourraient pénétrer accidentellement dans l’ordinateur par une ouverture (comme la fente du lecteur optique) ou se coincer à l’intérieur d’un port. Maintenez également à l’écart du port secteur MagSafe tout objet à sensibilité magnétique. AVERTISSEMENT : la mise en place de réglages ou la réalisation d’opérations qui ne sont pas spécifiés dans le manuel de votre appareil risque de vous exposer à des rayonnements dangereux. AVIS : ne pas suivre les présentes instructions sur la manipulation peut provoquer des dommages à votre MacBook Pro ou à d’autres objets.70 Chapitre 5 Dernières recommandations Utilisation des connecteurs et des ports Ne forcez jamais un connecteur à entrer dans un port. Lorsque vous branchez un appareil, assurez-vous que le port ne contient aucun résidu quelconque, que le connecteur correspond bien au port et qu’il est placé de manière à entrer correctement dans le port. Utilisation du lecteur optique Le lecteur SuperDrive du MacBook Pro prend en charge les disques de 12 cm. Les disques de forme irrégulière et de moins de 12 cm ne peuvent pas être lus. Stockage du MacBook Pro Si vous décidez de ranger le MacBook Pro pendant une longue période, placez-le dans un endroit frais (idéalement, à 22° C) et déchargez la batterie jusqu’à 50 pour cent. Avant de ranger votre MacBook Pro pour une période de temps supérieure à cinq mois, déchargez la batterie jusqu’à environ 50 pour cent, puis retirez-la de votre MacBook Pro. Pour conserver les capacités de la batterie, rechargez la batterie jusqu’à 50 pour cent tous les six mois environ. Nettoyage du MacBook Pro Lorsque vous nettoyez le boîtier de votre MacBook Pro et ses composants, éteignez d’abord le MacBook Pro, puis débranchez l’adaptateur secteur et retirez la batterie. Puis, pour nettoyer le boîtier de l’ordinateur, utilisez un chiffon doux, humide et non pelucheux. Évitez les infiltrations d’humidité par quelque ouverture que ce soit. Ne vaporisez jamais de liquide directement sur l’ordinateur. N’utilisez ni aérosols, ni dissolvants, ni abrasifs qui pourraient endommager les finitions de l’appareil. Nettoyage du moniteur du MacBook Pro MacBook ProPour nettoyer l’écran du MacBook Pro, éteignez tout d’abord l’ordinateur, débranchez l’adaptateur secteur, puis retirez la batterie. Humidifiez ensuite, à l’eau seulement, un chiffon propre, doux et non pelucheux et essuyez l’écran. Ne vaporisez jamais de liquide directement sur l’écran.Chapitre 5 Dernières recommandations 71 Ergonomie Voici quelques conseils pour la mise en place d’un environnement de travail sain. Clavier et trackpad Lorsque vous tapez au clavier ou que vous vous servez du trackpad, vos épaules doivent être détendues. Le bras et l’avant-bras doivent former un angle droit, la main étant placée dans le prolongement du poignet. Position à éviter Position recommandée72 Chapitre 5 Dernières recommandations Vous devez avoir les mains et les doigts détendus lorsque vous tapez au clavier ou que vous utilisez le trackpad. Évitez de replier les pouces à l’intérieur des paumes. Modifiez fréquemment la position de vos mains pour éviter la fatigue. Après un travail continu et intensif sur ordinateur, certains utilisateurs peuvent ressentir des douleurs aux mains, aux poignets ou aux bras. Si ces douleurs persistent, consultez un spécialiste. Souris externe Si vous utilisez une souris externe, veillez à ce qu’elle se trouve à hauteur du clavier. Ménagez un espace suffisant pour la manipuler avec aisance. Siège Optez pour un siège de bureau réglable et offrant un dossier et une assise confortables. Réglez la hauteur du siège de telle sorte que vos cuisses reposent à l’horizontale et vos pieds à plat sur le sol. Le dossier du siège doit soutenir votre région lombaire, c’est-à-dire la partie inférieure de votre dos. Suivez les instructions du fabricant de sorte que le réglage du dossier soit parfaitement adapté à votre morphologie. Position à éviter Position recommandéeChapitre 5 Dernières recommandations 73 Au besoin, relevez le siège de manière à ce que vos avant-bras et vos mains soient placés correctement par rapport au clavier. Si, dans ce cas, vos pieds ne reposent plus à plat sur le sol, utilisez un repose-pied inclinable et réglable en hauteur. Si vous disposez d’un bureau modulaire, vous pouvez abaisser le niveau du plan de travail pour éviter l’emploi d’un repose-pied. Une troisième solution consiste à utiliser un bureau dont le poste de saisie est situé plus bas que le plan de travail. Écran intégré Orientez l’écran de manière à réduire le plus possible les reflets de l’éclairage électrique et de la lumière du jour. Ne forcez pas l’écran si vous rencontrez une résistance. L’angle d’ouverture maximal de l’écran ne peut dépasser 130 degrés. Réglez la luminosité et le contraste de l’écran chaque fois que vous déplacez l’ordinateur ou que l’éclairage ambiant change. Vous trouverez d’autres informations concernant l’ergonomie sur Internet: Apple et l’environnement Apple Inc. reconnaît sa responsabilité en matière de réduction de l’impact de ses produits et de ses activités sur l’environnement. Des informations supplémentaires sont disponibles sur Internet: www.apple.com/about/ergonomics www.apple.com/fr/environment75 Regulatory Compliance Information Compliance Statement This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. See instructions if interference to radio or television reception is suspected. L‘utilisation de ce dispositif est autorisée seulement aux conditions suivantes: (1) il ne doit pas produire de brouillage et (2) l’utilisateur du dispositif doit être prêt à accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. Radio and Television Interference This computer equipment generates, uses, and can radiate radio-frequency energy. If it is not installed and used properly—that is, in strict accordance with Apple’s instructions—it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in Part 15 of FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. You can determine whether your computer system is causing interference by turning it off. If the interference stops, it was probably caused by the computer or one of the peripheral devices. If your computer system does cause interference to radio or television reception, try to correct the interference by using one or more of the following measures:  Turn the television or radio antenna until the interference stops.  Move the computer to one side or the other of the television or radio.  Move the computer farther away from the television or radio.  Plug the computer into an outlet that is on a different circuit from the television or radio. (That is, make certain the computer and the television or radio are on circuits controlled by different circuit breakers or fuses.) If necessary, consult an Apple-authorized service provider or Apple. See the service and support information that came with your Apple product. Or, consult an experienced radio/television technician for additional suggestions. Important: Changes or modifications to this product not authorized by Apple Inc., could void the EMC compliance and negate your authority to operate the product. This product has demonstrated EMC compliance under conditions that included the use of compliant peripheral devices and shielded cables (including Ethernet network cables) between system components. It is important that you use compliant peripheral devices and shielded cables between system components to reduce the possibility of causing interference to radios, television sets, and other electronic devices.76 Responsible party (contact for FCC matters only): Apple Inc. Corporate Compliance 1 Infinite Loop, M/S 26-A Cupertino, CA 95014-2084 Wireless Radio Use This device is restricted to indoor use when operating in the 5.15 to 5.25 GHz frequency band. Cet appareil doit être utilisé à l’intérieur. Exposure to Radio Frequency Energy The radiated output power of the AirPort Extreme technology is below the FCC radio frequency exposure limits. Nevertheless, it is advised to use the wireless equipment in such a manner that the potential for human contact during normal operation is minimized. FCC Bluetooth Wireless Compliance The antenna used with this transmitter must not be colocated or operated in conjunction with any other antenna or transmitter subject to the conditions of the FCC Grant. Bluetooth Industry Canada Statement This Class B device meets all requirements of the Canadian interference-causing equipment regulations. Cet appareil numérique de la Class B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. Industry Canada Statement Complies with the Canadian ICES-003 Class B specifications. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. This device complies with RSS 210 of Industry Canada. Bluetooth Europe - Déclaration de conformité UE Cet appareil sans fil est conforme à la directive R&TTE. Europe : déclaration de conformité EU The equipment complies with the RF Exposure Requirement 1999/519/EC, Council Recommendation of 12 July 1999 on the limitation of exposure of the general public to electromagnetic fields (0 Hz to 300 GHz. Par la présente Apple Inc. déclare que l’appareil 802.11a/ b/g/n Mini-PCIe card est conforme aux exigences essentielles et aux autres dispositions pertinentes de la directive R&TTE. Conforme aux directives européennes sur la basse tension et la CEM. Consultez la page http:// www.apple.com/euro/compliance. Korea Statements Singapore Wireless Certification77 Taiwan Wireless Statements Taiwan Class B Statement VCCI Class B Statement External USB Modem Information When connecting your MacBook Pro to the phone line using an external USB modem, refer to the telecommunications agency information in the documentation that came with your modem. ENERGY STAR® Compliance As an ENERGY STAR® partner, Apple has determined that standard configurations of this product meet the ENERGY STAR® guidelines for energy efficiency. The ENERGY STAR® program is a partnership with electronic equipment manufacturers to promote energy-efficient products. Reducing energy consumption of products saves money and helps conserve valuable resources. This computer is shipped with power management enabled with the computer set to sleep after 10 minutes of user inactivity. To wake your computer, click the mouse or trackpad button or press any key on the keyboard. For more information about ENERGY STAR®, visit: www.energystar.gov 78 Informations sur l’élimination et le recyclage Le symbole ci-dessus signifie que vous devez vous débarrasser de votre produit selon les normes et la législation de votre pays. Étant donné que la lampe de rétro-éclairage dans le MacBook Pro de 17 pouces contient du mercure, vous devez vous en débarrasser séparément des ordures ménagères. Lorsque votre produit n’est plus utilisable, contactez Apple ou les autorités locales afin de connaître les possibilités de recyclage. Pour en savoir plus sur le programme de recyclage d’Apple, consultez le site www.apple.com/fr/environment/recycling.79 Informations sur l’enlèvement de la batterie Jetez vos batteries usagées en respectant les lois et les consignes environnementales de votre pays. California: The coin cell battery in your product contains perchlorates. Special handling and disposal may apply. Refer to www.dtsc.ca.gov/hazardouswaste/perchlorate. Deutschland: Dieses Gerät enthält Batterien. Bitte nicht in den Hausmüll werfen. Entsorgen Sie dieses Gerätes am Ende seines Lebenszyklus entsprechend der maßgeblichen gesetzlichen Regelungen. Nederlands: Gebruikte batterijen kunnen worden ingeleverd bij de chemokar of in een speciale batterijcontainer voor klein chemisch afval (kca) worden gedeponeerd. Taïwan: Union européenne—instructions concernant l’élimination des déchets : Le symbole ci-dessus signifie que vous devez vous débarrasser de votre produit sans le mélanger avec les ordures ménagères, selon les normes et la législation de votre pays. Lorsque ce produit n’est plus utilisable, portez-le dans un centre de traitement des déchets agréé par les autorités locales. Certains centres acceptent les produits gratuitement. Le traitement et le recyclage séparé de votre produit lors de son élimination aideront à préserver les ressources naturelles et à protéger l’environnement et la santé des êtres humains.K Apple Inc. © 2007 Apple Inc. Tous droits réservés. En application des lois et conventions en vigueur, aucune reproduction totale ni partielle du manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Tout a été mis en œuvre pour que les informations pré- sentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression. Apple 1 Infinite Loop Cupertino, CA 95014-2084 408-996-1010 www.apple.com Apple, le logo Apple, AirPort, AirPort Express, AirPort Extreme, Exposé, FileVault, FireWire, GarageBand, iCal, iLife, iMovie, iPhoto, iPod, iSight, iTunes, Keynote, Mac, MacBook, Macintosh, Mac OS, MagSafe et SuperDrive sont des marques d’Apple Inc. déposées aux États-Unis et dans d’autres pays. Cover Flow, Finder, le logo FireWire, iPhone, iWeb, Safari et Spotlight sont des marques d’Apple Inc. AppleCare et Apple Store sont des marques de service d’Apple Inc. déposées aux États-Unis et dans d’autres pays. iTunes Store est une marque de service d’Apple Inc. ENERGY STAR® est une marque déposée aux États-Unis. Intel, Intel Core et Xeon sont des marques d’Intel Corp. aux États-Unis et dans d’autres pays. La marque et les logos Bluetooth® sont la propriété de Bluetooth SIG, Inc. et sont utilisés sous licence par Apple Inc. Les autres noms de produits et de sociétés sont la propriété de leurs détenteurs respectifs. Les produits commercialisés par des entreprises tierces ne sont mentionnés que pour information, sans aucune intention de préconisation ni de recommandation. Apple décline toute responsabilité quant à l’utilisation et au fonctionnement de ces produits. Fabriqué sous licence de Dolby Laboratories. « Dolby », « Pro Logic » et le logo double-D sont des marques déposées de Dolby Laboratories. Travaux confidentiels inédits. © 1992–1997 Dolby Laboratories, Inc. Tous droits réservés. Le produit décrit dans le présent manuel intègre des technologies de protection de droits d’auteur ellesmêmes protégées par divers brevets américains ainsi que d’autres droits de propriété intellectuelle appartenant à Macrovision Corporation et à d’autres détenteurs. L’utilisation de ces technologies de protection des droits d’auteurs doit être autorisée par Macrovision Corporation et est destinée à un cadre privé ou de visualisation restreinte, sauf consentement de Macrovision Corporation. Tout démontage ou ingénierie inverse est interdit. Réclamations concernant l’appareillage aux États-Unis. Brevets n˚ 4 631 603, 4 577 216, 4 819 098 et 4 907 093 sous licence à des fins de visualisation limitée uniquement. Publié simultanément aux États-Unis et au Canada. Mac OS X Server Mise à niveau et migration Pour Leopard version 10.5 Apple Inc. © 2007 Apple Inc. Tous droits réservés. Le propriétaire ou l’utilisateur autorisé d’un exemplaire enregistré du logiciel Mac OS X Server peut reproduire cette publication aux fins d’apprentissage du logiciel. Cette publication ne peut être reproduite ou transmise en tout ou partie à des fins commerciales, comme la vente de copies de cette publication ou la fourniture d’un service d’assistance payant. Tous les efforts nécessaires ont été mis en œuvre pour que les informations contenues dans ce manuel soient les plus exactes possibles. Apple Inc. n’est pas responsable des erreurs d’impression ou de reproduction. Apple 1 Infinite Loop Cupertino CA 95014-2084 www.apple.com Le logo Apple est une marque d’Apple Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option + 1) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale. Apple, le logo Apple, iChat, Mac, Macintosh, QuickTime, Xgrid et Xserve et WebObjects sont des marques d’Apple Computer, Inc. déposées aux États-Unis et dans d’autres pays. Finder est une marque d’Apple Inc. Adobe et PostScript sont des marques d’Adobe Systems Incorporated. Intel, Intel Core et Xeon sont des marques d’Intel Corp. aux États-Unis et dans d’autres pays. JavaTM et tous les logos et marques dérivés de Java sont des marques ou des marques déposées de Sun Microsystems, Inc. aux États-Unis et dans d’autres pays. PowerPCTM et le logo PowerPC TM sont des marques d’International Business Machines Corporation utilisées sous licence. UNIX est une marque de The Open Group. Les autres noms de sociétés et de produits mentionnés ici sont des marques de leurs détenteurs respectifs. La mention de produits tiers n’est effectuée qu’à des fins informatives et ne constitue en aucun cas une approbation ni une recommandation. Apple n’assume aucune responsabilité vis-à-vis des performances ou de l’utilisation de ces produits. F019-0937/01-09-2007 3 1 Table des matières Préface 5 À propos de ce guide 5 Contenu de ce guide 6 Utilisation de ce guide 6 Utilisation de l’aide à l’écran 7 Guides d’administration de Mac OS X Server 8 Visualisation de guides au format PDF à l’écran 8 Impression des guides PDF 9 Obtenir des mises à jour de documentation 9 Pour obtenir des informations supplémentaires Chapitre 1 11 Avant de commencer 11 Serveurs à partir desquels réaliser une mise à niveau ou une migration 11 Mise à niveau à la version 10.5 12 Migration vers la version 10.5 des serveurs antérieurs à la version 10.5 12 Migration à partir de Windows NT 12 Migration d’utilisateurs et de groupes 13 Enregistrement et réutilisation des comptes d’utilisateur et de groupe 13 Comptes système 15 Application d’un nouveau numéro de série Chapitre 2 17 Mise à niveau de Mac OS X Server 10.4 17 Éléments pouvant être réutilisés 18 Mise à niveau d’un maître Open Directory et de ses répliques 19 Instructions pas à pas 27 Mise à niveau du serveur web Apache vers la version 2.2 à partir de la version 1.3 Chapitre 3 29 Migration à partir de Mac OS X Server 10.4 29 Avant de commencer 30 Éléments pouvant migrer 31 Outils pouvant être utilisés 32 Instructions pas à pas Chapitre 4 51 Mise à niveau de Mac OS X Server 10.3 51 Éléments pouvant être réutilisés4 Table des matières 52 Mise à niveau d’un maître Open Directory et de ses répliques 53 Instructions pas à pas 61 Mise à niveau du serveur web Apache vers la version 2.2 à partir de la version 1.3 Chapitre 5 63 Migration à partir de Mac OS X Server 10.3 63 Avant de commencer 64 Éléments pouvant migrer 65 Outils pouvant être utilisés 66 Instructions pas à pas Chapitre 6 85 Migration à partir de Mac OS X Server 10.2 85 Avant de commencer 86 Éléments pouvant migrer 86 Outils pouvant être utilisés 87 Instructions pas à pas Chapitre 7 99 Migration vers Mac OS X Server à partir de Windows NT 100 Avant de commencer 100 Éléments pouvant migrer 101 Ce que les utilisateurs migrés peuvent faire 102 Planification de votre migration 107 Outils pouvant être utilisés 107 Outils de migration d’utilisateurs, de groupes et d’ordinateurs 108 Outils de migration du service de fichiers 108 Outils pour fournir à Windows l’accès au service d’impression 108 Instructions pas à pas 108 Migration d’utilisateurs, de groupes et d’ordinateurs 119 Migration du service de fichiers Windows 123 Accès de Windows au service d’impression Index 127 5 Préface À propos de ce guide Utilisez ce guide pour passer à Mac OS X Server 10.5 depuis une version antérieure du serveur ou pour faire migrer des données Windows NT vers Mac OS X Server 10.5. Mise à niveau et migration contient des instructions sur la réutilisation de données et de réglages de versions antérieures du serveur. Il existe deux approches :  Effectuez une installation de mise à niveau. Cette approche conserve l’ensemble de vos données et réglages et vous permet de réutiliser votre serveur pour Mac OS X Server 10.5. Vous pouvez effectuer une installation de mise à niveau de serveurs 10.4 et 10.3.  Faites migrer manuellement les données et réglages. Cette approche transfère les données et réglages vers un ordinateur distinct qui exécute Mac OS X Server 10.5. Vous pouvez faire migrer des données et des réglages depuis les versions 10.4, 10.3 et 10.2 du serveur. Contenu de ce guide Ce guide comprend les chapitres suivants :  Le Chapitre 1, « Avant de commencer » récapitule les options et la configuration requise pour la mise à niveau et la migration.  Le Chapitre 2, « Mise à niveau de Mac OS X Server 10.4 » décrit la mise à niveau d’un serveur 10.4.10 ou ultérieur vers la version 10.5.  Le Chapitre 3, « Migration à partir de Mac OS X Server 10.4 » décrit la migration de données d’un serveur 10.4.10 ou ultérieur vers un autre ordinateur exécutant la version 10.5.  Le Chapitre 4, « Mise à niveau de Mac OS X Server 10.3 » décrit la mise à niveau d’un serveur 10.3.9 vers la version 10.5.  Le Chapitre 5, « Migration à partir de Mac OS X Server 10.3 » décrit la migration de données d’un serveur 10.3.9 vers un autre ordinateur exécutant la version 10.5.  Le Chapitre 6, « Migration à partir de Mac OS X Server 10.2 » décrit la migration de données d’un serveur 10.2.8 vers un autre ordinateur exécutant la version 10.5.  Le Chapitre 7, « Migration vers Mac OS X Server à partir de Windows NT » décrit la migration de données d’un serveur Windows NT vers un ordinateur exécutant Mac OS X Server 10.5.6 PréfaceÀ propos de ce guide Utilisation de ce guide Ce guide est simple d’utilisation. Lisez le chapitre 1 pour vous assurer de bien comprendre toutes les possibilités. Consultez ensuite le chapitre qui traite de la stratégie de mise à jour ou de migration. Vous trouverez des instructions pas à pas sur la conservation et la réutilisation de données de serveur à l’aide de divers outils et techniques manuelles. Vous trouverez également des références à des instructions et des informations supplémentaires dans d’autres guides de la suite du serveur. La page suivante présente les documents de la suite et comment y accéder. Utilisation de l’aide à l’écran L’application Visualisation Aide permet d’obtenir des instructions à l’écran tout en gérant Leopard Server. L’aide peut être affichée sur un serveur ou sur un ordinateur administrateur. (Un ordinateur administrateur est un ordinateur Mac OS X sur lequel est installé le logiciel d’administration de serveur Leopard Server.) Pour obtenir de l’aide dans le cas d’une configuration avancée de Leopard Server : m Ouvrez Admin Serveur ou Gestionnaire de groupe de travail, puis :  Utilisez le menu Aide pour rechercher une tâche à exécuter.  Choisissez Aide > Aide Admin Serveur ou Aide > Aide Gestionnaire de groupe de travail avant d’explorer les rubriques d’aide et d’effectuer des recherches. L’Aide l’écran contient des instructions issues de Administration du serveur et d’autres guides d’administration avancés décrits dans « Guides d’administration de Mac OS X Server ». Pour visualiser les rubriques d’aide les plus récentes concernant les serveurs : m Assurez-vous que le serveur ou l’ordinateur administrateur est connecté à Internet pendant que vous consultez l’Aide. Visualisation Aide extrait automatiquement les rubriques d’aide les plus récentes depuis Internet et les stocke en mémoire cache. Lorsque vous n’êtes pas connecté à Internet, Visualisation Aide affiche les rubriques d’aide mises en cache.Préface À propos de ce guide 7 Guides d’administration de Mac OS X Server Premiers contacts couvre l’installation de base et les méthodes de configuration de départ pour une configuration avancée de Leopard Server, ainsi que pour une configuration standard ou de groupe de travail. Le guide avancé Administration du serveur aborde la planification, l’installation, la configuration et d’autres opérations de façon avancée. Une série de guides supplémentaires, énumérés ci-dessous, décrit la planification, la configuration, ainsi que la gestion avancée des services individuels.Vous pouvez obtenir ces guides au format PDF sur le site web de documentation de Mac OS X Server : www.apple.com/fr/server/documentation Ce guide ... explique comment : Premiers contacts et Feuille d’opération d’installation et de configuration Installer Mac OS X Server et le configurer pour la première fois. Administration de ligne de commande Installer, configurer et gérer Mac OS X Server à l’aide de fichiers de configuration et d’outils de ligne de commande UNIX. Administration des services de fichier Partager certains volumes ou dossiers de serveur entre les clients du serveur, à l’aide des protocoles AFP, NFS, FTP et SMB. Administration du service iCal Configurer et gérer le service de calendrier partagé d’iCal. Administration du service iChat Configurer et gérer le service de messagerie instantanée d’iChat. Configuration de la sécurité de Mac OS X Renforcer la sécurité des ordinateurs (clients) Mac OS X, comme l’exigent les entreprises et les organismes publics. Configuration de la sécurité de Mac OS X Server Renforcer la sécurité de Mac OS X Server et de l’ordinateur sur lequel il est installé, comme l’exigent les entreprises et les organismes publics. Administration du service de messagerie Configurer et gérer les services de messagerie IMAP, POP et SMTP sur le serveur. Administration des services de réseau Installer, configurer et administrer les services DHCP, DNS, VPN, NTP, coupe-feu IP, NAT et RADIUS sur le serveur. Administration d’Open Directory Configurer et gérer les services de répertoire et d’authentification, ainsi que configurer les clients autorisés à accéder aux services de répertoire. Administration de Podcast Producer Configurer et gérer le service Podcast Producer destiné à enregistrer, traiter et distribuer des podcasts. Administration du service d’impression Héberger les imprimantes partagées et gérer les files d’attente et travaux d’impression associés. Administration de QuickTime Streaming et Broadcasting Capturer et encoder du contenu QuickTime. Configurer et gérer le service QuickTime Streaming en vue de diffuser des données multimédias en temps réel ou à la demande. Administration du serveur Mettre en place l’installation et la configuration avancées du logiciel serveur et gérer des options qui s’appliquent à plusieurs services ou à l’intégralité du serveur.8 PréfaceÀ propos de ce guide Visualisation de guides au format PDF à l’écran Lorsque vous lisez la version PDF d’un guide à l’écran, vous pouvez :  Afficher les signets pour visualiser le plan du guide et cliquer sur un signet pour accéder directement à la section correspondante.  Rechercher un mot ou une phrase pour afficher une liste des endroits où ce mot ou cette phrase apparaît dans le document. Cliquez sur un de ces endroits pour afficher la page correspondante.  Cliquer sur une référence croisée pour accéder directement à la rubrique référencée. Cliquez sur un lien pour visiter le site web dans votre navigateur. Impression des guides PDF Si vous devez imprimer un guide, procédez comme suit pour économiser du papier et de l’encre :  Économisez de l’encre ou du toner en évitant d’imprimer la couverture.  Si vous disposez d’une imprimante couleur, économisez de l’encre en choisissant une option d’impression en niveaux de gris ou en noir et blanc dans une des sections de la zone de dialogue Imprimer.  Réduisez le volume du document imprimé et économisez du papier en imprimant plusieurs pages par feuille.Dans la zone de dialogue Imprimer, réglez Échelle sur 115 % (155 % pour Premiers contacts). Choisissez ensuite Mise en page dans le menu local sans titre. Si votre imprimante prend en charge l’impression recto verso (duplex),sélectionnez l’une des options proposées. Sinon, choisissez 2 dans le menu local Pages par feuille et, si vous le souhaitez, Simple extra fine dans le menu Bordure. (Si vous utilisez Mac OS X 10.4 ou antérieur, le réglage Échelle se trouve dans la zone de dialogue Format d’impression et les réglages relatifs à la mise en page dans la zone de dialogue Imprimer.) Administration de Mise à jour de logiciels et d’Imagerie système Utiliser NetBoot, NetInstall et Mise à jour de logiciels pour automatiser la gestion du système d’exploitation et des autres logiciels utilisés par les ordinateurs clients. Mise à niveau et migration Utiliser des réglages de données et de services correspondant à une version antérieure de Mac OS X Server ou de Windows NT. Gestion des utilisateurs Créer et gérer des comptes utilisateur, des groupes et des ordinateurs. Configurer les préférences gérées des clients Mac OS X. Administration des technologies web Configurer et gérer des technologies web telles que les blogs, WebMail, wiki, MySQL, PHP, Ruby on Rails (RoR) et WebDAV. Informatique à haute performance et administration Xgrid Configurer et gérer des grappes de calcul de systèmes Xserve et d’ordinateurs Mac. Glossaire Mac OS X Server Savoir à quoi correspondent les termes utilisés pour les produits de serveur et les produits de stockage. Ce guide ... explique comment :Préface À propos de ce guide 9 Il peut s’avérer utile d’agrandir les pages imprimées même si vous n’imprimez pas en recto verso, car la taille des pages PDF est inférieure à celle du papier d’imprimante standard. Dans la zone de dialogue Imprimer ou dans la zone de dialogue Format d’impression, essayez de régler Échelle sur 115 % (155 % pour Premiers contacts qui possède des pages de la taille d’un CD). Obtenir des mises à jour de documentation Apple publie régulièrement des pages d’aide révisées ainsi que de nouvelles éditions de ses guides. Certaines pages d’aide révisées sont des mises à jour des dernières éditions de ces guides.  Pour afficher les nouvelles rubriques d’aide à l’écran d’une application de serveur, assurez-vous que votre serveur ou votre ordinateur administrateur est connecté à Internet et cliquez sur le lien des dernières rubriques d’aide ou de mise à jour dans la page d’aide principale de l’application.  Pour télécharger les guides les plus récents en format PDF, rendez-vous sur le site web de documentation de Mac OS X Server : www.apple.com/fr/server/documentation Pour obtenir des informations supplémentaires Pour plus d’informations, consultez les ressources suivantes :  Documents Ouvrez-moi : mises à jour importantes et informations spécifiques. Recherchez-les sur les disques du serveur.  Site web de Mac OS X Server (www.apple.com/fr/server/macosx) : passerelle vers des informations détaillées sur de nombreux produits et technologies.  Site web de service et d’assistance Mac OS X Server (www.apple.com/fr/support/macosxserver) : accès à des centaines d’articles du service d’assistance d’Apple.  Site web de formation d’Apple (www.apple.com/fr/training) : cours dirigés par un instructeur et d’autoformation pour améliorer vos compétences d’administration serveur.  Groupes de discussions Apple, en anglais, (discussions.apple.com) : un moyen de partager questions, connaissances et conseils avec d’autres administrateurs.  Site web des listes d’envoi Apple, en anglais, (www.lists.apple.com) : abonnez-vous à des listes d’envoi afin de pouvoir communiquer par courrier électronique avec d’autres administrateurs.1 11 1 Avant de commencer Prenez un moment pour vous familiariser avec la configuration requise et les options de mise à niveau et de migration. Si vous utilisez Mac OS X Server 10.3 ou 10.4, il n’est peut-être pas nécessaire de faire migrer les données du serveur vers un autre ordinateur. Une mise à niveau de votre serveur peut s’avérer suffisante ; il s’agit d’un processus qui installe et configure Mac OS X Server 10.5 sur votre ordinateur serveur existant tout en conservant les données et les réglages de service. Serveurs à partir desquels réaliser une mise à niveau ou une migration Vous pouvez réutiliser les réglages et les données du serveur avec Mac OS X Server 10.5 en :  mettant à niveau la version 10.4.10 ou ultérieure du serveur ou la version 10.3.9 ;  effectuant une migration à partir des versions 10.4.10 ou ultérieures, de la version 10.3.9 ou de la version 10.2.8 ;  effectuant une migration à partir de Windows NT. Mise à niveau à la version 10.5 Vous pouvez mettre à niveau la version 10.4.10 ou ultérieure ou la version 10.3.9 de votre serveur à la version 10.5 ou ultérieure si :  vous n’avez pas besoin de reformater le disque dur de l’ordinateur actuel ;  le matériel de votre serveur est équipé des éléments suivants :  un processeur Intel ou PowerPC G5 ou G4 cadencé à 1 GHz ou plus ;  au moins 1 Go de mémoire vive (RAM) ;  20 Go minimum d’espace disque disponible. La mise à niveau d’un serveur consiste à installer une mise à niveau sur votre ordinateur serveur à partir des disques d’installation du serveur.Vos données et vos réglages sont conservées automatiquement, et vous n’avez que très peu de réglages manuels à effectuer. Remarque :Mac OS X Server 10.5 ne prend pas en charge le Gestionnaire Macintosh.12 Chapitre 1Avant de commencer Migration vers la version 10.5 des serveurs antérieurs à la version 10.5 Même si votre serveur existant respecte la configuration minimale requise pour la mise à niveau, il est parfois préférable d’effectuer une migration. Par exemple, il se peut que vous soyez en train de mettre des ordinateurs à jour et que vous décidiez de rétablir votre environnement serveur sur des ordinateurs plus récents. Les migrations à partir des versions 10.4.10 ou ultérieures, 10.3.9 et 10.2.8 de Mac OS X Server sont prises en charge. Effectuer une migration consiste à installer et à configurer Mac OS X Server 10.5 sur un ordinateur, à restaurer sur cet ordinateur désormais équipé de la version 10.5 les fichiers qui se trouvent sur l’ordinateur tournant sous la version antérieure à la version 10.5, puis à effectuer les réglages manuels éventuellement nécessaires. Remarque :la migration des données du Gestionnaire Macintosh n’est pas prise en charge. Vous devez effectuer une migration, et non une mise à niveau, vers la version 10.5 de Mac OS X Server si :  le disque dur de votre serveur 10.2.8, 10.3.9, 10.4.10 ou ultérieur a besoin d’être reformaté.  votre serveur 10.2.8, 10.3.9, 10.4.10 ou ultérieur ne dispose pas de :  un processeur Intel ou PowerPC G5 ou G4 cadencé à 1 GHz ou plus ;  au moins 1 Go de mémoire vive (RAM) ;  au moins 20 Go d’espace disque disponible ;  vous souhaitez déplacer sur un autre serveur les données et les réglages que vous utilisiez sur un serveur 10.2.8, 10.3.9, 10.4.10 ou ultérieur ;  la version du serveur que vous utilisiez jusqu’à présent est antérieure à la version 10.2.8. Migration à partir de Windows NT Mac OS X Server permet d’offrir divers services aux utilisateurs d’ordinateurs tournant sous Microsoft Windows 95, 98, ME (Millennium Edition), XP, Vista, NT 4 et 2000. En fournissant ces services, Mac OS X Server peut remplacer les serveurs Windows NT dans les petits groupes de travail. Le chapitre 7, « Migration vers Mac OS X Server à partir de Windows NT » explique comment importer des utilisateurs, des groupes et des ordinateurs dans un contrôleur de domaine principal (PDC) Mac OS X Server depuis un serveur Microsoft Windows NT. Il fournit également des explications sur la migration des répertoires de départ, des points de partage et des informations de configuration du serveur. Migration d’utilisateurs et de groupes Toutes les versions de Mac OS X Server à partir desquelles vous pouvez effectuez une migration sont prises en charge par les outils conçus pour vous aider à déplacer les comptes utilisateurs et de groupe depuis un serveur existant vers un serveur 10.5.Chapitre 1 Avant de commencer 13 Enregistrement et réutilisation des comptes d’utilisateur et de groupe Pour enregistrer les comptes utilisateurs et de groupe destinés à être importés ultérieurement, créez une copie de sauvegarde de la base de données du maître Open Directory ou exportez les comptes utilisateurs et de groupe à l’aide du Gestionnaire de groupe de travail. Pour restaurer les comptes utilisateurs et de groupe, restaurez la base de données du maître Open Directory ou utilisez le Gestionnaire de groupe de travail ou l’outil dsimport. Chaque chapitre traitant de la migration fournit des instructions relatives à l’utilisation de ces outils. Comptes système Lorsque vous installez Mac OS X Server, plusieurs comptes utilisateurs et de groupe sont créés dans le répertoire local. Ces comptes sont parfois appelés comptes système parce qu’ils sont utilisés par le logiciel système du serveur. Pour savoir comment les comptes prédéfinis sont utilisés, reportez-vous à Gestion des utilisateurs. Il n’est pas possible de modifier le nom des identifiants des comptes système. Il est donc inutile d’essayer de le faire lorsque vous faites migrer des utilisateurs et des groupes. En revanche, vous pouvez, lors de la migration, ajouter des utilisateurs aux deux groupes système — admin et wheel :  Les groupes wheel et admin offrent la possibilité à leurs membres d’utiliser la commande su (substitut d’utilisateur) de l’application Terminal pour ouvrir une session en tant qu’utilisateur root sur un ordinateur distant (pour pouvoir se servir de la commande su, les membres de ces groupes doivent connaître le mot de passe root). Utilisez la commande ssh pour ouvrir une session, tapez su, puis indiquez le mot de passe root lorsque vous y êtes invité.  Les membres du groupe admin ont le droit d’administrer Mac OS X Server. Les utilisateurs admin peuvent utiliser les applications de gestion du serveur et installer des logiciels qui nécessitent des autorisations administrateur. Par défaut, les membres du groupe admin peuvent obtenir le privilège root à l’aide de la commande sudo. Voici les comptes d’utilisateur prédéfinis : Nom Nom abrégé Id. Util. Utilisateur sans autorisation nobody -2 Administrateur système root 0 Services système daemon 1 Services d’impression lp 26 Utilisateur Postfix postfix 27 Clé VPN MPPE vpn_nnnnnnnnnnnn 57 Serveur World Wide Web www 7014 Chapitre 1Avant de commencer Voici les groupes prédéfinis : Utilisateur Apple Events eppc 71 Serveur MySQL MySQL 74 sshd (séparation des autorisations) sshd 75 QuickTime Streaming Server (QTSS) qtss 76 Utilisateur Cyrus IMAP cyrus 77 Utilisateur Mailman mailman 78 Serveur d’applications appserver 79 Utilisateur Clamav clamav 82 Utilisateur Amavisd amavisd 83 Utilisateur Jabber jabber 84 Xgrid Controller xgridcontroller 85 Xgrid Agent xgridagent 86 Propriétaire de l’application appowner 87 WindowServer WindowServer 88 Utilisateur inconnu unknown 99 Nom Nom abrégé Id. Util. Nom abrégé Id. de groupe nobody -2 nogroup -1 wheel 0 daemon 1 kmem 2 sys 3 tty 4 operator 5 mail 6 bin 7 staff 20 lp 26 postfix 27 postdrop 28 utmp 45 uucp 66 dialer 68Chapitre 1 Avant de commencer 15 Application d’un nouveau numéro de série Si vous effectuez une mise à niveau vers Mac OS X Server 10.5 à partir de la version 10.4, vous devez configurer votre système de façon à ce qu’il utilise un numéro de série prévu pour la version 10.5. network 69 www 70 MySQL 74 sshd 75 qtss 76 mailman 78 appserverusr 79 admin 80 appserveradm 81 clamav 82 amavisd 83 jabber 84 xgridcontroller 85 xgridagent 86 appowner 87 WindowServer 88 accessibility 90 unknown 99 Nom abrégé Id. de groupe2 17 2 Mise à niveau de Mac OS X Server 10.4 Suivez les instructions qui apparaissent dans ce chapitre pour mettre à niveau un serveur 10.4.10 ou ultérieur vers la version 10.5. Vous pouvez mettre à niveau les ordinateurs qui tournent sous Mac OS X Server 10.4.10 ou ultérieur si leur disque dur n’a pas besoin d’être reformaté et s’ils présentent les caractéristiques suivantes :  un processeur Intel ou PowerPC G4 ou G5 cadencé à 867 MHz ou plus ;  au moins 1 Go de mémoire vive (RAM) ;  au moins 20 Go d’espace disque disponible. Éléments pouvant être réutilisés Lorsque vous effectuez une mise à niveau à partir de Mac OS X Server 10.4.10 ou ultérieur, quasiment toutes les données et tous les réglages existants sont conservés et peuvent être réutilisés.Toutefois, tenez compte des remarques suivantes :  Il est possible de réutiliser les images NetBoot créées avec les versions 10.3 et 10.4 de Mac OS X Server,mais pas celles qui ont été créées avec des versions antérieures.  Lorsque vous effectuez une mise à niveau vers Mac OS X Server 10.5, les démons de lancement (/Système/Bibliothèque/LaunchDaemons) sont remplacés par leur version Mac OS X Server 10.5.  Les mises à niveau vers la version 10.5 suppriment l’application QTSS Publisher mais laissent les fichiers utilisés par celle-ci. En principe, ces fichiers doivent continuer à fonctionner normalement avec la version 10.5,mais vous devez les déplacer jusqu’aux emplacements appropriés. Pour en savoir plus sur le déplacement de ces fichiers, reportez-vous à « Fichiers et dossiers de QTSS Publisher » à la page 48.18 Chapitre 2Mise à niveau de Mac OS X Server 10.4  PHP :Hypertext Preprocessor (PHP) 4 deviendra obsolète le 31 décembre 2007, et plus aucun correctif de sécurité critique ne sera mis au point après le 8 août 2008, comme annoncé sur le site web www.php.net. Si vous effectuez une mise à niveau vers Mac OS X Server 10.5 et que vous conservez PHP 4.4.x et Apache 1.3,songez à passer à PHP 5.x et Apache 2.2 avant le 8 août 2008 afin d’assurer la continuité de la sécurité de PHP. Remarque :le Gestionnaire Macintosh n’est pas pris en charge sous Mac OS X Server 10.5. Mise à niveau d’un maître Open Directory et de ses répliques Si le serveur que vous voulez mettre à niveau est un maître ou une réplique Open Directory, mettez tout d’abord à niveau le maître, et ensuite les répliques. Pour mettre à niveau le maître et ses répliques : 1 Mettez le maître à niveau vers la version 10.5 en suivant les instructions indiquées dans « Instructions pas à pas » à la page 19. Pendant la mise à niveau du maître, les ordinateurs clients ne peuvent pas se connecter à ce dernier pour accéder aux services Open Directory. Il se peut que les ordinateurs clients aient à patienter un peu à cause d’un délai lors de la recherche automatique d’une réplique de serveur Open Directory. Vous pouvez supprimer ce délai en modifiant le service DHCP de sorte qu’il utilise l’adresse d’une réplique de serveur Open Directory si le serveur fournit une adresse de serveur LDAP aux clients. Lorsque la mise à niveau du maître est terminée, vous pouvez modifier le service DHCP pour utiliser l’adresse du maître. Pour obtenir des instructions sur la configuration des réglages LDAP relatifs au service DHCP, reportez-vous à Administration des services de réseau. 2 Mettez chaque réplique de serveur à niveau vers la version 10.5. 3 À l’aide d’Admin Serveur, connectez-vous à chaque réplique de serveur, puis reconnectez les répliques avec le maître. Pour obtenir des informations sur la réinitialisation des mots de passe sur le maître, consultez la section « Services de répertoire » à la page 25.Chapitre 2 Mise à niveau de Mac OS X Server 10.4 19 Instructions pas à pas Pour mettre à niveau un serveur 10.4.10 ou ultérieur vers la version 10.5,suivez les instructions de cette rubrique. Étape 1 :mettez votre serveur à jour vers la version 10.4.10 ou ultérieure Au besoin, servez-vous de la Mise à jour de logiciels pour mettre votre serveur à jour vers la version 10.4.10 ou ultérieure. Étape 2 :enregistrez tous les réglages de service Utilisez serveradmin ou Admin Serveur pour exporter tous les réglages de service pour pouvoir vous y reporter ultérieurement. Par ailleurs,servez-vous des Informations Système pour générer un profil complet de votre système. Enregistrez les réglages de service exportés et le profil de votre serveur sur un disque amovible ou sur un autre système. Important :avant la mise à niveau, il est également recommandé de créer un clone complet et démarrable du serveur et de le tester en le démarrant afin de disposer d’une copie de sauvegarde au cas où elle s’avérerait nécessaire par la suite. Étape 3 :enregistrez les réglages du service d’impression Enregistrez les réglages du service d’impression à l’aide de la commande serveradmin settings print avant de démarrer la mise à niveau. serveradmin settings print > exported_print_settings Par ailleurs, consignez le nom et l’identifiant des files d’attente CUPS afin de pouvoir les utiliser ultérieurement. Étape 4 :effectuez une mise à niveau vers la version 10.5 Vous pouvez vous servir du disque d’installation de la version 10.5 pour effectuer la mise à niveau au niveau local sur votre ordinateur serveur si ce dernier est relié à un écran, à un clavier et à un lecteur optique. 1 Mettez votre serveur à jour vers la dernière version 10.3 du serveur. 2 Effectuez une installation de mise à niveau vers la version 10.4. 3 Effectuez les réglages nécessaires après l'installation initiale du serveur.20 Chapitre 2Mise à niveau de Mac OS X Server 10.4 Une fois la mise à niveau terminée, l’ordinateur redémarre et l’Assistant du serveur vous indique la marche à suivre pour la configuration initiale de ce dernier. Vos réglages existants sont affichés et vous pouvez les modifier si vous le souhaitez. Pour effectuer une mise à niveau vers la version 10.5 et configurer les réglages initiaux du serveur au niveau local : 1 Assurez-vous que les serveurs DHCP ou DNS dont dépend votre serveur sont en marche. 2 Allumez l’ordinateur et insérez le disque d’installation dans le lecteur optique. 3 Redémarrez le serveur tout en maintenant la touche C du clavier enfoncée. L’ordinateur démarre à partir du disque d’installation. Vous pouvez relâcher la touche C lorsque le logo Apple s’affiche. Pour obtenir des informations sur le redémarrage d’un système Xserve sans périphérique de contrôle, reportez-vous au Guide de l’utilisateur qui vous a été fourni avec le système. 4 Lorsque le programme d’installation s’ouvre, suivez les instructions à l’écran de chaque sous-fenêtre en cliquant sur Continuer pour passer à la suivante. Remarque :dans la sous-fenêtre Sélectionner une destination, assurez-vous de sélectionner le disque ou la partition sur lequel la version 10.4.10 ou ultérieure est installée. Au cours de l’installation, l’état d’avancement des opérations est affiché. Une fois l’installation terminée, l’ordinateur redémarre et l’Assistant du serveur s’ouvre pour vous permettre de procéder à la configuration initiale du serveur. 5 Avancez dans les sous-fenêtres de l’Assistant en suivant les instructions affichées. Vos réglages existants sont affichés dans les sous-fenêtres, mais vous pouvez les modifier si vous le souhaitez. Pour chaque serveur que vous mettez à niveau, saisissez un numéro de série unique de logiciel serveur. Vous trouverez ce numéro imprimé sur les documents fournis avec le logiciel. Si vous possédez une licence de site, vous devez saisir le nom du propriétaire enregistré et l’organisation exactement tels qu’ils ont été spécifiés par votre représentant Apple. Une fois entrées les données de configuration, l’Assistant du serveur affiche un résumé des données. 6 Révisez les données de configuration, et cliquez sur Revenir si vous souhaitez les modifier. 7 Pour lancer la configuration du serveur, cliquez sur Appliquer. 8 Au terme de la configuration du serveur, cliquez sur Redémarrer. Remarque :il se peut que vous deviez démarrer manuellement le service de messagerie après la mise à niveau du serveur.Chapitre 2 Mise à niveau de Mac OS X Server 10.4 21 Pour effectuer une mise à niveau vers la version 10.5 et configurer à distance les réglages initiaux du serveur : 1 Assurez-vous que les serveurs DHCP ou DNS dont dépend votre serveur sont en marche. 2 Démarrez l’ordinateur à partir du disque d’installation. La procédure suivie dépend de la présence ou de l’absence sur le serveur cible d’un lecteur optique capable de lire votre disque d’installation. Si vous disposez d’un DVD d’installation, le lecteur optique doit pouvoir lire les DVD. Si le serveur cible est muni d’un clavier et d’un lecteur optique capable de lire votre disque d’installation, insérez ce dernier dans le lecteur optique, puis redémarrez l’ordinateur tout en maintenant la touche C du clavier enfoncée. Si le serveur cible est un système Xserve équipé d’un lecteur optique intégré capable de lire votre disque d’installation, démarrez le serveur à l’aide du disque d’installation en suivant les instructions du Guide de l’utilisateur Xserve relatives au démarrage à partir d’un disque système. Si le serveur cible ne dispose pas d’un lecteur optique intégré capable de lire votre disque d’installation, vous pouvez le démarrer en mode disque cible et insérer le disque d’installation dans le lecteur optique de votre ordinateur administrateur.Vous pouvez aussi vous servir d’un lecteur optique FireWire externe. Si le serveur cible est un système Xserve, vous pouvez déplacer son module de disque sur un autre système Xserve équipé d’un lecteur optique capable de lire votre disque d’installation. Vous trouverez des instructions relatives à l’utilisation du mode disque cible et des lecteurs optiques externes dans le guide Présentation, dans le guide Premiers contacts ou dans le Guide de l’utilisateur fournis avec votre système Xserve ou votre ordinateur Macintosh. 3 Sur un ordinateur administrateur, naviguez jusqu’à /Applications/Server/, ouvrez l’Assistant du serveur (il n’est pas nécessaire que vous disposiez des privilèges d’administrateur sur l’ordinateur local pour pouvoir utiliser l’Assistant du serveur), puis sélectionnez « Installer les logiciels sur un serveur distant ». 4 Identifiez le serveur que vous souhaitez mettre à niveau. Si celui-ci se trouve sur le sous-réseau local, sélectionnez-le dans la liste. Sinon, cliquez sur Serveur à l’adresse IP puis saisissez une adresse IP au format IPv4 (000.000.000.000). 5 Lorsque vous êtes invité à saisir un mot de passe, tapez l’ancien mot de passe d’administrateur. 6 Avancez dans les écrans d’installation en suivant les instructions affichées.22 Chapitre 2Mise à niveau de Mac OS X Server 10.4 7 Lorsque la sous-fenêtre Volumes apparaît,sélectionnez un disque ou un volume (partition) cible et cliquez sur Continuer. Au cours de l’installation, l’état d’avancement des opérations est affiché. Une fois l’installation terminée, l’ordinateur redémarre, puis l’Assistant du serveur s’ouvre et une sous-fenêtre Bienvenue apparaît. 8 Pour lancer la configuration du serveur, sélectionnez « Configurer un serveur distant » et cliquez sur Continuer. 9 Dans la colonne Appliquer de la sous-fenêtre Destination, cochez le serveur que vous mettez à niveau, puis tapez son mot de passe prédéfini dans le champ Mot de passe et cliquez sur Continuer pour vous connecter au serveur. Si le serveur n’apparaît pas dans la liste, cliquez sur Ajouter pour l’ajouter ou Actualiser pour voir s’il est disponible. 10 Avancez dans les sous-fenêtres de l’Assistant en suivant les instructions affichées. Vos réglages existants sont affichés dans les sous-fenêtres, mais vous pouvez les modifier si vous le souhaitez. Pour chaque serveur que vous mettez à niveau, vous devez saisir un numéro de série unique de logiciel serveur.Vous trouverez ce numéro imprimé sur les documents fournis avec le logiciel. Si vous possédez une licence de site,saisissez le nom du propriétaire enregistré et celui de son organisation tels qu’ils ont été spécifiés par votre représentant Apple. Une fois entrées les données de configuration, l’Assistant du serveur affiche un résumé des données. 11 Révisez les données de configuration, en cliquant de manière facultative sur Revenir pour les modifier. 12 Pour lancer la configuration du serveur, cliquez sur Appliquer. 13 Au terme de la configuration du serveur, cliquez sur Redémarrer. Remarque :il se peut que vous deviez démarrer manuellement le service de messagerie après la mise à niveau du serveur. Étape 5 :procédez aux ajustements nécessaires au terme de la configuration initiale du serveur Vous pouvez désormais utiliser le Gestionnaire de groupe de travail, Admin Serveur, Terminal ainsi que d’autres applications pour affiner les réglages de votre serveur et tirer parti des nouvelles fonctionnalités de la version 10.5. Pour obtenir des explications relatives aux nouvelles fonctionnalités et à celles qui ont été modifiées, reportez-vous au guide d’administration de chaque service.Voici quelques suggestions intéressantes.Chapitre 2 Mise à niveau de Mac OS X Server 10.4 23 Réglages du service d’impression Pour restaurer les réglages du service d’impression, vous devez tout d’abord créer à nouveau les files d’attente CUPS d’origine avant d’importer les réglages enregistrés. Dans le cas des imprimantes connectées directement au serveur via un port USB, le système d’impression CUPS crée les files d’attente dès que vous connectez ces imprimantes au serveur et les allumez. Toutefois, vous devez ajouter les imprimantes réseau en cliquant sur Admin Serveur > Imprimer (pour les imprimantes LPR ou AppleTalk) ou sur Préférences Système > Imprimantes et fax (pour tous les types d’imprimante). Important :lorsque vous créez à nouveau une file d’attente CUPS, assurez-vous de lui redonner le même nom que celui qu’elle avait avant le processus de mise à niveau. Si le nom est différent, Admin Serveur n’importe pas les réglages correctement. Important :si vous créez les files d’attente d’impression à l’aide de la sous-fenêtre Imprimantes et fax des Préférences Système, indiquez « Postscript générique (PPD générique) » pour toute file d’attente appliquant des quotas étant donné qu’il existe des problèmes connus avec les gestionnaires d’impression de tierce partie et les quotas CUPS. Pour en savoir plus à ce sujet, reportez-vous à l’article de la Base de connaissances que vous trouverez à l’adresse suivante : http://docs.info.apple.com/article.html?artnum=303538. Une fois les files d’attente d’impression créées, importez les réglages enregistrés : réglages serveradmin exported_print_settings WebObjects Restaurez httpd.conf à la version précédente (httpd.conf.AppleSaved), ou incluez la ligne suivante dans le nouveau fichier httpd.conf : Include /Système/Bibliothèque/WebObjects/Adaptors/Apache/apache.conf Si vous n’avez pas installé JavaTM 1.4.2 sur votre serveur 10.4.10 ou ultérieur, vous devez mettre manuellement à jour les projets d’application WebObjects pour pouvoir utiliser la version de la Machine virtuelle Java (JVM, Java Virtual Machine) qui vous a été fournie avec la version 10.5.24 Chapitre 2Mise à niveau de Mac OS X Server 10.4 Pour mettre à jour un projet WebObjects : 1 Ouvrez le projet dans Xcode. 2 Dans la présentation Expert des réglages de la cible principale, changez la valeur de la propriété de JAVA_VM à java. Remarque :les services JavaMonitor et WebObjects Task Daemon (wotaskd) sont désormais gérés par launchd, et il est possible d’y accéder par l’intermédiaire d’Admin Serveur. Si le serveur que vous mettez à niveau comprend l’élément de démarrage /Système/Bibliothèque/StartupItems/WebObjects, vous pouvez l’ignorez. En effet, cet élément est désactivé par défaut, et il n’est pas nécessaire pour le démarrage automatique des services WebObjects avec Mac OS X Server 10.5. Pour en savoir plus, reportez-vous à Administration des technologies web et Déploiement de WebObjects. Certificats Secure Sockets Layer (SSL) Servez-vous d’Admin Serveur pour importer les certificats SSL existants que vous souhaitez continuer à utiliser pour les services iChat,Open Directory, de messagerie ou web. Pour importer un certificat SSL : 1 Ouvrez Admin Serveur. 2 Dans la liste des ordinateurs et des services, sélectionnez le serveur mis à niveau. 3 Cliquez sur Certificats. 4 Importez les certificats que vous souhaitez utiliser. Vous pouvez aussi créer un certificat auto-signé et générer une demande de signature de certificat (CSR, Certificate Signing Request) afin d’obtenir un certificat SSL délivré par une autorité de certificat, puis installer celui-ci. 5 Cliquez sur Enregistrer. 6 Activez les certificats de chaque service. Pour en savoir plus sur l’importation, la création et l’activation des certificats auto-signés, reportez-vous à Administration du service iChat, à Administration du service de messagerie, Administration d’Open Directory et à Administration des technologies web. Groupes Si vous souhaitez que les groupes puissent utiliser les nouvelles fonctionnalités de la version 10.5 telles que l’emboîtement et la vérification plus stricte de l’adhésion de groupe, mettez les fiches de groupe à niveau à l’aide du Gestionnaire de groupe de travail. Pour mettre à niveau un enregistrement de groupe : 1 Ouvrez Gestionnaire de groupe de travail. 2 Ouvrez le répertoire qui contient les groupes concernés. 3 Sélectionnez un ou plusieurs groupes, puis cliquez sur « Mettre à niveau le groupe hérité ». 4 Cliquez sur Enregistrer.Chapitre 2 Mise à niveau de Mac OS X Server 10.4 25 Services de répertoire Après la mise à niveau, il est conseillé de convertir un répertoire NetInfo partagé en LDAP. Pour obtenir des informations sur les avantages de l’utilisation du protocole LDAP et pour savoir comment effectuer la conversion à l’aide d’Admin Serveur, reportez-vous à Administration d’Open Directory. Si vous souhaitez activer Kerberos pour un maître Open Directory pour lequel il n’est pas activé,servez-vous de la commande suivante qui permet de conserver les mots de passe existants et de les ajouter à un nouveau centre de distribution de clés (KDC, Key Distribution Center) : slapconfig -kerberize Si vous avez des comptes utilisateurs qui fonctionnent avec des mots de passe chiffrés et que vous ne kerbérisez pas ces derniers à l’aide de la commande ci-dessus, vous pouvez vous servir du Gestionnaire de groupe de travail pour les mettre à niveau et les convertir ainsi en mots de passe Open Directory. Pour utiliser le Gestionnaire de groupe de travail, ouvrez l’application, puis accédez au répertoire dans lequel réside le compte utilisateur. Authentifiez-vous en tant qu’administrateur de domaine, puis sélectionnez un utilisateur avec un mot de passe crypté. Cliquez sur Avancé, choisissez Open Directory dans le menu local Type du mot de passe, cliquez sur Élémentaires,spécifiez un nouveau mot de passe, puis cliquez sur Enregistrer. Pour en savoir plus sur slapconfig, reportez-vous à sa page man. Listes de contrôle d’accès LDAP En raison d’un changement de format, vous devez déplacer manuellement les listes de contrôle d’accès (ACL, Access Control List) LDAP une fois la mise à niveau terminée. Pendant le processus de mise à niveau, le contenant ou la fiche des contrôles d’accès (accesscontrols) et des informations relatives aux listes de contrôles n’est disponible qu’en lecture seule. Ajoutez des listes de contrôle d’accès personnalisées au nouvel attribut olcAccess (dans olcBDBConfig).Vous devez aussi vous servir de la directive set au lieu de la directive group.26 Chapitre 2Mise à niveau de Mac OS X Server 10.4 Schémas LDAP Si vous mettez à jour le fichier slapd.conf lors de l’ajout de fichiers de schéma, exécutez la commande slaptest. Cette commande permet d’identifier le changement correspondant à l’ajout du nouveau schéma et de le rendre persistant dans la base de données. Pour exécuter la commande slaptest : 1 Créez une copie de sauvegarde du répertoire slapd.d (dans /etc/openldap). 2 Exécutez la commande suivante pour spécifier un autre fichier slapd.conf : slaptest -f -F 3 Comparez l’ancien répertoire slapd.d et le nouveau pour déterminer les modifications à effectuer. 4 Relancez slapd. DNS La première fois que vous sélectionnez DNS dans Admin Serveur après une mise à niveau, Admin Serveur vous demande si vous souhaitez effectuer une mise à niveau. Si vous cliquez sur « Ne pas mettre à niveau », Admin Serveur ne modifie pas les fichiers de configuration du service DNS qui existaient avant la mise à niveau vers la version 10.5. Le service DNS continue de s’exécuter, mais il n’est plus possible de modifier sa configuration à l’aide d’Admin Serveur. Si des changements sont nécessaires, vous devez modifier les fichiers de configuration du service DNS. Si vous cliquez sur Mettre à niveau, Admin Serveur met les fichiers de configuration à niveau au format de la version 10.5. Ceci fait, vous pouvez vous servir d’Admin Serveur pour apporter des modifications à la configuration du service DNS. Images NetBoot Après la mise à niveau, vous pouvez réutiliser les images NetBoot créées avec les versions 10.3 et 10.4. Pour gérer les images Netboot, utilisez l’Utilitaire d’images de système, qui remplace l’Utilitaire d’images de réseau pendant la mise à niveau. Historique de la mise à niveau d’Open Directory Les informations relatives à la mise à niveau du serveur LDAP Open Directory sont stockées dans le fichier /Bibliothèque/Logs/slapconfig.log. Service Web Si vous avez apporté des modifications à /etc/httpd/workers.properties, appliquez à nouveau celles-ci à la version du fichier installée avec Mac OS X Server 10.5.Chapitre 2 Mise à niveau de Mac OS X Server 10.4 27 Mise à niveau du serveur web Apache vers la version 2.2 à partir de la version 1.3 Lorsque vous effectuez une mise à niveau de Mac OS X Server 10.4.10 ou ultérieur vers Mac OS X Server 10.5, le processus de mise à niveau maintient la configuration de service web utilisée pour exécuter Apache 1.3. Pour passer à la version 2.2 d’Apache après la mise à niveau vers Mac OS X Server 10.5, utilisez l’option du service web conçue pour la mise à niveau d’Apache accessible depuis Admin Serveur. Pour effectuer la mise à niveau vers Apache 2.2 : 1 Ouvrez Admin Serveur. 2 Dans la liste des ordinateurs et des services, sélectionnez Web. 3 Cliquez sur Vue d’ensemble, puis sur « Mettre à niveau la version d’Apache ». 4 Cliquez sur 2.2. 5 Cliquez sur Continuer. 6 Une fois la mise à niveau effectuée, cliquez sur Fermer. 7 Dans la sous-fenêtre Vue d’ensemble, vérifiez que la version d’Apache est bien la 2.2. Important :Apache 2.2 s’exécute en tant que processus 64 bits si le matériel est adéquat, mais Apache 1.3 ne fonctionne qu’en 32 bits. Pour en savoir plus sur la mise à niveau vers Apache 2.2, reportez-vous à Administration des services de réseau. AVERTISSEMENT :il est possible que l’exécution du script de conversion d’Apache 1 à Apache 2 ait des effets secondaires, notamment sur les réglages liés à la sécurité, ce qui aura des répercussions sur la sécurité de votre mise à niveau.3 29 3 Migration à partir de Mac OS X Server 10.4 Suivez les instructions de ce chapitre si vous devez faire migrer des données d’un serveur 10.4.10 ou ultérieur vers un autre ordinateur tournant sous la version 10.5. Il est possible de faire migrer les données qui se trouvent sur des ordinateurs Mac OS X Server 10.4.10 ou ultérieurs même si ceux-ci ne peuvent être ou ne seront pas mis à niveau vers la version 10.5 ou ultérieure. Il se peut que ces ordinateurs :  requièrent que leur disque dur soit reformaté ou nécessitent un remplacement par un ordinateur plus récent ;  utilisent un matériel de serveur qui ne dispose pas des éléments suivants :  un processeur Intel ou PowerPC G4 ou G5 cadencé à 867 MHz ou plus ;  au moins 1 Go de mémoire vive (RAM) ;  au moins 20 Go d’espace disque disponible. Avant de commencer Avant de suivre les instructions de ce chapitre, procédez à la configuration initiale du serveur 10.5 vers lequel vous ferez migrer les données. Pour obtenir des instructions, consultez la section Premiers contacts. Au besoin, mettez à niveau le serveur dont vous ferez migrer les données de sorte qu’il tourne sous la version 10.4.10 ou ultérieure. Si le serveur est un maître ou une réplique Open Directory, configurez tout d’abord le maître 10.5, puis les répliques 10.5. Pour rétablir le maître et ses répliques : 1 Configurez le maître 10.5. Pendant la configuration du maître, les ordinateurs clients ne peuvent pas se connecter au maître 10.4.10 ou ultérieur pour accéder aux services Open Directory.30 Chapitre 3Migration à partir de Mac OS X Server 10.4 En outre, il se peut que les ordinateurs clients aient à patienter un peu à cause d’un délai lors de la recherche automatique de la réplique de serveur Open Directory la plus proche. Vous pouvez remédier à ce retard en modifiant le service DHCP pour utiliser l’adresse d’un serveur réplique Open Directory s’il fournit aux clients l’adresse d’un serveur LDAP. Lorsque le maître 10.5 est prêt, vous pouvez modifier le service DHCP de sorte qu’il utilise l’adresse du maître. Pour obtenir des instructions sur la configuration des réglages LDAP relatifs au service DHCP, reportez-vous à Administration des services de réseau. 2 Modifiez le rôle de la réplique 10.4.10 ou ultérieure de sorte qu’elle soit autonome, puis configurez le serveur 10.5 pour en faire une réplique du maître 10.5. Pour obtenir des instructions sur la modification du rôle Open Directory d’un serveur afin de rendre ce dernier autonome et d’en faire une réplique, reportez-vous à Administration d’Open Directory. Pour obtenir des informations sur la réinitialisation des mots de passe sur le maître, consultez l’étape 6 page 40. Éléments pouvant migrer Les informations qui apparaissent dans « Instructions pas à pas » à la page 32 expliquent comment réutiliser les données de la version 10.4 indiquées ci-dessous avec la version 10.5 :  Données de configuration Web  Contenu Web  Données MySQL  Base de données de courrier  Données WebMail  Fichiers de configuration FTP  Réglages du serveur LDAP  Images NetBoot  Applications et structures WebObjects  Données Tomcat  Applications JBoss  Réglages AFP  Réglages SMB  Configuration de coupe-feu IP  Réglages DNS  Réglages DHCP  Réglages NAT  Réglages d’impressionChapitre 3 Migration à partir de Mac OS X Server 10.4 31  Réglages VPN  Données utilisateur, notamment les répertoires de départ  Fichiers et dossiers du Serveur d’enchaînement QuickTime  Fichiers et dossiers de QTSS Publisher  Comptes d’utilisateur et de groupe  Réglages du serveur iChat Utilisez serveradmin ou Admin Serveur pour exporter tous les réglages de service afin de pouvoir vous y reporter ultérieurement. Enregistrez les réglages de service exportés sur un disque amovible ou sur un autre système. Remarque :l’une des méthodes permettant d’enregistrer les réglages de service dans Admin Serveur consiste à sélectionner le service dans la liste des ordinateurs et des services située à gauche, à cliquer sur Réglages, puis à faire glisser le bouton situé dans l’angle inférieur droit vers le Bureau. Cette opération crée un fichier contenant les réglages de service sur le Bureau. Dans la version 10.5, watchdog a été remplacé par launchd. Pour réactiver le redémarrage automatique du matériel, utilisez la sous-fenêtre Économiseur d’énergie des Préférences Système. Pour faire migrer les réglages correspondant aux services que vous avez ajoutés à /etc/watchdog.conf, créez un fichier plist launchd et installez-le dans /Système/Bibliothèque/LaunchDaemons/. Pour en savoir plus sur launchd, reportez-vous à sa page man. Outils pouvant être utilisés Plusieurs outils sont disponibles :  Vous pouvez vous servir du Gestionnaire de groupe de travail pour exporter des comptes utilisateurs et de groupe de la version 10.4 vers un fichier délimité, puis les importer dans un serveur 10.5. Vous pouvez également importer des utilisateurs et des groupes à l’aide de l’outil de ligne de commande dsimport.  La fonction d’importation de Gestionnaire de groupe de travail et l’outil dsimport vous permettent également d’importer d’autres types de données, comme des ordinateurs et des listes d’ordinateurs.  Utilisez l’outil 59_webconfigmigrator pour faire migrer les réglages de service web.  Utilisez 50_ipfwconfigmigrator pour exporter les réglages de service coupe-feu.  Utilisez 58_jabbermigrator.pl pour faire migrer les réglages de service iChat. Les instructions des sections suivantes expliquent quand et comment utiliser ces utilitaires.32 Chapitre 3Migration à partir de Mac OS X Server 10.4 Instructions pas à pas Pour déplacer des données d’un ordinateur 10.4.10 ou ultérieur à un ordinateur sur lequel Mac OS X Server 10.5 est installé, suivez les instructions de cette rubrique. Étape 1 :exportation d’utilisateurs et de groupes Servez-vous du Gestionnaire de groupe de travail pour exporter des comptes utilisateurs et de groupe depuis un répertoire NetInfo ou LDAP3 vers un fichier délimité par des caractères qui peut ensuite être importé dans un répertoire pour être utilisé avec Mac OS X Server 10.5. 1 Exportez les informations des utilisateurs et groupes. 2 Créez des fichiers d'archive des données et un fichier utilisateur d'exportation. 4 Copiez les fichiers d'archive vers le nouveau serveur. 6 Importez les fichiers des utilisateurs et groupes. 8 Configurez les points de partage et les autorisations. 9 Testez le nouveau serveur. 7 Replacez les fichiers de données sur le nouveau serveur. 3 Notez les points de partage et les autorisations actuels. utilisateur groupe 2017 Gestionnaire de groupe de travail Gestionnaire de groupe de travail ou outil dsimport 5 Configurez l'infrastructure des répertoires de départ. Ingénierie Lecture et écriture Bureau d'études Documents Lecture seule Lecture et écriture Shared Folders Shared Folders Ingénierie Lecture et écriture Bureau d'études Documents Lecture seule Lecture et écriture .XML Ingénierie Lecture et écriture Bureau d'études Documents Lecture seule Lecture et écriture Shared Folders utilisateur groupe 2017 donnéesutilisateur.tar basededonnées.tar donnéesutilisateur.tar basededonnées.tarChapitre 3 Migration à partir de Mac OS X Server 10.4 33 Pour exporter des utilisateurs et des groupes : 1 Dans Gestionnaire de groupe de travail, cliquez sur Comptes, puis sur l’icône représentant un globe sous la barre d’outils et choisissez le répertoire à partir duquel vous souhaitez exporter des comptes. 2 Cliquez sur le cadenas pour vous authentifier en tant qu’administrateur de domaine (habituellement, diradmin). 3 Cliquez sur le bouton Utilisateurs pour exporter des utilisateurs ou sur le bouton Groupes pour exporter des groupes. 4 Exportez les comptes utilisateurs ou de groupe comme suit :  Pour exporter l’ensemble des comptes, sélectionnez-les tous.  Pour exporter un compte particulier, sélectionnez-le.  Pour exporter plusieurs comptes, sélectionnez-les en maintenant enfoncée la touche Commande ou Maj. 5 Choisissez Serveur > Exporter. 6 Spécifiez un nom à attribuer au fichier d’exportation ainsi que son emplacement. 7 Cliquez sur Exporter. Lorsque vous exportez des utilisateurs à l’aide de Gestionnaire de groupe de travail, les informations des mots de passe ne sont pas exportées. Si vous souhaitez définir des mots de passe, vous pouvez modifier le fichier d’exportation avant de l’importer ou définir chaque mot de passe après l’importation à l’aide de la commande passwd ou du Gestionnaire de groupe de travail. Pour en savoir plus sur la définition des mots de passe après l’importation des utilisateurs, reportez-vous à Gestion des utilisateurs. Étape 2 :créez des archives des fichiers suivants Enregistrez tous les fichiers de données que vous souhaitez réutiliser avec Mac OS X Server 10.5. Lors de l’étape 4, vous déplacerez les fichiers décrits ci-dessous, ainsi que le fichier d’exportation créé lors de l’étape 1, vers l’ordinateur qui tourne sous la version 10.5. Pour les grandes quantités de données, vous pouvez créer une ou plusieurs archives tar, ou utiliser /usr/bin/mkdmg pour créer des fichiers d’image disque. Vous pouvez transférer des images disque et des fichiers tar en vous servant des protocoles AFP ou FTP. Remarque :vous pouvez aussi utiliser scp -r pour effectuer une copie sécurisée des fichiers et rsync pour copier les fichiers à distance. La commande rsync est particulièrement utile si vous avez une grande quantité de données qu’il est possible de faire migrer avant le passage à la nouvelle version puis de mettre rapidement à jour.34 Chapitre 3Migration à partir de Mac OS X Server 10.4 Pour créer une archive tar, utilisez la commande tar dans l’application Terminal. L’indicateur -c de la commande crée un fichier d’archives au format tar. Utilisez l’indicateur -f pour spécifier le nom du fichier d’archives. Utilisez l’indicateur -v (détaillé) pour afficher les informations relatives à la progression lors de l’exécution de la commande : tar -cvf /MyHFSVolume/Stuff.tar /MyHFSVolume/My\ Stuff Le caractère d’échappement (\ dans l’exemple ci-dessus) indique un espace dans le nom. Vous pouvez également utiliser des guillemets pour gérer les espaces incorporés : tar -cvf /MyHFSVolume/Stuff.tar “/MyHFSVolume/My Stuff” Données de configuration Web Enregistrez les fichiers et les répertoires suivants :  /etc/httpd/httpd.conf  /etc/httpd/httpd_macosxserver.conf  /etc/httpd/httpd_mailman.conf  /etc/httpd/httpd_squirrelmail.conf  /etc/httpd/magic  /etc/httpd/mime.types  /etc/httpd/mime_macosxserver.types  /etc/httpd/ssl.crt  /etc/httpd/ssl.key  /etc/httpd/tomcat.conf  /etc/webperfcache/webperfcache.conf  /Bibliothèque/WebServer/ Contenu Web Copiez le contenu Web que vous souhaitez réutiliser à partir de :  /Bibliothèque/WebServer/Documents/  /Bibliothèque/WebServer/CGI-Executables/  tout autre emplacement où il réside. Données MySQL Mac OS X Server 10.4.10 ou ultérieur comprend la version 4.1.22 de MySQL. Mac OS X Server 10.5 installe MySQL 5.0.45. Pour faire migrer les bases de données MySQL d’un ordinateur vers un autre, vous pouvez vous servir de la commande mysqldump afin de créer une copie de sauvegarde de vos données. Cette commande est différente selon l’ampleur des données à sauvegarder. La migration peut en effet concerner des tables individuelles, une ou plusieurs bases de données ou toutes les bases de données qui se trouvent sur le serveur.Chapitre 3 Migration à partir de Mac OS X Server 10.4 35 Pour créer une copie de sauvegarde des tables individuelles, tapez : mysqldump database tb1 [tb2 tb3...] > backup-file.sql où database est le nom de la base de données qui contient les tables répertoriées et tb1, tb2 et tb3 le nom des tables. Pour créer une copie de sauvegarde d’une ou plusieurs bases de données, tapez : mysqldump --databases db1 [db2 db3...] > backup-file.sql Pour créer une copie de sauvegarde de toutes les bases de données contenues dans le système, tapez : mysqldump --all-databases > backup-file.sql Vous trouverez des instructions supplémentaires à propos de la sauvegarde et de la restauration des bases de données dans la documentation relative à MySQL sur le site web www.mysql.org. Pour créer une copie de sauvegarde des tables ou des bases de données qui requièrent un accès root (par exemple, les tables d’octroi de privilèges et les autres données d’accès restreint), exécutez la commande mysqldump avec les options --user=root et -p : mysqldump --user=root -p --all-datagases > backup-file.sql Lorsque vous utilisez l’option -p, mysqldump vous demande le mot de passe root de MySQL avant de continuer. Base de données de courrier Si vous souhaitez réutiliser la base de données et le stockage du courrier, arrêtez le service de messagerie s’il est en cours d’exécution et enregistrez les fichiers de la messagerie. Si le service de messagerie n’est pas en cours d’exécution, vous pouvez copier tous ses répertoires. Par défaut :  La base de données de courrier est situé à l’emplacement /var/imap/.  Le stockage de courrier est situé à l’emplacement /var/spool/imap/. Vous pouvez sauvegarder des dossiers individuels de stockage de courrier ou bien l’ensemble du stockage de courrier. L’outil de ligne de commande ditto est utile pour sauvegarder les fichiers de courrier. Pour en savoir plus sur la commande ditto, reportez-vous à sa page man. Par ailleurs, enregistrez une copie du fichier /usr/bin/cyrus/bin/ctl_mboxlist afin de pouvoir le déplacer sur le serveur 10.5 lors de l’étape 4 décrite page 39. Ce fichier est nécessaire pour faire migrer correctement la base de données du service de messagerie lors de l’étape 7 décrite page 41.36 Chapitre 3Migration à partir de Mac OS X Server 10.4 Données WebMail Si vous avez utilisé SquirrelMail, qui a été installé en même temps que la version 10.4, et que vous souhaitez continuer à vous en servir après la migration, créez une copie des carnets d’adresses et des préférences stockés dans /var/db/squirrelmail/data/. Fichiers de configuration FTP Pour migrer vos réglages FTP, sauvegardez les fichiers de configuration suivants : Serveur LDAP Créez une copie de sauvegarde des informations de configuration du serveur LDAP. Pour créer une copie de sauvegarde de la base de données Open Directory, qui comprend la configuration du serveur LDAP : 1 Dans Admin Serveur, sélectionnez Open Directory dans la liste des ordinateurs et des services. 2 Cliquez sur Archive. 3 Dans le champ Archiver dans, sélectionnez le chemin d’accès de l’archive. 4 Cliquez sur le bouton Archive. 5 Dans le champ Nom de l’archive, tapez le nom du fichier dans lequel les informations seront stockées. 6 Dans le champ Mot de passe, tapez le mot de passe de l’archive. 7 Cliquez sur OK. AFP Enregistrez /Bibliothèque/Preferences/com.apple.AppleFileServer.plist. SMB Enregistrez /Bibliothèque/Preferences/SystemConfiguration/com.apple.smb.server.plist. Dans ce répertoire Sauvegardez ces fichiers /Bibliothèque/FTPServer/Configuration/ ftpaccess ftpconversions ftphosts ftpgroups ftpusers /Bibliothèque/FTPServer/Messages/ banner.txt welcome.txt limit.txtChapitre 3 Migration à partir de Mac OS X Server 10.4 37 Images NetBoot Vous pouvez faire migrer les images NetBoot créées avec Mac OS X Server 10.4. Enregistrez le dossier .nbi de chacune des images que vous souhaitez faire migrer en notant le chemin d’accès à ce dossier si vous souhaitez le créer à nouveau dans la version 10.5. Enregistrez aussi les réglages NetBoot. Dans Admin Serveur, sélectionnez NetBoot dans la liste des ordinateurs et des services située à gauche, cliquez sur Réglages, puis faites glisser le bouton situé dans l’angle inférieur droit vers le Bureau. Cette action crée un fichier contenant les réglages du service NetBoot sur le Bureau. Enregistrez ce fichier. Applications et structures WebObjects Enregistrez les applications et structures WebObjects situées dans :  /Bibliothèque/WebObjects/  /Système/Bibliothèque/WebObjects/ Données Tomcat Enregistrez les servlets Tomcat que vous souhaitez réutiliser. Ils se trouvent dans /Bibliothèque/Tomcat/webapps/. Si vous avez installé Axis indépendamment de la version fournie avec le serveur, enregistrez les éventuels services SOAP (Simple Object Access Protocol). Applications JBoss Enregistrez les applications JBoss situées dans /Bibliothèque/JBoss/3.2/deploy/. Coupe-feu IP Dans l’application Terminal, exécutez la commande suivante : sudo /Système/Bibliothèque/ServerSetup/MigrationExtras/ 50_ipfwconfigmigrator Ensuite, enregistrez le contenu de /etc/ipfilter. NAT Enregistrez le contenu de /etc/nat/natd.plist. Impression Utilisez la commande serveradmin settings print pour enregistrer les réglages d’impression avant de commencer le processus de migration. serveradmin settings print > exported_print_settings Par ailleurs, consignez le nom et l’identifiant des files d’attente CUPS afin de pouvoir les utiliser ultérieurement.38 Chapitre 3Migration à partir de Mac OS X Server 10.4 VPN Copiez :  /Bibliothèque/Préférences/SystemConfiguration/com.apple.RemoteAccessServers.plist  /Bibliothèque/Keychains/System.keychain  /etc/racoon/psk.text Si le L2TP est configuré et que le secret partagé IPsec est stocké dans psk.text, ce secret partagé peut aussi être stocké dans com.apple.RemoteAccessServers.plist ou System.keychain. DNS Enregistrez le fichier /etc/named.conf et le répertoire /var/named/, ainsi que tout son contenu. DHCP Dans Admin Serveur, sélectionnez DHCP dans la liste des ordinateurs et des services située à gauche, cliquez sur Réglages, puis faites glisser le bouton situé dans l’angle inférieur droit vers le Bureau. Cette action crée un fichier contenant les réglages du service DHCP sur le Bureau. Enregistrez ce fichier. Données utilisateur Enregistrez tous les dossiers ou fichiers de données utilisateur que vous souhaitez réutiliser, en particulier les dossiers du répertoire de départ. Fichiers et dossiers du Serveur d’enchaînement QuickTime Enregistrez les fichiers et les dossiers du répertoire /Bibliothèque/QuickTimeStreaming/. Fichiers et dossiers de QTSS Publisher Enregistrez ce qui suit :  les fichiers et les dossiers qui se trouvent dans /Bibliothèque/Application Support/Apple/QTSS Publisher/ ;  les fichiers et les dossiers de chaque chemin d’utilisateur QTSS Publisher : /Users//Bibliothèque/Application Support/Apple/QTSS Publisher Serveur iChat Enregistrez les dossiers suivants :  /var/jabber/spool  /etc/jabberChapitre 3 Migration à partir de Mac OS X Server 10.4 39 Étape 3 :points de partage et autorisations actuels Si votre serveur 10.4 contient des points de partage et des privilèges que vous souhaitez créer à nouveau sur le serveur 10.5, notez-les. Consignez les points de partage destinés aux répertoires de départ. Étape 4 :copie des fichiers d’archive sur le nouveau serveur Transférez les fichiers enregistrés lors des étapes 1 et 2 sur le serveur 10.5. Pour transférer les fichiers tar ou les images de disque via FTP : 1 Utilisez Admin Serveur sur le nouveau serveur afin de démarrer le service FTP. 2 Configurez le partage pour le dossier dans lequel vous placerez les fichiers que vous transférez depuis l’ordinateur 10.4. 3 Sur le serveur 10.4,servez-vous du service FTP pour copier les fichiers tar ou les images disque sur l’ordinateur 10.5. 4 Sur le serveur 10.5, double-cliquez sur un fichier tar pour en extraire le contenu ou doublecliquez sur une image disque pour la monter. Étape 5 :configuration de l’infrastructure des répertoires de départ Configurez la destination des répertoires de départ que vous souhaitez restaurer. L’emplacement des répertoires de départ identifié dans les comptes d’utilisateur importés doit correspondre à l’emplacement physique des répertoires de départ restaurés, y compris l’emplacement du point de partage. Pour obtenir des explications détaillées sur la marche à suivre en ce qui concerne les étapes de la procédure ci-dessous, reportez-vous àGestion des utilisateurs. Pour préparer le serveur pour le stockage des répertoires de départ : 1 Si nécessaire, créez le dossier que vous souhaitez utiliser comme point de partage du répertoire de départ. Si vous le souhaitez, vous pouvez utiliser le dossier /Utilisateurs prédéfini. 2 Ouvrez Admin Serveur sur le serveur où vous souhaitez stocker les répertoires de départ. 3 Cliquez sur Partage de fichiers pour configurer un point de partage pour les répertoires de départ. Si les comptes utilisateurs sont destinés à résider dans un répertoire Open Directory partagé, créez un point de partage AFP ou NFS à montage automatique dynamique pour les répertoires de départ. Assurez-vous que le point de partage est publié dans le répertoire dans lequel résideront les comptes d’utilisateur qui en dépendent. 4 Dans le Gestionnaire de groupe de travail de l’ordinateur à partir duquel vous allez importer les utilisateurs, cliquez sur Comptes, puis ouvrez le répertoire dans lequel les utilisateurs importés seront stockés.40 Chapitre 3Migration à partir de Mac OS X Server 10.4 Si vous restaurez les répertoires de départ dans des emplacements qui ne correspondent pas exactement à ceux identifiés dans les fiches utilisateurs exportées, vous pouvez configurer un préréglage qui identifie l’emplacement de restauration. Si vous identifiez le pré- réglage lors de l’importation des utilisateurs, le nouvel emplacement remplace celui qui existe dans les enregistrements utilisateur. Vous pouvez également utiliser le préréglage pour spécifier d’autres réglages par défaut dont les utilisateurs importés doivent hériter, par exemple pour les mots de passe, le courrier, etc. Étape 6 :importation d’utilisateurs, de groupes et d’autres données Si vous faites migrer des utilisateurs et des groupes à partir d’un maître Open Directory, suivez les instructions de « Réglages du serveur LDAP » à la page 44. Si vous faites migrer des utilisateurs et des groupes du nœud local,servez-vous du Gestionnaire de groupe de travail ou de l’outil dsimport. Pour en savoir plus sur l’importation à l’aide du Gestionnaire de groupe de travail, reportezvous à Gestion des utilisateurs. Pour en savoir plus sur les mots de passe des utilisateurs créés à l’origine avec Mac OS X Server 10.1.5 ou antérieur, reportez-vous à Administration d’Open Directory. Pour en savoir plus sur dsimport et pour obtenir une description du format d’exportation du Gestionnaire de groupe de travail, reportez-vous à Administration de ligne de commande. Pour importer des utilisateurs et des groupes à l’aide de Gestionnaire de groupe de travail : 1 Placez les fichiers d’exportation créés lors de l’étape 1 dans un emplacement accessible à partir du serveur. Vous pouvez modifier les comptes d’utilisateur dans un fichier d’exportation si vous souhaitez définir des mots de passe avant d’importer les utilisateurs. Pour obtenir des instructions, consultez la section Gestion des utilisateurs. En outre, vous pouvez configurer le préréglage défini lors de l’étape 5 ci-dessus de sorte que les mots de passe des utilisateurs soient validés à l’aide de l’authentification Open Directory, et vous pouvez configurer les options de validation de mot de passe afin d’obliger les utilisateurs à changer de mot de passe la prochaine fois qu’ils ouvriront une session. Pour obtenir des informations sur l’utilisation de mots de passe Kerberos, reportez-vous à la dernière étape de cette procédure. 2 Dans Gestionnaire de groupe de travail, cliquez sur Comptes. 3 Dans la barre d’outils, cliquez sur l’icône représentant un globe afin d’ouvrir le répertoire dans lequel vous souhaitez importer les comptes. 4 Cliquez sur le cadenas pour vous authentifier en tant qu’administrateur de domaine.Chapitre 3 Migration à partir de Mac OS X Server 10.4 41 5 Choisissez Serveur > Importer, sélectionnez le fichier d’importation, puis spécifiez les options d’importation. Si vous utilisez un préréglage, assurez-vous de le spécifier. 6 Cliquez sur Importer. 7 Si vous souhaitez que les groupes puissent utiliser les nouvelles fonctionnalités de la version 10.5, mettez-les à niveau à l’aide du Gestionnaire de groupe de travail. Dans le Gestionnaire de groupe de travail, ouvrez le répertoire qui contient les groupes, sélectionnez un ou plusieurs groupes, cliquez sur « Mettre à niveau le groupe hérité », puis cliquez sur Enregistrer. 8 Pour créer des répertoires de départ pour les utilisateurs importés, utilisez l’une des options suivantes. Créez les répertoires de départ un par un, en sélectionnant un compte d’utilisateur dans Gestionnaire de groupe de travail, en cliquant sur Départ, puis sur Créer Départ. Créez tous les répertoires de départ en utilisant l’argument -a de la commande createhomedir. Pour plus de détails, reportez-vous à Administration de ligne de commande ou à la page man de createhomedir. S’il n’existe pas déjà, un répertoire de départ associé à un point de partage AFP est créé la première fois que l’utilisateur ouvre une session. 9 Si vous souhaitez activer Kerberos pour un maître Open Directory pour lequel il n’est pas activé, servez-vous de la commande suivante qui permet de conserver les mots de passe existants et de les ajouter à un nouveau centre de distribution de clés (KDC, Key Distribution Center). slapconfig -kerberize Si vous avez des comptes utilisateurs qui fonctionnent avec des mots de passe chiffrés et que vous ne kerbérisez pas ces derniers à l’aide de la commande ci-dessus, vous pouvez vous servir du Gestionnaire de groupe de travail pour les mettre à niveau et les convertir en mots de passe Open Directory. Pour utiliser le Gestionnaire de groupe de travail, ouvrez l’application, puis accédez au répertoire où réside le compte utilisateur. Authentifiez-vous en tant qu’administrateur d’Open Directory (généralement diradmin) puis sélectionnez un utilisateur dont le mot de passe est chiffré. Cliquez sur Avancé, choisissez Open Directory dans le menu local Type du mot de passe, cliquez sur Élémentaires,spécifiez un nouveau mot de passe, puis cliquez sur Enregistrer. Pour en savoir plus sur slapconfig, reportez-vous à sa page man.42 Chapitre 3Migration à partir de Mac OS X Server 10.4 Étape 7 :déplacez les fichiers de données enregistrés suivants Placez les fichiers enregistrés à partir de votre serveur 10.4 à leur emplacement final. Données de configuration Web Pour migrer la configuration Web : 1 Ouvrez Admin Serveur. 2 Sous le serveur 10.5 dans la liste des ordinateurs et des services, cliquez sur Web. 3 Cliquez sur « Arrêter le service web » si le service web est en cours d’exécution. 4 Supprimez les fichiers suivants :  /etc/httpd/sites  /etc/httpd/ssl.crt  /etc/httpd/ssl.key 5 Copiez le répertoire et les fichiers enregistrés avec la version 10.4 sur le serveur 10.5. 6 Dans l’application Terminal, tapez la commande suivante : sudo cd /etc/httpd 7 Ouvrez le fichier httpd.conf en tant qu’administrateur root pour pouvoir l’éditer. 8 Dans le fichier httpd.conf :  Remplacez var/run/proxy par /var/run/proxy-1.3.  Remplacez /var/run/httpd.pid par /var/run/http-1.3.pid. 9 Enregistrez vos modifications. 10 Pour faire migrer les réglages du service web, dans Terminal, exécutez la commande suivante : sudo /Système/Bibliothèque/ServerSetup/translateApache.rb 11 Si vous avez modifié /etc/httpd/workers.properties, appliquez à nouveau toutes les modifications à la version du fichier installée avec le serveur 10.5. Le fichier workers.properties de la version 10.5 contient une nouvelle entrée pour le service Blog. 12 Dans Admin Serveur, démarrez le service Web. Contenu Web Copiez le contenu web enregistré aux emplacements suivants et à tous les autres emplacements où vous avez placé du contenu web sur le serveur :  /Bibliothèque/WebServer/Documents/  /Bibliothèque/WebServer/CGI-Executables/ Données MySQL Avant d’importer les données sauvegardées de MySQL, assurez-vous que le service MySQL est actif. Vous pouvez activer le service MySQL à l’aide d’Admin Serveur ou de la commande serveradmin.Chapitre 3 Migration à partir de Mac OS X Server 10.4 43 Pour activer le service MySQL à l’aide de la commande serveradmin, tapez : serveradmin start mysql Pour importer les copies de sauvegarde de bases de données, tapez : mysql < backup-file.sql Pour importer des données dans des bases de données auxquelles il n’est possible d’accéder qu’avec des privilèges, exécutez la commande mysql avec les options --user=root et -p : mysql --user=root -p < backup-file.sql Lorsque vous utilisez l’option -p, mysql vous demande le mot de passe root de MySQL avant de continuer. Vous trouverez des instructions supplémentaires à propos de la sauvegarde et de la restauration des bases de données MySQL dans la documentation relative à MySQL sur le site web www.mysql.org. Base de données de courrier Pour migrer la base de données de courrier : 1 Assurez-vous que le service de messagerie de la version 10.5 n’est pas en cours d’exécution. Ouvrez Admin Serveur, puis cliquez sur Courrier. Si le cercle qui se trouve sur le côté gauche et qui correspond à la messagerie (Mail) n’est pas grisé, cliquez sur Arrêter Mail dans l’angle inférieur gauche. 2 Restaurez la base de données de courrier et le stockage de courrier enregistrés. La base de données de courrier est située par défaut à l’emplacement /var/imap/ et le stockage de courrier dans /var/spool/imap/. 3 Assurez-vous que les répertoires de la messagerie et leur contenu appartiennent au groupe de messagerie et à l’utilisateur _cyrus. 4 Renommez le fichier ctl_mboxlist enregistré de sorte que son nom soit ctl_mboxlist.old, puis déplacez-le jusque dans /usr/bin/cyrus/bin/. Si ce fichier ctl_mboxlist.old est inexistant, le script upgradedb ne fonctionnera pas correctement lors de l’étape 8 ci-dessous. 5 Dans Admin Serveur, sélectionnez Mail dans la liste des ordinateurs et des services. 6 Cliquez sur Réglages,sur Avancé, puis sur Base de données pour indiquer l’emplacement dans lequel vous avez restauré la base de données et le stockage du courrier. 7 Cliquez sur Enregistrer. 8 Exécutez le script upgradedb de la base de données de courrier : sudo -u cyrusimap /Système/Bibliothèque/ServerSetup/MigrationExtras/ 61_migrate_cyrus_db44 Chapitre 3Migration à partir de Mac OS X Server 10.4 9 Exécutez la commande suivante pour vous assurer que les fichiers d’index de tous les comptes de messagerie fonctionnent correctement : sudo /usr/bin/cyrus/bin/reconstruct –i 10 Dans Admin Serveur, lancez le service de messagerie en cliquant sur Mail, puis sur Démarrer Mail. Données WebMail Placez les carnets d’adresses et les préférences enregistrés dans le répertoire /var/db/squirrelmail/data/. Fichiers de configuration FTP Copiez les fichiers de configuration FTP enregistrés dans :  /Bibliothèque/FTPServer/Configuration/  /Bibliothèque/FTPServer/Messages/ Réglages du serveur LDAP Restaurez les informations de configuration du serveur LDAP. Pour restaurer la base de données Open Directory, qui comprend la configuration du serveur LDAP : 1 Dans Admin Serveur, sélectionnez Open Directory dans la liste des ordinateurs et des services. 2 Cliquez sur Archive. 3 Dans le champ « Archiver à partir de », sélectionnez le chemin d’accès de l’archive. 4 Cliquez sur le bouton Restaurer. 5 Dans le champ Mot de passe, tapez le mot de passe de l’archive. 6 Cliquez sur OK. Configuration AFP Pour faire migrer la configuration AFP, restaurez /Bibliothèque/Préférences/ com.apple.AppleFileServer.plist. Configuration SMB Pour faire migrer la configuration SMB, restaurez /Bibliothèque/Preferences/SystemConfiguration/com.apple.smb.server.plist. Images NetBoot Copiez le dossier .nbi correspondant à chaque image que vous souhaitez faire migrer et placez-le éventuellement à l’emplacement où il se trouvait auparavant. Par ailleurs, restaurez le fichier qui contient les réglages NetBoot.Chapitre 3 Migration à partir de Mac OS X Server 10.4 45 Pour restaurer les réglages NetBoot : 1 Ouvrez Admin Serveur, puis sélectionnez NetBoot dans la liste des ordinateurs et des services. 2 Choisissez Serveur > Importer > Réglages de service pour importer les réglages NetBoot à partir du fichier que vous avez exporté auparavant (voir « Images NetBoot » à la page 37). 3 Passez en revue les réglages NetBoot pour vous assurer qu’ils ont été correctement importés. Applications et structures WebObjects Pour faire migrer WebObjects : 1 Copiez les applications enregistrées dans /Bibliothèque/WebObjects/Applications/. 2 Copiez les cadres d’applications enregistrés dans /Bibliothèque/Frameworks/. 3 Ajoutez la ligne suivante au nouveau fichier httpd.conf : Include /Système/Bibliothèque/WebObjects/Adaptors/Apache/apache.conf Remarque :les services JavaMonitor et WebObjects Task Daemon (wotaskd) sont désormais gérés par launchd, et il est possible d’y accéder par l’intermédiaire d’Admin Serveur. Si le serveur que vous mettez à niveau comprend l’élément de démarrage /Système/Bibliothèque/StartupItems/WebObjects, vous pouvez l’ignorez. En effet, cet élément est désactivé par défaut, et il n’est pas nécessaire pour le démarrage automatique des services WebObjects avec Mac OS X Server 10.5. Pour en savoir plus, reportez-vous à Administration destechnologiesweb et Déploiement deWebObjects. 4 (Facultatif) Si Java 1.4.2 n’est pas installé sur votre serveur 10.4.10 ou ultérieur, mettez les projets d’application WebObjects à jour manuellement en les ouvrant un par un dans Xcode ; ensuite, dans la présentation Expert des réglages de la cible principale, changez la valeur de la propriété de JAVA_VM à java. Il est nécessaire de mettre ces projets à jour manuellement pour pouvoir utiliser la version de la Machine virtuelle Java (JVM,Java Virtual Machine) fournie avec Mac OS X Server 10.5. Important :Java 1.5 doit être installé pour que WebObjects 5.4, inclus avec Mac OS X Server 10.5, puisse fonctionner. Données Tomcat Restaurez les servlets Tomcat dans /Bibliothèque/Tomcat/webapps/. Placez les services SOAP que vous souhaitez faire migrer dans /Bibliothèque/Tomcat/webapps/axis/. Il se peut que Mac OS X Server 10.5 comprenne une version d’Axis plus récente ou plus ancienne que celle que vous utilisiez jusqu’à présent.46 Chapitre 3Migration à partir de Mac OS X Server 10.4 Applications JBoss JBoss n’est pas fourni avec Mac OS X Server 10.5. Avant de restaurer vos applications JBoss, installez JBoss sur votre serveur. Pour en savoir plus sur l’installation et la migration des applications JBoss, reportez-vous à la documentation de JBoss. Configuration de coupe-feu IP Pour faire migrer la configuration du coupe-feu IP, restaurez le dossier /etc/ipfilter. Ouvrez Admin Serveur, puis cliquez sur Coupe-feu pour vérifier les réglages et vous assurer qu’ils sont correctement configurés. NAT Restaurez le contenu de /etc/nat/natd.plist. Vous pouvez restaurer à tout moment les réglages NAT par défaut de la version 10.5 (situés dans/etc/natd/natd.plist.default) en supprimant le fichier de la configuration active (/etc/nat/natd.plist). Lors de l’accès suivant au NAT à l’aide d’Admin Serveur, le fichier de configuration par défaut est utilisé pour la création d’un nouveau fichier de configuration active. Remarque :dans la version 10.5, le réglage par défaut d’unregistered_only dans /etc/nat/natd.plist.default est « vrai ». Réglages du service d’impression Pour restaurer les réglages du service d’impression, vous devez tout d’abord créer à nouveau les files d’attente CUPS d’origine avant d’importer les réglages enregistrés. Dans le cas des imprimantes connectées directement au serveur via un port USB, le système d’impression CUPS crée les files d’attente dès que vous connectez ces imprimantes au serveur et les allumez. Cependant, pour les imprimantes réseau, vous devez ajouter les imprimantes en cliquant sur Admin Serveur > Impression (pour les imprimantes LPR ou AppleTalk) ou sur Préférences Système > Imprimantes et fax (pour tous les types d’imprimante). Important :lorsque vous créez à nouveau une file d’attente CUPS, assurez-vous de lui redonner le même nom que celui qu’elle avait sur l’ancien système. Si le nom est différent, Admin Serveur n’importera pas les réglages correctement.Chapitre 3 Migration à partir de Mac OS X Server 10.4 47 Important :si vous créez les files d’attente d’impression à l’aide de la sous-fenêtre Imprimantes et fax des Préférences Système, indiquez « Postscript générique (PPD générique) » pour toute file d’attente appliquant des quotas étant donné qu’il existe des problèmes connus avec les gestionnaires d’impression de tierce partie et les quotas CUPS. Pour en savoir plus à ce sujet, reportez-vous à l’article de la Base de connaissances que vous trouverez à l’adresse suivante : http://docs.info.apple.com/article.html?artnum=303538. Une fois les files d’attente d’impression créées, importez les réglages enregistrés : serveradmin settings exported_print_settings VPN Restaurez ce qui suit :  /Bibliothèque/Préférences/SystemConfiguration/com.apple.RemoteAccessServers.plist.  /Bibliothèque/Keychains/System.keychain  /etc/racoon/psk.text Si le L2TP est configuré et que le secret partagé IPsec est stocké dans psk.text, ce secret partagé peut aussi être stocké dans com.apple.RemoteAccessServers.plist ou System.keychain. Faites migrer l’utilisateur de la clé VPN MPPE à l’aide de l’outil de ligne de commande vpnaddkeyagentuser. Pour en savoir plus sur cette commande, reportez-vous à sa page man. Configuration DNS Pour faire migrer la configuration DNS : 1 Restaurez le fichier /etc/named.conf et le répertoire /var/named/, ainsi que tout son contenu. 2 Dans Admin Serveur, sélectionnez DNS dans la liste des ordinateurs et des services. Une zone de dialogue apparaît et vous demande s’il faut effectuer la mise à niveau :  Si vous cliquez sur « Ne pas mettre à niveau », Admin Serveur ne modifie pas les fichiers de configuration du service DNS qui existaient avant la migration vers la version 10.5. Le service DNS continue de s’exécuter, mais il n’est plus possible de modifier sa configuration à l’aide d’Admin Serveur. Si des changements sont nécessaires, vous devez les effectuer directement dans les fichiers de configuration du service DNS.  Si vous cliquez sur Mettre à niveau, Admin Serveur met les fichiers de configuration à niveau au format de la version 10.5. Ceci fait, vous pouvez vous servir d’Admin Serveur pour apporter des modifications à la configuration du service DNS.48 Chapitre 3Migration à partir de Mac OS X Server 10.4 Réglages DHCP Pour migrer la configuration DHCP : 1 Ouvrez Admin Serveur, puis sélectionnez DHCP dans la liste des ordinateurs et des services. 2 Choisissez Serveur > Importer > Réglages de service pour importer les réglages DHCP à partir du fichier que vous avez exporté auparavant (voir « DHCP » à la page 38). 3 Examinez les sous-fenêtres Sous-réseaux et Cartes statiques du service DHCP pour vous assurer que les réglages de sous-réseau et de liaison statique ont été correctement importés. Données utilisateur Restaurez les fichiers de données utilisateur enregistrés. Placez les répertoires de départ dans des emplacements correspondant à ceux des enregistrements utilisateur importés. Si nécessaire, vous pouvez utiliser Gestionnaire de groupe de travail pour éditer les comptes utilisateur, de sorte que les emplacements dans le compte et sur le disque soient identiques. Fichiers et dossiers du Serveur d’enchaînement QuickTime Suivez les instructions qui apparaissent dans Administration de QuickTime Streaming et Broadcasting pour réutiliser les fichiers et les dossiers enregistrés à partir de /Bibliothè- que/QuickTimeStreaming/. Fichiers et dossiers de QTSS Publisher QTSS Publisher a été supprimé de Mac OS X Server 10.5.Toutefois, les fichiers créés avec QTSS Publisher sous la version 10.4 devraient continuer à fonctionner normalement avec la version 10.5. Restaurez les fichiers et les dossiers de QTSS Publisher sur Mac OS X Server 10.5. En principe, les fichiers multimédias et MP3 QTSS Publisher sont stockés dans :  /Bibliothèque/Application Support/Apple/ QTSS Publisher/Libraries/  /Users//Bibliothèque/Application Support/Apple/QTSS Publisher/Libraries/ Pour faire migrer les listes de lecture multimédias et MP3 QTSS Publisher vers Administration web QTSS : 1 Déplacez tous les dossiers qui se trouvent dans /Bibliothèque/Application Support/ Apple/QTSS Publisher/Playlists/ vers /Bibliothèque/QuickTimeStreaming/Playlists. Par exemple, vous déplacez : /Bibliothèque/Application Support/Apple/QTSS Publisher/Playlists/my_playlist/ Pour /Bibliothèque/QuickTimeStreaming/Playlists/my_playlist/Chapitre 3 Migration à partir de Mac OS X Server 10.4 49 2 Vérifiez que le propriétaire des dossiers et des fichiers qui se trouvent dans /Bibliothèque/QuickTimeStreaming/Playlists est bien qtss. 3 Dans le cas des listes de lecture multimédias, vérifiez que le dossier /Bibliothèque/Application Support/Apple/QTSS Publisher/Libraries/Media/ contient les fichiers multimédias répertoriés dans les fichiers .playlist. 4 Pour les listes de lecture MP3, vérifiez que le dossier /Bibliothèque/Application Support/Apple/QTSS Publisher/Libraries/MP3/ contient les fichiers multimédias répertoriés dans les fichiers .playlist. 5 Mettez à jour le fichier .config de chaque liste de lecture de sorte que les chemins d’accès indiquent le nouveau dossier contenant les listes de lecture dans /Bibliothèque/QuickTimeStreaming/Playlists. Ceci inclut les chemins définis dans les préférences pid_file, playlist_file et sdp_file (listes de lecture multimédias uniquement). 6 Activez l’administration web QTSS à l’aide d’Admin Serveur. 7 Ouvrez l’Administration web à l’aide de Safari (http://:1220), puis ouvrez une session. 8 Cliquez sur Listes de lecture. Vous pouvez maintenant commencer à gérer les listes de lecture QTSS Publisher à l’aide de l’Administration web QTSS. Pour obtenir des informations sur l’Administration web, reportez-vous au Guide de l’administrateur du Serveur d’enchaînement Darwin de QuickTime Streaming Server disponible à l’adresse developer.apple.com/opensource/server/streaming. Serveur iChat Pour faire migrer les réglages du serveur iChat : 1 Restaurez les dossiers suivants :  /var/jabber/spool  /etc/jabber 2 Exécutez le script suivant avec les privilèges root : sudo execute “/Système/Bibliothèque/ServerSetup/MigrationExtras/ 58_jabbermigrator.pl Le script 58_jabbermigrator.pl appelle trois autres scripts pour faire migrer les réglages du serveur iChat. Le cas échéant, vous pouvez exécuter ces scripts individuellement pour personnaliser la migration. Les scripts sont accompagnés d’une documentation qui contient des informations utiles.50 Chapitre 3Migration à partir de Mac OS X Server 10.4 Étape 8 :configuration de points de partage et d’autorisations Créez à nouveau les points de partage et les privilèges en fonction des besoins. Pour créer un point de partage et configurer des autorisations : 1 Ouvrez Admin Serveur, puis cliquez sur Partage de fichiers. 2 Cliquez sur Volumes, puis sélectionnez le volume ou le dossier que vous voulez partager. 3 Cliquez sur Partager. 4 Cliquez sur Autorisations pour configurer les autorisations d’accès. 5 Cliquez sur Enregistrer. Les nouveaux points de partage sont partagés à l’aide des services AFP, SMB et FTP, mais pas NFS. Pour exporter un point de partage avec NFS, utilisez le volet Protocole. Pour en savoir plus sur la configuration des points de partage, reportez-vous à Administration des services de fichier. Étape 9 :test du nouveau serveur Pour tester le nouveau serveur : 1 Ouvrez Gestionnaire de groupe de travail et inspectez les comptes d’utilisateur et de groupe. 2 Ouvrez Admin Serveur et inspectez les réglages des services dont vous avez migré les données de configuration.4 51 4 Mise à niveau de Mac OS X Server 10.3 Suivez les instructions de ce chapitre pour mettre à niveau un serveur 10.3.9 vers la version 10.5. Vous pouvez mettre à niveau les ordinateurs qui tournent sous Mac OS X Server 10.3.9 si leur disque dur n’a pas besoin d’être reformaté et s’ils présentent les caractéristiques suivantes :  un processeur Intel ou PowerPC G4 ou G5 cadencé à 867 MHz ou plus ;  au moins 1 Go de mémoire vive (RAM) ;  au moins 20 Go d’espace disque disponible. Éléments pouvant être réutilisés Lorsque vous effectuez une mise à niveau à partir de Mac OS X Server 10.3.9, quasiment toutes les données et tous les réglages existants sont conservés et peuvent être utilisés. Toutefois, tenez compte des remarques suivantes :  Il est possible de réutiliser les images NetBoot créées avec la version 10.3.  Dans la version 10.5, watchdog a été remplacé par launchd. Pour réactiver le redé- marrage matériel automatique, utilisez la sous-fenêtre Économiseur d’énergie des Préférences Système. Pour faire migrer les réglages pour les services que vous avez ajoutés à /etc/watchdog.conf, créez un fichier launchd plist et installez-le dans /Système/Bibliothèque/LaunchDaemons/. Pour en savoir plus, reportez-vous à la page man de launchd.conf.  Dans la version 10.5, hwmond a été remplacé par launchd.  Les mises à niveau vers la version 10.5 suppriment l’application QTSS Publisher mais laissent les fichiers utilisés par celle-ci. En principe, ces fichiers doivent continuer à fonctionner normalement avec la version 10.5, mais vous devez les déplacer jusqu’aux emplacements appropriés. Pour en savoir plus sur le déplacement de ces fichiers, reportez-vous à « Fichiers et dossiers de QTSS Publisher » à la page 48. Remarque :le Gestionnaire Macintosh n’est pas pris en charge sous Mac OS X Server 10.5.52 Chapitre 4Mise à niveau de Mac OS X Server 10.3 Mise à niveau d’un maître Open Directory et de ses répliques Si le serveur que vous voulez mettre à niveau est un maître ou une réplique Open Directory, mettez tout d’abord à niveau le maître, et ensuite les répliques. Pour mettre à niveau le maître et ses répliques : 1 Mettez le maître à niveau vers la version 10.5 en suivant les instructions indiquées dans « Instructions pas à pas » à la page 53. Pendant la mise à niveau du maître, les ordinateurs clients ne peuvent pas se connecter à ce dernier pour accéder aux services Open Directory. En outre, il se peut que les ordinateurs clients aient à patienter un peu à cause d’un délai lors de la recherche automatique de la réplique de serveur Open Directory la plus proche. Vous pouvez remédier à ce retard en modifiant le service DHCP pour utiliser l’adresse d’un serveur réplique Open Directory si le serveur fournit aux clients l’adresse d’un serveur LDAP. Lorsque la mise à niveau du maître est terminée, vous pouvez modifier le service DHCP pour utiliser l’adresse du maître. Pour obtenir des instructions sur la configuration des réglages LDAP relatifs au service DHCP, reportez-vous à Administration des services de réseau. 2 Mettez chaque réplique de serveur à niveau vers la version 10.5. 3 À l’aide d’Admin Serveur, connectez-vous à chaque serveur réplique et rétablissez les répliques. Pour obtenir des informations sur la réinitialisation des mots de passe sur le maître, consultez la section « Services de répertoire » à la page 58.Chapitre 4 Mise à niveau de Mac OS X Server 10.3 53 Instructions pas à pas Pour mettre à niveau un serveur 10.3.9 vers la version 10.5, suivez les instructions de cette rubrique. Étape 1 :mettez votre serveur à jour vers la version 10.3.9 Au besoin,servez-vous de la Mise à jour de logiciels pour mettre votre serveur à jour vers la version10.3.9. Étape 2 :enregistrez tous les réglages de service Utilisez serveradmin ou Admin Serveur pour exporter tous les réglages de service pour pouvoir vous y reporter ultérieurement. Par ailleurs,servez-vous des Informations Système pour générer un profil complet de votre système. Enregistrez les réglages de service exportés et le profil de votre serveur sur un disque amovible ou sur un autre système. Avant la mise à niveau, il est recommandé de créer un clone complet et démarrable du serveur et de le tester en le démarrant afin de disposer d’une copie de sauvegarde au cas où elle s’avérerait nécessaire par la suite. Étape 3 :enregistrez les réglages du service d’impression Enregistrez les réglages du service d’impression à l’aide de la commande serveradmin settings print avant de démarrer la mise à niveau. serveradmin settings print > exported_print_settings Par ailleurs, consignez le nom et l’identifiant des files d’attente CUPS afin de pouvoir les utiliser ultérieurement. 1 Mettez votre serveur à jour vers la version 10.2.8. 2 Effectuez une installation de mise à niveau vers la version 10.4. 3 Effectuez les réglages nécessaires après l'installation initiale du serveur.54 Chapitre 4Mise à niveau de Mac OS X Server 10.3 Étape 4 :effectuez une mise à niveau vers la version 10.5 Vous pouvez vous servir du disque d’installation de la version 10.5 pour effectuer la mise à niveau locale sur votre ordinateur serveur si ce dernier est relié à un écran, à un clavier et à un lecteur optique. Une fois la mise à niveau terminée, l’ordinateur redémarre et l’Assistant du serveur vous indique la marche à suivre pour la configuration initiale de ce dernier. Vos réglages existants sont affichés et vous pouvez les modifier si vous le souhaitez. Pour effectuer une mise à niveau vers la version 10.5 et configurez les réglages initiaux du serveur au niveau local : 1 Assurez-vous que les serveurs DHCP ou DNS dont dépend votre serveur sont en marche. 2 Allumez l’ordinateur et insérez le disque d’installation dans le lecteur optique. 3 Redémarrez l’ordinateur en maintenant appuyée la touche C de votre clavier. L’ordinateur démarre à partir du disque d’installation. Vous pouvez relâcher la touche C lorsque le logo Apple s’affiche. Pour obtenir des informations sur le redémarrage d’un système Xserve sans périphérique de contrôle, reportez-vous au Guide de l’utilisateur fourni avec le système. 4 Lorsque le programme d’installation s’ouvre, suivez les instructions à l’écran de chaque sous-fenêtre en cliquant sur Continuer pour passer à la suivante. Remarque :dans la sous-fenêtre Sélectionner une destination, assurez-vous de sélectionner le disque ou la partition sur lequel la version v10.3.9 est installée. Au cours de l’installation, l’état d’avancement des opérations est affiché. Une fois l’installation terminée, l’ordinateur redémarre et l’Assistant du serveur s’ouvre pour vous permettre de procéder à la configuration initiale du serveur. 5 Avancez dans les sous-fenêtres de l’Assistant en suivant les instructions affichées. Vos réglages existants sont affichés dans les sous-fenêtres, mais vous pouvez les modifier si vous le souhaitez. Pour chaque serveur que vous mettez à niveau,saisissez un numéro de série unique de logiciel serveur.Vous trouverez ce numéro imprimé sur les documents fournis avec le logiciel. Si vous possédez une licence de site, vous devez saisir le nom du propriétaire enregistré et l’organisation exactement tels qu’ils ont été spécifiés par votre représentant Apple. Une fois entrées les données de configuration, l’Assistant du serveur affiche un résumé des données. 6 Révisez les données de configuration, en cliquant de manière facultative sur Revenir pour les modifier. 7 Pour lancer la configuration du serveur, cliquez sur Appliquer.Chapitre 4 Mise à niveau de Mac OS X Server 10.3 55 8 Au terme de la configuration du serveur, cliquez sur Redémarrer. Remarque :il se peut que vous deviez démarrer manuellement le service de messagerie après la mise à niveau du serveur. Pour effectuer une mise à niveau vers la version 10.5 et configurer à distance les réglages initiaux du serveur : 1 Assurez-vous que tous les serveurs DHCP ou DNS dont dépend votre serveur sont en cours d’exécution. 2 Démarrez l’ordinateur à partir du disque d’installation. La procédure utilisée dépend de la présence ou de l’absence d’un lecteur optique capable de lire votre disque d’installation sur le serveur cible. Si vous disposez d’un DVD d’installation, le lecteur optique doit pouvoir lire les DVD. Si le serveur cible est équipé d’un clavier et d’un lecteur optique capable de lire votre disque d’installation, insérez ce dernier dans le lecteur optique, puis redémarrez l’ordinateur tout en maintenant la touche C du clavier enfoncée. Si le serveur cible est un système Xserve équipé d’un lecteur optique intégré capable de lire votre disque d’installation, démarrez le serveur à l’aide du disque d’installation en suivant les instructions du Guide de l’utilisateur Xserve relatives au démarrage à partir d’un disque système. Si le serveur cible ne dispose pas d’un lecteur optique intégré capable de lire votre disque d’installation, vous pouvez le démarrer en mode disque cible et insérer le disque d’installation dans le lecteur optique de votre ordinateur administrateur. Vous pouvez aussi vous servir d’un lecteur optique FireWire externe. Si le serveur cible est un système Xserve, vous pouvez déplacer son module de disque sur un autre système Xserve équipé d’un lecteur optique capable de lire votre disque d’installation. Vous trouverez des instructions relatives à l’utilisation du mode disque cible et des lecteurs optiques externes dans le guide Présentation, dans le guide Premiers contacts ou dans le Guide de l’utilisateur qui vous ont été fournis avec votre système Xserve ou votre ordinateur Macintosh. 3 Sur un ordinateur administrateur, naviguez jusqu’à /Applications/Server/, ouvrez l’Assistant du serveur (il n’est pas nécessaire de disposer des privilèges d’administrateur sur l’ordinateur local pour pouvoir utiliser l’Assistant du serveur), puis sélectionnez « Installer les logiciels sur un serveur distant ». 4 Identifiez le serveur que vous souhaitez mettre à niveau. Si celui-ci se trouve sur le sous-réseau local, sélectionnez-le dans la liste. Sinon, cliquez sur Serveur à l’adresse IP puis saisissez une adresse IP au format IPv4 (000.000.000.000).56 Chapitre 4Mise à niveau de Mac OS X Server 10.3 5 Lorsque vous êtes invité à saisir un mot de passe, tapez l’ancien mot de passe d’administrateur. 6 Avancez dans les écrans d’installation en suivant les instructions affichées. 7 Lorsque la sous-fenêtre Volumes apparaît,sélectionnez un disque ou un volume (partition) cible et cliquez sur Continuer. Au cours de l’installation, l’état d’avancement des opérations est affiché. Une fois l’installation terminée, l’ordinateur redémarre, puis l’Assistant du serveur s’ouvre et une sous-fenêtre Bienvenue apparaît. 8 Pour lancer la configuration du serveur, sélectionnez « Configurer un serveur distant » et cliquez sur Continuer. 9 Dans la sous-fenêtre Destination, placez une coche dans la colonne Appliquer du serveur distant que vous mettez à niveau, puis tapez son mot de passe de préréglage dans le champ Mot de passe et cliquez sur Continuer pour vous connecter au serveur. Si le serveur n’apparaît pas dans la liste, cliquez sur Ajouter pour l’ajouter ou Actualiser pour voir s’il est disponible. 10 Avancez dans les sous-fenêtres de l’Assistant en suivant les instructions affichées. Vos réglages existants sont affichés dans les sous-fenêtres, mais vous pouvez les modifier si vous le souhaitez. Pour chaque serveur que vous mettez à niveau, vous devez saisir un numéro de série unique de logiciel serveur.Vous trouverez ce numéro imprimé sur les documents fournis avec le logiciel. Si vous possédez une licence de site,saisissez le nom du propriétaire enregistré et celui de son organisation tels qu’ils ont été spécifiés par votre représentant Apple. Lorsque vous utilisez la sous-fenêtre Utilisation du répertoire, il est plus sûr de sélectionner l’option « Aucune modification » dans la configuration de répertoire du serveur. Une fois la configuration terminée, vous pouvez effectuer certains ajustements si nécessaire. Pour ce faire,suivez les instructions qui apparaissent dans Administration d’Open Directory. Il est impossible d’activer ou de désactiver le service de messagerie ou le service WebDAV dans la sous-fenêtre Services. Si l’un ou l’autre de ces services est en cours d’exécution lorsque vous effectuez la mise à niveau, il sera en cours d’exécution une fois la mise à niveau terminée. De même,si l’un ou l’autre de ces services est inactif lors de la mise à niveau, il restera inactif après celle-ci. Pour activer ou désactiver le service de messagerie ou le service WebDAV, servez-vous d’Admin Serveur une fois la configuration initiale du serveur terminée. Une fois entrées les données de configuration, l’Assistant du serveur affiche un résumé des données. 11 Révisez les données de configuration, en cliquant de manière facultative sur Revenir pour les modifier. 12 Pour lancer la configuration du serveur, cliquez sur Appliquer.Chapitre 4 Mise à niveau de Mac OS X Server 10.3 57 13 Au terme de la configuration du serveur, cliquez sur Redémarrer. Remarque :il se peut que vous deviez démarrer manuellement le service de messagerie après la mise à niveau du serveur. Étape 5 :procédez aux ajustements nécessaires au terme de la configuration initiale du serveur Servez-vous du Gestionnaire de groupe de travail, d’Admin Serveur, de Terminal et des autres applications pour affiner les réglages de votre serveur et tirer parti des nouvelles fonctionnalités de la version 10.5. Pour obtenir des explications relatives aux nouvelles fonctionnalités et à celles qui ont été modifiées, reportez-vous au guide d’administration de chaque service. Voici quelques suggestions intéressantes. WebObjects Restaurez httpd.conf à la version précédente (httpd.conf.AppleSaved), ou incluez la ligne suivante dans le nouveau fichier httpd.conf : Include /Système/Bibliothèque/WebObjects/Adaptors/Apache/apache.conf Si vous n’avez pas installé Java 1.4.2 sur votre serveur 10.3.9, vous devez mettre manuellement à jour les projets d’application WebObjects pour pouvoir utiliser la version de la Machine virtuelle Java (JVM, Java Virtual Machine) qui vous a été fournie avec la version 10.5. Pour mettre à jour un projet WebObjects : 1 Ouvrez le projet dans Xcode. 2 Dans la présentation Expert des réglages de la cible principale, changez la valeur de la propriété de JAVA_VM à java. Remarque :les services JavaMonitor et WebObjects Task Daemon (wotaskd) sont désormais gérés par launchd, et il est possible d’y accéder par l’intermédiaire d’Admin Serveur. Si le serveur que vous mettez à niveau comprend l’élément de démarrage /Système/Bibliothèque/StartupItems/WebObjects, vous pouvez l’ignorez. En effet, cet élément est désactivé par défaut, et il n’est pas nécessaire pour le démarrage automatique des services WebObjects avec Mac OS X Server 10.5. Pour en savoir plus, reportezvous à Administration des technologies web et Déploiement de WebObjects.58 Chapitre 4Mise à niveau de Mac OS X Server 10.3 Certificats Secure Sockets Layer (SSL) Servez-vous d’Admin Serveur pour importer les certificats SSL existants que vous souhaitez continuer à utiliser pour les services iChat, Open Directory, de messagerie ou web. Pour importer un certificat SSL : 1 Ouvrez Admin Serveur. 2 Dans la liste des ordinateurs et des services, sélectionnez le serveur mis à niveau. 3 Cliquez sur Certificats. 4 Importez les certificats que vous souhaitez utiliser. Vous pouvez aussi créer un certificat auto-signé et générer une demande de signature de certificat (CSR, Certificate Signing Request) afin d’obtenir un certificat SSL délivré par une autorité de certificat, puis installer celui-ci. 5 Cliquez sur Enregistrer. 6 Activez les certificats de chaque service. Pour en savoir plus sur l’importation, la création et l’activation des certificats auto-signés, reportez-vous à Administration du service iChat, Administration du service de messagerie, à Administration d’Open Directory et à Administration des technologies web. Groupes Si vous souhaitez que les groupes puissent utiliser les nouvelles fonctionnalités de la version 10.5 telles que l’emboîtement et la vérification plus stricte de l’adhésion de groupe, mettez les fiches de groupe à niveau à l’aide du Gestionnaire de groupe de travail. Pour mettre à niveau un enregistrement de groupe : 1 Ouvrez Gestionnaire de groupe de travail. 2 Ouvrez le répertoire qui contient les groupes concernés. 3 Sélectionnez un ou plusieurs groupes, puis cliquez sur « Mettre à niveau le groupe hérité ». 4 Cliquez sur Enregistrer. Services de répertoire Après la mise à niveau, il est conseillé de convertir un répertoire NetInfo partagé en LDAP. Pour obtenir des informations détaillées sur les avantages de l’utilisation du protocole LDAP et pour savoir comment effectuer la conversion à l’aide d’Admin Serveur, reportezvous à Administration d’Open Directory. Si vous souhaitez activer Kerberos pour un maître Open Directory pour lequel il n’est pas activé, servez-vous de la commande suivante qui permet de conserver les mots de passe existants et de les ajouter à un nouveau centre de distribution de clés (KDC, Key Distribution Center) : slapconfig -kerberizeChapitre 4 Mise à niveau de Mac OS X Server 10.3 59 Si vous avez des comptes utilisateurs qui fonctionnent avec des mots de passe chiffrés et que vous ne kerbérisez pas ces derniers à l’aide de la commande ci-dessus, vous pouvez vous servir du Gestionnaire de groupe de travail pour utiliser un mot de passe Open Directory : Pour utiliser le Gestionnaire de groupe de travail, ouvrez l’application, puis accédez au répertoire dans lequel réside le compte utilisateur. Authentifiez-vous en tant qu’administrateur de domaine Open Directory (habituellement, diradmin), puis sélectionnez un utilisateur avec un mot de passe chiffré. Cliquez sur Avancé, choisissez Open Directory dans le menu local Type du mot de passe, cliquez sur Élémentaires, spécifiez un nouveau mot de passe, puis cliquez sur Enregistrer. Pour en savoir plus sur slapconfig, reportez-vous à sa page man. Listes de contrôle d’accès LDAP En raison d’un changement de format, vous devez déplacer manuellement les listes de contrôle d’accès (ACL, Access Control List) LDAP une fois la mise à niveau terminée. Pendant le processus de mise à niveau, le contenant ou la fiche des contrôles d’accès (accesscontrols) et des informations relatives aux listes de contrôles n’est disponible qu’en lecture seule. Ajoutez des listes de contrôle d’accès personnalisées au nouvel attribut olcAccess (dans olcBDBConfig).Vous devez aussi vous servir de la directive set au lieu de la directive group. Schémas LDAP Si vous mettez à jour le fichier slapd.conf lors de l’ajout de fichiers de schéma, exécutez la commande slaptest. Cette commande permet d’identifier le changement correspondant à l’ajout du nouveau schéma et de le rendre persistant dans la base de données. Pour exécuter la commande slaptest : 1 Créez une copie de sauvegarde du répertoire slapd.d (dans /etc/openldap). 2 Exécutez la commande suivante pour spécifier un autre fichier slapd.conf : slaptest -f -F 3 Comparez l’ancien répertoire slapd.d et le nouveau pour déterminer les modifications à effectuer. 4 Relancez slapd. Images NetBoot Après la mise à niveau, vous pouvez réutiliser les images NetBoot créées avec la version v10.3. Pour gérer les images Netboot, servez-vous de l’Utilitaire d’images de système, qui remplace l’Utilitaire d’images de réseau pendant la mise à niveau.60 Chapitre 4Mise à niveau de Mac OS X Server 10.3 Service d’impression Pour restaurer les réglages du service d’impression, vous devez tout d’abord créer à nouveau les files d’attente CUPS d’origine avant d’importer les réglages enregistrés. Dans le cas des imprimantes connectées directement au serveur via un port USB, le système d’impression CUPS crée les files d’attente dès que vous connectez ces imprimantes au serveur et les allumez.Toutefois, vous devez ajouter les imprimantes réseau en cliquant sur Admin Serveur > Impression (pour les imprimantes LPR ou AppleTalk) ou sur Préférences Système > Imprimantes et fax (pour tous les types d’imprimante). Important :lorsque vous créez à nouveau une file d’attente CUPS, assurez-vous de lui redonner le même nom que celui qu’elle avait avant le processus de mise à niveau. Si le nom est différent, Admin Serveur n’importera pas les réglages correctement. Important :si vous créez les files d’attente d’impression à l’aide de la sous-fenêtre Imprimantes et fax des Préférences Système, indiquez « Postscript générique (PPD générique) » pour toute file d’attente appliquant des quotas étant donné qu’il existe des problèmes connus avec les gestionnaires d’impression de tierce partie et les quotas CUPS. Pour en savoir plus à ce sujet, reportez-vous à l’article de la Base de connaissances que vous trouverez à l’adresse suivante : http://docs.info.apple.com/article.html?artnum=303538. Une fois les files d’attente d’impression créées, importez les réglages enregistrés : réglages serveradmin exported_print_settings DNS La première fois que vous sélectionnez DNS dans Admin Serveur après une mise à niveau, Admin Serveur vous demande si vous souhaitez effectuer une mise à niveau. Si vous cliquez sur « Ne pas mettre à niveau », Admin Serveur ne modifie pas les fichiers de configuration du service DNS qui existaient avant la mise à niveau vers la version 10.5. Le service DNS continue de s’exécuter, mais il n’est plus possible de modifier sa configuration à l’aide d’Admin Serveur. Si des changements sont nécessaires, vous devez éditer les fichiers de configuration du service DNS. Si vous cliquez sur Mettre à niveau, Admin Serveur met les fichiers de configuration à niveau au format 10.5. Ceci fait, vous pouvez vous servir d’Admin Serveur pour apporter des modifications à la configuration du service DNS. Historique de la mise à niveau d’Open Directory Les informations relatives à la mise à niveau du serveur LDAP Open Directory sont stockées dans le fichier /Bibliothèque/Logs/slapconfig.log. Service Web Si vous avez apporté des modifications à /etc/httpd/workers.properties, appliquez à nouveau celles-ci à la version du fichier installée avec la version 10.5.Chapitre 4 Mise à niveau de Mac OS X Server 10.3 61 Mise à niveau du serveur web Apache vers la version 2.2 à partir de la version 1.3 Lorsque vous effectuez une mise à niveau de Mac OS X Server 10.3.9 vers Mac OS X Server 10.5, le processus de mise à niveau maintient la configuration de service web utilisée pour exécuter Apache 1.3. Pour passer à la version 2.2 d’Apache après la mise à niveau vers Mac OS X Server 10.5, utilisez l’option du service web prévue pour la mise à niveau d’Apache, accessible depuis Admin Serveur. Pour en savoir plus, consultez la section « Mise à niveau du serveur web Apache vers la version 2.2 à partir de la version 1.3 » à la page 27.5 63 5 Migration à partir de Mac OS X Server 10.3 Suivez les instructions de ce chapitre si vous devez faire migrer des données d’un serveur 10.3.9 vers un autre ordinateur tournant sous la version 10.5. Il est possible de faire migrer les données qui se trouvent sur des ordinateurs Mac OS X Server 10.3.9 même si ceux-ci ne peuvent pas être ou ne seront pas mis à niveau vers la version 10.5 ou ultérieure. Il se peut que ces ordinateurs :  requièrent un reformatage du disque dur ou un remplacement par un ordinateur plus récent ;  utilisent un matériel de serveur qui ne dispose pas des éléments suivants :  un processeur Intel ou PowerPC G4 ou G5 cadencé à 867 MHz ou plus,  au moins 1 Go de mémoire vive (RAM),  au moins 20 Go d’espace disque disponible. Avant de commencer Avant de suivre les instructions de ce chapitre, procédez à la configuration initiale du serveur 10.5 vers lequel vous ferez migrer les données. Pour obtenir des instructions, consultez la section Premiers contacts. Au besoin, mettez à niveau le serveur dont vous ferez migrer les données de sorte qu’il tourne sous la version 10.3.9. Si le serveur est un maître ou une réplique Open Directory, configurez tout d’abord le maître 10.5, puis les répliques 10.5.64 Chapitre 5Migration à partir de Mac OS X Server 10.3 Pour rétablir le maître et ses répliques : 1 Configurez le maître 10.5. Pendant la configuration du maître, les ordinateurs clients ne peuvent pas se connecter au maître 10.3.9 pour accéder aux services Open Directory. En outre, il se peut que les ordinateurs clients aient à patienter un peu à cause d’un délai lors de la recherche automatique de la réplique de serveur Open Directory la plus proche. Vous pouvez remédier à ce retard en modifiant le service DHCP pour utiliser l’adresse d’un serveur réplique Open Directory s’il fournit aux clients l’adresse d’un serveur LDAP. Lorsque le maître 10.5 est prêt, vous pouvez modifier le service DHCP de sorte qu’il utilise l’adresse du maître. Pour obtenir des instructions sur la configuration des réglages LDAP relatifs au service DHCP, reportez-vous à Administration des services de réseau. 2 Modifiez le rôle de la réplique 10.3.9 de sorte qu’elle soit autonome, puis configurez le serveur 10.5 pour en faire une réplique du maître 10.5. Administration d’Open Directory contient des instructions relatives à la modification du rôle Open Directory d’un serveur afin de rendre ce dernier autonome et d’en faire une réplique. Pour obtenir des informations sur la réinitialisation des mots de passe sur le maître, consultez l’étape 6 page 73. Éléments pouvant migrer Les informations qui apparaissent dans « Instructions pas à pas » à la page 66 expliquent comment réutiliser avec la version 10.5 les données de la version 10.3 indiquées ci-dessous :  Données de configuration Web  Contenu Web  Données MySQL  Base de données de courrier  Données WebMail  Fichiers de configuration FTP  Images NetBoot  Applications et structures WebObjects  Données Tomcat  Applications JBoss  Réglages AFP  Configuration de coupe-feu IP  Configuration DNS  Réglages DHCP  Réglages NATChapitre 5 Migration à partir de Mac OS X Server 10.3 65  Réglages d’impression  Réglages VPN  Données utilisateur, notamment les répertoires de départ  Fichiers et dossiers du Serveur d’enchaînement QuickTime  Fichiers et dossiers de QTSS Publisher  Comptes d’utilisateur et de groupe Utilisez serveradmin ou Admin Serveur pour exporter tous les réglages de service afin de pouvoir vous y reporter ultérieurement. Enregistrez les réglages de service exportés sur un disque amovible ou sur un autre système. Remarque :l’une des méthodes permettant d’enregistrer les réglages de service dans Admin Serveur consiste à sélectionner le service dans la liste des ordinateurs et des services située à gauche, à cliquer sur Réglages, puis à faire glisser le bouton situé dans l’angle inférieur droit sur le Bureau. Cette action crée sur le Bureau un fichier contenant les réglages de service. Dans la version 10.5, watchdog a été remplacé par launchd. Pour réactiver le redémarrage automatique du matériel, utilisez la sous-fenêtre Économiseur d’énergie des Préférences Système. Pour faire migrer les réglages correspondant aux services que vous avez ajoutés à /etc/watchdog.conf, créez un fichier plist launchd et installez-le dans /Système/Bibliothèque/LaunchDaemons/. Pour en savoir plus sur launchd, reportez-vous à sa page man. Outils pouvant être utilisés Plusieurs outils sont disponibles :  Vous pouvez vous servir du Gestionnaire de groupe de travail pour exporter des comptes utilisateurs et de groupe de la version 10.3 vers un fichier délimité par des caractères, puis les importer dans un serveur 10.5.Vous pouvez également importer des utilisateurs et des groupes à l’aide de l’outil de ligne de commande dsimport.  La fonction d’importation de Gestionnaire de groupe de travail et l’outil dsimport vous permettent également d’importer d’autres types de données, comme des ordinateurs et des listes d’ordinateurs.  Utilisez l’outil 59_webconfigmigrator pour faire migrer votre configuration Web.  Utilisez l’outil 50_ipfwconfigmigrator pour faire migrer votre configuration de coupe-feu. Les instructions des sections suivantes expliquent quand et comment utiliser ces utilitaires.66 Chapitre 5Migration à partir de Mac OS X Server 10.3 Instructions pas à pas Pour déplacer des données d’un ordinateur Mac OS X Server 10.3.9 vers un ordinateur sur lequel Mac OS X Server 10.5 est installé, suivez les instructions de cette rubrique. Étape 1 :exportation d’utilisateurs et de groupes Servez-vous du Gestionnaire de groupe de travail pour exporter des comptes utilisateurs et de groupe depuis un répertoire NetInfo ou LDAP3 vers un fichier délimité par des caractères qui peut ensuite être importé dans un répertoire pour être utilisé avec Mac OS X Server 10.5. 1 Exportez les informations des utilisateurs et groupes. 2 Créez des fichiers d'archive des données et un fichier utilisateur d'exportation. 4 Copiez les fichiers d'archive vers le nouveau serveur. 6 Importez les fichiers des utilisateurs et groupes. 8 Configurez les points de partage et les autorisations. 9 Testez le nouveau serveur. 7 Replacez les fichiers de données sur le nouveau serveur. 3 Notez les points de partage et les autorisations actuels. utilisateur groupe 2017 Gestionnaire de groupe de travail Gestionnaire de groupe de travail ou outil dsimport 5 Configurez l'infrastructure des répertoires de départ. Ingénierie Lecture et écriture Bureau d'études Documents Lecture seule Lecture et écriture Shared Folders Shared Folders Ingénierie Lecture et écriture Bureau d'études Documents Lecture seule Lecture et écriture .XML Ingénierie Lecture et écriture Bureau d'études Documents Lecture seule Lecture et écriture Shared Folders utilisateur groupe 2017 donnéesutilisateur.tar basededonnées.tar donnéesutilisateur.tar basededonnées.tarChapitre 5 Migration à partir de Mac OS X Server 10.3 67 Pour exporter des utilisateurs et des groupes : 1 Dans Gestionnaire de groupe de travail, cliquez sur Comptes, puis sur l’icône représentant un globe sous la barre d’outils et choisissez le répertoire à partir duquel vous souhaitez exporter des comptes. 2 Cliquez sur le cadenas pour vous authentifier en tant qu’administrateur de domaine. 3 Cliquez sur le bouton Utilisateurs pour exporter des utilisateurs ou sur le bouton Groupes pour exporter des groupes. 4 Exportez les comptes utilisateurs ou de groupe comme suit :  Pour exporter l’ensemble des comptes, sélectionnez-les tous.  Pour exporter un compte particulier, sélectionnez-le.  Pour exporter plusieurs comptes, sélectionnez-les en maintenant enfoncée la touche Commande ou Maj. 5 Choisissez Serveur > Exporter. 6 Spécifiez un nom à attribuer au fichier d’exportation ainsi que son emplacement. 7 Cliquez sur Exporter. Lorsque vous exportez des utilisateurs à l’aide de Gestionnaire de groupe de travail, les informations des mots de passe ne sont pas exportées. Si vous souhaitez définir des mots de passe, vous pouvez modifier le fichier d’exportation avant de l’importer ou définir chaque mot de passe après l’importation à l’aide de la commande passwd ou du Gestionnaire de groupe de travail. Pour en savoir plus sur la définition des mots de passe après l’importation des utilisateurs, reportez-vous à Gestion des utilisateurs. Étape 2 :créez des archives des fichiers suivants Enregistrez tous les fichiers de données que vous souhaitez réutiliser avec Mac OS X Server 10.5. Lors de l’étape 4, vous déplacerez les fichiers décrits ci-dessous, ainsi que le fichier d’exportation créé lors de l’étape 1 vers l’ordinateur qui tourne sous la version 10.5. Pour les grandes quantités de données, vous pouvez créer une ou plusieurs archives tar, ou utiliser /usr/bin/mkdmg pour créer des fichiers d’image disque. Vous pouvez transférer des images disque et des fichiers tar en vous servant des protocoles AFP ou FTP. Remarque :vous pouvez aussi utiliser scp -r pour effectuer une copie sécurisée des fichiers et rsync pour copier les fichiers à distance. La commande rsync est particulièrement utile si vous avez une grande quantité de données qu’il est possible de faire migrer avant le passage à la nouvelle version puis de mettre rapidement à jour.68 Chapitre 5Migration à partir de Mac OS X Server 10.3 Pour créer une archive tar, utilisez la commande tar dans l’application Terminal. L’indicateur -c de la commande crée un fichier d’archives au format tar. Utilisez l’indicateur - f pour spécifier le nom du fichier d’archives. Utilisez l’indicateur -v (détaillé) pour afficher les informations relatives à la progression lors de l’exécution de la commande : tar -cvf /MyHFSVolume/Stuff.tar /MyHFSVolume/My\ Stuff Le caractère d’échappement (\ dans l’exemple ci-dessus) indique un espace dans le nom. Vous pouvez également utiliser des guillemets pour gérer les espaces incorporés : tar -cvf /MyHFSVolume/Stuff.tar “/MyHFSVolume/My Stuff” Données de configuration Web Enregistrez les fichiers et les répertoires suivants :  /etc/httpd/httpd.conf  /etc/httpd/httpd_macosxserver.conf  /etc/httpd/httpd_squirrelmail.conf  /etc/httpd/magic  /etc/httpd/mime.types  /etc/httpd/mime_macosxserver.types  /etc/httpd/ssl.crt  /etc/httpd/ssl.key  /etc/httpd/tomcat.conf  /etc/webperfcache/webperfcache.conf  /Bibliothèque/WebServer/ Contenu Web Copiez le contenu Web que vous souhaitez réutiliser à partir de :  /Bibliothèque/WebServer/Documents/  /Bibliothèque/WebServer/CGI-Executables/  Tout autre emplacement dans lequel il se trouve Données MySQL Mac OS X Server 10.3.9 comprend la version 4.0.18 de MySQL. Mac OS X Server 10.5 installe MySQL 5.0.45. Pour faire migrer des bases de données MySQL d’un ordinateur vers un autre, vous pouvez vous servir de la commande mysqldump afin de créer une copie de sauvegarde de vos données. Cette commande est différente selon l’ampleur des données à sauvegarder. La migration peut en effet concerner des tables individuelles, une ou plusieurs bases de données ou toutes les bases de données qui se trouvent sur le serveur.Chapitre 5 Migration à partir de Mac OS X Server 10.3 69 Pour créer une copie de sécurité de tables particulières, tapez : mysqldump database tb1 [tb2 tb3...] > backup-file.sql où database est le nom de la base de données qui contient les tables répertoriées et tb1, tb2 et tb3 le nom des tables. Pour créer une copie de sauvegarde d’une ou plusieurs bases de données, tapez : mysqldump --databases db1 [db2 db3...] > backup-file.sql Pour créer une copie de sauvegarde de toutes les bases de données du système, tapez : mysqldump --all-databases > backup-file.sql Vous trouverez des instructions supplémentaires à propos de la sauvegarde et de la restauration des bases de données dans la documentation relative à MySQL sur le site www.mysql.org. Pour créer une copie de sauvegarde des tables ou des bases de données qui requièrent un accès root (par exemple, les tables d’octroi de privilèges et les autres données d’accès restreint), exécutez la commande mysqldump avec les options --user=root et -p : mysqldump --user=root -p --all-datagases > backup-file.sql Lorsque vous utilisez l’option -p, mysqldump vous demande le mot de passe root de MySQL avant de continuer. Base de données de courrier Si vous souhaitez réutiliser la base de données et le stockage du courrier, arrêtez le service de messagerie s’il est en cours d’exécution et enregistrez les fichiers de la messagerie. Si le service de messagerie n’est pas en cours d’exécution, vous pouvez copier tous ses répertoires. Par défaut :  La base de données de courrier est situé à l’emplacement /var/imap/.  Le stockage de courrier est situé à l’emplacement /var/spool/imap/. Vous pouvez sauvegarder des dossiers individuels de stockage de courrier ou bien l’ensemble du stockage de courrier. L’outil de ligne de commande ditto est utile pour sauvegarder les fichiers de courrier. Pour en savoir plus sur ditto, reportez-vous à sa page man. Par ailleurs, enregistrez une copie du fichier /usr/bin/cyrus/bin/ctl_mboxlist afin de pouvoir déplacer celui-ci sur le serveur 10.5 lors de l’étape 4 décrite page 72. Ce fichier est nécessaire pour que la migration de la base de données du service de messagerie puisse se faire correctement lors de l’étape 7 décrite page 75.70 Chapitre 5Migration à partir de Mac OS X Server 10.3 Données WebMail Si vous avez utilisé SquirrelMail, installé en même temps que la version 10.3, et que vous souhaitez continuer à vous en servir après la migration, créez des copies des carnets d’adresses et des préférences stockés dans /var/db/squirrelmail/data/. Fichiers de configuration FTP Pour migrer vos réglages FTP, sauvegardez les fichiers de configuration suivants : AFP Enregistrez /Bibliothèque/Preferences/com.apple.AppleFileServer.plist. Images NetBoot Vous pouvez faire migrer les images NetBoot créées avec Mac OS X Server 10.3. Enregistrez le dossier .nbi de chacune des images que vous souhaitez faire migrer en notant le chemin d’accès à ce dossier si vous souhaitez le créer à nouveau dans la version 10.5. Enregistrez aussi les réglages NetBoot. Dans Admin Serveur, sélectionnez NetBoot dans la liste des ordinateurs et des services située à gauche, cliquez sur Réglages, puis faites glisser le bouton situé dans l’angle inférieur droit vers le Bureau. Cette action crée sur le Bureau un fichier contenant les réglages du service NetBoot. Enregistrez ce fichier. Applications et structures WebObjects Enregistrez les applications et structures WebObjects situées dans :  /Bibliothèque/WebObjects/  /Système/Bibliothèque/WebObjects/ Données Tomcat Enregistrez les servlets Tomcat que vous souhaitez réutiliser. Ils se trouvent dans /Bibliothèque/Tomcat/webapps/. Si vous avez installé Axis indépendamment de la version fournie avec le serveur, enregistrez les éventuels services SOAP (Simple Object Access Protocol). Applications JBoss Enregistrez les applications JBoss situées dans /Bibliothèque/JBoss/3.2/deploy/. Dans ce répertoire Sauvegardez ces fichiers /Bibliothèque/FTPServer/Configuration/ ftpaccess ftpconversions ftphosts ftpgroups ftpusers /Bibliothèque/FTPServer/Messages/ banner.txt welcome.txt limit.txtChapitre 5 Migration à partir de Mac OS X Server 10.3 71 Coupe-feu IP Dans l’application Terminal, exécutez la commande suivante : sudo /Système/Bibliothèque/ServerSetup/MigrationExtras/ 50_ipfwconfigmigrator Ensuite, enregistrez le contenu de /etc/ipfilter. NAT Enregistrez le contenu de /etc/nat/natd.plist. Impression Utilisez la commande serveradmin settings print pour enregistrer les réglages d’impression avant de commencer le processus de migration. serveradmin settings print > exported_print_settings Par ailleurs, consignez le nom et l’identifiant des files d’attente CUPS afin de pouvoir les utiliser ultérieurement. VPN Copiez :  /Bibliothèque/Préférences/SystemConfiguration/com.apple.RemoteAccessServers.plist  /Bibliothèque/Keychains/System.keychain  /etc/racoon/psk.text Si le L2TP est configuré et que le secret partagé IPsec est stocké dans psk.text, ce secret partagé peut aussi être stocké dans com.apple.RemoteAccessServers.plist ou System.keychain. DNS Enregistrez le fichier /etc/named.conf et le répertoire /var/named/, ainsi que tout son contenu. DHCP Dans Admin Serveur, sélectionnez le service DHCP à gauche, cliquez sur Réglages, puis faites glisser le bouton situé dans l’angle inférieur droit vers le Bureau. Cette action crée sur le Bureau un fichier contenant les réglages du service DHCP. Enregistrez ce fichier. Données utilisateur Enregistrez tous les dossiers ou fichiers de données utilisateur que vous souhaitez réutiliser, en particulier les dossiers du répertoire de départ. Fichiers et dossiers du Serveur d’enchaînement QuickTime Enregistrez les fichiers et les dossiers du répertoire /Bibliothèque/QuickTimeStreaming/.72 Chapitre 5Migration à partir de Mac OS X Server 10.3 Fichiers et dossiers de QTSS Publisher Enregistrez ce qui suit :  les fichiers et les dossiers qui se trouvent dans /Bibliothèque/Application Support/Apple/QTSS Publisher/  les fichiers et les dossiers de chaque chemin d’utilisateur QTSS Publisher : /Users//Bibliothèque/Application Support/Apple/QTSS Publisher Étape 3 :points de partage et autorisations actuels Si votre serveur 10.3 contient des points de partage et des privilèges que vous souhaitez créer à nouveau sur le serveur 10.5, notez-les. Consignez les points de partage destinés aux répertoires de départ. Étape 4 :copie des fichiers d’archive sur le nouveau serveur Transférez les fichiers enregistrés lors des étapes 1 et 2 sur le serveur 10.5. Pour transférer les fichiers tar ou les images de disque via FTP : 1 Utilisez Admin Serveur sur le nouveau serveur afin de démarrer le service FTP. 2 Configurez le partage pour le dossier dans lequel vous placerez les fichiers transférés depuis l’ordinateur 10.3. 3 Sur le serveur 10.3, servez-vous du service FTP pour copier les fichiers tar ou les images disque sur l’ordinateur 10.5. 4 Sur le serveur 10.5, double-cliquez sur un fichier tar pour en extraire le contenu ou doublecliquez sur une image disque pour la monter. Étape 5 :configuration de l’infrastructure des répertoires de départ Configurez la destination des répertoires de départ que vous souhaitez restaurer. L’emplacement des répertoires de départ identifié dans les comptes d’utilisateur importés doit correspondre à l’emplacement physique des répertoires de départ restaurés, y compris l’emplacement du point de partage. Pour obtenir des explications détaillées sur la marche à suivre en ce qui concerne les étapes de la procédure ci-dessous, reportez-vous à Gestion des utilisateurs. Pour préparer le serveur pour le stockage des répertoires de départ : 1 Si nécessaire, créez le dossier que vous souhaitez utiliser comme point de partage du répertoire de départ. Si vous le souhaitez, vous pouvez utiliser le dossier /Utilisateurs prédéfini. 2 Ouvrez Admin Serveur sur le serveur où vous souhaitez stocker les répertoires de départ.Chapitre 5 Migration à partir de Mac OS X Server 10.3 73 3 Cliquez sur Partage de fichiers pour configurer un point de partage pour les répertoires de départ. Si les comptes utilisateurs sont destinés à résider dans un répertoire Open Directory partagé, créez un point de partage AFP ou NFS à montage automatique dynamique pour les répertoires de départ. Assurez-vous que le point de partage est publié dans le répertoire dans lequel résideront les comptes d’utilisateur qui en dépendent. 4 Dans le Gestionnaire de groupe de travail de l’ordinateur à partir duquel vous allez importer les utilisateurs, cliquez sur Comptes, puis ouvrez le répertoire dans lequel les utilisateurs importés seront stockés. Si vous restaurez les répertoires de départ à des emplacements qui ne correspondent pas exactement à ceux identifiés dans les fiches utilisateurs exportées, vous pouvez configurer un préréglage qui identifie l’emplacement de restauration. Si vous identifiez le préréglage lors de l’importation des utilisateurs, le nouvel emplacement remplace celui qui existe dans les enregistrements utilisateur. Vous pouvez également utiliser le préréglage pour spécifier d’autres réglages par défaut dont les utilisateurs importés doivent hériter, par exemple pour les mots de passe, le courrier, etc. Étape 6 :importation d’utilisateurs, de groupes et d’autres données Vous pouvez vous servir du Gestionnaire de groupe de travail ou de l’outil dsimport pour importer des utilisateurs, des groupes et d’autres données : Pour en savoir plus sur l’importation à l’aide du Gestionnaire de groupe de travail, reportez-vous à Gestion des utilisateurs. Pour en savoir plus sur les mots de passe des utilisateurs créés à l’origine avec Mac OS X Server 10.1.5 ou antérieur, reportez-vous à Administration d’Open Directory. Pour en savoir plus sur dsimport et pour obtenir une description du format d’exportation du Gestionnaire de groupe de travail, reportez-vous à Administration de ligne de commande.74 Chapitre 5Migration à partir de Mac OS X Server 10.3 Pour importer des utilisateurs et des groupes à l’aide de Gestionnaire de groupe de travail : 1 Placez les fichiers d’exportation créés lors de l’étape 1 dans un emplacement accessible à partir du serveur. Vous pouvez modifier les comptes d’utilisateur dans un fichier d’exportation si vous souhaitez définir des mots de passe avant d’importer les utilisateurs. Pour obtenir des instructions, consultez la section Gestion des utilisateurs. En outre, vous pouvez configurer le préréglage défini lors de l’étape 5 ci-dessus de sorte que le mot de passe des utilisateurs soit validé à l’aide de l’authentification Open Directory, et vous pouvez configurer les options de validation de mot de passe afin d’obliger les utilisateurs à changer de mot de passe la prochaine fois qu’ils ouvriront une session. Pour obtenir des informations sur l’utilisation de mots de passe Kerberos, reportez-vous à la dernière étape de cette procédure. 2 Dans Gestionnaire de groupe de travail, cliquez sur Comptes. 3 Dans la barre d’outils, cliquez sur l’icône représentant un globe afin d’ouvrir le répertoire dans lequel vous souhaitez importer les comptes. 4 Cliquez sur le cadenas pour vous authentifier en tant qu’administrateur de domaine. 5 Choisissez Serveur > Importer, sélectionnez le fichier d’importation, puis spécifiez les options d’importation. Si vous utilisez un préréglage, assurez-vous de le spécifier. 6 Cliquez sur Importer. 7 Si vous souhaitez que les groupes puissent utiliser les nouvelles fonctionnalités de la version 10.5, mettez-les à niveau à l’aide du Gestionnaire de groupe de travail. Dans le Gestionnaire de groupe de travail, ouvrez le répertoire qui contient les groupes, sélectionnez un ou plusieurs groupes, cliquez sur « Mettre à niveau le groupe hérité », puis cliquez sur Enregistrer. 8 Pour créer des répertoires de départ pour les utilisateurs importés, utilisez l’une des options suivantes : Créez les répertoires de départ un par un, en sélectionnant un compte d’utilisateur dans Gestionnaire de groupe de travail, en cliquant sur Départ, puis sur Créer Départ. Créez tous les répertoires de départ en utilisant l’argument -a de la commande createhomedir. Pour plus de détails, reportez-vous à Administration de ligne de commande ou à la page man de createhomedir. S’il n’existe pas déjà, un répertoire de départ associé à un point de partage AFP est créé la première fois que l’utilisateur ouvre une session.Chapitre 5 Migration à partir de Mac OS X Server 10.3 75 9 Si vous souhaitez activer Kerberos pour un maître Open Directory pour lequel il n’est pas activé, servez-vous de la commande suivante qui permet de conserver les mots de passe existants et de les ajouter à un nouveau centre de distribution de clés (KDC, Key Distribution Center). slapconfig -kerberize Si vous avez des comptes utilisateurs qui fonctionnent avec des mots de passe chiffrés et que vous ne kerbérisez pas ces derniers à l’aide de la commande ci-dessus, vous pouvez vous servir du Gestionnaire de groupe de travail pour utiliser un mot de passe Open Directory. Pour utiliser le Gestionnaire de groupe de travail, ouvrez l’application, puis accédez au répertoire où réside le compte utilisateur. Authentifiez-vous en tant qu’administrateur de domaine, puis sélectionnez un utilisateur avec un mot de passe crypté. Cliquez sur Avancé, choisissez Open Directory dans le menu local Type du mot de passe, cliquez sur Élémentaires,spécifiez un nouveau mot de passe, puis cliquez sur Enregistrer. Pour en savoir plus sur slapconfig, reportez-vous à sa page man. Étape 7 :replacement des fichiers de données enregistrés Placez les fichiers enregistrés à partir de votre serveur 10.3 dans leurs emplacements respectifs finaux. Données de configuration Web Pour faire migrer les données de configuration web : 1 Ouvrez Admin Serveur. 2 Sous le serveur 10.5 dans la liste des ordinateurs et des services, cliquez sur Web. 3 Cliquez sur « Arrêter le service web » si le service web est en cours d’exécution. 4 Supprimez les fichiers suivants :  /etc/httpd/sites  /etc/httpd/ssl.crt  /etc/httpd/ssl.key 5 Copiez le répertoire et les fichiers enregistrés avec la version 10.3 sur le serveur 10.5. 6 Ouvrez l’application Terminal, puis, avec les privilèges root, tapez la commande suivante : sudo /Système/Bibliothèque/ServerSetup/MigrationExtras/59_webconfigmigrator Un historique des modifications apportées aux fichiers est créé dans le fichier /Bibliothèque/Logs/Migration/webconfigmigrator.log. Les fichiers de la version 10.3 qui se trouvent dans /etc/httpd/ sont renommés de sorte que leurs noms soient httpd.conf.obsolete, httpd_macosxserver.conf.obsolete et mime_macosxserver.types.obsolete. Un nouveau fichier httpd.conf et un nouveau répertoire de sites sont créés.76 Chapitre 5Migration à partir de Mac OS X Server 10.3 7 Si vous avez modifié /etc/httpd/workers.properties, appliquez à nouveau toutes les modifications à la version du fichier installée avec le serveur 10.5. Le fichier workers.properties de la version 10.5 contient une nouvelle entrée pour le service Blog. 8 Dans Admin Serveur, démarrez le service Web. Contenu Web Copiez le contenu web enregistré dans les emplacements suivants et dans tous les autres endroits où vous avez placé du contenu web sur le serveur :  /Bibliothèque/WebServer/Documents/  /Bibliothèque/WebServer/CGI-Executables/ Données MySQL Avant d’importer les données sauvegardées de MySQL, assurez-vous que le service MySQL est activé. Vous pouvez activer le service MySQL à l’aide d’Admin Serveur ou de la commande serveradmin. Pour activer le service MySQL à l’aide de la commande serveradmin, tapez : serveradmin start mysql Pour importer les copies de sauvegarde de bases de données, tapez : mysql < backup-file.sql Pour importer des données dans des bases de données auxquelles il n’est possible d’accéder que si l’on dispose de privilèges, exécutez la commande mysql avec les options --user=root et -p : mysql --user=root -p < backup-file.sql Lorsque vous utilisez l’option -p, mysql vous demande le mot de passe root de MySQL avant de continuer. Vous trouverez des instructions supplémentaires à propos de la sauvegarde et de la restauration des bases de données MySQL dans la documentation relative à MySQL sur le site web www.mysql.org.Chapitre 5 Migration à partir de Mac OS X Server 10.3 77 Base de données de courrier Pour migrer la base de données de courrier : 1 Assurez-vous que le service de messagerie de la version 10.5 n’est pas en cours d’exécution. Ouvrez Admin Serveur, puis cliquez sur Courrier. Si le cercle qui se trouve sur le côté gauche et qui correspond à la messagerie (Mail) n’est pas grisé, cliquez sur Arrêter Mail (dans l’angle inférieur gauche). 2 Restaurez la base de données de courrier et le stockage de courrier enregistrés. La base de données de courrier est située par défaut à l’emplacement /var/imap/ et le stockage de courrier dans /var/spool/imap/. 3 Assurez-vous que les répertoires de la messagerie et leur contenu appartiennent au groupe de messagerie et à l’utilisateur _cyrus. 4 Renommez le fichier ctl_mboxlist enregistré de sorte que son nom soit ctl_mboxlist.old, puis déplacez-le vers /usr/bin/cyrus/bin/. Si ce fichier ctl_mboxlist.old est inexistant, le script upgradedb ne fonctionnera pas correctement lors de l’étape 8 ci-dessous. 5 Dans Admin Serveur, sélectionnez Mail dans la liste des ordinateurs et des services. 6 Cliquez sur Réglages, puis sur Avancé, et ensuite sur Base de données pour indiquer l’emplacement dans lequel vous avez restauré la base de données et le stockage du courrier. 7 Cliquez sur Enregistrer. 8 Exécutez le script upgradedb de la base de données de courrier : sudo -u cyrusimap /Système/Bibliothèque/ServerSetup/SetupExtras/upgradedb 9 Exécutez la commande suivante pour vous assurer que les fichiers d’index de tous les comptes de messagerie fonctionnent correctement : sudo /usr/bin/cyrus/bin/reconstruct –i 10 Dans Admin Serveur, lancez le service de messagerie en cliquant sur Mail, puis sur Démarrer Mail. Données WebMail Placez les carnets d’adresses et les préférences enregistrés dans le répertoire /var/db/squirrelmail/data/. Fichiers de configuration FTP Copiez les fichiers de configuration FTP enregistrés dans :  /Bibliothèque/FTPServer/Configuration/  /Bibliothèque/FTPServer/Messages/78 Chapitre 5Migration à partir de Mac OS X Server 10.3 Configuration AFP Pour faire migrer la configuration AFP, restaurez /Bibliothèque/Préférences/ com.apple.AppleFileServer.plist. Images NetBoot Copiez le dossier .nbi correspondant à chaque image que vous souhaitez faire migrer et placez-le éventuellement à l’emplacement où il se trouvait auparavant. Par ailleurs, restaurez le fichier qui contient les réglages NetBoot. Pour restaurer les réglages NetBoot : 1 Ouvrez Admin Serveur, puis sélectionnez NetBoot dans la liste des ordinateurs et des services. 2 Choisissez Serveur > Importer > Réglages de service pour importer les réglages NetBoot à partir du fichier que vous avez exporté auparavant (voir « Images NetBoot » à la page 70). 3 Révisez ces réglages NetBoot pour vous assurer qu’ils ont été correctement importés. Applications et structures WebObjects Pour faire migrer WebObjects : 1 Copiez les applications enregistrées dans /Bibliothèque/WebObjects/Applications/. 2 Copiez les cadres d’applications enregistrés dans /Bibliothèque/Frameworks/. 3 Ajoutez la ligne suivante au nouveau fichier httpd.conf : Include /Système/Bibliothèque/WebObjects/Adaptors/Apache/apache.conf Remarque :les services JavaMonitor et WebObjects Task Daemon (wotaskd) sont désormais gérés par launchd, et il est possible d’y accéder par l’intermédiaire d’Admin Serveur. Si le serveur que vous mettez à niveau comprend l’élément de démarrage /Système/Bibliothèque/StartupItems/WebObjects, vous pouvez l’ignorez. En effet, cet élément est désactivé par défaut, et il n’est pas nécessaire pour le démarrage automatique des services WebObjects avec Mac OS X Server 10.5. Pour en savoir plus, reportez-vous à Administration destechnologiesweb et Déploiement deWebObjects. 4 (Facultatif) Si Java 1.4.2 n’était pas installé sur votre serveur 10.3, mettez les projets d’application WebObjects à jour manuellement en les ouvrant un par un dans Xcode ; ensuite, dans la présentation Expert des réglages de la cible principale, changez la valeur de la propriété de JAVA_VM à java. Il est nécessaire de mettre ces projets à jour manuellement pour pouvoir utiliser la version de la Machine virtuelle Java (JVM,Java Virtual Machine) fournie avec Mac OS X Server 10.5. Important :il faut que Java 1.5 soit installé pour que WebObjects 5.4, qui est inclus avec Mac OS X Server 10.5, puisse fonctionner.Chapitre 5 Migration à partir de Mac OS X Server 10.3 79 Données Tomcat Restaurez les servlets Tomcat dans /Bibliothèque/Tomcat/webapps/. Placez les services SOAP que vous souhaitez faire migrer dans /Bibliothèque/Tomcat/ webapps/axis/. Il se peut que Mac OS X Server 10.5 comprenne une version d’Axis plus récente ou plus ancienne que celle que vous utilisiez jusqu’à présent. Applications JBoss JBoss n’est pas fourni avec Mac OS X Server 10.5. Pour pouvoir restaurer vos applications JBoss, vous devez installer JBoss sur votre serveur. Pour en savoir plus sur l’installation et la migration des applications JBoss, reportez-vous à la documentation de JBoss. Configuration de coupe-feu IP Pour faire migrer la configuration du Coupe-feu IP, restaurez le dossier /etc/ipfilter. Ouvrez Admin Serveur, puis cliquez sur Coupe-feu pour vérifier les réglages et vous assurer qu’ils sont correctement configurés. NAT Restaurez le contenu de /etc/nat/natd.plist. Vous pouvez restaurer à tout moment les réglages NAT par défaut de la version 10.5 (qui se trouvent dans /etc/natd/natd.plist.default) en supprimant le fichier de la configuration active (/etc/nat/natd.plist). Lors de l’accès suivant au NAT à l’aide d’Admin Serveur, le fichier de configuration par défaut est utilisé pour la création d’un nouveau fichier de configuration active. Remarque :dans la version 10.5, le réglage par défaut d’unregistered_only dans /etc/nat/natd.plist.default est « vrai ». Réglages du service d’impression Pour restaurer les réglages du service d’impression, vous devez tout d’abord créer à nouveau les files d’attente CUPS d’origine avant d’importer les réglages enregistrés. Dans le cas des imprimantes connectées directement au serveur via un port USB, le système d’impression CUPS crée les files d’attente dès que vous connectez ces imprimantes au serveur et les allumez. Pour les imprimantes réseau, vous devez ajouter les imprimantes en cliquant sur Admin Serveur > Impression (pour les imprimantes LPR ou AppleTalk) ou sur Préférences Système > Imprimantes et fax (pour tous les types d’imprimante). Important :lorsque vous créez à nouveau une file d’attente CUPS, assurez-vous de lui redonner le même nom que celui qu’elle avait sur l’ancien système. Si le nom est différent, Admin Serveur n’importera pas les réglages correctement.80 Chapitre 5Migration à partir de Mac OS X Server 10.3 Important :si vous créez les files d’attente d’impression à l’aide de la sous-fenêtre Imprimantes et fax des Préférences Système, indiquez « Postscript générique (PPD générique) » pour toute file d’attente appliquant des quotas étant donné qu’il existe des problèmes connus avec les gestionnaires d’impression de tierce partie et les quotas CUPS. Pour en savoir plus à ce sujet, reportez-vous à l’article de la Base de connaissances que vous trouverez à l’adresse suivante http://docs.info.apple.com/article.html?artnum=303538. Une fois les files d’attente d’impression créées, importez les réglages enregistrés : réglages serveradmin exported_print_settings VPN Restaurez ce qui suit :  /Bibliothèque/Préférences/SystemConfiguration/com.apple.RemoteAccessServers.plist.  /Bibliothèque/Keychains/System.keychain  /etc/racoon/psk.text Si le L2TP est configuré et que le secret partagé IPsec est stocké dans psk.text, ce secret partagé peut aussi être stocké dans com.apple.RemoteAccessServers.plist ou System.keychain. Faites migrer l’utilisateur de la clé VPN MPPE à l’aide de l’outil de ligne de commande vpnaddkeyagentuser. Pour en savoir plus sur cette commande, reportez-vous à sa page man. Configuration DNS Pour faire migrer la configuration DNS : 1 Restaurez le fichier /etc/named.conf et le répertoire /var/named/, ainsi que tout son contenu. 2 Dans Admin Serveur, sélectionnez DNS dans la liste des ordinateurs et des services. Une zone de dialogue apparaît et vous demande s’il faut effectuer la mise à niveau :  Si vous cliquez sur « Ne pas mettre à niveau », Admin Serveur ne modifie pas les fichiers de configuration du service DNS qui existaient avant la migration vers la version 10.5. Le service DNS continue de s’exécuter, mais il n’est plus possible de modifier sa configuration à l’aide d’Admin Serveur. Si des changements sont nécessaires, vous devez apporter les modifications directement dans les fichiers de configuration du service DNS.  Si vous cliquez sur Mettre à niveau, Admin Serveur met les fichiers de configuration à niveau au format de la version 10.5. Ceci fait, vous pouvez vous servir d’Admin Serveur pour apporter des modifications à la configuration du service DNS.Chapitre 5 Migration à partir de Mac OS X Server 10.3 81 Réglages DHCP Pour migrer la configuration DHCP : 1 Ouvrez Admin Serveur, puis sélectionnez DHCP dans la liste des ordinateurs et des services. 2 Choisissez Serveur > Importer > Réglages de service pour importer les réglages DHCP à partir du fichier que vous avez exporté auparavant (voir « DHCP » à la page 71). 3 Examinez les sous-fenêtres Sous-réseaux et Cartes statiques du service DHCP pour vous assurer que les réglages de sous-réseau et de liaison statique ont été correctement importés. Données utilisateur Restaurez les fichiers de données utilisateur enregistrés. Placez les répertoires de départ dans des emplacements correspondant à ceux des enregistrements utilisateur importés. Si nécessaire, vous pouvez utiliser Gestionnaire de groupe de travail pour éditer les comptes utilisateur, de sorte que les emplacements dans le compte et sur le disque soient identiques. Fichiers et dossiers du Serveur d’enchaînement QuickTime Suivez les instructions qui apparaissent dans Administration de QuickTime Streaming et Broadcasting pour réutiliser les fichiers et les dossiers enregistrés à partir de /Bibliothè- que/QuickTimeStreaming/. Fichiers et dossiers de QTSS Publisher QTSS Publisher a été supprimé de Mac OS X Server 10.5. Toutefois, les fichiers créés avec QTSS Publisher sous la version 10.4 continuent à fonctionner normalement avec la version 10.5. Restaurez les fichiers et les dossiers de QTSS Publisher sur Mac OS X Server 10.5. En principe, les fichiers multimédias et MP3 QTSS Publisher sont stockés dans :  /Bibliothèque/Application Support/Apple/ QTSS Publisher/Libraries/  /Users/ /Bibliothèque/Application Support/Apple/QTSS Publisher/Libraries/82 Chapitre 5Migration à partir de Mac OS X Server 10.3 Pour faire migrer les listes de lecture multimédias et MP3 QTSS Publisher vers Administration web QTSS : 1 Déplacez tous les dossiers de /Bibliothèque/Application Support/Apple/QTSS Publisher/ Playlists/ vers /Bibliothèque/QuickTimeStreaming/Playlists. Par exemple, ceci implique de déplacer : /Bibliothèque/Application Support/Apple/QTSS Publisher/Playlists/my_playlist/ Pour /Bibliothèque/QuickTimeStreaming/Playlists/my_playlist/ 2 Vérifiez que le propriétaire des dossiers et des fichiers qui se trouvent à l’intérieur de /Bibliothèque/QuickTimeStreaming/Playlists est bien qtss. 3 Dans le cas des listes de lecture multimédias, vérifiez que le dossier /Bibliothèque/ Application Support/Apple/QTSS Publisher/Libraries/Media/ contient les fichiers multimédias répertoriés dans les fichiers .playlist. 4 Pour les listes de lecture MP3, vérifiez que le dossier /Bibliothèque/Application Support/Apple/QTSS Publisher/Libraries/MP3/ contient les fichiers multimédias répertoriés dans les fichiers .playlist. 5 Mettez à jour le fichier .config de chaque liste de lecture de sorte que les chemins d’accès indiquent le nouveau dossier dans lequel se trouvent les listes de lecture dans /Bibliothèque/QuickTimeStreaming/Playlists. Ceci inclut les chemins définis dans les préférences pid_file, playlist_file et sdp_file (listes de lecture multimédias uniquement). 6 Activez l’administration web QTSS à l’aide d’Admin Serveur. 7 Ouvrez l’Administration web à l’aide de Safari (http://:1220), puis ouvrez une session. 8 Cliquez sur Listes de lecture. Vous pouvez maintenant commencer à gérer les listes de lecture QTSS Publisher à l’aide de l’Administration web QTSS. Pour obtenir des informations sur l’Administration web, reportez-vous au Guide de l’administrateur du Serveur d’enchaînement Darwin de QuickTime Streaming Server disponible à l’adresse developer.apple.com/opensource/server/streaming.Chapitre 5 Migration à partir de Mac OS X Server 10.3 83 Étape 8 :configuration de points de partage et d’autorisations Créez à nouveau les points de partage et les privilèges en fonction des besoins. Pour créer un point de partage et configurer des autorisations : 1 Ouvrez Admin Serveur, puis cliquez sur Partage de fichiers. 2 Cliquez sur Volumes, puis sélectionnez le volume ou le dossier que vous voulez partager. 3 Cliquez sur Partager. 4 Cliquez sur Autorisations pour configurer les autorisations d’accès. 5 Cliquez sur Enregistrer. Les nouveaux points de partage sont partagés à l’aide des services AFP, SMB et FTP, mais pas NFS. Pour exporter un point de partage avec NFS, utilisez le volet Protocole. Pour en savoir plus sur la configuration des points de partage, reportez-vous à Administration des services de fichier. Étape 9 :test du nouveau serveur Pour tester le nouveau serveur : 1 Ouvrez Gestionnaire de groupe de travail et inspectez les comptes d’utilisateur et de groupe. 2 Ouvrez Admin Serveur et inspectez les réglages des services dont vous avez migré les données de configuration.6 85 6 Migration à partir de Mac OS X Server 10.2 Suivez les instructions de ce chapitre si vous devez faire migrer des données d’un serveur 10.2.8 vers un autre ordinateur exécutant la version 10.5. Vous pouvez faire migrer des données d’ordinateurs Mac OS X Server 10.2.8 qui ne peuvent être ou ne seront mis à niveau vers la version 10.5 ou ultérieure. Il se peut que ces ordinateurs :  requièrent un reformatage du disque dur ou un remplacement par un ordinateur plus récent ;  utilisent un matériel de serveur qui ne dispose pas des éléments suivants :  un processeur Intel ou PowerPC G5 ou G4 (cadencé à 867 MHz ou plus),  au moins 1 Go de RAM,  au moins 20 Go d’espace disque disponible. Avant de commencer Avant de suivre les instructions figurant dans ce chapitre, procédez à une configuration initiale du serveur 10.5 vers lequel vous ferez migrer des données. Pour obtenir des instructions, consultez la section Premiers contacts. Si nécessaire, mettez à niveau le serveur dont vous ferez migrer les données, de sorte qu’il exécute la version 2.8.86 Chapitre 6Migration à partir de Mac OS X Server 10.2 Éléments pouvant migrer Les informations de la section « Instructions pas à pas » à la page 87 décrivent comment réutiliser les données 10.2 suivantes avec 10.5 :  Données de configuration Web  Contenu Web  Base de données de courrier  Données WebMail  Fichiers de configuration FTP  Applications et structures WebObjects  Données Tomcat  Configuration DNS  Données utilisateur, notamment les répertoires de départ  Fichiers et répertoires du Serveur d’enchaînement QuickTime  Comptes d’utilisateur et de groupe Utilisez serveradmin ou Admin Serveur pour exporter les réglages de service pour référence. Stockez les réglages de service exportés sur un support amovible ou un autre système. Remarque :pour enregistrer les réglages de service dans Admin Serveur, vous pouvez par exemple sélectionner le service dans la liste d’ordinateurs et de services sur la gauche, cliquer sur Réglages et faire glisser le bouton dans l’angle inférieur droit du bureau. Le glissement de ce bouton crée un fichier sur le bureau contenant les réglages de service. Dans la version 10.5, watchdog est remplacé par launchd. Pour réactiver le redémarrage matériel automatique, utilisez la sous-fenêtre Économiseur d’énergie des Préférences Système.Pour faire migrer des réglages de services ajoutés à /etc/watchdog.conf, créez un fichier launchd plist et copiez-le dans /Système/Bibliothèque/LaunchDaemons/. Pour en savoir plus sur launchd, consultez sa page man. Outils pouvant être utilisés Plusieurs outils sont disponibles :  Utilisez Gestionnaire de groupe de travail pour exporter des comptes utilisateur et de groupes de la version 10.2 vers un fichier de données séparées par des caractères, puis pour les importer dans un serveur 10.5.Vous pouvez également importer des utilisateurs et des groupes à l’aide de l’outil de ligne de commande dsimport.  La fonction d’importation de Gestionnaire de groupe de travail et l’outil dsimport vous permettent également d’importer d’autres types de données, comme des ordinateurs et des listes d’ordinateurs.  Utilisez l’outil 59_webconfigmigrator pour faire migrer votre configuration Web.Chapitre 6 Migration à partir de Mac OS X Server 10.2 87  Utilisez la commande Importer dans Admin Serveur pour importer des réglages de service. Les instructions des sections suivantes expliquent quand et comment utiliser ces utilitaires. Instructions pas à pas Pour déplacer des données d’un ordinateur Mac OS X Server 10.2.8 vers un ordinateur équipé de Mac OS X Server 10.5, suivez les instructions de cette section. 1 Exportez les informations des utilisateurs et groupes. 2 Créez des fichiers d'archive des données et un fichier utilisateur d'exportation. 4 Copiez les fichiers d'archive vers le nouveau serveur. 6 Importez les fichiers des utilisateurs et groupes. 8 Configurez les points de partage et les autorisations. 9 Testez le nouveau serveur. 7 Replacez les fichiers de données sur le nouveau serveur. 3 Notez les points de partage et les autorisations actuels. utilisateur groupe 2017 Gestionnaire de groupe de travail Gestionnaire de groupe de travail ou outil dsimport 5 Configurez l'infrastructure des répertoires de départ. Ingénierie Lecture et écriture Bureau d'études Documents Lecture seule Lecture et écriture Shared Folders Shared Folders Ingénierie Lecture et écriture Bureau d'études Documents Lecture seule Lecture et écriture .XML Ingénierie Lecture et écriture Bureau d'études Documents Lecture seule Lecture et écriture Shared Folders utilisateur groupe 2017 donnéesutilisateur.tar basededonnées.tar donnéesutilisateur.tar basededonnées.tar88 Chapitre 6Migration à partir de Mac OS X Server 10.2 Étape 1 :exportation d’utilisateurs et de groupes Utilisez Gestionnaire de groupe de travail pour exporter des comptes utilisateurs et de groupes d’un répertoire NetInfo ou LDAPv3 vers un fichier de données séparées par des caractères que vous pouvez importer dans un répertoire en vue d’une utilisation avec Mac OS X Server 10.5. Pour exporter des utilisateurs et des groupes : 1 Dans Gestionnaire de groupe de travail, cliquez sur Comptes puis sur l’icône illustrant un globe sous la barre d’outils et choisissez le répertoire depuis lequel exporter des comptes. 2 Cliquez sur le cadenas pour vous authentifier en tant qu’administrateur de domaine. 3 Cliquez sur le bouton Utilisateurs pour exporter des utilisateurs, ou sur le bouton Groupes pour exporter des groupes. 4 Exportez des comptes utilisateurs ou de groupes comme suit :  Pour exporter tous les comptes, sélectionnez-les tous.  Pour exporter un seul compte, sélectionnez-le.  Pour exporter plusieurs comptes, sélectionnez-les en maintenant enfoncée la touche Commande ou Maj. 5 Choisissez Serveur > Exporter. 6 Spécifiez un nom à attribuer au fichier d’exportation ainsi que son emplacement. 7 Cliquez sur Exporter. Lorsque vous exportez des utilisateurs à l’aide de Gestionnaire de groupe de travail, les informations des mots de passe ne sont pas exportées. Pour définir des mots de passe, vous pouvez modifier le fichier d’exportation avant de l’importer, ou bien définir des mots de passe de façon individuelle après importation à l’aide de la commande passwd ou de Gestionnaire de groupe de travail. Pour en savoir plus sur la définition des mots de passe après importation, consultez Gestion des utilisateurs. Étape 2 :créez des archives des fichiers ci-après. Enregistrez tous les fichiers de données à réutiliser avec Mac OS X Server 10.5. À l’étape 4, vous déplacerez les fichiers décrits ci-dessous, ainsi que le fichier d’exportation créé à l’étape 1, vers l’ordinateur 10.5. Pour les grandes quantités de données, vous pouvez créer une ou plusieurs archives tar, ou utiliser /usr/bin/mkdmg pour créer des fichiers d’image disque. Vous pouvez transférer des images disque et des fichiers tar via AFP ou FTP. Remarque :vous pouvez également utiliser scp -r pour sécuriser la copie de fichiers et rsync pour effectuer des copies de fichiers à distance. La commande rsync s’avère particulièrement utile dans le cas d’une grande quantité de données que vous pouvez faire migrer, puis mettre à jour dans une petite fenêtre de temps d’arrêt.Chapitre 6 Migration à partir de Mac OS X Server 10.2 89 Pour créer une archive tar, utilisez la commande tar dans l’application Terminal. L’indicateur de commande -c crée un fichier d’archive au format tar. Utilisez l’indicateur -f pour préciser le nom du fichier d’archive. Utilisez l’indicateur -v (verbose) pour afficher les informations de progression lors de l’exécution de la commande : tar -cvf /MyHFSVolume/Stuff.tar /MyHFSVolume/My\ Stuff Le caractère d’échappement (\ dans l’exemple ci-dessus) indique un espace dans le nom. Vous pouvez également utiliser des guillemets pour gérer les espaces incorporés : tar -cvf /MyHFSVolume/Stuff.tar “/MyHFSVolume/My Stuff” Données de configuration Web Enregistrez les fichiers et les répertoires suivants :  /etc/httpd/httpd.conf  /etc/httpd/httpd_macosxserver.conf  /etc/httpd/httpd_squirrelmail.conf  /etc/httpd/magic  /etc/httpd/mime.types  /etc/httpd/mime_macosxserver.types  /etc/httpd/ssl.crt  /etc/httpd/ssl.key  /etc/httpd/tomcat.conf  /etc/webperfcache/webperfcache.conf  /Bibliothèque/WebServer/ Contenu Web Copiez le contenu Web que vous souhaitez réutiliser à partir de :  /Bibliothèque/WebServer/Documents/  /Bibliothèque/WebServer/CGI-Executables/  Tout autre emplacement dans lequel il se trouve Base de données de courrier Sauvegardez la base de données de courrier, si vous souhaitez la réutiliser. Son emplacement par défaut est /Bibliothèque/AppleMailServer/. Données WebMail Si vous utilisez SquirrelMail déjà présent au moment de l’installation de la version 10.2 et voulez continuer à l’utiliser après la migration, faites des copies des carnets d’adresses et des préférences stockés dans /var/db/squirrelmail/data/.90 Chapitre 6Migration à partir de Mac OS X Server 10.2 Fichiers de configuration FTP Pour migrer vos réglages FTP, sauvegardez les fichiers de configuration suivants : Applications et structures WebObjects Enregistrez les applications et structures WebObjects situées dans :  /Bibliothèque/WebObjects/  /Système/Bibliothèque/WebObjects/ Données Tomcat Enregistrez les servlets Tomcat que vous souhaitez réutiliser. Ils se trouvent dans /Bibliothèque/Tomcat/webapps/. Si vous avez installé Axis indépendamment de la version fournie avec le serveur, enregistrez les éventuels services SOAP (Simple Object Access Protocol). Coupe-feu IP Il est impossible de faire migrer directement les informations de configuration du coupefeu IP vers Mac OS X Server 10.5 car NetInfo n’est pas pris en charge dans cette version. Vous pouvez procéder de l’une des manières suivantes :  taper à nouveau manuellement les règles du coupe-feu ;  faire migrer les informations de configuration vers un système Mac OS X Server 10.3 ou 10.4, puis vers la version 10.5. Pour faire migrer les informations du coupe-feu vers un système Mac OS X Server 10.3 ou 10.4, enregistrez la configuration du coupe-feu IP après l’exécution de la commande suivante depuis l’application Terminal : nidump -r /config/IPFilters . > firewallconfig Cette commande écrit l’enregistrement de configuration du coupe-feu IP stocké dans NetInfo dans un fichier nommé firewallconfig : Pour terminer le processus de migration, consultez « Configuration de coupe-feu IP » à la page 96. Dans ce répertoire Sauvegardez ces fichiers /Bibliothèque/FTPServer/Configuration/ ftpaccess ftpconversions ftphosts ftpgroups ftpusers /Bibliothèque/FTPServer/Messages/ banner.txt welcome.txt limit.txtChapitre 6 Migration à partir de Mac OS X Server 10.2 91 DNS Enregistrez le fichier /etc/named.conf et le répertoire /var/named/, ainsi que tout son contenu. DHCP Dans Admin Serveur,sélectionnez DHCP dans la liste d’ordinateurs et de services sur la gauche, cliquez sur Réglages et faites glisser le bouton dans l’angle inférieur droit du bureau. Le glissement de ce bouton crée un fichier sur le bureau contenant les réglages du service DHCP.Enregistrez ce fichier. Données utilisateur Enregistrez tous les dossiers et les fichiers de données utilisateur que vous souhaitez réutiliser, en particulier les dossiers du répertoire de départ. Fichiers et dossiers du Serveur d’enchaînement QuickTime Enregistrez les fichiers et les dossiers du répertoire /Bibliothèque/QuickTimeStreaming/. Pour en savoir plus sur la migration de QTSS, consultez Administration de QuickTime Streaming et Broadcasting. Étape 3 :points de partage et autorisations actuels Si votre serveur 10.2 possède des points de partage et des privilèges que vous voulez recréer sur le serveur 10.5, relevez-les. Notez les points de partage qui concernent les répertoires de départ. Étape 4 :copie des fichiers d’archive sur le nouveau serveur Transférez les fichiers enregistrés aux étapes 1 et 2 sur le serveur 10.5. Pour transférer les fichiers tar ou les images de disque via FTP : 1 Utilisez Admin Serveur sur le nouveau serveur afin de démarrer le service FTP. 2 Configurez le partage pour un dossier dans lequel vous placez les fichiers que vous transférez depuis l’ordinateur version 10.2. 3 Sur le serveur 10.2, utilisez le service FTP pour copier les fichiers tar ou les images disque sur l’ordinateur 10.5. 4 Sur le serveur 10.5, double-cliquez sur un fichier tar pour en extraire le contenu, ou bien sur une image disque pour la monter. Étape 5 :configuration de l’infrastructure des répertoires de départ Configurez la destination des répertoires de départ que vous souhaitez restaurer. L’emplacement des répertoires de départ identifié dans les comptes d’utilisateur importés doit correspondre à l’emplacement physique des répertoires de départ restaurés, y compris l’emplacement du point de partage. Pour des informations détaillées sur l’application de ces étapes dans la procédure suivante, consultez Gestion des utilisateurs et Administration desservices de fichier.92 Chapitre 6Migration à partir de Mac OS X Server 10.2 Pour préparer le serveur pour le stockage des répertoires de départ : 1 Si nécessaire, créez le dossier que vous souhaitez utiliser comme point de partage du répertoire de départ. Si vous le souhaitez, vous pouvez utiliser le dossier /Utilisateurs prédéfini. 2 Ouvrez Admin Serveur sur le serveur où les répertoires de départ doivent figurer. 3 Cliquez sur Partage de fichiers pour configurer un point de partage pour les répertoires de départ. Si les comptes utilisateur doivent se trouver dans un répertoire Open Directory partagé, créez un point de partage AFP ou NFS monté de façon dynamique et automatique pour les répertoires de départ.Assurez-vous que le point de partage est publié dans le répertoire dans lequel résideront les comptes d’utilisateur qui en dépendent. 4 Dans Gestionnaire de groupe de travail,sur l’ordinateur où vous importerez des utilisateurs, cliquez sur Comptes, puis ouvrez le répertoire dans lequel vous effectuerez l’importation. Si vous restaurez des répertoires de départ à des emplacements qui ne correspondent pas exactement à ceux identifiés dans les enregistrements utilisateur exportés, vous pouvez configurer un préréglage identifiant l’emplacement de restauration.Si vous identifiez le préréglage lors de l’importation des utilisateurs, le nouvel emplacement remplace celui qui existe dans les enregistrements utilisateur. Vous pouvez également utiliser le préréglage pour spécifier d’autres réglages par défaut dont les utilisateurs importés doivent hériter, par exemple pour les mots de passe, le courrier, etc. Étape 6 :importation d’utilisateurs, de groupes et d’autres données Vous pouvez utiliser Gestionnaire de groupe de travail ou l’outil dsimport pour importer des utilisateurs, des groupes et d’autres données : Pour en savoir plus sur l’importation à l’aide de Gestionnaire de groupe de travail, consultez Gestion des utilisateurs. Pour en savoir plus sur les mots de passe des utilisateurs créés avec Mac OS X Server version 10.1.5 ou antérieure, consultez Administration d’Open Directory. Pour en savoir plus sur dsimport et obtenir la description du format d’exportation de Gestionnaire de groupe de travail, consultez Administration de ligne de commande.Chapitre 6 Migration à partir de Mac OS X Server 10.2 93 Pour importer des utilisateurs et des groupes à l’aide de Gestionnaire de groupe de travail : 1 Placez les fichiers d’exportation créés à l’étape 1 page 88 à un emplacement accessible à partir du serveur. Vous pouvez modifier les comptes d’utilisateur dans un fichier d’exportation si vous souhaitez définir des mots de passe avant d’importer les utilisateurs. Pour obtenir des instructions, consultez la section Gestion des utilisateurs. Vous pouvez également configurer le préréglage défini au point 5 de l’étape 5 ci-dessus afin que les mots de passe utilisateur soient validés à l’aide d’une authentification d’Open Directory ; vous pouvez aussi configurer les options de validation des mots de passe de façon à obliger les utilisateurs à modifier leur mot de passe à la prochaine ouverture de session. 2 Dans Gestionnaire de groupe de travail, cliquez sur Comptes. 3 Cliquez sur l’icône illustrant un globe dans la barre d’outils afin d’ouvrir le répertoire dans lequel vous souhaitez importer des comptes. 4 Cliquez sur le cadenas pour vous authentifier en tant qu’administrateur de domaine. 5 Choisissez Serveur > Importer, sélectionnez le fichier d’importation, puis spécifiez les options d’importation. Si vous utilisez un préréglage, prenez soin de le préciser. 6 Cliquez sur Importer. 7 Pour que des groupes utilisent les nouvelles fonctionnalités de la version 10.5, mettez-les à niveaux à l’aide de Gestionnaire de groupe de travail. Dans Gestionnaire de groupe de travail, ouvrez le répertoire contenant les groupes, sélectionnez-en un ou plusieurs, cliquez sur « Mettre à niveau le groupe hérité » puis sur Enregistrer. 8 Pour créer des répertoires de départ pour des utilisateurs importés, utilisez l’une des options suivantes : Créez les répertoires de départ un par un, en sélectionnant un compte d’utilisateur dans Gestionnaire de groupe de travail, en cliquant sur Départ, puis sur Créer Départ. Créez tous les répertoires de départ avec l’argument -a de la commande createhomedir. Pour plus de détails, consultez la section Administration de ligne de commande ou la page man de createhomedir. Un répertoire de départ associé à un point de partage AFP est créé s’il n’existe pas lors de la première connexion d’un utilisateur. Étape 7 :replacement des fichiers de données enregistrés Placez les fichiers enregistrés à partir de votre serveur version 10.2 aux emplacements finaux.94 Chapitre 6Migration à partir de Mac OS X Server 10.2 Données de configuration Web Pour faire migrer la configuration Web : 1 Ouvrez Admin Serveur. 2 Dans la liste d’ordinateurs et de services sous le serveur 10.5, cliquez sur Web. 3 Cliquez sur Arrêter le service si le service Web est actif. 4 Supprimez les fichiers suivants :  /etc/httpd/sites  /etc/httpd/ssl.crt  /etc/httpd/ssl.key 5 Copiez les fichiers et le répertoire 10.2 enregistrés sur le serveur 10.5. 6 Ouvrez l’application Terminal et, avec des privilèges root, tapez la commande suivante : /Système/Bibliothèque/ServerSetup/MigrationExtras/59_webconfigmigrator Un historique des modifications apportées aux fichiers est créé dans /Bibliothèque/Logs/Migration/webconfigmigrator.log. Les fichiers de la version 10.2 dans /etc/httpd/ sont renommés httpd.conf.obsolete, httpd_macosxserver.conf.obsolete et mime_macosxserver.types.obsolete. Un nouveau fichier httpd.conf est créé, ainsi qu’un répertoire de sites. 7 Si vous avez apporté des modifications à /etc/httpd/workers.properties, appliquez-les aussi à la version du fichier installée avec le serveur 10.5. Le fichier workers.properties de la version 10.5 possède une nouvelle entrée pour le service blog. 8 Dans Admin Serveur, démarrez le service Web. Contenu Web Copiez le contenu Web enregistré dans :  /Bibliothèque/WebServer/Documents/  /Bibliothèque/WebServer/CGI-Executables/Chapitre 6 Migration à partir de Mac OS X Server 10.2 95 Base de données de courrier Pour migrer la base de données de courrier : 1 Assurez-vous que le service de messagerie 10.5 n’est pas actif. Ouvrez Admin Serveur, puis cliquez sur Courrier. Si le cercle Courrier sur la gauche n’est pas grisé, cliquez sur Arrêter le courrier dans l’angle inférieur gauche. 2 Cliquez sur Maintenance, puis sur Migration. 3 Placez la base de données enregistrée sur le serveur 10.5 et vérifiez qu’aucun autre fichier ne se trouve à l’emplacement sélectionné. Si vous placez la base de données à l’emplacement par défaut (/var/imap), son emplacement et ses comptes s’affichent. Sinon, recherchez la base de données pour identifier son emplacement et dresser la liste de ses comptes. 4 Assurez-vous que l’utilisateur _cyrus et le groupe de courrier sont propriétaires des répertoires de courrier et de leur contenu. 5 Assurez-vous que le disque de destination possède un espace libre au moins égal à la taille de la base de données de courrier. 6 Faites migrer un seul utilisateur ou tous les utilisateurs. Pour faire migrer le courrier pour un seul utilisateur uniquement,sélectionnez l’utilisateur puis cliquez sur Faire migrer l’utilisateur. Pour faire migrer l’ensemble de la base de données, cliquez sur Tout faire migrer. 7 Exécutez le commande suivante pour que les fichiers d’index de tous les comptes de courrier se trouvent dans le bon ordre : sudo /usr/bin/cyrus/bin/reconstruct –i 8 Dans Admin Serveur, démarrez le service de messagerie en cliquant sur Courrier, puis sur Démarrer le courrier. Données WebMail Placez les carnets d’adresses et les préférences enregistrés dans le répertoire /var/db/squirrelmail/data/. Fichiers de configuration FTP Copiez les fichiers de configuration FTP enregistrés dans :  /Bibliothèque/FTPServer/Configuration/  /Bibliothèque/FTPServer/Messages/96 Chapitre 6Migration à partir de Mac OS X Server 10.2 Applications et structures WebObjects Pour faire migrer WebObjects : 1 Copiez les applications enregistrées dans /Bibliothèque/WebObjects/Applications/. 2 Copiez les structures enregistrées dans /Bibliothèque/Frameworks/. 3 Ajoutez la ligne suivante au nouveau fichier httpd.conf : Include /Système/Bibliothèque/WebObjects/Adaptors/Apache/apache.conf Remarque :les services JavaMonitor et WebObjects Task Daemon (wotaskd) sont désormais gérés par launchd et accessibles via Admin Serveur. Si le serveur que vous mettez à niveau possède l’élément de démarrage /Système/Bibliothèque/StartupItems/WebObjects, vous pouvez l’ignorer. Il est en effet désactivé par défaut et n’est pas nécessaire pour le démarrage automatique des services WebObjects avec Mac OS X Server 10.5. Pour en savoir plus, consultez Administration destechnologies web et Déploiement deWebObjects. 4 (Facultatif) Si Java 1.4.2 n’est pas installé sur votre serveur 10.2, mettez manuellement à jour les projets de l’application WebObjects en ouvrant chacun d’eux dans Xcode ; dans la présentation expert pour les réglages de la cible principale, remplacez la valeur de la propriété JAVA_VM par java. Ces projets doivent être mis à jour manuellement pour utiliser la version de la machine virtuelle Java (JVM) fournie avec Mac OS X Server 10.5. Important :Mac OS X Server 10.5 inclut WebObjects 5.4, pour lequel Java 1.5 doit être installé. Données Tomcat Restaurez les servlets Tomcat dans /Bibliothèque/Tomcat/webapps/. Placez les services SOAP à faire migrer dans /Bibliothèque/Tomcat/webapps/axis/. Mac OS X Server version 10.5 inclut une version d’Axis plus récente ou plus ancienne que la version utilisée jusqu’à présent. Configuration de coupe-feu IP Pour migrer la configuration de coupe-feu IP : 1 Restaurez le fichier firewallconfig sur un serveur Mac OS X Server 10.3 ou 10.4. 2 Ouvrez Admin Serveur et assurez-vous que le service de coupe-feu n’est pas en cours d’exécution. 3 Ouvrez le Gestionnaire NetInfo, qui se trouve dans le répertoire /Applications/Utilitaires. 4 Authentifiez-vous et accédez au répertoire /config. 5 Sélectionnez Répertoire > Nouveau sous-répertoire afin de créer un enregistrement dans /config. 6 Remplacez le nom du nouvel enregistrement « newdirectory » par « IPFilters » en sélectionnant la valeur de la propriété de nom et en la modifiant.Chapitre 6 Migration à partir de Mac OS X Server 10.2 97 7 Dans l’application Terminal, exécutez la commande suivante à partir du répertoire dans lequel réside le fichier firewallconfig : sudo niload -r /config/IPFilters . < firewallconfig 8 Tapez la commande suivante : sudo /Système/Bibliothèque/ServerSetup/MigrationExtras/ 50_ipfwconfigmigrator L’exécution de ce script crée un dossier /etc/ipfilter avec tous les fichiers requis pour la migration. 9 Sur le serveur Mac OS X Server 10.5, ouvrez Admin Serveur et vérifiez que le service de coupe-feu n’est pas actif. 10 Copiez le dossier /etc/ipfilter généré par le script 50_ipfwconfigmigrator sur le serveur Mac OS X Server 10.5 vers lequel vous voulez faire migrer les réglages. 11 Démarrez le service de coupe-feu sur le serveur Mac OS X Server 10.5. Configuration DNS Pour faire migrer la configuration DNS : 1 Restaurez le fichier /etc/named.conf et le répertoire /var/named/ et son contenu. 2 Dans Admin Serveur, sélectionnez DNS dans la liste d’ordinateurs et de services. Une zone de dialogue s’ouvre et vous demande de confirmer la mise à niveau :  Si vous cliquez sur « Ne pas mettre à niveau », Admin Serveur laissent les fichiers de configuration DNS tels qu’avant la migration vers 10.5. DNS continue son exécution mais vous ne pouvez pas modifier la configuration DNS avec Admin Serveur. Pour faire des changements, vous devez éditer directement les fichiers de configuration DNS.  En revanche, si vous cliquez sur Mettre à niveau, Admin Serveur met à niveau les fichiers de configuration vers le format 10.5. Vous pouvez alors utiliser Admin Serveur pour modifier la configuration DNS. Réglages DHCP Pour migrer la configuration DHCP : 1 Ouvrez Admin Serveur et sélectionnez DHCP dans la liste d’ordinateurs et de services. 2 Choisissez Serveur > Importer > Réglages du service pour importer les réglages DHCP depuis le fichier exporté auparavant (voir « DHCP » à la page 91). 3 Consultez les sous-fenêtres du service DHCP pour vérifier que les réglages DHCP ont été correctement importés.98 Chapitre 6Migration à partir de Mac OS X Server 10.2 Données utilisateur Restaurez les fichiers de données utilisateur enregistrés. Placez les répertoires de départ dans des emplacements correspondant à ceux des enregistrements utilisateur importés. Si nécessaire, vous pouvez utiliser Gestionnaire de groupe de travail pour éditer les comptes utilisateur, de sorte que les emplacements dans le compte et sur le disque soient identiques. Fichiers et dossiers du Serveur d’enchaînement QuickTime Suivez les instructions dans Administration de QuickTime Streaming et Broadcasting pour réutiliser les fichiers et les dossiers enregistrés depuis /Bibliothèque/QuickTimeStreaming/. Étape 8 :configuration de points de partage et d’autorisations Recréez les points de partage et les autorisations selon vos besoins. Pour créer un point de partage et configurer des autorisations : 1 Ouvrez Admin Serveur et cliquez sur Partage de fichiers. 2 Cliquez sur Volumes et sélectionnez le volume ou le dossier à partager. 3 Cliquez sur Partager. 4 Cliquez sur Autorisations pour configurer les autorisations d’accès. 5 Cliquez sur Enregistrer. Les nouveaux points de partage sont partagés via AFP, SMB et FTP, mais pas NFS. Pour exporter un point de partage avec NFS, utilisez le volet Protocole. Pour en savoir plus sur la configuration des points de partage, consultez Administration des services de fichier. Étape 9 :test du nouveau serveur Pour tester le nouveau serveur : 1 Ouvrez Gestionnaire de groupe de travail et inspectez les comptes d’utilisateur et de groupe. 2 Ouvrez Admin Serveur et inspectez les réglages des services dont vous avez migré les données de configuration.7 99 7 Migration vers Mac OS X Server à partir de Windows NT Ce chapitre contient des instructions pour le transfert de données et de réglages d’un serveur Windows NT vers un ordinateur exécutant Mac OS X Server 10.5. Il comporte les sections suivantes :  « Avant de commencer » à la page 100 décrit les tâches prérequises à réaliser avant d’entamer le processus de migration.  « Éléments pouvant migrer » à la page 100 décrit les éléments que vous pouvez faire migrer d’un serveur Windows NT vers un ordinateur Mac OS X Server 10.5.  « Outils pouvant être utilisés » à la page 107 décrit les outils permettant de faire migrer un serveur Windows NT vers un ordinateur Mac OS X Server 10.5.  « Instructions pas à pas » à la page 108 explique comment transférer des enregistrements d’utilisateurs, de groupes et d’ordinateurs d’un contrôleur de domaine principal Windows NT (PDC) vers un PDC Mac OS X Server. Cette section décrit également comment configurer des répertoires de départ et des profils utilisateur itinérants sur Mac OS X Server pour des utilisateurs Windows. Vous découvrirez aussi comment configurer des dossiers partagés sur Mac OS X Server et y copier des fichiers et des dossiers partagés à partir de dossiers réseau Windows NT. Par ailleurs, cette section explique comment configurer les files d’attente de Mac OS X Server pour l’accès à Windows et comment les ajouter en tant qu’imprimantes sur des ordinateurs Windows clients. Pour en savoir plus sur la configuration et la gestion de services pour des utilisateurs Windows, consultez la section Administration des services de fichier. Vous apprendrez aussi comment gérer des enregistrements d’utilisateurs, de groupes et d’ordinateurs pour des clients Windows. Remarque :étant donné qu’Apple publie régulièrement de nouvelles versions et mises à jour de ses logiciels, les illustrations de ce document peuvent être différentes de celles qui s’affichent à l’écran.100 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT Avant de commencer Avant de suivre les instructions figurant dans ce chapitre, procédez à une configuration initiale du serveur Mac OS X Server 10.5 vers lequel vous ferez migrer des données. Pour obtenir des instructions, consultez la section Premiers contacts. Éléments pouvant migrer Les instructions de la section « Instructions pas à pas » à la page 108 décrivent comment réutiliser les données suivantes d’un serveur Windows NT avec un PDC Mac OS X Server :  Comptes d’utilisateur et de groupe.  Enregistrements pour des ordinateurs membres du domaine NT.  Fichiers personnels des utilisateurs dans les dossiers Mes documents et les répertoires de départ.  Profils utilisateur itinérants. Pour faire migrer des enregistrements d’utilisateurs, de groupes et d’ordinateurs, il vous faut un système Mac OS X Server qui soit ou puisse être un maître Open Directory. Après la migration, le chemin du répertoire de départ des utilisateurs migrés reste le même. Lors de la migration, le chemin du répertoire de départ de chaque utilisateur est copié dans son compte utilisateur Mac OS X Server. Les utilisateurs doivent pouvoir continuer à utiliser leurs répertoires de départ, même s’ils se trouvaient sur le serveur du contrôleur de domaine principal Windows NT, qui doit être désactivé après la migration. Si les utilisateurs ont des répertoires de départ sur le serveur du contrôleur de domaine principal Windows NT, ils doivent temporairement copier les fichiers qu’ils contiennent à un autre emplacement avant de faire migrer leurs enregistrements vers le PDC Mac OS X Server. Ces utilisateurs peuvent copier les fichiers de leurs répertoires de départ dans leurs dossiers Mes documents si leurs ordinateurs clients possèdent assez d’espace disque. Ils peuvent également copier leurs fichiers dans un dossier réseau qui ne se trouve pas sur le serveur du PDC. Vous devrez configurer de nouveaux répertoires de départ pour ces utilisateurs sur le PDC Mac OS X Server ou sur un serveur membre. Après leur migration, ces utilisateurs pourront copier des fichiers dans leurs nouveaux répertoires de départ.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 101 Ce que les utilisateurs migrés peuvent faire Lorsque vous faites migrer des utilisateurs, des groupes et des ordinateurs d’un serveur Windows NT vers Mac OS X Server, l’ordinateur Mac OS X Server devient un contrôleur de domaine principal (PDC). Les utilisateurs migrés peuvent alors effectuer les actions suivantes :  ouvrir une session dans le domaine du PDC avec les mêmes noms d’utilisateurs, mots de passe et postes de travail qu’avant,  faire que leurs profils itinérants soient stockés et récupérés sur un système Mac OS X Server,  utiliser des dossiers de départ réseau situés sur un système Mac OS X Server,  rester membres du même groupe,  accéder au contenu de dossiers réseau que vous copiez sur des points de partage Mac OS X Server,  utiliser des files d’attente d’impression configurées sur Mac OS X Server et les ajouter comme imprimantes aux postes de travail Windows des utilisateurs. D’autres utilisateurs dont vous avez configuré les comptes Mac OS X Server peuvent également utiliser ces services. Par ailleurs, Mac OS X Server peut fournir Windows Internet Naming Service (WINS) et le parcours de domaines Windows à travers des sous-réseaux aux utilisateurs Windows migrés et nouveaux. Mac OS X Server peut fournir d’autres services aux utilisateurs Windows, Mac OS X et UNIX, dont Mail,Web, Blog, iChat (Jabber),VPN, DHCP, DNS et NAT. Pour des informations détaillées, consultez les guides de configuration et d’administration de Mac OS X Server décrits dans la préface. En fournissant ces services, Mac OS X Server peut remplacer des serveurs Windows NT dans de petits groupes de travail. Imaginez administrer par exemple plusieurs serveurs Windows NT acquis au fil des années pour prendre en charge l’accès à des domaines et des dossiers réseau partagés. Selon les standards actuels, vos anciens serveurs sont probablement lents et offrent une capacité de stockage réduite. Vous avez la possibilité de faire migrer des comptes utilisateur depuis plusieurs contrôleurs de domaine Windows NT vers un même système Mac OS X Server. Ce système Mac OS X Server peut aussi héberger des dossiers réseau partagés pour des utilisateurs Windows. Si vous préférez isoler des comptes utilisateur sur un système Mac OS X Server dédié, les dossiers partagés peuvent se trouver sur un autre système Mac OS X Server.102 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT Outre les utilisateurs de postes de travail Windows, Mac OS X Server peut transférer des utilisateurs d’ordinateurs Mac OS X. Un compte utilisateur sur le serveur peut permettre d’ouvrir une session depuis un ordinateur Mac OS X, ainsi qu’un poste de travail Windows. Un utilisateur qui ouvre une session sur les deux plate-formes peut posséder le même répertoire de départ, quelle que soit la machine sur laquelle la session est ouverte. Remarque :les expressions Ouvrir une session et se connecter désignent la même opération. Se connecter s’emploie généralement dans l’environnement Windows, alors qu’il est habituel d’ouvrir une session dans l’environnement Mac OS X. Planification de votre migration Avant d’entamer la migration de comptes et de services d’un serveur Windows NT vers Mac OS X Server, vous devez planifier ce qui suit :  Migration d’utilisateurs, de groupes et d’ordinateurs vers un contrôleur de domaine principal (PDC) Mac OS X Server  Indication de répertoires de départ et de profils utilisateur itinérants  Migration du service de fichiers Windows  Accès de Windows au service d’impression  Configuration DNS Migration d’utilisateurs, de groupes et d’ordinateurs vers un contrôleur de domaine principal (PDC) Mac OS X Server Mac OS X Server inclut l’outil de ligne de commande ntdomainmigration.sh, lequel :  configure Mac OS X Server en tant que PDC,  extrait des informations d’utilisateurs et de groupes et s’en sert pour créer des comptes utilisateur et de groupes Mac OS X Server.  extrait des informations d’ordinateurs et s’en sert pour ajouter des ordinateurs Windows à la liste d’ordinateurs Windows de Mac OS X Server : ils deviennent alors membres du domaine du PDC Mac OS X Server. Important :en raison d’un problème connu, le script de migration du domaine Windows NT (NTdomainmigration.sh) ne fait pas migrer les informations de groupes. La solution consiste à créer manuellement les informations de groupes sur le serveur Mac OS X Server faisant office de PDC. Les comptes utilisateur et de groupes migrés sont stockés dans le répertoire LDAP du serveur avec les enregistrements d’ordinateurs migrés et d’autres informations. Le contrôleur de domaine principal (PDC) a accès aux informations de ce répertoire car vous faites migrer un serveur qui est un maître Open Directory et héberge un répertoire LDAP. Le répertoire LDAP fonctionne correctement jusqu’à 200 000 enregistrements, à condition que le serveur dispose d’assez d’espace disque pour stocker tous ces enregistrements.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 103 Le PDC utilise également le serveur de mots de passe du maître Open Directory pour authentifier des utilisateurs lorsqu’ils ouvrent une session dans le domaine Windows. Le serveur de mots de passe peut valider des mots de passe à l’aide de NTLMv2, NTLMv1, LAN Manager et bien d’autres méthodes d’authentification. Le maître Open Directory peut aussi posséder un centre de distribution de clés (KDC, Key Distribution Center) Kerberos. La fonction PDC n’utilise pas Kerberos pour authentifier des utilisateurs pour des services Windows, mais le courrier et d’autres services peuvent être configurés pour employer Kerberos en vue d’authentifier les utilisateurs de postes de travail Windows possédant des comptes dans le répertoire LDAP. Pour en savoir plus sur le répertoire et les services d’authentification, consultez la section Administration d’Open Directory. Si vous voulez autoriser des opérations de basculement et de copie de sauvegarde pour le nouveau contrôleur de domaine principal (PDC) et possédez d’autres systèmes Mac OS X Server, vous pouvez désigner l’un ou plusieurs de ces derniers comme des contrôleurs de domaine secondaires (BDC). Le PDC et les BDC possèdent des copies synchronisées des données de répertoire et d’authentification, et ils partagent les demandes de clients pour ces données. Si le PDC n’est plus disponible, les clients basculent vers un BDC jusqu’à ce que le PDC redevienne disponible. Pour en savoir plus et obtenir des instructions sur la configuration d’un BDC, consultez la section Administration d’Open Directory. Si vous possédez des systèmes Mac OS X Server qui ne sont ni des PDC, ni des BDC, vous pouvez les configurer pour fournir d’autres services Windows comme membres du domaine Windows de Mac OS X Server. En tant que membres du domaine Windows, les services Windows de Mac OS X Server utilisent le contrôleur de domaine pour identifier et authentifier les utilisateurs. Au moment de configurer Mac OS X Server comme PDC, assurez-vous que votre réseau ne comporte pas un autre PDC avec le même nom de domaine. Le réseau peut comporter plusieurs maîtres Open Directory, mais un seul PDC. Fourniture de répertoires de départ et de profils utilisateur itinérants Les utilisateurs migrés peuvent continuer à utiliser leurs répertoires de départ, sauf s’ils se trouvent sur le serveur Windows NT que vous désactivez. Si certains utilisateurs ont des répertoires de départ sur ce serveur, vous pouvez faire migrer ces répertoires vers Mac OS X Server. Vous pouvez aussi faire migrer les répertoires de départ d’autres utilisateurs vers Mac OS X Server. Avant de faire migrer des répertoires de départ à partir d’un serveur Windows NT, les utilisateurs doivent temporairement copier leurs fichiers à un autre emplacement, comme leur dossier Mes documents ou un dossier réseau. Une fois les répertoires de départ Mac OS X Server configurés, les utilisateurs peuvent copier les fichiers dans les nouveaux répertoires de départ.104 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT Lorsqu’un utilisateur avec un répertoire de départ Mac OS X Server ouvre une session dans le domaine Windows du PDC Mac OS X Server,Windows mappe le répertoire de départ sur une unité réseau. Si le même utilisateur ouvre une session sur un ordinateur client Mac OS X, le système Mac OS X monte automatiquement le même répertoire de travail. L’utilisateur possède alors le même dossier de départ réseau, qu’il ouvre une session sur un ordinateur Windows ou sur un ordinateur Mac OS X. Un répertoire de départ Mac OS X Server se trouve sur un point de partage, à savoir un dossier, un disque dur, une partition de disque dur ou tout autre volume accessible sur le réseau. Le point de partage d’un répertoire de départ peut se trouver sur le même serveur que le PDC, ou bien sur un membre du domaine Mac OS X Server. Les réglages dans le compte utilisateur indiquent l’emplacement du répertoire de départ et la lettre d’unité pour l’unité Windows mappée. Vous pouvez gérer les points de partage et les réglages des répertoires de départ avec Gestionnaire de groupe de travail. Mac OS X Server stocke également un profil utilisateur pour chaque utilisateurWindows qui ouvre et ferme une session sur le PDC. Il s’agit dans ce cas de profils itinérants. Chaque utilisateur possède le même profil au moment d’ouvrir une session sur le PDC depuis n’importe quel poste de travailWindows sur le réseau. Un profil utilisateur stocke les réglages (écran de veille, couleurs, arrière-plans,sons, cookies Web, etc.), les favoris, le dossier Mes documents et d’autres données de l’utilisateur Windows dans un point de partage sur un système Mac OS X Server. En général, le serveur PDC stocke les données du profil itinérant des utilisateurs, mais un autre système Mac OS X Server peut également stocker ces données pour n’importe quel utilisateur. Si vous disposez d’un seul système Mac OS X Server, il peut servir de PDC tout en hébergeant des répertoires de départ et des profils utilisateur itinérants. Fourniture d’un service de fichiers Si vous faites migrer des utilisateurs, des groupes et des ordinateurs vers un PDC Mac OS X Server, vous pouvez configurer Mac OS X Server pour remplacer le service de fichiers actuellement fourni par Windows NT aux utilisateurs Windows. Les comptes utilisateur définis sur Mac OS X Server peuvent être utilisés pour authentifier l’accès à des dossiers réseau partagés via le protocole Windows standard SMB (Server Message Block) pour le service de fichiers. Les utilisateurs Windows accèdent à des dossiers partagés sur Mac OS X Server à l’aide de procédures courantes, telles que le mappage d’une unité réseau. Les comptes utilisateur du PDC Mac OS X Server (le répertoire LDAP du serveur) peuvent servir à accéder aux dossiers partagés du serveur PDC, le cas échéant. Les comptes utilisateur PDC peuvent aussi être employés pour accéder à des dossiers partagés sur des serveurs membres du domaine Windows. Par ailleurs, les comptes utilisateur définis dans le domaine de répertoire local d’un serveur peuvent permettre d’accéder à des dossiers partagés sur ce serveur.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 105 Les dossiers partagés se trouvent dans des points de partage Mac OS X Server. Les utilisateurs Windows peuvent mapper des unités réseau sur des points de partage de Mac OS X Server comme ils le font sur des dossiers réseau des serveurs Windows NT. Vous pouvez configurer des points de partage pour l’utilisation exclusive ou non exclusive d’utilisateurs Windows. Par exemple, vous pouvez configurer un point de partage dans lequel les utilisateurs Windows et Mac OS X enregistrent des images partagées ou des fichiers de traitement de texte utilisables sur une autre plate-forme. À l’inverse, vous pouvez configurer un point de partage réservé à un accès SMB afin d’offrir un point d’accès unique à vos utilisateurs Windows et leur permettre de profiter du verrouillage de fichiers opportuniste (oplocks) et du verrouillage de fichiers strict. En général, le verrouillage de fichiers empêche plusieurs clients de modifier simultanément les mêmes informations. Un client verrouille le fichier ou une partie du fichier pour profiter d’un accès exclusif. Le verrouillage opportuniste offre un accès exclusif, mais il permet aussi à un client de mettre localement en cache ses modifications (sur l’ordinateur client) pour améliorer les performances. Important :n’activez pas le verrouillage opportuniste, ou oplocks,, pour un point de partage utilisant un protocole autre que SMB. Vous pouvez contrôler l’accès des utilisateurs aux dossiers et aux fichiers stockés dans des points de partage Mac OS X Server en définissant des autorisations UNIX standard (lecture, lecture et écriture, écriture, aucune) pour le propriétaire, le groupe ou quiconque. Pour un contrôle plus flexible, vous pouvez utiliser des listes de contrôle d’accès. Pour en savoir plus sur les points de partage et les autorisations, consultez la section Administration des services de fichier. Les utilisateurs Windows peuvent mapper des unités réseau sur des points de partage Mac OS X Server106 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT Fourniture d’un service d’impression Le service d’impression de Mac OS X Server vous permet de configurer un environnement d’impression géré sur votre réseau. Vous pouvez partager des imprimantes compatibles PostScript en leur configurant des files d’attente sur un serveur. Lorsqu’un utilisateur imprime vers une file d’attente partagée, la tâche d’impression attend sur le serveur que l’imprimante soit disponible ou que les critères de planification établis soient respectés. Vous pouvez par exemple :  conserver une tâche pour l’imprimer ultérieurement,  limiter le nombre de pages individuelles que les utilisateurs peuvent imprimer sur des imprimantes déterminées,  conserver des historiques qui résument l’utilisation des imprimantes. Mac OS X Server peut offrir aux utilisateurs Windows l’accès à des files d’attente via le protocole Windows standard de partage d’imprimantes SMB. L’impression vers une file d’attente Mac OS X Server revient à imprimer vers n’importe quelle imprimante réseau dans Windows. L’installation d’une imprimante sur un ordinateur Windows requiert des autorisations administrateur. Les utilisateurs ayant ouvert une session avec des comptes PDC ne peuvent pas installer des imprimantes,sauf s’ils sont membres du groupe local Administrateurs (ou du groupe local Utilisateurs avec pouvoir dans Windows 2000). Pour contrôler le nombre de pages imprimées par chaque utilisateur, vous fixez des quotas d’impression. Un quota d’impression détermine le nombre de pages qu’un utilisateur peut imprimer au cours d’une période donnée. Un utilisateur qui atteint le quota d’impression ne peut plus imprimer jusqu’à la fin de la durée du quota. Pour chaque utilisateur, vous définissez un seul quota valable pour toutes les files d’attente, ou bien des quotas individuels pour chacune d’elles. Configuration DNS Pour certains services de Mac OS X Server, un DNS correctement configuré est obligatoire ou du moins en simplifie l’utilisation. En particulier, l’authentification Kerberos requiert un DNS correctement configuré. Même si Mac OS X Server n’utilise pas Kerberos pour authentifier des utilisateurs Windows pour l’accès à des domaines ou le service d’impression, Mac OS X Server peut s’en servir pour authentifier des utilisateurs Windows pour d’autres services. Par exemple, Mac OS X Server peut utiliser Kerberos pour authentifier des utilisateurs Mac OS X pour l’ouverture de sessions et le service de fichiers.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 107 Si vous souhaitez que Mac OS X Server fournisse des services à des utilisateurs tant Mac OS X que Windows, assurez-vous que le DNS de votre réseau est configuré pour résoudre le nom du serveur avec son adresse IP et une recherche inverse de l’adresse IP du serveur avec son nom. DNS peut aussi servir de mécanisme de secours pour la résolution de noms par des postes de travailWindows. Les postes de travailWindows tentent dans un premier temps de reconnaître le PDC via NetBIOS :DNS n’est alors pas requis pour que Mac OS X Server fournisse un PDC ou d’autres services aux utilisateurs Windows. Toutefois, les clients Windows auront recours à la résolution de noms DNS s’ils ne peuvent pas identifier le nom d’un serveur via NetBIOS. Par conséquent, il peut s’avérer utile pour les utilisateurs Windows d’avoir un DNS correctement configuré et activé. Votre DNS peut être fourni par Mac OS X Server ou tout autre serveur sur votre réseau. Si vous avez un fournisseur d’accès à Internet (FAI) indépendant, ce dernier peut aussi vous fournir un DNS. Pour en savoir plus sur la configuration du DNS dans Mac OS X Server, consultez la section Administration des services de réseau. Outils pouvant être utilisés Cette section décrit les outils disponibles pour la migration de Windows NT vers Mac OS X Server 10.5. Outils de migration d’utilisateurs, de groupes et d’ordinateurs Pour faire migrer des utilisateurs, des groupes et des ordinateurs, utilisez :  Admin Serveur, pour convertir Mac OS X Server en maître Open Directory et configurer le service WINS.  l’outil de ligne de commande ntdomainmigration.sh pour configurer Mac OS X Server en tant que PDC et y faire migrer les informations d’utilisateurs et d’ordinateurs depuis le serveur NT. Important :en raison d’un problème connu, le script de migration de domaine Windows NT (NTdomainmigration.sh) ne fait pas migrer les informations de groupes. La solution consiste à créer manuellement les informations de groupes sur le serveur Mac OS X Server servant de PDC.  Gestionnaire de groupe de travail pour modifier des comptes utilisateur et de groupes, configurer des dossiers de départ réseau et configurer des profils utilisateur itinérants.  Windows Explorer pour copier des fichiers d’utilisateurs dans leurs nouveaux répertoires de départ.108 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT Outils de migration du service de fichiers Pour faire migrer le service de fichiers, utilisez :  Gestionnaire de groupe de travail pour créer des points de partage et des dossiers partagés, ainsi que définir des listes de contrôle d’accès et des privilèges UNIX pour celles-ci.  Windows Explorer pour copier des fichiers partagés et mapper des unités réseau sur des points de partage Mac OS X Server. Outils pour fournir à Windows l’accès au service d’impression Pour offrir à Windows l’accès au service d’impression, utilisez :  Admin Serveur pour configurer des files d’attente pour l’accès de Windows et l’application de quotas d’impression.  L’assistant Ajouter une imprimante sur chaque poste de travail Windows pour ajouter des files d’attente comme imprimantes.  Gestionnaire de groupe de travail pour configurer des quotas pour les utilisateurs (facultatif). Instructions pas à pas Cette section décrit comment effectuer une migration de Windows NT vers Mac OS X Server 10.5.  « Migration d’utilisateurs, de groupes et d’ordinateurs » à la page 108.  « Migration du service de fichiers Windows » à la page 119.  « Accès de Windows au service d’impression » à la page 123. Migration d’utilisateurs, de groupes et d’ordinateurs Suivez les instructions dans cette section pour transférer des comptes utilisateur et de groupes, des enregistrements d’ordinateurs et des fichiers personnels d’utilisateurs d’un PDC Windows NT vers un PDC Mac OS X Server. Important :en raison d’un problème connu, le script de migration de domaine Windows NT (NTdomainmigration.sh) ne fait pas migrer les informations de groupes. La solution consiste à créer manuellement les informations de groupes sur le serveur Mac OS X Server servant de PDC.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 109 Le diagramme suivant récapitule les étapes pour la migration d’utilisateurs, de groupes et d’ordinateurs. Vous trouverez en dessous des instructions détaillées. Étape 1 :configurez un maître Open Directory. Vous pouvez configurer un maître Open Directory lors de la configuration initiale du serveur après l’installation de Mac OS X Server. Si Mac OS X Server est déjà installé, vous pouvez utiliser Admin Serveur pour configurer un maître Open Directory. Lorsque vous configurez un maître Open Directory, Kerberos démarre seulement si le serveur est configuré pour utiliser un service DNS qui résout le nom DNS qualifié complet du serveur, ainsi qu’une recherche inverse de l’adresse IP du serveur. Mac OS X Server utilise l’authentification Kerberos pour des services autres que les services Windows. Si vous souhaitez que Mac OS X Server fournisse des services aux utilisateurs tant Mac OS X que Windows, configurez-le de façon à ce que Kerberos soit actif. 3 Migration des fiches d'utilisateurs, de groupes et d'ordinateurs. 5 Transfert des scripts d'ouverture de session. 4 Configuration de l'infrastructure du répertoire de départ. 1 Configuration du maître Open Directory. 6 Les utilisateurs transfèrent les fichiers vers les nouveaux répertoires de départ. Mac OS X Server Serveur Windows NT 7 Les utilisateurs se déconnectent pour enregistrer les réglages du profil. Clients Windows 2 Les utilisateurs copient les fichiers depuis les anciens répertoires de départ.110 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT Pour convertir Mac OS X Server en maître Open Directory : 1 Si Mac OS X Server doit utiliser un service DNS existant, configurez le service DNS de votre réseau pour résoudre le nom et l’adresse IP du serveur, ainsi que la recherche inverse de l’adresse IP du serveur avec son nom. 2 Installez le logiciel Mac OS X Server 10.5 s’il n’est pas déjà installé. Pour obtenir des instructions d’installation, consultez la section Premiers contacts. Si le logiciel Mac OS X Server est déjà installé, passez à l’étape 4. 3 Lors de la configuration initiale du serveur juste après l’installation, utilisez la configuration avancée pour créer un maître Open Directory avec les informations suivantes,mais ne créez pas de PDC Windows et ne configurez pas le service de fichiers SMB pour un démarrage automatique :  Dans la sous-fenêtre Réglages TCP/IP, tapez l’adresse IP d’un ou plusieurs serveurs DNS configurés pour résoudre le nom et l’adresse IP du nouveau serveur. Si aucun serveur DNS n’est configuré pour résoudre le nom et l’adresse IP du nouveau serveur, ne tapez pas d’adresse du serveur DNS.  Dans la sous-fenêtre Utilisation du répertoire, choisissez Maître Open Directory dans le menu local « Réglez l’utilisation du répertoire sur ». Ne sélectionnez pas « Activer le contrôleur de domaine principal Windows ». Le serveur devient un PDC à l’étape 3, « faites migrer des utilisateurs, des groupes et des ordinateurs vers Mac OS X Server. » à la page 111.  Dans la sous-fenêtre Services, laissez le service de fichiers Windows désélectionné. Vous pouvez activer d’autres services dans cette sous-fenêtre. Si vous n’activez pas de services à présent, vous pourrez le faire plus tard à l’aide d’Admin Serveur. 4 Si Mac OS X Server doit fournir son propre service DNS, utilisez ce qui suit pour le configurer ainsi que les préférences réseau du serveur.  Pour obtenir des instructions sur la configuration du service DNS du serveur, consultez la section Administration des services de réseau.  Dans la sous-fenêtre Réseau des Préférences Système, vérifiez que l’adresse IP du serveur est la première adresse dans le champ Serveurs DNS pour l’interface réseau principale. Pour obtenir des instructions, ouvrez les Préférences Système, choisissez Aide > Aide Préférences Système et recherchez « modification des réglages réseau ». 5 Utilisez Admin Serveur pour confirmer que le serveur est un maître Open Directory et savoir si Kerberos est en cours d’exécution. Ouvrez Admin Serveur, connectez-vous au serveur, sélectionnez Open Directory dans la liste d’ordinateurs et de services, cliquez sur Vue d’ensemble et vérifiez ce qui suit.  Si la sous-fenêtre Vue d’ensemble d’Open Directory n’indique pas que le serveur est un maître Open Directory, cliquez sur Réglages puis sur Général et choisissez Maître Open Directory dans le menu local Rôle. Pour obtenir des instructions détaillées, consultez la section Administration d’Open Directory.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 111  Si la sous-fenêtre Vue d’ensemble indique que Kerberos est arrêté, démarrez-le. Cliquez sur Réglages,sur Général puis sur Kerbériser et authentifiez-vous lorsque demandé. Pour obtenir des instructions détaillées sur le démarrage de Kerberos après la configuration d’un maître Open Directory, consultez la section Administration d’Open Directory. Kerberos ne démarre pas si le serveur n’est pas configuré pour utiliser un serveur DNS qui résout le nom DNS qualifié complet du serveur et la recherche inverse de l’adresse IP du serveur. 6 Utilisez Admin Serveur pour procéder comme suit afin de vérifier que les méthodes d’authentification employées par les services Windows (NTLMv1, NTLMv2 et éventuellement LAN Manager) sont activées. Si Open Directory est sélectionné pour le serveur PDC dans la liste d’ordinateurs et de service d’Admin Serveur, cliquez sur Réglages,sur Règlement, puis sur Authentification. Assurez-vous que l’option NTLMv1 et NTLMv2 est sélectionnée. Sélectionnez d’autres méthodes d’authentification requises par des services et des utilisateurs du serveur. Étape 2 :demandez aux utilisateurs de copier les fichiers de leurs anciens répertoires de départ. Indiquez aux utilisateurs qui ont des répertoires de départ sur le serveur Windows NT qui sera désactivé qu’ils doivent copier les fichiers de leurs répertoires de départ dans leur dossier Mes documents ou dans un dossier réseau restant actif. Ils pourront ensuite copier ces fichiers dans les nouveaux répertoires de départ Mac OS X Server. Les utilisateurs qui ont des répertoires de départ sur des serveurs Windows demeurant actifs n’ont pas besoin de copier les fichiers contenus dans ces répertoires. Après leur migration vers Mac OS X Server, ces utilisateurs pourront accéder comme auparavant à leurs répertoires de départ. Étape 3 :faites migrer des utilisateurs, des groupes et des ordinateurs vers Mac OS X Server. Utilisez l’outil de ligne de commande ntdomainmigration.sh pour faire migrer des informations d’utilisateurs, de groupes et d’ordinateurs depuis un serveur NT. Pour les utilisateurs et les groupes migrés, l’outil crée des comptes dans le répertoire LDAP de Mac OS X Server. Pour les ordinateurs migrés, il crée des enregistrements et les ajoute à la liste d’ordinateurs Windows dans le répertoire LDAP. Par ailleurs, l’outil configure Mac OS X Server comme PDC et démarre les services Windows. Pour utiliser ntdomainmigration.sh, vous devez connaître le domaine Windows du serveur NT, le nom et le mot de passe d’un administrateur du domaine NT, ainsi que le nom et le mot de passe d’un administrateur du répertoire LDAP. Si votre réseau comporte un serveur WINS, vous devez aussi en connaître l’adresse IP ou le nom DNS.112 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT Lorsque vous exécutez ntdomainmigration.sh, il envoie des informations sur les utilisateurs, les groupes et les ordinateurs migrés. Vous pouvez enregistrer ces informations si vous voulez conserver un historique de la migration. Pour faire migrer des utilisateurs, des groupes et des ordinateurs et convertir Mac OS X Server en PDC : 1 Configurez Mac OS X Server pour utiliser le serveur WINS existant sur votre réseau ou pour fournir un service WINS en procédant comme suit : Ouvrez Admin Serveur, connectez-vous au serveur et sélectionnez SMB dans la liste d’ordinateurs et de services. Cliquez sur Réglages puis sur Avancé, et procédez de l’une des manières suivantes :  Si votre réseau comporte un serveur WINS, sélectionnez « S’inscrire sur ce serveur WINS » et tapez l’adresse IP ou le nom DNS du serveur WINS.  Si votre réseau n’a pas de serveur WINS, sélectionnez « Activer le serveur WINS ». Vous ne devez pas forcément configurer le service WINS si Mac OS X Server se trouve sur le même sous-réseau que le serveur Windows NT ; cette opération n’est pas pour autant un problème. 2 Vérifiez que le service Windows est arrêté en procédant comme suit : Si SMB est sélectionné dans la liste d’ordinateurs et de services, cliquez sur Vue d’ensemble. Si la sous-fenêtre Vue d’ensemble indique que le service SMB est actif, cliquez sur Arrêter SMB ou choisissez Serveur > Arrêter le service. 3 Ouvrez Terminal, tapez la commande suivante (en remplaçant comme décrit dans la tableau suivant), et appuyez sur la touche Retour : sudo /usr/sbin/ntdomainmigration.sh Pour Remplacer par Le nom de domaine Windows du serveur NT Le nom NetBIOS du serveur NT Le nom d’un utilisateur du domaine NT avec des droits administrateur Le nom d’un compte utilisateur du répertoire LDAP avec des autorisations administrateurChapitre 7 Migration vers Mac OS X Server à partir de Windows NT 113 4 Lorsqu’un message vous le demande, comme suit, tapez votre mot de passe utilisateur d’exécution (vous devez être autorisé à utiliser sudo dans le fichier /private/etc/sudoers), le mot de passe de l’administrateur du domaine NT indiqué et le mot de passe de l’administrateur du répertoire LDAP indiqué : Mot de passe : Tapez le mot de passe de l’administrateur du domaine NT () : Tapez le mot de passe de l’administrateur LDAP () : Après la première invite, tapez le mot de passe de l’utilisateur root. Il est généralement identique au mot de passe d’administrateur du serveur saisi lors de la configuration initiale du serveur. À la deuxième et troisième invites, à la place de , vous voyez le nom de l’administrateur du domaine NT que vous avez indiqué et à la place de le nom de l’administrateur du répertoire LDAP précisé. 5 Au terme de l’exécution de ntdomainmigration.sh, vous pouvez enregistrer un historique de migration en choisissant Fichier > « Enregistrer le texte sous ». Une fois les trois mots de passe saisis, ntdomainmigration.sh envoie des informations sur les enregistrements des utilisateurs, des groupes et des ordinateurs qu’il fait migrer. Lorsque l’outil a terminé, le message « La migration du domaine a abouti » apparaît. Vous pouvez enregistrer ces informations sous forme d’historique de migration. Si l’erreur se produit au cours de la migration, ntdomainmigration.sh les enregistre dans l’historique du système. Pour afficher l’historique du système, ouvrez Admin Serveur, sélectionnez le serveur dans la liste d’ordinateurs et de services, cliquez sur Historiques, puis choisissez Historique du système dans le menu local Présentation. 6 Vous pouvez éventuellement utiliser Gestionnaire de groupe de travail pour modifier les comptes utilisateur et de groupes comme suit. Vous pouvez sélectionner les comptes utilisateur et de groupes migrés et en modifier les réglages. Vous pouvez par exemple :  Sélectionner tous les comptes utilisateur migrés et définir les critères de mot de passe dans la sous-fenêtre Avancé afin que les utilisateurs soient obligés de changer leur mot de passe à la prochaine ouverture de session. Tant que les utilisateurs migrés ne réinitialisent pas leur mot de passe, ils travaillent uniquement avec les méthodes d’authentification NTLMv1, NTLMv2 et LAN Manager employées par les services Windows. Les mots de passe des utilisateurs migrés doivent être réinitialisés pour utiliser des méthodes d’authentification requises par d’autres services.  Ajouter des utilisateurs à des groupes dans la sous-fenêtre Membres pour les comptes de groupes, ou dans la sous-fenêtre Groupes pour les comptes utilisateur.  Sélectionner plusieurs comptes utilisateur et en configurer les comptes de messagerie dans la sous-fenêtre Courrier.114 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT  Indiquer un point de partage pour les dossiers de départ réseau des utilisateurs sélectionnés, comme décrit à l’étape suivante. Pour obtenir des instructions sur la définition des critères et des options de sécurité des mots de passe, consultez la section Administration d’Open Directory. Pour d’autres instructions sur les tâches des utilisateurs et des groupes, consultez la section Gestion des utilisateurs. 7 Utilisez Admin Serveur pour démarrer le service SMB comme suit : Ouvrez Admin Serveur, sélectionnez SMB dans la liste d’ordinateurs et de services, puis cliquez sur Vue d’ensemble. Si le service SMB est arrêté, cliquez sur Démarrer SMB ou choisissez Serveur > Démarrer le service. 8 Arrêtez le PDC Windows NT. Mac OS X Server devient alors le PDC pour le domaine Windows, et le domaine ne doit pas avoir deux PDC. Étape 4 :configurez l’infrastructure des répertoires de départ. Si des utilisateurs avaient des répertoires de départ sur le serveur Windows NT arrêté, vous devez leur configurer des répertoires de départ Mac OS X Server.Vous pouvez également configurer des répertoires de départ Mac OS X Server pour d’autres utilisateurs migrés. Le répertoire de départ d’un utilisateur est monté lorsque celui-ci ouvre une session avec un compte utilisateur Mac OS X Server. Le répertoire de départ est mappé sur une unité réseau et vous pouvez indiquer la lettre d’unité pour chaque utilisateur. La configuration de répertoires de départ Mac OS X Server pour des utilisateurs Windows se fait en deux temps :  Configuration de points de partage Mac OS X Server pour des répertoires de départ  Indication des réglages des répertoires de départ (emplacement et lettre d’unité) pour des comptes utilisateur Le point de partage configuré pour des répertoires de départ peut correspondre au dossier /Utilisateurs prédéfini sur le PDC Mac OS X Server. Si vous préférez que les répertoires de départ des utilisateurs se trouvent sur un ou plusieurs autres serveurs, vous pouvez créer des points de partage sur d’autres systèmes Mac OS X Server. Un point de partage pour un répertoire de départWindows doit se trouver sur un serveur membre du domaine Windows ou sur un serveur PDC, et il doit être configuré pour utiliser le protocole SMB. Pour obtenir des instructions sur la configuration d’un système Mac OS X Server comme membre du domaine Windows, consultez la section Administration desservices de fichier. Si le point de partage sera utilisé pour les répertoires de départ des utilisateurs tant Windows que Mac OS X, il doit également employer le protocole AFP ou NFS et avoir un enregistrement de montage réseau configuré pour les répertoires de départ. Pour obtenir des instructions sur la configuration des répertoires de départ Mac OS X, consultez le chapitre traitant des répertoires de départ dans Gestion des utilisateurs.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 115 Pour une vue d’ensemble des points de partage, ainsi qu’une explication des problè- mes à prendre éventuellement en compte avant leur création, consultez le chapitre sur les points de partage dans Administration des services de fichier. Pour configurer un point de partage pour les répertoires de départ des utilisateurs Windows : 1 Ouvrez Admin Serveur et sélectionnez un point de partage existant ou configurez-en un nouveau pour les répertoires de départ :  Pour utiliser un point de partage existant, connectez Admin Serveur au serveur sur lequel figure le point de partage, cliquez sur Partage de fichiers puis sur Points de partage, et sélectionnez le point de partage en question.  Pour configurer un nouveau point de partage, connectez Admin Serveur au serveur sur lequel figure le point de partage, cliquez sur Partage de fichiers puis sur Volumes, accédez au dossier devant servir de point de partage des répertoires de départ, puis cliquez sur Partager.  Pour créer un dossier comme point de partage, cliquez sur le bouton Nouveau dossier, tapez le nom du dossier, cliquez sur Créer,sélectionnez le nouveau dossier et cliquez sur Partager. Remarque :n’utilisez pas de barre oblique (/) dans un nom de dossier ou de volume amené à être partagé. Les utilisateurs qui tentent d’accéder au point de partage peuvent avoir des difficultés à le voir. 2 Une fois le point de partage des répertoires de départ sélectionné dans Admin Serveur, définissez-en l’accès et les autorisations dans la sous-fenêtre Autorisations, puis cliquez sur Enregistrer :  Pour changer le propriétaire ou le groupe du point de partage, cliquez sur le bouton Ajouter (+) et faites glisser un nom depuis le volet Utilisateurs et groupes vers la liste POSIX. Utilisez les menus locaux en regard des champs pour changer les autorisations.  Pour ajouter une entrée à la liste de contrôle d’accès, faites glisser un nom depuis le volet Utilisateurs et groupes. Utilisez les menus locaux en regard des champs pour changer les autorisations.  Pour supprimer une entrée de la liste de contrôle d’accès ou de la liste POSIX, sélectionnez-la et cliquez sur le bouton Supprimer (–). Les privilèges UNIX habituels pour un point de partage contenant des répertoires de départ sont les suivants :  Propriétaire désigne l’administrateur du serveur principal et possède des autorisations en lecture et écriture.  Groupe correspond à « admin » et possède des autorisations en lecture et écriture.  Tous possèdent une autorisation en lecture seule. Pour en savoir plus sur les listes de contrôle d’accès et les privilèges UNIX, consultez la section Administration des services de fichier.116 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT 3 Une fois le point de partage sélectionné dans Admin Serveur, cliquez sur Point de partage et sur Options de protocole, configurez les réglages pour SMB et d’autres protocoles, puis cliquez sur Enregistrer. Pour configurer les réglages SMB du point de partage, cliquez sur SMB puis sur « Partager cet élément via SMB ». Configurez les réglages SMB comme il convient et cliquez sur OK. Important :si des utilisateurs Mac OS ou UNIX doivent aussi accéder au point de partage, vérifiez que l’option « Activer le verrouillage strict » est sélectionnée. Configurez les autres protocoles de partage de fichiers comme nécessaire. Pour en savoir plus sur la configuration des réglages de fichiers AFP, SMB, FTP et NFS, consultez la section Administration des services de fichier. 4 Si le point de partage sera utilisé pour des répertoires de départ Mac OS X et Windows, configurez-le pour un montage automatique sur des ordinateurs clients : Une fois le point de partage sélectionné dans Admin Serveur, cliquez sur Point de partage, sur « Activer le montage automatique », effectuez les configurations nécessaires, cliquez sur OK, puis sur Enregistrer. Pour en savoir plus sur la configuration du montage automatique pour le point de partage, consultez la section Administration desservices de fichier. Pour indiquer un emplacement et une lettre d’unité pour les répertoires de départ des utilisateurs Windows : 1 Dans Gestionnaire de groupe de travail,sélectionnez les comptes utilisateur pour lesquels configurer des répertoires de départ. Pour sélectionner des comptes utilisateur, cliquez sur le bouton Comptes, puis sur l’icône illustrant un petit globe sous la barre d’outils, et ouvrez le répertoire LDAP du PDC. Pour modifier les informations sur le répertoire de départ, cliquez sur le verrou pour vous authentifier en tant qu’administrateur du domaine du répertoire LDAP, puis sélectionnez un ou plusieurs utilisateurs dans la liste d’utilisateurs. 2 Si vous voulez utiliser le même dossier de départ réseau pour Windows et pour Mac OS X, cliquez sur Départ et indiquez le point de partage à employer : Dans la liste de points de partage,sélectionnez /Utilisateurs ou tout autre point de partage souhaité, puis cliquez sur Créer Départ. Si le point de partage à utiliser n’est pas répertorié, cliquez sur le bouton Ajouter (+) et tapez l’URL du point de partage et le chemin du répertoire de départ de l’utilisateur dans le point de partage. Si vous voulez choisir le point de partage /Utilisateurs mais qu’il ne figure pas dans la liste, cliquez sur le bouton Ajouter (+) et tapez le chemin du répertoire de départ de l’utilisateur dans le champ Départ.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 117 Tapez le chemin comme suit : /Utilisateur/nomutilisateurabrégé Remplacez nomutilisateurabrégé par le premier nom abrégé du compte utilisateur configuré. 3 Cliquez sur Windows, tapez l’emplacement du répertoire de départ dans le champ Chemin, choisissez une lettre d’unité dans le menu local Disque dur, puis cliquez sur Enregistrer en gardant ce qui suit à l’esprit :  Laissez le champ Chemin vide pour utiliser le même répertoire de départ pour l’ouverture de session sur Windows et sur Mac OS X. Vous pouvez aussi indiquer ce répertoire de départ en tapant un chemin UNC n’incluant pas de point de partage : \\nomserveur\nomutilisateurabrégé Remplacez nomserveur par le nom NetBIOS du serveur du PDC ou un serveur membre du domaine Windows où se trouve le point de partage. Remplacez nomutilisateurabrégé par le premier nom abrégé du compte utilisateur configuré.  Pour indiquer un autre point de partage SMB, tapez un chemin UNC incluant ce point de partage : \\nomserveur\nompartage\nomutilisateurabrégé Remplacez nompartage par le nom du point de partage.  La lettre d’unité par défaut est H. Windows se sert de cette lettre pour identifier le répertoire de départ monté. 4 Si le champ Chemin n’est pas vide, vérifiez que le point de partage indiqué contient un dossier pour le répertoire de départ de l’utilisateur. Le nom du dossier doit correspondre au premier nom abrégé de l’utilisateur, et ce dernier doit posséder les autorisations en lecture et écriture sur ce dossier. Si le champ Chemin est vide, il n’est pas obligatoire que le point de partage du répertoire de départ contienne un dossier pour le répertoire de départ de l’utilisateur.Dans ce cas, Mac OS X Server crée un dossier de répertoire de départ dans le point de partage indiqué dans la sous-fenêtre Départ. Étape 5 :transférez des scripts d’ouverture de session vers Mac OS X Server. Si des utilisateurs ont des scripts d’ouverture de session sur un serveur Windows NT, vous pouvez les copier sur le PDC Mac OS X Server et configurer des comptes utilisateur en vue de les utiliser. Vous pouvez copier les scripts via le réseau ou à l’aide d’un disque amovible comme un disque CD-R ou USB. Sur le PDC Mac OS X Server, les scripts d’ouverture de session utilisateur se trouvent dans le dossier /etc/netlogon/.118 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT Pour les copier sur le PDC Mac OS X Server sur le réseau : 1 Sur un ordinateur Windows où vous pouvez accéder au serveur NT et un point de partage Mac OS X Server dans lequel copier les fichiers, ouvrez le dossier contenant les scripts à copier. 2 Connectez-vous au point de partage Mac OS X Server et mappez une unité réseau sur ce point. Pour obtenir des instructions sur le mappage d’une unité réseau, consultez l’aide à l’écran dans Windows. 3 Copiez les scripts sur le point de partage Mac OS X Server mappé. 4 Ouvrez une session dans le PDC Mac OS X Server avec le nom d’utilisateur et le mot de passe root, ouvrez le dossier du point de partage dans lequel vous avez fait la copie et copiez les scripts dans le dossier /etc/netlogon/. Le nom d’utilisateur root est « root » ou « administrateur système » et le mot de passe est identique à celui donné au premier compte administrateur créé. Si vous copiez des scripts dans le Finder, vous pouvez ouvrir /etc/netlogon/ en choisissant Aller > Aller au dossier, en tapant /etc/netlogon/ et en cliquant sur Aller. 5 Fermez la session puis ouvrez-en une autre avec le nom et le mot de passe de l’administrateur du serveur. 6 Dans Gestionnaire de groupe de travail, sélectionnez tous les comptes utilisateur du PDC Windows et assurez-vous que l’emplacement du script d’ouverture de session est correctement indiqué dans la sous-fenêtre Windows. Le champ Script d’ouverture de session doit contenir le chemin relatif du script d’ouverture de session figurant dans /etc/netlogon/. Par exemple, si vous avez copié un script nommé setup.bat dans /etc/netlogon/, le champ Script d’ouverture de session doit afficher setup.bat. Étape 6 :demandez aux utilisateurs de transférer des fichiers vers les répertoires de départ Mac OS X Server. Les utilisateurs qui ont effectué une copie de sauvegarde de fichiers de l’ancien serveur Windows NT (à l’étape 2 page 111) peuvent désormais copier ces fichiers dans les répertoires de départ Mac OS X Server configurés pour eux (à l’étape 4 page 114). Lorsque chaque utilisateur ouvre une session avec un compte utilisateur du PDC Mac OS X Server, son répertoire de départ est mappé sur une unité réseau. L’utilisateur peut alors copier des fichiers depuis le dossier Mes documents et des dossiers réseau. Une fois ces fichiers copiés dans le répertoire de départ, demandez aux utilisateurs de les supprimer des emplacements précédents.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 119 Les utilisateurs doivent généralement conserver les fichiers volumineux dans leur dossiers de départ réseau au lieu du dossier Mes documents. Plus la taille du dossier Mes documents est importante, plus la synchronisation à l’ouverture et à la fermeture de sessions du domaine prend du temps.Toutefois, les utilisateurs qui doivent accéder aux fichiers quand ils sont déconnectés du réseau ne doivent pas conserver ces fichiers dans leurs dossiers de départ réseau. Étape 7 :demandez aux utilisateurs de fermer la session pour mettre à jour leurs profils itinérants. Les profils itinérants stockés sur l’ancien serveur du PDC Windows NT sont migrés de façon individuelle lorsque des utilisateurs migrésferment la session du domaineWindows du PDC Mac OS X Server. Ces profils ne sont pas migrés en masse de l’ancien au nouveau PDC. La première fois que chaque utilisateur ouvre une session sur le nouveau PDC, le poste de travail Windows ne peut pas charger le profil itinérant depuis l’ancien PDC car il est alors arrêté. Dans ce cas, Windows se sert de la copie locale du profil utilisateur stocké sur le poste de travail Windows. Lorsque l’utilisateur ferme la session, Windows enregistre les réglages et le contenu du profil du dossier Mes documents sur le serveur du PDC Mac OS X Server. À partir de là, Windows peut charger le profil itinérant lorsque l’utilisateur ouvre une session sur le domaine Windows du PDC Mac OS X Server. Pour avoir des profils itinérants stockés sur un serveur autre que le PDC Mac OS X Server, indiquez le chemin du profil pour chaque utilisateur dans la sous-fenêtre Windows de Gestionnaire de groupe de travail. Pour obtenir des instructions, consultez la section Gestion des utilisateurs. Migration du service de fichiers Windows Suivez les instructions dans cette section pour transférer le contenu des dossiers réseau sur un serveur Windows NT vers des points de partage sur des systèmes Mac OS X Server. Configurez le service de fichiers Mac OS X Server en désignant les dossiers sur le serveur comme des points de partage et en plaçant les fichiers pour les utilisateurs Windows dans les dossiers de points de partage.Vous pouvez définir des listes de contrôle d’accès et des privilèges UNIX standard afin de contrôler le type d’accès dont bénéficient les utilisateurs pour les points de partage et les dossiers. Les utilisateurs Windows peuvent ensuite mapper des unités réseau sur des points de partage Mac OS X Server et accéder à leur contenu.120 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT Le diagramme suivant récapitule les étapes de migration. Vous trouverez à la suite des instructions détaillées. Étape 1 :configurez des points de partage SMB dans Mac OS X Server. Utilisez Gestionnaire de groupe de travail pour configurer des points de partage pour des dossiers et des volumes (y compris des disques, des partitions de disque, des CD et des DVD) que les utilisateurs Windows doivent partager. Si vous avez configuré un PDC Mac OS X Server, vous avez peut-être configuré des points de partage pour les répertoires de départ et les profils utilisateur itinérants ou utilisé les valeurs par défaut.Vous pouvez configurer d’autres points de partage sur des serveurs membres du domaine Windows ou sur le PDC à proprement parler. Si vous n’avez pas de PDC, vous pouvez configurer des points de partage sur un système Mac OS X Server configuré pour les services Windows autonomes. Les points de partage configurés sur un serveur autonome, un serveur membre du domaine ou un serveur du PDC peuvent répondre à une utilisation exclusive ou non exclusive des utilisateurs Windows. Pour une vue d’ensemble des points de partage, avec une présentation des listes de contrôle d’accès et des privilèges UNIX standard, consultez la section Administration desservices de fichier. Mac OS X Server Serveur Windows NT Clients Windows 1 Configuration des points de partage. 2 Transfert des fichiers. 3 Définiton des autorisations UNIX et/ou ACL. 4 Mise en correspondance des lecteurs réseau avec les points de partage.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 121 Pour créer un point de partage SMB et en contrôler l’accès : 1 Ouvrez Admin Serveur, connectez-vous au serveur qui hébergera le point de partage et cliquez sur Partage de fichiers. 2 Vous pouvez éventuellement définir des autorisations de liste de contrôle d’accès pour le nouveau point de partage ou les dossiers qu’il renferme. 3 Cliquez sur Volumes et sélectionnez le volume à partager. Pour créer un dossier à utiliser comme point de partage, cliquez sur Parcourir, sur Nouveau dossier, tapez le nom du dossier et cliquez sur Créer. Remarque :n’utilisez pas de barre oblique (/) dans un nom de dossier ou de volume amené à être partagé. Les utilisateurs qui tentent d’accéder au point de partage pourraient avoir des difficultés à le voir. 4 Pour partager le volume ou le dossier, cliquez sur Partager. 5 Pour contrôler les utilisateurs accédant au point de partage, cliquez sur Points de partage, sur Autorisations, puis ajoutez des autorisations de liste de contrôle d’accès et/ou des privilèges UNIX standard. Pour obtenir des instructions sur la configuration des autorisations d’un point de partage, consultez la section Administration desservices de fichier. 6 Cliquez sur Enregistrer, sur Point de partage, sur Options de protocole, puis sur SMB. 7 Sélectionnez « Partager cet élément via SMB ». 8 Pour permettre aux utilisateurs non enregistrés d’accéder au point de partage,sélectionnez « Autoriser l’accès comme invité SMB ». Important :pour une plus grande sécurité, ne sélectionnez pas cette option. 9 Pour changer le nom que les clients voient lorsqu’ils recherchent un point de partage pour s’y connecter via SMB, tapez un nouveau nom dans le champ Nom SMB personnalisé. Le changement de nom personnalisé est sans incidence sur le nom du point de partage et ne concerne que le nom que les clients SMB voient. 10 Sélectionnez le type de verrouillage pour ce point de partage :  Pour permettre aux clients d’effectuer un verrouillage de fichiers opportuniste, sélectionnez Activer les oplocks. Important :n’activez pas les oplocks pour un point de partage utilisant un protocole autre que SMB.  Pour que les clients utilisent des verrouillages standard sur les fichiers du serveur, sélectionnez « Activer le verrouillage strict ».122 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT 11 Choisissez une méthode pour attribuer les autorisations d’accès UNIX par défaut pour les nouveaux fichiers et dossiers dans le point de partage :  Pour que de nouveaux éléments adoptent les autorisations de l’élément parent, sélectionnez « Recevoir l’autorisation des parents ».  Pour attribuer des autorisations spécifiques, sélectionnez Affecter comme suit et définissez les autorisations Propriétaire, Groupe et Tous via les menus locaux. 12 Pour empêcher l’accès AFP au nouveau point de partage, cliquez sur AFP et désélectionnez « Partager cet élément via AFP ». 13 Pour empêcher l’accès FTP au nouveau point de partage, cliquez sur FTP et désélectionnez « Partager cet élément via FTP ». 14 Pour empêcher l’accès NFS au nouveau point de partage, cliquez sur NFS et désélectionnez « Exporter cet élément et son contenu vers ». 15 Cliquez sur OK. 16 Assurez-vous que le service SMB est en cours d’exécution. Ouvrez Admin Serveur, sélectionnez SMB dans la liste d’ordinateurs et de services, puis cliquez sur Vue d’ensemble. Si le service SMB est arrêté, cliquez sur Démarrer SMB. Étape 2 :transférez des fichiers de Windows NT vers des points de partage Mac OS X Server. Une fois des points de partage Mac OS X Server configurés, vous pouvez y transférer des fichiers depuis des dossiers réseau sur le serveur Windows. Utilisez un ordinateur pouvant se connecter aux dossiers réseau Windows et aux points de partage Mac OS X Server. Les utilisateurs Windows peuvent aussi copier leurs propres fichiers sur des points de partage auxquels ils ont accès en lecture et écriture. Lorsque vous vous connectez à chaque point de partage, utilisez le nom et le mot de passe d’un compte utilisateur Mac OS X Server qui a accès en lecture et écriture aux dossiers dans lesquels vous allez copier des fichiers. Les autorisations par défaut que vous avez configurées auparavant pour un point de partage (à l’étape 1, « configurez des points de partage SMB dans Mac OS X Server. ») sont attribuées aux dossiers copiés dans ce point de partage. Étape 3 :contrôlez l’accès à des fichiers et des dossiers copiés. Vous pouvez définir des listes de contrôle d’accès sur des dossiers ou changer les privilèges UNIX attribués par défaut aux fichiers et dossiers copiés depuis des dossiers réseau Windows NT dans des points de partage Mac OS X Server. Vous pouvez définir des listes de contrôle d’accès ou attribuer des privilèges UNIX pour limiter l’accès aux dossiers détenus par des utilisateurs. Par exemple, vous pouvez octroyer à un utilisateur l’accès en lecture et écriture à un dossier et l’accès en écriture seulement à tous les autres utilisateurs, ce qui crée une boîte de dépôt.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 123 Vous pouvez également définir des listes de contrôle d’accès pour offrir à certains groupes plus d’accès à un dossier.Vous pouvez par exemple donner à un groupe l’accès en lecture et écriture, à un autre groupe l’accès en lecture seule et à tous les autres utilisateurs aucun accès.Vous pouvez attribuer des privilèges UNIX pour qu’un groupe ait un accès plus étendu que les autres. Pour en savoir plus sur les listes de contrôle d’accès et les privilèges UNIX, consultez la section Administration des services de fichier. Étape 4 :les utilisateurs peuvent mapper des unités en réseau sur des points de partage. Les utilisateurs Windows peuvent désormais se connecter aux points de partage Mac OS X Server qu’ils voient sous forme de dossiers réseau et mapper des unités réseau sur ces points de partage. Pour obtenir des instructions de base sur le mappage d’une unité réseau, consultez l’aide à l’écran dans Windows. Le nom et le mot de passe d’ouverture de session de l’utilisateur sont utilisés par défaut pour authentifier la connexion à un point de partage Mac OS X Server. Si l’utilisateur n’a pas ouvert la session sur Windows avec le nom et le mot de passe d’un compte utilisateur Mac OS X Server, il peut cliquer sur « Se connecter sous un nom d’utilisateur différent » dans la zone de dialogue « Connecter un lecteur réseau » et saisir le nom et le mot de passe d’un compte utilisateur Mac OS X Server. Vous pouvez ajouter des comptes utilisateur pour des utilisateurs Windows qui n’en possèdent pas encore à l’aide de Gestionnaire de groupe de travail. Pour obtenir des instructions, consultez la section Gestion des utilisateurs. Accès de Windows au service d’impression Suivez les instructions de cette section pour configurer l’accès aux files d’attente d’impression Mac OS X Server depuis des postes de travail Windows. Pour configurer le service d’impression pour des utilisateurs Windows, configurez des files d’attente d’impression pour l’emploi du protocole SMB. Ces utilisateurs peuvent ensuite se servir de l’assistant Ajouter une imprimante pour installer (se connecter à) des files d’attente d’impression comme des imprimantes réseau sur leurs postes de travailWindows. Ils verront alors ces files d’attente sous forme d’imprimantes. Pour installer une file d’attente d’impression sur un ordinateur Windows, il vous faut un compte utilisateur membre du groupe Administrateurs ou Utilisateurs avec pouvoir de l’ordinateur (pour Windows 2000). Par défaut, les comptes utilisateur du PDC ne sont pas membres de ces comptes locaux. Pour limiter le nombre de pages que des utilisateurs peuvent imprimer, établissez des quotas d’impression sur leur compte.124 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT Le diagramme suivant récapitule les étapes de migration pour configurer l’accès aux files d’attente d’impression Mac OS X Server depuis des postes de travail Windows. Vous trouverez à la suite des instructions détaillées. Étape 1 :configurez des files d’attente d’impression SMB dans Mac OS X Server. Utilisez Admin Serveur pour créer des files d’attente sur le serveur pour des imprimantes PostScript réseau, rendre ces files d’attente disponibles pour des utilisateurs Windows et démarrer le service d’impression sur le serveur. Pour configurer une file d’attente d’impression partagée pour l’accès SMB : 1 Dans Admin Serveur, sélectionnez Imprimer dans la liste d’ordinateurs et de services. 2 Cliquez sur Files d’attente. 3 Sélectionnez une file d’attente existante que vous voulez rendre disponible pour des utilisateurs Windows, puis cliquez sur le bouton Modifier (en forme de stylo) ou sur le bouton Ajouter (+) pour créer une file d’attente. Si vous cliquez sur le bouton Ajouter (+) pour créer une file d’attente, choisissez le protocole de l’imprimante dans le menu local en haut de la zone de dialogue, puis indiquez l’imprimante avec les informations suivantes :  Pour une imprimante AppleTalk ou Open Directory, sélectionnez-la dans la liste et cliquez sur OK.  Pour une imprimante LPR, tapez son adresse IP ou son nom DNS et cliquez sur OK (si vous ne voulez pas utiliser la file d’attente d’impression par défaut du serveur, désélectionnez « Utiliser la file d’attente par défaut sur le serveur » et tapez un nom de file d’attente). 4 Dans la sous-fenêtre d’édition de files d’attente, vérifiez que le champ Nom de partage respecte les règles de dénomination SMB. Pour le protocole SMB, le nom de partage doit comporter un maximum de 15 caractères et contenir uniquement les caractères A–Z, a–z, 0–9 et _ (traite de soulignement). Certains clients Windows limitent la longueur du nom à 12 caractères. Mac OS X Server Imprimantes PostScript Clients Windows 3 Définiton des quotas d'impression (facultatif). 1 Configuration des files d'attente d'impression. 2 Connexion aux files d'attente et impression.Chapitre 7 Migration vers Mac OS X Server à partir de Windows NT 125 Le nom de partage est celui de la file d’attente que les utilisateurs voient comme nom d’imprimante. Le changement du nom de partage est sans incidence sur le nom de l’imprimante sur le serveur, qui apparaît au-dessus de le champ Nom de partage.Vous pouvez modifier le nom de l’imprimante, le type (modèle) et l’emplacement dans la zone de dialogue Ajouter une imprimante, accessible depuis la zone de dialogue Imprimer. Pour éviter des conflits, assurez-vous que le nom de partage n’est pas identique à un nom de point de partage SMB. 5 Sélectionnez SMB et d’autres protocoles utilisés par des ordinateurs clients. Les ordinateursWindows peuvent utiliser SMB. Les ordinateursWindows 2000,Windows XP et Windows Vista peuvent utiliser SMB ou LPR. Les ordinateurs Mac OS X et Mac OS 9 peuvent utiliser AppleTalk ou LPR. 6 Pour appliquer les quotas d’impression fixés pour des utilisateurs dans Gestionnaire de groupe de travail, sélectionnez « Appliquer des quotas pour cette file d’attente ». 7 Cliquez sur Enregistrer. 8 Si le service d’impression est arrêté, cliquez sur Démarrer l’impression dans la barre d’outils ou choisissez Fichier > Démarrer le service. 9 Assurez-vous que le service d’impression est en cours d’exécution en sélectionnant Imprimer dans la liste d’ordinateurs et de services et en cliquant sur Vue d’ensemble. 10 Si le service d’impression est arrêté, cliquez sur Démarrer l’impression ou choisissez Serveur > Démarrer le service. Étape 2 :les clients Windows peuvent se connecter à des files d’attente Mac OS X Server. Les utilisateurs Windows peuvent désormais ajouter des connexions à des files d’attente Mac OS X Server à l’aide de l’assistant Ajouter une imprimante. Sur un ordinateur Windows XP, l’ajout d’une connexion à une file d’attente suppose l’ouverture de session avec un compte utilisateur membre du groupe Administrateurs de l’ordinateur. Sur un ordinateur Windows 2000, l’ajout d’une connexion à une file d’attente suppose l’ouverture de session avec un compte utilisateur membre du groupe Administrateurs ou Utilisateurs avec pouvoir de l’ordinateur. Par défaut, les comptes utilisateur du PDC ne sont pas membres de ces groupes. Pour obtenir des instructions sur l’ajout d’utilisateurs à des comptes de groupes locaux, consultez l’aide à l’écran dans Windows sur la gestion de l’ordinateur. Pour obtenir des instructions de base sur la connexion à des imprimantes réseau, consultez l’aide à l’écran dans Windows.126 Chapitre 7Migration vers Mac OS X Server à partir de Windows NT Étape 3 :définissez et appliquez des quotas d’impression (facultatif ). La définition de quotas d’impression se fait en deux temps :  Indication du quota et de la durée pour chaque utilisateur avec Gestionnaire de groupe de travail.  Configuration du service d’impression pour appliquer des quotas pour les files d’attente avec Admin Serveur. Pour fixer le quota d’impression pour un ou plusieurs utilisateurs : 1 Dans Gestionnaire de groupe de travail,sélectionnez les comptes utilisateur pour lesquels configurer un répertoire de départ. 2 Cliquez sur Quota d’impression et sélectionnez une option de quota d’impression :  Pour fixer un quota pour toutes les files d’attente, sélectionnez « Toutes les files d’attente » et tapez le nombre de pages et le nombre de jours après lesquels le quota sera réinitialisé.  Pour fixer un quota pour une seule file d’attente,sélectionnez Par file d’attente, choisissez la file d’attente dans la liste déroulante et tapez le quota et la durée. Si la file d’attente ne se trouve pas dans la liste, cliquez sur Ajouter et remplacez « sans titre » par le nom de la file d’attente. Choisissez ensuite le file d’attente dans la liste déroulante,tapez l’adresse IP ou le nom DNS du serveur hébergeant cette file d’attente et tapez le quota de pages et la durée du quota pour l’utilisateur. 3 Cliquez sur Enregistrer. Les quotas ne s’appliquent pas tant que vous n’activez pas leur application pour des files d’attente spécifiques dans le service d’impression avec Admin Serveur. Pour appliquer des quotas pour une file d’attente d’impression : 1 Dans Admin Serveur, sélectionnez Imprimer dans la liste d’ordinateurs et de services. 2 Cliquez sur Files d’attente. 3 Sélectionnez une file d’attente dans la liste. 4 Sélectionnez « Appliquer des quotas pour cette file d’attente ». 5 Cliquez sur Enregistrer. 127 Index Index A accès listes de contrôle d’accès (ACL)25, 59, 122 points de partage SMB120, 122, 123 Voir aussi LDAP; autorisations; SOAP administrateur, privilèges d’13 Admin Serveur31, 65, 86 adresses IP106 aide, utilisation6 applications JBoss migration à partir de la version 10.370, 79 migration à partir de la version 10.437, 46 archivage migration à partir de la version 10.367, 72 migration à partir de la version 10.433, 39 migration de 10.288, 91 authentification25, 111 Voir aussi Kerberos; mots de passe authentification de NTLMv1 et 2111 authentification standard. Voir mots de passe chiffrés autorisations administrateur13 migration à partir de la version 10.372, 83 migration à partir de la version 10.439, 50 migration de 10.291, 98 migration de Windows NT105, 115, 118 root13, 118 autorisations root13, 118 B BDC (contrôleur de domaine secondaire)103 C certificats, importation24, 58 certificats SSL (Secure Sockets Layer)24, 58 CIFS (Common Internet File System). Voir SMB/CIFS clients. Voir groupes; utilisateurs Common UNIX Printing System. Voir CUPS comptes. Voir groupes; utilisateurs; Gestionnaire de groupe de travail comptes d’utilisateur12, 13 comptes de groupe, enregistrement et réutilisation12, 13 comptes prédéfinis13, 14 comptes système13 comptes utilisateurs Voir aussi utilisateurs configuration mise à niveau à partir de la version 10.354, 55 mise à niveau à partir de la version 10.420, 21 configuration requise29, 63 configuration requise, système85 contrôleur de domaine principal. Voir PDC contrôleur de domaine secondaire. Voir BDC contrôleurs, PDC101, 102, 104, 112, 119 copies de sauvegarde, compte utilisateur103 courrier électronique. Voir service de messagerie CSR (demande de signature de certificat)24 CUPS (Common UNIX Printing System) migration à partir de la version 10.371, 79 migration à partir de la version 10.437, 46 mise à niveau à partir de la version 10.353, 60 mise à niveau à partir de la version 10.419, 23 D Demande de signature de certificat. Voir CSR démon launchd24, 45, 57, 78, 96 démon wotaskd24, 45, 57, 78, 96 dittooutil69 documentation7, 8, 9 domaines, annuaire. Voir Open Directory domaine Windows. Voir SMB/CIFS Domain Name System. Voir DNS dossiers. Voir dossiers de départ dossiers de départ migration à partir de la version 10.372, 74 migration à partir de la version 10.439, 41 migration de 10.291, 93 migration de Windows NT100, 103, 111, 114, 118 dsimport outil65 E exportation réglages de serveur19128 Index utilisateurs et groupes31, 32, 65, 66, 88 Voir aussi importation F fichiers déplacement de41, 75 relocalisation de93 transfert d’un utilisateur Windows118 verrouillage de105 Voir aussi archivage fichiers partagés. Voir partage de fichiers files d’attente, imprimer23, 125, 126 G Gestionnaire de groupe de travail enregistrement et réutilisation des utilisateurs et des groupes13 exportation d’utilisateurs et de groupes31, 32, 65, 66 importation d’utilisateurs et de groupes40, 73, 86 mise à niveau de mot de passe59 mise à niveau des mots de passe25 Gestionnaire Macintosh11 groupe admin13 groupes comptes prédéfinis13, 14 exportation31, 32, 65, 66, 88 importation40, 73, 92 migration de Windows NT100, 101, 102, 107, 108, 111 mise à niveau24, 58 groupe wheel13 H historiques, Open Directory26, 60 hôtes. Voir serveurs I images. Voir images disque; service NetBoot images disque, archivage de fichiers33, 67 Voir aussi service NetBoot importation certificats SSL24, 58 dsimport outil31, 65 groupes40, 73, 92 outil dsimport13 utilisateurs40, 73, 92 Voir aussi exportation Initiales de « Dynamic Host Configuration Protocol » (protocole de configuration dynamique d’hôtes). Voir DHCP Initiales de « File Transfer Protocol » (protocole de transfert de fichiers). Voir FTP Initiales de « Network address translation » (conversion d’adresses réseau). Voir NAT installation, mise à niveau19, 54 J Java migration à partir de la version 10.445, 78 migration de 10.496 mise à niveau à partir de la version 10.423 K Kerberos migration à partir de la version 10.375 migration à partir de la version 10.441 migration de Windows NT103, 106, 109, 111 mise à niveau à partir de la version 10.358 mise à niveau à partir de la version 10.425 L Lightweight Directory Access Pr listes de contrôle d’accès (ACL)25, 59, 122 M Mac OS X Server et le Gestionnaire Macintosh11 en remplacement de serveurs Windows NT101 Voir aussi version maître Open Directory migration à partir de la version 10.429 migration de Windows NT100, 102, 109 mise à niveau à partir de la version 10.352 mise à niveau à partir de la version 10.418 mappages d’unités réseau123 migration à partir de la version 10.211, 12 migration à partir de Windows NT vue d’ensemble11, 12 migration de la version 10.285, 86, 87 migration de Windows NT aperçu99, 100 configuration DNS106 procédure pas à pas108 remarques de planification102 service d’impression106, 108, 123 services de fichiers104, 108, 119 utilisateurs et groupes101, 102, 103, 107, 108, 111, 119 migration et mise à niveau5, 6 migration par rapport à mise à niveau11, 12, 13 mise à jour de logiciels19, 53 Mise à jour de logiciels, service19, 53 mise à niveau et migration5, 6 mise à niveau par rapport à migration11, 12, 13 mot de passe chiffrés59 mise à niveau à partir de la version 10.359Index 129 mot de passe chiffrés59 mots de passe chiffrés25, 41 migration à partir de la version 10.367 migration à partir de la version 10.433, 40, 41 migration de 10.288 mise à niveau à partir de la version 10.425 Open Directory25, 103 ouverture de session d’utilisateur root13 mots de passe chiffrés25, 41 MySQL migration à partir de la version 10.368 migration à partir de la version 10.434, 42, 76 N NAT (Network Address Translation) migration à partir de la version 10.371, 79 migration à partir de la version 10.437, 46 NetBIOS107 numéro de série, serveur15 O Open Directory historiques26, 60 migration à partir de la version 10.429, 36, 44 mise à niveau à partir de la version 10.418, 26 OpenLDAP Voir aussi Open Directory ordinateurs, migration de Windows NT100, 101, 102, 108, 111 outil createhomedir41 outil dsimport13, 31 outils de l13 outils de ligne de commande archivage33, 67, 88 copie33, 67, 69, 88 copie de fichiers à distance33, 88 dossiers de départ41 importation13, 31, 65 ouverture de session13 test de schéma LDAP26, 59 outil ssh13 outil su13 outil tar33 ouverture de session utilisateur root13 utilisateurs Windows102, 104, 117 P Partage de fichiers Voir aussi points de partage migration à partir de la version 10.373, 83 migration à partir de la version 10.439 migration de 10.292 migration de Windows NT104 PDC (contrôleur de domaine principal)101, 102, 104, 112, 119 PHP Hypertext Preprocessor (PHP)18 points de partage migration à partir de la version 10.372, 83 migration à partir de la version 10.439, 50 migration de 10.291, 98 et utilisateurs Windows104, 105, 114, 120, 122, 123 Postscript générique (PPD générique)23 privilèges, administrateur Voir aussi autorisations privilèges administrateur13 procédures de configuration. Voir configuration; installation profils utilisateur itinérants103, 119 Q QTSS Publisher migration à partir de la version 10.372, 81 migration à partir de la version 10.438, 48 mise à niveau à partir de la version 10.351 mise à niveau à partir de la version 10.417 QuickTime Streaming Server (QTSS) migration à partir de la version 10.371, 81 migration à partir de la version 10.438, 48 migration de 10.291 migration de 10.498 quotas, imprimer126 R répertoires. Voir services de répertoire; dossiers de départ réplique Open Directory migration à partir de la version 10.429 mise à niveau à partir de la version 10.352 mise à niveau à partir de la version 10.418 requise, configuration11 réseau privé. Voir VPN rsync outil33, 88 S schémas, domaine d’annuaire59 schémas, domaine de répertoire26 scp outil33, 67, 88 script NTdomainmigration.sh102, 107, 108, 111 Secure Sockets Layer. Voir SSL sécurité authentification111 Voir aussi accès; service coupe-feu; Kerberos; mots de passe sécurité authentification25 certificats SSL24, 58130 Index Server Message Block/Common Internet File System. Voir SMB/ serveur Apache mise à niveau à partir de la version 10.361 mise à niveau à partir de la version 10.418, 27 serveur d’applications Tomcat migration à partir de la version 10.370, 79 migration à partir de la version 10.437, 45 migration de 10.290, 96 serveur d’applications WebObjects migration à partir de la version 10.370, 78 migration à partir de la version 10.437, 45 migration de 10.290, 96 mise à niveau à partir de la version 10.357 mise à niveau à partir de la version 10.423 serveur de mots de passe. Voir serveur de mots de passe Open Directory serveur de mots de passe Open Directory102 serveur Leopard. Voir Mac OS X Server serveurs mises à niveau à distance21, 55 numéro de série15 test50, 83, 98 Voir aussi version serveurs distants, mise à niveau21, 55 service AFP (Apple Filing Protocol) migration à partir de la version 10.370, 78 migration à partir de la version 10.436, 44 service AFP. Voir AFP service coupe-feu migration à partir de la version 10.371, 79 migration à partir de la version 10.437, 46 service coupe-feu IP. Voir service coupe-feu service d’impression migration à partir de la version 10.371, 79 migration à partir de la version 10.437, 46 migration de Windows NT106, 108, 123 mise à niveau à partir de la version 10.353, 60 mise à niveau à partir de la version 10.419, 23 service de conversation. VoiriChat service de coupe-feu migration de 10.290, 96 service de messagerie migration à partir de la version 10.369, 77 migration à partir de la version 10.435, 43 migration de 10.289, 95 Voir aussi WebMail service de protocole SMB/CIFS (Server Message Block/Common Internet File System) migration à partir de la version 10.436, 44 migration de Windows NT105, 106, 120, 123 service DHCP (Dynamic Host Configuration Protocol) migration à partir de la vers29 migration à partir de la version 10.371, 81 migration à partir de la version 10.438, 48 migration de 10.291, 97 mise à niveau à p18 mise à niveau à partir de la version 10.352 service DNS (Domain Name System) migration à partir de la version 10.371, 80 migration à partir de la version 10.438, 47 migration de 10.291, 97 migration de Windows NT106, 110 mise à niveau à partir de la version 10.360 mise à niveau à partir de la version 10.426 service FTP (File Transfer Protocol) migration à partir de la version 10.370, 77 migration à partir de la version 10.436, 44 migration de 10.290, 95 Service iChat38, 49 service LDAP (Lightweight Directory Access Protocol) migration à partir de la version 10.436, 44 migration de Windows NT103 mise à niveau à partir de la version 10.359 mise à niveau à partir de la version 10.425, 26 service NetBoot migration à partir de la version 10.370, 78 migration à partir de la version 10.437, 44 mise à niveau à partir de la version 10.351, 59 mise à niveau à partir de la version 10.417, 26 services d’annuaire et mise à niveau25, 58 Voir aussi Open Directory services de fichiers, migration de Windows NT104, 108, 119 Voir aussi AFP; FTP; points de partage; SMB/CIFS services du domaine NT. Voir SMB/CIFS; migration de Windows NT services réseau. Voir DHCP; DNS; service coupe-feu; adresses IP; NAT; VPN service web migration à partir de la version 10.368, 75, 76 migration à partir de la version 10.434, 42 migration de 10.289, 94 mise à niveau à partir de la version 10.360 mise à niveau à partir de la version 10.426 Si24 Simple Object Access Protocol. Voir SOAP slaptest outil26, 59 SOAP (Simple Object Access Protocol) migration à partir de la version 10.370, 79 migration à partir de la version 10.437, 45 migration de 10.290, 96 T tâches, imprimer (files d’attente)23, 125, 126 tar outil67, 88 U utilisateurs autorisations105Index 131 exportation31, 32, 65, 66, 88 importation40, 73, 92 migration à partir de la version 10.371, 81 migration à partir de la version 10.438, 48 migration de 10.291, 98 migration de Windows NT100, 101, 102, 107, 108, 111, 118, 119 mise à niveau à partir de la version 10.359 ouverture de session13, 102, 104, 117 profils itinérants103, 119 root13, 118 Voir aussi groupes; dossiers de départ; comptes utilisateurs V verrouillage, fichier105 verrouillage de fichiers opportuniste (oplocks)105 verrouillage de fichiers strict105 version 10.3 migration12, 61, 63, 64, 65, 66 mise à niveau11, 51, 52, 53 version 10.4 migration12, 29, 31, 32 migration à partir de la29, 30 mise à niveau11, 17, 19 mise à niveau à partir de18 mise à niveau à partir de la27 VPN (Virtual Private Network) migration à partir de la version 10.371, 80 migration à partir de la version 10.438, 47 W WebMail migration à partir de la version 10.370, 77 migration à partir de la version 10.436, 44 Webmail migration de 10.289, 95 Windows Internet Naming Service. Voir WINS WINS (Windows Internet Naming Service)101 X Xserve, installation de mise à niveau à distance avec21, 55 Mac OS X Server Premiers contacts Pour la version 10.5 LeopardK Apple Inc. © 2007 Apple Inc. Tous droits réservés. Le propriétaire ou l’utilisateur autorisé d’un exemplaire valide du logiciel Mac OS X Server peut reproduire la présente publication à des fins d’apprentissage dudit logiciel. La présente publication ne peut être reproduite ou transmise en totalité ou en partie à des fins commerciales, telles que la vente de copies ou la prestation d’un service d’assistance payant. Tous les efforts nécessaires ont été mis en œuvre pour que les informations contenues dans ce manuel soient les plus exactes possibles. Apple Inc n’est pas responsable des erreurs d’impression ou de reproduction. Étant donné qu’Apple publie régulièrement de nouvelles versions et mises à jour de ses logiciels, les illustrations de ce document peuvent être différentes de celles qui s’affichent à l’écran. Apple 1 Infinite Loop Cupertino, CA 95014-2084 408-996-1010 www.apple.com Le logo Apple est une marque d’Apple Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option + 1) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale. Apple, le logo Apple, AirPort, AirPort Express, AirPort Extreme, Bonjour, FireWire, iCal, iPod, iSight, iTunes, Keychain, Keynote, Mac, Mac OS, Macintosh, Panther, Power Mac, QuickTime, Xcode, Xgrid et Xserve sont des marques d’Apple Inc. déposées aux États-Unis et dans d’autres pays. Apple Remote Desktop, Apple TV, Finder, iPhone, Leopard, Safari, Spotlight et Tiger sont des marques d’Apple Inc. Adobe et PostScript sont des marques d’Adobe Systems Incorporated. Intel, Intel Core et Xeon sont des marques d’Intel Corp. aux États-Unis et dans d’autres pays. PowerPC™ et le logo PowerPC™ sont des marques d’International Business Machines Corporation utilisées sous licence. UNIX est une marque déposée du groupe Open aux États-Unis et dans d’autres pays. Les autres noms de sociétés et de produits mentionnés ici sont des marques de leurs détenteurs respectifs. La mention de produits tiers n’est effectuée qu’à des fins informatives et ne constitue en aucun cas une approbation ni une recommandation. Apple n’assume aucune responsabilité vis-à-vis des performances ou de l’utilisation de ces produits. F034-4192-A/01-09-20073 Table des matières 11 Chapitre 1 : Présentation de Mac OS X Server 12 Nouveautés de Leopard Server 13 Configuration simple 15 Préférences du serveur et état du serveur 16 Serveur iCal 18 Services de groupe avec wikis et blogs 20 Répertoire 21 Podcast Producer 23 Serveur Spotlight 24 Compatibilité avec UNIX 24 Calcul 64 bits 25 Configurations de serveur 27 Fonctionnement de Leopard Server 30 Leopard Server au sein d’un groupe de travail 32 Services 35 Applications et utilitaires 36 Outils et applications avancés4 Table des matières 39 Chapitre 2 : Installation de Mac OS X Server 40 Éléments requis pour l’installation de Leopard Server 42 Installation Locale 44 Préparation d’un ordinateur administrateur 45 Installation à distance 49 Chapitre 3 : Configuration de Mac OS X Server 50 Configuration locale d’un serveur 52 Sécurité de votre serveur 52 Protection du compte administrateur système (root) 53 Configuration à distance d’un serveur 57 Chapitre 4 : Gestion de votre serveur 57 Utilisation de Préférences du serveur 59 Utilisation du widget d’état du serveur 61 Recherche de réglages dans Préférences du serveur 61 Connexion de Préférences du serveur à un serveur distant 62 Fermeture d’une connexion de Préférences du serveur 63 Sauvegarde et restauration du serveur 64 Mise à jour de Leopard Server 67 Chapitre 5 : Gestion des utilisateurs 68 À propos des comptes utilisateur 72 À propos des comptes d’administrateur 74 Ajout d’un compte utilisateurTable des matières 5 76 Importation d’utilisateurs 78 Importation automatique de groupes d’utilisateurs 80 Suppression d’un compte utilisateur 81 Modification des réglages d’un compte utilisateur 83 Modification des informations de contact d’un utilisateur 84 Contrôle de l’accès d’un utilisateur aux différents services 85 Modification de l’appartenance d’un utilisateur à des groupes 86 Modification du nom ou du mot de passe d’un utilisateur 88 Modification de la photo d’un utilisateur 89 Personnalisation du message électronique d’accueil 91 Personnalisation du message électronique d’invitation du serveur 92 Personnalisation du message électronique d’invitation du groupe 95 Chapitre 6 : Gestion des ordinateurs des utilisateurs 95 Configuration automatique des ordinateurs Mac Leopard 99 Configuration de services pour les nouveaux utilisateurs de Leopard 101 Configuration d’utilisateurs Leopard à partir d’un message d’invitation 103 Configuration d’un Mac à l’aide de l’Utilitaire d’annuaire 105 Configuration manuelle des ordinateurs des utilisateurs 107 Configuration d’une connexion VPN pour les utilisateurs Mac 109 Configuration manuelle de la connexion VPN d’un utilisateur 110 Utilisation des informations de répertoire sur les ordinateurs des utilisateurs de Leopard6 Table des matières 113 Chapitre 7 : Gestion des groupes 114 Création d’un nouveau groupe 117 Suppression d’un groupe 118 Ajout ou suppression de membres d’un groupe 120 Ajout ou suppression de membres externes d’un groupe 122 Modification des réglages de groupe 123 Modification du nom d’un groupe 123 Configuration d’un dossier de partage de fichiers d’un groupe 124 Configuration d’une liste d’envoi de groupe 124 Configuration du site web wiki d’un groupe 126 Configuration du calendrier d’un groupe 127 Configuration des archives de la liste d’envoi d’un groupe 129 Chapitre 8 : Personnalisation des services 129 Gestion du service de partage de fichiers 130 À propos du service de partage de fichiers 130 Ajout d’un dossier partagé 131 Suppression d’un dossier partagé 132 Contrôle de l’accès au dossier partagé 133 Recherche d’une adresse de partage de fichiers sur un serveur 134 Gestion du service iCal 135 À propos du service iCal 136 Gestion du service iChat 136 À propos du service iChatTable des matières 7 137 Ajout de tous les utilisateurs à la liste de contacts de chaque utilisateur 138 Conversation avec les utilisateurs de Google Talk et d’autres services XMPP 138 Enregistrement et archivage des messages instantanés 139 Gestion du service de messagerie 139 À propos du service de messagerie 140 Choix d’un serveur de relais du courrier électronique 141 À propos du filtrage des messages indésirables et des virus 142 Analyse des messages indésirables et des virus entrants 143 Gestion des services web 144 À propos des services web 145 Recherche de l’adresse du site web du serveur 145 Hébergement d’un site web conventionnel 146 Configuration du service wiki de groupe 147 Configuration du service Webmail 147 Configuration des blogs d’utilisateur 148 Gestion du service VPN 149 À propos du service VPN 150 Modification du secret partagé VPN 151 Création d’un fichier de configuration VPN 152 Modification de la plage d’adresses IP pour le VPN 154 Fourniture d’un service VPN via un routeur Internet 155 Personnalisation des services à l’aide d’applications avancées8 Table des matières 157 Chapitre 9 : Gestion des informations du serveur 157 Gestion des informations du serveur 158 Modification du numéro de série ou des détails de la licence de site 159 Modification des réglages de notification 160 Modification du nom de votre serveur 161 Modification de l’adresse IP de votre serveur 162 Connexion à un serveur de répertoire 163 Modification des réglages de coupe-feu 164 À propos du coupe-feu 165 Consultation des historiques du serveur 168 Contrôle des courbes du serveur 171 Chapitre 10 : En savoir plus 171 Utilisation de l’aide à l’écran 173 Guides d’administration de Mac OS X Server 176 Visualisation de guides PDF à l’écran 177 Impression des guides PDF 178 Obtenir des mises à jour de documentation 179 Pour obtenir des informations supplémentaires 181 Annexe A : Préparation des disques pour l’installation de Mac OS X Server 182 Effacement à l’aide du programme d’installation 183 Effacement à l’aide d’Assistant du serveur 183 Effacement à l’aide d’Utilitaire de disqueTable des matières 9 184 Partitionnement d’un disque dur 184 Création d’un ensemble RAID 185 Annexe B : Configuration d’un routeur Internet 185 Configuration du mappage des ports sur une borne d’accès AirPort Extreme 187 Configuration manuelle du mappage de ports sur un routeur Internet 189 Index1 11 1 Présentation de Mac OS X Server Mac OS X Server possède tout ce dont vous avez besoin pour fournir des services de groupe de travail et des services Internet standard. Il convient parfaitement à l’enseignement et aux petites et grandes entreprises. Mac OS X Server 10.5 Leopard combine une base UNIX éprouvée et stable, des standards ouverts et la simplicité d’utilisation de Macintosh. Il propose une vaste gamme de services prenant en charge des ordinateurs clients Macintosh, Windows et UNIX via un réseau. Avec Leopard Server, les petites entreprises et les petits groupes de travail qui n’ont pas de service informatique peuvent profiter au mieux des avantages d’un serveur. Même un utilisateur sans connaissances techniques est en mesure de configurer et de gérer Leopard Server pour un groupe. Les autres utilisateurs du groupe peuvent configurer automatiquement leur Mac pour bénéficier des services de Leopard Server. Leopard Server dispose également d’options de configuration et d’outils de gestion avancés destinés aux informaticiens.12 Chapitre 1 Présentation de Mac OS X Server Nouveautés de Leopard Server Mac OS X Server 10.5 Leopard propose d’importantes améliorations dans plusieurs domaines clés :  Configuration simple  Préférences du serveur et état du serveur  Serveur iCal  Services de groupe avec wikis et blogs  Application Répertoire  Podcast Producer  Serveur Spotlight  Compatibilité avec UNIX et calcul 64 bits Les performances et l’extensibilité de Leopard Server ont également été améliorées de manière significative en ce qui concerne des services clés tels que le partage de fichiers et les services de messagerie. Si vous êtes un administrateur de serveur expérimenté et que vous souhaitez configurer un serveur d’entreprise ou que vous avez d’autres besoins complexes, vous découvrirez les améliorations apportées dans les domaines du partage de fichiers, des technologies web, de la diffusion de données multimédias, de la messagerie instantanée, du service de messagerie, de l’authentification liées aux répertoires et aux réseaux, de la création d’images de système et de la gestion de clients. Admin Serveur, Gestionnaire de groupe de travail et Utilitaire d’images de système ont tous été améliorés. Pour en savoir plus, consultez Administration du serveur ainsi que les autres guides d’administration avancés décrits dans « Guides d’administration de Mac OS X Server » à la page 173.Chapitre 1 Présentation de Mac OS X Server 13 Configuration simple Mac OS X Server n’a jamais été aussi simple à utiliser. Assistant du serveur élimine les difficultés liées à la configuration d’un serveur. Il vous guide tout au long du processus d’installation et de la configuration des services de base. Il configure automatiquement votre borne d’accès AirPort Extreme (802.11n) et analyse le réseau afin de vérifier l’état des connexions au réseau local et à Internet. En quelques clics, Leopard Server prépare le partage de fichiers, le courrier électronique, les sites web de groupe, la messagerie instantanée, les calendriers individuels, l’accès à distance et les fonctions de sauvegarde. 14 Chapitre 1 Présentation de Mac OS X Server Les utilisateurs peuvent ainsi configurer rapidement et facilement des ordinateurs Mac équipés de Mac OS X Leopard en vue d’obtenir des services du serveur. Il suffit de cliquer sur un bouton présent dans un message électronique ou d’ouvrir l’application Utilitaire d’annuaire pour ouvrir un assistant qui se connecte au serveur et configure les applications afin qu’elles utilisent ses services. En quelques instants, Mail, iChat, iCal et une connexion réseau VPN sont prêts à être utilisés. Chaque utilisateur d’iChat voit s’afficher les autres utilisateurs dans sa liste de contacts iChat. Les utilisateurs de Mail sont prêts à envoyer du courrier aux personnes de leur groupe. Carnet d’adresses, Répertoire et Mail sont prêts à consulter les coordonnées de contacts partagées dans le répertoire du serveur. Toute imprimante connectée au port USB du serveur est automatiquement mise à la disposition des utilisateurs.Chapitre 1 Présentation de Mac OS X Server 15 Préférences du serveur et état du serveur Leopard Server est encore plus simple à gérer. Vous souhaitez modifier certains éléments ? Les préférences du serveur permettent de gérer rapidement les utilisateurs, les groupes, les services et les informations du système. Vous pouvez soit utiliser les préférences du serveur directement sur le serveur, soit utiliser un autre Mac pour gérer votre serveur via le réseau. Retrouvez le réglage qui vous intéresse sans connaître son emplacement exact16 Chapitre 1 Présentation de Mac OS X Server Pour contrôler les performances et les services du serveur, vous pouvez vous référer aux graphiques et aux statistiques proposés par le widget d’état du serveur disponible dans le Dashboard. État du serveur fonctionne en réseau, ce qui vous permet de surveiller le serveur depuis un autre Mac. Serveur iCal Le serveur iCal facilite le partage de calendriers et la planification des rendez-vous ; il permet également de coordonner des événements au sein d’un groupe de travail, d’une petite entreprise ou d’une grande organisation. Plusieurs collègues peuvent vérifier leurs disponibilités respectives, proposer et accepter des réunions, réserver des projecteurs et bien plus encore. Le serveur iCal envoie des invitations avec agendas ou listes de tâches et gère les réponses. Vérifiez le processeur, le réseau ou l’utilisation des disques Vérifiez l’état du serviceChapitre 1 Présentation de Mac OS X Server 17 Le serveur iCal s’intègre aux applications de calendrier avancées telles qu’iCal 3 de Leopard, ainsi qu’aux applications de calendrier de tierce partie prenant en charge le protocole standard CalDAV.18 Chapitre 1 Présentation de Mac OS X Server Services de groupe avec wikis et blogs Leopard Server comprend un service wiki qui permet aux groupes de créer et de diffuser facilement des informations via leurs propres sites web intranet partagés. Tous les membres d’un groupe peuvent aisément visualiser, rechercher et modifier du contenu wiki à partir de leur navigateur web. En utilisant les modèles proposés ou en créant leurs propres modèles, ils peuvent ajouter, supprimer, modifier et mettre en forme le contenu de la manière la plus naturelle possible, même sans connaître les balises HTML ou une syntaxe spécifique. Ils peuvent en quelques clics, joindre des fichiers et des images, publier des podcasts, assigner des mots-clés et créer des liens vers d’autres pages wiki ou d’autres sites web. Il leur est également possible de visualiser l’intégralité de l’historique des changements wiki et de rétablir les anciennes versions des pages. Ils peuvent en outre visualiser des calendriers partagés, des blogs et des archives de listes d’envoi et y contribuer.Chapitre 1 Présentation de Mac OS X Server 19 Chaque utilisateur peut avoir son propre blog lui permettant de tenir ses collègues au courant de ses différents projets ou des fichiers sur lesquels il travaille et de publier des images ou des podcasts. Un blog personnel constitue l’emplacement idéal pour proposer des informations destinées à votre groupe ou simplement pour conserver des références.20 Chapitre 1 Présentation de Mac OS X Server Répertoire L’application Répertoire permet aux utilisateurs d’accéder à des informations partagées sur les personnes, les groupes, les emplacements et les ressources de l’organisation. Les utilisateurs peuvent partager des contacts, ajouter des groupes, configurer des services de groupe et gérer les coordonnées de leurs propres contacts.Chapitre 1 Présentation de Mac OS X Server 21 Podcast Producer Une caméra vidéo, un Mac et Leopard Server, c’est tout ce dont vous avez besoin pour produire des podcasts de cours, de formation ou d’autres projets audio et vidéo. Podcast Producer automatise la capture, l’encodage et la distribution vidéo et audio. 22 Chapitre 1 Présentation de Mac OS X Server L’application Transfert de Podcast installée sur tous les ordinateurs Mac équipés de Leopard permet aux utilisateurs d’enregistrer des fichiers audio et vidéo de haute qualité à partir d’une caméra FireWire, d’un micro USB, d’iSight ou de tout autre périphérique compatible connecté à un Mac local ou distant. Transfert de Podcast envoie automatiquement l’enregistrement terminé à Podcast Producer sur Leopard Server ; ce dernier l’encode et le publie en se basant sur votre sélection de processus dans Transfert de Podcast. Podcast Producer peut ajouter des effets tels que des filigranes, des titres et des vidéos de présentation avant de publier le podcast sur une page web, un blog, iTunes, iTunes U, QuickTime Streaming Server, un iPod, Apple TV, iPhone ou un autre type de téléphone portable. Le service de messagerie de Leopard Server peut même vous prévenir lorsque le travail est terminé. Outre l’enregistrement audio et vidéo, Transfert de Podcast peut enregistrer ce qui est affiché à l’écran (une présentation Keynote par exemple) ainsi que le son provenant d’une source locale ou distante. Vous pouvez de même utiliser Transfert de Podcast pour partager des séquences QuickTime avec d’autres personnes. Toute personne disposant d’une connexion à Internet et d’une autorisation d’utilisation de Transfert de Podcast peut lancer le processus. Il suffit pour cela d’ouvrir une session Transfert de Podcast, de sélectionner quelques options et de cliquer sur un bouton pour commencer à enregistrer. Pour terminer, cliquez sur un autre bouton pour arrêter l’enregistrement, saisissez un titre et une description, puis cliquez sur un dernier bouton pour lancer le processus de publication de podcast. Podcast Producer s’occupe du reste.Chapitre 1 Présentation de Mac OS X Server 23 Podcast Producer utilise automatiquement le service Xgrid 2 de votre serveur pour optimiser les performances d’encodage de podcast. Xgrid répartit via le réseau les tâches d’encodage aux ordinateurs Mac dont le système Leopard est configuré pour partager leur capacité de traitement inutilisée. Vous pouvez produire des podcasts supplémentaires en ajoutant des ordinateurs Mac ; Xgrid s’adapte automatiquement. Serveur Spotlight Spotlight simplifie la recherche de contenu sur un Mac et, désormais, sur le réseau grâce à Leopard Server. Le serveur Spotlight permet aux utilisateurs Mac de trouver rapidement et facilement des documents, des fichiers et d’autres contenus stockés sur leur serveur. Sa méthode de recherche est plus intelligente, car il ne se limite pas à rechercher les noms de fichier, il peut également explorer le contenu des volumes réseau montés. Vous n’avez pas besoin de vous rappeler du nom donné à un document, à un projet ou à un fichier partagé particulier. Utilisez Coup d’œil pour visualiser, lire et regarder les fichiers trouvés sans les ouvrir. L’indexation des contenus est effectuée de manière automatique et transparente sur le serveur. Il n’est pas nécessaire de configurer le serveur ou les ordinateurs Mac des utilisateurs. Pour plus de sécurité, le serveur Spotlight utilise le système Mac OS X Server d’autorisation et de contrôle de l’accès aux fichiers. La recherche effectuée par un utilisateur se limite aux éléments auxquels il a accès, ce qui permet de protéger de manière sûre la confidentialité de certaines informations. Ainsi, tous les membres d’un groupe peuvent stocker des fichiers sur le serveur. Ils peuvent facilement retrouver des fichiers partagés, mais les personnes qui ne font pas partie du groupe n’y ont pas accès. 24 Chapitre 1 Présentation de Mac OS X Server Compatibilité avec UNIX Leopard Server est un produit Open Brand UNIX 03, certifié conforme aux spécifications SUSv3 et POSIX 1003.1 pour les utilitaires Shell, les fils d’exécution et l’API C. Leopard Server peut compiler et exécuter tout votre code compatible UNIX 03, ce qui permet de le déployer dans des environnements exigeant une compatibilité totale. Mac OS X Server est également entièrement compatible avec votre logiciel de serveur et vos applications. Calcul 64 bits Pour la première fois sur Leopard Server, des composants clés de logiciel serveur peuvent exploiter le calcul 64 bits pour optimiser les performances et la puissance de traitement et pour manipuler des ensembles de données plus volumineux. Leopard Server exécute les applications 64 bits parallèlement aux applications 32 bits en assurant leur optimisation.Chapitre 1 Présentation de Mac OS X Server 25 Configurations de serveur Leopard Server dispose de plusieurs options pour configurer votre serveur en fonction de vos besoins particuliers. Le tableau de la page suivante répertorie quelques-unes des raisons pour choisir chacune des configurations suivantes :  Standard : configuration simplifiée idéale pour le premier serveur ou l’unique serveur d’une petite organisation.  Groupe de travail : configuration facile à utiliser idéale pour un groupe de travail dans une organisation avec un serveur de répertoire existant.  Avancée : configuration flexible idéale pour les déploiements hautement personnalisés et avancés. Vous pouvez transformer une configuration standard en configuration de groupe de travail en connectant le serveur à un serveur de répertoire de votre organisation. De la même manière, vous pouvez passer d’une configuration de groupe de travail à une configuration standard en déconnectant le serveur du serveur de répertoire. Il est également possible de convertir en configuration avancée une configuration standard ou une configuration de groupe de travail (le contraire étant impossible, sauf si vous réinstallez Leopard Server). Pour en savoir plus sur le changement de configuration, consultez les rubriques « Connexion à un serveur de répertoire » à la page 162 et Administration du serveur (description dans « Guides d’administration de Mac OS X Server » à la page 173).26 Chapitre 1 Présentation de Mac OS X Server Raison du choix Standard Groupe de travail Avancée Configurer le premier serveur ou l’unique serveur d’une petite organisation. % Configurer automatiquement tous les services. % Configurer uniquement certains services automatiquement. % Utiliser des comptes utilisateur existants présents dans le serveur de répertoire de votre organisation. % Utiliser une seule application simple (Préférences du serveur) pour gérer les réglages fondamentaux des comptes utilisateur, des groupes et des services. % % Configurer automatiquement les ordinateurs Mac équipés de Leopard pour qu’ils utilisent le serveur. % % Aucune expérience d’administration de serveur n’est requise. % % Contrôle total de centaines de réglages de configuration de service pour plusieurs serveurs. % Gérer des comptes utilisateur, des dossiers de départ et des préférences pour des centaines ou même des milliers d’utilisateurs, de groupes et d’ordinateurs. % Configurer des dossiers de départ réseau et des comptes utilisateur mobiles. %Chapitre 1 Présentation de Mac OS X Server 27 Fonctionnement de Leopard Server L’illustration suivante présente une configuration standard de Mac OS X Server dans une petite organisation. Le serveur est connecté à un réseau local et à quelques ordinateurs d’utilisateurs. Les autres ordinateurs d’utilisateurs se connectent sans fil au réseau local via une borne d’accès AirPort Extreme. AirPort Extreme se connecte à Internet via un modem DSL ou un modem câble et partage sa connexion Internet avec le serveur et les ordinateurs des utilisateurs. Le serveur et les ordinateurs des utilisateurs obtiennent leur adresse réseau via le serveur DHCP d’AirPort Extreme. Ils bénéficient du service de noms DNS offert le fournisseur d’accès à Internet. Le serveur fournit des comptes utilisateur et des comptes de groupe, des dossiers partagés, des calendriers partagés, une messagerie instantanée et un site web wiki contenant des blogs. Comme le fournisseur d’accès à Internet ne fournit pas un nombre suffisant d’adresses électroniques pour chaque personne de l’organisation, c’est le serveur qui fournit les adresses électroniques et le service de messagerie. Utiliser de puissantes applications, telles qu’Admin Serveur et Gestionnaire de groupe de travail, ou des outils à ligne de commande pour configurer des services et gérer des clients. % Enregistrer des données de configuration en vue de la configuration automatique de plusieurs serveurs. % Mettre à niveau des serveurs existants. % Raison du choix Standard Groupe de travail Avancée28 Chapitre 1 Présentation de Mac OS X Server Certains utilisateurs peuvent consulter leur courrier électronique à distance, mais ne disposent pas d’un ordinateur portable à emporter chez eux ou lors de leurs déplacements. Ils peuvent se connecter au service WebMail du serveur depuis leur ordinateur fixe personnel ou tout ordinateur équipé d’un navigateur web. D’autres utilisateurs disposent d’un ordinateur portable et d’un ordinateur fixe personnel configurés pour se connecter au VPN du serveur via Internet. Cela leur permet d’accéder à distance et de manière sécurisée à tous les services fournis par le serveur sur le réseau local lorsqu’ils travaillent chez eux ou lorsqu’ils sont en déplacement.Chapitre 1 Présentation de Mac OS X Server 29 Mac OS X Server DSL ou modem câble Internet Ordinateur Mac OS X VPN Serveur DNS ISP Ordinateurs Mac OS X AirPort Extreme30 Chapitre 1 Présentation de Mac OS X Server Leopard Server au sein d’un groupe de travail L’illustration ci-dessous décrit une configuration de groupe de travail de Mac OS X Server utilisée par tout un service d’une grande organisation. Cette organisation dispose d’un service informatique qui fournit le service DHCP d’affectation d’adresses de réseau, un service de noms DNS, un service de messagerie, un accès à Internet et un VPN. Comme toutes les personnes du service disposent déjà d’un compte utilisateur fourni par le serveur Open Directory de l’organisation, leurs comptes utilisateur ont été importés dans le serveur du groupe de travail. Il leur suffit alors d’utiliser leur nom d’utilisateur et leur mot de passe habituels pour s’identifier auprès des services proposés par le serveur du groupe de travail. Ces services sont automatiquement configurés pour utiliser l’authentification Kerberos du serveur Open Directory, ce qui permet aux utilisateurs de se connecter une seule fois par session pour l’ensemble des services de groupe de travail. Le serveur de groupe de travail fournit des services de calendrier et de messagerie instantanée compatibles avec les applications iCal et iChat de Mac OS X. Il fournit également des dossiers partagés et de sites web wiki aux groupes du service. Certains de ces groupes incluent des personnes externes au service. Les membres externes du groupe utilisent leur compte utilisateur pour accéder au dossier partagé, au calendrier, au wiki et au blog du groupe. Le service compte quelques utilisateurs Windows qui utilisent Internet Explorer et Safari pour accéder au wiki, au calendrier et au blog de leur groupe. Les dossiers partagés se présentent sous forme d’unités mappées dans les emplacements réseau correspondants. Les PC de ces utilisateurs Windows sont configurés pour utiliser le service de messagerie instantanée Jabber du serveur de groupe de travail.Chapitre 1 Présentation de Mac OS X Server 31 Serveurs de toute l’organisation Organisation Groupe de travail Mac OS X Server AirPort Extreme Ordinateur Mac OS X de l’administrateur Ordinateurs Windows Ordinateurs Mac OS X Internet Intranet32 Chapitre 1 Présentation de Mac OS X Server Services Leopard Server fournit les services et les fonctionnalités de système figurant dans le tableau ci-dessous. Les services et les informations système sont automatiquement configurés pour une configuration standard ou de groupe de travail à l’aide des informations que vous avez fournies lors de la configuration initiale du serveur. Après avoir effectué une configuration standard ou de groupe de travail, vous pouvez modifier les réglages de service et de système. Vous pouvez désactiver les services inutiles (ceux dont vous disposez déjà par exemple). Vous n’avez, par exemple, pas besoin du service de messagerie d’une configuration standard si vous souhaitez utiliser le service de messagerie d’un fournisseur d’accès à Internet. De même, si personne ne doit accéder à votre serveur à partir de son domicile ou dans le cadre d’un déplacement, désactivez le service VPN. Une configuration de groupe de travail ne doit pas nécessairement fournir le service de messagerie ou le service VPN si ces services sont déjà fournis par votre organisation. Pour en savoir plus sur les réglages de service et de système, consultez le chapitre 4, « Gestion de votre serveur », le chapitre 8, « Personnalisation des services », et le chapitre 9, « Gestion des informations du serveur ». Si vous sélectionnez une configuration avancée lors de la configuration initiale, les services ne sont pas configurés de façon automatique. Vous devez utiliser des applications d’administration avancées, telles qu’Admin Serveur et Gestionnaire de groupe de travail ou des outils de ligne de commande, pour configurer des réglages avancés pour les services devant être fournis par le serveur. Pour en savoir plus sur la configuration avancée, consultez Administration du serveur ainsi que les autres guides d’administration avancés décrits dans « Guides d’administration de Mac OS X Server » à la page 173.Chapitre 1 Présentation de Mac OS X Server 33 Service Standard Groupe de travail Avancée Partage de fichiers (protocoles AFP et SMB) Inclus Facultatif Facultatif Partage de fichiers (protocoles FTP et NFS) Inutilisé Inutilisé Facultatif Partage d’imprimantes (imprimante USB ou FireWire directement connectée) Automatique Automatique Inutilisé Impression Inutilisé Inutilisé Facultatif iCal (partage de calendriers, planification d’événements) Inclus Facultatif Facultatif iChat (messagerie instantanée) Inclus Facultatif Facultatif Courrier électronique avec filtrage spam et antivirus Inclus Facultatif Facultatif Web (wikis, blogs, WebMail) Inclus Facultatif Facultatif VPN (accès à distance sécurisé) Facultatif Facultatif Facultatif Passerelle Internet (NAT, DNS) Facultatif Facultatif Facultatif Sauvegarde du serveur via Time Machine Facultatif Facultatif Inutilisé Open Directory (comptes utilisateur et autres données) Automatique Automatique Facultatif Coupe-feu d’application Facultatif Facultatif Inutilisé Coupe-feu IP avec coupe-feu adaptatif en option Inutilisé Inutilisé Facultatif Podcast Producer Inutilisé Inutilisé Facultatif Gestion totale des utilisateurs et des groupes de travail Inutilisé Inutilisé Facultatif Xgrid (constitution de grappes de calcul) Inutilisé Inutilisé Facultatif DHCP, DNS, NAT Automatique Automatique Facultatif RADIUS Inutilisé Inutilisé Facultatif34 Chapitre 1 Présentation de Mac OS X Server NetBoot et NetInstall (création d’image système) Inutilisé Inutilisé Facultatif Spotlight (recherche) Automatique Automatique Automatique QuickTime Streaming Inutilisé Inutilisé Facultatif Mise à jour de logiciels Inutilisé Inutilisé Facultatif Gestion à distance Inclus Inclus Inclus Ouverture de session à distance (ssh) Inclus Inclus Inclus Service Standard Groupe de travail AvancéeChapitre 1 Présentation de Mac OS X Server 35 Applications et utilitaires Une fois Leopard Server configuré, vous pouvez modifier les réglages des services et exécuter d’autres tâches d’administration de serveur au moyen des applications décrites ci-après. Vous pouvez également utiliser l’application Répertoire, destinée aux utilisateurs non administrateurs, pour gérer les informations partagées dans le répertoire du serveur. Répertoire est installé sur tous les ordinateurs Mac équipés de Leopard, ainsi que sur votre serveur. Pour plus d’informations concernant l’utilisation de l’application Répertoire ou de l’Utilitaire d’annuaire, puis utilisez le menu Aide. Pour en savoir plus sur l’utilisation des autres applications, consultez les autres chapitres. Applications réservées aux administrateurs de serveurs standard et de groupe de travail Répertoire (sous /Applications/Utilitaires/) Permet aux utilisateurs d’accéder aux informations partagées concernant les personnes, les groupes, les emplacements et les ressources. Les utilisateurs peuvent partager des contacts, ajouter des groupes, configurer des services de groupe et gérer les coordonnées de leurs contacts. Utilitaire d’annuaire (sous /Applications/Utilitaires/) Connecte votre serveur à un serveur de répertoire de votre organisation. Assistant du serveur (sous /Applications/Server/) Installe ou configure Mac OS X Server sur un ordinateur distant. Préférences serveur (sous /Applications/Server/) Permet de gérer les utilisateurs et les groupes, de personnaliser les services et les informations système et, enfin, de surveiller l’activité du serveur. Widget d’état du serveur pour Dashboard Permet de surveiller l’activité du serveur depuis n’importe quel Mac équipé de Leopard.36 Chapitre 1 Présentation de Mac OS X Server Outils et applications avancés Si vous effectuez une configuration avancée de Leopard Server, l’administration se fait via les applications et les outils ci-dessous. Pour en savoir plus, consultez Administration du serveur ainsi que les autres guides d’administration avancés décrits dans « Guides d’administration de Mac OS X Server » à la page 173. Important : si vous disposez d’applications et d’outils d’administration provenant de Mac OS X Server 10.4 Tiger ou antérieur, ne les utilisez pas avec Leopard Server. Applications et outils réservés aux administrateurs de serveur avancés Utilitaire d’annuaire (sous /Applications/Utilitaires/) Connecte le serveur à un serveur de répertoire de votre organisation. Transfert de Podcast (sous /Applications/Utilitaires/) Permet aux utilisateurs d’enregistrer des fichiers audio et vidéo de haute qualité à partir d’une caméra locale ou distante, de capturer ce qui s’affiche à l’écran ou de télécharger des fichiers QuickTime dans Podcast Producer afin de les encoder et de les distribuer. QuickTime Broadcaster (sous /Applications/) Capture des fichiers audio et vidéo en temps réel et fonctionne de manière transparente avec QuickTime Streaming Server pour obtenir une diffusion en réseau de haute qualité. RAID Admin (sous /Applications/Server/) Configure et surveille le matériel Xserve RAID. Admin Serveur (sous /Applications/Server/) Configure des services, gère des points de partage de fichiers, modifie la configuration des services et personnalise les réglages du serveur. Surveille l’activité du serveur et affiche les historiques de maintenance détaillés.Chapitre 1 Présentation de Mac OS X Server 37 Assistant du serveur (sous /Applications/Server/) Installe ou configure Mac OS X Server sur un ordinateur distant. Contrôle de serveur (sous /Applications/Server/) Surveille et gère à distance un ou plusieurs systèmes Xserve. Utilitaire d’images de système (sous /Applications/Server/) Crée et personnalise des images NetBoot et NetInstall pour les ordinateurs Mac OS X et Mac OS X Server. Gestionnaire de groupe de travail (sous /Applications/Server/) Gère les utilisateurs, les groupes, les ordinateurs et les groupes d’ordinateurs dans le cadre de déploiements de serveur avancés. Gère les préférences des utilisateurs de Mac OS X. Xgrid Admin (sous /Applications/Server/) Gère les grappes de serveurs à distance et surveille l’activité des contrôleurs, des agents, ainsi que l’état des tâches sur la grille de calcul. Utilitaires de ligne de commande Utilise des outils UNIX pour installer et configurer les logiciels de serveur, administrer les services, gérer les utilisateurs, etc. Applications et outils réservés aux administrateurs de serveur avancés2 39 2 Installation de Mac OS X Server Utilisez le programme d’installation pour installer Leopard Server localement ou Assistant du serveur pour l’installer à distance. Avant de commencer, vous devez :  Vous assurer que le serveur cible est conforme à la configuration requise.  Connecter le serveur cible à votre réseau Ethernet.  Utiliser Feuille d’opération d’installation et de configuration pour rassembler les informations nécessaires (ce document se trouve dans le dossier Documentation du disque d’installation de Mac OS X Server).  Installez Mac OS X Server 10.5 Leopard via l’une des méthodes suivantes :  Procédez à une installation locale si le serveur cible dispose d’un moniteur.  Procédez à une installation à distance si le serveur cible n’est pas facilement accessible ou s’il n’a pas de moniteur. Pour en savoir plus sur l’installation de Leopard Server sur plusieurs serveurs, les installations automatisées et les autres méthodes d’installation avancées, consultez Administration du serveur. Pour en savoir plus sur la mise à niveau ou la migration vers Leopard Server depuis une version antérieure de Mac OS X Server, consultez Mise à niveau et migration. Ces guides avancés sont décrits dans « Guides d’administration de Mac OS X Server » à la page 173.40 Chapitre 2 Installation de Mac OS X Server Éléments requis pour l’installation de Leopard Server Pour installer Leopard Server, vous avez besoin d’un ordinateur de bureau Macintosh ou d’un serveur disposant des éléments suivants :  Un processeur Intel ou un processeur PowerPC G5 ou G4 (867 MHz ou plus rapide).  Au moins 1 Go de mémoire vive (RAM).  20 Go minimum d’espace disque disponible.  Une connexion active à un réseau Ethernet sécurisé. Un serveur de groupe de travail ou standard requiert beaucoup plus d’espace disque, une grande capacité de disque dur externe, par exemple, si vous voulez effectuer des sauvegardes du serveur à l’aide de Time Machine. (La sauvegarde des données d’un serveur via Time Machine n’est pas prise en charge pour les serveurs avancés.) Un lecteur DVD intégré est pratique, mais vous pouvez le remplacer par un lecteur DVD FireWire externe ou utiliser un Mac équipé d’un lecteur DVD et fonctionnant en mode disque cible. Le moniteur est optionnel. Vous pouvez installer et administrer Mac OS X Server sur un ordinateur dépourvu de moniteur à partir d’un ordinateur administrateur. Pour en savoir plus, consultez la rubrique « Préparation d’un ordinateur administrateur » à la page 44. Certaines opérations d’encodage nécessitent une carte graphique compatible. Il n’est pas nécessaire de placer votre serveur dans un endroit où il sera constamment accessible. Vous pouvez utiliser n’importe quel Mac configuré en tant qu’ordinateur administrateur pour effectuer des tâches administratives.Chapitre 2 Installation de Mac OS X Server 41 À moins que vous ne disposiez d’une licence de site, il vous faut un numéro de série unique pour chaque serveur. Vous devez utiliser un numéro de série Mac OS X Server 10.5 Leopard (qui commence par XSVR-105). Installation sécurisée de Mac OS X Server Lorsque vous démarrez un ordinateur à partir du disque d’installation de Mac OS X Server, le service d’ouverture de session à distance ssh et le service de partage d’écran VNC démarrent automatiquement pour vous permettre d’exécuter l’installation à distance. Important : assurez-vous que le réseau est sécurisé avant d’installer ou de réinstaller Mac OS X Server. En effet, SSH et VNC donnent à d’autres personnes l’accès à l’ordinateur par le réseau. Par exemple, configurez votre réseau local de façon à ce que seuls des utilisateurs dignes de confiance y aient accès. Évitez d’utiliser les prises Ethernet dans les lieux publics. Si vous possédez une borne d’accès AirPort ou tout autre point d’accès sans fil, configurez-le de façon à ce qu’il utilise l’authentification WEP-2 ainsi qu’un mot de passe difficile à deviner. Il est recommandé d’attribuer un nom que vous seul connaissez au réseau sans fil. De la même manière, efforcez-vous de ne pas révéler le numéro de série maté- riel car celui-ci est utilisé comme mot de passe dans le cadre de l’installation et de la configuration à distance.42 Chapitre 2 Installation de Mac OS X Server Installation Locale Vous pouvez installer Mac OS X Server directement sur le serveur cible en démarrant le serveur à partir du disque d’installation de Mac OS X Server. Le programme d’installation vous guide tout au long du processus d’installation interactif. Le serveur cible doit disposer d’un moniteur afin que vous puissiez communiquer avec le programme d’installation. Vous pouvez effectuer :  Une nouvelle installation de Mac OS X Server sur un disque sur lequel Mac OS X Server ou Mac OS X n’est pas installé.  Une installation spéciale, qui consiste à installer Mac OS X Server après avoir effacé et formaté un disque cible. Pour procéder à une installation locale de Mac OS X Server : 1 Si vous envisagez d’effacer ou de partitionner le disque cible, assurez-vous que vous possédez une copie de sauvegarde du disque. 2 Vérifiez que l’ordinateur dispose d’une connexion active à un réseau Ethernet sécurisé. Cette connexion au réseau est nécessaire pour configurer le domaine Open Directory du serveur. Programme d’installation Serveur cibleChapitre 2 Installation de Mac OS X Server 43 3 Démarrez l’ordinateur, ouvrez une session si nécessaire et insérez le disque d’installation de Mac OS X Server dans le lecteur DVD. 4 Ouvrez l’application d’installation de Mac OS X Server et cliquez sur le bouton Redémarrer. L’application se trouve dans la fenêtre Disque d’installation de Mac OS X Server. Si, dans l’angle inférieur droit de la fenêtre de l’application, un bouton Installer apparaît au lieu d’un bouton Redémarrer, cliquez sur Installer et suivez les étapes du programme d’installation (ignorez les étapes 5 à 8 ci-dessous). Lorsque l’installation est terminée, redé- marrez le serveur. Assistant du serveur s’ouvre afin que vous puissiez configurer le serveur. Pour en savoir plus, consultez le chapitre 3, « Configuration de Mac OS X Server ». 5 Après le redémarrage de l’ordinateur, choisissez la langue que vous souhaitez utiliser sur le serveur, puis cliquez sur le bouton représentant une flèche. 6 Effectuez les étapes du programme d’installation en suivant les instructions à l’écran. 7 Lorsque la sous-fenêtre Sélectionner une destination apparaît, choisissez un disque ou un volume (partition) cible en vous assurant que celui-ci se trouve à l’état adéquat. Si vous souhaitez effacer le disque cible, cliquez sur Options, sélectionnez Effacer et Installer, choisissez un format, puis cliquez sur OK. Vous pouvez également choisir Utilitaires > Utilitaire de disque pour effacer le disque cible en utilisant un format moins courant, partitionner le disque dur du serveur ou créer un ensemble RAID. Pour plus d’informations, consultez l’annexe A, « Préparation des disques pour l’installation de Mac OS X Server ». 8 Une fois l’installation terminée, l’ordinateur redémarre et Assistant du serveur s’ouvre pour vous permettre de configurer le serveur. Pour en savoir plus, consultez le chapitre 3, « Configuration de Mac OS X Server ».44 Chapitre 2 Installation de Mac OS X Server Préparation d’un ordinateur administrateur Vous pouvez utiliser un ordinateur administrateur pour installer Mac OS X Server sur un autre ordinateur via le réseau. Comme illustré ci-dessous, démarrez le serveur à l’aide du disque d’installation de Mac OS X Server, puis utilisez l’application Assistant du serveur pour exécuter l’installation à distance. Il n’est pas nécessaire que le serveur cible soit équipé d’un moniteur. Il est également possible d’utiliser un ordinateur administrateur pour configurer et gérer Mac OS X Server à distance. Pour en savoir plus, consultez « Configuration à distance d’un serveur » à la page 53 et « Connexion de Préférences du serveur à un serveur distant » à la page 61. Pour transformer un ordinateur Mac OS X en ordinateur administrateur, vous devez installer un logiciel d’administration de serveur dessus. Si vous disposez d’un autre serveur sur lequel Leopard Server est déjà configuré, vous pouvez également l’utiliser en tant qu’ordinateur administrateur. Ordinateur de l’administrateur Serveur cible avec lecteur DVD Assistant serveurChapitre 2 Installation de Mac OS X Server 45 Pour configurer un ordinateur administrateur : 1 Assurez-vous que la version 10.5 Leopard de Mac OS X est installée sur l’ordinateur Mac OS X. 2 Insérez le disque Outils d’administration. 3 Ouvrez le dossier du programme d’installation. 4 Double-cliquez sur ServerAdministrationSoftware.mpkg pour ouvrir le programme d’installation et suivez les instructions à l’écran. Installation à distance Si vous utilisez Assistant du serveur sur un ordinateur administrateur, il est possible d’installer Mac OS X Server sur un autre ordinateur via le réseau. S’il n’est pas nécessaire que l’ordinateur sur lequel vous procédez à l’installation dispose d’un moniteur, il doit néanmoins être équipé d’un lecteur DVD pour le disque d’installation de Mac OS X Server. Si l’ordinateur ne dispose pas d’un lecteur DVD intégré, vous pouvez le remplacer par un lecteur DVD FireWire externe ou utiliser un ordinateur Mac équipé d’un lecteur DVD et fonctionnant en mode disque cible. Vous pouvez effectuer :  Une nouvelle installation de Mac OS X Server sur un disque sur lequel Mac OS X Server ou Mac OS X n’est pas installé.  Une installation spéciale qui consiste à installer Mac OS X Server après avoir effacé et formaté un disque cible.46 Chapitre 2 Installation de Mac OS X Server Pour procéder à une installation à distance de Mac OS X Server : 1 Si vous envisagez d’effacer le disque ou la partition cible , assurez-vous que vous possédez une copie de sauvegarde et utilisez éventuellement Utilitaire de disque pour pré- parer le disque cible. Si vous ne devez effacer le disque cible qu’en utilisant le format le plus courant, Mac OS Étendu (journalisé), il n’est pas nécessaire d’utiliser Utilitaire de disque. Utilitaire de disque permet d’effacer le disque cible en utilisant d’autres formats, de partitionner le disque dur du serveur ou de créer un ensemble RAID. Pour en savoir plus sur l’utilisation d’Utilitaire de disque pour ces tâches, consultez l’annexe A, « Préparation des disques pour l’installation de Mac OS X Server ». 2 Démarrez le serveur cible à partir du disque d’installation de Mac OS X Server. Si le serveur cible est équipé d’un lecteur DVD intégré, insérez le disque, puis redémarrez l’ordinateur tout en maintenant enfoncée la touche C. Relâchez la touche lorsque le logo Apple s’affiche. Si le serveur cible est équipé d’un lecteur DVD FireWire externe, redémarrez l’ordinateur tout en maintenant la touche Option enfoncée, sélectionnez l’icône du disque d’installation de Mac OS X Server, puis cliquez sur le bouton représentant une flèche. 3 Sur un ordinateur administrateur, ouvrez Assistant du serveur, sélectionnez « Installer Mac OS X Server sur un ordinateur distant » et cliquez sur Continuer. Assistant du serveur est situé dans /Applications/Server/. Vous pouvez utiliser Assistant du serveur sans compte administrateur. 4 Dans la sous-fenêtre Destination, identifiez le serveur cible et sélectionnez-le dans la liste. Vous pouvez reconnaître un serveur par son adresse iP, son nom DNS ou son adresse MAC (également appelée adresse Ethernet ou adresse matérielle).Chapitre 2 Installation de Mac OS X Server 47 Pour les serveurs trouvés par Assistant du serveur sur le réseau local (sous-réseau IP), l’adresse IP peut être automatiquement attribuée par un serveur DHCP sur le réseau. S’il n’existe aucun serveur DHCP, le serveur cible utilise une adresse de type 169.254.xxx.xxx unique parmi les serveurs du réseau local. Vous pouvez modifier l’adresse IP ultérieurement, lors de la configuration du serveur. Si le serveur qui vous intéresse n’est pas dans la liste, vous pouvez cliquer sur Actualiser, afin qu’Assistant du serveur recherche à nouveau les serveurs prêts à être installés sur votre réseau local. Si le serveur qui vous intéresse se trouve sur un autre réseau local, choisissez « Serveur à l’adresse IP » dans le menu local Installer sur, puis saisissez une adresse IP au format IPv4 (par exemple, 192.0.2.200). Il est également possible de choisir « Serveur du nom DNS » et de saisir le nom DNS du serveur. 5 Lorsque vous êtes invité à fournir un mot de passe, saisissez les huit premiers caractères du numéro de série matériel intégré au serveur. Pour obtenir ce numéro de série, cherchez une étiquette sur le serveur. Respectez les majuscules lorsque vous saisissez le numéro de série. Pour les ordinateurs sans numéro de série matériel intégré, utilisez 12345678 comme mot de passe. 6 Ouvrez les sous-fenêtres Langue d’installation, Informations importantes et Licence du logiciel et suivez les instructions à l’écran. Pour en savoir plus sur les réglages d’une sous-fenêtre d’Assistant du serveur, cliquez sur le bouton Aide de la sous-fenêtre. 7 Dans la sous-fenêtre Volumes, sélectionnez un disque ou une partition cible, assurezvous qu’il se trouve dans un état adéquat et cliquez sur Continuer.48 Chapitre 2 Installation de Mac OS X Server Pour en savoir plus sur les icônes d’état du disque, cliquez sur le bouton Aide de la sous-fenêtre Volumes. 8 Si Mac OS X Server ou Mac OS X est installé sur le volume sélectionné, sélectionnez une option disponible et cliquez sur OK. Ces options peuvent être les suivantes :  « Effacer en utilisant le formatage Mac OS X étendu (journalisé) puis installer » : efface la totalité du volume de destination avant d’installer une nouvelle copie de Mac OS X Server.  « Mise à niveau de Mac OS X Server » : cette option est uniquement disponible si le volume cible dispose de la dernière mise à niveau de Mac OS X Server 10.4 Tiger ou de Mac OS X Server 10.3.9 Panther. Vous pouvez mettre ce volume à niveau avec une configuration avancée de Leopard Server sans effacer le volume de destination. Pour plus d’informations, reportez-vous à la section Mise à niveau et migration (décrite dans « Guides d’administration de Mac OS X Server » à la page 173). 9 Une fois l’installation terminée, le serveur cible redémarre et vous pouvez continuer à utiliser Assistant du serveur pour configurer le serveur à distance. Pour en savoir plus, consultez le chapitre 3, « Configuration de Mac OS X Server ». Au lieu d’utiliser Assistant du serveur sur un ordinateur administrateur, vous pouvez contrô- ler l’installation à distance en utilisant le partage d’écran sur un Mac équipé de Mac OS X 10.5 Leopard ou un autre Mac équipé d’Apple Remote Desktop (que vous pouvez acheter séparément). Pour plus d’informations, reportez-vous à la section Administration du serveur (décrite dans « Guides d’administration de Mac OS X Server » à la page 173).3 49 3 Configuration de Mac OS X Server L’Assistant du serveur vous guide tout au long de la première configuration de votre serveur. L’Assistant du serveur s’ouvre automatiquement lorsque :  Vous avez terminé l’installation de Mac OS X Server 10.5 Leopard.  Vous démarrez un nouveau serveur sur lequel Leopard Server est préinstallé. Vous pouvez utiliser l’Assistant du serveur :  Localement sur le serveur.  À distance sur un ordinateur administrateur afin de configurer le serveur via le réseau. Pour en savoir plus sur la configuration interactive de plusieurs serveurs ou la configuration automatique d’une configuration avancée, consultez Administration du serveur (décrit dans « Guides d’administration de Mac OS X Server » à la page 173).50 Chapitre 3 Configuration de Mac OS X Server Configuration locale d’un serveur Vous pouvez configurer un nouveau serveur ou un nouvel ordinateur sur lequel Mac OS X Server vient d’être installé en utilisant le clavier, la souris et le moniteur du serveur. Pour configurer un serveur localement : 1 Préparez la configuration en remplissant une copie imprimée de la Feuille d’opération d’installation et de configuration. La Feuille d’opération d’installation et de configuration se trouve sur le disque d’installation de Mac OS X Server, dans le dossier Documentation. 2 Si vous disposez d’un service DHCP ou DNS fourni par votre fournisseur d’accès à Internet, d’un routeur Internet ou d’autres serveurs sur votre réseau, assurez-vous qu’ils sont configurés pour votre nouveau serveur et qu’ils sont en cours de fonctionnement. 3 Si vous souhaitez configurer votre serveur en tant que passerelle Internet pour qu’il partage une connexion Internet avec d’autres ordinateurs de votre réseau, vérifiez les éléments suivants :  Un port ou une interface Ethernet est connecté à votre modem DSL, votre modem câble ou toute autre source Internet. L’interface Internet doit disposer d’une adresse IP publique (il ne doit pas s’agir d’une adresse IP privée telle que 10.0.1.1 ou 192.168.1.1).  Un autre port Ethernet est connecté à votre réseau local. Lors de la configuration, vous devez indiquer le port connecté à Internet. Par exemple, si le port Ethernet intégré au serveur est connecté à Internet, vous devez le définir comme étant le port Internet. Si votre serveur compte plus de deux ports Ethernet, vous devez sélectionner l’un d’entre eux comme port réseau local. 4 Si le serveur est éteint, allumez-le. Lorsque le serveur démarre, l’Assistant du serveur s’ouvre automatiquement.Chapitre 3 Configuration de Mac OS X Server 51 5 Suivez les instructions à l’écran présentées dans les sous-fenêtres successives de l’Assistant du serveur en saisissant les informations que vous avez notées dans la Feuille d’opération d’installation et de configuration. Pour en savoir plus sur les réglages figurant dans les sous-fenêtres de l’Assistant du serveur, cliquez sur le bouton Aide de la sous-fenêtre. Au terme de la configuration du serveur, vous pouvez :  Effectuer quelques opérations supplémentaires pour sécuriser votre serveur. Pour en savoir plus, consultez les rubriques « Sécurité de votre serveur » et « Protection du compte administrateur système (root) ».  Utiliser Mise à jour de logiciels pour installer les mises à jour disponibles de Mac OS X Server. Pour en savoir plus, consultez la rubrique « Mise à jour de Leopard Server » à la page 64.  Configurer une borne d’accès AirPort ou un routeur Internet de façon à ce que les utilisateurs puissent accéder à votre serveur via Internet. Pour en savoir plus, consultez l’annexe B, « Configuration d’un routeur Internet »  Utiliser Préférences du serveur pour configurer des utilisateurs et des groupes, personnaliser des services et des informations système et surveiller l’activité du serveur. Vous pouvez également utiliser le widget d’état du serveur avec Dashboard pour surveiller votre serveur. Pour en savoir plus sur ces tâches, lisez les chapitres 4 à 9 ou ouvrez Préférences du serveur et consultez le menu Aide.52 Chapitre 3 Configuration de Mac OS X Server Sécurité de votre serveur Pour garantir la sécurité de votre serveur, vous devez créer un compte utilisateur standard après avoir configuré votre serveur. Lorsque vous ouvrez une session sur le serveur, utilisez toujours ce compte standard plutôt qu’un compte administrateur. Votre compte administrateur est réservé aux applications exigeant des autorisations d’administrateur. Utilisez par exemple votre nom et votre mot de passe d’administrateur avec Préférences du serveur pour gérer des utilisateurs, des groupes ou des services. Pour créer un compte utilisateur standard, utilisez la sous-fenêtre Comptes des Préférences Système du serveur. Pour obtenir des informations, ouvrez Préférences Système et consultez le menu Aide. Protection du compte administrateur système (root) Le mot de passe d’administrateur que vous saisissez lors de la configuration est également utilisé pour le compte administrateur système du serveur (ou root). Le compte administrateur système (root) peut déplacer ou supprimer n’importe quel fichier du système, y compris les fichiers système non accessibles par un compte administrateur de serveur ou un compte utilisateur quelconque. Vous n’avez pas besoin des privilèges d’utilisateur root pour administrer votre serveur. Important : il est très important de protéger le mot de passe d’utilisateur root en veillant à ce qu’il ne soit pas identique au mot de passe d’un autre compte. Une fois le serveur configuré, vous devez modifier le mot de passe du compte utilisateur root. Pour en savoir plus sur la modification du mot de passe root, ouvrez Utilitaire d’annuaire (sous /Applications/Utilitaires/) et consultez le menu Aide.Chapitre 3 Configuration de Mac OS X Server 53 Configuration à distance d’un serveur Si vous venez d’installer Mac OS X Server sur un nouveau serveur ou un autre ordinateur, vous pouvez le configurer via le réseau à l’aide de l’Assistant du serveur à partir d’un ordinateur administrateur. Le serveur que vous configurez ne doit pas nécessairement disposer d’un clavier ou d’un moniteur. Pour en savoir plus sur les ordinateurs administrateur, consultez la rubrique « Préparation d’un ordinateur administrateur » à la page 44. Pour configurer un serveur distant : 1 Préparez la configuration en remplissant une copie imprimée de la Feuille d’opération d’installation et de configuration. La Feuille d’opération d’installation et de configuration se trouve sur le disque d’installation de Mac OS X Server, dans le dossier Documentation. 2 Si vous disposez d’un service DHCP ou DNS fourni par votre fournisseur d’accès à Internet, d’un routeur Internet ou d’autres serveurs sur votre réseau, assurez-vous qu’ils sont configurés pour votre nouveau serveur et qu’ils sont en cours de fonctionnement. 3 Si vous souhaitez configurer votre serveur en tant que passerelle Internet, afin qu’il partage une connexion Internet avec d’autres ordinateurs de votre réseau, vérifiez les éléments suivants :  Un port ou une interface Ethernet est connecté à votre modem DSL, votre modem câble ou toute autre source Internet. L’interface Internet doit disposer d’une adresse IP publique (il ne doit pas s’agir d’une adresse IP telle que 10.0.1.1 or 192.168.1.1).  Un autre port Ethernet est connecté à votre réseau local.54 Chapitre 3 Configuration de Mac OS X Server Lors de la configuration, vous devez indiquer le port connecté à Internet. Par exemple, si le port Ethernet intégré au serveur est connecté à Internet, vous devez le définir comme étant le port Internet. Si votre serveur compte plus de deux ports Ethernet, vous devez sélectionner l’un d’entre eux comme port réseau local. 4 Si le serveur est éteint, allumez-le. Lorsque le serveur démarre, l’Assistant du serveur s’ouvre automatiquement et attend que la configuration à distance commence. 5 Sur un ordinateur administrateur, ouvrez l’Assistant du serveur, sélectionnez « Configurer un serveur distant », puis cliquez sur Continuer. L’Assistant du serveur se trouve dans /Applications/Server/. Il est possible d’utiliser l’Assistant du serveur sans compte administrateur sur l’ordinateur local. 6 Dans la sous-fenêtre Destination, saisissez dans la colonne Mot de passe le mot de passe prédéfini pour le serveur que vous souhaitez configurer, puis cochez la case Appliquer. Si le serveur n’est pas dans la liste, cliquez sur Actualiser, afin que l’Assistant du serveur recherche à nouveau les serveurs prêts à être installés sur votre réseau local (sous-réseau IP). Si le serveur qui vous intéresse se trouve sur un autre réseau local, cliquez sur le bouton Ajouter (+) et saisissez son adresse IP ou son nom DNS. Le mot de passe prédéfini est composé des 8 premiers caractères du numéro de série matériel intégré à l’ordinateur. Vous trouverez ce numéro sur une étiquette collée sur l’ordinateur. Respectez les majuscules lorsque vous saisissez le numéro de série. Pour les ordinateurs sans numéro de série matériel intégré, utilisez 12345678 comme mot de passe. 7 Cliquez sur Continuer et suivez les instructions présentées dans les sous-fenêtres successives de l’Assistant du serveur en saisissant les informations que vous avez notées dans la Feuille d’opération d’installation et de configuration.Chapitre 3 Configuration de Mac OS X Server 55 Pour en savoir plus sur les réglages présents dans l’Assistant du serveur, cliquez sur le bouton Aide de n’importe quelle sous-fenêtre. Au terme de la configuration du serveur, vous pouvez :  Effectuer quelques opérations permettant de sécuriser votre serveur. Pour en savoir plus, consultez les rubriques « Sécurité de votre serveur » à la page 52 et « Protection du compte administrateur système (root) » à la page 52.  Utiliser Mise à jour de logiciels pour installer les mises à jour disponibles de Mac OS X Server. Pour en savoir plus, consultez la rubrique « Mise à jour de Leopard Server » à la page 64.  Configurer une borne d’accès AirPort ou un routeur Internet de façon à ce que les utilisateurs puissent accéder à votre serveur via Internet. Pour en savoir plus, consultez l’annexe B, « Configuration d’un routeur Internet ».  Utiliser Préférences du serveur pour configurer des utilisateurs et des groupes, personnaliser des services et des informations système et surveiller l’activité du serveur. Vous pouvez également utiliser le widget d’état du serveur avec Dashboard pour surveiller votre serveur. Pour en savoir plus sur ces tâches, lisez les chapitres 4 à 9 ou ouvrez Préférences du serveur et consultez le menu Aide.4 57 4 Gestion de votre serveur Utilisez le widget d’état du serveur, Préférences du serveur, Time Machine et Mise à jour de logiciels pour vérifier l’état, modifier les réglages, sauvegarder, restaurer et mettre à jour le logiciel du serveur. Vérifiez l’état à l’aide de Préférences du serveur ou du widget d’état du serveur. Rechercher et modifier les réglages du serveur à l’aide de Préférences du serveur. Utilisez Pré- férences du serveur et le widget d’état du serveur soit sur le serveur lui-même, soit via le réseau à partir de n’importe quel Mac équipé de Leopard. Réglez les préférences de Time Machine de façon à effectuer une copie de sauvegarde du serveur. La restauration s’effectue à l’aide de l’application Time Machine ou du programme d’installation. Maintenez le logiciel du serveur à jour via Mise à jour de logiciels. Utilisation de Préférences du serveur Préférences du serveur permet de vérifier l’état des services et de modifier leurs réglages. Vous devez utiliser Préférences du serveur pour gérer divers aspects d’une configuration standard ou d’une configuration de groupe de travail de Leopard Server, notamment les personnes autorisées à utiliser les services, le type de configuration de ces services ou leur état.58 Chapitre 4 Gestion de votre serveur Lorsque vous ouvrez Préférences du serveur, les préférences individuelles sont regroupées dans les catégories décrites ci-dessous.  Comptes : gère les utilisateurs et les groupes.  Services : personnalise les réglages du partage de fichiers, le service de calendrier iCal, le service de messagerie instantané iChat, le service de messagerie, les services web et le service d’accès à distance VPN.  Système : vérifiez les informations du serveur, les journaux de fonctionnement, les graphes d’activité du serveur et les réglages du pare-feu. Pour gérer un serveur standard ou de groupe de travail : 1 Ouvrez Préférences du serveur. Préférences du serveur est disponible dans /Applications/Server/. 2 Si Préférences du serveur vous invite à saisir le nom de votre serveur, votre nom d’utilisateur et votre mot de passe, saisissez le nom DNS ou l’adresse IP du serveur, le nom d’un compte administrateur du serveur et le mot de passe de ce compte administrateur. Le compte que vous avez créé lorsque vous avez configuré le serveur est un compte administrateur.Chapitre 4 Gestion de votre serveur 59 Utilisation du widget d’état du serveur Vous pouvez utiliser le widget d’état du serveur pour surveiller l’état de Mac OS X Server soit sur le serveur lui-même, soit depuis un autre ordinateur équipé de Mac OS X Server ou de Mac OS X. Pour utiliser le widget d’état du serveur : 1 Ouvrez Dashboard, cliquez sur le bouton Ouvrir (+), puis sur le widget d’état du serveur, ou faites glisser ce dernier hors de la barre des widgets. Vous pouvez ouvrir Dashboard en cliquant sur son icône dans le Dock ou en utilisant son raccourci clavier (touche F12). 2 Saisissez le nom DNS ou l’adresse IP du serveur, un nom et un mot de passe d’administrateur, puis cliquez sur Terminé. 3 Une fois le widget d’état du serveur connecté à un serveur, il affiche le nom DNS du serveur ainsi que des informations concernant l’état du serveur et de ses services. Contrôlez l’utilisation du processeur, la charge du réseau ou l’utilisation des disques en cliquant sur l’une des icônes situées sous le graphique.60 Chapitre 4 Gestion de votre serveur Cliquez sur le graphique pour modifier l’échelle de temps du graphique du processeur ou du réseau (une heure, un jour ou une semaine). Si votre serveur dispose de plusieurs disques, vous pouvez consulter l’état de chacun d’eux tour à tour en cliquant sur le graphe d’utilisation de disque. Vérifiez l’indicateur d’état et le nombre actuel de connexions pour les services répertoriés. Un voyant vert signifie que le service fonctionne normalement. Ouvrez la sous-fenêtre Préférences du serveur correspondant à l’un des services de la liste en cliquant sur ce service dans le widget. Connectez-vous à un autre serveur en déplaçant la souris vers l’angle supérieur gauche du widget et en cliquant sur le petit bouton Informations (i). Vous pouvez ouvrir un autre widget d’état du serveur pour visualiser en même temps plusieurs aspects de l’état d’un serveur ou pour surveiller un autre serveur du réseau. Le widget d’état du serveur nécessite Mac OS X Server 10.5 Leopard ou Mac OS X 10.5 Leopard. Pour en savoir plus sur les widgets et sur Dashboard, basculez sur le Finder et consultez le menu Aide. Il est également possible de visualiser les graphiques d’activité du serveur à l’aide de Préférences du serveur.Pour en savoir plus, consultez la rubrique « Contrôle des courbes du serveur » à la page 168.Chapitre 4 Gestion de votre serveur 61 Recherche de réglages dans Préférences du serveur Préférences du serveur contient des dizaines de réglages que vous pouvez modifier pour personnaliser votre ordinateur. Vous pouvez rapidement rechercher le réglage qui vous intéresse dans Préférences du serveur. Pour rechercher des réglages dans Préférences du serveur : 1 Ouvrez Préférences du serveur. 2 Dans le champ de recherche, saisissez un mot ou une phrase décrivant l’élément à modifier. Par exemple, si vous souhaitez ajouter des membres à un groupe, saisissez « membres de groupe». À mesure que vous saisissez des mots, des propositions vous sont faites sous le champ de recherche. 3 Arrêtez la saisie lorsque l’élément que vous recherchez figure dans la liste des résultats de recherche. Une ou plusieurs préférences sont mises en surbrillance dans la fenêtre Préférences du serveur. 4 Cliquez sur l’élément correspondant à ce que vous souhaitez modifier. Dans la sous-fenêtre qui s’ouvre, changez les réglages de cet élément. Connexion de Préférences du serveur à un serveur distant Vous pouvez connecter Préférences du serveur à un serveur via le réseau et gérer des utilisateurs, des groupes, des services et des informations système à distance. Pour gérer un serveur à distance : 1 Ouvrez Préférences du serveur sur un ordinateur administrateur et choisissez Connexion > Nouvelle connexion.62 Chapitre 4 Gestion de votre serveur Pour en savoir plus sur les ordinateurs administrateur, consultez la rubrique « Préparation d’un ordinateur administrateur » à la page 44. 2 Saisissez le nom DNS ou l’adresse IP du serveur distant, ainsi que le nom et le mot de passe d’un compte administrateur sur le serveur distant. Une fois Préférences du serveur connecté à un serveur distant, le nom ou l’adresse IP du serveur est affiché dans la barre de titre de la fenêtre Préférences du serveur. Pour vous reconnecter à un serveur auquel vous vous êtes connecté récemment, choisissez Connexion > Ouvrir connexion récente, puis choisissez le serveur qui vous intéresse. Vous pouvez connecter Préférences du serveur aux configurations standard et de groupe de travail de Leopard Server, mais pas à une configuration avancée de Leopard Server ou à une version antérieure de Mac OS X Server. Fermeture d’une connexion de Préférences du serveur Par sécurité, fermez la fenêtre Préférences du serveur lorsque vous ne l’utilisez pas pour gérer les utilisateurs, les groupes, les services ou les informations système du serveur. Le fait de laisser ouverte une connexion à un serveur sur un serveur non utilisé peut permettre à une personne non autorisée de modifier les utilisateurs, les groupes ou les services. Voici plusieurs méthodes permettant de fermer une connexion Préférences du serveur : m Fermez la fenêtre Préférences du serveur. m Choisissez Connexion > Fermer. m Quittez Préférences du serveur.Chapitre 4 Gestion de votre serveur 63 Si vous fermez la seule fenêtre ouverte de Préférences du serveur, l’application se ferme automatiquement. Sauvegarde et restauration du serveur Il est possible de sauvegarder automatiquement les fichiers du serveur à l’aide de Time Machine. Il s’agit d’une solution de sauvegarde complète du système. Elle permet de sauvegarder automatiquement l’intégralité des fichiers du système sur un disque dur externe local ou à distance sur un système de fichiers en réseau. Ce système permet également d’assurer un suivi des fichiers que vous avez créés, mis à jour ou supprimés. Time Machine sauvegarde les changements et crée un historique du système de fichiers que vous pouvez parcourir en fonction de la date. Vous pouvez utiliser son navigateur visuel intuitif et chronologique pour rechercher des fichiers sauvegardés à une date ultérieure et les restaurer. Vous pouvez dresser la liste des dossiers et des disques à ne pas sauvegarder. Time Machine exclut automatiquement les fichiers temporaires et en cache situés sous /tmp/, /Bibliothèque/Logs/, /Bibliothèque/Caches/ et /Utilisateurs/nomutilisateur/ Bibliothèque/Caches/. Les options de sauvegarde se règlent dans la sous-fenêtre Time Machine des Préférences Système. Utilisez l’application Time Machine pour restaurer des fichiers. Vous pouvez de même restaurer une version antérieure du système à l’aide du programme d’installation. Pour en savoir plus sur la sauvegarde et la restauration à l’aide de Time Machine ou du programme d’installation, ouvrez Préférences Système et consultez le menu Aide.64 Chapitre 4 Gestion de votre serveur Remarque : s’il est possible de restaurer une configuration standard ou une configuration de groupe de travail à partir d’une sauvegarde Time Machine, il n’est pas toujours possible de restaurer complètement des réglages avancés modifiés à l’aide d’Admin Serveur. Mise à jour de Leopard Server Si votre serveur est connecté à Internet, Mise à jour de logiciels peut récupérer automatiquement la dernière version gratuite de Leopard Server, des mises à jour de sécurité et d’autres améliorations conçues par Apple. Votre serveur est réglé pour rechercher automatiquement des mises à jour une fois par semaine, mais vous pouvez le régler pour qu’il effectue cette recherche une fois par jour ou une fois par mois. Vous pouvez également rechercher immédiatement des mises à jour. Pour rechercher des mises à jour ou régler la mise à jour automatique : 1 Ouvrez Préférences Système. 2 Cliquez sur l’icône Mise à jour de logiciels et suivez les instructions à l’écran.Chapitre 4 Gestion de votre serveur 65 Si votre organisation dispose d’un autre serveur équipé de Mac OS X Server, votre serveur peut passer par celui-ci plutôt que par le site d’Apple pour récupérer des mises à jour de logiciels. Un administrateur qualifié peut configurer Mac OS X Server de façon à ce qu’il propose un service de mise à jour de logiciels à l’aide d’Admin Serveur. Vous pouvez également télécharger des mises à jour de logiciels directement sur le site web de téléchargements d’Apple : www.apple.com/fr/support/downloads5 67 5 Gestion des utilisateurs Créez ou importez des comptes utilisateur, modifiez leurs réglages ou supprimez-les dans la sous-fenêtre Utilisateurs de Préférences du serveur. La sous-fenêtre Utilisateurs vous permet de configurer des comptes pour les personnes qui utilisent les services fournis par ce serveur et de contrôler les services auxquels elles ont accès. Vous pouvez mettre à jour leurs informations de contact et changer leur appartenance à des groupes. Il est également possible de modifier les messages électroniques à envoyer aux nouveaux utilisateurs. Pour en savoir plus sur les réglages et les commandes figurant dans cette sous-fenêtre, cliquez sur le bouton Aide situé dans l’angle inférieur droit de la fenêtre de Préférences du serveur.68 Chapitre 5 Gestion des utilisateurs À propos des comptes utilisateur Les comptes utilisateurs sur votre serveur permettent aux utilisateurs d’avoir accès aux services fournis par le serveur. Un compte utilisateur renferme les informations permettant de prouver l’identité de l’utilisateur pour l’ensemble des services exigeant une authentification. Un compte utilisateur constitue également une zone de stockage des informations de contact et d’autres données de l’utilisateur. Chaque compte utilisateur peut fournir une adresse e-mail, une adresse de messagerie instantanée iChat, un calendrier individuel et un accès distant VPN à votre serveur. Les utilisateurs peuvent également être membres de groupes, en les autorisant à accéder à des ressources de groupes telles qu’un dossier de groupe partagé, un site Web de groupe et un calendrier de groupe. Les utilisateurs n’ont évidemment plus accès à ces services lorsque ces derniers sont désactivés.Chapitre 5 Gestion des utilisateurs 69 Vous pouvez ajouter de nouveaux comptes utilisateur via la sous-fenêtre Utilisateurs de Préférences du serveur en :  créant des comptes,  important des comptes existants, si votre organisation dispose d’un serveur de répertoire et que votre serveur est connecté à celui-ci. Il est possible d’importer individuellement des comptes utilisateur. Vous pouvez également importer automatiquement l’ensemble des comptes utilisateur membres d’un groupe. Les comptes utilisateur que vous créez sont stockés dans le répertoire de votre serveur. Les comptes utilisateur importés demeurent sur le serveur de répertoire de votre organisation. Vous pouvez ajouter aux comptes importés des informations de contact, des informations sur l’appartenance aux groupes, etc. Ces informations sont stockées dans le répertoire de votre serveur. Lorsqu’une personne utilise un compte utilisateur importé, votre serveur combine automatiquement les informations stockées sur le serveur de répertoire avec les informations supplémentaires stockées sur le répertoire de votre serveur. Vous pouvez utiliser Préférences du serveur pour modifier les comptes utilisateur crées sur votre serveur. L’application Répertoire permet également aux utilisateurs de modifier leurs comptes. Si votre serveur a importé des comptes utilisateur, vous pouvez utiliser Préférences du serveur pour modifier les informations supplémentaires ajoutées aux comptes importés dans le répertoire de votre serveur, mais pas les informations de compte figurant dans le répertoire de votre organisation. Tout administrateur de ce répertoire peut modifier ses informations de compte à l’aide d’outils du serveur de répertoire.70 Chapitre 5 Gestion des utilisateurs Les utilisateurs bénéficiant d’autorisations d’administrateur sur leur ordinateur peuvent créer des comptes utilisateur locaux via la sous-fenêtre Comptes des Préférences Système. Ces comptes utilisateur locaux sont stockés sur l’ordinateur de l’utilisateur. Les comptes utilisateur locaux disposent chacun d’un dossier de départ sur l’ordinateur et peuvent être utilisés pour ouvrir une session sur l’ordinateur. Les comptes utilisateur locaux ne peuvent être utilisés pour accéder au serveur via le réseau. Votre serveur étant également un ordinateur Mac OS X, il dispose, outre ses comptes de serveur, de comptes locaux ainsi que d’éventuels comptes importés. Les comptes locaux de votre serveur peuvent servir à ouvrir une session sur le serveur ; un compte local disposant d’autorisations d’administrateur peut être utilisé pour administrer le serveur. Pour en savoir plus sur les autorisations d’administrateur, consultez la rubrique suivante, « À propos des comptes d’administrateur ».Chapitre 5 Gestion des utilisateurs 71 Le tableau ci-dessous résume les différences principales entre les comptes de serveur, les comptes importés et les comptes locaux. Type de compte Stocké dans Créé par Utilisé pour Comptes de serveur Le répertoire de votre serveur Vous (un administrateur de serveur) via Préférences du serveur L’appartenance aux groupes, les informations de contact, l’authentification auprès des services Comptes importés Le serveur de répertoire de votre organisation, avec ajout d’informations supplé- mentaires au répertoire de votre serveur L’administrateur du serveur de répertoire L’appartenance aux groupes, les informations de contact, l’authentification auprès des services Comptes locaux Tous les ordinateurs équipés de Mac OS X Un utilisateur disposant d’un compte d’administrateur sur l’ordinateur, à l’aide des préférences Comptes Les dossiers de départ, l’ouverture de session sur l’ordinateur72 Chapitre 5 Gestion des utilisateurs À propos des comptes d’administrateur Vous devez disposer d’un compte d’administrateur sur votre serveur pour pouvoir créer d’autres comptes utilisateur ou des groupes, pour modifier les réglages du serveur et pour exécuter d’autres tâches à l’aide de Préférences du serveur. Le compte administrateur vous permet également de modifier les préférences verrouillées dans les Préférences Système, d’installer des logiciels sur le serveur et d’exécuter des tâches que les utilisateurs standard ne sont pas autorisés à exécuter. Votre serveur dispose de deux comptes administrateur une fois terminé le processus de configuration initial décrit au chapitre 3. Le compte administrateur principal est celui dont vous avez saisi le nom et le mot de passe au moment de la configuration du serveur. L’autre compte administrateur dispose également du mot de passe que vous avez saisi, mais le nom correspondant est Administrateur local et le nom abrégé est localadmin. Le tableau ci-dessous résume les similarités et les différences entre ces deux comptes. Le compte administrateur principal se trouve dans le répertoire de votre serveur, ainsi que les comptes utilisateur que vous créez dans la sous-fenêtre Utilisateurs de Préférences du serveur. Vous pouvez utiliser ce compte administrateur sur le serveur ; il peut également vous permettre de gérer votre serveur via le réseau depuis un autre Mac.Chapitre 5 Gestion des utilisateurs 73 Le compte administrateur local est stocké sur le serveur, pas dans son répertoire, avec les comptes utilisateur créés via la sous-fenêtre Comptes des Préférences Système. Utilisez le compte administrateur local pour ouvrir une session sur le serveur et utilisez Pré- férences du serveur du serveur si vous constatez un dysfonctionnement rendant l’autre compte administrateur inutilisable. Lorsque vous créez un compte utilisateur, vous devez spécifier s’il s’agit d’un utilisateur administrateur ou standard. Vous pouvez également transformer un compte utilisateur importé en administrateur de serveur. Si vous ne souhaitez pas qu’un utilisateur soit autorisé à utiliser Préférences du serveur ou à installer des logiciels sur le serveur, ne lui donnez pas d’autorisation administrateur. Administrateur principal Administrateur local Nom et nom abrégé Spécifié au moment de la configuration Administrateur local et localadmin Mot de passe Spécifié au moment de la configuration Spécifié au moment de la configuration Stocké sur le répertoire du serveur Oui Non Utilisable depuis un ordinateur administrateur Oui Non74 Chapitre 5 Gestion des utilisateurs Afin de sécuriser votre ordinateur , ne partagez jamais un nom et un mot de passe d’administrateur avec quelqu’un d’autre. Veillez à fermer la session lorsque vous quittez votre ordinateur ou à mettre en place un économiseur d’écran verrouillé à l’aide de la sous-fenêtre Économiseur d’écran et de la sous-fenêtre Sécurité des Préférences Système. Si vous vous absentez alors que votre session est ouverte et que l’écran est déverrouillé, n’importe qui peut utiliser votre ordinateur et modifier des éléments à l’aide de vos autorisations d’administrateur. Pour renforcer la sécurité, ouvrez régulièrement une session sur le serveur via un compte utilisateur standard. Utilisez vos nom et mot de passe administrateur pour ouvrir les Pré- férences du serveur ou toute autre application exigeant des autorisations administrateur. Ne configurez jamais le serveur pour qu’il démarre automatiquement une session administrateur. Si vous le faites, toute personne qui redémarre le serveur peut ouvrir une session en tant qu’administrateur. Ajout d’un compte utilisateur Vous pouvez ajouter des comptes utilisateur pour toute personne utilisant les services fournis par votre serveur. Votre serveur attribue une adresse électronique personnelle, une adresse iChat et un calendrier à chaque compte utilisateur. Les comptes utilisateur ont également accès aux fichiers partagés et aux sites web partagés du serveur et ils peuvent utiliser VPN pour accéder à distance au serveur. Pour être disponibles, les services doivent être activés ; il est possible de contrôler individuellement l’accès de chaque compte utilisateur aux différents services.Chapitre 5 Gestion des utilisateurs 75 Pour ajouter un nouveau compte utilisateur : 1 Cliquez sur le bouton Ajouter (+) de la sous-fenêtre Utilisateurs de Préférences du serveur. 2 Si un menu local s’affiche, choisissez l’une des commandes suivantes : « Importer l’utilisateur du répertoire » : vous pouvez importer des comptes utilisateur existants depuis le répertoire de votre organisation. Pour en savoir plus sur cette opération, consultez la rubrique « Importation d’utilisateurs » à la page 76. Créer un utilisateur : lorsque cela est possible, vous pouvez ajouter de nouveaux utilisateurs à partir du serveur de répertoire de votre entreprise. Il est toutefois possible de créer des comptes utilisateur dans le répertoire de votre serveur. Pour réaliser cette opération, passez à l’étape 3. Si aucun menu local n’apparaît lorsque vous cliquez sur le bouton Ajouter (+), votre serveur n’est pas connecté à un serveur de répertoire. Passez à l’étape 3 pour créer un compte utilisateur dans le répertoire de votre serveur. 3 Saisissez le nom de l’utilisateur. Le nom peut contenir jusqu’à 255 caractères (255 caractères romains ou 85 caractères japonais). Ce nom peut comporter des espaces. 4 Si vous ne souhaitez pas utiliser le nom abrégé généré automatiquement, saisissez un nouveau nom abrégé (une fois le compte créé, il est impossible de modifier ce nom). Le nom abrégé contient généralement huit caractères ou moins, mais il peut comprendre jusqu’à 255 caractères latins. Ce nom peut uniquement être composé des caractères a à z, A à Z, 0 à 9, _ (soulignement) ou - (trait d’union). Remarque : si l’utilisateur dont vous êtes en train de créer le compte possède déjà un Mac configuré, utilisez le même nom abrégé pour le compte utilisateur sur le serveur. Cela facilite l’accès aux services.76 Chapitre 5 Gestion des utilisateurs 5 Saisissez le mot de passe utilisateur dans les champs Mot de passe et Confirmer. Vous pouvez utiliser l’Assistant mot de passe pour vous aider à choisir un nouveau mot de passe. Cliquez sur le bouton de clé à droite du champ Mot de passe pour vérifier la qualité du nouveau mot de passe. 6 Sélectionnez « Autoriser l’utilisateur à administrer l’ordinateur » si ce compte utilisateur a besoin de créer d’autres comptes utilisateur ou des groupes, d’installer des logiciels sur le serveur ou de modifier des réglages du serveur. Importation d’utilisateurs Si votre serveur est connecté au serveur de répertoire de votre organisation, vous pouvez importer des comptes utilisateur existants. Votre serveur attribue une adresse électronique personnelle, une adresse iChat et un calendrier à chaque compte utilisateur importé. Les comptes utilisateur importés ont également accès aux fichiers partagés et aux sites web partagés du serveur. Si le service de messagerie et le service VPN de votre serveur sont activés, les comptes utilisateur importés reçoivent une adresse électronique et peuvent utiliser le service VPN pour accéder à distance au serveur. Les services doivent être activés pour être accessibles ; il est possible de contrôler individuellement l’accès de chaque compte utilisateur importé aux différents services. Pour importer un compte utilisateur : 1 Avant d’importer un compte utilisateur, assurez-vous que le contenu du message électronique d’invitation est adapté à vos besoins. Pour en savoir plus, consultez la rubrique « Personnalisation du message électronique d’invitation du serveur » à la page 91.Chapitre 5 Gestion des utilisateurs 77 2 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, cliquez sur le bouton Ajouter (+) et choisissez « Importer l’utilisateur du répertoire » dans le menu local. Si aucun menu local n’apparaît lorsque vous cliquez sur le bouton Ajouter (+), votre serveur n’est pas connecté à un serveur de répertoire de votre organisation. Consultez la rubrique « Connexion à un serveur de répertoire » à la page 162. Si votre organisation ne dispose pas d’un serveur de répertoire (votre serveur excepté), vous pouvez créer des comptes utilisateur. Pour en savoir plus sur la création de comptes utilisateur, consultez la rubrique « Ajout d’un compte utilisateur » à la page 74. 3 Sélectionnez un compte utilisateur dans la liste des comptes du serveur de répertoire de votre organisation, sélectionnez l’option (facultative) « Envoyer une invitation par courrier électronique aux utilisateurs importés », puis cliquez sur Importer. 4 Une fois l’importation des comptes utilisateur terminée, cliquez sur Terminé. Les comptes utilisateur importés via cette procédure apparaissent dans la liste Importés de la sous-fenêtre Utilisateurs. Vous pouvez importer automatiquement des comptes utilisateur à partir de groupes au lieu de les importer un par un via cette procédure. Pour en savoir plus sur cette opération, consultez la rubrique suivante.78 Chapitre 5 Gestion des utilisateurs Importation automatique de groupes d’utilisateurs Si votre serveur est connecté au serveur de répertoire de votre organisation, il est possible d’importer des groupes de comptes utilisateur existants. Lorsque vous importez un groupe, votre serveur importe automatiquement les comptes utilisateur de tous les membres de ce groupe. Votre serveur vérifie régulièrement sur le serveur de répertoire de votre organisation s’il y a eu des changements dans la composition de chaque groupe importé et ajoute ou supprime automatiquement des comptes utilisateur importés en fonction de ces changements. Votre serveur attribue une adresse électronique personnelle, une adresse iChat et un calendrier à chaque compte utilisateur importé. Les comptes utilisateur importés ont également accès aux fichiers partagés et aux sites web partagés du serveur. Si le service de messagerie et le service VPN de votre serveur sont activés, les comptes utilisateur importés reçoivent une adresse électronique et peuvent utiliser le service VPN pour accéder à distance au serveur. Les services doivent être activés pour être accessibles ; il est possible de contrôler individuellement l’accès de chaque compte utilisateur importé aux différents services. Pour importer automatiquement des comptes utilisateur à partir de groupes : 1 Avant d’importer des comptes utilisateur à partir de groupes, assurez-vous que le contenu du message électronique d’invitation est adapté à vos besoins. Pour en savoir plus, consultez la rubrique « Personnalisation du message électronique d’invitation du serveur » à la page 91. 2 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, cliquez sur le bouton Action (en forme d’engrenage) et choisissez « Importer les utilisateurs des groupes » dans le menu local.Chapitre 5 Gestion des utilisateurs 79 Si le menu local Action ne comprend pas cette option, votre serveur n’est pas connecté à un serveur de répertoire. Consultez la rubrique « Connexion à un serveur de répertoire » à la page 162. Si votre organisation ne dispose pas d’un serveur de répertoire (votre serveur excepté), vous pouvez créer des comptes utilisateur. Pour en savoir plus sur la création de comptes utilisateur, consultez la rubrique « Ajout d’un compte utilisateur » à la page 74. 3 Modifiez la liste de droite de façon à ce qu’elle contienne les groupes dont vous souhaitez importer automatiquement les membres. Ajoutez un groupe disponible en le sélectionnant dans la liste de gauche, puis en cliquant sur Ajouter. Supprimez un groupe à importer en le sélectionnant dans la liste de droite, puis en cliquant sur Supprimer. 4 Si vous le souhaitez, sélectionnez « Envoyer une invitation par courrier électronique aux nouveaux utilisateurs importés ». 5 Si la liste des groupes à importer vous convient, cliquez sur Enregistrer. Les comptes utilisateur automatiquement importés à partir de groupes figurent sous la mention « Automatique » dans la sous-fenêtre Utilisateurs. Vous pouvez également importer individuellement des comptes utilisateur. Pour en savoir plus sur cette opération, consultez la rubrique « Importation d’utilisateurs » à la page 76.80 Chapitre 5 Gestion des utilisateurs Suppression d’un compte utilisateur Vous pouvez utiliser Préférences du serveur pour supprimer des comptes utilisateur dont votre serveur n’a plus de besoin. Supprimer un compte utilisateur entraîne l’annulation de son appartenance à un groupe et le retire de la liste des contacts automatiques d’iChat. Cette suppression entraîne de même la suppression de l’adresse électronique stockée par l’utilisateur sur le serveur et empêche l’accès de l’utilisateur à son calendrier personnel. Pour supprimer un compte utilisateur : 1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte utilisateur à modifier dans la liste de gauche. 2 Cliquez sur le bouton Supprimer (-).Chapitre 5 Gestion des utilisateurs 81 Modification des réglages d’un compte utilisateur Changez le nom, le mot de passe, la photo ou les autorisations d’administrateur d’un utilisateur en cliquant sur Compte dans la sous-fenêtre Utilisateurs de Préférences du serveur. Pour changer les réglages d’un compte utilisateur : 1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte utilisateur à modifier dans la liste de gauche. 2 Cliquez sur Compte et modifiez tous les réglages disponibles en vous aidant des informations suivantes : Nom : saisissez le nom de l’utilisateur. Le nom, associé au mot de passe, peut être utilisé pour l’authentification en vue d’utiliser des services.82 Chapitre 5 Gestion des utilisateurs Nom abrégé : il s’agit de l’abréviation du nom de l’utilisateur. Le nom abrégé est utilisé pour l’adresse électronique de l’utilisateur et les adresses iChat. Il peut également être utilisé avec le mot de passe pour l’authentification auprès des services. Il ne peut plus être modifié une fois que le compte a été créé. « Réinitialiser le mot de passe » : cliquez sur cette option pour réinitialiser le mot de passe. Il est impossible de modifier le mot de passe d’un compte utilisateur importé depuis un serveur de répertoire. Image : cliquez ici pour éditer la photo de l’utilisateur en choisissant une photo, en prenant une photo avec un appareil photo connecté à votre ordinateur ou en appliquant un effet visuel. « Autoriser l’utilisateur à administrer ce serveur » : si vous sélectionnez cette option, le compte utilisateur peut gérer des utilisateurs, des groupes et des services à l’aide de Préférences du serveur. Si les réglages situés en regard du nom abrégé sont estompés dans la sous-fenêtre Compte, il est impossible de les modifier, car ils sont stockés sur le serveur de répertoire auquel votre serveur est connecté. Les utilisateurs équipés de Leopard peuvent modifier leurs propres informations de compte à l’aide de l’application Répertoire.Chapitre 5 Gestion des utilisateurs 83 Modification des informations de contact d’un utilisateur Modifiez le nom et le prénom, l’adresse, l’adresse électronique, l’adresse de chat, l’adresse de site web et l’adresse de blog d’un utilisateur en cliquant sur Informations de contact dans la sous-fenêtre Utilisateurs de Préférences du serveur.84 Chapitre 5 Gestion des utilisateurs Pour modifier les informations de contact d’un utilisateur : 1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte utilisateur à modifier dans la liste de gauche. 2 Cliquez sur Informations de contact et modifiez tous les réglages disponibles en vous aidant des informations suivantes : Nom : nom et prénom de l’utilisateur. Adresse : adresse postale de l’utilisateur. Contact : adresse de messagerie instantanée et adresse électronique de l’utilisateur.  Pour ajouter une adresse, cliquez sur le bouton Ajouter (+).  Pour supprimer une adresse, sélectionnez-la et cliquez sur le bouton Supprimer (–). Site web : adresse du site web personnel de l’utilisateur (commence par http://). Journal web : adresse du blog personnel de l’utilisateur (commence par http://). Si les réglages de la sous-fenêtre Informations de contact sont estompés, il est impossible de les modifier, car ils sont stockés sur le serveur de répertoire auquel votre serveur est connecté. Les utilisateurs équipés de Leopard peuvent modifier leurs informations de contact à l’aide de l’application Répertoire. Pour en savoir plus, consultez la rubrique « Utilisation des informations de répertoire sur les ordinateurs des utilisateurs de Leopard » à la page 110. Contrôle de l’accès d’un utilisateur aux différents services Contrôlez l’accès d’un utilisateur à des services particuliers en cliquant sur Services dans la sous-fenêtre Utilisateurs de Préférences du serveur.Chapitre 5 Gestion des utilisateurs 85 Pour changer les réglages d’accès aux services d’un utilisateur : 1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte utilisateur à contrôler dans la liste de gauche. 2 Cliquez sur Services et cochez les services auxquels l’utilisateur peut accéder. Décochez les services dont vous ne souhaitez pas accorder l’accès à l’utilisateur. Modification de l’appartenance d’un utilisateur à des groupes Intégrez un utilisateur à un groupe ou supprimez un utilisateur d’un groupe en cliquant sur Groupes dans la sous-fenêtre Utilisateurs.86 Chapitre 5 Gestion des utilisateurs Pour changer l’appartenance d’un utilisateur à des groupes : 1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte utilisateur à modifier dans la liste de gauche. 2 Cliquez sur Groupes, puis sur Modifier l’adhésion. 3 Cochez la case en regard de chaque groupe auquel vous souhaitez intégrer l’utilisateur. Décochez la case en regard de chaque groupe auquel vous souhaitez ne pas intégrer l’utilisateur. 4 Une fois vos changements effectués, cliquez à nouveau sur Modifier l’adhésion pour afficher une liste statique des groupes auxquels l’utilisateur appartient. Pour en savoir plus sur l’ajout, la suppression ou la configuration des groupes, consultez le chapitre 7, « Gestion des groupes ». Modification du nom ou du mot de passe d’un utilisateur Vous pouvez utiliser Préférences du serveur pour modifier le nom ou le mot de passe d’un compte utilisateur standard ou d’un compte administrateur. Pour changer le nom ou le mot de passe d’un compte utilisateur : 1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte utilisateur standard ou administrateur à modifier dans la liste de gauche, puis cliquez sur Compte. 2 Pour changer le nom, modifiez le champ Nom. Le nom peut contenir jusqu’à 255 caractères (255 caractères romains ou 85 caractères japonais). Ce nom peut comporter des espacesChapitre 5 Gestion des utilisateurs 87 Il est impossible de changer le nom abrégé d’un compte utilisateur à l’aide de Préfé- rences du serveur. 3 Pour changer le mot de passe, cliquez sur « Réinitialiser le mot de passe », saisissez le nouveau mot de passe dans les champs « Nouveau mot de passe » et Confirmer, puis cliquez sur « Modifier le mot de passe ». Vous pouvez utiliser l’Assistant mot de passe pour vous aider à choisir un nouveau mot de passe. Cliquez sur le bouton Clé à droite du champ « Nouveau mot de passe » pour vérifier la qualité du nouveau mot de passe. Les utilisateurs équipés de Leopard peuvent modifier leurs nom et mot de passe à l’aide de l’application Répertoire. Les utilisateurs peuvent modifier leur mot de passe lors de l’authentification pour le partage de fichiers. Si votre serveur comporte des comptes utilisateur importés ou des comptes utilisateur importés automatiquement à partir de groupes, leurs nom et mot de passe peuvent être modifiés par un administrateur du serveur de répertoire contenant les comptes. Si ce serveur de répertoire est une configuration standard de Mac OS X Server et que vous en êtes administrateur, vous pouvez y connecter Préférences du serveur à distance et effectuer vos changements. Pour en savoir plus sur la connexion à distance, consultez la rubrique « Connexion de Préférences du serveur à un serveur distant » à la page 61. Si les comptes utilisateur importés de votre serveur sont stockés sur une configuration avancée de Mac OS X Server, l’administrateur du répertoire peut utiliser Gestionnaire de groupe de travail pour modifier les nom et mot de passe du compte. Pour en savoir plus sur Gestionnaire de groupe de travail, ouvrez cette application et consultez le menu Aide.88 Chapitre 5 Gestion des utilisateurs Pour changer le mot de passe ou d’autres attributs du compte administrateur local, utilisez la sous-fenêtre Comptes des Préférences Système après avoir configuré le serveur. Pour en savoir plus sur la modification des comptes locaux, ouvrez Préférences Système et consultez le menu Aide. Pour changer le mot de passe du compte administrateur système (root), utilisez l’application Utilitaire d’annuaire après avoir configuré le serveur. Pour en savoir plus sur l’utilisation d’Utilitaire d’annuaire, ouvrez l’application et consultez le menu Aide. Modification de la photo d’un utilisateur Vous pouvez utiliser Préférences du serveur pour modifier la photo d’un compte utilisateur standard ou d’un compte administrateur. Si votre serveur contient des comptes utilisateur importés ou des comptes utilisateur automatiquement importés à partir de groupes, vous pouvez changer les photos sauf si elles ont été définies sur le serveur de répertoire de votre organisation. Pour changer la photo d’un compte utilisateur : 1 Dans la sous-fenêtre Utilisateurs de Préférences du serveur, sélectionnez le compte utilisateur à modifier dans la liste de gauche, puis cliquez sur Compte. 2 Pour utiliser une photo de la liste, cliquez sur le champ de photo et choisissez une photo dans le menu local. 3 Pour modifier la photo ou pour utiliser une photo provenant d’un appareil photo ou d’un fichier, cliquez sur le champ de photo, choisissez Modifier l’image dans le menu local, effectuez vos modifications, puis cliquez sur Définir ou Annuler. Pour choisir une photo que vous avez utilisée récemment, cliquez sur Photos récentes.Chapitre 5 Gestion des utilisateurs 89 Pour déplacer la photo, faites-la glisser vers le haut, vers le bas ou de gauche à droite. Pour rogner la photo, faites glisser le curseur. Pour capturer une nouvelle photo à l’aide d’un appareil connecté à l’ordinateur, cliquez sur le bouton d’appareil photo. Pour appliquer un effet visuel, cliquez sur le bouton Effets visuels (grille), faites défiler les effets disponibles et sélectionnez celui qui vous intéresse. Pour utiliser un fichier d’image, cliquez sur Choisir. Les utilisateurs équipés de Leopard peuvent modifier leurs photos à l’aide de l’application Répertoire. Pour en savoir plus, consultez la rubrique « Utilisation des informations de répertoire sur les ordinateurs des utilisateurs de Leopard » à la page 110. Personnalisation du message électronique d’accueil Vous pouvez utiliser les Préférences du serveur pour ajouter votre nom, votre adresse, votre adresse électronique et une introduction personnelle au message électronique standard que votre serveur envoie aux nouveaux utilisateurs concernant ses services. Ce message standard précise le nom DNS du serveur, l’adresse électronique du destinataire et explique les services offerts par le serveur. Il comprend également des liens vers le partage de fichiers disponible et les services web. Le serveur envoie automatiquement un message chaque fois que vous ajoutez un compte utilisateur. Il n’envoie toutefois pas de message électronique si le service de messagerie n’est pas activé au moment où vous ajoutez des comptes utilisateur.90 Chapitre 5 Gestion des utilisateurs Pour personnaliser le courrier électronique envoyé aux nouveaux comptes utilisateur : 1 Dans la sous-fenêtre Utilisateur des Préférences du serveur, cliquez sur le bouton d’action et sélectionnez « Réglages des messages électroniques » dans le menu local. 2 Saisissez le nom et l’adresse électronique de l’expéditeur dans les champs « Nom complet de l’Admin » et « Adresse électronique de l’Admin ». 3 Vous pouvez également inscrire un message personnel dans le champ Accueil. Vous pouvez utiliser ce message pour vous introduire, les destinataires sauront ainsi qu’il s’agit d’un message authentique. Par exemple : Bonjour, je suis l’administrateur de notre serveur, monserveur.exemple.com. Si vous avez besoin d’aide pour en obtenir les services, n’hésitez pas à m’envoyer un courrier électronique ou à m’appeler au 01 23 45 67 89. —Frédéric. Les utilisateurs reçoivent le message électronique d’accueil lorsqu’ils commencent à utiliser leur compte de messagerie. Ils peuvent voir votre nom et votre message dans une section séparée du texte de message standard généré par le serveur.Chapitre 5 Gestion des utilisateurs 91 Personnalisation du message électronique d’invitation du serveur Vous pouvez utiliser les Préférences du serveur pour ajouter votre nom, votre adresse, votre adresse électronique et une introduction personnelle au message électronique standard que votre serveur peut envoyer pour expliquer aux nouveaux utilisateurs importés comment obtenir ses services. Ce message standard précise le nom DNS du serveur et explique les services offerts par le serveur. Les destinataires qui dispose de Mac OS X version 10.5 Leopard peuvent cliquer sur un bouton dans le courrier électronique pour configurer automatiquement leur Mac afin d’obtenir les services de votre serveur. Il comprend également des liens vers le partage de fichiers disponible et les services web. Vous pouvez sélectionner une option permettant d’envoyer ce message électronique lorsque vous importez des utilisateurs ou un groupe d’utilisateurs. Le serveur envoie l’invitation aux adresses électroniques figurant dans les comptes utilisateur importés. Le serveur n’envoie pas d’invitation aux comptes utilisateur importés ne contenant pas d’adresse électronique. Pour personnaliser le courrier électronique envoyé aux nouveaux comptes utilisateur importés : 1 Dans la sous-fenêtre Utilisateur des Préférences du serveur, cliquez sur le bouton d’action et sélectionnez « Réglages des messages électroniques » dans le menu local. 2 Saisissez le nom et l’adresse électronique de l’expéditeur dans les champs « Nom complet de l’Admin » et « Adresse électronique de l’Admin ». 3 Vous pouvez également inscrire un message personnel dans le champ d’invitation. Si vous ne voyez pas de champ Invitation, votre serveur n’est pas connecté à un serveur de répertoire. Consultez la rubrique « Connexion à un serveur de répertoire » à la page 162.92 Chapitre 5 Gestion des utilisateurs Vous pouvez utiliser ce message pour vous introduire, les destinataires sauront ainsi qu’il s’agit d’un message authentique. Par exemple : Bonjour, je suis l’administrateur de notre serveur, monserveur.exemple.com. Si vous avez besoin d’aide pour configurer votre ordinateur afin d’en obtenir les services, n’hésitez pas à m’envoyer un courrier électronique ou à m’appeler au 01 23 45 67 89. —Frédéric. Les destinataires peuvent voir votre nom et votre message dans une section séparée du texte de message standard généré par le serveur. Personnalisation du message électronique d’invitation du groupe Vous pouvez utiliser les Préférences du serveur pour ajouter votre nom, votre adresse, votre adresse électronique et une introduction personnelle au message électronique standard que votre serveur peut envoyer pour expliquer aux nouveaux utilisateurs externes d’un groupe comment obtenir les services de ce groupe. Ce message standard précise le nom du groupe et le nom DNS du serveur et explique les services offerts par ce serveur. Il comprend également des liens vers le partage de fichiers disponible et les services de groupes. Vous pouvez sélectionner une option permettant d’envoyer le message lorsque vous ajoutez des utilisateurs ou des groupes issus du serveur de répertoire de votre organisation en tant que membres externes d’un groupe sur votre serveur. Le serveur envoie l’invitation aux adresses électroniques figurant dans chaque compte utilisateur de nouveau membre externe. Le serveur n’envoie pas d’invitation aux nouveaux membres externes dont le compte utilisateur ne contient pas d’adresse électronique.Chapitre 5 Gestion des utilisateurs 93 Pour personnaliser le message électronique envoyé aux nouveaux membres externes d’un groupe : 1 Dans la sous-fenêtre Utilisateur des Préférences du serveur, cliquez sur le bouton d’action et sélectionnez « Réglages des messages électroniques » dans le menu local. 2 Saisissez le nom et l’adresse électronique de l’expéditeur dans les champs « Nom complet de l’Admin » et « Adresse électronique de l’Admin ». 3 Vous pouvez également inscrire un message personnel dans le champ d’invitation au groupe. Si vous ne voyez pas le champ Invitation au groupe, votre serveur n’est pas connecté à un serveur de répertoire. Consultez la rubrique « Connexion à un serveur de répertoire » à la page 162. Vous pouvez utiliser ce message pour vous introduire, les destinataires sauront ainsi qu’il s’agit d’un message authentique. Par exemple : Bonjour, je suis l’administrateur du serveur monserveur.exemple.com qui fournit des services qu groupe. Si vous avez besoin d’aide pour obtenir des services de groupe à partir du serveur, n’hésitez pas à m’envoyer un courrier électronique ou à m’appeler au 01 23 45 67 89. —Frédéric. Les destinataires peuvent voir votre nom et votre message dans une section séparée du texte de message standard généré par le serveur.6 95 6 Gestion des ordinateurs des utilisateurs Apprenez à aider les utilisateurs à configurer leur ordinateur de manière à pouvoir utiliser les services fournis par votre serveur. Les utilisateurs ont besoin de configurer leur ordinateur pour bénéficier des services de votre serveur. Les utilisateurs qui disposent de Mac OS X 10.5 Leopard peuvent configurer leur ordinateur automatiquement. Ceux qui disposent de Mac OS X ou de Windows doivent le configurer manuellement. Les utilisateurs dont le Mac est doté de Leopard et qui sont connectés à votre serveur peuvent utiliser l’application Répertoire pour partager des contacts, ajouter des groupes, configurer des services de groupe et gérer leurs propres informations de contact. Configuration automatique des ordinateurs Mac Leopard Les utilisateurs qui disposent de Mac OS X v10.5 Leopard peuvent configurer automatiquement leur ordinateur Mac pour bénéficier de services disponibles sur votre serveur. Comme expliqué dans le tableau suivant, la procédure de configuration varie selon trois types d’utilisateurs de Leopard.96 Chapitre 6 Gestion des ordinateurs des utilisateurs Une fois que l’utilisateur a accompli l’une des procédures de configuration automatique, il est prêt à accéder aux services présentés dans le tableau de la page suivante (il ne peut, bien évidemment, accéder qu’aux services activés). Le compte local de l’utilisateur est rattaché à son compte serveur et porte la mention « Géré » dans la sous-fenêtre Comptes de Préférences Système. Les deux comptes ont le même mot de passe.  Si le compte serveur de l’utilisateur est nouveau, son mot de passe est remplacé par le mot de passe du compte local de l’utilisateur.  Si le compte serveur de l’utilisateur est importé à partir d’un compte existant sur un serveur de répertoire, le mot de passe de ce compte remplace le mot de passe du compte local de l’utilisateur. Configuration automatique pour les Commence dès que les utilisateurs ont Pour obtenir des informations, voir nouveaux utilisateurs de Leopard (qui ont un nouveau Mac ou qui ont récemment installé Leopard) si la configuration de votre serveur est standard. effectué l’étape correspondant à la sous-fenêtre « Se connecter à Mac OS X Server » lors de la configuration de Leopard. « Configuration de services pour les nouveaux utilisateurs de Leopard » ci-dessous. utilisateurs actuels de Leopard dont vous importez les comptes depuis un serveur de répertoire. cliqué sur le bouton dans le courrier électronique d’invitation reçu. « Configuration d’utilisateurs Leopard à partir d’un message d’invitation » à la page 101. utilisateurs actuels de Leopard dont vous créez les comptes sur le serveur. ouvert l’application Utilitaire d’annuaire (ou après l’ouverture automatique de cet utilitaire). « Configuration d’un Mac à l’aide de l’Utilitaire d’annuaire » à la page 103.Chapitre 6 Gestion des ordinateurs des utilisateurs 97 Si l’utilisateur change le mot de passe dans la sous-fenêtre Comptes de Préférences Système, le mot de passe du compte serveur est modifié en conséquence. Si les comptes d’un utilisateur ont été créés avec différents noms d’utilisateur, l’utilisateur peut modifier le nom complet du compte local à l’aide de la sous-fenêtre Comptes de Préférences Système. Il peut également utiliser l’application Répertoire pour changer le nom complet du compte serveur. Pour obtenir des informations sur les comptes utilisateur locaux, les comptes serveur et les comptes importés, reportez-vous à la rubrique « À propos des comptes utilisateur » à la page 68. Application prête à accéder Carnet d’adresses à d’autres coordonnées d’utilisateur. Répertoire à des informations sur les utilisateurs, les groupes et les ressources. Finder aux dossiers partagés. iCal au calendrier personnel de l’utilisateur et au calendrier de groupe. iChat au compte Jabber de l’utilisateur et à sa liste de contacts. Mail au compte de messagerie de l’utilisateur et aux adresses électroniques des contacts de l’utilisateur.98 Chapitre 6 Gestion des ordinateurs des utilisateurs Safari au site web du serveur : http://monserveur.exemple.com Wikis de groupe : http://monserveur.exemple.com/groups Blogs d’utilisateurs : http://monserveur.exemple.com/users Webmail : http://monserveur.exemple.com/webmail Préférences Réseau à la connexion VPN Application prête à accéderChapitre 6 Gestion des ordinateurs des utilisateurs 99 Configuration de services pour les nouveaux utilisateurs de Leopard Pendant la configuration initiale d’un nouveau Mac ou d’un Mac équipé de Mac OS X 10.5 Leopard nouvellement installé, la sous-fenêtre « Se connecter à Mac OS X Server » permet à l’utilisateur de choisir votre serveur si sa configuration est la configuration standard de Leopard Server et s’il possède un compte sur le serveur. (La configuration d’un serveur est standard si celui-ci ne comporte pas de comptes utilisateurs importés et s’il n’est pas connecté à un serveur de répertoire.) L’utilisateur choisit votre serveur L’utilisateur spécifie un compte sur votre serveur100 Chapitre 6 Gestion des ordinateurs des utilisateurs Ce sous-volet apparaît uniquement si le Mac détecte une configuration standard de Leopard Server sur le réseau. Ce sous-volet ne permet pas à un utilisateur de choisir une configuration de groupe de travail de Leopard Server. (Un serveur possède une configuration de groupe de travail s’il est connecté à un serveur de répertoire. Consultez la rubrique « Connexion à un serveur de répertoire » page 136.) Si l’utilisateur accompli l’étape correspondant à cette sous-fenêtre :  Un compte utilisateur local est créé sur le Mac de l’utilisateur à partir du compte spé- cifié sur le serveur. Les deux comptes ont les mêmes nom complet, nom abrégé et mot de passe.  Un dossier de départ est configuré sur l’ordinateur de l’utilisateur.  L’ordinateur de l’utilisateur est automatiquement connecté à votre serveur et configuré pour bénéficier des services de ce dernier. Pour savoir comment l’ordinateur obtient des services, reportez-vous à la rubrique « Configuration automatique des ordinateurs Mac Leopard » à la page 95. Il peut arriver, pour diverses raisons, que l’utilisateur ne parvienne pas à terminer l’étape correspondant à la sous-fenêtre « Se connecter à Mac OS X Server ». Par exemple :  Il ne connaît pas le nom de votre serveur ou ne possède pas de compte utilisateur sur le serveur. Si tel est le cas, il peut ignorer la sous-fenêtre « Se connecter à Mac OS X Server » en désélectionnant l’option « Utiliser le Mac OS X Server suivant ».  Son Mac n’est pas connecté au réseau lors de la configuration initiale. Si tel est le cas, la sous-fenêtre « Créer votre compte » apparaît à la place de la sous-fenêtre « Se connecter à Mac OS X Server ». L’utilisateur crée alors un nouveau compte sans se baser sur le compte serveur.Chapitre 6 Gestion des ordinateurs des utilisateurs 101 Si l’utilisateur ne termine pas l’étape correspondant à la sous-fenêtre « Se connecter à Mac OS X Server », quelle qu’en soit la raison, il peut mettre fin à la configuration initiale, puis configurer le Mac pour bénéficier des services disponibles sur votre serveur. Pour savoir comment procéder, reportez-vous à la rubrique « Configuration d’un Mac à l’aide de l’Utilitaire d’annuaire » à la page 103. Configuration d’utilisateurs Leopard à partir d’un message d’invitation Si Mac OS X 10.5 Leopard est déjà installé sur les ordinateurs de certains utilisateurs et si vous importez leurs comptes utilisateur à partir d’un serveur de répertoire, vous pouvez leur envoyer un message électronique les invitant à se joindre au serveur. Les utilisateurs de Leopard peuvent cliquer sur un bouton dans ce message d’invitation pour lancer un assistant qui connecte leur ordinateur au serveur et configure leurs applications pour obtenir les services de votre serveur. Pour en savoir plus sur l’assistant, consultez la rubrique « Configuration d’un Mac à l’aide de l’Utilitaire d’annuaire ». Remarque : pour recevoir un message d’invitation, un utilisateur importé doit avoir une adresse électronique dans le compte utilisateur situé sur le serveur de répertoire. Seuls les utilisateurs qui ont des comptes utilisateur importés reçoivent ce message d’invitation. Les utilisateurs dont les comptes sont créés par vous sur votre serveur ne reçoivent pas de message d’invitation. Les deux rubriques suivantes expliquent comment leurs ordinateurs peuvent être configurés.102 Chapitre 6 Gestion des ordinateurs des utilisateurs Lorsqu’un utilisateur de Leopard clique sur le bouton se trouvant dans le message d’invitation pour utiliser l’assistant, celui-ci recherche sur le serveur un compte utilisateur dont le nom complet ou abrégé correspond au compte utilisateur local dont la session est actuellement ouverte sur l’ordinateur de l’utilisateur. Si l’assistant trouve un tel nom, il demande à l’utilisateur s’il veut rattacher le compte local au compte serveur. Si celui-ci accepte, le compte local est modifié de manière à utiliser le mot de passe du compte serveur. Le dossier de départ de l’utilisateur demeure sur son ordinateur. L’utilisateur choisit ensuite de configurer ou non ses applications pour obtenir les services disponibles sur le serveur. Pour savoir comment les applications sont configurées, reportezvous à la rubrique « Configuration automatique des ordinateurs Mac Leopard » à la page 95. Pour obtenir des informations sur l’ajout de votre nom, votre adresse électronique et une introduction personnelle au message électronique standard que votre serveur élabore comme courrier électronique d’invitation, consultez la rubrique « Personnalisation du message électronique d’invitation du serveur » à la page 91.Chapitre 6 Gestion des ordinateurs des utilisateurs 103 Configuration d’un Mac à l’aide de l’Utilitaire d’annuaire Si un Mac équipé de Mac OS X 10.5 Leopard n’est pas encore connecté à un serveur et si Leopard détecte votre serveur sur le réseau, l’Utilitaire d’annuaire s’ouvre automatiquement. Un assistant s’affiche alors et connecte le Mac au serveur, puis configure les applications du Mac pour qu’elles utilisent les services du serveur. L’utilisateur peut également ouvrir manuellement l’Utilitaire d’annuaire qui affichera l’assistant s’il détecte votre serveur. 104 Chapitre 6 Gestion des ordinateurs des utilisateurs Lors de l’utilisation de l’assistant :  L’utilisateur décide s’il configure le Mac pour obtenir les services disponibles sur votre serveur. Si l’utilitaire trouve plusieurs serveurs qui peuvent fournir des services, il pré- sente une liste de ces serveurs en les triant par nom d’ordinateur et par adresse IP. L’utilisateur doit alors savoir quel serveur choisir. La liste contient uniquement les serveurs ayant une configuration standard ou de groupe de travail Leopard Server.  L’utilisateur saisit le nom et le mot de passe du compte utilisateur sur le serveur et le mot de passe du compte utilisateur local dont la session est actuellement ouverte sur son ordinateur. Le mot de passe du compte serveur est alors remplacé par le mot de passe du compte local. Le dossier de départ de l’utilisateur demeure sur son ordinateur.  L’utilisateur choisit ensuite de configurer ou non ses applications pour obtenir les services disponibles sur le serveur. Pour savoir comment les applications obtiennent ces services, reportez-vous à la rubrique « Configuration automatique des ordinateurs Mac Leopard » à la page 95.Chapitre 6 Gestion des ordinateurs des utilisateurs 105 Configuration manuelle des ordinateurs des utilisateurs Les utilisateurs qui disposent de Mac OS X 10.4 Tiger ou d’une version antérieure, ou ceux qui utilisent Windows, peuvent bénéficier des services de votre serveur en configurant manuellement leurs applications. Ils peuvent utiliser les réglages présentés dans le tableau suivant, en remplaçant les exemples de données en italique par le nom DNS de votre serveur et par leur nom abrégé d’utilisateur. Application Réglages Finder (partage de fichiers) afp://monserveur.exemple.com smb://monserveur.exemple.com iChat (application de messagerie instantanée XMPP) Type de compte : Jabber Serveur : monserveur.exemple.com Identifiant Jabber : nomabrégé@monserveur.exemple.com Authentification : Kerberos v5 de préférence Port : 5223 Mail (application de courrier électronique) Type de compte : IMAP ou POP Serveur de courrier entrant : monserveur.exemple.com Serveur de courrier sortant : monserveur.exemple.com Adresse électronique : nomabrégé@monserveur.exemple.com Authentification : Kerberos v5 de préférence iCal (application de calendrier CalDAV) S’abonner à : http://monserveur.exemple.com:8008/ principals/users/nomabrégé Si l’application calendrier prend en charge le protocole SSL, inscrivez-vous à : http://monserveur.exemple.com: 8443/principals/users/nomabrégé106 Chapitre 6 Gestion des ordinateurs des utilisateurs Safari (navigateur web) Site web : http://monserveur.exemple.com Wikis de groupe : http://monserveur.exemple.com/groups Blogs d’utilisateurs : http://monserveur.exemple.com/users Webmail : http://monserveur.exemple.com/webmail Connexion à Internet (connexion VPN) Voir « Configuration d’une connexion VPN pour les utilisateurs Mac » ci-dessous, ou « Configuration manuelle de la connexion VPN d’un utilisateur » à la page 109. Application RéglagesChapitre 6 Gestion des ordinateurs des utilisateurs 107 Configuration d’une connexion VPN pour les utilisateurs Mac Vous pouvez utiliser Préférences du serveur pour générer un fichier que les utilisateurs Mac peuvent ouvrir en vue de créer automatiquement une configuration VPN. L’utilisateur peut ensuite établir une connexion VPN au serveur et à son réseau via Internet. Le fichier de configuration fonctionne avec Mac OS X 10.3 ou ultérieur. Pour savoir comment générer un fichier de configuration, reportez-vous à la page 151. Lorsque vous donnez aux utilisateurs Mac un fichier de configuration VPN que vous avez généré, vous pouvez également leur fournir les instructions suivantes.108 Chapitre 6 Gestion des ordinateurs des utilisateurs Utilisation d’un fichier de configuration VPN Si la personne qui gère votre serveur vous a remis un fichier de configuration VPN et si vous disposez de Mac OS X 10.3 ou ultérieur, vous pouvez utiliser ce fichier pour configurer votre ordinateur en vue d’établir des connexions VPN au serveur. Le fichier de configuration contient toutes les informations nécessaires à l’établissement d’une connexion VPN au serveur, à l’exception du nom et du mot de passe de votre compte utilisateur sur le serveur. Pour importer une configuration VPN à partir d’un fichier : 1 Ouvrez le fichier et sélectionnez VPN (L2TP) si l’on vous demande où placer la configuration importée. 2 Saisissez le nom de votre compte utilisateur dans le champ Nom de compte. 3 Si l’administrateur du serveur vous demande de saisir le mot de passe de votre compte utilisateur, saisissez-le dans le champ Mot de passe. Si vous disposez de la version Mac OS X 10.5 Leopard, cliquez sur Réglages d’authentification pour voir le champ Mot de passe. Pour des raisons de sécurité, l’administrateur peut vous demander de ne pas saisir votre mot de passe pour l’instant. 4 Quittez l’application et enregistrez ou appliquez les modifications à l’invite. Si vous voulez établir une connexion VPN à partir d’un réseau équipé d’un coupe-feu, configurez ce dernier pour qu’il autorise le trafic sur les ports UDP 500 et 4500, ainsi que sur le protocole IP 50. Si vous n’avez pas saisi votre mot de passe avant d’enregistrer la configuration VPN, il vous sera demandé de le saisir à chaque fois que vous établirez une connexion VPN au serveur.Chapitre 6 Gestion des ordinateurs des utilisateurs 109 Configuration manuelle de la connexion VPN d’un utilisateur Il arrive que des utilisateurs ne puissent pas importer des réglages VPN à partir d’un fichier de configuration, car ils ne disposent pas du fichier ou qu’ils utilisent des ordinateurs Windows qui ne peuvent pas utiliser ce fichier. Ces utilisateurs peuvent configurer manuellement leurs ordinateurs pour établir une connexion VPN à votre serveur. Pour ce faire, ils doivent créer une nouvelle configuration VPN et saisir les réglages de connexion VPN suivants :  Serveur ou hôte VPN : nom DNS de votre serveur ou son adresse IP publique.  Type de VPN : L2TP via IPSec.  Secret partagé (clé) pour IPSec : apparaît dans la sous-fenêtre VPN de Préférences du serveur lorsque vous cliquez sur Modifier, puis que vous sélectionnez « Afficher secret partagé ».  Nom de compte : nom abrégé du compte de l’utilisateur sur votre serveur.  Mot de passe de l’utilisateur : mot de passe du compte de l’utilisateur sur votre serveur. Les utilisateurs qui veulent établir une connexion VPN à partir d’un ordinateur équipé d’un coupe-feu doivent configurer le coupe-feu de manière à autoriser le trafic sur les ports UDP 500 et 4500, ainsi que sur le protocole IP 50.110 Chapitre 6 Gestion des ordinateurs des utilisateurs Utilisation des informations de répertoire sur les ordinateurs des utilisateurs de Leopard Les utilisateurs équipés de Mac OS X 10.5 Leopard peuvent utiliser l’application Répertoire pour afficher des informations partagées sur des personnes, des groupes, des emplacements et des ressources. Ils peuvent utiliser Répertoire pour partager des contacts, ajouter et supprimer des groupes, modifier leur appartenance aux groupes, configurer des services de groupe et gérer leurs propres coordonnées. Chapitre 6 Gestion des ordinateurs des utilisateurs 111 Lorsque des utilisateurs consultent des informations sur d’autres personnes, ils ne voient pas seulement leurs coordonnées. Répertoire peut afficher la photo de la personne concernée, présenter une liste des groupes publics auxquels elle appartient, présenter une liste de ses supérieurs et de ses subalternes directs et afficher une carte permettant de localiser l’endroit où se trouve la personne. Répertoire fonctionne avec plusieurs applications Mac OS X. Les utilisateurs peuvent créer des contacts partagés à partir des entrées de Carnet d’adresses, cliquer sur des adresses électroniques pour envoyer des messages à l’aide de Mail ou visiter les sites web wiki de groupe à l’aide de Safari. Répertoire permet aux utilisateurs de consulter les enregistrements stockés dans le répertoire de votre serveur. Si votre serveur est connecté à un serveur de répertoire, Répertoire montre également les enregistrements stockés sur ce serveur. Remarque : les modifications effectuées par les utilisateurs à l’aide de Répertoire sont visibles dans Préférences du serveur. Pour afficher les modifications les plus récentes effectuées avec Répertoire, sélectionnez Présentation > Actualiser dans Préférences du serveur. Pour savoir comment utiliser Répertoire, ouvrez-le et utilisez le menu Aide. Répertoire est disponible dans /Applications/Utilitaires/.7 113 7 Gestion des groupes Utilisez la sous-fenêtre Groupes pour ajouter ou supprimer des groupes, afficher et modifier des compositions de groupe ou configurer des services de groupe. La sous-fenêtre Groupes vous permet de créer des groupes, de configurer des services de groupe tels que les wikis et les blogs, d’ajouter et de supprimer des membres dans des groupes et de supprimer des groupes inutiles. Pour obtenir des informations sur les réglages et les commandes de cette sous-fenêtre, cliquez sur le bouton Aide situé dans le coin inférieur droit de la fenêtre Préférences du serveur.114 Chapitre 7 Gestion des groupes Création d’un nouveau groupe Vous pouvez créer un nouveau groupe lorsque des utilisateurs de serveur ont besoin de leurs propres listes d’envoi, dossier de groupe partagé, wiki et blog, calendrier ou archives de liste d’envoi. Vous devez sélectionner les services disponibles pour chaque groupe. Pour créer un nouveau groupe : 1 Cliquez sur le bouton Ajouter (+) dans la sous-fenêtre Groupes de Préférences du serveur. 2 Tapez le nom du groupe, changez éventuellement le nom abrégé, puis cliquez sur Créer le groupe.Chapitre 7 Gestion des groupes 115 Le nom du groupe peut comporter jusqu’à 255 caractères (de 255 caractères latins à seulement 85 caractères japonais). Ce nom peut comporter des espaces. Une fois le compte créé, vous ne pourrez plus modifier le nom abrégé. Si vous ne souhaitez pas utiliser le nom abrégé généré automatiquement, tapez un nouveau nom abrégé. Le nom abrégé se limite généralement à huit caractères, mais il peut comporter jusqu’à 255 caractères latins. Utilisez uniquement les caractères a à z, A à Z, 0 à 9, _ (souligné), ou - (tiret). 3 Sélectionnez les services à mettre à la disposition de ce groupe. Dossier de partage de fichiers : permet de configurer un dossier de groupe partagé afin que les membres du groupe puissent accéder aux fichiers du dossier de groupe partagé et y placer leurs propres fichiers. Ce dossier porte le nom abrégé du groupe et se trouve sur le disque de démarrage du serveur, dans /Groupes/. Liste d’envoi : une adresse électronique de groupe est définie à l’aide du nom abrégé du groupe et les membres du groupe reçoivent tous les messages électroniques envoyés à l’adresse du groupe. Wiki et blog : permet aux membres d’un groupe d’utiliser leur navigateur web pour afficher le wiki du groupe et y contribuer. Calendrier web : permet aux membres d’un groupe d’utiliser leur navigateur web pour consulter le calendrier du groupe et y ajouter des événements. Archives web de liste d’envoi : permet aux membres d’un groupe de lire des messages électroniques archivés envoyés à l’adresse électronique du groupe. 4 Ajoutez des utilisateurs au groupe en cliquant sur Membres et ajoutez des utilisateurs et des groupes provenant du serveur de répertoire de votre organisation en cliquant sur Membres externes.116 Chapitre 7 Gestion des groupes Pour obtenir des instructions, consultez les rubriques « Ajout ou suppression de membres d’un groupe » à la page 118 et « Ajout ou suppression de membres externes d’un groupe » à la page 120. Si vous ne voyez pas d’onglet Membres externes (présenté à la page 120), votre serveur n’est pas connecté à un serveur de répertoire. Consultez la rubrique « Connexion à un serveur de répertoire » à la page 162. Pour accéder aux services de groupe, les membres du groupe doivent s’authentifier à l’aide du nom et du mot de passe de leur compte utilisateur. Les services du groupe ne sont disponibles que si le service de partage de fichiers, le service iCal, les services web et le service de messagerie sont activés. Les utilisateurs disposant de Leopard peuvent ajouter des groupes à l’aide de l’application Répertoire. Pour en savoir plus, consultez la rubrique « Utilisation des informations de répertoire sur les ordinateurs des utilisateurs de Leopard » à la page 110.Chapitre 7 Gestion des groupes 117 Suppression d’un groupe Vous pouvez utiliser Préférences du serveur pour supprimer les groupes devenus inutiles. Pour supprimer un groupe : 1 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez le groupe à supprimer dans la liste de gauche. 2 Cliquez sur le bouton Supprimer (–). Après avoir supprimé un groupe, le dossier partagé du groupe et le dossier de sites web demeurent sur le disque de démarrage du serveur. Le dossier partagé se trouve dans /Groups/ et le dossier de sites web du groupe dans /Bibliothèque/Collaboration/Groups/. Vous pouvez conserver ces dossiers ou les faire glisser dans la corbeille. Les utilisateurs disposant de Leopard peuvent supprimer des groupes à l’aide de l’application Répertoire. Pour obtenir des instructions, les utilisateurs peuvent ouvrir Répertoire, puis consulter le menu Aide.118 Chapitre 7 Gestion des groupes Ajout ou suppression de membres d’un groupe La sous-fenêtre Groupes vous permet d’ajouter ou de supprimer des membres de groupe qui sont des utilisateurs que vous avez créés ou importés dans la sous-fenêtre Utilisateurs. (Pour disposer d’utilisateurs importés, votre serveur doit être connecté à un serveur de répertoire.)Chapitre 7 Gestion des groupes 119 Pour ajouter ou supprimer des membres d’un groupe : 1 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez le groupe à modifier dans la liste de gauche. 2 Cliquez sur Membres, puis sur Modifier l’adhésion. 3 Cochez la case en regard de chaque utilisateur que vous souhaitez intégrer au groupe. Désactivez la case en regard de chaque utilisateur à retirer du groupe. 4 Une fois que vous avez terminé, cliquez à nouveau sur Modifier l’adhésion pour afficher une liste statique des membres du groupe. Les utilisateurs disposant de Leopard peuvent ajouter et supprimer des membres de groupe à l’aide de l’application Répertoire. Pour en savoir plus, consultez la rubrique « Utilisation des informations de répertoire sur les ordinateurs des utilisateurs de Leopard » à la page 110. Pour en savoir plus sur l’ajout, la suppression ou la configuration des comptes utilisateur, reportez-vous au chapitre 5, « Gestion des utilisateurs ».120 Chapitre 7 Gestion des groupes Ajout ou suppression de membres externes d’un groupe Si votre serveur est connecté à un serveur de répertoire, les membres de votre groupe peuvent inclure des utilisateurs et un groupe issu du serveur de répertoire. Les membres externes ne disposent pas de compte utilisateur sur votre serveur, mais peuvent utiliser le site web wiki de groupe. Utilisez la sous-fenêtre Groupes pour ajouter ou supprimer des membres externes.Chapitre 7 Gestion des groupes 121 Pour ajouter ou supprimer des membres externes : 1 Avant d’ajouter des membres externes, assurez-vous que le message électronique d’invitation est formulé conformément à vos besoins. Pour en savoir plus, consultez la rubrique « Personnalisation du message électronique d’invitation du groupe » à la page 92 ; 2 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez le groupe à modifier dans la liste de gauche, puis cliquez sur Membres externes. Si vous ne voyez pas d’onglet Membres externes, votre serveur n’est pas connecté à un serveur de répertoire. Consultez la rubrique « Connexion à un serveur de répertoire » à la page 162. 3 Pour supprimer un membre externe du groupe, sélectionnez le membre dans la liste de droite et cliquez sur le bouton Supprimer (–) sous la liste. 4 Pour ajouter un membre au groupe, cliquez sur le bouton Ajouter (+) sous la liste des membres. 5 Sélectionnez un membre potentiel dans la liste, sélectionnez éventuellement « Envoyer une invitation électronique aux utilisateurs ajoutés », puis cliquez sur Ajouter au groupe. Pour rechercher un utilisateur ou un groupe, tapez le début du nom dans le champ de recherche. Pour afficher ou masquer des utilisateurs ou des groupes situés sous un titre particulier, cliquez sur le triangle qui se trouve dans le titre. 6 Une fois que vous avez fini d’ajouter des membres, cliquez sur Terminé. Pour en savoir plus sur l’ajout, la suppression ou la configuration des comptes utilisateur, reportez-vous au chapitre 5, « Gestion des utilisateurs ».122 Chapitre 7 Gestion des groupes Modification des réglages de groupe Vous pouvez modifier le nom d’un groupe ou configurer des services de groupe en cliquant sur Groupes dans la sous-fenêtre Utilisateurs de Préférences du serveur. Les services de groupe incluent un dossier de groupe partagé, une liste d’envoi de groupe, un site web de groupe avec wiki et blog, un calendrier web et des archives web de liste d’envoi. Pour obtenir des informations sur les réglages et les commandes disponibles dans cette sous-fenêtre, cliquez sur le bouton Aide situé dans le coin inférieur droit de la fenêtre Préférences du serveur.Chapitre 7 Gestion des groupes 123 Modification du nom d’un groupe Vous pouvez utiliser Préférences du serveur pour modifier le nom d’un groupe. Pour modifier le nom d’un groupe : 1 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez le groupe à modifier dans la liste de gauche, puis cliquez sur Réglages du groupe. 2 Modifiez le champ Nom du groupe. Le nom peut comporter jusqu’à 255 caractères (de 255 caractères latins à seulement 85 caractères japonais). Ce nom peut comporter des espaces. Vous ne pouvez pas changer le nom abrégé d’un groupe à l’aide de Préférences du serveur. Configuration d’un dossier de partage de fichiers d’un groupe Vous pouvez utiliser Préférences du serveur pour configurer un dossier partagé de groupe. Les membres du groupe peuvent consulter des fichiers dans le dossier de groupe partagé et y placer leurs propres fichiers. Ce dossier porte le nom abrégé du groupe et se trouve sur le disque de démarrage du serveur, dans /Groups/. Pour configurer un dossier de partage de fichiers pour un groupe : 1 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez un groupe dans la liste de gauche ou créez un nouveau groupe, puis cliquez sur Réglages du groupe. Pour en savoir plus, consultez la rubrique « Création d’un nouveau groupe » à la page 114. 2 Sélectionnez « Dossier de partage de fichiers ».124 Chapitre 7 Gestion des groupes 3 Cliquez sur Tout afficher, puis sur Partage de fichiers et assurez-vous que le service de partage de fichiers et l’accès au dossier partagé Groupe sont activés. Les membres du groupe s’authentifient à l’aide du nom et du mot de passe de leur compte utilisateur pour accéder au dossier partagé du groupe. Configuration d’une liste d’envoi de groupe Vous pouvez utiliser Préférences du serveur pour configurer une liste d’envoi de groupe. L’adresse électronique du groupe est constituée à partir du nom abrégé du groupe. Le serveur récupère les messages électroniques envoyés à cette adresse et les envoie à l’adresse électronique de chaque membre du groupe. Pour configurer la liste d’envoi d’un groupe : 1 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez un groupe dans la liste de gauche ou créez un nouveau groupe, puis cliquez sur Réglages du groupe. 2 Sélectionnez « Liste d’envoi ». 3 Cliquez sur Tout afficher et assurez-vous que le service de messagerie est activé. Configuration du site web wiki d’un groupe Vous pouvez utiliser Préférences du serveur pour configurer un site web avec wiki, blog, calendrier (facultatif) et archives de liste d’envoi facultatif) de groupe. À l’aide de leur navigateur web, les membres du groupe peuvent afficher le wiki et le blog du groupe et y contribuer, vérifier le calendrier du groupe et y ajouter des événements, et lire les messages électroniques archivés envoyés à l’adresse électronique du groupe.Chapitre 7 Gestion des groupes 125 Pour configurer le site web wiki d’un groupe : 1 Dans la sous-fenêtre Groupes de Préférences du serveur, sélectionnez un groupe dans la liste de gauche ou créez un nouveau groupe, puis cliquez sur Réglages du groupe. 2 Sélectionnez « Wiki et blog ». 3 Sélectionnez Calendrier web si vous voulez que le site web du groupe comprenne un calendrier partagé. 4 Sélectionnez « Archives web de liste d’envoi » et « Liste d’envoi » si vous voulez que le site web du groupe comprenne des archives de liste d’envoi. 5 Cliquez sur Tout afficher, puis sur Web et assurez-vous que le service web est activé et que l’option « Activer les wikis de groupe » est sélectionnée. 6 Si vous avez activé le calendrier web à l’étape 3, cliquez sur Tout afficher et assurez-vous que le service iCal est activé. 7 Si vous avez activé l’option d’archives web de liste d’envoi à l’étape 4, cliquez sur Tout afficher et assurez-vous que le service de messagerie est activé. Vous pouvez ouvrir le site web wiki du groupe en cliquant sur la flèche de lien en regard de « Wiki et blog ». Vous pouvez ouvrir le calendrier web du groupe en cliquant sur la flèche de lien en regard de « Calendrier web ». Pour en savoir plus sur l’utilisation du wiki, du blog, du calendrier et des archives de liste d’envoi, reportez-vous à l’aide disponible sur le site web du groupe. Les membres du groupe peuvent accéder à leur site web à l’adresse suivante : http://nomDNSduserveur/groups/nomabrégédugroupe126 Chapitre 7 Gestion des groupes Remplacez les exemples en italique par le nom DNS du serveur et le nom abrégé du groupe. Le nom DNS du serveur est affiché dans la sous-fenêtre Information de Préfé- rences du serveur. Les membres du groupe doivent ouvrir une session à l’aide du nom et du mot de passe de leur compte utilisateur pour accéder au wiki, au blog, au calendrier web ou aux archives web de la liste d’envoi du groupe. Vous pouvez contrôler l’accès aux services du groupe en utilisant l’application Répertoire (située dans /Applications/Utilitaires/). Pour savoir comment utiliser Répertoire, ouvrez l’application et utilisez le menu Aide. Configuration du calendrier d’un groupe Vous pouvez utiliser Préférences du serveur pour configurer un calendrier de groupe dans le cadre d’un site web wiki. Les utilisateurs peuvent utiliser leur navigateur web pour consulter le calendrier du groupe et y ajouter des événements. Pour configurer le calendrier web d’un groupe dans le cadre d’un site web wiki : 1 Dans la sous-fenêtre Groupes de Préférences du serveur, cliquez sur Réglages du groupe et, dans la liste de gauche, sélectionnez un groupe disposant d’un site web wiki. 2 Sélectionnez « Calendrier web ». 3 Cliquez sur Tout afficher, puis sur iCal et assurez-vous que le service iCal est activé. Vous pouvez ouvrir le calendrier web du groupe en cliquant sur la flèche de lien située en regard de « Calendrier web ».Chapitre 7 Gestion des groupes 127 Les membres du groupe peuvent afficher leur calendrier web à l’adresse suivante : http://nomDNSduserveur/groups/nomabrégédugroupe/calendar Remplacez les exemples en italique par le nom DNS du serveur et le nom abrégé du groupe. Le nom DNS du serveur est affiché dans la sous-fenêtre Information de Préfé- rences du serveur. Les membres du groupe doivent ouvrir une session à l’aide du nom et du mot de passe de leur compte utilisateur pour accéder au calendrier web du groupe. Configuration des archives de la liste d’envoi d’un groupe Vous pouvez utiliser Préférences du serveur pour configurer les archives de la liste d’envoi d’un groupe dans le cadre d’un site web wiki. Ce service permet aux utilisateurs d’utiliser leur navigateur web pour lire les messages électroniques archivés envoyés à l’adresse électronique du groupe. Pour configurer des archives web de liste d’envoi : 1 Dans la sous-fenêtre Groupes de Préférences du serveur, cliquez sur Réglages du groupe et, dans la liste de gauche, sélectionnez un groupe disposant d’un site web wiki. 2 Sélectionnez « Archives web de liste d’envoi » et « Liste d’envoi ». 3 Cliquez sur Tout afficher, puis sur Mail et assurez-vous que le service de messagerie est activé. Les membres du groupe peuvent consulter leurs archives web de liste d’envoi à l’adresse suivante : http://nomDNSduserveur/groups/nomabrégédugroupe/mailinglist128 Chapitre 7 Gestion des groupes Remplacez les exemples en italique par le nom DNS du serveur et le nom abrégé du groupe. Le nom DNS du serveur est affiché dans la sous-fenêtre Information de Préfé- rences du serveur. Les membres du groupe doivent ouvrir une session à l’aide du nom et du mot de passe de leur compte utilisateur pour accéder aux archives web de la liste d’envoi du groupe.8 129 8 Personnalisation des services Utilisez Préférences du serveur pour modifier les réglages de partage de fichiers, d’iCal, d’iChat, de Mail, du service web et des services VPN. Gestion du service de partage de fichiers Utilisez la sous-fenêtre Partage de fichiers pour activer et désactiver le service de partage de fichiers ou l’accès sécurisé aux dossiers partagés Groupes et Public. Vous pouvez aussi ajouter vos propres dossiers partagés, également connus sous le nom de points de partage, ou les supprimer. Pour obtenir des informations sur les réglages et les commandes de cette sous-fenêtre, cliquez sur le bouton Aide dans le coin inférieur droit de la fenêtre Préférences du serveur.130 Chapitre 8 Personnalisation des services À propos du service de partage de fichiers Mac OS X Server Le service de partage de fichiers permet aux utilisateurs d’accéder aux dossiers partagés et de stocker des fichiers sur le serveur. Ceux-ci peuvent utiliser des ordinateurs Macintosh, Windows ou UNIX pour accéder à leurs fichiers et dossiers partagés sans logiciel spécifique et ce, à l’aide de protocoles de fichiers natifs, notamment les protocoles AFP et SMB. Les utilisateurs de Windows voient les serveurs de fichiers Mac OS X Server dans leurs Favoris réseau, de la même manière que les serveurs de fichiers Windows. Ajout d’un dossier partagé Vous pouvez ajouter un dossier partagé que les utilisateurs peuvent sélectionner lorsqu’ils se connectent au serveur pour le partage de fichiers. Les utilisateurs de Mac voient le dossier partagé comme un disque partagé dans le Finder. Les utilisateurs de Windows voient le dossier partagé dans les Favoris réseau. Les dossiers partagés sont également appelés points de partage.Chapitre 8 Personnalisation des services 131 Pour ajouter un dossier partagé : 1 Si vous voulez partager un fichier qui n’existe pas encore, créez-le et donnez-lui un nom dans le Finder. 2 Dans la sous-fenêtre Partage de fichiers de Préférences du serveur, cliquez sur le bouton Ajouter (+), sélectionnez le dossier que vous souhaitez partager et cliquez sur Ouvrir. Si vous utilisez Préférences du serveur sur le serveur, vous pouvez également faire glisser un dossier à partager depuis une fenêtre du Finder pour le placer dans la liste de la sous-fenêtre Partage de fichiers. 3 Pour autoriser les utilisateurs à accéder à ce dossier sans devoir ouvrir une session ou pour modifier la liste des utilisateurs pouvant accéder à ce dossier partagé, cliquez sur Modifier les autorisations. Pour obtenir des informations, consultez la rubrique « Contrôle de l’accès au dossier partagé » à la page 132. Si vous voulez configurer un dossier de partage de fichiers de groupe, utilisez la sousfenêtre Groupes de Préférences du serveur. Les dossiers de partage de fichiers de groupe se trouvent dans /Groups/ dossier partagé. Pour obtenir des instructions, consultez la rubrique « Configuration d’un dossier de partage de fichiers d’un groupe » à la page 123. Suppression d’un dossier partagé Vous pouvez utiliser Préférences du serveur pour supprimer les dossiers partagés que vous ne souhaitez plus utiliser pour le partage de fichiers. Lorsque vous supprimez un dossier partagé, le dossier et son contenu restent sur le disque du serveur.132 Chapitre 8 Personnalisation des services Pour supprimer un dossier partagé : m Dans la sous-fenêtre Partage de fichiers de Préférences du serveur, sélectionnez le dossier partagé à supprimer, puis cliquez sur le bouton Supprimer (–). Contrôle de l’accès au dossier partagé Vous pouvez autoriser ou interdire l’accès à chaque dossier partagé affiché dans la sous-fenêtre Partage de fichiers de Préférences du serveur. Vous pouvez indiquer quels utilisateurs ont un accès en lecture et écriture à chaque dossier partagé et à son contenu : tous les utilisateurs ayant un compte sur votre serveur ou uniquement les utilisateurs et groupes de votre choix. Vous pouvez également décider d’activer ou de désactiver l’accès des invités pour chaque dossier partagé. L’activation de l’accès au dossier partagé permet aux utilisateurs d’utiliser les protocoles de partage de fichiers AFP et SMB pour accéder au dossier. Les invités peuvent accéder au dossier partagé sans avoir à ouvrir de session. Pour modifier les réglages d’un fichier partagé : 1 Dans la sous-fenêtre Partage de fichiers, trouvez le dossier partagé dans la liste. 2 Pour autoriser l’accès à un dossier partagé, sélectionnez la case correspondante. 3 Pour donner à tous les utilisateurs ayant un compte sur votre serveur un accès en lecture et écriture au dossier partagé et à son contenu, cliquez sur Modifier les autorisations et sélectionnez « Tous les utilisateurs enregistrés ». 4 Pour restreindre l’accès en lecture et écriture au dossier partagé et à son contenu, cliquez sur Modifier les autorisations, sélectionnez « Uniquement ces utilisateurs et groupes enregistrés », puis cochez la case se trouvant à côté de chaque utilisateur et groupe auquel vous souhaitez autoriser l’accès.Chapitre 8 Personnalisation des services 133 Si vous donnez à un groupe un accès en lecture et écriture, tous les membres du groupe ont un accès en lecture et écriture, même si les cases qui leur correspondent sont désé- lectionnées. 5 Pour permettre aux utilisateurs invités de lire le contenu d’un dossier partagé, cliquez sur Modifier les modifications et sélectionnez « Autoriser l’accès en lecture seule pour les invités ». Désélectionnez cette option pour ne plus autoriser l’accès aux invités. Si vous autorisez l’accès à un dossier partagé, les utilisateurs peuvent y avoir accès à l’aide des protocoles de fichiers de partage les plus communs, AFP et SMB. Vous pouvez également modifier les autorisations d’accès à un dossier partagé ou à tout élément de ce dossier en utilisant la fenêtre d’information dans le Finder. Pour obtenir des informations sur le réglage des autorisations d’accès aux dossiers et fichiers, allez dans le Finder, puis utilisez le menu Aide. Recherche d’une adresse de partage de fichiers sur un serveur Les utilisateurs et éventuellement les invités peuvent se connecter aux dossiers partagés du serveur en utilisant les protocoles AFP ou SMB aux adresses suivantes :  smb://nomDNSduserveur  afp://nomDNSduserveur Remplacez l’exemple en italique par le nom DNS de votre serveur, qui est affiché dans la sous-fenêtre Information de Préférences du serveur.134 Chapitre 8 Personnalisation des services Pour accéder aux dossiers partagés pour lesquels l’accès par les invités est désactivé, les utilisateurs doivent ouvrir une session en utilisant le nom et le mot de passe de leur compte utilisateur sur le serveur. Une fois la session ouverte, les utilisateurs ont accès au dossier partagé de chaque groupe auquel ils appartiennent. Si l’accès par les invités à un dossier de partage est activé, les utilisateurs peuvent se connecter sans avoir à ouvrir de session. Pour obtenir des informations, consultez la rubrique « Contrôle de l’accès au dossier partagé » à la page 132. Gestion du service iCal Utilisez la sous-fenêtre iCal pour activer et désactiver le service calendrier iCal, limiter la taille du fichier joint ou limiter le volume total de données du calendrier de l’utilisateur. Pour configurer la sous-fenêtre iCal : m Modifiez tous les paramètres disponibles en vous référant aux informations suivantes : Activé/Désactivé indique l’état du service iCal et le bouton Activé/Désactivé active ou désactive le service.Chapitre 8 Personnalisation des services 135 Limiter la taille de chaque événement de calendrier à__ Mo’: définit la taille totale maximale d’un événement, de la tâche à réaliser ou d’un autre objet du calendrier, notamment la taille totale de tous les fichiers joints. Si l’utilisateur tente d’enregistrer un objet de calendrier plus important, le serveur envoie un message d’erreur à l’application de calendrier de l’utilisateur. Limiter la taille de calendrier totale de chaque utilisateur à__ Mo : limite la quantité d’espace disque que les événements des utilisateurs, les tâches à réaliser et d’autres données relatives au calendrier peuvent utiliser sur le serveur. Si un utilisateur dépasse cette limite, le serveur envoie un message d’erreur à l’application de calendrier de l’utilisateur. À propos du service iCal Le service de calendrier de Mac OS X Server, iCal Server, permet aux utilisateurs de partager des calendriers, de programmer des rencontres et de coordonner des événements, le tout de manière aisée. Les utilisateurs peuvent vérifier rapidement et facilement la disponibilité des autres utilisateurs, mettre en place et proposer des rencontres, réserver des salles de conférence, réserver des projecteurs et plus encore. iCal Server envoie les invitations, qui peuvent contenir des informations telles qu’un agenda ou une liste des tâches, et présente les réponses sous forme de tableau. Un ordinateur équipé de Mac OS X 10.5 Leopard peut configurer automatiquement son application iCal en vue d’utiliser iCal Server. Consultez la rubrique « Configuration automatique des ordinateurs Mac Leopard » à la page 95. iCal Server fonctionne également avec d’autres applications de calendrier courantes, prenant en charge le protocole CalDAV standard.136 Chapitre 8 Personnalisation des services Gestion du service iChat Utilisez la sous-fenêtre iChat pour activer et désactiver le service de messagerie instantanée iChat, ajouter tous les utilisateurs à la liste de contacts de chaque utilisateur, activer la conversation avec d’autres systèmes de messagerie instantanée ou configurer le listage et l’archivage de toutes les conversations. Pour obtenir des informations sur les réglages et les commandes de cette sous-fenêtre, cliquez sur le bouton Aide dans le coin inférieur droit de la fenêtre Préférences du serveur. À propos du service iChat Le service iChat fournit une messagerie instantanée sécurisée (MI) aux utilisateurs de Macintosh, Windows et Linux. Les membres du groupe peuvent chercher des solutions ensemble, établir des plans, échanger des URL ou transférer des fichiers sans avoir à craindre l’intrusion de personnes étrangères qui pourraient intercepter des informations confidentielles. Le service iChat fournit une messagerie textuelle entre les utilisateurs ou entre des utilisateurs multiples. Il facilite également les connexions directes entre les utilisateurs en matière d’audio, de vidéo et de sessions audio et vidéo multidirectionnelles.Chapitre 8 Personnalisation des services 137 Les informations sur le compte iChat des utilisateurs sont stockées sur le serveur. Les utilisateurs peuvent accéder à leurs comptes depuis n’importe quel Mac et voir les mêmes listes de contacts, groupes et ainsi de suite. L’application iChat d’un ordinateur équipé de Mac OS X 10.5 Leopard peut être configurée automatiquement en vue d’utiliser le service iChat de votre serveur. Consultez la rubrique « Configuration automatique des ordinateurs Mac Leopard » à la page 95. Le service iChat fonctionne également avec des logiciels de messagerie instantanée compatibles avec Jabber, disponibles avec Windows, Linux et même avec des assistants numériques personnels classiques. Ajout de tous les utilisateurs à la liste de contacts de chaque utilisateur Les identifiants Jabber (noms d’écrans) de tous les utilisateurs ayant un compte sur le serveur peuvent être ajoutés automatiquement à la liste de contacts de chaque utilisateur. Les utilisateurs voient leurs listes de contacts Jabber dans iChat (ou une autre application de messagerie instantanée XMPP). Ils peuvent ajouter ou supprimer des contacts. Pour ajouter tous les utilisateurs à la liste de contacts Jabber de chaque utilisateur : 1 Dans la sous-fenêtre iChat de Préférences du serveur, sélectionnez « Ajouter automatiquement tous les utilisateurs à chaque liste de contacts ». 2 Redémarrez le service iChat en cliquant deux fois sur Activé/Désactivé. Les modifications apportées au service iChat prennent effet une fois ce dernier redémarré. Si vous désélectionnez l’option « Ajouter automatiquement tous les utilisateurs à chaque liste de contacts », les utilisateurs ne sont pas supprimés automatiquement des listes de contacts. Chaque utilisateur peut supprimer les contacts qui ont été ajoutés automatiquement à sa liste de contacts.138 Chapitre 8 Personnalisation des services Conversation avec les utilisateurs de Google Talk et d’autres services XMPP Vous pouvez autoriser les utilisateurs du serveur à échanger des messages instantanés avec des utilisateurs de Google Talk et d’autres systèmes de messagerie instantanée utilisant le protocole XMPP. Pour autoriser la conversation via Google Talk et d’autres services XMPP : 1 Dans la sous-fenêtre iChat des Préférences du serveur, sélectionnez « Activer la communication de serveur à serveur ». 2 Redémarrez le service iChat en cliquant deux fois sur Activé/Désactivé. Les modifications apportées au service iChat prennent effet une fois ce dernier redémarré. Enregistrement et archivage des messages instantanés Le service iChat peut enregistrer une copie de tous les messages instantanés dans un fichier texte. Le service comprime la copie et enregistre une archive une fois par semaine. La dernière copie et les archives comprimées se trouvent dans /var/jabberd/ message_archives/. Pour enregistrer et archiver des messages instantanés : 1 Dans la sous-fenêtre iChat des Préférences du serveur, sélectionnez « Enregistrer et archiver toutes les conversations ». 2 Redémarrez le service iChat en cliquant deux fois sur Activé/Désactivé. Les modifications apportées au service iChat prennent effet une fois ce dernier redémarré.Chapitre 8 Personnalisation des services 139 Gestion du service de messagerie Utilisez la sous-fenêtre Messagerie pour activer et désactiver le service de messagerie, modifier le message d’accueil envoyé aux nouveaux utilisateurs, spécifier un serveur relais pour les messages sortants ou ajuster le filtrage des messages indésirables et des virus. Pour obtenir des informations sur les réglages et les commandes de cette sous-fenêtre, cliquez sur le bouton Aide dans le coin inférieur droit de la fenêtre Préférences du serveur. À propos du service de messagerie Le service de messagerie permet aux utilisateurs d’envoyer et de recevoir des messages électroniques sur votre réseau local et sur Internet en utilisant n’importe quelle application de courrier électronique. Le service de messagerie peut fournir des listes d’envoi pour les groupes et il contient des filtres qui protègent les utilisateurs contre le courrier indé- sirable et les virus.140 Chapitre 8 Personnalisation des services Toutes les personnes ayant un compte utilisateur obtiennent une adresse électronique. L’application de messagerie d’un ordinateur doté de Mac OS X 10.5 Leopard peut être configurée automatiquement de manière à utiliser le service de messagerie de votre serveur. Consultez la rubrique « Configuration automatique des ordinateurs Mac Leopard » à la page 95. Le service de messagerie fonctionne également avec d’autres applications de messagerie classiques qui utilisent les protocoles de messagerie standard. Les utilisateurs peuvent recevoir du courrier électronique en utilisant le protocole IMAP ou POP et en envoyer en utilisant le protocole SMTP. Choix d’un serveur de relais du courrier électronique Votre service de messagerie peut transmettre un message sortant via un autre serveur, qui transfère alors le courrier électronique vers sa destination.  Si vous utilisez un fournisseur d’accès à Internet (FAI), celui-ci peut stipuler que tous les messages sortants doivent être pris en charge par un serveur désigné.  Si votre organisation fournit un service Internet, il se peut que votre serveur ait besoin d’utiliser un serveur relais pour transmettre les messages sortants via un coupe-feu. Si tel est le cas, votre organisation désignera un serveur particulier qui relaiera les messages via un coupe-feu. Important : utilisez un serveur relais uniquement si votre FAI ou votre organisation l’exige. Relayer des messages via un autre serveur sans autorisation peut faire de votre serveur un système qui abuse du service de messagerie. Chapitre 8 Personnalisation des services 141 Pour relayer des messages sortants via un autre serveur : 1 Dans la sous-fenêtre Mail des Préférences du serveur, sélectionnez « Relayer les messages sortants via le FAI ». Si cette option est déjà sélectionnée, cliquez sur le bouton Modifier se trouvant en regard. Apparaît alors une zone de dialogue dans laquelle vous devez saisir des informations sur la connexion du serveur relais. 2 Tapez le nom DNS du serveur relais ou l’adresse IP fournie par votre FAI ou votre organisation. 3 Si votre FAI ou votre organisation demande également l’authentification de votre serveur avant l’envoi de messages électroniques, sélectionnez « Activer l’authentification du relais SMPT ». À propos du filtrage des messages indésirables et des virus Le service de messagerie peut examiner les messages entrants avant de les livrer pour vérifier qu’ils sont exempts de virus et de messages indésirables. Mac OS X Server utilise SpamAssassin (spamassassin.apache.org) pour analyser le texte du message et calcule la probabilité qu’il s’agisse d’un message indésirable. Aucun filtre de courrier indésirable n’est efficace à 100 % en matière d’identification. Mac OS X Server ne supprime pas les messages indésirables. Il transmet toutefois les messages avec la mention « ***COURRIER INDÉSIRABLE*** » ajoutée à l’objet. Le destinataire peut vérifier s’il s’agit réellement de messages indésirables et les traiter en conséquence. 142 Chapitre 8 Personnalisation des services Chaque message est analysé et les statistiques des mots les plus fréquents sont enregistrées. Les messages électroniques contenant beaucoup des mots généralement rencontrés dans les messages indésirables reçoivent un score plus élevé indiquant leur forte probabilité d’être des messages indésirables. Mac OS X Server utilise ClamAV (www.clamav.net) pour analyser les messages et rechercher des virus. Le courrier électronique infecté par un virus suspect est supprimé et un avis est envoyé à l’adresse électronique de notification indiquée dans la sous-fenêtre Information des Préférences du serveur. Le serveur met automatiquement à jour la définition des virus une fois par jour via Internet. Analyse des messages indésirables et des virus entrants Le service de messagerie peut analyser les messages entrants pour rechercher les messages indésirables et les virus. Les messages contenant des virus connus sont supprimés. Les messages suspectés d’être des messages indésirables sont transmis avec la mention ***COURRIER INDÉSIRABLE***. Pour que le service de messagerie analyse les messages indésirables et les virus : 1 Dans la sous-fenêtre Mail des Préférences du serveur, sélectionnez « Filtrer le courrier indésirable et les virus ». 2 Ajustez le curseur pour définir le niveau de tolérance du filtre en matière de classification d’un message entrant comme courrier indésirable. Agressif : le filtre de messages indésirables tolère peu de signes indiquant que le courrier peut être indésirable. Modéré : le filtre de messages indésirables tolère quelques signes indiquant que le courrier peut être indésirable.Chapitre 8 Personnalisation des services 143 Prudent : le filtre de messages indésirables marque le message entrant comme courrier indésirable uniquement s’il contient de nombreux signes indiquant que le courrier peut être indésirable. Gestion des services web Utilisez la sous-fenêtre Web pour activer et désactiver les services web, modifier l’emplacement de la page d’accueil de votre site web, activer les sites web wiki de groupe ou d’autres services web. Pour obtenir des informations sur les réglages et les commandes de cette sous-fenêtre, cliquez sur le bouton Aide dans le coin inférieur droit de la fenêtre Préférences du serveur.144 Chapitre 8 Personnalisation des services À propos des services web Les services web peuvent accueillir un site web conventionnel ou fournir des sites web de groupe avec des wikis, blogs, calendriers facultatifs et archives de listes d’envoi facultatives. D’autres services web fournissent un accès web au courrier électronique. Tous les membres d’un groupe peuvent aisément afficher, rechercher et modifier du contenu wiki directement à partir de leurs navigateurs web. En utilisant les modèles fournis ou en créant leurs propres modèles, ils peuvent ajouter, supprimer, modifier et formater naturellement le contenu, sans avoir à connaître les codes de balise ou la syntaxe spécifiques. Ils ont la possibilité, en quelques clics ou par un glisser-déposer, de joindre des fichiers et des images, de publier du contenu dans des podcasts, d’attribuer des motsclés et d’établir des liens vers d’autres pages wiki ou d’autres sites web. Ils peuvent afficher l’historique complet des modifications du wiki et revenir à une ancienne version de n’importe quelle page. Ils peuvent également consulter des calendriers partagés, des blogs et des listes d’envoi et y contribuer. Les blogs permettent aux utilisateurs non techniciens de tenir leurs collègues informés des projets, des fichiers sur lesquels ils travaillent et des images ou podcasts. Les utilisateurs publient leurs propres blogs, par simple glisser-déposer, à l’aide d’une sélection de modèles professionnels prédéfinis. Avec WebMail, les utilisateurs peuvent recevoir et envoyer du courrier électronique depuis un navigateur web, n’importe où sur Internet. Ils peuvent accéder à tout leur courrier électronique comme s’ils utilisaient l’application Mail de Mac OS X ou une autre application de messagerie sur leur ordinateur.Chapitre 8 Personnalisation des services 145 Recherche de l’adresse du site web du serveur L’adresse du site web de votre serveur est la suivante : http://nomDNSduserveur Remplacez l’exemple en italique par le nom DNS de votre serveur, qui est affiché dans la sous-fenêtre Information de Préférences du serveur. Si le site web de votre serveur est un wiki de groupe, les visiteurs doivent ouvrir une session à l’aide du nom et du mot de passe d’un membre du groupe. Hébergement d’un site web conventionnel Plutôt que d’utiliser un site web avec wiki de groupe configuré pour vous par Mac OS X Server, votre serveur peut héberger un site web conventionnel composé de fichiers HTML statiques. Pour créer ce site web, utilisez le logiciel de développement de votre choix ou faites-le créer par un tiers, puis copiez les fichiers du site web sur votre serveur. Pour héberger un site web conventionnel : 1 Assurez-vous que la page d’accueil de votre site web porte le nom index.html ou index.php. 2 Ouvrez le dossier des sites web du serveur, qui se trouve dans /Bibliothèque/WebServer/Documents/. Vous pouvez si vous le souhaitez supprimer les fichiers d’exemple. 3 Copiez vos fichiers de site web dans le dossier des sites web. 4 Dans la sous-fenêtre Web de Préférences du serveur, sélectionnez « Page d’accueil du serveur » dans le menu local Page d’accueil. 5 Si les services web ne sont pas activés, cliquez sur le bouton Activé/Désactivé dans la sous-fenêtre Web.146 Chapitre 8 Personnalisation des services Configuration du service wiki de groupe Vous pouvez utiliser la sous-fenêtre Web de Préférences du serveur pour rendre tous les sites web wiki de groupe disponibles ou non sur le réseau. Lorsque des sites web wiki de groupe sont disponibles, chaque membre du groupe peut accéder au wiki de groupe, au blog, au calendrier facultatif et aux archives de listes d’envoi facultatives. Vous pouvez activer et définir des options pour chaque wiki de groupe dans la sousfenêtre Groupes. Pour activer le service wiki pour tous les groupes : 1 Dans la sous-fenêtre Web de Préférences du serveur, sélectionnez « Activer les wikis de groupe » et assurez-vous que le service web est activé. S’il n’est pas activé, cliquez sur le bouton Activé/Désactivé. 2 Si vous voulez visiter la page wiki contenant des liens vers tous les wikis de groupe, cliquez sur la flèche gauche pour « Activer les wikis de groupe ». 3 Si vous voulez configurer un wiki pour un nouveau groupe ou un groupe existant, cliquez sur « Créer un nouveau groupe avec un site web wiki ». Le fait de cliquer sur ce lien vous permet d’afficher la sous-fenêtre Groupes, dans laquelle vous pouvez créer un nouveau groupe ou sélectionner un groupe existant, puis configurer le wiki du groupe. Pour obtenir des informations sur la création de groupes et sur la configuration de wikis de groupe, consultez les rubriques « Création d’un nouveau groupe » à la page 114 et « Configuration du site web wiki d’un groupe » à la page 124.Chapitre 8 Personnalisation des services 147 Configuration du service Webmail Vous pouvez utiliser Préférences du serveur pour activer et désactiver le service Webmail. Ce service permet à tous les utilisateurs du serveur d’utiliser un navigateur web pour accéder à leur courrier via Internet. Pour activer et désactiver le service Webmail : m Dans la sous-fenêtre Web de Préférences du serveur, sélectionnez ou désélectionnez l’option Webmail. Si cette option est sélectionnée, le fait de cliquer sur la flèche gauche située à côté ouvre le site web Webmail. Les utilisateurs accèdent au Webmail de votre serveur en ajoutant /webmail à l’adresse du site web de votre serveur. Par exemple : http://serveur.exemple.com/webmail Configuration des blogs d’utilisateur Vous pouvez utiliser Préférences du serveur pour activer ou désactiver le service web consacré aux blogs d’utilisateur. Ce service permet à tous les utilisateurs de créer leur propre blog à l’aide d’un navigateur web. Pour activer et désactiver les blogs d’utilisateur : m Dans la fenêtre web de Préférences du serveur, sélectionnez ou désélectionnez Blogs d’utilisateur. Si cette option est sélectionnée, le fait de cliquer sur la flèche gauche située à côté ouvre le site web des blogs.148 Chapitre 8 Personnalisation des services Les utilisateurs accèdent à leurs blogs en ajoutant /utilisateurs/nomabrégé à l’adresse du site web de votre serveur. Par exemple : http://serveur.exemple.com/users/rpatel Gestion du service VPN Utilisez la sous-fenêtre VPN pour activer et désactiver le service d’accès à distance VPN, vérifier ou modifier le secret VPN, définir la plage d’adresses IP pour les utilisateurs VPN ou enregistrer un ficher de configuration VPN pour les utilisateurs de Mac OS X. Pour obtenir des informations sur les réglages et les commandes de cette sous-fenêtre, cliquez sur le bouton Aide dans le coin inférieur droit de la fenêtre Préférences du serveur.Chapitre 8 Personnalisation des services 149 À propos du service VPN Le service VPN (virtual private network) permet aux utilisateurs de se connecter à votre réseau depuis chez eux ou depuis d’autres endroits distants via Internet. Ils établissent une connexion VPN sécurisée pour accéder aux services de groupe de travail tels que le partage de fichiers, la messagerie, iChat, iCal et le service web. Le service VPN utilise le protocole L2TP et un secret partagé pour assurer la confidentialité, l’authentification et l’intégrité des communications. Un secret partagé sécurisé est généré automatiquement lorsque vous configurez votre serveur. Le secret partagé n’est pas utilisé pour authentifier les utilisateurs des ordinateurs clients lors de la connexion VPN. Il permet néanmoins au serveur de faire confiance aux ordinateurs clients qui disposent du secret partagé et inversement. Serveur et ordinateurs clients doivent disposer du secret partagé. Un ordinateur équipé de Mac OS X10.5 Leopard peut automatiquement obtenir le secret partagé et être configuré pour établir des connexions au service VPN du serveur. Consultez la rubrique « Configuration automatique des ordinateurs Mac Leopard » à la page 95. Les autres ordinateurs Mac et Windows peuvent être configurés de différentes façons pour se connecter au service VPN. Consultez les rubriques « Configuration d’une connexion VPN pour les utilisateurs Mac » à la page 107 et « Configuration manuelle de la connexion VPN d’un utilisateur » à la page 109.150 Chapitre 8 Personnalisation des services Modification du secret partagé VPN Vous pouvez utiliser Préférences du serveur pour modifier le secret partagé utilisé par le serveur et un ordinateur client pour l’authentification lors de l’établissement d’une connexion VPN. Le fait de changer régulièrement de secret partagé améliore la sécurité VPN, mais n’est pas pratique car les utilisateurs doivent également changer le secret partagé sur les ordinateurs qu’ils utilisent pour les connexions VPN. Pour modifier le secret partagé VPN : 1 Dans la sous-fenêtre VPN de Préférences du serveur, cliquez sur Édition. 2 Sélectionnez « Afficher le secret partagé » de manière à pouvoir lire le secret, tapez un nouveau secret et cliquez sur OK. Le secret partagé doit comporter au moins 8 caractères (de préférence 12 caractères ou plus) comprenant des lettres, des chiffres et des symboles, mais pas d’espace. Initialement, le secret partagé est constitué de 32 caractères aléatoires. Vous pouvez utiliser l’Assistant de mot de passe pour vous aider à composer un nouveau secret partagé. Activez temporairement la sous-fenêtre Utilisateurs, cliquez sur Compte, sur « Réinitialiser le mot de passe », sur le bouton Clé à droite du champ « Nouveau mot de passe », puis sur Annuler et retournez à la sous-fenêtre VPN. L’Assistant de mot de passe reste ouvert. Vous pouvez l’utiliser pour générer un nouveau secret partagé que vous copiez dans le champ Suggestion et collez dans le champ Secret partagé. Après avoir changé leur secret, tous les utilisateurs VPN doivent procéder au même changement dans leur configuration VPN. Pour obtenir des informations sur cette modification, consultez la rubrique « Configuration manuelle de la connexion VPN d’un utilisateur » à la page 109.Chapitre 8 Personnalisation des services 151 Création d’un fichier de configuration VPN Vous pouvez utiliser Préférences du serveur pour générer un fichier que les utilisateurs Mac peuvent ouvrir pour créer automatiquement une configuration VPN. Après avoir créé la configuration VPN, l’utilisateur peut établir une connexion VPN au serveur et à son réseau via Internet. Le fichier de configuration fonctionne avec Mac OS X 10.3 ou ultérieur. Pour générer un fichier de configuration VPN : 1 Dans la sous-fenêtre VPN de Préférences du serveur, cliquez sur Enregistrer sous, sélectionnez un emplacement pour le fichier de configuration VPN, puis cliquez sur Enregistrer. 2 Distribuez le fichier de configuration enregistré aux utilisateurs qui ont besoin de configurer une configuration VPN sur leur Mac. Pour configurer un Mac, il suffit à un utilisateur d’ouvrir le fichier de configuration VPN que vous avez généré. L’ouverture de ce fichier entraîne l’ouverture soit de la sousfenêtre Réseau des Préférences Système, soit de Connexion à Internet (selon la version Mac OS X), puis l’importation d’une configuration VPN avec toutes les informations nécessaires à l’établissement d’une connexion VPN, à l’exception du nom et du mot de passe de compte utilisateur sur le serveur. Si Connexion à Internet demande à l’utilisateur où placer la configuration importée, celui-ci doit sélectionner VPN (L2TP). L’utilisateur ne doit pas sélectionner VPN (PPTP) ou toute autre option.152 Chapitre 8 Personnalisation des services Lorsque les Préférences Réseau ou Connexion à Internet ont terminé l’importation de la configuration VPN, l’utilisateur doit taper un nom de compte et éventuellement un mot de passe, puis les enregistrer pour qu’ils fassent partie de la configuration VPN au moment de quitter l’application. Si l’utilisateur enregistre à la fois le nom et le mot de passe comme faisant partie de la configuration VPN, toute personne utilisant l’ordinateur en question pourra ouvrir automatiquement une session pour établir une connexion VPN à votre serveur. Par mesure de sécurité, vous pouvez demander aux utilisateurs de taper leur nom de compte mais pas leur mot de passe, puis de quitter l’application (Préférences Système ou Connexion à Internet). Si les utilisateurs n’enregistrent pas de mot de passe dans la configuration VPN sur leur ordinateur, il leur sera demandé d’ouvrir une session à chaque fois qu’ils établiront une connexion à votre serveur. Pour obtenir les informations à transmettre aux utilisateurs et leur expliquer comment utiliser le fichier de configuration VPN, consultez la rubrique « Configuration d’une connexion VPN pour les utilisateurs Mac » à la page 107. Modification de la plage d’adresses IP pour le VPN Vous pouvez utiliser Préférences du serveur pour modifier la plage d’adresses réservée par le serveur pour attribuer des adresses aux ordinateurs distants qui se connectent via VPN au serveur. Vous pouvez, par exemple, étendre cette plage pour rendre plus d’adresses IP disponibles pour les connexions VPN. Important : il s’agit d’adresses présentes sur le réseau du serveur, qui ne peuvent pas être utilisées par d’autres ordinateurs ou périphériques sur le réseau. Cette plage d’adresses ne peut comporter aucune adresse IP statique utilisée sur le réseau, ni empiéter sur la plage d’adresses IP attribuées par le serveur DHCP.Chapitre 8 Personnalisation des services 153 Pour modifier la plage d’adresses IP du service VPN : 1 Dans la sous-fenêtre VPN de Préférences du serveur, modifiez la première et la dernière adresse IP de la plage, ou les deux. La plage d’adresses doit être suffisamment large pour pouvoir inclure le nombre maximum d’ordinateurs distants simultanément connectés via VPN. Le service VPN attribue une adresse IP pour la durée de la connexion VPN et récupère l’adresse attribuée lorsque l’ordinateur distant se déconnecte. 2 Si vous disposez d’une borne d’accès AirPort ou d’un autre routeur Internet (passerelle) qui fournit le service DHCP, il peut s’avérer nécessaire d’adapter sa plage d’adresses IP de sorte que les plages d’adresses DHCP et VPN ne se chevauchent pas. Pour obtenir des informations sur la modification des réglages d’un routeur Internet, consultez la documentation du routeur. Lorsqu’un ordinateur distant établit une connexion VPN, le serveur lui attribue une adresse IP inutilisée provenant de la plage d’adresses réservées. Cette adresse IP ne remplace pas l’adresse IP déjà utilisée par l’ordinateur distant pour se connecter à Internet. L’ordinateur distant conserve cette adresse IP et toute autre adresse IP qu’il utilise et ajoute l’adresse IP qui lui est attribuée pour le VPN. 154 Chapitre 8 Personnalisation des services Fourniture d’un service VPN via un routeur Internet Si votre serveur fournit un service VPN à travers une borne d’accès AirPort ou tout autre routeur Internet et si les ordinateurs des utilisateurs ont besoin d’établir des connexions VPN via leurs propres bornes d’accès ou routeurs Internet, votre serveur doit se trouver sur un sous-réseau IP différent de celui des ordinateurs des utilisateurs VPN. En d’autres termes, les trois premiers nombres (tels que 10.0.1 ou 192.168.1) de l’adresse IP de votre serveur ne peuvent être identiques aux trois premiers nombres des adresses IP des utilisateurs VPN. Vous pouvez éviter ce conflit en modifiant le troisième nombre de l’adresse IP de tous les périphériques rattachés au réseau local de votre serveur : borne d’accès AirPort ou autre routeur Internet, serveur et autres ordinateurs. Utilisez un nombre compris entre 2 et 254. Par exemple, si votre serveur et d’autres périphériques rattachés à son réseau ont des adresses IP commençant par « 10.0.1 », modifiez-les de sorte qu’elles commencent par « 10.0.2 » ou par « 10.0.100 ». Si leurs adresses IP commencent par « 192.168.1 », vous pouvez les changer pour qu’elles commencent par « 192.168.5 » ou par « 192.168.70 ». Vous pouvez également utiliser les valeurs 172.16.0 à 172.31.255. Dans tous les cas, utilisez le masque de sous-réseau 255.255.255.0. Si votre borne d’accès AirPort, un autre routeur Internet ou le serveur DHCP attribue des adresses IP aux ordinateurs de votre réseau, modifiez-les pour attribuer des adresses IP commençant par les trois premiers nombres de l’adresse IP de votre serveur. Si possible, effectuez ces modifications avant de configurer votre serveur. Pour procéder à ces modifications sur une borne d’accès AirPort, utilisez Utilitaire AirPort (qui se trouve dans /Applications/Utilitaires/). Pour obtenir des instructions, ouvrez Utilitaire AirPort, puis consultez le menu Aide. Pour obtenir des informations sur la configuration d’un autre type de routeur ou de passerelle Internet, consultez la documentation correspondante.Chapitre 8 Personnalisation des services 155 Pour obtenir des informations sur le changement de l’adresse IP de votre serveur, consultez la rubrique « Modification de l’adresse IP de votre serveur » à la page 161. Après avoir changé l’adresse IP de votre borne d’accès AirPort ou d’un autre routeur Internet, procédez aux changements nécessaires sur votre serveur et sur les autres ordinateurs de son réseau pour pouvoir utiliser la nouvelle adresse comme adresse de routeur. Pour effectuer ces changements, utilisez la sous-fenêtre Réseau des Préférences Système sur votre serveur et sur les autres Macs. Pour obtenir des informations sur le changement d’adresses IP d’autres périphériques, consultez leur documentation. Personnalisation des services à l’aide d’applications avancées Bien que Préférences du serveur et le widget d’état du serveur soient les outils les mieux adaptés pour l’administration d’une configuration standard ou de groupe de travail de Leopard Server, vous pouvez également utiliser Admin Serveur, Gestionnaire de groupe de travail, ainsi que d’autres applications et outils avancés énumérés à la rubrique « Outils et applications avancés » à la page 36. Vous pouvez utiliser les applications et les outils avancés pour personnaliser des services en modifiant leurs options avancées. Vous pouvez également activer des services, tels que QuickTime Streaming Server, ne faisant pas partie d’une configuration standard ou de groupe de travail. Pour obtenir des informations sur les services, les options et les applications avancés, consultez Administration du serveur et les autres guides d’administration avancée décrits à la rubrique « Guides d’administration de Mac OS X Server » à la page 173.156 Chapitre 8 Personnalisation des services Important : avant d’utiliser Admin Serveur, Gestionnaire de groupe de travail ou d’autres outils et applications avancés pour apporter des modifications à une configuration standard ou de groupe de travail, notez soigneusement les réglages actuels au cas où vous auriez besoin d’y revenir. Vous pouvez, par exemple, faire une capture d’écran de chaque sous-fenêtre et zone de dialogue avant de changer les réglages qu’elles contiennent. (Pour plus d’informations sur les captures d’écran, basculez vers le Finder, puis utilisez le menu d’Aide.)9 157 9 Gestion des informations du serveur Utilisez les Préférences serveur pour obtenir des informations générales, vérifier les historiques de service, consulter les graphes d’activité du serveur et modifier les réglages du pare-feu. Gestion des informations du serveur Utilisez la sous-fenêtre Informations de Préférences du serveur pour obtenir des informations sur votre serveur, notamment le matériel et les logiciels installés, les noms et l’adresse réseau, ainsi que le numéro de série. Vous pouvez également modifier le nom et le numéro de série de l’ordinateur du serveur. Pour plus d’informations sur les réglages et les commandes disponibles dans cette sous-fenêtre, cliquez sur le bouton Aide situé dans l’angle inférieur droit de la sous-fenêtre Préférences du serveur.158 Chapitre 9 Gestion des informations du serveur Modification du numéro de série ou des détails de la licence de site Vous pouvez utiliser Préférences du serveur pour modifier le numéro de série du logiciel Mac OS X Server et les informations de la licence de site. Pour modifier le numéro de série du logiciel ou la licence de site : 1 Dans la sous-fenêtre Informations de Préférence du serveur, cliquez sur le bouton Modifier situé à côté des informations de la licence du serveur. 2 Tapez un autre numéro de série ou modifiez les détails de la licence de site en fonction de vos besoins, puis cliquez sur Enregistrer.Chapitre 9 Gestion des informations du serveur 159 Modification des réglages de notification Vous pouvez utiliser Préférences du serveur pour modifier l’adresse électronique à laquelle le serveur envoie des messages pour vous avertir en cas d’espace disque faible, vous signaler les mises à jour de logiciels et vous prévenir lorsque des messages électroniques infectés par un virus ont été supprimés. Vous pouvez également activer ou désactiver chaque type de notification. Pour changer d’adresse électronique de notification : 1 Dans la sous-fenêtre Informations de Préférences du serveur, cliquez sur le bouton Modifier situé sur la ligne Notifications. 2 Tapez l’adresse électronique souhaitée dans le champ des notifications électroniques. Si vous souhaitez qu’aucune notification ne soit envoyée, laissez vierge le champ des notifications électroniques. 3 Sélectionnez les types de notification que doit envoyer le serveur, puis cliquez sur Enregistrer. Espace disque faible : envoie un message dès qu’un disque ou une partition contient moins de 5 pour cent d’espace libre disponible. Mises à jour de logiciels disponibles : envoie un message lorsque de nouvelles mises à jour de logiciels sont disponibles pour le serveur. Virus détecté dans message entrant : envoie un message lorsque le filtre antivirus du courrier électronique détecte un virus.160 Chapitre 9 Gestion des informations du serveur Modification du nom de votre serveur Vous pouvez utiliser Préférences du serveur pour modifier le nom de l’ordinateur du serveur. Cela permet d’identifier le serveur auprès des ordinateurs clients qui recherchent des serveurs de fichiers en réseau, des files d’attente d’impression ou d’autres ressources réseau identifiées par un nom d’ordinateur plutôt que par un nom DNS. Pour modifier le nom de l’ordinateur du serveur : m Dans la sous-fenêtre Informations de Préférences du serveur, modifiez le champ Nom de l’ordinateur. Spécifiez un nom de 63 caractères latins maximum (espaces compris) en évitant d’utiliser les caractères =, : ou @. Mac OS X convertit automatiquement le nom de l’ordinateur en format compatible avec le partage de fichiers SMB. Pour modifier le nom d’hôte local du serveur, utilisez la sous-fenêtre Partage des Préfé- rences Système sur le serveur. Les autres ordinateurs du réseau local du serveur (sousréseau IP) peuvent utiliser le nom d’hôte local du serveur pour contacter le serveur. Si vous modifiez le nom d’hôte local de votre serveur, les utilisateurs des autres ordinateurs devront peut-être modifier leurs signets ou d’autres réglages pour pouvoir utiliser le nouveau nom d’hôte local du serveur. Pour plus d’informations concernant l’utilisation des Préférences Système, ouvrez cette sous-fenêtre, puis utilisez le menu Aide. Seul l’administrateur de votre service DNS peut modifier le nom DNS du serveur. Évitez de modifier le nom DNS du serveur car cela obligera les utilisateurs de ses services à reconfigurer leurs ordinateurs.  Les utilisateurs disposant de Mac OS X 10.5 Leopard doivent utiliser Utilitaire d’annuaire pour déconnecter leur ordinateur du serveur et pour se connecter de nouveau au serveur. Chapitre 9 Gestion des informations du serveur 161  Les utilisateurs disposant d’une version plus ancienne de Mac OS X ou utilisant Windows devront modifier leurs abonnements à des calendriers partagés, leurs adresses iChat, leurs adresses électroniques, l’adresse du site web du serveur, les adresses wiki de groupe et l’adresse VPN du serveur. Modification de l’adresse IP de votre serveur L’adresse IP du serveur fait partie des réglages de connexion au réseau de la sous-fenêtre Réseau des Préférences Système. Pour plus d’informations sur la modification des pré- férences Réseau, ouvrez Préférences Système sur le serveur, puis utilisez le menu Aide. Important : si votre service DNS est fourni par votre fournisseur d’accès à Internet ou par un autre serveur situé sur votre réseau, modifiez l’enregistrement DNS de votre serveur afin d’utiliser la nouvelle adresse IP. La modification de l’adresse IP de votre serveur peut interrompre la connexion des ordinateurs fonctionnant sous Mac OS X 10.5 Leopard. Si cela se produit, les utilisateurs de ces ordinateurs doivent utiliser Utilitaire d’annuaire pour déconnecter leur ordinateur du serveur et pour se connecter de nouveau au serveur. 162 Chapitre 9 Gestion des informations du serveur Connexion à un serveur de répertoire Si votre organisation possède un serveur de répertoire, mais que vous n’y avez pas connecté votre serveur lors de la configuration, vous pouvez le faire maintenant. Vous pouvez ensuite importer, pour les membres de votre groupe de travail, des comptes utilisateur depuis ce serveur de répertoire. Vous pouvez également donner à d’autres comptes utilisateur du serveur de répertoire l’accès aux services de votre groupe de travail en définissant ces comptes comme membres de groupe externes. Pour plus d’informations, consultez les rubriques « Importation automatique de groupes d’utilisateurs » à la page 78 et « Ajout ou suppression de membres externes d’un groupe » à la page 120. Utilisez Utilitaire d’annuaire (situé dans /Applications/Utilitaires/) pour vous connecter à un serveur de répertoire. Pour plus d’informations concernant la connexion à un serveur de répertoire, ouvrez Utilitaire d’annuaire, puis utilisez le menu Aide. Votre serveur est considéré comme une configuration de groupe de travail s’il est connecté à un serveur de répertoire.Chapitre 9 Gestion des informations du serveur 163 Modification des réglages de coupe-feu Utilisez la sous-fenêtre Coupe-feu de Préférences du serveur pour configurer un coupefeu protégeant votre serveur des utilisateurs provenant d’autres réseaux ou d’Internet. Le coupe-feu contrôle les connexions entrantes provenant de l’extérieur de votre réseau local (sous-réseau IP). Le coupe-feu permet à des services individuels d’accepter des connexions entrantes provenant d’ordinateurs hors du réseau local de votre serveur ou de forcer des services sélectionnés à accepter les connexions entrantes provenant d’ordinateurs du réseau local de votre serveur. Vous pouvez démarrer le coupe-feu et sélectionner les services limitant les connexions entrantes. Vous pouvez également empêcher le coupe-feu d’autoriser les connexions réseau entrantes à tous les services extérieurs au réseau local de votre serveur.164 Chapitre 9 Gestion des informations du serveur Pour modifier les réglages de coupe-feu : 1 Dans la sous-fenêtre Coupe-feu de Préférences du serveur, cliquez sur le bouton Activé/ Désactivé pour activer ou désactiver le coupe-feu. Activez le coupe-feu si vous voulez contrôler séparément les connexions entrantes de chacun des services de la liste. Vous pouvez également désactiver le coupe-feu pour autoriser les connexions réseau entrantes à tous les services extérieurs au réseau local de votre serveur. 2 Dans la liste des services, cochez la case d’un des services si vous voulez que celui-ci accepte uniquement les connexions entrantes provenant du réseau local du serveur. Désélectionnez la case d’un des services si vous voulez que celui-ci accepte les connexions entrantes provenant de tous les réseaux, y compris Internet. Les réglages de la liste des services prennent effet uniquement si le coupe-feu est activé. À propos du coupe-feu Mac OS X Server comprend un logiciel coupe-feu que vous pouvez utiliser pour bloquer les communications réseau indésirables avec votre serveur. Ce coupe-feu est appelé coupe-feu d’application, car il accepte ou refuse les connexions entrantes en fonction de l’application, du service ou de tout autre module logiciel particulier essayant d’accepter la connexion. Ce coupe-feu ne contrôle pas le trafic réseau sortant. Les réglages de la sous-fenêtre Coupe-feu de Préférences du serveur permettent de contrôler le même coupe-feu que les réglages de la sous-fenêtre Coupe-feu de la sous-fenêtre Sécurité de Préférences du serveur. Chapitre 9 Gestion des informations du serveur 165 Mac OS X Server dispose d’un autre coupe-feu fonctionnant différemment. Appelé coupe-feu IP, il accepte ou refuse le trafic entrant ou sortant en se basant sur les attributs du trafic, tels que le port de destination ou l’adresse IP d’origine. Le coupe-feu IP peut être utilisé en même temps que le coupe feu d’application. Pour obtenir des informations sur le coupe-feu IP, consultez la rubrique Administration des services de réseau (décrite dans « Guides d’administration de Mac OS X Server » à la page 173). Consultation des historiques du serveur Utilisez la sous-fenêtre Historiques de Préférences du serveur pour afficher les historiques de messages conservés par les composants Mac OS X Server lorsqu’ils fournissent des services. Ces historiques comprennent les messages affichés dans les zones de dialogue d’avertissement, ainsi que des messages (uniquement visibles dans les historiques) d’avertissements, d’erreurs et d’opérations de routine. Si vous recevez un message d’erreur dans une zone de dialogue, un historique peut afficher des détails complé- mentaires relatifs au problème.166 Chapitre 9 Gestion des informations du serveur Les messages d’historiques sont plutôt techniques et ne sont pas très compréhensibles pour les utilisateurs moyens, mais ils peuvent aider les techniciens à résoudre les problèmes. Voici quelques façons d’utiliser la sous-fenêtre Historiques : m Sélectionnez un historique dans le menu local Présentation. Le nom de fichier de l’historique et son emplacement sur le serveur sont affichés au-dessus du contenu de l’historique. m Affichez uniquement les entrées d’historique contenant une phrase ou un mot particulier en saisissant ce mot ou cette phrase dans le champ Filtre, en haut de la fenêtre.Chapitre 9 Gestion des informations du serveur 167 m Affichez toutes les entrées de l’historique sélectionné en supprimant le contenu du champ Filtre ou en cliquant sur le bouton X du champ. Vous pouvez également afficher les historiques Mac OS X Server et d’autres historiques via l’application Console (située dans /Applications/Utilitaires/) sur le serveur. Vous pouvez par exemple utiliser Console pour afficher le fichier console.log qui contient des messages importants provenant d’applications ouvertes sur le serveur. Pour obtenir des informations sur l’utilisation de Console, ouvrez l’application, puis utilisez le menu Aide.168 Chapitre 9 Gestion des informations du serveur Contrôle des courbes du serveur Utilisez la sous-fenêtre Courbes des Préférences du serveur pour obtenir une image de l’activité du serveur sur la durée. Vous pouvez ainsi repérer les moments où le serveur est habituellement occupé, voir s’il fonctionne presque à son niveau maximum et vérifier à quel moment il est susceptible d’être moins utilisé.Chapitre 9 Gestion des informations du serveur 169 Voici quelques façons d’utiliser la sous-fenêtre Courbes : m Choisissez un type d’activité et une période dans les menus locaux. Utilisation du processeur : surveille la charge de travail du ou des processeurs du serveur (également appelés unités centrales de traitement ou UCT). Trafic réseau : suit le nombre de données entrantes et sortantes transférées par le serveur sur le réseau. Espace disque : vérifiez la quantité d’espace utilisée et la quantité disponible sur chaque disque monté ou volume (partition). Trafic du partage de fichiers : suit le nombre de données entrantes et sortantes transférées par les services de partage de fichiers sur le réseau. Trafic de site web : suit le nombre de données entrantes et sortantes transférées par les services web sur le réseau. Vous pouvez également surveiller l’activité du serveur en utilisant le widget d’état du serveur directement sur le serveur ou à partir d’un autre ordinateur du réseau. Pour plus d’informations, consultez la rubrique « Utilisation du widget d’état du serveur » à la page 59. Si le serveur possède un écran, vous pouvez utiliser Moniteur d’activité (situé dans /Applications/Utilitaires/) sur le serveur. Moniteur d’activité affiche les processus et les applications ouverts sur l’ordinateur. Il vous permet également de surveiller la charge de travail du processeur à court terme, l’activité des disques et l’activité du réseau. Pour obtenir des informations sur Moniteur d’activité, ouvrez cette application, puis utilisez le menu Aide.10 171 10 En savoir plus Pour en savoir plus sur l’utilisation de Mac OS X Server, consultez l’aide à l’écran, les guides avancés et le web. Utilisation de l’aide à l’écran Vous pouvez obtenir des instructions à l’écran pendant que vous utilisez Leopard Server. L’aide peut être affichée sur un serveur ou sur un ordinateur administrateur (un ordinateur administrateur est un ordinateur Mac OS X sur lequel est installé le logiciel d’administration de Leopard Server). Pour en savoir plus, consultez la rubrique « Préparation d’un ordinateur administrateur » à la page 44. Pour obtenir de l’aide dans le cas d’une configuration standard ou de groupe de travail de Leopard Server : m Ouvrez Préférences du serveur, puis :  Choisissez Aide > Préférences du serveur, pour explorer les rubriques d’aide et faire des recherches.  Cliquez sur un bouton d’aide dans Préférences du serveur.  Utilisez le menu Aide pour rechercher une tâche à exécuter.172 Chapitre 10 En savoir plus L’aide à l’écran de Préférences du serveur contient toutes les instructions de ce guide pour gérer une configuration standard ou de groupe de travail de Leopard Server. L’Aide de Préférences du serveur renferme d’autres rubriques centrées plus particulièrement que le guide sur des tâches spécialisées. Pour obtenir de l’aide dans le cas d’une configuration avancée de Leopard Server : m Ouvrez Admin Serveur ou Gestionnaire de groupe de travail, puis :  Choisissez Aide > Aide Admin Serveur ou Aide > Aide Gestionnaire de groupe de travail avant d’explorer les rubriques d’aide et d’effectuer des recherches.  Utilisez le menu Aide pour rechercher une tâche à exécuter. L’Aide contient des instructions issues de Administration du serveur ainsi que d’autres guides d’administration avancés décrits dans « Guides d’administration de Mac OS X Server ». Pour visualiser les rubriques d’aide les plus courantes à propos du serveur : m Assurez-vous que le serveur ou l’ordinateur administrateur est connecté à Internet pendant que vous consultez l’Aide. Visualisation Aide extrait automatiquement depuis Internet et met en cache les rubriques d’aide les plus courantes concernant les serveurs. Lorsque vous n’êtes pas connecté à Internet, Visualisation Aide affiche les rubriques d’aide mises en cache.Chapitre 10 En savoir plus 173 Guides d’administration de Mac OS X Server Premiers contacts traite de l’installation et de la configuration des configurations standard et de groupe de travail de Mac OS X Server. Pour les configurations avancées, consultez Administration du serveur, qui regroupe la planification, l’installation, la configuration et l’administration du serveur en général. Une série de guides supplé- mentaires, énumérés ci-dessous, décrit la planification, la configuration, ainsi que la gestion avancée des services individuels. Vous pouvez obtenir ces guides au format PDF sur le site web de documentation de Mac OS X Server : www.apple.com/fr/server/documentation/174 Chapitre 10 En savoir plus Ce guide ... explique comment : Premiers contacts et Feuille d’opération d’installation et de configuration Installer Mac OS X Server et mettre en place une configuration standard ou de groupe de travail. Administration de ligne de commande Installer, configurer et gérer Mac OS X Server à l’aide de fichiers de configuration et d’outils de ligne de commande UNIX. Administration des services de fichier Partager certains volumes ou dossiers de serveur entre les clients du serveur, à l’aide des protocoles AFP, NFS, FTP et SMB. Administration du service iCal Configurer et gérer le service de calendrier partagé d’iCal. Administration du service iChat Configurer et gérer le service de messagerie instantanée d’iChat. Configuration de la sécurité de Mac OS X Renforcer la sécurité des ordinateurs (clients) Mac OS X, comme l’exigent les entreprises et les organismes publics. Configuration de la sécurité de Mac OS X Server Renforcer la sécurité de Mac OS X Server et de l’ordinateur sur lequel il est installé, comme l’exigent les entreprises et les organismes publics. Administration du service de messagerie Configurer et gérer les services de messagerie IMAP, POP et SMTP sur le serveur. Administration des services de réseau Installer, configurer et administrer les services DHCP, DNS, VPN, NTP, coupe-feu IP, NAT et RADIUS sur le serveur.Chapitre 10 En savoir plus 175 Administration d’Open Directory Configurer et gérer les services de répertoire et d’authentification et configurer les clients autorisés à accéder aux services de répertoire. Administration de Podcast Producer Configurer et gérer le service Podcast Producer destiné à enregistrer, traiter et distribuer des podcasts. Administration du service d’impression Héberger les imprimantes partagées et gérer les files d’attente et travaux d’impression associés. Administration de QuickTime Streaming et Broadcasting Capturer et encoder du contenu QuickTime. Configurer et gérer le service QuickTime Streaming en vue de diffuser des données multimé- dias en temps réel ou à la demande. Administration du serveur Mettre en place l’installation et la configuration avancées du logiciel serveur et gérer des options qui s’appliquent à plusieurs services ou à l’inté- gralité du serveur. Administration de Mise à jour de logiciels et d’Imagerie système Utiliser NetBoot, NetInstall et Mise à jour de logiciels pour automatiser la gestion du système d’exploitation et des autres logiciels utilisés par les ordinateurs clients. Mise à niveau et migration Utiliser des réglages de données et de services correspondant à une version antérieure de Mac OS X Server ou de Windows NT. Ce guide ... explique comment :176 Chapitre 10 En savoir plus Visualisation de guides PDF à l’écran Lorsque vous lisez la version PDF d’un guide à l’écran, vous pouvez :  Afficher les signets pour visualiser le plan du guide et cliquer sur un signet pour accé- der directement à la rubrique correspondante.  Rechercher un mot ou une phrase pour afficher une liste des endroits où ce mot ou cette phrase apparaît dans le document. Cliquez sur un de ces endroits pour afficher la page correspondante.  Cliquer sur une référence croisée pour accéder directement à la rubrique référencée. Cliquez sur un lien pour visiter le site web dans votre navigateur. Gestion des utilisateurs Créer et gérer des comptes utilisateur, des groupes et des ordinateurs. Configurer les préférences gérées des clients Mac OS X. Administration des technologies web Configurer et gérer des technologies web telles que les blogs, WebMail, wiki, MySQL, PHP, Ruby on Rails (RoR) et WebDAV. Administration Xgrid Configurer et gérer des grappes de calcul de systèmes Xserve et d’ordinateurs Mac. Glossaire Mac OS X Server Savoir à quoi correspondent les termes utilisés pour les produits de serveur et les produits de stockage. Ce guide ... explique comment :Chapitre 10 En savoir plus 177 Impression des guides PDF Afin d’économiser du papier et de l’encre et d’améliorer la lisibilité, suivez ces étapes lorsque vous imprimez un guide :  Économisez de l’encre ou du toner en évitant d’imprimer la couverture.  Si vous disposez d’une imprimante couleur, économisez de l’encre en choisissant une option d’impression en niveaux de gris ou en noir et blanc dans une des sections de la zone de dialogue Imprimer.  Réduisez le volume du document imprimé et économisez du papier en imprimant plusieurs pages par feuille. Dans la zone de dialogue Imprimer, choisissez Présentation dans le menu local sans titre. Si votre imprimante prend en charge l’impression recto verso (duplex), sélectionnez l’une des options proposées. Dans le cas contraire, choisissez 2 dans le menu local Pages par feuille et réglez l’échelle sur 115 % (155 % pour Premiers contacts).  Pour imprimer Premiers contacts à partir du PDF, il est conseillé d’agrandir les pages au format CD même si vous n’imprimez pas deux pages par feuille. Réglez l’échelle sur 155 %. Si vous utilisez Mac OS X 10.4 ou antérieur, vous trouverez le réglage d’échelle dans la zone de dialogue Format d’impression.178 Chapitre 10 En savoir plus Obtenir des mises à jour de documentation Apple publie régulièrement des pages d’aide révisées ainsi que de nouvelles éditions de ses guides. Certaines pages d’aide révisées sont des mises à jour des dernières éditions de ces guides.  Pour afficher les nouvelles rubriques d’aide à l’écran d’une application de serveur, assurez-vous que votre serveur ou votre ordinateur administrateur est connecté à Internet et cliquez sur le lien des dernières rubriques d’aide ou de mise à jour dans la page d’aide principale de l’application.  Pour télécharger les guides les plus récents en format PDF, rendez-vous sur le site web de documentation de Mac OS X Server : www.apple.com/fr/server/documentation/Chapitre 10 En savoir plus 179 Pour obtenir des informations supplémentaires Pour en savoir plus, consultez les ressources suivantes Documents Lisez-moi (sur le disque d’installation de Mac OS X Server et le disque Outils d’administration) Mises à jour importantes et informations spéciales Site web de Mac OS X Server (www.apple.com/fr/server/macosx) Informations complètes sur le produit et la technologie Site web d’assistance de Mac OS X Server (www.apple.com/fr/support/macosxserver) Accès à des centaines d’articles du service d’assistance Apple Sites web (en anglais) de discussions Apple (discussions.apple.com) Ce site permet de poser des questions à d’autres administrateurs, de partager vos connaissances, de donner des conseils et d’en recevoir Site web (en anglais) des listes d’envoi d’Apple (www.lists.apple.com) Abonnez-vous aux listes d’envoi pour discuter par courrier électronique avec d’autres administrateurs.Annexe 181 A A Préparation des disques pour l’installation de Mac OS X Server Utilisez le programme d’installation, Assistant du serveur ou Utilitaire de disque si vous devez effacer un disque, le partitionner en plusieurs volumes ou configurer un ensemble RAID. Outils à utiliser Objectif À quel moment Programme d’installation Effacer le disque cible en utilisant un format courant Pendant l’installation locale Assistant du serveur Effacer le disque cible en utilisant le format le plus courant : Mac OS X Étendu (journalisé) Pendant l’installation à distance Utilitaire de disque Effacer le disque cible en utilisant des formats moins courants, partitionner l’intégralité du disque en plusieurs volumes ou configurer un ensemble RAID Pendant l’installation locale Avant l’installation à distance182 Annexe A Préparation des disques pour l’installation de Mac OS X Server Pour plus d’informations concernant l’utilisation du programme d’installation, d’Assistant du serveur et d’Utilitaire de disque au cours de l’installation, reportez-vous au chapitre 2, « Installation de Mac OS X Server ». Pour plus d’informations concernant le contrôle d’Utilitaire de disque à distance (depuis un autre ordinateur) à l’aide d’Apple Remote Desktop (que vous pouvez acheter séparément) avant l’installation à distance, reportez-vous à Administration du serveur (décrit dans « Guides d’administration de Mac OS X Server » à la page 173). Effacement à l’aide du programme d’installation Vous pouvez effacer le disque cible lorsque vous utilisez le programme d’installation de Mac OS X Server. Lorsque vous sélectionnez le disque cible dans le programme d’installation, une option permettant d’effacer le disque cible durant l’installation vous est proposée. Vous avez le choix entre deux formats de disque :  Mac OS Étendu (Journalisé) est l’option recommandée. Il s’agit du format le plus courant pour un volume de démarrage Mac OS X Server.  Mac OS Étendu (sensible à la casse, journalisé) mérite votre attention si vous envisagez d’héberger sur votre serveur un site web conventionnel à contenu web statique plutôt que des sites web wiki de groupe. Les volumes sensibles à la casse peuvent héberger du contenu web statique avec une correspondance plus directe entre les fichiers et les adresses URL. AVERTISSEMENT : avant de partitionner un disque, de créer un ensemble RAID ou d’effacer un disque ou une partition sur un serveur, sauvegardez toutes les données d’utilisateur que vous souhaitez enregistrer en les copiant sur un autre disque.Annexe A Préparation des disques pour l’installation de Mac OS X Server 183 Important : un logiciel tiers risque de ne pas fonctionner correctement s’il est installé sur un volume sensible à la casse en raison d’une discordance imprévue de l’emploi des majuscules. Une application peut, par exemple, comporter un dossier nommé « Modules », alors que certaines parties de cette application appellent ce dossier « modules ». Cela ne poserait aucun problème sur un volume Mac OS Étendu (journalisé), mais pas sur un volume Mac OS Étendu (sensible à la casse, journalisé). Effacement à l’aide d’Assistant du serveur Si vous utilisez Assistant du serveur pour installer Mac OS X Server à distance et si Mac OS X Server ou Mac OS X est déjà installé sur le disque cible, Assistant du serveur ne peut effacer le disque qu’en utilisant le format Mac OS Étendu (journalisé). Effacement à l’aide d’Utilitaire de disque Pour bénéficier d’un plus grand choix de formats, utilisez le menu Utilitaires du programme d’installation pour ouvrir l’application Utilitaire de disque, puis effacez le disque cible à l’aide de cette application. Vous pouvez choisir les formats décrits à la page précédente ou choisir leurs variantes non journalisées : Mac OS Étendu et Mac OS Étendu (sensible à la casse). Le format ZFS ne convient pas aux disques de démarrage Mac OS X Server. Les versions plus anciennes de Mac OS X et de Mac OS X Server permettent également d’effacer des disques en utilisant le format de fichiers UFS (UNIX File System). N’utilisez pas ce format pour les disques de démarrage Mac OS X Server.184 Annexe A Préparation des disques pour l’installation de Mac OS X Server Partitionnement d’un disque dur Partitionner le disque dur permet de créer un volume destiné au logiciel système du serveur et un ou plusieurs autres pour les données et les autres logiciels. La taille minimale recommandée pour une partition d’installation est de 20 Go. Un volume plus important est recommandé pour les configurations standard ou les configurations de groupe de travail, car elles conservent les dossiers partagés et les sites web de groupe sur le volume de démarrage avec le logiciel serveur. Utilisez Utilitaire de disque pour partitionner un disque dur. Création d’un ensemble RAID Si vous installez Leopard Server sur un ordinateur doté de plusieurs disques durs internes, vous pouvez créer un ensemble RAID (matrice redondante de disques indépendants) pour optimiser la capacité de stockage, améliorer les performances et augmenter la fiabilité en cas de défaillance de disque. Un ensemble RAID en miroir, par exemple, augmente la fiabilité en écrivant vos données simultanément sur deux disques ou plus. Si l’un des disques est défaillant, votre serveur utilise automatiquement l’un des autres disques de l’ensemble RAID. Utilitaire de disque vous permet de configurer un ensemble RAID. Vous pouvez configurer la mise en miroir RAID après avoir installé Mac OS X Server si le disque utilisé n’est pas partitionné. Afin d’éviter toute perte de données, vous devez configurer la mise en miroir RAID le plus tôt possible. Pour plus d’informations sur la configuration d’un ensemble RAID, ouvrez Utilitaire de disque, puis utilisez le menu Aide.Annexe 185 B B Configuration d’un routeur Internet Configurez une borne d’accès AirPort ou un routeur Internet, afin de rendre les services de votre serveur disponibles via Internet. Si vous disposez d’un routeur Internet ou d’une passerelle partageant une connexion Internet entre les ordinateurs de votre réseau local, ce routeur ou cette passerelle isole votre réseau local d’Internet. Les ordinateurs connectés à Internet ne peuvent pas accé- der aux services fournis par votre serveur, à moins que votre routeur ne soit configuré pour réexpédier vers votre serveur les requêtes effectuées auprès de chaque service. Dans ce processus de réexpédition de ports (ou mappage de ports) chaque service communique par le biais d’un port de communication numéroté et abstrait. Ces ports ne sont pas physiques comme le port Ethernet de votre ordinateur. Configuration du mappage des ports sur une borne d’accès AirPort Extreme Une configuration standard ou de groupe de travail de Mac OS X Server version 10.5 Leopard peut configurer automatiquement le mappage de ports sur une borne d’accès AirPort Extreme (802.11n). Le serveur configure l’AirPort Extreme pour rendre les services iChat, courrier électronique, web et VPN disponibles sur Internet. Le serveur configure l’AirPort Extreme séparément pour chaque service lors du démarrage et de l’arrêt du service.186 Annexe B Configuration d’un routeur Internet Le serveur peut configurer automatiquement un mappage de ports sur une borne d’accès AirPort utilisant le mot de passe par défaut (public). Si le mot de passe de la borne d’accès AirPort est différent, vous pouvez le saisir lors de l’installation locale du serveur et ce dernier peut ainsi configurer un mappage de ports sur la borne d’accès. Si vous procédez à l’installation de votre serveur à distance, il pourra configurer automatiquement le mappage de ports, à condition que votre borne d’accès utilise le mot de passe par défaut. Le mot de passe par défaut étant cependant généralement connu, son utilisation compromet la sécurité de votre réseau sans fil. Pour configurer automatiquement une borne d’accès AirPort, l’option Mode IPv6 doit être réglée sur Tunnel dans l’application Utilitaire AirPort (située dans /Applications/Utilitaires/). La borne d’accès AirPort doit être configurée pour partager une connexion Internet avec les ordinateurs qui y sont connectés via Ethernet. Seules les configurations standard et de groupe de travail de Leopard Server peuvent configurer automatiquement une borne d’accès AirPort. Les configurations avancées de Leopard Server laissent le mappage de ports aux soins de l’administrateur. Remarque : les utilisateurs ayant des comptes sur votre serveur doivent créer une connexion VPN vers votre serveur pour obtenir un accès distant sécurisé à tous les services via Internet. La configuration de la réexpédition de ports, qu’elle soit automatique sur un AirPort Extreme ou manuelle comme expliqué plus bas, ne rend disponibles via Internet que certains des services de votre serveur.Annexe B Configuration d’un routeur Internet 187 Configuration manuelle du mappage de ports sur un routeur Internet Vous pouvez configurer manuellement le mappage de ports sur la plupart des routeurs Internet en utilisant leur logiciel de configuration. Ce logiciel de configuration est généralement constitué de plusieurs pages web. Ouvrez Safari, puis accédez à la page web contenant les réglages de mappage de ports ou de réexpédition de ports. Dans certains cas, vous pouvez sélectionner des services standard, tels que web ou VPN, et spécifier que chacun d’entre eux doit être associé à l’adresse IP de votre serveur. Dans d’autres cas, vous devez saisir les numéros de port des services, puis saisir l’adresse IP de votre serveur pour chacun d’entre eux. 188 Annexe B Configuration d’un routeur Internet Le tableau suivant regroupe les services et les ports correspondant pour lesquels il peut être utile de configurer le mappage ou la réexpédition de ports. Certains routeurs Internet peuvent vous demander de spécifier le protocole TCP ou UDP pour chaque port, d’autres non. Pour obtenir des informations spécifiques sur la manière de configurer une réexpé- dition de ports sur votre routeur Internet, reportez-vous à la documentation du routeur. Service Port TCP ou UDP Service iChat iChat serveur à serveur Proxy de transfert de fichiers iChat 5269 7777 TCP TCP Service de messagerie SMTP 25 TCP Service web HTTP 80 TCP Service VPN ISAKMP/IKE L2TP PPTP IKE NAT Traversal 500 170 1723 4500 UDP UDP TCP UDP189 Index Index A accès dossier 132 groupes 116 utilisateur 84, 86, 123 utilisateur root 52 administrateur comptes 52 comptes pour 72, 87 configuration 52, 72, 88 Admin Serveur 64, 155 adresse IP passerelle 50, 53 serveur, modification 161 serveur distant 47, 54 service VPN 152, 153 adresses électroniques 68, 115, 159 aide, utilisation 171 Apple Remote Desktop 48, 182 application Répertoire 97, 110 applications 35, 36 Voir aussi les applications individuellement archivage listes d’envoi de groupe 127 messages instantanés 138 Assistant du serveur 44, 45, 49, 50, 53 authentification réseau sans fil 41 serveur relais pour le courrier électronique 141 services de groupe 116 utilisateur 71 VPN 149, 150 Voir aussi mots de passe autorisation, fichier 132, 133 autorisations, root 52 B blogs 19, 144, 147 borne d’accès AirPort mappage de ports 185 sécurité 41 service DHCP de 153 VPN via 154 C calendrier 74 calendriers. Voir service iCal CIFS (Common Internet File System). Voir SMB ClamAV 142 Common Internet File System. Voir SMB compte administrateur local 72, 88 comptes administrateur 52, 72, 87 importation 76, 78, 87, 91 Voir aussi comptes de groupe; comptes utilisateur comptes de groupe ajout 110, 114 attribution de nom 123 membres 118, 120 réglages 122 suppression 110, 117 comptes utilisateur ajout 74190 Index appartenance à un groupe 85 à propos 68, 72 Gestionnaire de groupe de travail 87 importation 76, 87, 91 locaux 70 mots de passe 76, 87 noms 75, 86 réglages 81 standard 52, 73 suppression 80 Voir aussi administrateur; Comptes de groupe; utilisateurs configuration administrateur 52, 72, 88 à propos 25 borne d’accès AirPort 41, 153, 154, 185 mappage de ports 185 routeur Internet 154, 187 utilisateurs 68 Voir aussi configuration avancée; configuration standard; configuration de groupe de travail configuration, serveur Voir aussi configuration à distance 53 locale 50 configuration avancée applications 36 à propos 25, 32 conversion 25 documentation 173 importation d’utilisateurs de 87 services 32 configuration de groupe de travail applications 35 à propos 25, 30, 32 connexion au répertoire 162 courbes 168 documentation 171, 178 gestion à distance 61, 62 graphiques 59 historiques 165 informations du serveur 157 informations sur le serveur 59 mise à jour de logiciels 64 mot de passe d’administrateur 52 partage de fichiers 129 réglages 61 réglages de coupe-feu 163 restauration du serveur 63 sauvegarde du serveur 63 service de messagerie 139, 141 service iCal 134 service iChat 136 services compris 32 services web 143, 145 service VPN 107, 109, 148, 152 Voir aussi comptes de groupe; services; comptes utilisateur configuration requise 40 configuration standard applications 35 à propos 25, 27, 32 courbes 168 documentation 171, 178 gestion à distance 61, 62 graphiques 59 historiques 165 informations du serveur 59, 157 mise à jour de logiciels 64 mot de passe d’administrateur 52 partage de fichiers 129 réglages 61 réglages de coupe-feu 163 restauration du serveur 63 sauvegarde du serveur 63Index 191 service de messagerie 139, 141 service iCal 134 service iChat 136 services compris 32 services web 143, 145 service VPN 107, 109, 148, 152 Voir aussi comptes de groupe; services; comptes utilisateur conventions d’attribution de nom utilisateurs 75, 86 conventions de nom groupes 123 nom de l’ordinateur 160 courbes, serveur 168 courrier électronique. Voir service de messagerie; messages D détection des messages indésirables 141, 142 détection des virus 141, 142, 159 disque dur. Voir disques disque en miroir. Voir en miroir, disque disques effacement 182 formats 182, 183 installation cible 42, 46 partition 182, 184 documentation 173, 176, 177, 178 dossier de groupe 123, 129 dossier Public 129 dossiers partagés dossier de groupe 123 Voir partage de fichiers F FAI (fournisseur d’accès à Internet) 140 formats, disque 182, 183 fournisseur d’accès à Internet 161 G Gestionnaire de groupe de travail 87, 155 graphiques, serveur 59 groupes adhésion 118, 120 appartenance 85 attribution de nom 123 contrôle de l’accès 116 dossiers partagés 123, 129 importation 78 liste d’envoi 124, 127 partage de calendrier 126 réglages 113, 122 wikis 124, 126, 127, 146 H historiques, serveur 165 I importation comptes utilisateur 76, 87, 91 groupes 78 informations de contact, utilisateur 83 installation à distance 45 à propos 39 automatisée 39 avancée 39 configuration requise 40 disque cible 42, 46 emplacement physique 40 information sur 39 locale 42 logiciel serveur 39, 42, 45 nouvelle 42, 45 préparation pour 40, 44, 182 sauvegarde avant 182 sécurité 41 spéciale 42, 45 installation automatisée 39 interfaces, réseau192 Index Voir ports, Ethernet J journaux web. Voir blogs L L2TP (Layer Two Tunneling Protocol) 149 Lecteur DVD 40 Leopard Server. Voir Mac OS X Server liste d’envoi 124, 127 logiciel. Voir Mac OS X Server LTTP. Voir L2TP M Mac OS X Server à propos de 12 configuration 49 installation 39 mise à jour 64 mappage de ports 185 matrices, disques. Voir RAID messagerie instantanée. Voirservice iChat messages accueil 89 invitation de groupe 92 invitation du groupe 121 invitation du serveur 91, 101 notifications 159 Voir aussi service iChat; service de messagerie mise à jour 64, 178 Mise à jour de logiciels 64 mise en miroir, disque 184 Moniteur d’activité 169 mots de passe administrateur 52, 72, 88 compte utilisateur 76, 87 secret partagé 150 utilisateur root 52 N nom abrégé 75, 114 nom d’hôte local 160 nom de domaine 160 nom de l’ordinateur 160 notifications 159 numéro de série logiciel 41, 158 matériel 41, 47 O ordinateur administrateur 44, 61 ordinateurs client Voir ordinateurs d’utilisateurs ordinateurs des utilisateurs configuration 95 connexion au serveur 95, 100, 101, 103 gestion 95 informations de répertoire 110 secret partagé 149, 150 outils antivirus. Voir détection de virus P partage d’imprimantes 14 partage de fichiers adresses de serveur 133 ajout d’un fichier 130 à propos de 130 contrôle de l’accès 132 dossier de groupe 129 dossier Public 129 gestion 129 suppression de dossiers 131 passerelle, serveur 50, 53 Voir aussi routeur Internet photo, utilisateur 88 Podcast Producer 21 points de partage Voir partage de fichiers ports, coupe-feu 108, 109 ports Ethernet 50, 53 préférences. Voir Préférences du serveur; Préférences Système Préférences du serveurIndex 193 à propos 57 recherche de réglages 61 utilisation à distance 61, 62 Préférences Système adresse IP du serveur 161 comptes utilisateur 70, 72, 96 nom d’hôte local 160 sécurité de l’ordinateur 74 Time Machine 63 Programme d’installation 42, 63, 182 protocoles AFP 133 CalDAV 135 IMAP 140 L2TP 149 POP 140 SMB 133 SMTP 140 XMPP 138 Protocole SMB (Server Message Block). Voir SMB R RAID (matrice redondante de disques indépendants) 184 rechercher à l’aide de Spotlight 23 réexpédition de ports. Voirmappage de ports réglages de coupe-feu 108, 109, 163 requise, configuration 40 réseau adresse IP 152, 161 coupe-feu 163, 164 sécurité 41 VPN 148 ressources partagées 110 Voir aussi partage de fichiers restauration du serveur 63 routeur. Voir routeur Internet routeur Internet mappage de ports 187 service DHCP de 153 VPN via 154 S sauvegarde avant l’installation 182 restauration à partir de 63 serveur 63 secret partagé 149, 150 sécurité administrateur 52, 74 authentification 68, 116, 150 borne d’accès AirPort 41 installation 41 réglages de coupe-feu 163 réseau sans fil 41 root 52 secret partagé 149, 150 Voir aussi accès; mots de passe serveur de répertoire connexion à 162 importation d’utilisateurs 69, 76 importation de groupes 78 membres de groupes 92 membres du groupe 121 serveur DHCP 47, 152, 154 serveur local configuration 50 installation 42 serveur relais, messagerie 140 serveurs a 133, 145, 147, 148 adresse IP 161 configuration 49 courbes 168 emplacement physique 40 gestion 57 graphiques 59 historiques 165 informations sur 157 installation 39 logiciel 39 mise à jour 64194 Index noms 160 numéro de série de 41, 47 numéro de série pour 158 restauration 63 sauvegarde de 63 surveillance de l’état 59 Voir aussi serveur de répertoire; serveurs distants; services serveurs distants configuration 53 état du serveur 59 installation 45 Préférences du serveur 61, 62 service AFP (Apple Filing Protocol) 133 service AFP (Apple Filing Protocol) Voir AFP service de conversation. Voir iChat service de messagerie à propos de 139 configuration utilisateur 105 détection des messages indésirables 141, 142 détection des virus 141, 142 détection de virus 159 liste d’envoi du groupe 124, 127 mappage de ports 188 serveur relais 140 webmail 147 service de protocole SMB (Server Message Block) 133 service DNS (Domain Name System) 133, 161 service iCal à propos de 16, 135 calendrier de groupe 126 configuration utilisateur 105 gestion 134 restrictions concernant les données de l’utilisateur 135 tailles des pièces jointes 135 service iChat à propos de 136 archivage des messages 138 configuration utilisateur 105 enregistrement des messages 138 gestion 136 Google Talk 138 mappage de ports 188 réglages concernant les contacts 136 services XMPP 138 service mail gestion 139 services à propos 32 contrôle de l’accès d’un utilisateur 84 gestion 57 groupe 115 historiques 165 mappage de ports 185 surveillance de l’état 59 Voir aussi services individuels services web à propos de 144 blogs d’utilisateur 144, 147 gestion 143 mappage de ports 188 wikis 144, 146 sites web adresses 145, 147, 148 hébergement conventionnel 145 wiki 124, 126, 127, 144 calcul 64 bits 24 spam. Voir détection des messages indésirables Spotlight 23 SSH 41Index 195 systèmes de messagerie XMPP 138 T Time Machine 63 trouver à l’aide de Spotlight 23 U UCE (courrier commercial non sollicité) Voir détection des messages indésirables UNIX 24 utilisateur root 52 utilisateurs à propos 67 attribution d’un nom 75, 86 authentification 68 blogs 19, 144, 147 configuration 68 contrôle de l’accès 84, 86, 123 gestion 95 Gestionnaire de groupe de travail 87 informations de contact 83 messages 89, 91, 92 messages à 101, 121 photo 88 restrictions concernant les données iCal 135 root 52 Voir aussi groupes; comptes utilisateur; ordinateurs d’utilisateurs utilisateurs de Leopard adresse IP du serveur 161 configuration 95, 99, 101, 103 informations de répertoire 97, 110 nom DNS du serveur 160 utilisateurs de Tiger 105 Utilitaire d’annuaire 103, 160, 161 utilitaire de disque 183, 184 V virtual private network. Voir VPN VNC 41 volumes, installation 47 VPN (virtual private network) adresses IP 152 à propos de 149 connexion de l’utilisateur 107, 109 coupe-feu 108, 109 fichier de configuration 151 gestion 148 mappage de ports 188 routeur Internet 154 secret partagé 150 W webmail 147 widget d’état du serveur 59 wikis à propos 18 services de groupe 124 services web 144 Félicitations, vous et votre Mac mini êtes faits l’un pour l’autre.Table des matières 3 Table des matières Chapitre 1: Configurez, utilisez 7 Gestion de Mac OS X Server 8 Contenu de la boîte 9 Configuration de votre Mac mini 16 Configuration de Partage de CD ou DVD 18 Pour obtenir des informations supplémentaires sur votre Mac mini 21 Extinction ou suspension d’activité de votre Mac mini Chapitre 2: Prise en main de votre Mac mini 26 Description de la face avant de votre Mac mini 28 Description de la face arrière de votre Mac mini 30 Utilisation de la télécommande Apple Remote 33 Informations complètes Chapitre 3: Une solution à chaque problème 40 Problèmes vous empêchant d’utiliser votre Mac mini 42 Réinstallation de logiciels à l’aide de « Installation à distance de Mac OS X » 46 Autres problèmes 48 Utilisation d’Apple Server Diagnostics 49 En cas de problème de connexion à Internet4 Table des matières 52 Problèmes de communications sans fil AirPort Extreme 53 Maintien à jour de votre logiciel 53 En savoir plus, service et assistance 57 Localisation du numéro de série de votre produit Chapitre 4: Dernières recommandations 61 Informations importantes sur la sécurité 64 Informations importantes sur la manipulation 66 Principes ergonomiques 69 Apple et l’environnement 71 Regulatory Compliance Information1 1 Configurez, utilisez www.apple.com/fr/macmini Aide Mac Assistant serveurChapitre 1 Configurez, utilisez 7 Votre Mac mini est conçu pour être configuré facilement et utilisé immédiatement. Si vous n’avez jamais utilisé de Mac mini ou n’êtes pas familiarisé avec les ordinateurs Macintosh, vous trouverez dans ce chapitre des instructions pour débuter. Important : lisez toutes les instructions d’installation et les consignes de sécurité à partir de la page 61 avant de brancher votre Mac mini à une prise électrique. Si vous êtes un utilisateur expérimenté, peut-être êtes-vous déjà en mesure d’utiliser votre nouvel ordinateur. Veillez néanmoins à consulter les informations du chapitre 2, « Prise en main de votre Mac mini, » pour découvrir les nouvelles fonctionnalités de votre Mac mini. De nombreuses réponses se trouvent dans l’Aide Mac de votre Mac mini. Pour en savoir plus sur l’Aide Mac, reportez-vous à la rubrique « Informations complètes » à la page 33. Gestion de Mac OS X Server Après avoir configuré votre Mac mini, ce dernier est alors prêt pour héberger l’intégralité des services fournis par Mac OS X Server. Pour en savoir plus sur la configuration et l’usage de Mac OS X Server, reportez-vous à Mac OS X Server : Premiers contacts accessible sur le CD des outils Admin Tools. Pour en savoir plus sur les logiciels serveur, consultez l’ensemble de la documentation sur le site web des ressources serveur d’Apple à l’adresse www.apple.com/fr/server/macosx/resources.8 Chapitre 1 Configurez, utilisez Contenu de la boîte Votre Mac mini est fourni avec les composants suivants : Avant de configurer votre Mac mini, enlevez le film protecteur situé à l’extérieur de votre ordinateur et de son adaptateur secteur. Suivez la procédure décrite dans les pages suivantes pour le configurer. Important : ne placez jamais d’objet sur votre Mac mini, car cela pourrait provoquer des interférences avec les signaux sans fil AirPort ou Bluetooth® . Adaptateur Mini-DVI vers DVI Câble secteur Adaptateur secteurChapitre 1 Configurez, utilisez 9 Configuration de votre Mac mini Placez votre Mac mini à l’endroit ou sur une face latérale, mais pas sur sa face supé- rieure. Utilisez l’adaptateur secteur fourni avec votre Mac mini, à l’exclusion de tous les autres. Étape 1: Branchez le câble d’alimentation de l’adaptateur secteur à votre Mac mini, puis branchez le cordon de l’adaptateur à une prise de terre. ®10 Chapitre 1 Configurez, utilisez Étape 2: Pour accéder à Internet ou à un réseau, connectez une extrémité du câble Ethernet à votre Mac mini et l’autre à un modem câble, à un modem DSL ou à un réseau. La technologie AirPort Extreme de gestion sans fil réseau est intégrée à votre Mac mini. Pour en savoir plus sur la configuration d’une connexion sans fil, choisissez Aide > Aide Mac, puis recherchez le terme « AirPort ». ®Chapitre 1 Configurez, utilisez 11 Étape 3: Connectez le câble USB de votre clavier et de votre souris. Votre Mac mini n’est pas livré avec un clavier ou une souris, mais vous pouvez utiliser pratiquement n’importe quel clavier USB et n’importe quelle souris USB avec votre ordinateur. Si votre clavier dispose d’un port USB (d), vous pouvez connecter votre souris à ce dernier. Dans le cas contraire, vous pouvez connecter la souris à un des ports USB (d) situés à l’arrière de votre Mac mini. ®12 Chapitre 1 Configurez, utilisez Vous pouvez utiliser les préférences Clavier pour modifier le comportement des touches de modification Verrouillage Majuscules, Contrôle, Option et Commande (x). Pour ouvrir les préférences Clavier, choisissez le menu Pomme () > Préférences système, cliquez sur Clavier, puis sur « Touches de modification…». Suivez les instructions à l’écran. Si vous utilisez un clavier USB qui n’est pas spécialement conçu pour Mac OS, il se peut qu’il ne soit pas doté d’une touche de modification Commande (x) ou Option, touches standard sur les claviers Apple. Si vous disposez d’un clavier d’un autre fabricant :  La touche Windows (l’icône sur la touche ressemble au logo de Windows) équivaut à la touche de modification Commande (x) d’un clavier Apple.  La touche Alt équivaut à la touche de modification Option d’un clavier Apple. Si vous utilisez une souris ou un clavier USB provenant d’un fabricant, des gestionnaires logiciels seront sans doute requis. Visitez le site Internet du fabricant pour trouver les gestionnaires les plus récents. Utilisation d’un clavier ou d’une souris sans fil Si vous avez acheté un clavier ou une souris Apple sans fil avec votre Mac mini, suivez les instructions qui accompagnent ces périphériques pour les configurer avec le Mac mini.Chapitre 1 Configurez, utilisez 13 Étape 4: Branchez un câble vidéo sur le port mini-DVI ou Mini DisplayPort. Votre Mac mini est livré sans moniteur. Vous pouvez brancher un écran doté d’un :  Port Mini DisplayPort. Connectez-le directement au port Mini DisplayPort.  Connecteur DVI. Utilisez l’adaptateur Mini-DVI vers DVI fourni avec votre Mac mini pour le brancher sur le port mini-DVI.  Connecteur VGA. Utilisez l’adaptateur Mini-DVI vers VGA pour le brancher sur le port Mini-DVI ou l’adaptateur port Mini DisplayPort vers VGA pour le brancher sur le port Mini DisplayPort. Des adaptateurs sont disponibles à l’adresse www.apple.com/fr/store ou dans votre Apple Store le plus proche. ® Port Mini-DVI Port Mini DisplayPort14 Chapitre 1 Configurez, utilisez Étape 5: Appuyez sur le bouton d’alimentation (®) à l’arrière du Mac mini pour l’allumer. Étape 6: Configurez votre Mac mini à l’aide de l’Assistant de Mac OS X Server. La première fois que vous allumez votre Mac mini, l’Assistant de Mac OS X Server vous demande alors de founir quelques renseignements de base que Mac OS X Server nécessite afin de pouvoir démarrer et se connecter au réseau. Préparez les informations suivantes la première fois que vous allumez votre Mac mini afin de les renseigner :  les nom et mot de passe du compte d’un administrateur serveur ;  le numéro de série de votre logiciel Mac OS X Server ; ® ®Chapitre 1 Configurez, utilisez 15  les réglages détaillés du réseau, notamment l’adresse IP, le masque de sous-réseau et les serveur DNS ;  si vous choisissez de créer des comptes utilisateur ou groupe sur votre Mac mini ou d’utiliser des comptes d’un service de répertoire existant. Pour obtenir une liste des informations nécessaires pour entièrement configurer votre Mac mini à l’aide d’Assistant du serveur, reportez-vous à Mac OS X Server : Installation and Setup Worksheet Feuille d’opérations pour l’installation et la configuration accessible depuis le DVD d’installation de Mac OS X Server (ou depuis le site web des ressources serveur d’Apple à l’adresse www.apple.com/fr/server/macosx/resources. Si vous possédez déjà un ordinateur Mac fonctionnant sous Mac OS X Server 10.4, 10.5 ou 10.6, l’Assistant de Mac OS X Server peut vous aider à transférer automatiquement les réglages système, ceux des services, les comptes utilisateur, les fichiers, les applications et d’autres informations de votre ancien Mac vers votre Mac mini.Utilisez une connexion Ethernet, FireWire ou sans fil pour transférer ces informations. Pour en savoir plus sur l’utilisation des services sous Mac OS X Server, reportez-vous au document Mac OS X Server : Premiers contacts inclus avec votre Mac mini. Pour obtenir des renseignements détaillés sur Mac OS X Server, accédez à www.apple.com/fr/server/macosx/resources.16 Chapitre 1 Configurez, utilisez Étape 7: Personnalisez le bureau et réglez vos préférences Vous pouvez facilement personnaliser votre bureau à l’aide des Préférences Système, votre centre de commandes pour la plupart des réglages de votre Mac mini. Choisissez le menu Pomme () > Préférences Système dans la barre des menus ou cliquez sur l’icône Préférences Système située dans le Dock. Pour en savoir plus, choisissez Aide > Aide Mac, puis recherchez « Préférences Système » ou le nom de préférences spécifiques à modifier. Configuration de Partage de CD ou DVD Vous pouvez utiliser Partage de CD ou DVD pour créer un « partenariat » entre votre Mac mini et un autre ordinateur Mac ou Windows équipé d’un lecteur de disque optique et situé sur le même réseau câblé ou sans fil. Utilisez cet autre ordinateur pour :  partager le contenu de DVD ou CD ou installer des applications (voir « Partage de disques avec « Partage de CD ou DVD » » à la page 18) ;  installer Mac OS X Server à distance (voir « Réinstallation de logiciels à l’aide de « Installation à distance de Mac OS X » » à la page 42) ou passer par Utilitaire de disque (voir « Utilisation d’Utilitaire de disque » à la page 45). L’ordinateur équipé du lecteur optique peut être un Mac disposant de Mac OS X 10.4.11 ou ultérieur ou un ordinateur Windows XP ou Windows Vista. Si le Mac dispose de Mac OS X 10.5.5 ou d’une version ultérieure, « Partage de CD ou DVD » est déjà installé. Vous pouvez créer des partenariats avec plusieurs ordinateurs. Chapitre 1 Configurez, utilisez 17 Si l’autre ordinateur est un ordinateur Windows ou un Mac avec une version Mac OS X antérieure à 10.5.5, insérez le DVD d’installation de Mac OS X fourni avec votre Mac mini pour installer « Configuration du partage de CD ou DVD », qui inclut les logiciels pour Partage de CD ou DVD, l’Assistant migration et Installation à distance de Mac OS X :  Si l’autre ordinateur est un ordinateur Windows, choisissez « Partage de CD ou DVD » à partir de l’Assistant d’installation qui démarre automatiquement.  Si l’autre ordinateur est un Mac, double-cliquez sur le paquet de Configuration du partage de CD ou DVD sur le DVD d’installation de Mac OS X. Important : après avoir installé le paquet « Configuration du partage de CD ou DVD » sur votre autre Mac, assurez-vous que vous disposez de la dernière version disponible du logiciel, en choisissant Apple () > « Mise à jour de logiciels ». Installez toutes les mises à jour de logiciels Mac OS X disponibles.18 Chapitre 1 Configurez, utilisez Pour obtenir des informations supplémentaires sur votre Mac mini Si vous voulez installer des applications de tierces parties à partir d’un CD ou d’un DVD, vous pouvez les installer sur votre Mac mini ou partager les informations en utilisant un lecteur de disque optique sur un autre ordinateur Mac ou Windows (si « Partage de CD ou DVD » est configuré et activé). Consultez la rubrique suivante pour plus d’informations. Partage de disques avec « Partage de CD ou DVD » Vous pouvez activer « Partage de CD ou DVD » sur un ordinateur Mac ou Windows afin d’utiliser la fonctionnalité de disque distant de votre Mac mini. Le disque distant vous permet de partager les disques que vous insérez dans le lecteur de disque optique de l’autre ordinateur. Certains disques, notamment les DVD ou les disques de jeu, peuvent être protégés en copie et donc inutilisables par le biais de « Partage de CD ou DVD ». Assurez-vous d’avoir activé « Partage de CD ou DVD » sur tout ordinateur Mac ou Windows avec lequel vous souhaitez créer un partenariat. Pour en savoir plus, reportezvous à la page 16. Pour activer « Partage de CD ou DVD » si votre autre ordinateur est un Mac : 1 Assurez-vous que l’autre Mac et votre Mac mini sont sur le même réseau sans fil. Vérifiez l’icône d’état AirPort (Z) dans la barre des menus pour savoir à quel réseau vous êtes connecté.Chapitre 1 Configurez, utilisez 19 2 Sur l’autre Mac, choisissez Pomme () > Préférences Système puis ouvrez Partage. 3 Dans la sous-fenêtre Partage, sélectionnez « Partage de CD ou DVD » dans la liste des services. Si vous souhaitez que les autres utilisateurs doivent demander la permission d’utiliser un DVD ou CD que vous partagez, cochez la case « Me demander avant d’autoriser l’utilisation de mon lecteur DVD ». Pour activer « Partage de CD ou DVD », si votre autre ordinateur est un ordinateur Windows : 1 Assurez-vous que votre Mac mini et l’ordinateur Windows sont sur le même réseau sans fil. 20 Chapitre 1 Configurez, utilisez 2 Sur l’ordinateur Windows, ouvrez le panneau de configuration « Partage de CD ou DVD ». 3 Sélectionnez « Activer le partage de CD ou DVD ». Si vous souhaitez que les autres utilisateurs doivent demander la permission d’utiliser un DVD ou CD que vous partagez, cochez la case « Me demander avant d’autoriser l’utilisation de mon lecteur DVD ». Pour utiliser un DVD ou CD partagé : 1 Sur l’autre ordinateur, insérez un DVD ou un CD dans le lecteur de disque optique. 2 Sur votre Mac mini, sélectionnez le disque distant lorsqu’il apparaît dans Appareils dans la barre latérale du Finder. Si le bouton « Demander à utiliser » apparaît, cliquez dessus. 3 Sur l’autre ordinateur, lorsque vous y êtes invité, cliquez sur Accepter pour autoriser votre Mac mini à utiliser le DVD ou CD. 4 Sur votre Mac mini, utilisez le disque de la manière habituelle lorsqu’il devient disponible.Chapitre 1 Configurez, utilisez 21 Si vous essayez d’éteindre l’autre ordinateur ou d’éjecter le DVD ou CD partagé pendant que votre Mac mini l’utilise, un message vous indique que le disque est en cours d’utilisation. Pour continuer, cliquez sur Continuer. Extinction ou suspension d’activité de votre Mac mini Lorsque vous avez fini d’utiliser votre Mac mini, vous pouvez suspendre son activité ou l’éteindre. Suspension de l’activité de votre Mac mini Si vous envisagez de ne pas utiliser votre Mac mini pendant une période inférieure à quelques jours, suspendez-en l’activité. Lorsque l’activité de votre Mac mini est suspendue, son écran est noir. Vous avez la possibilité de réactiver rapidement votre Mac mini sans passer par la procédure de démarrage. Pour suspendre l’activité de votre Mac mini, procédez de l’une des manières suivantes :  Choisissez Pomme () > Suspendre dans la barre de menus.  Appuyez sur le bouton d’alimentation (®) situé à l’arrière de votre Mac mini.  Choisissez Pomme () > Préférences Système, cliquez sur Économiseur d’énergie et définissez un délai pour la minuterie de mise en veille.  Maintenez enfoncé le bouton Lecture/Pause (’) de la télécommande Apple Remote (vendue en option) pendant 3 secondes.22 Chapitre 1 Configurez, utilisez Pour réactiver votre Mac mini, appuyez sur une touche du clavier ou un bouton de la télécommande Apple Remote. À la réactivation de votre Mac mini, vos applications, documents et réglages d’ordinateur réapparaissent exactement tels que vous les aviez laissés. Extinction de votre Mac mini Si vous ne comptez pas utiliser votre Mac mini pendant plusieurs jours, éteignez-le. Choisissez Pomme () > Éteindre. Pour le rallumer, appuyez sur le bouton d’alimentation (®). AVIS : éteignez votre Mac mini avant de le déplacer. Tout déplacement de votre Mac mini lorsque le disque dur est en train de tourner risque d’endommager ce dernier et d’entraîner une perte de données ou une impossibilité de démarrer à partir du disque dur.2 2 Prise en main de votre Mac mini www.apple.com/fr/server/macosx Aide Mac serveurChapitre 2 Prise en main de votre Mac mini 25 Veuillez lire la présentation des fonctions et des ports de votre Mac mini. Le site web d’Apple, à l’adresse www.apple.com/fr, vous donne accès aux informations, aux téléchargements gratuits et aux catalogues en ligne des logiciels et matériels Apple les plus récents destinés à votre Mac mini. Vous trouverez également les manuels de nombreux produits Apple, ainsi que l’assistance technique pour tous les produits Apple sur le site web d’assistance Apple, à l’adresse www.apple.com/fr/support.26 Chapitre 2 Prise en main de votre Mac mini Description de la face avant de votre Mac mini Témoin lumineux d’alimentation Récepteur à infrarouge intégré Antenne Bluetooth Antennes AirPortChapitre 2 Prise en main de votre Mac mini 27 Remarque : les adaptateurs d’écran et autres accessoires pour Mac mini sont vendus séparément sur www.apple.com/fr/store ou dans votre Apple Store le plus proche. Z Technologie sans fil AirPort Extreme (interne) Connectez-vous à un réseau sans fil grâce à la technologie AirPort Extreme. Afin d’éviter toute interférence, veillez à libérer la zone entourant les antennes AirPort. Récepteur à infrarouge intégré Utilisez une télécommande Apple Remote facultative (disponible séparément) avec le récepteur infrarouge afin de contrôler Front Row et Keynote de votre Mac mini d’une distance maximale de 9,1 mètres. Témoin lumineux d’alimentation Un témoin lumineux blanc indique que votre Mac mini est allumé ; un témoin clignotant indique que son activité est suspendue. ◊ Technologie sans fil Bluetooth (interne) Connectez des périphériques sans fil tels qu’un téléphone portable, un organiseur et une imprimante Bluetooth, ainsi que le clavier et la souris Apple sans fil (tous deux en vente sur le site www.apple.com/fr/store ou dans votre Apple Store le plus proche).28 Chapitre 2 Prise en main de votre Mac mini Description de la face arrière de votre Mac mini , f H Bouton d’alimentation Logement de sécurité Port secteur ® ¯ G Port de sortie casque/audio numérique optique Port Ethernet (10/100/1000 Base-T) Port FireWire 800 £ Port Mini-DVI £ Port Mini DisplayPort d Ports USB 2.0 (5) Porte d’entrée de ligne audio/ audio ®Chapitre 2 Prise en main de votre Mac mini 29 £ Port mini-DVI Utilisez l’adaptateur mini-DVI vers DVI inclus pour brancher un écran DVI ou une TV. £ Port Mini DisplayPort Branchez un écran sur le port Mini DisplayPort. Logements de sécurité Attachez un verrou et un câble (disponible séparément) afin de dissuader les tentatives de vol. , Port d’entrée de ligne audio/audio numérique optique Connectez un micro ou un appareil audio numérique de niveau ligne. f Port de sortie casque/audio numérique optique Il permet de connecter un casque, des haut-parleurs actifs externes ou des appareils audio numériques. d Cinq ports USB (Universal Serial Bus) 2.0 à haut-débit Branchez un iPod, un iPhone, une souris, un clavier, une imprimante, un disque dur, un appareil photo numérique, une manette de jeu, un modem externe USB, etc. Vous pouvez aussi brancher des périphériques USB 1.1.30 Chapitre 2 Prise en main de votre Mac mini Utilisation de la télécommande Apple Remote Avec la télécommande Apple Remote vous pouvez, à distance, lire la musique de votre bibliothèque musicale iTunes, regarder des diaporamas de photos et des bandesannonces QuickTime, lire un DVD dans Lecteur DVD et plus encore. Votre télécommande Apple Remote peut :  Naviguer dans iTunes ou dans Lecteur DVD.  Suspendre l’activité de votre Mac mini ou le remettre sous tension. Pour utiliser votre télécommande Apple Remote :  Appuyez sur le bouton Lecture/Pause (’) pour lire ou mettre en pause un morceau, un diaporama ou un film. H Port FireWire 800 Branchez des appareils externes à haut-débit, tels que les caméras vidéo numériques et les appareils de stockage. G Port Ethernet Branchez un modem DSL ou un modem câble ou connectez-vous à un réseau Ethernet à haut-débit 10/100/1000Base-T ou un autre ordinateur à travers ce port. Le port Ethernet détecte automatiquement les dispositifs Ethernet et ne requiert pas de câble de connexion. ¯ Port d’alimentation Il permet de connecter le câble d’alimentation relié à l’adaptateur secteur. ® Bouton d’alimentation Allumez ou éteignez votre Mac mini ou suspendez l’activité. Maintenez ce bouton enfoncé pour réinitialiser l’ordinateur lors des procédures de dépannage.Chapitre 2 Prise en main de votre Mac mini 31  Appuyez sur les boutons Suivant/Avance rapide ( ) ou Précédent/Retour rapide ( ) pour passer au morceau suivant ou précédent de votre bibliothèque iTunes ou au chapitre suivant ou précédent d’un film DVD.  Maintenez enfoncé les boutons Suivant/Avance rapide ( ) ou Précédent/ Retour rapide ( ) pour effectuer une avance rapide ou un retour rapide dans un morceau ou un film.  Appuyez sur les boutons Augmenter le volume (∂) et Diminuer le volume (D) pour régler le volume. Jumelage de votre télécommande Apple Remote Si vous possédez dans une pièce plusieurs ordinateurs ou autres appareils dotés de récepteurs à infrarouge intégrés (par exemple, plus d’un Mac mini dans un bureau personnel ou un laboratoire), vous avez la possibilité de « jumeler » votre télécommande Apple Remote avec un ordinateur ou un appareil précis. Le jumelage permet de configurer l’ordinateur ou l’appareil récepteur de façon à ce qu’il soit contrôlé par une seule télécommande. 32 Chapitre 2 Prise en main de votre Mac mini Pour jumeler votre télécommande Apple Remote avec votre Mac mini : 1 Placez-vous à proximité de votre Mac mini (de 8 à 10 centimètres environ). 2 Dirigez la télécommande vers le devant de votre Mac mini. 3 Maintenez enfoncés simultanément les boutons Suivant/Avance rapide ( ) et Menu (») pendant 5 secondes. Lorsque vous avez correctement jumelé votre télécommande Apple Remote avec votre Mac mini, un symbole en forme de maillon de chaîne ( ) apparaît à l’écran. Pour annuler le jumelage de votre télécommande Apple Remote et de votre Mac mini : 1 Choisissez le menu Pomme () > Préférences Système dans la barre des menus. 2 Cliquez sur Sécurité, puis sur Désactiver le jumelage. Désactivation de la réception infrarouge Vous pouvez utiliser les préférences Sécurité pour activer ou désactiver la réception infrarouge. Pour désactiver la réception infrarouge :  Choisissez le menu Pomme () > Préférences Système dans la barre des menus et cliquez sur Sécurité.  Cochez la case « Désactiver le récepteur à infrarouge de la télécommande ».Chapitre 2 Prise en main de votre Mac mini 33 Informations complètes Vous trouverez une multitude d’informations concernant l’utilisation de votre Mac mini dans l’Aide Mac de votre ordinateur et sur Internet, à l’adresse www.apple.com/fr/support. Pour ouvrir l’Aide Mac : 1 Cliquez sur l’icône Finder dans le Dock (la barre d’icônes situé au bord de l’écran). 2 Cliquez sur menu Aide dans la barre des menus et effectuez l’une des opérations suivantes : a Tapez une question ou indiquez le terme voulu dans le champ Recherche et sélectionnez une rubrique dans la liste des résultats ou sélectionnez « Afficher tous les résultats » pour retrouver toutes les rubriques. b Sélectionnez Aide Mac pour ouvrir la fenêtre Aide Mac dans laquelle vous pouvez parcourir les rubriques ou saisir une question de recherche. Pour plus d’informations Pour plus d’informations sur l’utilisation de votre Mac mini, reportez-vous aux rubriques suivantes : Sujet traité Voir Dépannage de votre Mac mini en cas de problème le chapitre 3, « Une solution à chaque problème, » à la page 37. Service et assistance pour votre Mac mini Consultez « En savoir plus, service et assistance » à la page 53 ou rendez-vous sur la page d’assistance du Mac mini à l’adresse www.apple.com/fr/support/macmini.34 Chapitre 2 Prise en main de votre Mac mini Utilisation de Mac OS X Server Site de Mac OS X Server, à l’adresse www.apple.com/fr/server/macosx. Recherche de « Mac OS X Server » dans l’Aide Mac. Migration d’un PC vers un Mac « Pourquoi vous allez adorer un Mac » disponible sur www.apple.com/fr/getamac/whymac. Modification des préférences système Ouvrez les Préférences système en choisissant le menu Pomme (K) > Préférences système. Ou recherchez « préférences système » dans l’Aide Mac. Utilisation de la technologie sans fil AirPort Extreme Page d’assistance AirPort, à l’adresse www.apple.com/fr/support/airport Ou bien ouvrez l’Aide Mac et recherchez « Airport ». Utilisation de la technologie sans fil Bluetooth Ouvrez l’Aide Mac et recherchez « Bluetooth ». Ou accédez à la Page d’assistance Bluetooth, à l’adresse www.apple.com/fr/support/bluetooth. Connexion d’une imprimante Ouvrez l’Aide Mac et recherchez « impression ». Connexions FireWire et USB Ouvrez l’Aide Mac et recherchez « FireWire » ou « USB ». Connexion à Internet Ouvrez l’Aide Mac et recherchez « Internet ». Utilisation d’un moniteur Ouvrez l’Aide Mac et recherchez « écran ». Connexion d’un téléviseur Site web du Mac mini, à l’adresse www.apple.com/fr/macmini/accessories.html Télécommande Ouvrez l’Aide Mac et recherchez « télécommande ». Face avant Ouvrez l’Aide Mac et recherchez « Front Row ». Sujet traité VoirChapitre 2 Prise en main de votre Mac mini 35 Caractéristiques Page Caractéristiques, à l’adresse www.apple.com/fr/support/specs. Vous pouvez également ouvrir les Informations système en choisissant Pomme (K) > À propos de ce Mac dans la barre des menus, puis en cliquant sur Plus d’infos. Actualités Apple, téléchargements gratuits et catalogues en ligne de logiciels et de matériel Site Apple à l’adresse www.apple.com/fr. Instructions, assistance technique et manuels des produits Apple Site du service d’assistance d’Apple à l’adresse www.apple.com/fr/support. Sujet traité Voir3 3 Une solution à chaque problème www.apple.com/fr/support Aide Mac aideChapitre 3 Une solution à chaque problème 39 Il se peut que vous rencontriez des problèmes lors de l’utilisation de votre Mac mini. Lisez plus loin la présente documentation pour des astuces de dépannage. Vous trouverez également des informations supplémentaires dans l’Aide Mac ou sur le site web de service après-vente et d’assistance du Mac mini, à l’adresse www.apple.com/fr/support/macmini. II existe généralement une solution simple et rapide à tout problème rencontré avec le Mac mini. Dans un tel cas, essayez de noter les opérations effectuées avant que le problème ne survienne. Cela permet de restreindre les causes possibles du problème et trouver ainsi la solution. Les éléments à noter comprennent :  les applications que vous étiez en train d’utiliser quand le problème est apparu (les problèmes qui n’apparaissent qu’avec une application donnée peuvent indiquer que celle-ci n’est pas compatible avec la version de Mac OS X Server installée sur votre ordinateur) ;  tout logiciel installé récemment ;  tout nouveau matériel (tel qu’un périphérique) que vous aurez branché. AVERTISSEMENT : n’essayez pas d’ouvrir votre Mac mini. Si votre Mac mini doit être réparé, consultez « En savoir plus, service et assistance » à la page 53 pour en savoir plus sur la façon de contacter un fournisseur de services agréé Apple ou Apple pour un dépannage. Votre Mac mini ne contient aucune pièce manipulable par l’utilisateur.40 Chapitre 3 Une solution à chaque problème Problèmes vous empêchant d’utiliser votre Mac mini Si votre ordinateur ne répond plus ou que le pointeur se fige  Assurez-vous que la souris et le clavier sont connectés. Débranchez puis rebranchez les connecteurs et vérifiez qu’ils sont correctement mis en place.  Si le problème persiste, essayer de forcer les applications posant problème à quitter. Sur un clavier Apple Keyboard, maintenez les touches Option et Commande (x) enfoncées puis appuyez sur la touche Échap. Sur les autres claviers, maintenez les touches Windows et Alt enfoncées puis appuyez sur la touche Échap. Si une zone de dialogue apparaît, sélectionnez l’application figée et cliquez sur Forcer à quitter. Enregistrez le travail de toute application ouverte, puis redémarrez votre Mac mini afin de vous assurer que le problème est entièrement réglé.  Appuyez sur le bouton d’alimentation (®) à l’arrière de votre Mac mini et maintenezle enfoncé cinq secondes pour arrêter l’ordinateur.  Débranchez le câble d’alimentation de votre Mac mini. Rebranchez le câble, puis appuyez sur le bouton d’alimentation (®) pour rallumer votre Mac mini. Si le problème se reproduit lorsque vous utilisez une application particulière, consultez le fabricant de cette application pour vérifier si elle est compatible avec votre ordinateur. Pour toute information sur le service après-vente relatif aux logiciels fournis avec votre ordinateur, consultez la page à l’adresse www.apple.com/fr/guide ou accédez au site web du fabricant.Chapitre 3 Une solution à chaque problème 41 Si le problème a fréquemment lieu, essayer de réinstaller votre logiciel système (voir « Réinstallation de logiciels à l’aide de « Installation à distance de Mac OS X » » à la page 42). Si votre Mac mini se bloque au démarrage ou si un point d’interrogation clignote à l’écran  Patientez quelques secondes. Si votre Mac mini ne démarre pas après un certain temps, éteignez votre Mac mini en maintenant le bouton d’alimentation (®) enfoncé pendant environ cinq secondes, jusqu’à ce qu’il s’éteigne complètement. Maintenez ensuite la touche Option enfoncée puis appuyez à nouveau sur le bouton d’alimentation (®) pour démarrer votre ordinateur. Maintenez la touche Option enfoncée jusqu’au démarrage de votre Mac mini, puis cliquez sur la flèche située sous l’icône du disque dur que vous souhaitez utiliser comme disque de démarrage.  Une fois que votre Mac mini a démarré, ouvrez Préférences Système et cliquez sur Démarrage. Sélectionnez un dossier Système Mac OS X Server.  Si le problème se reproduit fréquemment, réinstallez éventuellement votre logiciel système (voir « Réinstallation de logiciels à l’aide de « Installation à distance de Mac OS X » » à la page 42). Si votre Mac mini ne s’allume pas ou ne démarre pas  Assurez-vous que le câble d’alimentation est branché sur votre Mac mini et dans l’adaptateur secteur mais aussi une prise de courant qui fonctionne. 42 Chapitre 3 Une solution à chaque problème  Appuyez sur le bouton d’alimentation (®) et maintenez immédiatement enfoncées les touches Commande (x), Option, P et R du clavier Apple jusqu’à entendre une deuxième fois le signal sonore de démarrage. L’opération permet de réinitialiser la RAM de paramétrage (PRAM). Sur d’autres claviers, appuyez sur le bouton d’alimentation (®) et maintenez immédiatement enfoncées les touches Windows, Alt, P et R.  Débranchez le câble d’alimentation et attendez au moins 30 secondes. Rebranchez le câble, puis appuyez à nouveau sur le bouton d’alimentation (®) pour allumer votre Mac mini.  Si vous ne pouvez toujours pas démarrer votre Mac mini, reportez-vous à la rubrique « En savoir plus, service et assistance » à la page 53 pour savoir comment prendre contact avec Apple en vue d’une réparation. Réinstallation de logiciels à l’aide de « Installation à distance de Mac OS X » Utilisez « Installation à distance de Mac OS X » sur un ordinateur partenaire dont vous voulez partager le lecteur de disque optique, quand vous souhaitez effectuer l’une des tâches suivantes sur votre Mac mini :  Réinstaller Mac OS X Server et d’autres logiciels fournis avec votre Mac mini.  Réinitialiser votre mot de passe.  Utiliser Utilitaire de disque pour réparer le disque dur de votre Mac mini. Les instructions pour l’installation du logiciel Configuration du partage de CD ou DVD se trouvent en la page 16.Chapitre 3 Une solution à chaque problème 43 Pour utiliser « Installation à distance de Mac OS X » : 1 Insérez le DVD d’installation de Mac OS X Server dans le lecteur de disque optique de l’autre ordinateur. 2 Si l’autre ordinateur est un Mac, ouvrez le sous-dossier Applications/Utilitaires/ « Installation à distance de Mac OS X ». (À moins que l’autre Mac dispose déjà de Mac OS X 10.5.5, vous devrez installer cette application.) Sous Windows, choisissez « Installation à distance de Mac OS X » à partir de l’Assistant d’installation. 3 Lisez l’introduction puis cliquez sur Continuer. 4 Sélectionnez le disque d’installation que vous souhaitez utiliser, puis cliquez sur Continuer. 5 Sélectionnez une connexion réseau : AirPort, si vous utilisez un réseau AirPort, ou Ethernet, si l’autre ordinateur se trouve sur un réseau Ethernet. Cliquez sur Continuer.44 Chapitre 3 Une solution à chaque problème 6 Redémarrez votre Mac mini en maintenant la touche Option enfoncée jusqu’à l’apparition de la liste des disques de démarrage disponibles. 7 Choisissez un disque de démarrage. 8 Cliquez sur Continuer dans « Installation à distance de Mac OS X ». 9 Si vous avez choisi AirPort comme réseau à l’étape 5, choisissez sur votre Mac mini votre réseau AirPort dans la liste locale. Si le réseau est sécurisé, vous êtes invité à saisir un mot de passe. Pour saisir un nom de réseau privé, choisissez les points de suspension (…) puis tapez le nom du réseau. 10 Si vous avez choisi AirPort comme réseau à l’étape 5, lorsque l’icône d’état AirPort indiquant la force du signal apparaît, cliquez sur Continuer dans « Installation à distance de Mac OS X ». 11 Sur votre Mac mini, cliquez sur le bouton en forme de flèche situé au-dessous de l’icône du programme d’installation puis effectuez l’une des actions suivantes :  Si vous avez oublié votre mot de passe et avez besoin de le réinitialiser, consultez la rubrique « Réinitialisation de votre mot de passe » ci-dessous.  Si vous souhaitez exécuter Utilitaire de disque, consultez la rubrique « Utilisation d’Utilitaire de disque » à la page 45.Chapitre 3 Une solution à chaque problème 45 Réinitialisation de votre mot de passe Vous pouvez réinitialiser votre mot de passe d’administrateur et les mots de passe de tous les autres comptes. Pour réinitialiser votre mot de passe si vous utilisez un ordinateur partenaire et l’Installation à distance de Mac OS X : 1 Suivez la procédure d’utilisation d’« Installation à distance de Mac OS X » en commen- çant à la page 43. 2 Cliquez sur Continuer dans « Installation à distance de Mac OS X ». 3 Sur votre Mac mini, choisissez Utilitaires > « Réinitialiser le mot de passe » dans la barre des menus et suivez les instructions à l’écran. Une fois terminé, quittez le programme d’installation de Mac OS X. 4 Sur l’autre ordinateur, cliquez sur Quitter pour quitter « Installation à distance de Mac OS X ». Utilisation d’Utilitaire de disque Lorsque vous avez besoin de réparer, vérifier ou effacer le disque dur de votre Mac mini, utilisez Utilitaire de disque en partageant le lecteur de disque optique d’un autre ordinateur. Pour utiliser Utilitaire de disque à partir d’un ordinateur partenaire : 1 Suivez la procédure d’utilisation d’« Installation à distance de Mac OS X » en commen- çant à la page 43. 2 Cliquez sur Continuer dans « Installation à distance de Mac OS X ».46 Chapitre 3 Une solution à chaque problème 3 Sur votre Mac mini, choisissez Programme d’installation > « Ouvrir Utilitaire de disque », puis suivez les instructions de la sous-fenêtre S.O.S. pour voir si Utilitaire de disque peut réparer le disque. Une fois terminé, quittez le programme d’installation de Mac OS X sur votre Mac mini. 4 Sur l’autre ordinateur, cliquez sur Quitter pour quitter « Installation à distance de Mac OS X ». Si Utilitaire de disque ne résout pas le problème, essayez de réinstaller le logiciel système de votre ordinateur. Voir la rubrique « Réinstallation de logiciels à l’aide de « Installation à distance de Mac OS X » » à la page 42. Autres problèmes En cas de problème avec une application Pour les problèmes liés aux logiciels provenant d’éditeurs tiers, contactez l’éditeur concerné. Les éditeurs de logiciels proposent souvent des mises à jour de leurs produits sur leurs sites web. Vous pouvez configurer votre Mac mini pour qu’il cherche et installe automatiquement les dernières mises à jour Apple via la sous-fenêtre Mise à jour de logiciels des Préférences Système. Pour plus d’informations, choisissez Aide > Aide Mac et recherchez « mise à jour de logiciels ».Chapitre 3 Une solution à chaque problème 47 En cas de problème de fonctionnement de votre Mac mini ou de Mac OS X Server  Si les réponses à vos questions ne figurent pas dans ce manuel, recherchez des instructions et des informations de dépannage dans l’Aide Mac. Sélectionnez Aide > Aide Mac.  Consultez le site web d’assistance Apple, à l’adresse www.apple.com/fr/support/ macosxserver pour obtenir les dernières informations de dépannage et des mises à jour de logiciels. Si vos réglages de date et heure disparaissent régulièrement  La pile de secours interne de votre ordinateur a peut-être besoin d’être remplacée. Pour savoir comment contacter le service après-vente d’Apple, reportez-vous à « En savoir plus, service et assistance » à la page 53.48 Chapitre 3 Une solution à chaque problème Utilisation d’Apple Server Diagnostics Si vous pensez que votre matériel Mac mini présente un problème, utilisez Apple Server Diagnostics pour vous aider à déterminer s’il s’agit d’un problème avec l’un des composants de l’ordinateur. Pour utiliser Apple Server Diagnostics : 1 Déconnectez tous les périphériques connectés à votre Mac mini à l’exception du clavier et de la souris. Si un câble Ethernet est connecté, déconnectez-le. 2 Redémarrez votre Mac mini tout en maintenant la touche D enfoncée. 3 Lorsque l’écran de sélection d’Apple Server Diagnostics apparaît, sélectionnez la langue qui vous convient. 4 Appuyez sur la touche Retour ou sur le bouton Continuer. 5 Lorsque l’écran principal Apple Server Diagnostics apparaît (environ 45 secondes plus tard), suivez les instructions reprises à l’écran. 6 En cas de détection d’un problème, Apple Server Diagnostics affiche le code d’une erreur. Notez le code d’erreur avant d’entreprendre les démarches d’assistance. Si Apple Server Diagnostics ne détecte pas de panne matérielle, il est probable que le problème soit lié aux logiciels. Pour en savoir plus, consultez la documentation sur les diagnostics serveur Apple pré- sente sur le CD des outils Admin Tools. Chapitre 3 Une solution à chaque problème 49 En cas de problème de connexion à Internet Votre Mac mini comprend l’application Assistant de configuration qui vous aide à configurer une connexion Internet. Ouvrez Préférences Système, puis cliquez sur Réseau. Cliquez sur Assistant pour lancer l’Assistant réglages de réseau. En cas de problème avec votre connexion Internet, vous pouvez effectuer les opérations de cette section pour le type de connexion ou utiliser Diagnostic réseau. Pour utiliser Diagnostic réseau : 1 Choisissez Pomme () > Préférences Système. 2 Cliquez sur Réseau puis sur Assistant. 3 Cliquez sur Diagnostic pour lancer Diagnostic réseau. 4 Suivez les instructions à l’écran. Si Diagnostic réseau n’est pas en mesure de résoudre le problème, celui-ci provient peut-être du fournisseur d’accès Internet auquel vous essayez de vous connecter, du périphérique externe utilisé pour la connexion au fournisseur d’accès Internet ou du serveur auquel vous essayez d’accéder. Vous pouvez essayer les méthodes proposées dans les sections suivantes. Connexions à Internet par modem câble, modem DSL et réseau local (LAN) Assurez-vous que tous les câbles du modem sont correctement branchés, y compris le câble d’alimentation du modem, le câble reliant le modem à votre ordinateur et le câble raccordant le modem à la prise murale. Vérifiez également les câbles et l’alimentation de vos concentrateurs Ethernet et routeurs. 50 Chapitre 3 Une solution à chaque problème Allumez et éteignez le modem puis réinitialisez-le Éteignez votre modem câble ou DSL, puis rallumez-le après quelques minutes. Certains fournisseurs d’accès Internet conseillent de débrancher le câble d’alimentation du modem. Si votre modem dispose d’un bouton de réinitialisation, vous pouvez l’actionner avant ou après avoir éteint puis rallumé le modem. Important : les instructions relatives aux modems ne s’appliquent pas aux utilisateurs réseau. À la différence des utilisateurs de modem DSL, les utilisateurs réseau peuvent posséder des concentrateurs, commutateurs, routeurs ou points de connexion. Les utilisateurs réseau doivent contacter leur administrateur réseau et non pas un FAI. Connexions PPPoE Si vous ne parvenez pas à vous connecter à votre fournisseur d’accès Internet via PPPoE (Point to Point Protocol over Ethernet), assurez-vous que les bonnes informations ont été saisies dans les préférences Réseau. Pour saisir les réglages PPPoE : 1 Choisissez Pomme () > Préférences Système. 2 Cliquez sur Réseau. 3 Cliquez sur Ajouter (+) situé en bas de la liste des services de connexion réseau, puis choisissez PPPoE dans le menu local Interface. 4 Dans le menu local Ethernet, indiquez une interface pour le service PPPoE. Sélectionnez Ethernet si vous vous connectez à un réseau câblé ou sur AirPort si vous vous connectez à un réseau sans fil. Chapitre 3 Une solution à chaque problème 51 5 Saisissez les informations que vous avez reçues de votre fournisseur de service, telles que le nom du compte, le mot de passe et le nom du service PPPoE (si votre fournisseur de service vous l’impose). 6 Cliquez sur Appliquer pour que les réglages s’appliquent. Connexions au réseau Assurez-vous que le câble Ethernet est branché à votre Mac mini et au réseau. Vérifiez les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet. Si vous disposez de plusieurs ordinateurs partageant une connexion à Internet, assurez-vous que votre réseau est correctement configuré. Vous devez savoir si votre fournisseur d’accès Internet fournit une seule ou plusieurs adresses IP (une pour chaque ordinateur). Si une seule adresse IP est utilisée, vous devez disposer d’un routeur capable de partager la connexion (on parle alors de conversion d’adresse réseau (NAT) ou de masquage d’adresses IP). Pour obtenir des informations sur la configuration, consultez la documentation fournie avec votre routeur ou contactez la personne qui a configuré votre réseau. La borne d’accès AirPort permet de partager une adresse IP entre plusieurs ordinateurs. Pour plus d’informations sur l’utilisation de la borne d’accès AirPort, consultez l’Aide Mac ou consultez le site web AirPort Extreme, à l’adresse www.apple.com/fr/support/airport. Si ces méthodes s’avèrent insuffisantes pour résoudre les problèmes rencontrés, contactez votre fournisseur d’accès Internet ou votre administrateur réseau.52 Chapitre 3 Une solution à chaque problème Problèmes de communications sans fil AirPort Extreme En cas de problème avec les communications sans fil AirPort Extreme :  Vérifiez que l’ordinateur ou le réseau auquel vous souhaitez vous connecter est activé et dispose d’un point d’accès sans fil.  Vérifiez que vous avez correctement configuré le logiciel en respectant les instructions fournies avec la borne d’accès ou le point d’accès.  Assurez-vous que l’autre ordinateur ou le point d’accès au réseau se trouve dans la zone de couverture de l’antenne de votre ordinateur. Des appareils électroniques ou des structures métalliques se trouvant à proximité peuvent interférer avec les communications sans fil et réduire la portée de votre antenne. Vous pouvez éventuellement améliorer la réception en réorientant votre ordinateur.  Consultez le menu d’état AirPort (Z) dans la barre de menus. La puissance du signal est représentée par quatre barres au maximum. Si le signal s’avère faible, tentez après avoir changé d’endroit.  Consultez l’Aide AirPort (choisissez Aide > Aide Mac, puis Bibliothèque > Aide AirPort dans la barre de menus). Pour plus d’informations, consultez également les instructions du périphérique sans fil.Chapitre 3 Une solution à chaque problème 53 Maintien à jour de votre logiciel Vous pouvez vous connecter à Internet pour télécharger et installer automatiquement les dernières versions de logiciels, gestionnaires et autres améliorations fournies par Apple. Chaque fois que vous vous connectez à Internet, Mise à jour de logiciels recherche la présence de mises à jour pour votre ordinateur. Vous pouvez régler votre Mac mini pour vérifier régulièrement la présence de mises à jour de logiciels, et éventuellement les télécharger et les installer. Pour rechercher des logiciels mis à jour : 1 Choisissez Pomme () > Préférences Système. 2 Cliquez sur l’icône Mise à jour de logiciels et suivez les instructions à l’écran.  Pour plus d’informations, recherchez « Mise à jour de logiciels » dans l’Aide Mac.  Pour obtenir les toutes dernières informations sur Mac OS X Server, accédez à www.apple.com/fr/server/macosx. En savoir plus, service et assistance Votre Mac mini ne contient aucune pièce manipulable par l’utilisateur. Si vous avez besoin d’assistance, apportez votre Mac mini à un fournisseur de services agréé Apple ou contactez Apple pour un dépannage. Vous pouvez trouver plus d’informations sur votre Mac mini via des ressources en ligne, l’aide à l’écran, les Informations Système ou Apple Hardware Test. Si vous souhaitez étendre la mémoire du système, contactez un fournisseur de services agréé Apple ou un magasin Apple Store.54 Chapitre 3 Une solution à chaque problème Ressources en ligne Pour obtenir des informations sur le service et l’assistance en ligne, rendez-vous à l’adresse www.apple.com/fr/support/. Choisissez votre pays dans le menu local. Vous pouvez rechercher les informations dans la base de connaissance AppleCare, consulter les mises à jour de logiciels ou obtenir de l’aide dans les forums de discussion Apple. Aide à l’écran Vous trouverez souvent des réponses à vos questions ainsi que des instructions et informations sur le dépannage dans l’Aide Mac. Sélectionnez Aide > Aide Mac. Informations Système Pour obtenir des informations sur votre Mac mini, utilisez les Informations Système. Les Informations Système vous indiquent quel matériel et quels logiciels sont installés, le numéro de série et la version du système d’exploitation, la quantité de mémoire installée, etc. Pour ouvrir les Informations Système, choisissez Pomme () > À propos de ce Mac dans la barre des menus, puis cliquez sur Plus d’infos. Service et assistance AppleCare Votre Mac mini vous est fourni avec une garantie de 90 jours d’assistance technique et d’un an de réparations matérielles dans un centre de réparation agréé par Apple (comme par exemple un fournisseur de services agréé Apple ou un magasin Apple Store). Vous pouvez étendre cette garantie en souscrivant au contrat AppleCare Protection Plan. Pour en savoir plus, rendez-vous à l’adresse www.apple.com/fr/support/products ou bien visitez le site web de votre pays (voir tableau). Apple fournit également une assistance d’expert pour Mac OS X Server. Au-delà de l’assistance gratuite pendant 90 jours, ces produits disposent d’une assistance technique détaillée pendant une année complète.Chapitre 3 Une solution à chaque problème 55 Mac OS X Server Software Support permet de bénéficier d’une assistance et de conseils par téléphone 1 et par e-mail 2 pour les problèmes de mise en réseau et de flux de productiondans les environnements Mac OS X Server, y compris de l’assistance pour l’utilisation des outils de ligne de commande et d’intégration dans des environnements hétérogènes. 3 Chaque contrat Mac OS X Server Software Support s’accompagne de toutes les fonctionnalités de l’assistance AppleCare Help Desk Support, décrite ci-dessous. Choisissez l’un des trois contrats suivants : Select, Preferred ou Alliance. AppleCare Help Desk Support fait profiter d’un an d’expertise à votre service d’assistance technique interne. Ce produit fournit une assistance prioritaire par téléphone 1 et par e-mail2 à deux contacts techniques désignés pour votre organisation. Les produits couverts incluent Apple Remote Desktop, Final Cut Studio, Final Cut Server, Aperture, Logic Studio, Mac OS et l’interface utilisateur graphique de Mac OS X Server. Vous recevez également un abonnement à AppleCare Help Desk Tools, bibliothèque de disques de diagnostics matériels et d’installation de Mac OS mise à jour tous les trimestres. 1. Les numéros de téléphone et les horaires d’intervention peuvent varier et être modifiés ; des frais de communications téléphoniques locales peuvent s’appliquer. 2. L’accès aux ressources web requiert l’utilisation d’un fournisseur d’accès à Internet compatible ; des frais peuvent s’appliquer. 3. Les détails sur la couverture de l’assistance ainsi que la liste des technologies Apple prises en charge figurent dans les contrats Mac OS X Server Software Support et AppleCare Help Desk Support disponibles à l’adresse : www.apple.com/fr/support/products/macosxserver_sw_supt.html www.apple.com/fr/support/products/helpdesk.html56 Chapitre 3 Une solution à chaque problème Si vous avez besoin d’une assistance complémentaire, les techniciens du centre télé- phonique AppleCare peuvent vous aider à installer et ouvrir des applications et à résoudre certains problèmes élémentaires. Appelez le centre d’appel le plus près de chez vous (pendant les 90 premiers jours, ce service est gratuit). Au moment de votre appel, il vous faudra connaître la date d’achat de votre Mac mini et son numéro de série. Remarque : la période de 90 jours d’assistance téléphonique gratuite démarre le jour de l’achat ; des coûts de communication téléphoniques peuvent être facturés. Les numéros de téléphone sont susceptibles de changer et des coûts téléphoniques locaux ou nationaux peuvent s’appliquer. La liste complète est disponible sur le web : Pays Téléphone Site web Allemagne (49) 01805 009 433 www.apple.com/de/support Autriche (43) 0810 300 427 www.apple.com/at/support Belgique (flamand) (français) (32) 070 700 772 (32) 070 700 773 www.apple.com/benl/support www.apple.com/befr/support France (33) 0805 540 003 www.apple.com/fr/support Luxembourg (33) 0825 888 024 www.apple.com/befr/support Suisse (français) (allemand) (41) 0848 000 132 (41) 0848 000 132 www.apple.com/chfr/support www.apple.com/chde/support www.apple.com/contact/phone_contacts.htmlChapitre 3 Une solution à chaque problème 57 Localisation du numéro de série de votre produit Optez pour l’une des méthodes suivantes pour trouver le numéro de série de votre Mac mini :  Choisissez Pomme () dans la barre de menus, puis choisissez À propos de ce Mac. Cliquez sur le numéro de version sous les mots « Mac OS X Server » pour passer entre les numéros de version, de compilation et de série de Mac OS X Server.  Ouvrez Informations système (accessible dans le dossier /Applications/Utilitaires/), puis cliquez sur Matériel.  Regardez dans le bas de votre Mac mini.4 4 Dernières recommandations www.apple.com/fr/environment Aide Mac ergonomieChapitre 4 Dernières recommandations 61 Afin d’éviter toute blessure et de préserver votre matériel, veillez à observer les consignes exposées ici pour le nettoyage et la manipulation de votre Mac mini ainsi que l’aménagement d’un espace de travail confortable. Gardez ces instructions pour que vous et tout autre utilisateur puissiez vous y reporter facilement. Informations importantes sur la sécurité Manipulation appropriée Mettez-en place votre Mac mini sur une surface de travail stable permettant une bonne ventilation sous et autour de l’ordinateur. Ne faites pas fonctionner votre Mac mini sur un coussin ou tout autre matériau mou, celui-ci pouvant bloquer la circulation de l’air. N’introduisez jamais d’objet dans les orifices de ventilation. Plans d’eau et endroits humides Évitez de placer votre Mac mini à proximité d’un évier, d’un lavabo, d’une baignoire, d’une douche, etc. Protégez votre Mac mini de l’humidité et des intempéries (neige, pluie ou brouillard). Adaptateur secteur Suivez ces indications au moment d’utiliser l’adaptateur secteur:  Veillez à engager fermement les fiches dans l’adaptateur secteur, l’ordinateur et la prise secteur. AVIS : un stockage ou un usage incorrect de votre ordinateur peut entraîner l’invalidation de la garantie du fabricant. AVERTISSEMENT : ne pas suivre les présentes instructions peut entraîner le départ d’un feu, une électrocution ou toute autre blessure ou détérioration.62 Chapitre 4 Dernières recommandations  Laissez toujours de l’espace autour de l’adaptateur secteur et placez votre Mac mini dans un endroit permettant la circulation d’air.  Utilisez uniquement l’adaptateur secteur fourni avec votre ordinateur. Votre Mac mini utilise emploie un adaptateur secteur de 110 watts.  La seule manière de couper complètement l’alimentation de l’ordinateur consiste à débrancher le câble d’alimentation. Veillez à tirer sur la prise et non pas sur le câble. Débranchez l’adaptateur secteur et tout autre câble si l’un des cas suivants se présente :  vous comptez nettoyer votre Mac mini (suivez obligatoirement les conseils décrits en la page 66) ;  la prise ou le câble d’alimentation est usé ou endommagé ;  votre Mac mini ou son adaptateur secteur est exposé à la pluie, à une humidité excessive ou du liquide est accidentellement versé dans le boîtier ;  votre Mac mini ou son adaptateur secteur est tombé ou est détérioré, ou vous soupçonnez que son entretien ou sa réparation devient obligatoire. Caractéristiques électriques :  Fréquence : 50 à 60 Hz  Tension de ligne : 100 à 240 V CA AVERTISSEMENT : il est normal que l’adaptateur secteur chauffe lorsqu’il est utilisé. Veillez à toujours prévoir une ventilation adéquate et à éviter tout contact prolongé avec l’appareil.Chapitre 4 Dernières recommandations 63 Détérioration de l’audition L’utilisation d’écouteurs ou d’un casque d’écoute à un niveau de volume trop élevé peut provoquer une perte d’acuité auditive permanente. Il est possible de supporter petit à petit des volumes sonores de plus en plus élevés qui peuvent sembler normaux à la longue, mais qui risquent néanmoins d’endommager votre ouïe. En cas de bourdonnements dans les oreilles ou d’un affaiblissement de l’audition, cessez l’écoute et consultez un médecin. Plus le volume sonore est élevé, plus les atteintes à l’audition sont rapides. Les experts de l’audition recommandent les mesures de précaution suivantes :  Limitez la durée d’utilisation d’écouteurs ou d’un casque à volume sonore élevé.  Évitez de monter le volume pour couvrir les bruits ambiants.  Baissez le son si vous n’entendez pas les personnes parler autour de vous. Activités à risque Cet ordinateur n’est pas conçu pour être exploité dans des installations nucléaires, pour la navigation ou la communication aérienne, dans le contrôle aérien ou pour aucun autre usage où une panne de votre système informatique pourrait entraîner la mort, des blessures ou de graves dommages écologiques. AVERTISSEMENT : apporter des modifications ou ne pas se conformer aux procédures indiquées dans le manuel livré avec votre équipement peut vous exposer à des radiations dangereuses. 64 Chapitre 4 Dernières recommandations Important : le matériel électrique peut s’avérer dangereux s’il n’est pas utilisé correctement. L’utilisation de ce produit ou de tout produit similaire doit toujours être supervisée par un adulte. Évitez que des enfants ne manipulent les composants internes ou les câbles de ces appareils. Ne procédez à aucune réparation par vous-même Votre Mac mini ne contient aucune pièce manipulable par l’utilisateur. N’essayez pas d’ouvrir votre Mac mini. S’il a besoin d’être réparé, consultez les informations sur le service après-vente fournies avec votre ordinateur pour savoir comment contacter Apple ou un fournisseur de services agréé Apple à cet effet. Si vous ouvrez votre Mac mini ou installez des éléments, vous risquez d’endommager votre matériel ; ce type de dommage n’est pas couvert par la garantie limitée de votre Mac mini. Informations importantes sur la manipulation Environnement de fonctionnement Faire fonctionner votre Mac mini sans respecter les limites indiquées peut influer sur les performances :  Températures de fonctionnement : 10* à 35° C AVERTISSEMENT : n’introduisez jamais d’objet d’aucune sorte dans les ouvertures de ventilation du boîtier. Cela pourrait être dangereux et endommager votre ordinateur. AVIS : ne pas suivre les présentes instructions de manipulation peut entraîner la détérioration de votre Mac mini ou de la propriété d’autrui.Chapitre 4 Dernières recommandations 65  Températures pour le stockage : - 40° à 47° C  Humidité relative : 5 % à 95 % (sans condensation)  Altitude de fonctionnement maximale : 3 048 mètres Mise sous tension de votre Mac mini N’allumez jamais votre Mac mini sans vous assurer que ses composants internes et ses périphériques externes sont en place. Faire fonctionner l’ordinateur lorsque des éléments manquent peut s’avérer dangereux et endommager votre ordinateur. Transport de votre Mac mini Avant de soulever ou de repositionner votre Mac mini, éteignez-le et débranchez tous les câbles qui y sont connectés. Si vous transportez votre Mac mini dans un sac ou une mallette, assurez-vous qu’aucun objet libre (tels que des trombones ou des pièces de monnaie) peut s’introduire accidentellement à l’intérieur de l’ordinateur par les orifices de ventilation ou le logement du lecteur optique ou se bloquer dans un des ports. Utilisation de connecteurs et de ports Ne forcez jamais au moment d’enficher un connecteur dans un port. Pour brancher un périphérique, assurez-vous que le port n’est pas obstrué, que le connecteur correspond bien au port et que vous l’avez positionné correctement.66 Chapitre 4 Dernières recommandations Rangement de votre Mac mini Si vous rangez votre Mac mini pour une période longue, placez-le dans un endroit à température ambiante non excessive (de préférence autour de 22° C). Nettoyage de votre Mac mini Pour nettoyer le boîtier de votre Mac mini et ses composants, éteignez d’abord votre Mac mini et débranchez-le du secteur. Servez-vous alors d’un chiffon doux, humide et non pelucheux pour nettoyer l’extérieur de l’ordinateur. Évitez les infiltrations d’humidité par quelque ouverture que ce soit. Ne vaporisez jamais de liquide directement sur l’ordinateur. N’utilisez pas d’aérosols, de solvants ou d’abrasifs pouvant détériorer les finitions. Principes ergonomiques Voici quelques astuces pour l’installation d’un environnement de travail sain. Clavier Veillez à maintenir vos épaules relâchées lorsque vous utilisez le clavier. Le bras et l’avant-bras doivent former un angle quasiment droit, la main étant placée dans le prolongement du poignet. Changez souvent la position des mains pour éviter la fatigue musculaire. Certains utilisateurs risquent de ressentir une certaine incommodité dans les mains, les poignets ou les bras après des durées de travail intensif sans pause. Si vous commencez à ressentir une douleur ou une certaine incommodité chronique au niveau des mains, des poignets ou des bras, consultez un professionnel de la santé qualifié.Chapitre 4 Dernières recommandations 67 Souris Positionnez la souris à la même hauteur que le clavier et vous permettant de l’atteindre confortablement. Siège Optez pour un siège de bureau réglable et offrant un dossier et une assise confortables. Réglez la hauteur du siège de sorte que vos cuisses soient horizontales et que vos pieds reposent à plat sur le sol. Le dossier du siège doit soutenir votre région lombaire, c’est-à-dire la partie inférieure de votre dos. Suivez les instructions du fabricant afin que le réglage du dossier soit parfaitement adapté à votre morphologie. Si nécessaire, relevez votre siège pour que la position de vos avant-bras et vos mains forme un angle approprié avec le clavier. Si, dans ce cas, vos pieds ne reposent plus à plat sur le sol, utilisez un repose-pied inclinable et réglable en hauteur. Vous pouvez également abaisser le niveau du plan de travail pour éviter l’emploi d’un repose-pied. Une autre solution consiste à utiliser un bureau doté d’un support à clavier situé plus bas que la surface de travail. Moniteur Placez le moniteur de manière à ce que le haut de l’écran se trouve légèrement en dessous du niveau des yeux lorsque vous êtes assis au clavier. Il vous appartient de juger de la meilleure distance entre vos yeux et l’écran. Elle se situe en général entre 45 et 70 cm.68 Chapitre 4 Dernières recommandations Orientez l’écran de manière à ce qu’il reflète le moins possible la lumière provenant de l’éclairage et des fenêtres. Si possible, utilisez un support inclinable pour l’écran. Le support permet de définir le meilleur angle de vue et de contribuer à réduire ou à éliminer l’éblouissement provoqué par les sources lumineuses fixes. Pour plus d’informations sur l’ergonomie, rendez-vous le web : Cuisses légèrement inclinées Épaules détendues Écran positionné de manière à éviter les reflets Avants-bras et mains alignés Avants-bras à plat ou légèrement inclinés Bas du dos maintenu Pieds à plat sur le sol ou sur un respose-pied Partie supérieure de l’écran au niveau des yeux ou légè- rement en dessous (vous devrez éventuellement ré- gler la hauteur de votre moniteur en surélevant ou en abaissant votre surface de travail). Espace dégagé sous la surface de travail 45–70 cm www.apple.com/fr/about/ergonomicsChapitre 4 Dernières recommandations 69 Apple et l’environnement Apple Inc. reconnaît sa responsabilité en matière de réduction de l’impact de ses produits et de ses activités sur l’environnement. Pour plus d’informations, rendez-vous à l’adresse : www.apple.com/fr/environment71 Regulatory Compliance Information Compliance Statement This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. See instructions if interference to radio or television reception is suspected. L’utilisation de ce dispositif est autorisée seulement aux conditions suivantes : (1) il ne doit pas produire de brouillage et (2) l’utilisateur du dispositif doit être prêt à accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. Radio and Television Interference This computer equipment generates, uses, and can radiate radio-frequency energy. If it is not installed and used properly—that is, in strict accordance with Apple’s instructions—it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in Part 15 of FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. You can determine whether your computer system is causing interference by turning it off. If the interference stops, it was probably caused by the computer or one of the peripheral devices. If your computer system does cause interference to radio or television reception, try to correct the interference by using one or more of the following measures:  Turn the television or radio antenna until the interference stops.  Move the computer to one side or the other of the television or radio.  Move the computer farther away from the television or radio.  Plug the computer into an outlet that is on a different circuit from the television or radio. (That is, make certain the computer and the television or radio are on circuits controlled by different circuit breakers or fuses.) If necessary, consult an Apple Authorized Service Provider or Apple. See the service and support information that came with your Apple product. Or consult an experienced radio/television technician for additional suggestions. Important: Changes or modifications to this product not authorized by Apple Inc. could void the EMC compliance and negate your authority to operate the product. This product has demonstrated EMC compliance under conditions that included the use of compliant peripheral devices and shielded cables (including Ethernet network cables) between system components. It is important that you use compliant peripheral devices and shielded cables between system components to reduce the possibility of causing interference to radios, television sets, and other electronic devices.72 Responsible party (contact for FCC matters only): Apple Inc. Corporate Compliance 1 Infinite Loop, MS 26-A Cupertino, CA 95014 Wireless Radio Use Cet appareil doit être utilisé à l’intérieur lorsqu’il fonctionne dans l’intervalle de fréquences compris de 5,15 à 5,25 GHz. Cet appareil doit être utilisé à l’intérieur. Exposure to Radio Frequency Energy The radiated output power of the AirPort Extreme technology is below the FCC and EU radio frequency exposure limits. Nevertheless, it is advised to use the wireless equipment in such a manner that the potential for human contact during normal operation is minimized. FCC Bluetooth Wireless Compliance The antenna used with this transmitter must not be colocated or operated in conjunction with any other antenna or transmitter subject to the conditions of the FCC Grant. Bluetooth Industry Canada Statement This Class B device meets all requirements of the Canadian interference-causing equipment regulations. Cet appareil numérique de Classe B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. Industry Canada Statement Complies with the Canadian ICES-003 Class B specifications. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. This device complies with RSS 210 of Industry Canada. Bluetooth Europe—Déclaration de conformité UE Cet appareil sans fil est conforme à la directive R&TTE. Europe—Déclaration de conformité UE See www.apple.com/euro/compliance. Korea Warning Statements Singapore Wireless Certification Taiwan Wireless Statements73 Taiwan Class B Statement VCCI Class B Statement External USB Modem Information When connecting your Mac mini to the phone line using an external USB modem, refer to the telecommunications agency information in the documentation that came with your modem. ENERGY STAR® Compliance As an ENERGY STAR® partner, Apple has determined that standard configurations of this product meet the ENERGY STAR® guidelines for energy efficiency. The ENERGY STAR® program is a partnership with electronic equipment manufacturers to promote energy-efficient products. Reducing energy consumption of products saves money and helps conserve valuable resources. This computer is shipped with power management enabled with the computer set to sleep after 10 minutes of user inactivity. To wake your computer, click the mouse or trackpad button or press any key on the keyboard. For more information about ENERGY STAR®, visit: www.energystar.gov.74 Informations sur l’élimination et le recyclage Ce symbole indique que la mise au rebut de votre produit doit obéir aux lois et réglementations locales. Quand vous souhaitez mettre au rebut votre produit, contactez Apple ou les autorités locales pour en savoir plus sur les modalités de son recyclage. Pour en savoir plus sur le programme de recyclage d’Apple, rendez-vous sur l’adresse www.apple.com/fr/ environment/recycling. Informations sur l’élimination des batteries Débarrassez-vous des batteries en respectant les lois et les consignes environnementales locales. Deutschland: Dieses Gerät enthält Batterien. Bitte nicht in den Hausmüll werfen. Entsorgen Sie dieses Gerätes am Ende seines Lebenszyklus entsprechend der maßgeblichen gesetzlichen Regelungen. Nederlands: Gebruikte batterijen kunnen worden ingeleverd bij de chemokar of in een speciale batterijcontainer voor klein chemisch afval (kca) worden gedeponeerd. Taïwan: Union européenne—Informations sur l’élimination Le symbole ci-dessus signifie que vous devez vous débarrasser de votre produit sans le mélanger avec les ordures ménagères, selon les normes et la législation de votre pays. Lorsque ce produit n’est plus utilisable, portez-le dans un centre de traitement des déchets agréé par les autorités locales. Certains centres acceptent les produits gratuitement. Le traitement et le recyclage séparé de votre produit lors de son élimination aideront à préserver les ressources naturelles et à protéger l’environnement et la santé des êtres humains.K Apple Inc. © 2009 Apple Inc. Tous droits réservés. En application des lois et conventions en vigueur, aucune reproduction totale ni partielle du manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Le logo Apple est une marque d’Apple Inc., déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option + 1) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale. Tout a été mis en œuvre pour que les informations pré- sentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression. Apple 1 Infinite Loop Cupertino, CA 95014 408-996-1010 www.apple.com Apple, le logo Apple, AirPort, AirPort Extreme, FireWire, iPod, iTunes, Keynote, Mac, Mac OS et QuickTime sont des marques d’Apple Inc. déposées aux États-Unis et dans d’autres pays. Aperture, Apple Remote Desktop, Final Cut Studio, Finder, le logo FireWire, iPhone et Logic Studio sont des marques d’Apple Inc. AppleCare et Apple Store sont des marques de service d’Apple Inc. déposées aux États-Unis et dans d’autres pays. ENERGY STAR® est une marque déposée aux États-Unis. La marque et les logos Bluetooth® sont des marques déposées par Bluetooth SIG, Inc. et sont utilisés sous licence par Apple. Les autres noms de produits et de sociétés sont la propriété de leurs détenteurs respectifs. Les produits commercialisés par des entreprises tierces ne sont mentionnés que pour information, sans aucune intention de préconisation ni de recommandation. Apple décline toute responsabilité quant à l’utilisation et au fonctionnement de ces produits. Fabriqués sous licence par Dolby Laboratories. « Dolby », « Pro Logic » et le symbole double D sont des marques de Dolby Laboratories. Ouvrages confidentiels inédits, © 1992–1997 Dolby Laboratories, Inc. Tous droits réservés. Le produit décrit dans ce manuel intègre des technologies de protection des droits d’auteur elles-mêmes protégées par divers brevets des États-Unis ainsi que par d’autres droits de propriété intellectuelle appartenant à Macrovision Corporation et à d’autres détenteurs. L’utilisation de ces technologies de protection des droits d’auteur doit être autorisée par Macrovision Corporation et est destinée à un cadre privé ou restreint, sauf consentement de Macrovision Corporation. Tout démontage ou ingénierie inverse est interdit. L’appareil est couvert par les brevets des États-Unis portant les numéros 4,631,603, 4,577,216, 4,819,098 et 4,907,093 sous licence à des fins de visualisation limitée uniquement. Publié simultanément aux États-Unis et au Canada. Création de réseaux AirPort grâce à l’Utilitaire AirPort Mac OS X 10.5 + Windows2 1 Table des matières Chapitre 1 4 Premiers contacts 6 Configuration, à l’aide d’Utilitaire AirPort, de périphériques sans fil Apple pour l’accès à Internet 7 Extension de la portée de votre réseau AirPort 7 Partage d’un disque dur USB branché sur une borne d’accès AirPort Extreme ou sur une Time Capsule 8 Impression à l’aide d’un périphérique sans fil Apple 8 Partage de la connexion à Internet de votre ordinateur Chapitre 2 11 Sécurité d’AirPort 11 Sécurité des réseaux AirPort domestiques 12 Sécurité des réseaux AirPort pour les entreprises et les écoles 13 WPA (Wi-Fi Protected Access) et WPA2 Chapitre 3 16 Configuration de réseaux AirPort 17 Configuration à l’aide d’Utilitaire AirPort 20 Configuration du réseau AirPort Extreme 27 Configuration et partage de l’accès à Internet 45 Réglage des options avancées 47 Configuration d’un système de distribution sans fil WDS 52 Extension de la portée d’un réseau 802.11n 54 Configuration d’un réseau bibande (2,4 GHz et 5 GHz) 55 Protection de votre réseau 61 Acheminement du trafic réseau vers un ordinateur particulier de votre réseau (mappage de ports) 63 Journalisation 64 Configuration de IPv6 65 Partage et protection de disques durs USB sur votre réseau 66 Utilisation d'une Time Capsule sur votre réseau 67 Connexion d’une imprimante USB à un périphérique sans fil Apple 68 Ajout d’un client sans fil à votre réseau 802.11n 69 Résolution des problèmesTable des matières 3 Chapitre 4 71 Considérations générales 71 Fonctionnement d’un réseau 75 Éléments pouvant provoquer des interférences avec AirPort Glossaire 761 4 1 Premiers contacts AirPort est le moyen le plus simple d’accéder sans fil à Internet et aux réseaux, depuis n’importe quel emplacement de votre maison, de votre bureau ou d’une salle de classe. AirPort repose sur les dernières spécifications de l’avant-projet 802.11n de l’IEEE (Institute of Electrical and Electronics Engineers) et assure une mise en réseau sans fil rapide et fiable à la maison, dans les salles de classe ou dans les petites entreprises. Il offre des taux de transfert de données jusqu’à cinq fois supérieurs au taux fournis par la norme 802.11g et un rayon de détection réseau au moins deux fois plus étendu. La borne d’accès AirPort Extreme et la Time Capsule sont des dispositifs bibandes, c’est-à- dire qu’elles fonctionnent aussi bien dans le spectre de 2,4 Gigahertz (GHz) que de 5 GHz. Elles sont en outre totalement rétrocompatibles, de sorte que les ordinateurs Mac et PC équipés de cartes de connexion sans fil répondant aux normes 802.11a, 802.11b, 802.11g ou à l’avant-projet de norme 802.11n de l’IEEE peuvent se connecter aux réseaux sans fil Airport. Ils fonctionnent également sans problème avec AirPort Express pour diffuser notamment de la musique via une connexion sans fil. La borne d’accès AirPort Extreme et la Time Capsule sont dotées de trois ports Ethernet 10/100/1000Base-T Gigabit supplémentaires ; il n’est donc pas nécessaire d’ajouter un routeur à votre réseau. Pour configurer une borne d’accès AirPort Extreme, AirPort Express ou une Time Capsule, vous devez exécuter Utilitaire AirPort, l’application de configuration et de gestion simplifiées. Utilitaire AirPort est doté d’une interface utilisateur simple rassemblant l’ensemble des commandes logicielles. Il simplifie la gestion de plusieurs périphériques sans fil Apple et offre des fonctions de contrôle de clients et de journalisation. Utilitaire AirPort permet d’activer des comptes d’invité à durée de validité limitée pour autoriser un accès temporaire à votre réseau. Il n’est, par conséquent, plus nécessaire de fournir le mot de passe de votre réseau aux utilisateurs de passage. Vous pouvez même créer des comptes dotés de limites temporaires afin d’exercer un contrôle parental optimal. Cette version d’Utilitaire AirPort prend en charge IPv6 et Bonjour, afin que vous puissiez « rendre publics » des services réseau tels que l’impression et le partage de disque dur à travers le port WAN.Chapitre 1 Premiers contacts 5 Remarque : lorsque les fonctionnalités abordées dans ce document s’appliquent indiffé- remment à la borne d’accès AirPort Extreme, à l'AirPort Express et à la Time Capsule, les périphériques sont alors appelés, dans leur ensemble, « périphériques sans fil Apple ». Vous pouvez brancher un disque dur USB sur une borne d’accès AirPort Extreme ou sur une Time Capsule pour que tout le monde ayant accès au réseau puisse sauvegarder, stocker et partager des fichiers. Comme chaque Time Capsule comprend un disque AirPort interne, il n’est pas nécessaire de brancher de disque externe. Vous pouvez, si vous le désirez, connecter d’autres disques USB au port USB de votre Time Capsule. Vous avez également la possibilité de brancher une imprimante USB sur le port USB de n’importe quel périphérique sans fil Apple, afin que tous les utilisateurs du réseau puissent accéder à l’imprimante ou au concentrateur. Tous les périphériques sans fil Apple procurent un niveau élevé de sécurité d’accès sans fil. Ils comportent un coupe-feu intégré et prennent en charge des technologies standard de chiffrement de données. L’utilitaire de configuration simple d’emploi et de puissantes commandes d’accès permettent toutefois aux utilisateurs autorisés de se connecter sans difficultés au réseau Airport qu’ils ont créés. Utilisez l’une des méthodes suivantes avec un périphérique sans fil Apple pour assurer un accès sans fil à Internet et partager une seule connexion à Internet entre plusieurs ordinateurs :  Configurez le périphérique en routeur destiné à fournir des adresses IP aux ordinateurs du réseau via DHCP et NAT. Si le périphérique sans fil est branché sur un modem DSL ou câble connecté à Internet, il reçoit les pages web et le courrier électronique provenant d’Internet à travers sa connexion Internet, puis retransmet ce contenu via le réseau sans fil (aux ordinateurs sans fil) ou via Ethernet (aux ordinateurs connectés par leur port Ethernet).  Configurez le périphérique sans fil Apple en pont entre un réseau existant disposant déjà d’un accès à Internet et un routeur fournissant les adresses IP. Le périphérique transmet alors les adresses IP et la connexion Internet aux ordinateurs équipés d’AirPort ou d’une carte sans fil ou aux ordinateurs connectés au périphérique sans fil via Ethernet. 6 Chapitre 1 Premiers contacts Ce document fournit des informations sur la borne d’accès AirPort Extreme, sur AirPort Express et sur Time Capsule, ainsi que des informations détaillées sur la configuration de réseaux 802.11n à l’aide d’Utilitaire AirPort pour des ordinateurs équipés de Mac OS X v10.5 ou ultérieur ou de Windows XP et du Service Pack 2. Vous pouvez configurer un périphérique sans fil Apple pour vous connecter sans fil à Internet en quelques minutes. De plus, comme les périphériques sans fil Apple sont des produits de mise en réseau à la fois souples et puissants, vous pouvez créer un réseau AirPort offrant de nombreuses autres possibilités. Ce document permet également de concevoir et de mettre en place un réseau AirPort chargé de fournir, via Ethernet, un accès Internet à des ordinateurs non équipés d’AirPort ou de tirer parti de certaines des fonctionnalités plus avancées de votre périphérique sans fil. Vous trouverez d’autres informations générales concernant les réseaux sans fil, ainsi qu’une vue d’ensemble de la technologie AirPort, dans les documents AirPort publiés précédemment et disponibles à l’adresse www.apple.com/fr/support/manuals/airport. Remarque : les captures d’écran d’Utilitaire AirPort contenues dans ce document proviennent de Mac OS X 10.5. Si vous utilisez un ordinateur Windows, il se peut que les images de ce document diffèrent légèrement de ce qui apparaît sur votre écran. Configuration, à l’aide d’Utilitaire AirPort, de périphériques sans fil Apple pour l’accès à Internet Tout comme votre ordinateur, les périphériques sans fil Apple doivent, pour se connecter à Internet, être configurés à l’aide des informations appropriées sur le matériel et la mise en réseau IP. Installez Utilitaire AirPort, disponible sur le CD accompagnant votre périphérique sans fil, et exécutez-le pour indiquer les données de configuration d’accès à Internet et d’autres réglages réseau. Cette version d’Utilitaire AirPort allie la simplicité d’usage d’Assistant réglages AirPort et la puissance d’Utilitaire Admin AirPort. Elle est installée dans le dossier Utilitaires (situé dans le dossier Applications) sur les ordinateurs Macintosh fonctionnant sous Mac OS X, et dans Démarrer > Tous les programmes > AirPort sur les ordinateurs fonctionnant sous Windows. Utilitaire AirPort vous guide tout au long de la procédure de configuration en vous posant une série de questions visant à déterminer comment la connexion à Internet de la borne d’accès et les autres interfaces doivent être configurées. Saisissez les réglages Ethernet, PPPoE (PPP over Ethernet) ou LAN (réseau local) qui vous ont été fournis par votre fournisseur d’accès à Internet ou votre administrateur réseau, attribuez à votre réseau AirPort un nom et un mot de passe, configurez une borne d’accès comme pont sans fil pour étendre le champ de détection de votre réseau AirPort existant et réglez d’autres options. Une fois que vous avez terminé la saisie des réglages, Utilitaire AirPort transfère ces derniers à votre périphérique sans fil. Il se connecte ensuite à Internet et partage sa connexion Internet avec les ordinateurs qui accèdent au réseau AirPort.Chapitre 1 Premiers contacts 7 Vous pouvez également créer un réseau AirPort exploitant les fonctions de mise en réseau plus avancées offertes par les périphériques sans fil Apple. Pour le réglage d’options AirPort plus évoluées, Utilitaire AirPort vous permet de configurer manuellement votre périphérique sans fil ou de reprendre et modifier rapidement des réglages que vous avez déjà configurés sur un autre périphérique. Certaines des fonctions avancées de mise en réseau AirPort ne peuvent être mises en place qu’à l’aide des fonctions de configuration manuelle d’Utilitaire AirPort. Utilitaire AirPort vous permet de configurer manuellement votre périphérique sans fil Apple si :  vous souhaitez fournir l’accès Internet à des ordinateurs qui se connectent au périphérique sans fil via Ethernet ;  vous avez déjà configuré votre périphérique, mais vous devez modifier un réglage (les informations d’identification de votre compte par exemple) ;  vous devez configurer des réglages avancés tels que la fréquence de canal, les options avancées de sécurité, les réglages relatifs aux réseaux fermés, la durée de bail DHCP, le contrôle d’accès, la confidentialité WAN, les réglages de puissance de transmission, le mappage de ports ou d’autres options. Pour obtenir des instructions relatives à l’usage d’Utilitaire AirPort en vue de configurer manuellement votre périphérique sans fil et votre réseau, reportez-vous à la rubrique « Configuration à l’aide d’Utilitaire AirPort » à la page 17. Extension de la portée de votre réseau AirPort Vous pouvez étendre la portée de votre réseau en vous servant d’Utilitaire AirPort soit pour configurer des connexions sans fil entre plusieurs périphériques de votre réseau et créer ainsi un système WDS (Wireless Distribution System), soit pour connecter un périphérique via Ethernet afin de créer un réseau itinérant. Pour plus d’informations sur la configuration d’un WDS ou d’un réseau itinérant, consultez la section « Connexion de périphériques sans fil supplémentaires à votre réseau AirPort » à la page 45. Partage d’un disque dur USB branché sur une borne d’accès AirPort Extreme ou sur une Time Capsule Si vous utilisez une Time Capsule ou la toute dernière borne d’accès AirPort Extreme, vous pouvez brancher un disque dur USB dessus afin que les ordinateurs Macintosh ou Windows, connectés sans fil ou par câbles, puissent partager des fichiers sur le disque dur. Comme chaque Time Capsule comprend un disque AirPort interne, il n’est pas nécessaire de brancher de disque externe. Vous pouvez, si vous le désirez, connecter d’autres disques USB au port USB de votre Time Capsule. Voir « Partage et protection de disques durs USB sur votre réseau » à la page 65.8 Chapitre 1 Premiers contacts Impression à l’aide d’un périphérique sans fil Apple Si vous disposez d’une imprimante compatible USB branchée sur votre périphérique sans fil Apple, les ordinateurs du réseau AirPort peuvent utiliser Bonjour (technologie réseau Apple sans configuration nécessaire) pour exploiter l’imprimante. Pour obtenir des instructions sur l’utilisation d’une imprimante USB à partir d’un ordinateur, reportez-vous à la section intitulée « Connexion d’une imprimante USB à un périphérique sans fil Apple » à la page 67. Partage de la connexion à Internet de votre ordinateur Si votre ordinateur est connecté à Internet, vous pouvez partager votre connexion avec d’autres ordinateurs fonctionnant sous Mac OS X 10.2 ou ultérieur ou sous Windows XP Service Pack 2. On parle alors d’ordinateur en configuration de borne d’accès logicielle. Vous pouvez partager votre connexion à Internet à condition que votre ordinateur soit connecté à Internet. Si votre ordinateur passe en mode veille, si vous le redémarrez ou si la connexion à Internet est interrompue, vous devez réactiver le partage Internet. Pour démarrer le partage Internet sur un ordinateur sous Mac OS X 10.5 : 1 Ouvrez Préférences Système, puis cliquez sur Partage. 2 Choisissez le port à utiliser pour partager votre connexion Internet dans le menu local « Partager votre connexion depuis ». 3 Sélectionnez le port à utiliser pour partager votre connexion Internet dans la liste « Aux ordinateurs via ». Vous pouvez, par exemple, partager votre connexion avec des ordinateurs équipés d’une carte AirPort ou d’un port Ethernet intégré. 4 Sélectionnez Partage Internet dans la liste des services.Chapitre 1 Premiers contacts 9 5 Si vous souhaitez partager votre connexion Internet avec des ordinateurs équipés d’AirPort, cliquez sur Options AirPort pour attribuer un nom et un mot de passe à votre réseau. Pour démarrer le partage Internet sur un ordinateur fonctionnant sous Windows : 1 Ouvrez le Panneau de configuration accessible depuis le menu Démarrer, puis cliquez sur Réseau et Internet. 2 Cliquez sur « Centre Réseau et partage ». 3 Cliquez sur « Gérer les connexions réseau » dans la liste Tâches. 4 Cliquez à l’aide du bouton droit de la souris sur la connexion réseau à partager, puis sélectionnez Propriétés. 5 Cliquez sur Partage et cochez la case « Autoriser d’autres utilisateurs du réseau à se connecter via la connexion Internet de cet ordinateur ».10 Chapitre 1 Premiers contacts Remarque : si vous utilisez le même port (le port Ethernet intégré, par exemple) pour la connexion à Internet et pour la connexion au réseau local, consultez votre FAI avant d’activer le partage Internet. En effet, dans certains cas (si vous utilisez un modem câble par exemple), il est possible que l’activation du partage Internet ait des répercussions sur les réglages réseau d’autres clients de votre FAI. Ce dernier risque alors de résilier votre accès à Internet afin de vous empêcher de perturber son réseau. Les chapitres suivants décrivent les options de sécurité AirPort, la conception et la configuration de réseaux AirPort ainsi que d’autres options avancées.2 11 2 Sécurité d’AirPort Ce chapitre présente une vue d’ensemble des fonctions de sécurité disponibles avec AirPort. Les périphériques sans fil Apple sont conçus pour offrir plusieurs niveaux de sécurité, afin que vous puissiez accéder à Internet, gérer vos transactions financières en ligne ou envoyer et recevoir du courrier électronique en toute tranquillité. La borne d’accès AirPort Extreme et la Time Capsule comprennent également un logement permettant d’insérer un cadenas pour dissuader tout vol du matériel. Pour obtenir des informations et des instructions sur la configuration de ces fonctions de sécurité, consultez la section « Configuration du réseau AirPort Extreme » à la page 20. Sécurité des réseaux AirPort domestiques Apple vous offre plusieurs moyens de protéger votre réseau AirPort sans fil ainsi que les données qui y circulent. Pare-feu NAT Il est possible de protéger votre réseau sans fil à l’aide d’un coupe-feu. Les périphériques sans fil Apple disposent d’un coupe-feu NAT (Network Address Translation) intégré qui constitue une barrière entre votre réseau et Internet, protégeant ainsi vos données contre les attaques IP venant d’Internet. Le coupe-feu est activé automatiquement lorsque vous configurez le périphérique pour le partage d’une connexion Internet unique. Pour les ordinateurs équipés d’un modem câble ou DSL, AirPort se révèle en réalité plus sûr qu’une connexion filaire. Réseau fermé La création d’un réseau fermé permet de maintenir la confidentialité du nom et de l’existence même de votre réseau. Les utilisateurs potentiels de votre réseau doivent connaître le nom et le mot de passe de celui-ci pour pouvoir y accéder. Pour créer un réseau fermé, utilisez Utilitaire AirPort, situé dans le dossier Utilitaires du dossier Applications sur les ordinateurs Macintosh ou dans Démarrer > Tous les programmes > AirPort sur les ordinateurs exécutant Windows.12 Chapitre 2 Sécurité d’AirPort Protection et chiffrement des mots de passe AirPort utilise la protection et le chiffrement des mots de passe pour offrir un niveau de sécurité comparable à celui des réseaux filaires traditionnels. Les utilisateurs doivent parfois saisir un mot de passe pour se connecter au réseau AirPort. Pour transmettre des données et des mots de passe, le périphérique sans fil utilise un chiffrement à 128 bits, par accès protégé WPA (Wi-Fi Protected Access), WPA2 ou WEP (Wireless Equivalent Privacy), afin de brouiller et de protéger les données. Si vous configurez un périphérique AirPort 802.11n, vous pouvez également utiliser WEP (Transitional Security Network) si des ordinateurs compatibles WEP et WPA/WPA2 sont susceptibles de se connecter à votre réseau. Remarque : la sécurité WPA est uniquement disponible pour les périphériques sans fil AirPort Extreme, les clients AirPort et AirPort Extreme fonctionnant sous Mac OS X 10.3 ou ultérieur et utilisant AirPort 3.3 ou ultérieur, ainsi que les clients non-Apple utilisant d’autres adaptateurs sans fil 802.11 compatibles avec WPA. La sécurité WPA2 requiert la version 5.6 ou ultérieure du programme interne dans le cas d’une borne d’accès AirPort Extreme, la version 6.2 ou ultérieure en ce qui concerne AirPort Express, la version 7.3 ou ultérieure pour Time Capsule et un ordinateur Macintosh doté d’une carte sans fil AirPort Extreme utilisant AirPort 4.2 ou ultérieur. Si votre ordinateur utilise Windows XP ou Windows Vista, consultez la documentation qui l’accompagne pour savoir s’il prend en charge WPA2. Sécurité des réseaux AirPort pour les entreprises et les écoles Les entreprises et les écoles doivent restreindre les communications réseau aux utilisateurs autorisés et protéger les données des regards indiscrets. Pour répondre à ce besoin, les périphériques et logiciels d’accès sans fil Apple offrent une suite fiable de mécanismes de sécurité. Ouvrez Utilitaire AirPort pour configurer ces fonctions de sécurité avancées. Contrôle de la puissance de transmission Étant donné que les ondes radio circulent dans toutes les directions, elles peuvent se propager en dehors des limites d’un immeuble. Le réglage Puissance de transmission disponible dans Utilitaire AirPort vous permet de régler la plage de transmission du réseau de votre périphérique. Seuls les utilisateurs situés à proximité du réseau ont accès au réseau. Contrôle d’accès par adresses MAC Toutes les cartes sans fil et AirPort possèdent une adresse MAC (Media Access Control) unique. Pour les cartes AirPort et AirPort Extreme, l’adresse MAC est parfois appelée « identifiant AirPort ». La prise en charge du contrôle d’accès par adresses MAC permet aux administrateurs d’établir une liste d’adresses MAC et de limiter l’accès au réseau aux seuls utilisateurs dont les adresses MAC figurent dans la liste de contrôle d’accès.Chapitre 2 Sécurité d’AirPort 13 Gestion RADIUS Le service RADIUS (Remote Authentication Dial-In User Service) permet de sécuriser facilement les réseaux de grande envergure. RADIUS est un protocole de contrôle d’accès qui permet à un administrateur système de créer une liste des noms d’utilisateur et des mots de passe des ordinateurs pouvant accéder au réseau. Placer cette liste sur un serveur centralisé permet à de nombreux périphériques sans fil d’y accéder et facilite la mise à jour. Si l’adresse MAC de l’ordinateur d’un utilisateur (propre à chaque carte sans fil 802.11) ne figure pas sur votre liste d’adresses MAC approuvées, l’utilisateur ne pourra pas se connecter à votre réseau. WPA (Wi-Fi Protected Access) et WPA2 La vulnérabilité du WEP est devenu un problème de plus en plus préoccupant. Pour faire face à ce problème, la Wi-Fi Alliance, en conjonction avec l’IEEE, a mis au point des normes de sécurité interfonctionnelles avancées, appelées WPA (Wi-Fi Protected Access) et WPA2. WPA et WPA2 utilisent des caractéristiques rassemblant des mécanismes de sécurité interfonctionnels standard et augmentant considérablement le niveau de protection des données et le contrôle d’accès des réseaux LAN sans fil. Avec le WPA et le WPA2, les utilisateurs de réseaux LAN sans fil ont la garantie que leurs données sont proté- gées et que seuls les utilisateurs autorisés peuvent accéder au réseau. Pour accéder à un réseau sans fil qui utilise WPA ou WPA2, les ordinateurs doivent prendre en charge WPA ou WPA2. WPA offre une protection élevée des données et requiert une authentification de l’utilisateur lorsqu’il est utilisé en mode Entreprise. Les principales technologies fondées sur les normes qui composent le WPA sont, entre autres : le protocole TKIP (Temporal Key Integrity Protocol), 802.1x, MIC (Message Integrity Check) et le protocole EAP (Extensible Authentication Protocol). Le protocole TKIP permet un chiffrement avancé des données en comblant les failles du chiffrement WEP, y compris la fréquence à laquelle les clés sont utilisées pour chiffrer la connexion sans fil. 802.1x et EAP offrent la possibilité d’authentifier un utilisateur sur le réseau sans fil. 802.1x est une méthode de contrôle d’accès réseau fondée sur le port destinée aux réseaux filaires ou sans fil. L’IEEE a adopté la norme 802.1x en août 2001. La fonction MIC (Message Integrity Check) a pour but d’empêcher un pirate d’intercepter des paquets de données, de les falsifier et de les renvoyer. La fonction MIC propose une fonction mathématique puissante par laquelle le récepteur et l’émetteur calculent puis comparent le MIC. Si les MIC ne correspondent pas, on suppose que les données ont été falsifiées et le paquet est supprimé. Si la fonction MIC échoue plusieurs fois, le réseau peut lancer des contre-mesures.14 Chapitre 2 Sécurité d’AirPort Le protocole EAP connu comme TLS (Transport Layer Security) présente les informations d’identification des utilisateurs sous forme de certificats numériques. Les certificats numériques d’un utilisateur incluent, par exemple, les noms d’utilisateurs et mots de passe, les cartes intelligentes, les mots de passe de connexion ou toute autre information d’identification que l’administrateur du système informatique a décidé d’utiliser. WPA utilise un large éventail d’implémentations EAP fondées sur les normes, notamment le protocole EAP-TLS (EAP-Transport Layer Security), le protocole EAP-TTLS (EAP-Tunnel Transport Layer Security) et le protocole PEAP (Protected Extensible Authentication Protocol). AirPort Extreme prend également en charge le protocole LEAP (Lightweight Extensible Authentication Protocol), une protocole de sécurité utilisé par les points d’accès Cisco pour attribuer de manière dynamique une clé WEP distincte à chaque utilisateur. AirPort Extreme est compatible avec le protocole de sécurité LEAP de Cisco, ce qui permet aux utilisateurs AirPort de se connecter, via le protocole LEAP, aux réseaux sans fil hébergés par Cisco. En plus de TKIP, WPA2 prend en charge le protocole de chiffrement AES-CCMP. Basé sur AES (Advanced Encryption Standard), le standard de chiffrement par blocs sécurisé adopté aux États-Unis, combinant les techniques les plus sophistiquées, AES-CCMP a été spécialement conçu pour les réseaux sans fil. La migration de WEP vers WPA2 requiert le nouveau programme interne de la borne d’accès AirPort Extreme (version 5.6 ou ultérieure) et de l’AirPort Express (version 6.2 ou ultérieure). Les périphériques utilisant le mode WPA2 ne sont plus compatibles avec WEP. WPA et WPA2 disposent de deux modes :  le mode Personnel, qui s’appuie sur les capacités des protocoles TKIP ou AES-CCMP sans avoir recours à un serveur d’authentification ;  le mode Entreprise, qui utilise un serveur séparé, comme par exemple le serveur RADIUS, pour l’authentification des utilisateurs. WPA et WPA2 Personnel  Pour les réseaux domestiques ou les petites entreprises à domicile, WPA et WPA2 fonctionnent en mode Personnel afin de prendre en compte le fait que ces utilisateurs ne possèdent pas de serveur d’authentification. Au lieu de s’authentifier auprès d’un serveur RADIUS, les utilisateurs saisissent manuellement un mot de passe pour se connecter au réseau sans fil. Lorsqu’un utilisateur saisit correctement son mot de passe, le périphérique sans fil lance le processus de chiffrement à l’aide du protocole TKIP ou AES-CCMP. Les protocoles TKIP ou AES-CCMP utilisent le mot de passe d’origine et calculent mathématiquement ses clés de chiffrement à partir du mot de passe réseau. La clé de chiffrement est régulièrement modifiée et alternée afin qu’aucune clé ne soit utilisée deux fois de suite. À part la saisie du mot de passe réseau, aucune intervention de l’utilisateur n’est requise pour faire fonctionner le WPA ou WPA2 Personnel à son domicile.Chapitre 2 Sécurité d’AirPort 15 WPA et WPA2 Entreprise WPA est un sous-ensemble de la future norme IEEE 802.11i qui répond efficacement aux besoins en matière de sécurité WLAN (Wireless Local Area Network) pour l’entreprise. WPA2 est la mise en œuvre de la norme ratifiée IEEE 802.11i. Dans une entreprise dotée de ressources informatiques, WPA doit être utilisé en conjonction avec un serveur d’authentification tel que RADIUS pour offrir une gestion et un contrôle d’accès centralisés. Une fois cette implémentation effectuée, les solutions complémentaires telles que les réseaux privés virtuels (VPN) ne sont plus nécessaires, tout au moins pour sécuriser les connexions sans fil d’un réseau. Pour plus d’informations sur la configuration d’un réseau protégé par WPA ou WPA2, consultez la section « Utilisation de WPA (Wi-Fi Protected Access) » à la page 56.3 16 3 Configuration de réseaux AirPort Ce chapitre contient des informations et des instructions d’ordre général sur les types de réseaux AirPort Extreme que vous pouvez configurer et sur certaines des options avancées proposées par AirPort Extreme. Reportez-vous à ce chapitre au moment de créer et de configurer votre réseau AirPort Extreme. La configuration de votre périphérique sans fil Apple pour mettre en place un réseau se fait en trois étapes : Étape 1 : Configuration du réseau AirPort Extreme Les ordinateurs communiquent avec le périphérique sans fil à travers le réseau sans fil AirPort. Lorsque vous configurez le réseau AirPort créé par le périphérique sans fil, vous pouvez attribuer un nom au réseau sans fil, définir un mot de passe nécessaire pour accéder à ce réseau et régler d’autres options. Étape 2 : Configuration et partage de l’accès à Internet Lorsque des ordinateurs accèdent à Internet via le réseau AirPort Extreme, le périphérique sans fil se connecte à Internet, puis transmet les informations à travers le réseau AirPort Extreme. Vous devez définir les réglages de votre périphérique sans fil en fonction des données fournies par votre FAI et configurer la manière dont le périphérique sans fil partage cette connexion avec les autres ordinateurs. Étape 3 : Réglage des options avancées Ces réglages sont facultatifs pour la plupart des utilisateurs. Ils comprennent l’utilisation du périphérique sans fil Apple comme pont entre votre réseau AirPort Extreme et un réseau Ethernet, le réglage d’options de sécurité avancées, la configuration d’un système de distribution sans fil WDS (Wireless Distribution System) afin d’étendre le réseau AirPort à d’autres périphériques sans fil et le réglage plus précis d’autres options. Pour des instructions précises sur toutes ces étapes, consultez les sections plus loin dans ce chapitre.Chapitre 3 Configuration de réseaux AirPort 17 Vous pouvez effectuer la plupart de vos tâches d’installation et de configuration à l’aide d’Utilitaire AirPort et en suivant les instructions à l’écran relatives à la saisie des informations concernant votre réseau et votre fournisseur d’accès à Internet. Pour régler les options avancées, vous devez passer par Utilitaire AirPort pour configurer manuellement votre périphérique sans fil Apple et votre réseau AirPort. Configuration à l’aide d’Utilitaire AirPort Pour configurer votre ordinateur ou votre périphérique sans fil Apple, afin d’établir un réseau sans fil de base à l’aide d’une borne d’accès AirPort Extreme, ouvrez Utilitaire AirPort et répondez à une série de questions concernant vos réglages Internet et la manière dont vous souhaitez configurer votre réseau. 1 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows). 2 Sélectionnez votre périphérique dans la liste de gauche si votre réseau comprend plusieurs périphériques. Cliquez sur Continuer, puis suivez les instructions à l’écran pour saisir les réglages transmis par votre fournisseur d’accès à Internet ou votre administrateur réseau en fonction du type de réseau à configurer. Reportez-vous aux diagrammes de réseau présentés plus loin dans ce chapitre pour connaître les différents types de réseaux que vous pouvez configurer à l’aide d’Utilitaire AirPort. Pour configurer un réseau plus complexe, ou pour apporter des modifications à un réseau que vous avez déjà configuré, utilisez les fonctions de configuration manuelle disponibles dans Utilitaire AirPort.18 Chapitre 3 Configuration de réseaux AirPort Définition des préférences AirPort Utilisez les préférences AirPort pour configurer votre périphérique sans fil afin qu’il vous signale la disponibilité des mises à jour. Vous pouvez également la configurer pour qu’elle vous notifie lorsqu’elle détecte des problèmes, et qu’elle vous fournissent des instructions visant à résoudre le problème. Pour définir les Préférences AirPort : 1 Ouvrez Utilitaire AirPort, situé dans le dossier Utilitaires du dossier Applications sur un Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows. 2 Choisissez Préférences, dans le menu Utilitaire AirPort si vous possédez un Mac, ou dans le menu Fichier s’il s’agit d’un ordinateur Windows. Activez les cases suivantes :  Activez la case « Rechercher les mises à jour à l’ouverture d’Utilitaire AirPort » pour rechercher automatiquement sur le site web Apple les mises à jour de logiciel et de programme interne à chaque fois que vous ouvrez Utilitaire AirPort.  Activez la case « Rechercher les mises à jour », puis choisissez un intervalle de temps comme hebdomadaire, dans le menu local, pour rechercher les mises à jour de logiciel et de programme interne en arrière-plan. Utilitaire AirPort s’ouvre si des mises à jour sont disponibles.  Sélectionnez « Surveiller les périphériques sans fil Apple pour détecter les problèmes » afin de détecter les problèmes à l’origine du clignotement orange du voyant d’état du périphérique. Lorsque cette case est activée, Utilitaire AirPort s’ouvre si un problème est détecté et fournit des instructions pour vous aider à résoudre le problème. Cette option permet de surveiller tous les périphériques sans fil du réseau.  Sélectionnez « Ne surveiller que les périphériques sans fil Apple que j’ai configurés » pour surveiller uniquement les périphériques que vous avez configurés à l’aide de cet ordinateur. La détection des problèmes de périphérique requiert un périphérique AirPort sans fil prenant en charge la version 7.0 ou ultérieure du programme interne. Pour configurer manuellement votre périphérique sans fil : 1 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows). 2 Sélectionnez votre périphérique dans la liste. 3 Choisissez Configuration manuelle dans le menu Borne d’accès, puis saisissez le mot de passe si nécessaire. Le mot de passe par défaut est public.Chapitre 3 Configuration de réseaux AirPort 19 Si votre périphérique sans fil ne figure pas dans la liste : 1 Ouvrez le menu d’état AirPort dans la barre des menus, dans le cas d’un ordinateur Mac, et assurez-vous que vous êtes connecté au réseau AirPort créé par votre périphérique sans fil. Dans le cas d’un ordinateur Windows, placez le pointeur de la souris sur l’icône représentant le réseau sans fil dans la barre de notification pour vous assurer que l’ordinateur est connecté au bon réseau. Le nom de réseau par défaut d’un périphérique sans fil Apple est « Réseau AirPort xxxxxx », les xxxxxx représentant les six derniers chiffres de l’identifiant AirPort, également connu sous le nom d’adresse MAC. L’identifiant AirPort est placé au bas des périphériques sans fil Apple. 2 Assurez-vous que les réglages réseau et TCP/IP de votre ordinateur sont configurés correctement. Sur un ordinateur Mac OS X, choisissez AirPort dans le menu local Afficher de la sousfenêtre Réseau des Préférences Système. Choisissez ensuite Via DHCP dans le menu local Configurer IPv4 de la sous-fenêtre TCP/IP. Sur un ordinateur Windows, cliquez avec le bouton droit de la souris sur l’icône de connexion sans fil affichant le réseau AirPort, puis choisissez État. Cliquez sur Propriétés, sélectionnez Protocole Internet (TCP/IP), puis cliquez sur Propriétés. Assurez-vous que la case « Obtenir une adresse IP automatiquement » est sélectionnée. Si vous ne parvenez pas à ousipvrir les réglages du périphérique sans fil : 1 Assurez-vous que vos réglages réseau et TCP/IP sont configurés correctement. Si votre ordinateur fonctionne sous Mac OS X, choisissez AirPort dans la liste des services de connexion réseau située dans la sous-fenêtre Réseau des Préférences Système. Cliquez sur Avancé, puis choisissez Via DHCP dans le menu local Configurer IPv4 de la sous-fenêtre TCP/IP. Sur un ordinateur Windows, cliquez avec le bouton droit de la souris sur l’icône de connexion sans fil affichant le réseau AirPort, puis choisissez État. Cliquez sur Propriétés, sélectionnez Protocole Internet (TCP/IP), puis cliquez sur Propriétés. Assurez-vous que la case « Obtenir une adresse IP automatiquement » est sélectionnée. 2 Veillez à saisir correctement le mot de passe du périphérique sans fil. Le mot de passe par défaut est public. Si vous avez oublié le mot de passe, vous pouvez rétablir le mot de passe par défaut (public) en réinitialisant l’équipement. Pour rétablir temporairement le mot de passe par défaut (public), maintenez le bouton de réinitialisation enfoncé pendant une seconde. Pour restaurer les réglages par défaut du périphérique, appuyez sur le bouton de réinitialisation pendant cinq secondes. Si vous accédez à un réseau Ethernet comportant d’autres périphériques ou si vous utilisez Ethernet pour vous connecter au périphérique : Utilitaire AirPort analyse le réseau Ethernet pour créer la liste des périphériques. Par conséquent, lorsque vous ouvrez Utilitaire AirPort, il se peut que vous y trouviez des périphériques que vous ne pouvez pas configurer.20 Chapitre 3 Configuration de réseaux AirPort Configuration du réseau AirPort Extreme La première étape de la configuration de votre périphérique sans fil Apple consiste à en définir les réglages ainsi que ceux du réseau qu’il est censé créer. Le réglage de la plupart des fonctions peut être effectué à l’aide d’Utilitaire AirPort en suivant les instructions à l’écran indiquant comment saisir les informations communiquées par votre fournisseur d’accès à Internet ou votre administrateur réseau. Pour configurer manuellement un réseau ou pour définir des options avancées, ouvrez la configuration de votre périphérique sans fil dans Utilitaire AirPort, puis configurez manuellement votre périphérique et votre réseau. 1 Choisissez le réseau du périphérique sans fil à configurer dans le menu AirPort (sur un ordinateur Mac OS X) ou à l’aide de l’icône de connexion sans fil située dans la barre de notification (sur un ordinateur Windows). 2 Ouvrez Utilitaire AirPort et sélectionnez le périphérique sans fil dans la liste. S’il n’y figure pas, cliquez sur Rescanner pour parcourir les périphériques sans fil disponibles, puis sélectionnez celui qui convient. 3 Choisissez Configuration manuelle dans le menu Borne d’accès, puis saisissez le mot de passe si nécessaire. Le mot de passe par défaut est public.Chapitre 3 Configuration de réseaux AirPort 21 Vous avez également la possibilité de double-cliquer sur le nom du périphérique sans fil pour ouvrir sa configuration dans une fenêtre distincte. La sous-fenêtre Résumé est affichée lorsque vous ouvrez la fenêtre de configuration manuelle. Cette sous-fenêtre fournit des informations sur votre périphérique sans fil et sur le réseau et indique leur état. Si le périphérique présente un problème, l’icône d’état devient jaune. Cliquez sur « État » pour afficher le problème ainsi que des suggestions de solution.22 Chapitre 3 Configuration de réseaux AirPort Réglages de périphérique sans fil Cliquez sur le bouton AirPort, puis cliquez sur Borne d’accès. La sous-fenêtre Borne d’accès d’Utilitaire AirPort permet de saisir des informations sur le périphérique sans fil. Attribution d’un nom au périphérique sans fil Attribuez un nom aisément identifiable au périphérique. Ce nom permet aux administrateurs de localiser plus facilement un périphérique donné sur un réseau Ethernet qui en compte plusieurs. Modification du mot de passe du périphérique sans fil Le mot de passe du périphérique protège sa configuration de sorte que seul l’administrateur peut la modifier. Le mot de passe par défaut est public. Il est recommandé de changer ce mot de passe pour empêcher des modifications non autorisées. Si vous conservez public comme mot de passe, aucun mot de passe ne vous sera demandé lorsque vous sélectionnerez le périphérique dans la liste et que vous cliquerez sur Configurer. Autres informations  Autorisez la configuration via le port WAN. Cela vous permet d’administrer le périphérique sans fil à distance.  Rendez le matériel public sur Internet via Bonjour. Si vous disposez d’un compte bénéficiant d’un service DNS dynamique, vous pouvez vous y connecter par Internet.  Réglez automatiquement l’heure du périphérique. Si vous avez accès à un serveur NTP (Network Time Protocol), sur votre réseau ou sur Internet, sélectionnez-le dans le menu local. Cela permet de s’assurer que l’heure du périphérique sans fil est toujours correctement réglée.Chapitre 3 Configuration de réseaux AirPort 23 Définition des options de la borne d’accès Cliquez sur Options de la borne d’accès, puis définissez les options suivantes :  Saisissez le nom et les coordonnées d’une personne de contact pour le périphérique sans fil. Ces données sont incluses dans certains historiques générés par le périphérique. Les champs Contact et Configuration peuvent également vous être utiles si vous disposez de plusieurs périphériques sans fil sur votre réseau.  Réglez le comportement du voyant d’état sur Toujours activé ou sur « Clignotement en cas d’activité ». Si vous choisissez « Clignotement en cas d’activité », le voyant d’état du périphérique clignote au gré du trafic réseau.  Si votre périphérique sans fil prend en charge cette option, sélectionnez « Recherche mise à jour du prog. interne », puis choisissez une fréquence, par exemple Tous les jours, dans le menu local. Réglages de réseau sans fil Cliquez sur Sans fil, puis saisissez le nom du réseau, le mode radio et d’autres informations relatives au réseau sans fil. Réglage du mode sans fil L’AirPort Extreme prend en charge trois modes sans fil :  Créer un réseau sans fil. Choisissez cette option si vous créez un nouveau réseau AirPort Extreme.  Participer à un réseau WDS. Choisissez cette option si vous créez un réseau WDS ou que vous connectez ce périphérique sans fil Apple à un réseau WDS déjà configuré.  Étendre un réseau sans fil. Choisissez cette option si vous comptez connecter un autre périphérique sans fil Apple au réseau que vous configurez.24 Chapitre 3 Configuration de réseaux AirPort Attribution d’un nom au réseau AirPort Extreme Attribuez un nom à votre réseau AirPort. Ce nom apparaîtra dans le menu d’état AirPort des ordinateurs équipés de la technologie AirPort et se trouvant dans la zone de couverture de votre réseau AirPort. Choix du mode radio Choisissez « 802.11n (compatible 802.11b/g) » dans le menu local Mode radio si des ordinateurs équipés d’une carte sans fil 802.11n, 802.11g ou 802.11b doivent accéder au réseau. Chaque ordinateur client se connectera au réseau et transmettra le trafic réseau à sa vitesse maximale. Choisissez « 802.11n uniquement (2,4 GHz) » si seuls des ordinateurs équipés d’une carte sans fil compatible 802.11n doivent accéder au réseau dans la gamme de fré- quence de 2,4 GHz. Choisissez « 802.11n (compatible 802.11a) » si des ordinateurs équipés d’une carte sans fil 802.11n ou 802.11a doivent accéder au réseau dans la gamme de fréquence de 5 GHz. Les ordinateurs équipés d’une carte sans fil 802.11g ou 802.11b ne pourront pas accéder au réseau. Choisissez « 802.11n uniquement (5 GHz) » si des ordinateurs équipés d’une carte sans fil 802.11n doivent accéder au réseau. Le réseau adoptera une vitesse de transmission équivalente à celle de la spécification 802.11n. Les ordinateurs équipés d’une carte sans fil 802.11g, 802.11b ou 802.11a ne pourront pas accéder au réseau. Remarque : si vous ne souhaitez pas utiliser le mode radio 802.11n, maintenez la touche Option enfoncée puis choisissez un mode radio qui ne comporte pas 802.11n. Modification du canal Le « canal » correspond à la fréquence radio sur laquelle votre périphérique sans fil communique. Si vous n’utilisez qu’un seul périphérique (chez vous par exemple), il est peu probable que vous deviez changer de fréquence. En revanche, si vous configurez plusieurs périphériques sans fil (dans une école ou au bureau), vous devez utiliser des fréquences différentes sur les périphériques situés à moins de 45 m environ les uns des autres. L’écart entre les fréquences de canal de périphériques sans fil adjacents doit être d’au moins quatre canaux. Ainsi, si un périphérique A est réglé sur le canal 1, le périphérique B doit être réglé sur le canal 6 ou 11. Pour un résultat optimal, utilisez les canaux 1, 6 ou 11 si vous utilisez votre périphérique dans la plage de fréquence de 2,4 GHz. Les ordinateurs munis d’AirPort se calent automatiquement sur la fréquence de votre périphérique sans fil lorsqu’ils se connectent au réseau AirPort. Si vous modifiez la fré- quence, les ordinateurs clients AirPort n’ont besoin d’effectuer aucun changement. Remarque : si vous réglez le mode radio de votre périphérique sans fil sur « 802.11n uniquement (5 GHz) », il est impossible de changer de canal. Le mode de fréquence de 5 GHz choisit automatiquement le canal.Chapitre 3 Configuration de réseaux AirPort 25 Protection de votre réseau par mot de passe Pour protéger votre réseau par mot de passe, vous pouvez choisir parmi plusieurs options de sécurité sans fil. Dans la sous-fenêtre AirPort d’Utilitaire AirPort, cliquez sur Sans fil, puis choisissez l’une des options suivantes dans le menu local Sécurité d’accès sans fil :  Aucune : si vous sélectionnez cette option, la protection par mot de passe du réseau sera désactivée. N’importe quel ordinateur équipé d’un adaptateur ou d’une carte sans fil peut rejoindre le réseau, sauf si ce dernier est configuré pour utiliser le contrôle d’accès. Voir « Configuration du contrôle d’accès » à la page 58.  WEP : si votre périphérique prend en charge cette option, sélectionnez-la, puis choisissez un mot de passe pour protéger votre réseau à l’aide d’un mot de passe WEP (Wired Equivalent Privacy). Votre périphérique sans fil Apple prend en charge le chiffrement à 40 et à 128 bits. Pour utiliser le WEP 40-bit, n’utilisez pas le mode radio 802.11n.  WEP (réseau de sécurité transitionnel) : si votre périphérique prend en charge cette option, vous pouvez l’utiliser pour permettre à tous les ordinateurs utilisant WPA ou WPA2 d’accéder au réseau. Ainsi, les ordinateurs ou les périphériques qui utilisent WEP peuvent également accéder au réseau. WEP (Transitional Security Network) prend en charge le chiffrement 128-bit. Pour utiliser cette option, le périphérique sans fil doit utiliser un mode radio 802.11n.  WPA/WPA2 Personnel : choisissez cette option pour protéger votre réseau à l’aide d’un mot de passe WPA (Wi-Fi Protected Access). Vous pouvez choisir un mot de passe de 8 à 63 caractères ASCII ou bien une clé prépartagée comprenant exactement 64 caractères hexadécimaux. Les ordinateurs qui prennent en charge WPA ou WPA2 peuvent accéder au réseau. Choisissez WPA2 Personnel pour que seuls les ordinateurs prenant en charge WPA2 puissent accéder au réseau.  WPA/WPA2 Entreprise : choisissez cette option si vous configurez un réseau comportant un serveur d’authentification, tel qu’un réseau RADIUS, avec des comptes utilisateur individuels. Saisissez l’adresse IP et le numéro de port des serveurs principal et secondaire, puis saisissez un « secret partagé » qui correspond au mot de passe du serveur. Choisissez WPA2 Entreprise pour que seuls les ordinateurs prenant en charge WPA2 puissent accéder au réseau. Pour obtenir plus informations et d’instructions sur la configuration de WPA et WPA2 sur votre réseau, consultez « Utilisation de WPA (Wi-Fi Protected Access) » à la page 56.26 Chapitre 3 Configuration de réseaux AirPort Réglages des options d’accès sans fil Cliquez sur « Options d’accès sans fil » pour définir des options supplémentaires pour votre réseau. Réglage des options d’accès sans fil supplémentaires Pour définir les options ci-dessous, utilisez la sous-fenêtre « Options d’accès sans fil » :  Région : définissez le code de région correspondant à l’endroit où se trouve votre réseau.  Taux de multidiffusion : choisissez un taux de multidiffusion dans le menu local. Si vous choisissez un taux de multidiffusion élevé, seuls les clients du réseau se trouvant dans la zone de couverture et capables d’atteindre la vitesse sélectionnée pourront recevoir les transmissions.  Puissance de transmission : ce menu local permet de définir la portée du réseau (plus le pourcentage est faible, plus la portée est réduite).  Délai de la clé de groupe WPA : tapez un nombre dans le champ de texte, puis choisissez un incrément dans le menu local pour changer la fréquence de rotation de clé.  Utiliser les canaux larges : si vous configurez votre réseau afin qu’il utilise la gamme de fréquence de 5 GHz, vous pouvez utiliser des canaux larges pour fournir un débit réseau plus élevé. Remarque : dans certains pays, l’utilisation de canaux larges est interdite.  Créer un réseau fermé : sélectionner cette option permet de masquer le nom du réseau, afin que les utilisateurs soient obligés de saisir le nom et le mot de passe exacts du réseau pour accéder au réseau AirPort Extreme. Chapitre 3 Configuration de réseaux AirPort 27  Robustesse d’interférence : cette option peut aider à résoudre les problèmes d’interférences provoqués par d’autres appareils ou réseaux. Pour définir d’autres options avancées de sécurité, voir « Protection de votre réseau » à la page 55. Configuration et partage de l’accès à Internet L’étape suivante consiste à configurer la connexion Internet de votre périphérique sans fil et à partager cet accès avec les ordinateurs clients. Les sections ci-après vous expliquent comment procéder, en fonction du mode de connexion à Internet de votre périphérique. Vous utilisez un modem DSL ou câble Vous pouvez, dans la plupart des cas, mettre en place ce type de réseau à l’aide d’Utilitaire AirPort, en suivant les instructions à l’écran de configuration de votre périphérique sans fil et de votre réseau. Utilitaire AirPort n’est nécessaire pour configurer manuellement votre périphérique que si vous souhaitez configurer ou modifier des réglages avancés facultatifs. Schéma des connexions Fonctionnement  Le périphérique sans fil Apple (dans notre exemple, une Time Capsule) se connecte à Internet via sa connexion Internet WAN (<) à votre modem DSL ou câble.  Les ordinateurs utilisant AirPort ou les ordinateurs connectés au port LAN Ethernet (G) du périphérique sans fil se connectent à Internet à travers le périphérique.  Le périphérique est configuré pour se connecter à Internet à l’aide d’une adresse IP publique et utilise les protocoles DHCP et NAT pour partager sa connexion Internet avec d’autres ordinateurs du réseau à l’aide d’adresses IP privées.  Les ordinateurs AirPort et Ethernet peuvent communiquer entre eux par le biais du périphérique sans fil. modem DSL ou câble vers Internet vers port Ethernet Time Capsule < port WAN Ethernet28 Chapitre 3 Configuration de réseaux AirPort Important : utilisez uniquement le port LAN (G) du périphérique pour brancher les ordinateurs Ethernet non connectés à Internet. Comme le périphérique peut fournir des services réseau, vous devez le configurer soigneusement afin d’éviter d’éventuels conflits avec d’autres services sur votre réseau Ethernet. Éléments requis pour une connexion par modem DSL ou modem câble Procédure à suivre Si vous faites appel à Utilitaire AirPort pour vous aider à configurer le périphérique sans fil Apple pour l’accès à Internet : 1 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows). 2 Suivez les instructions à l’écran, saisissez les réglages de connexion à Internet qui vous ont été communiqués par votre fournisseur d’accès à Internet, puis configurez le périphérique afin qu’il partage sa connexion Internet avec les ordinateurs du réseau. Si vous configurez manuellement votre périphérique sans fil à l’aide d’Utilitaire AirPort : 1 Assurez-vous que votre modem DSL ou câble est branché sur le port WAN Ethernet (<) de votre périphérique sans fil Apple. 2 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows). Sélectionnez votre périphérique sans fil, puis choisissez Configuration manuelle dans le menu Borne d’accès ou double-cliquez sur l’icône de votre périphérique dans la liste, afin d’ouvrir la configuration dans une fenêtre distincte. 3 Cliquez sur le bouton Internet. Cliquez sur Connexion à Internet, puis choisissez Ethernet ou PPPoE dans le menu local Connexion via, en fonction de la méthode de connexion requise par votre fournisseur d’accès. Si votre FAI vous a fourni un logiciel de connexion PPPoE, tel qu’EnterNet ou MacPoET, choisissez PPPoE. Remarque : si vous vous connectez à Internet à l’aide d’un routeur via PPPoE et que votre périphérique sans fil Apple est connecté au routeur via Ethernet, il est inutile d’utiliser PPPoE sur votre périphérique. Choisissez Ethernet dans le menu local « Connexion via » de la sous-fenêtre Internet, puis décochez la case « Distribuer les adresses IP » dans la sous-fenêtre Réseau. En cas de doute, contactez votre FAI. Éléments Vérification Commentaires Compte Internet auprès d’un FAI par modem câble ou DSL Votre fournisseur d’accès utiliset-il une configuration DHCP ou IP statique ? Vous pouvez soit obtenir ces informations dans la sous-fenêtre des préférences Réseau de l’ordinateur que vous utilisez pour accéder à Internet via votre FAI, soit les demander à ce dernier. Périphérique sans fil Apple (borne d’accès AirPort Extreme, AirPort Express ou Time Capsule) Placez le périphérique à proximité de votre modem DSL ou câble.Chapitre 3 Configuration de réseaux AirPort 29 4 Choisissez Manuellement ou Via DHCP dans le menu local Configurer IPv4 si vous avez choisi Ethernet dans le menu local Connexion via, en fonction de la méthode utilisée par votre fournisseur d’accès pour distribuer les adresses IP.  S’il vous a fourni une adresse IP ainsi que d’autres données avec votre abonnement, vous devez utiliser ces informations pour configurer manuellement l’adresse IP du périphérique. En cas de doute, renseignez-vous auprès du fournisseur d’accès. Saisissez les informations concernant l’adresse IP dans les champs situés en dessous du menu local Configurer IPv4.  Si vous choisissez PPPoE, votre fournisseur d’accès à Internet vous fournit automatiquement une adresse IP via DHCP. Si votre fournisseur d’accès vous demande l’adresse MAC de votre périphérique sans fil, utilisez l’adresse du port WAN Ethernet (<) imprimée sur l’étiquette qui se trouve sous l’appareil. Si vous avez configuré votre périphérique sans fil à l’aide d’Utilitaire AirPort, il se peut que les champs situés sous le menu local Configurer IPv4 contiennent déjà les données appropriées à votre fournisseur d’accès. Vous pouvez modifier la vitesse du port WAN Ethernet si vous avez des conditions spé- cifiques pour le réseau auquel vous êtes connecté. Dans la plupart des cas, les réglages configurés automatiquement sont corrects. Votre fournisseur d’accès devrait pouvoir vous dire si ces réglages doivent être modifiés ou non. Contactez votre fournisseur d’accès pour connaî- tre les informations à saisir dans ces champs. Utilisez ce menu local si vous avez besoin d’ajuster la vitesse du port WAN Ethernet.30 Chapitre 3 Configuration de réseaux AirPort La modification du débit du port WAN Ethernet peut modifier le mode d’interaction entre le périphérique sans fil et Internet. À moins que votre fournisseur d’accès ne vous ait communiqué des réglages spécifiques, utilisez les réglages automatiques. La saisie de réglages inadéquats risque d’affecter la performance du réseau. Si vous configurez TCP/IP via DHCP, choisissez Via DHCP dans le menu local Configurer IPv4. Les informations IP vous sont automatiquement fournies via DHCP par votre fournisseur d’accès à Internet. 5 Si vous avez choisi PPPoE dans le menu local Connexion via, saisissez les réglages PPPoE indiqués par votre fournisseur d’accès. À moins que votre FAI ne requière un nom de service, ne remplissez pas le champ Nom du service. Il se peut que votre FAI vous demande de remplir ces champs.Chapitre 3 Configuration de réseaux AirPort 31 Remarque : AirPort ne requiert pas l’utilisation d’une application de connexion PPPoE de tierce partie. Vous pouvez vous connecter à Internet via AirPort. Si vous vous connectez à Internet à l’aide d’un routeur via PPPoE et que votre périphé- rique sans fil est connecté au routeur par Ethernet, il est inutile d’utiliser PPPoE sur votre périphérique. Choisissez Ethernet dans le menu local « Connexion via » de la sous-fenêtre Internet, puis décochez la case « Distribuer les adresses IP » dans la sousfenêtre Réseau. Comme les adresses IP sont distribuées par votre routeur, votre périphérique n’a pas besoin d’assurer cette fonction. Si plusieurs appareils d’un réseau fournissent des adresses IP, vous risquez de rencontrer des problèmes. Contactez votre fournisseur d’accès pour connaî- tre les informations à saisir dans ces champs.32 Chapitre 3 Configuration de réseaux AirPort 6 Cliquez sur PPPoE pour définir des options PPPoE pour votre connexion.  Choisissez Toujours active, Automatique ou Manuelle, en fonction de la manière dont vous souhaitez contrôler la connexion à Internet de votre périphérique sans fil. Si vous choisissez Toujours active, votre périphérique demeure connecté à votre modem et à Internet tant que le modem est allumé. Si vous choisissez Automatique, le périphérique se connecte au modem, qui se connecte à son tour à Internet, dès qu’une application nécessitant une connexion (telle qu’une application de messagerie électronique, de messagerie instantanée ou de navigation sur le web) est utilisée. Si vous choisissez Manuelle, vous devez vous-même connecter le modem à Internet lorsque vous utilisez une application qui nécessite une connexion à Internet. Si vous choisissez Automatique ou Manuelle dans le menu local Connexion, vous devez choisir un délai tel que « 10 minutes » dans le menu local « Déconnecter si inactif ». Si aucune application Internet n’est requise à l’expiration du délai sélectionné, vous serez déconnecté d’Internet. Remarque : si votre périphérique sans fil est connecté à votre modem via un port LAN Ethernet et que votre modem est connecté à Internet via PPPoE, vous ne pouvez pas utiliser la configuration manuelle.  Saisissez les adresses de serveur DNS et un nom de domaine spécifique auquel votre périphérique accède lorsque vous vous connectez à Internet. 7 Cliquez sur le bouton Réseau et configurez le mode de partage de l’accès Internet de votre périphérique avec les ordinateurs connectés via AirPort et Ethernet.Chapitre 3 Configuration de réseaux AirPort 33 Si vous choisissez Ethernet dans le menu local Connexion via, sélectionnez, dans le menu local Partage de connexion, le mode de partage de connexion à Internet utilisé par votre périphérique.  Pour partager une connexion à Internet unique avec des ordinateurs AirPort et des ordinateurs connectés au périphérique via Ethernet et à l’aide des protocoles DHCP et NAT, choisissez « Partager une adresse IP publique » dans le menu local Partage de connexion. L’utilisation de DHCP et de NAT permet au périphérique sans fil d’attribuer automatiquement des adresses IP dynamiques aux ordinateurs clients, ce qui simplifie la configuration TCP/IP de chacun des ordinateurs. Voir « Définition d’options DHCP et NAT » à la page 34. Par défaut, le périphérique sans fil permet aux autres périphériques et ordinateurs se connectant par Ethernet, et aux ordinateurs se connectant par AirPort, de communiquer entre eux par le biais de protocoles non-IP (AppleTalk, par exemple). Si vous souhaitez connecter une imprimante Ethernet AppleTalk au périphérique sans fil Apple ou utiliser AppleTalk entre des ordinateurs reliés par câble et d’autres communiquant sans fil, assurez-vous que les appareils sont branchés sur le port LAN Ethernet (G) du périphérique.  Pour distribuer une plage d’adresses IP en utilisant uniquement DHCP, choisissez « Distribuer une plage d’adresses IP ». Voir « Définition d’options DHCP uniquement » à la page 36.34 Chapitre 3 Configuration de réseaux AirPort  Si vous ne souhaitez pas que votre périphérique sans fil partage son adresse IP, choisissez « Désactivé (mode pont) ». Si vous configurez votre périphérique en mode pont, les ordinateurs AirPort ont accès à tous les services du réseau Ethernet et le périphérique ne fournit pas les services de partage Internet. Pour en savoir plus sur la configuration de votre périphérique sans fil en mode pont, reportez-vous à la rubrique « Vous utilisez un réseau Ethernet existant » à la page 40. L’utilisation du périphérique sans fil en tant que pont peut s’avérer un moyen de résoudre d’éventuelles incompatibilités entre les fonctions de partage Internet du périphérique et le mode de connexion de votre FAI. Définition d’options DHCP et NAT Si vous choisissez « Partager une adresse IP publique » dans le menu local Partage de connexion, vous pouvez définir des options DHCP et NAT. Cliquez sur DHCP.  Choisissez une plage d’adresses IP dans le menu local Plage d’adresses DHCP. Choisissez 10.0, 192.168 ou 172.16, puis saisissez des adresses de début et de fin dans les champs Première adresse DHCP et Dernière adresse DHCP, en fonction des adresses que vous souhaitez voir attribuer par le périphérique sans fil.  Tapez une valeur dans le champ Bail DHCP, puis choisissez des minutes, des heures ou des jours dans le menu local.  Tapez un message de bienvenue dans le champ Message DHCP. Ce message est affiché dès qu’un ordinateur accède à votre réseau.  Si votre réseau est configuré pour utiliser un serveur LDAP, vous pouvez taper l’adresse de ce serveur dans le champ Serveur LDAP, afin que les ordinateurs de votre réseau puissent y accéder.Chapitre 3 Configuration de réseaux AirPort 35  Pour fournir des adresses IP spécifiques à certains ordinateurs de votre réseau sans fil, cliquez sur Ajouter (+) sous la liste Réservations DHCP, puis suivez les instructions à l’écran pour attribuer un nom à la réservation et réserver l’adresse par adresse MAC ou identifiant de client DHCP. Si vous choisissez l’adresse MAC, cliquez sur Continuer, puis saisissez l’adresse MAC et l’adresse IP spécifique. Vous pouvez ensuite définir des options NAT pour le réseau. Cliquez sur NAT.  Vous pouvez configurer un hôte par défaut sur votre réseau. Un hôte par défaut (parfois nommé un DMZ) est un ordinateur de votre réseau qui est exposé à Internet et reçoit tout le trafic entrant. Il peut s’avérer utile si vous utilisez sur votre réseau AirPort un ordinateur dédié aux jeux en réseau ou si vous voulez acheminer l’ensemble du trafic Internet à travers un seul ordinateur.  Vous pouvez configurer le protocole de mappage de ports NAT (NAT-PMP). Il s’agit d’un projet Internet de l’Internet Engineering Task Force constituant une alternative au protocole UPnP (Universal Plug and Play), plus couramment utilisé et implémenté dans de nombreux routeurs NAT. Le protocole NAT-PMP permet à un ordinateur situé sur un réseau privé (derrière un routeur NAT) de configurer automatiquement le routeur de manière à permettre à des parties situées à l’extérieur du réseau privé de contacter cet ordinateur. Ce protocole comprend une méthode de récupération de l’adresse IP publique d’une passerelle NAT, ce qui permet à un client de faire connaître cette adresse IP publique et le numéro de port à des homologues qui souhaitent communiquer avec lui. Ce protocole est implémenté dans des produits Apple actuels, notamment Mac OS X 10.4 Tiger, les produits de mise en réseau AirPort Extreme et AirPort Express, ainsi que Bonjour for Windows.36 Chapitre 3 Configuration de réseaux AirPort Vous avez également la possibilité de configurer le mappage de ports. Pour vous assurer que les demandes sont acheminées correctement vers votre serveur web, AppleShare ou FTP, ou bien encore vers un ordinateur particulier de votre réseau, vous devez établir une adresse IP permanente pour le serveur ou l’ordinateur et fournir des informations de « mappage de ports en entrée » au périphérique sans fil Apple. Voir « Acheminement du trafic réseau vers un ordinateur particulier de votre réseau (mappage de ports) » à la page 61. Définition d’options DHCP uniquement Si vous choisissez « Distribuer une plage d’adresses IP » dans le menu local Partage de connexion, votre périphérique sans fil est configuré pour exploiter DHCP afin de distribuer une plage d’adresses IP via DHCP uniquement. Cette option ne permet pas d’utiliser NAT. Cliquez sur DHCP, puis tapez les adresses de début et de fin de la plage d’adresses que vous souhaitez distribuer aux ordinateurs accédant à votre réseau sans fil. Vous pouvez définir des options DHCP supplémentaires, telles que le Bail DHCP, le Message DHCP et d’autres, en suivant les instructions ci-dessus. Configuration des ordinateurs clients Pour configurer TCP/IP sur des ordinateurs clients fonctionnant sous Mac OS X 10.5 : 1 Ouvrez Préférences Système sur l’ordinateur client, puis cliquez sur Réseau. 2 Effectuez l’une des opérations suivantes : a Si l’ordinateur client utilise AirPort, sélectionnez AirPort dans la liste des services de connexion réseau, puis cliquez sur Avancé.Chapitre 3 Configuration de réseaux AirPort 37 Choisissez ensuite DHCP dans le menu local Configurer IPv4. b Si vous avez activé un serveur DHCP au moment de configurer le réseau du périphé- rique sans fil et si l’ordinateur client utilise Ethernet, sélectionnez Ethernet dans la liste des services de connexion réseau, puis choisissez Via DHCP dans le menu local Configurer.38 Chapitre 3 Configuration de réseaux AirPort c Si vous avez sélectionné « Distribuer une plage d’adresses IP » lorsque vous avez configuré le réseau du périphérique sans fil, vous pouvez fournir l’accès à Internet aux ordinateurs clients Ethernet en définissant manuellement leurs adresses IP. Pour ce faire, sélectionnez Ethernet dans la liste des services de connexion réseau, puis choisissez Manuellement dans le menu local Configurer. Si vous configurez manuellement des clients Ethernet pour un périphérique sans fil qui fournit le service NAT via Ethernet, vous pouvez utiliser des adresses IP comprises entre 10.0.1.2 et 10.0.1.200. Dans le champ Masque de sous réseau, saisissez 255.255.255.0. Dans le champ Routeur, saisissez 10.0.1.1. Tapez l’adresse de serveur de noms et les informations de domaine de recherche correspondant à celles que vous avez saisies lors de la configuration du périphérique. Pour configurer TCP/IP sur des ordinateurs clients exécutant Windows : Veuillez-vous assurer que vous avez installé l’adaptateur sans fil ainsi que le logiciel nécessaire à sa configuration. Pour configurer TCP/IP sur un ordinateur client : 1 Ouvrez le Panneau de configuration accessible depuis le menu Démarrer, puis cliquez sur Réseau et Internet. 2 Cliquez sur « Centre Réseau et partage ». 3 Cliquez sur « Gérer les connexions réseau » dans la liste Tâches. 4 Cliquez à l’aide du bouton droit de la souris sur la connexion sans fil à partager, puis sélectionnez Propriétés. Saisissez les adresses IP et de routeur situées dans la plage fournie votre périphé- rique. Saisissez les adresses DNS et de domaine de recherche si nécessaire.Chapitre 3 Configuration de réseaux AirPort 39 5 Cliquez sur « Protocole Internet version 4 (TCP/IPv4) », puis sur Propriétés.  Si vous avez choisi « Partager une adresse IP publique » dans la sous-fenêtre Réseau d’Utilitaire AirPort, sélectionnez « Obtenir une adresse IP automatiquement ».  Si vous avez choisi « Distribuer une plage d’adresses IP » en configurant le réseau du périphérique sans fil, vous pouvez fournir l’accès Internet aux ordinateurs clients en définissant manuellement les adresses IP. Dans ce cas, sélectionnez « Utiliser l’adresse IP suivante ». Lorsque vous configurez manuellement des clients pour un périphérique sans fil fournissant le service NAT, utilisez des adresses IP situées dans les plages 10.0.1.2 à 10.0.1.200, 172.16.1.2 à 172.16.1.200 ou 192.168.1.2 à 192.168.1.200.40 Chapitre 3 Configuration de réseaux AirPort Dans le champ Masque de sous réseau, saisissez 255.255.255.0. Dans le champ Passerelle par défaut, saisissez 10.0.1.1, 172.16.1.1 ou 192.168.1.1, en fonction de la configuration d’adressage utilisée. Tapez l’adresse de serveur de noms et les informations de domaine de recherche correspondant à celles que vous avez saisies lors de la configuration du périphérique. Vous utilisez un réseau Ethernet existant Vous pouvez faire appel à Utilitaire AirPort pour configurer aisément le périphérique sans fil Apple pour l’accès à Internet via un réseau Ethernet existant disposant déjà d’un routeur, d’un commutateur ou de tout autre périphérique réseau fournissant des adresses IP. Utilisez les fonctions de configuration manuelle d’Utilitaire AirPort si vous devez effectuer d’autres réglages avancés facultatifs. Schéma des connexions Fonctionnement  Le périphérique sans fil Apple (dans notre exemple, une Time Capsule) utilise votre réseau Ethernet pour communiquer avec Internet via le port LAN Ethernet (G).  Les clients AirPort et Ethernet accèdent à Internet et au réseau Ethernet via le périphérique sans fil Apple. Router vers Internet vers port Ethernet Time Capsule Tous les programmes > AirPort sur un ordinateur Windows). 2 Cliquez sur Continuer, puis suivez les instructions à l’écran pour vous connecter à votre réseau local (LAN). Si vous configurez manuellement votre périphérique sans fil à l’aide d’Utilitaire AirPort : 1 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows). 2 Sélectionnez votre périphérique, puis choisissez Configuration manuelle dans le menu Borne d’accès ou double-cliquez sur l’icône de votre périphérique afin d’ouvrir la configuration dans une fenêtre distincte. 3 Cliquez sur Internet, puis choisissez Ethernet dans le menu local Connexion via. 4 En fonction de la manière dont les adresses IP sont fournies sur votre réseau Ethernet, choisissez Manuellement ou Via DHCP dans le menu contextuel Configurer IPv4. En cas de doute, renseignez-vous auprès de votre FAI ou de votre administrateur réseau. Éléments Commentaires Périphérique sans fil Apple (borne d’accès AirPort Extreme, AirPort Express ou Time Capsule) Configurez le périphérique en mode pont. Routeur, commutateur ou autre périphérique réseau Ethernet Le routeur, le commutateur ou les autres périphériques de réseau sont configurés pour fournir des adresses IP aux ordinateurs et aux appareils connectés au réseau Ethernet. Câbles Ethernet42 Chapitre 3 Configuration de réseaux AirPort Si vos adresses sont fournies manuellement, choisissez Manuellement dans le menu local Configurer IPv4. Saisissez les informations d’adresse IP dans les champs situés en dessous du menu local Configurer IPv4. Si Utilitaire AirPort vous a servi à configurer votre périphérique sans fil Apple, il se peut que les champs situés sous le menu local Configurer IPv4 contiennent déjà les données appropriées. Si votre adresse IP est fournie par DHCP, choisissez Via DHCP dans le menu local Configurer IPv4. Contactez votre administrateur réseau pour connaître les informations à saisir dans ces champs.Chapitre 3 Configuration de réseaux AirPort 43 5 Choisissez « Désactivé (mode pont) » dans le menu local Partage de connexion. Votre périphérique sans fil établit alors un « pont » entre la connexion Internet des réseaux Ethernet et les ordinateurs connectés sans fil ou via Ethernet au périphérique. Pour obtenir des informations sur la configuration des ordinateurs clients qui se connectent au réseau Ethernet, reportez-vous à la section « Configuration des ordinateurs clients » à la page 36. Connexion de périphériques supplémentaires à votre réseau AirPort Extreme Branchez une imprimante USB sur le port USB de votre périphérique sans fil Apple (dans notre exemple, une Time Capsule) de sorte que tout ceux qui accèdent au réseau puissent utiliser l’imprimante. Branchez un concentrateur USB sur le port USB d’une borne d’accès AirPort Extreme ou d'une Time Capsule, puis connectez un disque dur et une imprimante afin que tous les utilisateurs du réseau puissent y accéder. Si vous branchez une Time Capsule, vous pouvez utiliser Time Machine sous Mac OS X 10.5.2 ou ultérieur pour sauvegarder les données de tous les ordinateurs Mac OS X 10.5 du réseau. Schéma des connexions modem DSL ou câble imprimante USB Time Capsule vers Internet port WAN Ethernet AirPort Extreme <44 Chapitre 3 Configuration de réseaux AirPort Procédure à suivre Suivez les instructions des sections précédentes pour configurer votre réseau AirPort Extreme en fonction de votre mode de connexion à Internet ou de la configuration de votre réseau sans fil. Connectez un disque dur, une imprimante ou un concentrateur USB au port USB de votre borne d’accès AirPort Extreme ou de votre Time Capsule. Remarque : si vous utilisez une AirPort Express sur votre réseau, vous pouvez brancher une imprimante USB sur le port USB, afin que tout le monde ayant accès au réseau puisse utiliser cette imprimante. AirPort Express ne prend pas en charge la connexion de disques durs USB. Utilisation d’un Apple TV sur votre réseau AirPort Extreme afin de lire du contenu iTunes En connectant (sans fil ou par Ethernet) un Apple TV à votre réseau AirPort Extreme, puis en reliant l’Apple TV à votre téléviseur à écran large, vous pouvez profiter de votre contenu iTunes favori (films, émissions de télévision, musique et bien plus encore). Pour obtenir des instructions sur la configuration de l’Apple TV, consultez la documentation incluse avec cet appareil. modem DSL ou câble vers Internet vers port Ethernet < port WAN Ethernet Time Capsule Apple TVChapitre 3 Configuration de réseaux AirPort 45 Réglage des options avancées Connexion de périphériques sans fil supplémentaires à votre réseau AirPort Vous pouvez connecter des périphériques sans fil Apple supplémentaires pour étendre la portée de votre réseau sans fil. Vous pouvez, par exemple, connecter une borne d’accès AirPort Extreme ou une Time Capsule via Ethernet. Les réseaux constitués de périphériques reliés par Ethernet sont appelés réseaux itinérants. Vous avez également la possibilité de connecter sans fil des périphériques Apple. Cela permet de créer un réseau connu sous le nom de WDS (Wireless Distribution System). Configuration de l’itinérance Plusieurs bornes d’accès AirPort Extreme ou Time Capsule peuvent être configurées pour créer un seul réseau sans fil. Les ordinateurs clients utilisant AirPort peuvent passer d’un périphérique à l’autre sans interruption de fonctionnement des services (procédé appelé itinérance). Pour configurer l’itinérance : 1 Connectez toutes les bornes d’accès AirPort Extreme et Time Capsule au même sous-réseau de votre réseau Ethernet. 2 Attribuez un nom unique à chaque périphérique. 3 Attribuez le même nom de réseau et le même mot de passe à tous les périphériques. 4 Configurez les périphériques en tant que ponts en suivant les instructions de la rubrique précédente.46 Chapitre 3 Configuration de réseaux AirPort Si vous voulez qu’un périphérique attribue des adresses IP via DHCP, procédez également comme suit : 1 Configurez un des périphériques comme serveur DHCP. 2 Configurez les autres périphériques comme ponts en suivant les instructions de la rubrique précédente. Le périphérique faisant office de serveur DHCP peut également recevoir son adresse IP via DHCP soit à partir d’un serveur situé sur un réseau Ethernet, soit à partir d’un modem câble ou DSL connecté à un fournisseur d’accès à Internet (FAI). vers port Ethernet ports LAN Ethernet vers Internet AirPort Extreme modem DSL ou câble G Time Capsule < port WAN EthernetChapitre 3 Configuration de réseaux AirPort 47 Configuration d’un système de distribution sans fil WDS Si vous constituez un réseau WDS en connectant sans fils plusieurs périphériques, vous devez configurer chacun de ces périphériques en périphérique principal, en périphérique distant ou en périphérique de relais. Vous pouvez connecter ensemble des bornes d’accès AirPort Extreme ou des Time Capsule 802.11n et utiliser la bande de fréquences de 5 GHz sur le réseau. Dans ce cas, seuls les ordinateurs clients disposant d’une carte sans fil 802.11n peuvent accéder au réseau. Pour que des ordinateurs clients équipés de cartes sans fil 802.11b ou 802.11g puissent accéder au réseau, configurez ce dernier pour la bande de fréquences de 2,4 GHz ou ajoutez une borne d’accès AirPort Extreme ou AirPort Express 802.11g au réseau. Pour plus d’informations sur le réglage de la bande de fréquences du réseau, reportez-vous à la section « Choix du mode radio » à la page 24. Vous pouvez également configurer un réseau bibande, utilisant à la fois les bandes de fréquences de 2,4 GHz et 5 GHz, afin que les ordinateurs clients équipés d’une carte sans fil 802.11n puissent accéder au segment 5 GHz du réseau et que les ordinateurs équipés d’une carte sans fil 802.11b ou 802.11g puissent accéder au segment 2,4 GHz. Voir « Configuration d’un réseau bibande (2,4 GHz et 5 GHz) » à la page 54. Un périphérique sans fil principal se connecte à Internet et partage sa connexion avec des périphériques distants et des périphériques de relais. Un périphérique distant partage la connexion Internet du périphérique principal. Enfin, un périphérique de relais partage la connexion Internet du périphérique principal et la transfère à d’autres périphériques distants ou de relais. Ces trois configurations de périphérique (principale, distante et relais) peuvent également partager la connexion Internet d’un périphérique principal, soit sans fil avec des ordinateurs clients, soit via Ethernet si les ordinateurs clients sont connectés au périphérique via Ethernet. vers port Ethernet port WAN Ethernet vers Internet AirPort Extreme < modem DSL ou câble Time Capsule48 Chapitre 3 Configuration de réseaux AirPort Si vous configurez des périphériques sans fil pour former un réseau WDS, vous devez connaître l’identifiant AirPort de chaque périphérique. L’identifiant AirPort est également appelé adresse MAC. Pour simplifier la configuration d’un réseau WDS, placez tous les périphériques sur une table, puis branchez-les sur une prise de courant. Lors de la phase de configuration WDS, il est recommandé d’attribuer un nom unique à chaque périphérique, afin de pouvoir les identifier plus facilement ultérieurement. Pour configurer le périphérique sans fil principal afin qu’il partage sa connexion Internet avec d’autres périphériques sans fil : 1 Cliquez sur le menu d’état AirPort de la barre des menus et sélectionnez le réseau sans fil créé par le périphérique que vous souhaitez configurer comme périphérique principal. 2 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows). Sélectionnez le périphérique principal, puis choisissez Configuration manuelle dans le menu Borne d’accès ou double-cliquez sur l’icône du périphérique pour ouvrir la configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. Si le périphérique utilise le mot de passe par défaut (à savoir, public), vous n’êtes pas invité à fournir un mot de passe. 3 Cliquez sur le bouton Sans fil, puis choisissez « Participer à un réseau WDS » dans le menu local Mode sans fil. 4 Cliquez sur WDS, puis choisissez WDS principal dans le menu local Mode WDS. 5 Cochez la case « Autoriser les clients sans fil » si vous souhaitez que les ordinateurs clients se connectent à ce périphérique. 6 Cliquez sur le bouton Ajouter (+), puis tapez l’adresse MAC des périphériques sans fil qui doivent se connecter à ce périphérique principal.Chapitre 3 Configuration de réseaux AirPort 49 Pour supprimer un périphérique de la liste, sélectionnez-le, puis cliquez sur le bouton Supprimer (–). 7 Cliquez sur Mettre à jour pour transmettre les nouveaux réglages aux périphériques du réseau WDS. La case « Autoriser les clients sans fil » est activée par défaut. Si vous décochez cette case, puis que vous décidez ultérieurement de modifier les réglages du périphérique sans fil, vous devrez connecter un câble Ethernet au port LAN du périphérique. Dans ce cas, vous ne pourrez pas vous connecter sans fil au périphérique. Pour configurer d’autres périphériques distants de sorte qu’ils se connectent au périphérique principal : Pour ajouter d’autres périphérique de relais ou distants au réseau WDS, après avoir configuré le périphérique principal et les périphériques distants, exécutez à nouveau Utilitaire AirPort. Les périphériques distants doivent communiquer sur le même canal que celui du périphérique principal. Avant de configurer des périphériques distants supplémentaires, repérez le canal du périphérique principal. Pour ce faire, ouvrez Utilitaire AirPort, accédez aux réglages AirPort, puis à la sous-fenêtre Résumé. 1 Cliquez sur le menu d’état AirPort de la barre des menus et sélectionnez le réseau sans fil créé par le périphérique que vous souhaitez configurer comme périphérique distant.50 Chapitre 3 Configuration de réseaux AirPort 2 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un ordinateur Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows). Sélectionnez le périphérique distant, puis choisissez Configuration manuelle dans le menu Borne d’accès. Saisissez un mot de passe le cas échéant. Si le périphérique utilise le mot de passe par défaut (à savoir, public), vous n’êtes pas invité à fournir de mot de passe. 3 Saisissez au besoin le même mot de passe réseau que celui du périphérique principal. 4 Cliquez sur le bouton AirPort, puis cliquez sur Sans fil. Choisissez « Participer à un réseau WDS » dans le menu local Mode sans fil, puis choisissez le même canal que celui du périphérique dans le menu local Canal. 5 Cliquez sur WDS, puis choisissez « WDS distant » dans le menu local. 6 Tapez l’adresse MAC du périphérique principal dans le champ WDS principal. L’adresse MAC, également appelée « identifiant AirPort », est imprimée sur l’étiquette située sous l’appareil. 7 Cliquez sur Mettre à jour pour transférer les réglages. La case « Autoriser les clients sans fil » est activée par défaut. Si vous décochez cette case, puis que vous décidez ultérieurement de modifier les réglages du périphérique sans fil, vous devrez connecter un câble Ethernet au port LAN du périphérique. Dans ce cas, vous ne pourrez pas vous connecter sans fil au périphérique.Chapitre 3 Configuration de réseaux AirPort 51 Pour configurer un périphérique de relais afin qu’il se connecte au périphérique principal et partage sa connexion avec des périphériques distants supplémentaires : Pour configurer un périphérique de relais du réseau WDS afin qu’il partage sa connexion avec d’autres périphériques distants et des clients sans fil, exécutez à nouveau Utilitaire AirPort. Lorsque vous configurez un périphérique de relais, vous devez également configurer au moins un périphérique distant supplémentaire pour partager la connexion du périphé- rique de relais. Pour ce faire, configurez-le d’abord en tant que périphérique distant en suivant les instructions de la page 49. Les périphériques de relais et les périphériques distants doivent communiquer sur le même canal que celui du périphérique principal. Avant de configurer un périphérique distant ou de relais, repérez le canal du périphérique principal. Pour ce faire, ouvrez Utilitaire AirPort, accédez aux réglages AirPort, puis à la sous-fenêtre Résumé. 1 Cliquez sur le menu d’état AirPort de la barre des menus pour accéder au réseau sans fil créé par le périphérique sans fil que vous souhaitez configurer comme périphérique de relais. 2 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un ordinateur Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows). Sélectionnez le périphérique de relais, puis choisissez Configuration manuelle dans le menu Borne d’accès. Si le périphérique utilise le mot de passe par défaut (à savoir, public), vous n’êtes pas invité à fournir un mot de passe. 3 Saisissez au besoin le même mot de passe réseau que celui du périphérique principal. 4 Cliquez sur le bouton AirPort, puis cliquez sur Sans fil. Choisissez « Participer à un réseau WDS » dans le menu local Mode sans fil, puis choisissez le même canal que celui du périphérique principal dans le menu local Canal. 5 Cliquez sur WDS, puis choisissez « WDS relais » dans le menu local Mode WDS. 6 Tapez l’adresse MAC du périphérique principal dans le champ Identifiant AirPort. L’adresse MAC, également appelée « identifiant AirPort », est imprimée sur l’étiquette située sous l’appareil. 7 Cliquez sur le bouton Ajouter (+), puis tapez l’identifiant AirPort du périphérique distant auquel ce périphérique de relais doit se connecter. Pour supprimer un périphérique de la liste, sélectionnez-le, puis cliquez sur le bouton Supprimer (–). 8 Cliquez sur Mettre à jour pour transférer les nouveaux réglages WDS aux périphériques de relais et aux périphériques distants.52 Chapitre 3 Configuration de réseaux AirPort Extension de la portée d’un réseau 802.11n L’extension de la portée d’un réseau 802.11n s’avère plus simple si vous connectez un autre périphérique 802.11n. Le processus de configuration d’un réseau WDS se trouve simplifié par la simple connexion de deux périphériques sans fil Apple 802.11n. Pour étendre la portée d’un réseau 802.11n : 1 Ouvrez Utilitaire AirPort, puis sélectionnez le périphérique chargé de se connecter à Internet. Reportez-vous aux sections précédentes de ce document pour obtenir des instructions sur la configuration de votre périphérique sans fil, en fonction de votre connexion Internet. 2 Choisissez Configuration manuelle dans le menu Borne d’accès ou double-cliquez sur l’icône du périphérique pour ouvrir la configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. 3 Cliquez sur le bouton AirPort, puis cliquez sur Sans fil. 4 Choisissez « Créer un réseau sans fil » dans le menu local Mode sans fil, puis cochez la case « Autoriser les extensions à ce réseau ».Chapitre 3 Configuration de réseaux AirPort 53 5 Sélectionnez ensuite le périphérique chargé d’étendre ce réseau, puis choisissez Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône du périphérique dans la liste pour ouvrir sa configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. 6 Choisissez « Étendre un réseau sans fil » dans le menu local Mode sans fil, puis choisissez, dans le menu local Nom de réseau, le réseau dont vous souhaitez étendre la portée. 7 Le cas échéant, saisissez le nom du réseau et son mot de passe. 8 Cliquez sur Mettre à jour pour actualiser le périphérique avec les nouveaux réglages réseau.54 Chapitre 3 Configuration de réseaux AirPort Configuration d’un réseau bibande (2,4 GHz et 5 GHz) Vous pouvez configurer un réseau bibande, utilisant à la fois les bandes de fréquences de 2,4 GHz et 5 GHz, afin que les ordinateurs clients équipés d’une carte sans fil 802.11n puissent accéder au segment 5 GHz du réseau et que les ordinateurs équipés d’une carte sans fil 802.11b ou 802.11g puissent accéder au segment 2,4 GHz. Configuration d’un réseau bibande : Reportez-vous à la rubrique « Choix du mode radio » à la page 24 pour obtenir des instructions sur la configuration de votre périphérique sans fil Apple dans la bande de fréquences de 5 GHz. Configurez la connexion à Internet de votre périphérique en fonction du type de service que vous utilisez (par modem câble ou DSL ou par connexion a un réseau Ethernet existant disposant d’un accès à Internet). Attribuez un nom, tel que Bureau 5G, à votre réseau 5 GHz, afin que les ordinateurs clients 802.11n puissent accéder au segment 5 GHz du réseau. Connectez votre périphérique sans fil Apple 2,4 GHz à votre périphérique 802.11n via Ethernet. Suivez ensuite les instructions présentées plus haut dans ce chapitre pour configurer votre nouveau périphérique en tant que pont. Attribuez un nom différent, tel que « Bureau 2,4 », au segment 2,4 GHz de votre réseau, afin que les ordinateurs clients 802.11b et 802.11g puissent accéder au segment 2,4 GHz du réseau. Dans l’illustration précédente, une AirPort Express est connectée au segment 2,4 GHz du réseau, de sorte que les ordinateurs clients 802.11b et 802.11g peuvent diffuser en continu de la musique vers l’AirPort Express via AirTunes, tandis que les ordinateurs clients 5 GHZ peuvent accéder au segment 5 GHZ du réseau créé par la borne d’accès AirPort Extreme 802.11n. Modem DSL ou câble vers Internet AirPort Express AirPort Extreme (2,4 GHz) Client 2,4 GHz Client 5 GHz haut-parleurs amplifiés ports LAN Ethernet Tous les programmes > AirPort sur un ordinateur Windows). 2 Sélectionnez votre périphérique sans fil, puis choisissez Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône du périphérique pour ouvrir sa configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. 3 Cliquez sur le bouton AirPort, puis cliquez sur Sans fil. 4 Cliquez sur « Options d’accès sans fil », puis choisissez une valeur dans le menu local Puissance de transmission. Plus le pourcentage est bas, moins la portée est étendue. Protection de votre réseau Votre réseau est protégé par le mot de passe que vous lui donnez. Toutefois, vous pouvez effectuer d’autres opérations pour assurer la protection de votre réseau. Les réseaux gérés par le protocole SNMP (Simple Network Management Protocol) sont susceptibles d’être vulnérables aux attaques par saturation. De même, si vous configurez votre périphérique sans fil via le port WAN, des utilisateurs non autorisés ont la possibilité de modifier vos réglages réseau. Lorsque la configuration distante est activée, les informations Bonjour du périphérique (à savoir, son nom et son adresse IP) sont publiées à travers le port WAN. Le fait de désactiver la configuration distante peut contribuer à une protection accrue de votre réseau. Pour protéger votre réseau et votre périphérique sans fil : 1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique, puis choisissez Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône représentant le périphérique pour ouvrir sa configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. 2 Cliquez sur le bouton Avancé, puis cliquez sur Journalisation & SNMP. 3 Assurez-vous que les cases « Autoriser l’accès SNMP » et « Autoriser SNMP via WAN » ne sont pas cochées.56 Chapitre 3 Configuration de réseaux AirPort Utilisation de WPA (Wi-Fi Protected Access) AirPort Extreme prend en charge les systèmes standard de sécurité WPA et WPA2 pour réseau sans fil. En combinant Mac OS X 10.3 ou ultérieur ou Windows XP Service Pack 2 et les capacités d’authentification 802.1x, le système de sécurité WPA fournit un chiffrement de données plus sophistiqué que le système WEP et permet également l’authentification des utilisateurs, fonction quasiment inexistante avec WEP. Si votre ordinateur est doté d’une carte sans fil AirPort Extreme, vous pouvez profiter des mises à jour de sécurité WPA2 comprenant notamment le chiffrement AES-CCMP. AirPort Extreme prend en charge deux modes de WPA et WPA2 : le mode Entreprise, qui utilise un serveur d’authentification pour authentifier les utilisateurs, et le mode Personnel qui s’appuie sur les capacités de TKIP (pour WPA) et d’AES-CCMP (pour WPA2) sans avoir recours à un serveur d’authentification. Le mode Entreprise est conçu pour les réseaux de grande envergure, dont la configuration et la gestion sont souvent assurées par un informaticien professionnel. Pour configurer un réseau WPA ou WPA2 Entreprise, vous devez tout d’abord configurer une connexion 802.1X dans les préférences Réseau (sur un Mac). Pour configurer une connexion 802.1x sur un ordinateur Windows, reportez-vous à la documentation fournie avec votre ordinateur. La connexion 802.1x requiert un protocole d’authentification, tel que TTLS, LEAP ou PEAP. La configuration d’un réseau WPA ou WPA2 Entreprise requiert la configuration d’un serveur d’authentification, comme par exemple un serveur RADIUS, qui gérera et validera les informations d’identification des utilisateurs (les noms d’utilisateur, les mots de passe et les certificats, par exemple). Pour le configurer, consultez la documentation fournie avec le serveur. Le mode Personnel est destiné aux réseaux des particuliers ou des petites entreprises et peut être configuré et géré par la plupart des utilisateurs. Le mode personnel ne requiert aucun serveur d’authentification distinct. Les utilisateurs du réseau ne doivent généralement saisir que leur nom d’utilisateur et leur mot de passe pour accéder au réseau. Remarque : si vous changez le type de chiffrement d’un réseau WDS en passant de WEP à WPA, il est nécessaire de réinitialiser les périphériques sans fil et de reconfigurer votre WDS. Pour en savoir plus sur la réinitialisation de votre périphérique sans fil Apple, reportez-vous à la documentation fournie.Chapitre 3 Configuration de réseaux AirPort 57 Pour configurer un réseau WPA ou WPA2 Entreprise : Sur un ordinateur exécutant Mac OS X, vous devez d’abord configurer une connexion 802.1X. 1 Ouvrez Préférences Système, cliquez sur Réseau, puis sur AirPort. 2 Cliquez sur Avancé, puis sur 802.1X 3 Saisissez les réglages nécessaires à la connexion. Remarque : certains protocoles d’authentification requièrent une autorisation du certificat numérique sur le serveur. Pour créer et distribuer des certificats numériques, consultez la documentation livrée avec votre serveur. 4 Cliquez sur OK pour enregistrer les réglages de connexion. Pour utiliser Utilitaire AirPort afin de configurer un réseau WPA ou WPA2 Entreprise sur des ordinateurs exécutant Mac OS X et Windows XP : 1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône représentant le périphérique pour ouvrir sa configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. 2 Choisissez WPA/WPA2 Entreprise ou WPA2 Entreprise dans le menu local « Sécurité d’accès sans fil », en fonction des capacités des ordinateurs clients qui accéderont à votre réseau. 3 Cliquez sur Configurer RADIUS, puis tapez l’adresse IP, le port et le secret partagé (ou mot de passe) du serveur principal et du serveur secondaire d’authentification RADIUS. Consultez l’administrateur du serveur RADIUS pour obtenir les informations à saisir dans ces champs. Pour configurer un réseau WPA et WPA2 Personnel : 1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône représentant le périphérique pour ouvrir sa configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. 2 Choisissez WPA/WPA2 Personnel ou WPA2 Personnel dans le menu local « Sécurité d’accès sans fil », en fonction des capacités des ordinateurs clients qui accéderont à votre réseau. 3 Tapez un mot de passe comprenant entre 8 et 63 caractères ASCII.58 Chapitre 3 Configuration de réseaux AirPort Configuration du contrôle d’accès Le contrôle d’accès vous permet d’indiquer les ordinateurs AirPort autorisés à échanger des informations sur le réseau filaire à travers le périphérique sans fil. Chaque ordinateur sans fil possède une adresse MAC unique. Vous pouvez restreindre l’accès en créant une liste de contrôle n’incluant que les adresses MAC des ordinateurs auxquels vous souhaitez autoriser l’accès à votre réseau filaire. Pour rechercher l’adresse MAC (identifiant AirPort) de la carte AirPort de votre ordinateur, cliquez sur le bouton AirPort de la sous-fenêtre Réseau des Préférences Système. Pour configurer la liste de contrôle d’accès : 1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez Configuration manuelle dans le menu Borne d’accès. Saisissez un mot de passe si nécessaire. 2 Cliquez sur le bouton AirPort, puis sur Accès. 3 Choisissez Accès programmé ou RADIUS dans le menu local « Contrôle d’accès d’adresses MAC », en fonction du périphérique que vous configurez.Chapitre 3 Configuration de réseaux AirPort 59  Si vous choisissez Accès programmé, cliquez sur le bouton Ajouter (+) puis saisissez l’adresse MAC et une description ou le nom des ordinateurs auxquels vous autorisez l’accès au réseau. Vous pouvez également cliquer sur Cet ordinateur pour ajouter l’adresse MAC et le nom de l’ordinateur que vous utilisez pour configurer ce périphérique sans fil. Double-cliquez sur l’ordinateur mentionné dans la liste, puis choisissez une valeur dans chaque menu local. Choisissez un jour de la semaine ou « Tous les jours » dans le menu local correspondant au jour, puis sélectionnez « toute la journée » ou « entre » dans l’autre menu local. Si vous choisissez « entre », vous pouvez modifier les heures du jour en double-cliquant dans les champs correspondant aux heures.  Si vous choisissez RADIUS, tapez le type de service RADIUS, les adresses IP RADIUS, le secret partagé et le port principal du serveur RADIUS principal. Saisissez les informations correspondant au serveur RADIUS secondaire le cas échéant. Si vous ne disposez pas de ces informations, adressez-vous à l’administrateur du serveur. Important : le contrôle d’accès AirPort empêche les ordinateurs ne figurant pas dans la liste de contrôle d’accéder au réseau AirPort. Pour savoir comment empêcher les ordinateurs non autorisés de se connecter au réseau AirPort, consultez la rubrique « Configuration du réseau AirPort Extreme » à la page 20. Vous pouvez également ajouter l’adresse MAC d’une carte de réseau sans fil 802.11 de tierce partie à la liste de contrôle d’accès. L’adresse MAC de la plupart des cartes de tierce partie est indiquée sur une étiquette apposée sur leur boîtier métallique. Le contrôle d’accès n’est pas compatible avec le mode WPA ou WPA2 Entreprise. Vous pouvez utiliser le contrôle d’accès ou le mode WPA Entreprise dans un réseau, mais pas les deux à la fois. Utilisation d’un serveur RADIUS L’utilisation d’un serveur RADIUS sur votre réseau vous permet d’authentifier les adresses MAC (identifiants AirPort) à partir d’un ordinateur distinct, évitant ainsi que les différents périphériques réseau stockent l’adresse MAC des ordinateurs ayant accès au réseau. Les adresses sont stockées sur un serveur auquel on accède à l’aide d’une adresse IP spécifique. Pour configurer l’authentification à l’aide d’un serveur RADIUS : 1 Sur le serveur, saisissez les adresses MAC des ordinateurs qui pourront accéder au réseau. 2 Une fois le serveur RADIUS configuré, ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil et choisissez Configuration manuelle dans le menu local Borne d’accès, ou double-cliquez sur l’icône représentant votre périphérique pour ouvrir sa configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. 3 Cliquez sur AirPort, sur Contrôle d’accès, puis choisissez RADIUS dans le menu local « Contrôle d’accès d’adresses MAC ».60 Chapitre 3 Configuration de réseaux AirPort 4 Choisissez un format dans le menu local RADIUS. Si vous sélectionnez Par défaut, votre périphérique sans fil utilise le format d’adresses MAC 010203-0a0b0c. Ces adresses sont ensuite utilisées comme noms d’utilisateur sur le serveur RADIUS. Le secret partagé constitue le mot de passe que les utilisateurs saisissent pour se connecter au réseau. Ce format est souvent utilisé avec les serveurs Lucent et Agere. Si vous choisissez Autre, les adresses MAC utiliseront le format 0102030a0b0c et seront utilisées à la fois comme nom d’utilisateur et mot de passe par les utilisateurs se connectant au réseau. Ce format est souvent utilisé par les serveurs Cisco. 5 Saisissez l’adresse IP, le port et le secret partagé (ou mot de passe) des serveurs principal et secondaires. Pour plus d’informations sur la configuration du serveur RADIUS, consultez la documentation RADIUS fournie avec votre serveur ou contactez votre administrateur réseau. La liste de contrôle d’accès et RADIUS fonctionnent conjointement. Lorsqu’un utilisateur tente de se connecter à un réseau utilisant l’authentification par contrôle d’accès ou par un serveur RADIUS, le périphérique sans fil recherche d’abord dans la liste de contrôle l’adresse MAC de cet utilisateur et autorise l’accès si elle s’y trouve. Si l’adresse MAC n’y figure pas, le périphérique la recherche sur le serveur RADIUS. Si elle s’y trouve, l’utilisateur peut se connecter au réseau. Remarque : le contrôle d’accès RADIUS n’est pas compatible avec le mode WPA ou WPA2 Personnel. Vous pouvez utiliser le contrôle d’accès RADIUS ou le mode WPA Entreprise dans un réseau, mais pas les deux à la fois.Chapitre 3 Configuration de réseaux AirPort 61 Acheminement du trafic réseau vers un ordinateur particulier de votre réseau (mappage de ports) AirPort Extreme utilise le protocole NAT pour partager une adresse IP unique avec les ordinateurs qui se connectent au réseau AirPort Extreme. Pour fournir l’accès Internet à plusieurs ordinateurs à l’aide d’une seule adresse IP, le protocole NAT attribue des adresses IP privées à chaque ordinateur du réseauAirPort Extreme, puis fait correspondre ces adresses à des numéros de port. Le périphérique sans fil crée une entrée de tableau « port/adresse IP privée » dès qu’un ordinateur de votre réseau AirPort (privé) envoie une demande d’informations sur Internet. Si vous utilisez un serveur web, AppleShare ou FTP sur votre réseau AirPort Extreme, d’autres ordinateurs entrent en communication avec votre serveur. Comme le périphé- rique sans fil Apple ne possède aucune entrée de tableau pour ces demandes, il ne dispose d’aucun moyen d’acheminer les informations à l’ordinateur approprié sur votre réseau AirPort. Pour vous assurer que les demandes sont correctement acheminées vers votre serveur web, AppleShare ou FTP, vous devez établir une adresse IP permanente pour votre serveur et fournir les données de mappage de ports en entrée à votre périphérique sans fil Apple. Pour configurer le mappage de ports en entrée : 1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône représentant le périphérique pour ouvrir sa configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. 2 Cliquez sur le bouton Avancé, puis sur Mappage de port.62 Chapitre 3 Configuration de réseaux AirPort 3 Cliquez sur le bouton Ajouter (+), puis choisissez un service, tel que le partage de fichiers personnels, dans le menu local Service. Tapez toute information supplémentaire nécessaire dans les champs correspondants. Pour utiliser le mappage de ports, vous devez configurer TCP/IP manuellement sur l’ordinateur exécutant le serveur web, AppleShare ou FTP. Vous pouvez également configurer un ordinateur comme hôte par défaut pour établir une adresse IP permanente pour cet ordinateur et fournir des informations de mappage de ports en entrée à la borne d’accès AirPort Extreme ou AirPort Express. Ce dispositif est parfois appelé « zone DMZ » et s’avère très utile avec certains jeux en réseau ou avec la vidéoconférence. Pour configurer un hôte par défaut : 1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône représentant le périphérique pour ouvrir sa configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. 2 Cliquez sur le bouton Internet, puis cliquez sur NAT. 3 Cochez la case « Activer l’hôte par défaut ». L’adresse IP par défaut est 10.0.1.253. 4 Saisissez la même adresse IP sur l’ordinateur hôte.Chapitre 3 Configuration de réseaux AirPort 63 Journalisation Vous pouvez configurer votre périphérique sans fil afin qu’il enregistre les informations d’état dans l’historique système Mac OS X ou dans l’application Syslog sous Windows. Cela s’avère utile pour comprendre les problèmes et contrôler les performances d’un périphérique. Pour configurer la journalisation : 1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône représentant le périphérique afin d’ouvrir sa configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. 2 Cliquez sur le bouton Avancé, puis cliquez sur Journalisation et SNMP. 3 Tapez l’adresse IP de l’ordinateur destiné à recevoir les historiques dans le champ « Adresse de destination Syslog ». 4 Choisissez un niveau dans le menu local Niveau Syslog. Vous devez attribuer un serveur NTP (Network Time Protocol) à chaque périphérique sans fil, afin que les informations de journalisation mentionnent l’heure exacte des historiques d’état. Pour définir l’heure automatiquement : 1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône représentant le périphérique pour ouvrir sa configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. 2 Cliquez sur le bouton AirPort, puis cliquez sur Borne d’accès. 3 Cochez la case « Régler l’heure automatiquement », puis choisissez un serveur NTP dans le menu local si vous avez accès à un tel serveur sur votre réseau ou sur Internet. En cliquant sur « Historiques et statistiques », vous pouvez consulter et exporter les historiques ou consulter des informations concernant les clients sans fil et les clients DHCP. Si vous exportez les historiques, utilisez l’application Console de Mac OS X (qui se trouve dans le dossier Utilitaires, à l’intérieur du dossier Applications, sur les ordinateurs Macintosh ou sous Démarrer > Tous les programmes > AirPort sur les ordinateurs Windows) pour consulter les historiques sur l’ordinateur désigné pour les recevoir.64 Chapitre 3 Configuration de réseaux AirPort Configuration de IPv6 IPv6 est une nouvelle version du protocole IP (Internet Protocol). IPv6 est actuellement utilisé principalement dans certaines institutions de recherche. La plupart des ordinateurs ne nécessitent aucune configuration pour utiliser IPv6. Le principal avantage d’IPv6 est qu’il augmente la taille d’adressage de 32 bits (norme IPv4 actuelle) à 128 bits. Une taille d’adresse de 128 bits est assez grande pour prendre en charge des milliards et des milliards d’adresses. Cela permet de gérer beaucoup plus d’adresses et de noeuds qu’à l’heure actuelle. IPv6 offre également plus de manières de configurer les adresses et des configuration automatiques plus simples. Par défaut, IPv6 est configuré automatiquement, et les réglages par défaut sont suffisants. Cependant, si votre administrateur réseau ou fournisseur d’accès à Internet vous a spécifiquement demandé de configurer IPv6 manuellement, suivez les instructions ci-dessous. Ouvrez Utilitaire AirPort, sélectionnez votre périphérique sans fil, puis choisissez Configuration manuelle dans le menu Borne d’accès. Saisissez un mot de passe si nécessaire. Cliquez sur le bouton AirPort, puis cliquez sur IPv6. Pour configurer manuellement les options IPv6 : 1 Choisissez Noeud ou Tunnel dans le menu local Mode IPv6, en fonction de la méthode que l’on vous a demandé d’utiliser. 2 Choisissez Manuellement dans le menu local Configurer IPv6, puis saisissez les informations fournies par votre FAI ou votre administrateur réseau. Personnalisation du coupe-feu IPv6 Si cela est possible pour votre périphérique sans fil, vous pouvez définir des réglages de coupe-feu IPv6 à l’aide d’Utilitaire AirPort. Pour régler les paramètres du coupe-feu IPv6 : 1 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows). 2 Sélectionnez votre périphérique dans la liste, puis tapez le mot de passe. 3 Cliquez sur le bouton AirPort, puis cliquez sur Coupe-feu IPv6. Par défaut, les cases « Autoriser les tunnels Teredo » et « Autoriser l’authentification IPSec entrante » sont cochées. Pour permettre à des appareils spécifiques d’accéder à votre réseau depuis l’extérieur du coupe-feu IPv6, cliquez sur le bouton Ajouter (+) et entrez l’adresse IPv6 et/ou le numéro de port de l’appareil. L’utilisation d’un coupe-feu IPv6 requiert un périphérique sans fil Apple 802.11n.Chapitre 3 Configuration de réseaux AirPort 65 Partage et protection de disques durs USB sur votre réseau Si vous branchez un disque dur USB sur votre borne d’accès AirPort Extreme ou sur votre Time Capsule, tous les ordinateurs, Mac ou Windows, connectés au réseau par câble ou sans fil, peuvent accéder au disque dur pour sauvegarder, partager ou stocker des fichiers. Si vous utilisez une Time Capsule, il n’est pas nécessaire de brancher un disque dur. Chaque Time Capsule comprend un disque AirPort interne. Pour partager un disque dur sur votre réseau : 1 Branchez le disque dur sur le port USB situé à l’arrière de la borne d’accès AirPort Extreme ou de la Time Capsule. 2 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows). 3 Sélectionnez votre borne d’accès AirPort Extreme ou Time Capsule, puis choisissez Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône représentant le périphérique afin d’ouvrir sa configuration dans une fenêtre distincte. Saisissez un mot de passe si nécessaire. 4 Cliquez sur le bouton Disques, puis sur Partage de fichiers. 5 Choisissez soit « Avec un mot de passe de disque » ou « Avec le mot de passe de la borne » si vous voulez protéger le disque partagé à l’aide d’un mot de passe, soit « Avec les comptes » si vous voulez protéger le disque à l’aide de comptes.  Si vous décidez d’utiliser des comptes, cliquez sur Configurer les comptes, cliquez sur le bouton Ajouter (+), puis saisissez un nom et un mot de passe pour chaque utilisateur qui accédera au disque. 6 Choisissez Non autorisé, Lecture seule ou Lecture et écriture pour accorder l’accès en invité au disque. vers Internet modem DSL ou câble AirPort Extreme lecteur de disque dur USB < port WAN Ethernet66 Chapitre 3 Configuration de réseaux AirPort 7 Cochez la case « Partager des disques via le port WAN Ethernet » si vous souhaitez autoriser l’accès à distance au disque via le port WAN. La vitesse de transfert des données peut varier, selon le réseau. Utilisation d'une Time Capsule sur votre réseau Si vous utilisez une Time Capsule et que votre ordinateur fonctionne sous Mac OS X 10.5.2 ou ultérieur, vous pouvez utiliser Time Machine pour sauvegarder automatiquement les données de tous les ordinateurs Mac OS X 10.5 du réseau. Les autres ordinateurs Mac et Windows peuvent toujours accéder au disque AirPort interne de la Time Capsule pour sauvegarder, stocker et partager des fichiers. Comme chaque Time Capsule dispose également de toutes les fonctions d’une borne d’accès 802.11n, vous pouvez configurer la vôtre pour partager une connexion Internet avec les ordinateurs du réseau AirPort qu’elle crée. Pour en savoir plus sur l’utilisation de votre Time Capsule avec Time Machine sous Mac OS X 10.5, recherchez « Time Capsule » dans l’Aide Mac. vers Internet modem DSL ou câble Time Capsule < port WAN EthernetChapitre 3 Configuration de réseaux AirPort 67 Connexion d’une imprimante USB à un périphérique sans fil Apple Vous pouvez connecter une imprimante USB compatible sur votre périphérique sans fil Apple (à savoir, une borne d’accès AirPort Extreme, une AirPort Express ou une Time Capsule), afin que toute personne accédant au réseau sous Mac OS X 10.2.3 ou ultérieur, sous Windows XP Service Pack 2 ou sous Windows Vista, puisse imprimer. Pour utiliser une imprimante sur votre réseau : 1 Connectez l’imprimante au port USB du périphérique sans fil Apple. 2 Configurez les ordinateurs clients :  Si votre ordinateur fonctionne sous Mac OS X 10.5 ou ultérieur, ouvrez Préférences Système puis cliquez sur Imprimantes et fax. Sélectionnez l’imprimante dans la liste Imprimantes. Si le nom de l’imprimante n’y figure pas, cliquez sur Ajouter (+) en bas de la liste, sélectionnez l’imprimante, puis cliquez sur Ajouter.  Sur un ordinateur exécutant Mac OS X 10.2.3 ou ultérieur, ouvrez Configuration d’imprimante (disponible dans le dossier Utilitaires, à l’intérieur du dossier Applications), puis sélectionnez l’imprimante dans la liste. Si l’imprimante ne figure pas sur la liste, cliquez sur Ajouter, puis choisissez Bonjour dans le menu local avant de sélectionner l’imprimante dans la liste.  Sur un ordinateur exécutant Windows, installez Bonjour for Windows à partir du CD Utilitaire AirPort, puis suivez les instructions à l’écran pour établir la connexion avec l’imprimante. Vous pouvez changer le nom par défaut de l’imprimante et lui en attribuer un de votre choix. Pour renommer votre imprimante USB : 1 Ouvrez Utilitaire AirPort, sélectionnez votre périphérique, puis choisissez Configuration manuelle dans le menu Borne d’accès, ou double-cliquez sur l’icône représentant le périphérique afin d’ouvrir sa configuration dans une fenêtre distincte. 2 Cliquez sur le bouton Imprimante puis tapez un nom pour l’imprimante dans le champ Imprimantes USB.68 Chapitre 3 Configuration de réseaux AirPort Ajout d’un client sans fil à votre réseau 802.11n Si votre périphérique sans fil Apple prend en charge cette fonction, et si votre réseau est protégé par un mot de passe chiffré WPA Personnel ou WPA/WPA2 Personnel, vous pouvez fournir aux clients sans fil un accès à votre réseau sans exiger le mot de passe réseau. Lorsque vous permettez à un client d’accéder à votre réseau, le nom et l’adresse MAC (ou ID AirPort) du client sont stockés dans la liste de contrôle d’accès de Utilitaire AirPort, jusqu’à ce que vous les supprimiez. Vous pouvez fournir un accès pour 24 heures, délai au delà duquel le client ne peut plus accéder à votre réseau. Lorsque vous autorisez l’accès à votre réseau sans fil à un client, celui-ci n’a pas à saisir le mot de passe du réseau. Pour autoriser l’accès de clients à votre réseau : 1 Ouvrez Utilitaire AirPort (situé dans le dossier Utilitaires du dossier Applications sur un Mac ou dans Démarrer > Tous les programmes > AirPort sur un ordinateur Windows). 2 Sélectionnez votre périphérique sans fil Apple, puis choisissez Configuration manuelle dans le menu Borne d’accès. Saisissez un mot de passe si nécessaire. 3 Choisissez « Ajouter des clients sans fil » dans le menu Borne d’accès. 4 Sélectionnez le mode d’accès du client au réseau :  Sélectionnez PIN pour saisir le numéro à 8 chiffres fourni par le client demandant à accéder au réseau.  Sélectionnez « Première tentative » pour autoriser l’accès au premier client essayant d’entrer sur le réseau.  Sélectionnez « Limiter l’accès du client à 24 heures », si vous souhaitez autoriser un accès à votre réseau pour une seule journée. Si vous ne sélectionnez pas cette option, le client aura accès au réseau jusqu’à ce que vous retiriez son nom de la liste.Chapitre 3 Configuration de réseaux AirPort 69 Résolution des problèmes En cas de problème de connexion à Internet, quelle que soit la configuration de votre réseau AirPort Extreme, essayez les solutions suivantes : Sur un ordinateur exécutant Mac OS X :  Assurez-vous que le périphérique sans fil est connecté à Internet. Les ordinateurs de votre réseau AirPort ne peuvent pas se connecter à Internet si votre périphérique ne l’est pas au préalable.  Testez votre connexion à Internet à l’aide de votre ordinateur. Si vous ne parvenez pas à vous connecter à l’aide de votre ordinateur, il se peut que le problème provienne de la connexion à Internet.  Sur un Mac exécutant Mac OS X 10.5, vérifiez les services réseau actifs en ouvrant Préférences Système, puis la sous-fenêtre Réseau. Assurez-vous que les ports à utiliser sont actifs.  Ouvrez Préférences Réseau, puis cliquez sur AirPort. Assurez-vous que l’ordinateur est connecté au réseau AirPort créé par votre périphérique sans fil.  Redémarrez votre ordinateur. Cela permet de renouveler l’adresse IP que vous recevez du périphérique sans fil. Les adresses IP doivent être comprises entre 10.0.1.2 et 10.0.1.200, 172.16.1.2 et 172.16.1.200 ou 192.168.1.2 et 192.168.1.200, conformément au système d’adresses utilisé par le périphérique sans fil.  Si le périphérique sans fil est configuré comme serveur DHCP, veillez à sélectionner « Partager une adresse IP publique » dans le menu local Partage de connexion de la sous-fenêtre Connexion à Internet des réglages Internet d’Utilitaire AirPort.  Si vous utilisez un modem câble et que votre périphérique sans fil ne parvient pas à accéder à Internet, mettez le modem câble hors tension, patientez quelques minutes, puis rallumez-le. Sur un ordinateur exécutant Windows :  Assurez-vous que le périphérique sans fil est connecté à Internet. Les ordinateurs de votre réseau AirPort ne peuvent pas se connecter à Internet si votre périphérique ne l’est pas au préalable.  Testez votre connexion à Internet à l’aide de votre ordinateur. Si vous ne parvenez pas à vous connecter à l’aide de votre ordinateur, il se peut que le problème provienne de la connexion à Internet.70 Chapitre 3 Configuration de réseaux AirPort  Cliquez à l’aide du bouton droit de la souris sur l’icône de connexion sans fil et choisissez État.  Assurez-vous que l’ordinateur est connecté au réseau AirPort créé par votre périphé- rique sans fil.  Redémarrez votre ordinateur. Cela permet de renouveler l’adresse IP que vous recevez du périphérique sans fil. Les adresses IP doivent être comprises entre 10.0.1.2 et 10.0.1.200, 172.16.1.2 et 172.16.1.200 ou 192.168.1.2 et 192.168.1.200, conformément au système d’adresses utilisé par le périphérique.  Si le périphérique est configuré comme serveur DHCP, assurez-vous que la case « Obtenir une adresse IP automatiquement » est cochée dans la sous-fenêtre Général des propriétés du protocole Internet (TCP/IP). Cliquez avec le bouton droit sur l’icône de connexion sans fil et choisissez Propriétés. Cliquez sur Protocole Internet (TCP/IP), puis sur Propriétés. Informations supplémentaires sur AirPort Vous pouvez obtenir de plus amples informations sur AirPort dans aux endroits suivants :  Aide Utilitaire AirPort L’Aide Utilitaire AirPort fournit notamment des informations sur la configuration d’un réseau AirPort Extreme, sur l’utilisation d’une borne d’accès AirPort Extreme, d’une AirPort Express ou d’une Time Capsule ; sur la modification des réglages, sur la minimisation des sources d’interférences ; ou encore sur la recherche d’informations complémentaires sur Internet. Sur un ordinateur exécutant Mac OS X, ouvrez Utilitaire AirPort, puis choisissez Aide Utilitaire AirPort dans le menu Aide. Sur un ordinateur exécutant Windows, ouvrez Utilitaire AirPort, puis cliquez sur Aide.  Web Site web Apple AirPort à l’adresse www.apple.com/fr/airportextreme Site Web d’assistance Apple à l’adresse www.apple.com/fr/support/airport4 71 4 Considérations générales Ce chapitre définit les termes et concepts utilisés dans le cadre des réseaux d’ordinateurs. Il vous servira de référence pour comprendre le fonctionnement de votre réseau sans fil AirPort. Fonctionnement d’un réseau Paquets et trafic Les informations transmises sur un réseau circulent sous forme de paquets. Chaque paquet possède un en-tête indiquant sa provenance et sa destination, un peu comme l’adresse sur l’enveloppe lorsque vous envoyez une lettre par la poste. L’ensemble du flux constitué par ces paquets sur le réseau est appelé trafic. Acheminement des données Adresses matérielles Votre ordinateur « écoute » l’ensemble du trafic sur son réseau local et sélectionne les paquets qui lui sont destinés en vérifiant l’adresse matérielle (également appelée adresse MAC, de l’anglais media access control) contenue dans l’en-tête du paquet. Cette adresse correspond à un numéro propre à votre ordinateur. Tout appareil conçu pour fonctionner en réseau doit obligatoirement posséder une adresse matérielle unique incorporée de manière permanente. Le numéro de votre carte AirPort constitue son identifiant (ID) AirPort. Adresses IP Internet étant un réseau de réseaux (reliant des millions d’ordinateurs), les adresses matérielles ne suffisent pas à elles seules pour transmettre des données sur Internet. Il serait en effet impossible que votre ordinateur détecte ses paquets sur l’ensemble du trafic mondial et impossible pour Internet d’acheminer tout le trafic sur tous les réseaux.72 Chapitre 4 Considérations générales C’est pourquoi votre ordinateur possède également une adresse IP (Internet Protocol) qui indique exactement à quel endroit et sur quel réseau il est situé. Les adresses IP permettent de s’assurer que votre réseau Ethernet local ne reçoit que le trafic qui lui est destiné. De même que le système hiérarchique utilisé pour définir les codes postaux ou les noms de rues, les adresses IP sont créées selon un ensemble de règles et leur attribution est gérée avec minutie. L’adresse matérielle est comparable à votre nom : elle vous identifie de façon unique et permanente, mais ne fournit aucune indication sur le lieu où vous vous trouvez. Elle n’est donc utile que dans un contexte local. Par contre, une adresse IP est semblable à votre adresse postale, qui permet à votre courrier de parvenir chez vous. Règles régissant l’envoi de données (protocoles) Un protocole est un ensemble de règles qui définissent comment s’effectue la communication. Un protocole de réseau peut, par exemple, définir la manière dont les données doivent être formatées et adressées, tout comme l’écriture d’une adresse sur une enveloppe est régie par certaines règles. Utilisation de la borne d’accès AirPort Extreme Cette section présente les différentes interfaces réseau de la borne d’accès AirPort Extreme et décrit les fonctions fournies par cette dernière. Interfaces de la borne d’accès Pour exploiter la borne d’accès AirPort Extreme, vous devez configurer la manière dont ses interfaces réseau seront utilisées. La borne d’accès AirPort Extreme possède cinq interfaces réseau matérielles :  Interface AirPort : l’interface AirPort crée un réseau AirPort pour que les ordinateurs équipés d’AirPort s’y connectent. La borne peut fournir des services IP tels que DHCP et NAT à travers cette interface. Elle ne peut pas utiliser l’interface AirPort pour établir une connexion à Internet.  Interface WAN Ethernet (<) : cette interface est utilisée pour brancher des modems DSL ou câble et se connecter à Internet.  Interface LAN Ethernet (G) : si votre borne d’accès est dotée de ports d’interface LAN Ethernet, vous pouvez les utiliser pour fournir des services IP aux clients Ethernet locaux.Chapitre 4 Considérations générales 73  Interface USB (d) : cette interface est utilisée pour connecter une imprimante USB à la borne d’accès AirPort Extreme. Utilisation de la Time Capsule Cette section présente les différentes interfaces réseau de Time Capsule et décrit les fonctions proposées. Interfaces de la Time Capsule Pour exploiter votre Time Capsule, vous devez configurer la manière dont ses interfaces réseau seront utilisées. La Time Capsule présente cinq interfaces réseau matérielles :  Interface AirPort : l’interface AirPort crée un réseau AirPort pour que les ordinateurs équipés d’AirPort s’y connectent. La Time Capsule peut fournir des services IP tels que DHCP et NAT à travers cette interface. Elle ne peut pas utiliser l’interface AirPort pour établir une connexion à Internet.  Interface WAN Ethernet (<) : cette interface est utilisée pour brancher des modems DSL ou câble et se connecter à Internet.  Interface LAN Ethrnet (G) : la Time Capsule est dotée de trois ports d’interface LAN Ethernet. Vous pouvez les utiliser pour fournir des services IP aux clients Ethernet locaux.  Interface USB (d) : cette interface est utilisée pour connecter une imprimante USB à la borne d’accès AirPort Extreme. Utilisation de la borne d’accès AirPort Express Cette section présente les différentes interfaces réseau de la borne d’accès AirPort Express et décrit les fonctions qu’elle propose. Voyant d’état Port WAN Ethernet Port secteur Port USB Ports Ethernet Bouton de réinitialisation Logement de sécurité < G ¯ ∏ d < G ≤ d ∏ Voyant d’état Port WAN Ethernet Port secteur Bouton de réinitialisation Port USB Ports Ethernet Logement de sécurité 74 Chapitre 4 Considérations générales Interfaces de la borne d’accès AirPort Express Pour configurer la borne d’accès AirPort Express, vous devez configurer la manière dont ses interfaces réseau seront utilisées. La borne possède quatre interfaces réseau matérielles :  Interface AirPort : l’interface AirPort crée un réseau AirPort pour que les ordinateurs équipés d’AirPort s’y connectent. La borne peut fournir des services IP tels que DHCP et NAT à travers cette interface. Elle ne peut pas utiliser l’interface AirPort pour établir une connexion à Internet.  Interface WAN Ethernet (<) : cette interface permet de brancher des modems DSL ou câble afin de se connecter à Internet.  Interface USB (d) : cette interface permet de connecter une imprimante USB à la borne d’accès AirPort Extreme.  Interface audio (-) : le mini-jack audio stéréo analogique et numérique optique permet de connecter une borne AirPort Express à une chaîne stéréo ou à des haut-parleurs ; Fonctions des périphériques sans fil Apple  Pont : chaque périphérique sans fil Apple est configuré par défaut comme pont entre le réseau sans fil AirPort et le réseau câblé Ethernet. La connexion d’un réseau AirPort à un réseau Ethernet à travers le port LAN Ethernet (G) du périphérique établit un pont entre le réseau sans fil et le réseau câblé. Important : si vous connectez un réseau Ethernet au port LAN Ethernet (G) du périphérique, assurez-vous que le réseau Ethernet ne dispose pas d’une connexion à Internet.  Routeur NAT : la capacité des périphériques sans fil Apple à partager une connexion à Internet avec plusieurs ordinateurs constitue l’une de leurs fonctions les plus puissantes. Pour offrir ce service, le périphérique agit comme routeur. Il est possible de le configurer pour qu’il assure simultanément les services de pontage et les services de routage. Voyant d’état Adaptateur pour prise CA Port USB Port Ethernet Port de sortie (mini-jack audio numérique optique et analogique) Bouton de réinitialisation G - d ∏Chapitre 4 Considérations générales 75  Serveur DHCP : lorsque vous configurez le périphérique sans fil pour qu’il fasse office de serveur DHCP, il fournit des adresses IP aux ordinateurs clients (connectés sans fil ou par câble) configurés pour obtenir ces adresses via DHCP. Pour les ordinateurs clients, l’utilisation de DHCP simplifie la configuration IP, car cela les dispense de saisir leurs propres informations IP. Éléments pouvant provoquer des interférences avec AirPort Plus la source d’interférences est éloignée, plus le risque de problème est faible. Les éléments suivants peuvent provoquer des interférences avec AirPort :  Les fours à micro-ondes.  Les pertes de fréquence radio DSS (Direct Satellite Service).  Le câble coaxial d’origine fourni avec certains types d’antennes paraboliques. Contactez le fabricant du produit pour obtenir des câbles plus récents.  Certaines installations électriques telles que les lignes à haute tension, les voies ferrées et les centrales électriques.  Les téléphones sans fil qui fonctionnent sur la fréquence porteuse de 2,4 gigahertz (GHz). Si votre téléphone ou la communication AirPort posent problème, changez le canal de votre borne d’accès.  Autres réseaux AirPort et sans fil.  Des bornes d’accès adjacentes qui utilisent des canaux voisins. Ainsi, si une borne d’accès A est réglée sur le canal 1, la borne d’accès B doit être réglée sur le canal 6 ou 11. Pour un résultat optimal, utilisez les canaux 1, 6 ou 11 si vous utilisez votre borne d’accès dans la plage de fréquence de 2,4 GHz.  Tout déplacement d’objet provoquant la présence temporaire de pièces métalliques entre votre ordinateur et la borne d’accès.Glossaire 76 Glossaire 10/100/1000Base-T Terme décrivant diverses technologies de transmission de paquets Ethernet à un débit d’un gigabit par seconde. Parfois nommé Ethernet Gigabit. En 2000, le Power Mac G4 et le PowerBook G4 d’Apple furent les premiers ordinateurs produits en masse présentant une connexion 10/100/1000Base-T. Cette connexion a été vite intégrée à beaucoup d’autres ordinateurs. 10/100Base-T Norme de réseau qui prend en charge des vitesses de transfert de données pouvant atteindre 100 Mbps (100 megabits par seconde). Étant donné qu’elle est 10 fois plus rapide qu’Ethernet, elle est souvent nommée Fast Ethernet. 10Base-T La méthode de câblage la plus courante pour Ethernet. 10Base-T est conforme à la norme IEEE 802.3. Elle a été développée pour permettre la communication des données sur des câbles à paires torsadées non blindées (téléphone) à des vitesses pouvant atteindre 10 megabits par seconde et sur des distances d’environ 100 mètres sur un segment de réseau. 802.11a Norme IEEE pour les réseaux sans fil qui fonctionne à 5 GHz avec des débits pouvant atteindre 54 Mbps. 802.11b Norme IEEE pour les réseaux sans fil qui fonctionne à 2,4 GHz avec des débits pouvant atteindre 11 Mbps. 802.11g Norme IEEE pour les réseaux sans fil qui fonctionne à 2,4 GHz avec des débits pouvant atteindre 54 Mbps. 802.11n Groupe de travail du comité IEEE 802.11 dont l’objectif est de définir une norme pour les vitesses élevées d’au moins 100 Mbps sur les réseaux sans fil. Certaines propositions en cours de test par le groupe de travail incluent des conceptions pour des débits pouvant atteindre 540 Mbps. la technologie MIMO (multiple-input multipleoutput) qui utilise de simples récepteurs et émetteurs côté client et côté point d’accès pour obtenir de meilleures performances ; celles-ci devraient former la base de la spécification finale. Voir Mbps, MIMO.Glossaire 77 adresse IP Adresse de protocole Internet. IP Version 4, le protocole Internet le plus largement utilisé fournit un numéro de 32-bit qui identifie l’expéditeur et le récepteur des informations envoyées par Internet. Une adresse IP se divise en deux parties : l’identificateur du réseau spécifique sur Internet et l’identificateur de l’appareil spécifique (qui peut être un serveur ou une station de travail) au sein de ce réseau. La nouvelle version d’IP, la version 6, fournit un système d’adressage sur 128-bit pour prendre en charge un nombre bien plus important d’adresses IP. Voir DHCP, DNS, IP. adresse MAC Adresse Media Access Control. Numéro de matériel unique qui identifie chaque appareil sur le réseau. Un appareil peut être un ordinateur, une imprimante, etc. L’adresse MAC est également appelée ID AirPort. authentification Processus qui se produit après association pour vérifier l’identité d’un appareil sans fil ou d’un utilisateur final et lui permettre d’accéder au réseau. Voir WPA, WPA2. bande passante Capacité de transmission maximale d’un canal de communication à un point quelconque du temps. La bande passante, généralement mesurée en bits par seconde (bps), détermine la vitesse à laquelle les informations sont envoyées à travers le réseau. Si vous comparez le canal de communication à un tuyau, la bande passante représente la largeur du tuyau et détermine la quantité de données qui peuvent circuler à travers le tuyau à un point quelconque du temps. Plus la bande passante est élevée, plus les données circulent vite. Voir bps. bibande Appareil capable de fonctionner dans deux fréquences. Sur un réseau sans fil, les appareils bibande sont capables de fonctionner sur les bandes de 2,4 GHz (802.11b/g) ou 5 GHz (802.11a). Bluetooth Technologie conçue pour les communications sans fil de faible portée entre des ordinateurs, des produits mobiles, y compris les ordinateurs personnels, les ordinateurs portables, les assistants personnels, les imprimantes, et les téléphones mobiles. Conçue pour remplacer le câble, Bluetooth permet une transmission de faible portée de la voix et des données sur la fréquence de 2,4 GHz dans une plage d’environ 9 mètres. borne d’accès Dans le domaine des réseaux d’ordinateurs sans fil, une borne d’accès est un récepteur/émetteur radio qui tient lieu de concentrateur du réseau local sans file, et peut également jouer le rôle de passerelle entre un réseau câblé et le réseau sans fil. Une borne d’accès peut également être appélée point d’accès ou routeur.78 Glossaire bps Bits par seconde. Mesure de la vitesse de transmission des données sur un réseau ou un canal de communication ; bps représente le nombre de bits qui peut être envoyé ou reçu en une seconde. Il mesure la vitesse à laquelle les données sont transférées et ne devrait pas être confondu avec bytes (octets) par seconde, même si c’est souvent le cas. Tandis que « bits » est une mesure de vitesse de transmission, « bytes » (octets) est une mesure de capacité de stockage. Voir bande passante, Mbps. canal Portion du spectre radio disponible qui tous les appareils d’un réseau sans fil utilisent pour communiquer. Le changement de canal sur le point d’accès/routeur peut contribuer à réduire les interférences. certification Wi-Fi Norme de certification qui désigne les produits de réseau local sans fil (WLAN) reposant sur IEEE 802.11 qui sont conformes aux exigences de test d’interopérabilité développés et régis par l’Alliance Wi-Fi. chiffrement Mécanisme permettant d’assurer la confidentialité des données. Voir WPA, WPA2. client Tout ordinateur ou périphérique connecté à un réseau qui demande des fichiers et des services (fichiers, impressions) au serveur ou tout autre périphérique du réseau. Ce terme fait également référence à l’utilisateur final. concentrateur Appareil équipé de plusieurs ports utilisé pour connecter les appareils clients à un réseau Ethernet câblé. Les concentrateurs peuvent présenter de nombreux ports et transmettre les données à des vitesses comprises entre 10 et 1000 Mbps à tous les ports connectés. Un petit concentrateur câblé peut connecter seulement 4 ordinateurs, tandis qu’un gros concentrateur peut connecter 48 ordinateurs ou plus. Voir routeur. coupe-feu Système combinant des logiciels et du matériel qui réside entre deux réseaux pour éviter que des utilisateurs non autorisés puissent y accéder. L’utilisation la plus courante du coupe-feu consiste à assurer la sécurité entre un réseau local et Internet. Les coupe-feux peuvent rendre un réseau invisible depuis Internet et empê- cher les utilisateurs non autorisés ou indésirables d’accéder aux fichiers et aux systè- mes qui composent le réseau. Les coupe-feux matériels et logiciels surveillent et contrôlent le flux de données entrant et sortant des ordinateurs sur les réseaux d’entreprise ou domestiques, qu’ils soient sans fil ou non. Ils peuvent être réglés pour intercepter, analyser et arrêter un large éventail d’intrus et de pirates qui foisonnent sur Internet. débit Généralement mesuré en bps, Kbps, Mbps ou Gbps, le débit représente la quantité de données qui peut être envoyée d’un endroit à un autre dans une période de temps spécifique. Voir bps, Mbps.Glossaire 79 DHCP Protocole de configuration d’hôte dynamique. Protocole qui permet d’affecter dynamiquement les adresses IP à partir d’une liste prédéfinie de noeuds dans un réseau. Lorsqu’ils se connectent, les noeuds de réseau reçoivent automatiquement une adresse IP à partir d’un pool d’adresses envoyées par un serveur DHCP. Le serveur DHCP fournit (ou prête) une adresse IP à un client pour une période de temps définie. Le client demande automatiquement le renouvellement de l’adresse IP lorsque celle-ci arrive à échéance. Si le renouvellement n’est pas demandé, l’adresse IP expire et retourne au pool d’adresses IP disponibles. L’utilisation de DHCP pour gérer les adresses IP simplifie la configuration du client et permet une attribution optimale des adresses IP. Voire Adresse IP. DNS Système de nom de domaine. Service Internet qui convertit les noms de domaines alphanumériques en adresses IP attribuées et inversement. Ce terme décrit spécifiquement le serveur qui effectue la traduction. Chaque site Web possède sa propre adresse IP sur Internet. Le serveur DNS consulte généralement une base de données de noms et d’adresses Internet qui convertit les noms alphanumériques en nombres du protocole IP officiels et inversement. Par exemple, un serveur DNS convertit un nom tel que monsiteweb.com en une série de chiffres tels que 107.22.55.26. Voir IP, adresse IP. DSL Digital Subscriber Ligne, ligne d’abonné numérique. Circuit numérique dédié entre une résidence ou une entreprise et le central d’une compagnie de téléphone. Il permet la transmission des données, de la voix et de la vidéo à haute vitesse sur des lignes téléphoniques anciennes en fils de cuivre à paire torsadée existants. Voir large bande. Ethernet Technologie standard internationale la plus courante pour les réseaux locaux câblés (LAN). Elle offre des vitesses de transmission à partir de 10 Mbps sur des réseaux Ethernet 10Base-T de base, jusqu’à 100 Mbps sur des réseaux Fast Ethernet, 1000 Mbps sur Ethernet Gigabit et jusqu’à 10 000 Mbps sur Ethernet Gigabit 10. IEEE 802.11 Famille de spécifications développée par le comité 802.11 de l’IEEE (Institute of Electrical and Electronics Engineers), qui établit les normes des réseaux Ethernet sans fil. Les normes 802.11 définissent l’interface de transmission radio entre les clients sans fil et la borne d’accès, ou le point d’accès qui est relié physiquement au réseau câblé. IP Internet Protocol, protocole Internet. Protocole de communication de base d’Internet. Voir Adresse IP, TCP/IP. itinérance (Wi-Fi) Possibilité de passer d’une zone de couverture Wi-Fi à une autre sans perdre la connectivité (transfert intercellulaire).80 Glossaire LAN Local area network, réseau local. Système permettant de connecter des ordinateurs personnels et d’autres appareils dans un lieu restreint pour partager des ressources telles qu’une connexion Internet, des imprimantes, des fichiers et des lecteurs. Lorsque ces appareils sont connectés au moyen de la technologie Wi-Fi, le système se nomme alors un réseau LAN sans fil ou WLAN. Voir WAN. large bande Connexion Internet comparativement rapide qui possède une bande passante suffisante pour gérer simultanément plusieurs canaux de voix, de données et vidéo. Le câble, la ligne DSL et le satellite sont tous considérés comme des canaux de large bande ; ils offrent une vitesse bien supérieure à celle de la connexion Internet via une ligne d’abonné numérique sur des fils de téléphone. Voir modem câble, DSL. Mbps Megabits par seconde. Mesure de la vitesse des données équivalente à un million de bits par seconde. MIMO Multiple-input multiple-output (entrées multiples, sorties multiples). Technologie de traitement du signal évoluée qui utilise plusieurs récepteurs et émetteurs côté client et côté point d’accès pour obtenir des débits pouvant atteindre 100 Mbps. Voir 802.11n. modem câble Périphérique utilisé avec un service Internet large bande fourni par un service de télévision par câble traditionnel. Les modems câble convertissent les données analogies de systèmes de télévision par câble en un format numérique qui peut être utilisé par un ordinateur. Voir modem large bande. modem large bande Périphérique qui connecte un ordinateur local ou un réseau à un service Internet à haute vitesse, tel que DSL ou Cable Internet. Voir modem câble, DSL. NAT Network Address Translation (traduction d’adresse réseau). Capacité réseau qui permet à plusieurs ordinateurs de partager dynamiquement une seule adresse IP entrante à partir d’une connexion par modem, par câble ou DSL. Le protocole NAT prend une adresse IP entrante unique et la convertit en une adresse IP privée pour chaque client du réseau. Voir DHCP, adresse IP. NIC Carte d’interface réseau. Carte sans fil ou non pour ordinateur personnel qui permet à un ordinateur client d’utiliser les ressources du réseau. La plupart des cartes d’interface réseau domestiques câblées fonctionnent à 100 Mbps. Les cartes d’interface réseau sans fil offrent des vitesses de transmission de données définies par les normes 802.11. nom de réseau Nom utilisé pour identifier un réseau sans fil. Voir SSID. paquet Unité d’informations transmises d’un appareil à un autre sur un réseau. En règle générale, le paquet contient un en-tête avec les informations d’adressage, les données et une somme de contrôle pour assurer l’intégrité des données. Glossaire 81 passerelle Dans le monde sans fil, une passerelle est un point d’accès équipé de capacités logicielles supplémentaires telles que les protocoles NAT et DHCP. Les passerelles peuvent également prendre en charge les réseaux privés virtuels, l’itinérance, les coupe-feux, divers niveaux de sécurité, etc. phrase de passe Série de caractères permettant de créer une clé utilisée par la technologie Wi-Fi Protected Access (WPA). Voir PSK, WPA. point d’accès Également nommé point d’accès sans fil (WAP), appareil qui relie des périphériques sans fil pour former un réseau. point de d’accès sans fil Emplacement à partir duquel les utilisateurs peuvent accéder à Internet via des ordinateurs portables Wi-Fi et d’autres appareils équipés de la technologie Wi-Fi. L’accès peut-être gratuit ou payant. Les points d’accès sans fil se trouvent le plus souvent dans les cafés, les magasins, les hôtels, les salles d’embarquement des aéroports, les gares, les centres de congrès, les stations services, les aires de repos et d’autres lieux publiques. Les grandes entreprises et les universités offrent souvent ce service à leurs invités. Le service de point d’accès sans fil est parfois disponible dans les avions, les trains et les bateaux. pont Appareil sans fil qui relie plusieurs réseaux ensemble. L’utilisation d’un point d’accès en tant que pont désactive la traduction d’adresse réseau NAT (Network Address Translation) et le routage DHCP et étend simplement la plage de service. PSK Clé pré-partagée. Mécanisme de Wi-Fi Protected Access (WPA)-Personnel qui permet l’utilisation de clés et mots de passe saisis manuellement afin d’assurer la sécurité WPA. Le PSK est saisi sur le point d’accès ou la passerelle sans fil domestique et sur chaque ordinateur personnel du réseau Wi-Fi. Une fois le mot de passe saisi, le mécanisme Wi-Fi Protected Access prend aussitôt le relais. Il éloigne les pirates et autres utilisateurs non autorisés en exigeant que tous les appareils présentent un mot de passe qui correspond. Le mot de passe met également en oeuvre le processus de chiffrement qui, sous WPA est un protocole TKIP (Temporal Key Integrity Protocol) et sous WPA2 est AES (Advanced Encryption Standard). Voir TKIP, WPA-Personnel, WPA2-Personnel. réseau fédérateur Partie centrale d’un réseau étendu qui relie deux ou plusieurs sousréseaux. Le réseau fédérateur est le principal chemin de transmission des données sur les réseaux étendus tels que les réseaux d’entreprises et des fournisseurs de service. Un réseau fédérateur peut être sans fil ou non. réseau sans fil Appareils connectés à un réseau à l’aide d’un point d’accès sans fil centralisé. Voir WLAN. routeur Un routeur sans fil est un appareil qui accepte les connexions des appareils sans fil du réseau, intègre un coupe-feu sans fil pour assurer la sécurité et fournit des adresses de réseau local. Voir concentrateur.82 Glossaire serveur Ordinateur qui fournit des ressources ou des services à d’autres ordinateurs et appareils sur le réseau. Différents types de serveurs existent, dont les serveurs d’impression, les serveurs Internet, les serveurs de messagerie et les serveurs DHCP. Il est également possible de combiner un serveur avec un concentrateur ou un routeur. Voir DHCP, concentrateur, routeur. serveur d’impression Appareil réseau, souvent un ordinateur qui se connecte à au moins une imprimante et qui permet de la partager avec les ordinateurs d’un réseau. sous-réseau Plage d’adresses IP qui fait partie d’une plage d’adresses plus large. Les sous-réseaux permettent de diviser une adresse de réseau d’un réseau plus étendu en réseaux plus petits. Les sous-réseaux se connectent à d’autres réseaux via un routeur. Chaque réseau local sans fil utilise généralement le même sous-réseau pour tous ses clients. Voir adresse IP, routeur. sous-réseau IP Un sous-réseau IP est un réseau local défini par des numéros de réseau IP. La connexion à un sous-réseau implique à la fois la connexion au réseau matériel approprié et la configuration du protocole IP pour ce réseau. SSID Service set identifier. Nom de réseau unique de 32 caractères, ou identificateur, qui différentie un réseau local sans fil d’un autre. Tous les points d’accès et les clients qui essaient de se connecter à un WLAN spécifique doivent utiliser le même SSID. Le SSID peut être une entrée alphanumérique quelconque jusqu’à 32 caractères. Voir nom de réseau. TCP Transmission Control Protocol. Protocole de niveau transport utilisé avec le protocole IP (Internet Protocol) pour acheminer les données sur Internet. Voir IP, TCP/IP. TCP/IP Technologie sous-jacente des communications Internet. Tandis que le protocole IP gère la livraison réelle des données, la couche TCP effectue le suivi des paquets de données pour acheminer efficacement un message via Internet. Chaque ordinateur d’un réseau TCP/IP possède sa propre adresse IP qui est attribuée dynamiquement ou affectée au démarrage (voir DHCP) ou affectée définitivement comme adresse statique. Tous les messages TCP/IP contiennent l’adresse du réseau de destination, ainsi que l’adresse du poste de destination. Ainsi, les messages TCP/IP peuvent être transmis à plusieurs réseaux (sous-réseaux) d’une entreprise ou du monde entier. Par exemple, lorsqu’un utilisateur télécharge une page web, TCP divise le fichier de la page sur le serveur web en paquets, il numérote les paquets et les transfert individuellement vers l’adresse IP de l’utilisateur. Les paquets peuvent emprunter différents chemins avant d’atteindre l’adresse de l’utilisateur. Une fois les paquets arrivés à destination, TCP les réassemble après avoir attendu qu’ils soient tous arrivés, afin de les présenter sous la forme d’un fichier unique. Voir IP, adresse IP, paquet, TCP.Glossaire 83 USB Universal Serial Bus. Connexion série bidirectionnelle à haute vitesse utilisée pour transférer des données entre un ordinateur et des périphériques telles que des appareils-photos numériques et des cartes mémoire. WEP Wired equivalent privacy. Norme de sécurité d’origine utilisée dans les réseaux sans fil pour chiffrer le trafic du réseau sans fil. 6 Voir WPA, réseau local sans fil Wi-Fi Terme développé par l’alliance Wi-Fi pour décrire les produits d’un réseau local sans fil (WLAN) qui reposent sur l’IEEE (Institute of Electrical and Electronics Engineers). WLAN (WLAN). Réseau de communication de données qui s’étend sur des zones locales, régionales, nationales et internationales et est généralement fourni par un transporteur publique (comme une compagnie de téléphone ou un fournisseur de services). Ce terme est utilisé pour distinguer les réseaux de données à base de lignes téléphoniques des réseaux Wi-Fi. Les réseaux filaires sont considérés comme des réseaux étendus (WAN) tandis que les réseaux Wi-Fi sont considérés comme des réseaux locaux sans fil (WLAN). Voir LAN. WPA - Entreprise (Wi-Fi Protected Access-Entreprise). Méthode de sécurité sans fil qui fournit une protection des données robuste pour plusieurs utilisateurs et de grands réseaux gérés. Elle utilise le framework d’authentification 802.1X avec le chiffrement TKIP et empêche les accès non autorisés au réseau en vérifiant les utilisateurs du réseau via un serveur d’authentification. Voir 802.1X. WPA - Personnel (Wi-Fi Protected Access-Personnel). Méthode de sécurité sans fil qui fournit une protection des données robuste et empêche les accès non autorisés à des réseaux de petite taille. Elle utilise le chiffrement TKIP et protège des accès non autorisés au réseau.84 Glossaire WPA2 (Wi-Fi Protected Access 2). Successeur de la technologie de sécurité WPA pour les réseaux sans fil, qui assure une protection renforcée des données et présente un contrôle plus complet des accès réseau. Elle offre aux utilisateurs Wi-Fi particuliers ou entreprises un haut niveau d’assurance que seuls les utilisateur autorisés peuvent accé- der à leurs réseaux sans fil. Reposant sur la norme IEEE 802.11i ratifiée, WPA2 fournit une sécurité de niveau gouvernementale en mettant en oeuvre l’algorithme de chiffrement AES compatible avec le National Institute of Standards and Technology (NIST) FIPS 140-2 et l’authentification 802.1X. Il existe deux versions de WPA2 : WPA2-Personnel et WPA2-Entreprise. WPA2-Personnel empêche les accès non autorisés au réseau en utilisant un mot de passe configuré. WPA2-Entreprise vérifie les utilisateurs du réseau via un serveur. WPA2 offre la rétrocompatibilité avec WPA. À l’instar de WPA, WPA2 utilise le framework 802.1X/EAP comme partie de l’infrastructure qui assure une authentification mutuelle centralisée et une gestion des clés dynamique et offre une clé pré-partagée à utiliser dans les environnements domestiques et des petites entreprises. À l’instar de WPA, WPA2 est conçu pour sécuriser toutes les versions des périphériques 802.11, y compris 802.11b, 802.11a et 802.11g, multibande et multimode. Voir WPA2-Entreprise, WPA2-Personnel. WPA2 - Entreprise Wi-Fi Protected Access 2 - Entreprise. Dernière version de la méthode de sécurité sans fil de WPA qui fournit une protection supérieure des données pour plusieurs utilisateurs et sur de larges réseaux gérés. Elle empêche les accès non autorisés au réseau en vérifiant les utilisateurs du réseau via un serveur d’authentification. Voir WPA2. WPA2 - Personnel Wi-Fi Protected Access 2 - Personnel. Dernière version de la méthode de sécurité de WPA pour les réseaux sans fil qui assure une meilleure protection des données et empêche les accès non autorisés aux réseaux de petite taille. Voir WPA2, PSK. www.apple.com/airportextreme www.apple.com/airport © 2008 Apple Inc. Tous droits réservés. Apple, le logo Apple, AirPort, AirPort Extreme, AppleShare, AppleTalk, Bonjour, Mac et Mac OS sont des marques d’Apple Computer, Inc. déposées aux États-Unis et dans d’autres pays. AirPort Express, AirTunes, Time Capsule et Time Machine sont des marques d’Apple Inc. Les autres noms de produits et de sociétés figurant dans ce manuel peuvent être des marques de leurs détenteurs respectifs. F019-1155 iPod touch Guide de l’utilisateur5 Chapitre 1 : Démarrage 5 Éléments nécessaires 5 Enregistrement de l’iPod touch 6 Synchronisation avec iTunes 11 Comptes Mail, Contacts et Calendrier. 13 Installation de profils de configuration 14 Déconnexion de l’iPod touch de votre ordinateur 15 Chapitre 2 : Notions élémentaires 15 Vue d’ensemble de l’iPod touch 17 Écran d’accueil 20 Bouton de Marche/Veille 21 Écran tactile 24 Clavier à l’écran 28 Connexion à Internet 28 Recharge de la batterie. 30 Entretien de l’iPod touch 30 Redémarrage et réinitialisation de l’iPod touch 31 Chapitre 3 : Musique et vidéo 31 Obtention de musique, vidéo, etc. 33 Musique et autres audios 38 Vidéos 41 Réglage d’une minuterie de veille 42 Modification des boutons de navigation 43 Chapitre 4 : Photos 43 Synchronisation de photos avec votre ordinateur 43 Visionnage de photos 45 Diaporamas 46 Fond d’écran 46 Enregistrement d’images à partir d’un message électronique ou d’une page web 46 Envoi d’une photo par courrier électronique 46 Envoi de photo à une Galerie MobileMe 2 Table des matièresTable des matières 3 47 Attribution d’une photo à un contact 48 Chapitre 5 : iTunes Stores 48 iTunes Wi-Fi Music Store 52 App Store 58 Synchronisation du contenu acheté 58 Vérification des achats 59 Mise à jour de votre compte 60 Chapitre 6 : Autres applications 60 Safari 65 Calendrier 70 Mail 76 YouTube 79 Bourse 80 Plans 86 Météo 88 Horloge 90 Calculette 92 Notes 93 Contacts 95 Chapitre 7 : Réglages 95 Wi-Fi 96 VPN 96 Nouvelles données 97 Luminosité 97 Général 103 Musique 104 Vidéo 105 Photos 105 Mail, Contacts, Calendrier 109 Safari 111 L’annexe A : Dépannage 111 Général 112 iTunes et synchronisation 114 Safari, Mail et Contacts 115 Son, musique et vidéo 116 iTunes Store 116 Sauvegarde de l’iPod touch 119 Mise à jour et restauration du logiciel de l’iPod touch 120 Fonctions d’accessibilité de l’iPod touch4 Table des matières 121 L’annexe B : Autres ressources 121 Informations relatives à la sécurité, au logiciel et au service après-vente 122 Guide de l’utilisateur optimisé pour iPod touch 5 · AVERTISSEMENT : Pour éviter toute blessure, consultez toutes les consignes d’utilisation présentes dans ce guide et les informations relatives à la sécurité apparaissant dans le Guide des informations importantes sur le produit disponible à la page www.apple.com/ca/fr/support/manuals/ipodtouch avant d’utiliser l’iPod touch. Éléments nécessaires Pour utiliser l’iPod touch, vous avez besoin des éléments suivants :  un Mac ou un PC équipé d’un port USB 2.0 et de l’un des systèmes d’exploitation suivants :  Mac OS X version 10.4.10 ou ultérieure,  Windows XP Édition familiale ou Professionnel avec Service Pack 2 ou ultérieur,  Windows Vista Édition Familiale Premium, Professionnel, Entreprise ou Édition Intégrale ;  une résolution écran de 1024 x 768 minimum ;  iTunes 7.7 ou une version ultérieure, disponible à la page www.itunes.com/ca/fr/download ;  un compte iTunes Store (pour les achats auprès de l’iTunes Wi-Fi Music Store ou de l’App Store) ;  une connexion Internet pour votre ordinateur (haut débit recommandé). Enregistrement de l’iPod touch Avant de pouvoir vous servir des fonctionnalités qu’offrent l’iPod touch, vous devez utiliser iTunes pour configurer l’iPod touch. Vous pouvez également enregistrer votre iPod touch et créer un compte iTunes Store (disponible dans la majorité des pays) si vous n’en avez pas encore un. Enregistrement de votre iPod touch : 1 Téléchargez et installez la dernière version d’iTunes à la page www.itunes.com/ca/fr/download. 1 Démarrage2 Connectez l’iPod touch à un port USB 2.0 de votre Mac ou PC à l’aide du câble fourni avec l’iPod touch. 3 Suivez les instructions à l’écran dans iTunes pour enregistrer votre iPod touch et synchroniser votre iPod touch avec les contacts, calendriers et signets de votre ordinateur. Synchronisation avec iTunes Avec l’iPod touch, il est facile d’avoir un accès instantané à vos contacts, vos calendriers et même les signets de votre navigateur. iTunes peut synchroniser toutes ces informations sur l’iPod touch, ainsi que votre musique, vos vidéos et d’autres contenus de votre bibliothèque iTunes. Configuration de la synchronisation Vous pouvez régler iTunes de manière à synchroniser certains ou tous les éléments suivants :  Contacts : noms, numéros de téléphone, adresses, adresses électroniques, etc.  Calendriers (rendez-vous et événements)  Réglages de compte de messagerie  Signets de page web  Musique et livres audio  Photos  Podcasts  Vidéos  Applications achetées ou téléchargées auprès de l’iTunes Store Vous pouvez ajuster vos réglages de synchronisation chaque fois que l’iPod touch est connecté à votre ordinateur. 6 Chapitre 1 DémarrageChapitre 1 Démarrage 7 La musique, les livres audio, les podcasts, le contenu vidéo et les applications achetées sont synchronisés à partir de votre bibliothèque iTunes. Si vous n’avez pas encore de contenu dans iTunes, l’iTunes Store (disponible dans certains pays) facilite l’achat de contenu ou l’abonnement à du contenu, et son téléchargement sur iTunes. Vous pouvez également ajouter de la musique à votre bibliothèque iTunes à partir de vos CD. Pour en savoir plus sur iTunes et l’iTunes Store, ouvrez iTunes et choisissez Aide > Aide iTunes. Les contacts, calendriers et signets de page web sont synchronisés à partir des applications de votre ordinateur, comme indiqué dans la section suivante. Les contacts et les calendriers sont synchronisés selon les deux méthodes à partir de votre ordinateur et de votre iPod touch. Les entrées ou les modifications apportées à l’iPod touch sont synchronisées vers votre ordinateur et inversement. Les signets de page web sont également synchronisés dans les deux sens. Les photos peuvent être synchronisées à partir d’une application ou d’un dossier. Les réglages de compte de messagerie ne se synchronisent que depuis l’application de messagerie électronique de votre ordinateur vers votre iPod touch. Cela vous permet de personnaliser vos comptes de messagerie sur l’iPod touch sans influer pour autant les réglages de compte de messagerie instaurés sur votre ordinateur. Remarque : Vous pouvez également configurer directement des comptes de messagerie électronique sur l’iPod touch. Voir la section ªComptes Mail, Contacts et Calendrier.» à la page 11. Les achats effectués sur l’iPod touch à partir de l’iTunes Wi-Fi Music Store ou de l’App Store sont synchronisés vers votre bibliothèque iTunes. Vous pouvez également acheter ou télécharger directement de la musique et des applications depuis l’iTunes Store sur votre ordinateur, puis les synchroniser sur votre iPod touch. Si vous le souhaitez, vous pouvez régler l’iPod touch pour qu’il ne synchronise qu’une partie du contenu de votre ordinateur. Par exemple, vous pouvez synchroniser un seul groupe de contacts de votre carnet d’adresses ou uniquement les podcasts vidéo non visionnés. Important : Vous ne pouvez connecter et synchroniser qu’un iPod touch à la fois. Déconnectez-en un avant d’en connecter un autre. Vous devez ouvrir une session sur votre ordinateur avant de connecter votre iPod touch. Sur un PC, si vous synchronisez plus d’un iPod touch ou iPod avec le même compte utilisateur, vous devez utilisez les mêmes réglages de synchronisation pour chacun d’entre eux. Configuration de la synchronisation iTunes : 1 Connectez l’iPod touch à votre ordinateur et ouvrez iTunes (s’il ne s’est pas ouvert automatiquement). 2 Dans iTunes, sélectionnez iPod touch dans la barre latérale.3 Ajustez les réglages de synchronisation dans chacun des volets de réglage. La section suivante décrit les volets. Remarque : Si vous configurez l’iPod touch de manière à synchroniser contacts, calendriers ou signets avec MobileMe ou Microsoft Exchange, la synchronisation de ces éléments est désactivée dans iTunes. Voir la section ªConfiguration de comptes.» à la page 11. 4 Cliquez sur Appliquer dans le coin inférieur droit de l’écran. Par défaut, l’option ”Ouvrir iTunes à la connexion de cet iPod” est sélectionnée. Volets des réglages iPod touch dans iTunes Les sections suivantes offrent un aperçu de chacun des volets de réglage de l’iPod touch. Pour plus de renseignements, ouvrez iTunes et choisissez Aide > Aide iTunes. Volet Résumé Sélectionnez ”Ouvrir iTunes à la connexion de cet iPod” pour qu’iTunes s’ouvre et synchronise automatiquement votre iPod touch lorsque vous connectez ce dernier à votre ordinateur. Désélectionnez cette option si vous souhaitez ne synchroniser qu’en cliquant le bouton Synchroniser d’iTunes. Pour plus de renseignements sur la manière d’éviter la synchronisation automatique, consultez la section ªÉviter la synchronisation automatique» à la page 10. Sélectionnez « Ne synchroniser que les morceaux et vidéos cochés » si vous ne souhaitez synchroniser que les éléments cochés de votre bibliothèque iTunes. 8 Chapitre 1 DémarrageChapitre 1 Démarrage 9 Sélectionnez l’option « Gérer manuellement la musique et les clips vidéo » pour désactiver la synchronisation automatique dans les volets de réglages Musique et Vidéo. Voir la section ªGestion manuelle du contenu» à la page 32. Volet Infos La sous-fenêtre Info permet de configurer les réglages de synchronisation de vos contacts, calendriers, comptes de messagerie et signets de navigateur web.  Dans le menu principal, choisissez Contacts, pour configurer et personnaliser vos comptes de messagerie pour l’“iPhone”. Vous pouvez synchroniser vos contacts avec des applications telles que Carnet d’adresses de Mac OS X, Microsoft Entourage, le carnet d’adresses Yahoo! et le carnet d’adresses Google sur un Mac, ou avec le carnet d’adresses Yahoo! , le carnet d’adresses Google, le carnet d’adresses Windows (Outlook Express), les contacts Vista ou Microsoft Outlook 2003 ou 2007 sur un PC. (Sur un Mac, vous pouvez synchroniser vos contacts avec plusieurs applications. Sur un PC, vous ne pouvez synchroniser vos contacts qu’avec une application à la fois. Si vous synchronisez avec le carnet d’adresses Yahoo! , vous avez seulement besoin de cliquer sur Configurer pour saisir vos nouvelles informations de connexion lorsque vous changez de nom d’utilisateur ou de mot de passe Yahoo! après avoir réglé la synchronisation.  Calendriers Vous pouvez synchroniser des calendriers à partir d’applications telles qu’iCal et Microsoft Entourage sur un Mac ou à partir de Microsoft Outlook 2003 ou 2007 sur un PC. Sur un Mac, vous pouvez synchroniser vos calendriers avec plusieurs applications. Sur un PC, vous ne pouvez synchroniser vos calendriers qu’avec une application à la fois.  Comptes de messagerie Vous pouvez synchroniser les réglages de compte de messagerie depuis l’application Mail sur Mac et depuis Microsoft Outlook 2003 ou 2007 ou Outlook Express sur PC. Les réglages de compte ne sont transférés que depuis votre ordinateur vers l’iPod touch. Les modifications que vous apportez à un compte de messagerie électronique sur votre iPod touch n’influent pas sur le compte sur de votre ordinateur. Remarque : Le mot de passe de votre compte de messagerie Yahoo! n’est pas enregistré sur votre ordinateur et ne ne peut donc pas être synchronisé : il doit être saisi sur l’iPod touch. Dans Réglages, choisissez « Mail, Contacts, Calendrier », touchez votre compte Yahoo! et saisissez le mot de passe.  Navigateur web Vous pouvez synchroniser des signets à partir de Safari sur un Mac, ou à partir de Safari ou Microsoft Internet Explorer sur un PC.  AvancéCes options vous permettent de remplacer lors de la prochaine synchronisation les informations qui se trouvent sur l’iPod touch par celles qui se trouvent sur votre ordinateur. Volets Musique, Films, Émissions de TV et Podcasts Utilisez ces sous-fenêtres pour indiquer les données à synchroniser. Vous pouvez synchroniser tous vos morceaux de musique, vos films, vos émissions de télévision et vos podcasts, ou sélectionner les listes de lecture et articles souhaités sur l’iPod touch. Si vous souhaitez regarder des films loués sur votre iPod touch, transférez-les sur l’iPod touch à l’aide du volet Films d’iTunes. Si l’iPod touch n’a plus suffisamment d’espace libre pour tous les éléments multimédias indiqués, iTunes vous demande si vous souhaitez créer une liste de lecture spéciale. iTunes crée celle-ci pour vous et la règle pour qu’elle se synchronise avec l’iPod touch. Volet Photos Vous pouvez synchroniser des photos avec iPhoto 4.0.3 ou ultérieur ou avec Aperture sur un Mac, ou avec Adobe Photoshop Album 2.0 ou supérieur ou Adobe Photoshop Elements 3.0 ou supérieur sur un PC. Vous pouvez également synchroniser des photos à partir de tout dossier de votre ordinateur qui contient des images. Volet Applications Utilisez le volet Applications pour indiquer quelles applications de l’App Store vous souhaitez installer sur l’iPod touch. Toutes les applications directement téléchargées sur l’iPod touch sont automatiquement sauvegardées dans votre bibliothèque iTunes lorsque vous effectuez une synchronisation. Si vous supprimez manuellement une application sur votre iPod touch, vous pouvez la réinstaller à partir de ce volet à partir du moment où il a été synchronisé précédemment. Éviter la synchronisation automatique Vous pouvez empêcher l’iPod touch de synchroniser automatiquement lorsque vous le connectez à un ordinateur autre que celui avec lequel vous le synchronisez habituellement. Désactivation de la synchronisation pour l’iPod touch: Connectez l’iPod touch à votre ordinateur. Dans iTunes, sélectionnez iPod touch dans la barre latérale puis cliquez sur l’onglet Résumé. « Ouvrir iTunes à la connexion de cet iPod ». Vous pouvez toujours synchroniser en cliquant sur le bouton Synchroniser. Éviter la synchronisation automatique pour tous les iPod touch : Dans iTunes choisissez iTunes > Préférences (sur un Mac) ou Édition > Préférences (sur un PC), cliquez sur Synchronisation et sélectionnez l’option “Désactiver la synchronisation automatique pour tous les iPhone et iPod”. 10 Chapitre 1 DémarrageChapitre 1 Démarrage 11 Si cette case est cochée, l’iPod touch ne se synchronisera pas automatiquement même si l’option “Ouvrir iTunes à la connexion de cet iPod” est sélectionnée dans le volet Résumé. Éviter une fois la synchronisation automatique sans modifier les réglages : Ouvrez iTunes. Lorsque vous connectez l’iPod touch à votre ordinateur, maintenez enfoncées les touches Commande Option (sur un Mac) ou Maj Contrôle (sur un PC) jusqu’à l’apparition de l’iPod touch dans la barre latérale. Synchronisation manuelle : Dans iTunes, sélectionnez iPod touch dans la barre latérale puis cliquez sur Synchroniser dans le coin inférieur droit de la fenêtre. Alternativement, si vous avez modifié des réglages de synchronisation, cliquez sur Appliquer. Comptes Mail, Contacts et Calendrier. L’iPod touch fonctionne avec MobileMe, Microsoft Exchange et de nombreux systèmes de messagerie populaires. Configuration de comptes. MobileMe et Microsoft Exchange proposent non seulement de la messagerie électronique mais également des informations sur les contacts et calendriers qui peuvent être synchronisées automatiquement sur l’iPod touch sans fil. MobileMe peut également synchroniser vos signets Safari. MobileMe, Exchange et les autres comptes de messagerie se configurent directement sur l’iPod touch. L’iPod touch utilise le protocole Exchange ActiveSync pour synchroniser messagerie électronique, calendriers et contacts avec les versions suivantes de Microsoft Exchange :  Exchange Server 2003 Service Pack 2  Exchange Server 2007 Service Pack 1 Pour de nombreux comptes de messagerie populaires, l’iPod touch configure automatiquement la majorité des réglages pour vous. Si vous n’en avez pas encore, vous pouvez obtenir un compte de messagerie gratuit à www.yahoo.com, www.google.com ou www.aol.com. Vous pouvez également essayer MobileMe gratuitement pendant 60 jours. Accédez à la page www.me.com/fr.Ajout d’un compte sur l’iPod touch: 1 À partir de l’écran d’accueil de l’iPod touch, touchez Réglages. 2 Touchez « Mail, Contacts, Calendrier » puis touchez Ajouter un compte. 3 Touchez un type de compte :  Microsoft Exchange  MobileMe  Google Mail  Carnet d’adresses Yahoo!, Mail  AOL  Autre 4 Saisissez vos informations de compte et touchez Enregistrer. Votre prestataire de service ou administrateur système peut vous fournir les réglages de compte nécessaires. 5 Si vous configurez un compte MobileMe ou Exchange, touchez pour activer le courrier électronique, les contacts, les calendriers et les signets (MobileMe uniquement). Touchez ensuite Enregistrer. Important : Si vous activez les contacts ou calendriers sur un compte MobileMe ou Exchange, la synchronisation des contacts ou calendriers est alors désactivée dans l’application iTunes elle-même. Toutes les contacts ou calendrier présents sur l’iPod touch son remplacés par ceux de votre compte MobileMe ou Exchange. Comptes de type « Push » MobileMe, Microsoft Exchange et Yahoo! Mail sont des comptes de type « Push ». Lorsque des informations sont disponibles, par exemple lorsqu’un message électronique arrive, les informations sont automatiquement livrées (envoyées ou « poussées ») vers votre ordinateur ou votre iPod touch. (Au contraire, les services de récupération ou services « Fetch » forcent votre logiciel de messagerie à vérifier régulièrement auprès de votre prestataire de service l'arrivée de nouveaux messages et à demander leur livraison.) MobileMe et Exchange synchronisent également vos contacts, calendriers et signets (MobileMe seulement) de la même manière. Par exemple, si vous ajoutez un contact au carnet d’adresses de votre ordinateur, le nouveau contact est automatiquement envoyé à l’iPod touch ainsi qu’à tout ordinateur ou appareil configuré auprès du service. Les informations synchronisées sont transférées automatiquement par le biais de votre connexion sans fil ; vous n’avez donc pas besoin de connecter l’iPod touch à votre ordinateur pour synchroniser. iPod touch peut recevoir des informations envoyées par le biais d’une connexion Wi-Fi seulement lorsque l’iPod touch est activé (l'écran est allumé ou l’iPod touch est connecté à votre ordinateur ou à un adaptateur secteur). 12 Chapitre 1 DémarrageChapitre 1 Démarrage 13 Installation de profils de configuration Dans un environnement d’entreprise, vous pouvez être amené à configurer des comptes et d’autres éléments sur votre iPod touch en installant un profil de configuration. Les profils de configuration offrent un moyen aux administrateurs système de configurer rapidement votre iPod touch pour fonctionner avec les systèmes informatiques de votre société, votre école ou votre organisation. Par exemple, un profil de configuration pourrait configurer votre iPod touch pour accéder aux serveurs Microsoft Exchange de votre bureau, permettant à votre iPod touch d’accéder au courrier électronique, aux calendriers et aux contacts Exchange. Les profils de configuration peuvent configurer simultanément plusieurs réglages sur l’iPod touch. Par exemple, un profil de configuration pourrait régler votre compte Microsoft Exchange, votre compte VPN et des certificats destinés à un accès sécurisé au réseau et aux informations de votre société. Un profil de configuration peut activer le Verrouillage par code, ce qui vous oblige à créer et à saisir un code pour utiliser votre iPod touch. Votre administrateur système peut distribuer des profils de configuration par courrier électronique ou en les plaçant sur une page web sécurisée. Installation d’un profil de configuration : 1 Sur votre iPod touch, ouvrez le message électronique ou téléchargez le profil de configuration à partir du site web fourni par votre administrateur système. 2 Lorsque le profil de configuration s’ouvre, touchez Installer. 3 Saisissez les mots de passe et les autres informations demandées. Important : On vous demandera problablement si l’on peut faire confiance au profil de configuration. En cas de doute, consultez votre administrateur système avant d’installer un profil de configuration. Les réglages apportés par un profil de configuration ne peuvent pas être modifiés. Si vous souhaitez modifier ces réglages, vous devez d'abord supprimer le profil de configuration ou en installer un mis à jour. Suppression de profil : Dans Réglages, choisissez Général > Profil puis sélectionnez le profil de configuration et touchez Supprimer. La suppression d’un profil de configuration supprime les réglages et toutes les autres informations installées par le profil de configuration de l’iPod touch. Déconnexion de l’iPod touch de votre ordinateur Sauf si l’iPod touch est en cours de synchronisation avec votre ordinateur, vous pouvez l’en déconnecter à tout moment. Lorsque l’iPod touch est en cours de synchronisation avec votre ordinateur, l’iPod touch indique Synchronisation en cours. Si vous déconnectez l’iPod touch avant qu’il ait terminé la synchronisation, il se peut que certaines données ne soient pas transférées. Lorsque l’iPod touch a terminé de se synchroniser, iTunes indique « La synchronisation de l’iPod touch est terminée ». Annulation d’une synchronisation : Faites glisser le curseur sur l’iPod touch. 14 Chapitre 1 Démarrage15 Vue d’ensemble de l’iPod touch Bouton de marche/veille Port écouteurs Connecteur Dock Antenne Wi-Fi Bouton principal Écran tactile Icônes des applications Barre d’état 2 Notions élémentairesiPod touch Accessoires inclus Socle Écouteurs stéréo Câble connecteur Dock vers USB Chiffon de nettoyage iPod Élément Utilisation Casque stéréo Écoutez votre musique et vos vidéos. Câble Connecteur Dock vers USB Utilisez le câble pour connecter l’iPod touch à votre ordinateur afin de le synchroniser et le recharger ou à l’adaptateur secteur pour le charger. Le câble est utilisable avec la station d’accueil vendue en option, ou peut être directement branché sur l’iPod touch. Socle Posez l’iPod touch pour afficher des vidéos ou des diaporamas photo. Chiffon de nettoyage Essuyez l’écran de l’iPod touch. Icônes d’état Les icônes de la barre d’état située en haut de l’écran proposent des informations concernant l’iPod touch : Icône d’état Signification Wi-Fi Indique que l’iPod touch est connecté à Internet par un réseau Wi-Fi. Le nombre de barres est proportionnel à la qualité de la connexion. Voir la section page 28. Activité réseau Indique une activité réseau. Certaines applications tierces peuvent également utiliser cette icône pour indiquer un processus actif. VPN Indique que vous êtes connecté à un ré- seau en utilisant un VPN (réseau privé virtuel). Voir la section ªRéseau» à la page 98. 16 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 17 Icône d’état Signification Verrouillage Indique que l’iPod touch est verrouillé. Voir la section page 19. Lecture Indique qu’un morceau, un livre audio ou un podcast est à l’écoute. Voir la section page 33. Alarme Indique qu’une alarme est réglée. Voir la section page 88. Batterie Indique le niveau de la batterie ou l’état de la charge. Voir la section page 28. Écran d’accueil Appuyez sur le bouton principal à tout moment pour voir les applications de votre iPod touch. Touchez l’icône de n’importe quelle application pour démarrer. Applications iPod touch Les applications suivantes sont incluses avec iPod touch : Musique Écoutez des morceaux, podcasts ou livres audio. Définissez votre propre limite de volume pour le confort d’écoute. Vidéos Regardez des films, des vidéos musicales, des podcasts vidéo et des émissions de télévision. Photos Affichez des photos et images transférées à partir de votre ordinateur ou enregistrées sur l’iPod touch, affichez-les en mode Portrait ou Paysage, zoomez sur une photo, visionnez un diaporama, envoyez des photos par courrier électronique,ajoutez-les à une galerie MobileMe, assignez-les à des contacts et utilisez-les comme fond d’écran. iTunes Effectuez des recherches dans le catalogue de musique de l’iTunes Wi-Fi Music Store ou parcourez, écoutez des extraits et achetez les nouveautés, les morceaux et albums les plus vendus, et plus 1 . À certains emplacements Starbucks 3 , découvrez le morceau à l’écoute dans le café et achetez-le instantanément. Parcourez d’autres morceaux des collections Starbucks, écoutez-en des extraits et achetez-les.App Store Recherchez dans l’App Store des applications iPod touch que vous pouvez acheter ou télécharger à l’aide de votre connexion au réseau de données Wi-Fi. Lisez ou rédigez vos propres évaluations de vos applications préférées. Téléchargez et installez les applications sur votre écran d’accueil 1 . Safari Explorez n’importe quel site web en mode Wi-Fi. Faites pivoter l’iPod touch d’un quart de tour pour un affichage grand écran. Double-touchez pour agrandir ou réduire, Safari adapte automatiquement la colonne de la page web à l’écran de l’iPod touch pour faciliter la lecture. Ajoutez des Web Clip Safari à l’écran d’accueil pour un accès rapide à vos sites web préférés. Enregistrez des images dans votre Photothèque à partir de sites web. Calendrier Affichez vos calendriers MobileMe, iCal, Microsoft Entourage, Microsoft Outlook ou Microsoft Exchange. Saisissz des événement sur votre iPod touch et synchronisezles vers le calendrier de votre ordinateur. Définissez des alarmes pour vous rappeler d’événements, rendez-vous et échéances. Mail L’iPod touch fonctionne avec MobileMe, Microsoft Exchange et de nombreux systèmes de messagerie communs, notamment Yahoo! Mail, Google Mail et AOL, ainsi que la plupart des systèmes de messagerie POP3 et IMAP standard. Affichez des PDF et d’autres pièces jointes dans Mail. Enregistrez des photos et éléments graphiques joints dans votre photothèque. Contacts Synchronisez les coordonnées de vos contacts à partir de MobileMe, Carnet d’adresses Mac OS X, le carnet d’adresses Yahoo! , le carnet d’adresses Google, le carnet d’adresses Windows (Outlook Express), Microsoft Outlook ou Microsoft Exchange. Recherchez, ajoutez, modifiez ou supprimez des contacts qui sont ensuite synchronisés vers votre ordinateur. YouTube Lisez des vidéos de votre collection YouTube en ligne 1 . Recherchez des vidéos ou parcourez les vidéos sélectionnées, les plus populaires, les plus récentes et les mieux cotées. Bourse Affichez la cotation de titres choisis, actualisée automatiquement via Internet. Plans Affichez un plan de ville, une vue satellite ou une vue mixte de lieux à travers le monde. Détaillez une carte par un zoom avant, recherchez et suivez votre emplacement actuel approximatif. obtenez des itinéraires routiers détaillés et afficher les conditions actualisées du trafic autoroutier, trouver des commerces à proximité. 2 18 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 19 Météo Obtenez la météo du jour et des prévisions à six jours, Ajoutez vos villes préférées pour obtenez à tout moment un bulletin météo rapide. Horloge Affichez l’heure qu’il est dans des villes du monde entier (vous pouvez créer des horloges pour les villes de votre choix), réglez une ou plusieurs alarmes, utilisez le chronomètre ou réglez un compte à rebours. Calculette Ajoutez, soustrayez, multipliez et divisez. Faites pivoter l’iPod touch pour utiliser ses fonctions scientifiques étendues. Notes Prenez des notes à tout moment : aide-mémoire, listes de courses, réflexions et envoyez-les par courrier électronique. Réglages Effectuez tous les réglages de l’iPod touch de façon centralisée, Définissez votre fond d’écran, la luminosité de votre écran et les réglages de votre réseau, votre courrier, votre accès web, votre musique, vos vidéos, vos photos, etc. Activez le verrouillage automatique et un code de sécurité. Restreignez l’accès au contenu iTunes explicite et à certaines applications. Réinitialisez l’iPod touch. 1 Fonction non disponible à certains endroits. 2 Les fonctionnalités et services de Plans ne sont pas tous disponibles partout. 3 États-Unis uniquement. Personnaliser l’écran d’accueil Vous pouvez personnaliser la disposition des icônes sur l’écran d’accueil (y compris les icônes du Dock du bas de l’écran). Vous avez la possibilité de les réorganiser sur plusieurs menus principaux. Modifier la disposition des icônes : 1 Touchez et faites glisser un icône de l’écran d’accueil jusqu’à ce que les icônes commencent à frémir. 2 Réorganisez les icônes en les faisant glisser. 3 Appuyez sur le bouton principal pour enregistrer votre agencement. Vous pouvez également ajouter des liens vers vos pages web favorites sur l’écran d’accueil. Voir la section ªWeb Clip» à la page 64.Créer des écrans d’accueil supplémentaires : Lorsque vous changez la disposition des icônes, faites glisser une icône vers l’extrémité droite de l’écran jusqu’à ce qu’un nouvel écran apparaisse. Feuilletez la page écran afin de revenir à l’écran d’origine et faire glisser d’autres icônes vers le nouvel écran. Vous pouvez créer jusqu’à neuf écrans. Le nombre de points apparaissant au-dessus du Dock indique le nombre d’écrans dont vous disposez et celui qui est actuellement affiché. Basculer vers un autre écran d’accueil : Feuilletez vers la gauche ou la droite Réinitialiser votre écran d’accueil avec la disposition par défaut : Choisissez Réglages > Général > Réinitialiser et touchez Réinitialiser l’écran principal. Bouton de Marche/Veille Si vous n’utilisez pas l’iPod touch, vous pouvez le verrouiller. En cas de verrouillage, l’iPod touch ne répond pas si vous touchez son écran. Par défaut, l’iPod touch se verrouille automatiquement si vous ne touchez pas l'écran pendant une minute. Bouton de marche/veille 20 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 21 Verrouiller l’iPod touch Appuyez sur le bouton de Marche/Veille. Déverrouiller l’iPod touch Appuyez sur le bouton du menu principal ou sur le bouton de Marche/Veille, puis faites glisser le curseur. Éteindre complètement l’iPod touch Maintenez le bouton de Marche/Veille enfoncé pendant quelques secondes jusqu’à ce que le curseur rouge apparaisse, puis faites glisser le curseur. Allumer l’iPod touch Maintenez le bouton de Marche/Veille enfoncé jusqu’à ce que le logo Apple apparaisse. Pour plus de renseignements sur la manière de régler l’iPod touch pour qu'un mot de passe soit exigé pour le déverrouiller, consultez la section ª» à la page 99. Écran tactile Les contrôles de l’écran tactile de l’iPod touch changent dynamiquement en fonction des tâches que vous réalisez. Ouverture d’applications Ouverture d’une application: Toucher d’une icône. Retour à l’écran d’accueil : Appuyez sur le bouton d’accueil situé au-dessous de l’écran.Défilement Faites défiler verticalement l’affichage en faisant glisser votre doigt. Sur certains écrans, notamment les pages web, vous pouvez également faire défiler latéralement. Lorsque vous faites glisser votre doigt pour faire défiler, vous ne choisissez ni n’activez aucune fonction sur l’écran. Feuilletez pour faire défiler l’affichage rapidement. Vous pouvez attendre que le défilement s’arrête ou toucher n’importe quel endroit de l’écran pour qu’il s’arrête immédiatement. Lorsque vous touchez l’écran pour arrêter le défilement, vous ne choisissez ni n’activez aucun des éléments affichés. Pour défiler rapidement jusqu’au début d’une liste, d’une page web ou d’un message électronique, touchez simplement la barre d’état. 22 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 23 Listes Certaines listes présentent un index sur le côté droit. Recherche d’éléments dans une liste indexée : Touchez une lettre pour passer directement aux éléments commençant par cette lettre. Faites glisser le doigt le long de l’index pour faire rapidement défiler la liste. Index Choix d’un élément : Touchez un élément de la liste. Suivant la liste, toucher un élément peut avoir des conséquences différentes. Par exemple, cette opération peut ouvrir une nouvelle liste, lire un morceau, ouvrir un message électronique ou afficher les coordonnées de quelqu’un. Retour à une liste précédente : Touchez le bouton Précédent dans le coin supérieur gauche. Zoom avant ou arrière Lorsque vous consultez des photos, pages web, messages électroniques ou plans, vous pouvez agrandir ou réduire ceux-ci. Rapprochez ou écartez vos doigts pour contrôler ainsi le zoom. Pour les photos et les pages web, vous pouvez double-toucher (toucher rapidement deux fois) pour effectuer un zoom avant, puis double-toucher à nouveau pour pour effectuer un zoom arrière. Dans le cas de cartes routières, double-touchez pour effectuer un zoom avant et touchez l’écran une seule fois avec deux doigts pour effectuer un zoom arrière.Clavier à l’écran Utilisez le clavier à l’écran pour saisir du texte, par exemple des coordonnées, des messages de texte ou des adresses web. Saisie de texte Suivant l’application que vous utilisez, le clavier intelligent peut automatiquement suggérer des corrections pendant que vous tapez pour éviter les fautes d’orthographe. Saisie de texte : 1 Touchez un champ de texte, par exemple dans une note ou un nouveau contact, pour activer le clavier. 2 Touchez les touches du clavier selon vos besoins. Commencez par taper seulement avec votre index. Avec de l’expérience, vous pourrez taper plus rapidement avec vos pouces. Lors de votre saisie, chaque lettre apparaît au-dessus de votre doigt. Si vous touchez la mauvaise touche, vous pouvez faire glisser votre doigt jusqu’à la bonne. La lettre n’est pas saisie tant que vous ne relâchez pas votre doigt de la touche. Taper en majuscules Touchez la touche Maj avant de toucher une lettre. Saisir rapidement un point et un espace Double-touchez la barre d’espace. Activer le verrouillage majuscules Activez le verrouillage des majuscules (voir la section ªClavier» à la page 101), puis doubletouchez la touche Maj . La touche Maj devient bleue et toutes les lettres que vous tapez s’affichent en majuscules. Touchez à nouveau la touche Maj pour déverrouiller les majuscules. 24 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 25 Affichage de nombres, de ponctuation ou de symboles Touchez la touche Nombre . Touchez la touche Symbole pour accéder aux signes de ponctuation et aux symboles complémentaires. Saisie de lettres ou symboles qui n’apparaissent pas sur le clavier Touchez la lettre ou le symbole associé et maintenez le doigt dessus, puis faite glisser pour choisir une variation. Claviers internationaux L’iPod touch propose des claviers en de nombreuses langues et gère les formats de clavier suivants : anglais, anglais (R-U), danois, allemand, espagnol, finnois, français, français (Canada), italien, japonais QWERTY, japonais Kana, coréen, norvégien Bokmål, néerlandais, polonais, portugais (Brésil), portugais (Portugal), russe, suédois, chinois (simplifié) pinyin, chinois (simplifié) manuel, et chinois (traditionnel) manuel. Activation et désactivation des claviers internationaux : 1 Dans Réglages, choisissez Général > International > Claviers. 2 Activez les claviers souhaités. Pour les langues proposant plusieurs clavier (notamment japonais et chinois), le nombre de claviers disponibles est indiqué. Touchez pour choisir un clavier pour la langue en question. Basculement entre claviers lorsque plusieurs sont activés Touchez pour basculer entre les claviers. Lorsque vous touchez le symbole, le nom du clavier que vous venez d’activer apparaît brièvement. Saisie en Japonais Kana Utilisez le clavier Kana pour sélectionner des syllabes. Pour plus d’options de syllabes, touchez la flèche et sélectionnez une autre syllabe ou un autre mot dans la fenêtre. Saisie en japonais QWERTY Utilisez le clavier QWERTY pour saisir du code pour les syllabes japonaises. Pendant que vous tapez, les syllabes suggérées apparaissent. Touchez la syllabe pour la choisir. Saisie en coréen Utilisez le clavier coréen à 2 jeux de touches pour taper les caractères hangul. Pour tapez des doubles consonnes ou des voyelles composées, touchez la lettre, maintenez le doigt dessus et faites glisser pour choisir le double caractère. Saisie en chinois simplifiée pinyin Utilisez le clavier QWERTY pour saisir du pinyin correspondant aux caractères chinois. Pendant que vous tapez, les caractères chinois suggérés apparaissent. Touchez un caractère pour le choisir ou continuez à saisir du pinyin pour afficher davantage d’options de caractères. Saisie de chinois simplifié ou traditionnel manuel Utilisez le bloc tactile pour saisir des caractè- res chinois avec votre doigt. Tandis que vous tracez des traits, l’iPod touch les reconnaît et propose une liste de caractères correspondants classée par ordre de similarité. Lorsque vous choisissez un caractère, ceux qui y sont associés apparaissent dans la liste en tant que choix supplémentaires. Lorsque les formats manuels de chinois simplifié ou traditionnel sont activés, vous pouvez saisir des caractères chinois avec votre doigt, comme illustré : Voir la section ªInternational» à la page 102 pour plus de renseignements sur la configuration de langue pour l’iPod touch et les autres réglages du clavier. 26 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 27 Dictionnaire L’iPod touch propose des dictionnaires de vérification d’orthographe pour toutes les langues gérées. Le dictionnaire approprié s’active automatiquement en sélectionnant un clavier sur l’iPod touch. L’iPod touch utilise le dictionnaire actif pour suggérer des corrections ou compléter le mot en cours de saisie. Vous n’avez pas besoin d’interrompre votre frappe pour accepter le mot proposé. Mot proposé Acceptation ou refus de suggestions du dictionnaire :  Pour rejeter le mot suggéré, terminez de taper le mot comme vous le souhaitez, puis touchez le « x » pour refuser la suggestion avant de taper autre chose. Chaque fois que vous rejetez une proposition pour un même mot, l’iPod touch tend à accepter votre mot.  Pour utiliser le mot suggéré, tapez un espace, un signe de ponctuation ou le caractère Retour. Modification de texte : Touchez et maintenez le contact pour agrandir l’affichage, puis faites glisser le doigt pour positionner le point d’insertion.Connexion à Internet L’iPod touch se connecte automatiquement à Internet par le biais de réseaux Wi-Fi . iPod touch peut accéder aux réseaux AirPort et autres réseaux Wi-Fi domestiques, professionnels ou aux points d’accès Wi-Fi de par le monde. Lorsqu’il est connecté à un réseau Wi-Fi connecté à Internet, l’iPod touch se connecte automatiquement à Internet chaque fois que vous utilisez Mail, Safari, YouTube, Bourse, Plans, Météo, l’App Store ou l’iTunes Wi-Fi Music Store. Accès à un réseau Wi-Fi Les réglages Wi-Fi vous permettent d’activer la fonction Wi-Fi et d’accéder aux réseaux Wi-Fi. Activation du mode Wi-Fi : Choisissez Réglages > Wi-Fi et activez l’option de Wi-Fi. Accès à un réseau Wi-Fi : Choisissez Réglages > Wi-Fi, attendez un moment pendant que l’iPod touch détecte les réseaux à portée, puis sélectionnez le réseau (l’accès à certains réseaux Wi-Fi est payant). Le cas échéant, tapez un mot de passe et touchez Rejoindre (les réseaux qui nécessitent un mot de passe présentent une icône repré- sentant un cadenas). Une fois que vous avez rejoint manuellement un réseau Wi-Fi, l’iPod touch s y connecte automatiquement chaque fois que le réseau est à portée. Si plusieurs réseaux déjà utilisés sont à portée, l’iPod touch rejoint le dernier utilisé. Lorsque l’iPod touch est connecté à un réseau Wi-Fi, l’icône Wi-Fi située dans la barre d’état en haut de l’écran affiche l’intensité du signal de connexion. Le nombre de barres qui s’affiche est proportionnel à la qualité de la connexion. Pour plus de renseignements sur la configuration des réglages Wi-Fi, voir la section ªWi-Fi» à la page 95. Recharge de la batterie. L’iPod touch est doté d’une batterie interne rechargeable. AVERTISSEMENT : Des renseignements importants sur la recharge de votre iPod touch sont disponibles dans le Guide des informations importantes sur le produit à la page www.apple.com/ca/fr/support/manuals/ipodtouch. Recharge de la batterie et synchronistion de l’iPod touch: Connectez l’iPod touch à votre ordinateur à l’aide du câble USB inclus, 28 Chapitre 2 Notions élémentairesChapitre 2 Notions élémentaires 29 Important : Si l’iPod touch est connecté à un ordinateur éteint, en mode de veille ou en mode de suspension d’activité, il est possible que la batterie de l’iPod touch se décharge. Une icône située dans le coin supérieur droit de l’écran indique l’état de charge de la batterie. En charge Rechargé Si vous chargez la batterie pendant qu’une synchronisation est en cours ou tout en utilisant l’iPod touch, l’opération peut prendre plus de temps . Vous pouvez aussi recharger l’iPod touch à l’aide de adaptateur secteur USB Apple, vendu séparément. Important : Si le niveau de la batterie de l’iPod touch est très faible, une des image suivantes peut s’afficher afin d’indiquer que l’iPod touch à besoin d’être rechargé dix minutes avant que vous puissiez l’utiliser. Au cas où l’alimentation de l’iPod touch est extrêmement faible, il se peut que l’écran reste éteint pendant un temps pouvant s’étendre jusqu’à deux minutes avant que l’une des images de faible charge apparaisse. ou Le nombre de cycles de recharge des batteries rechargeables reste limité et il peut s’avérer nécessaire de les remplacer. La batterie de l’iPod touch n’est pas remplaçable par l’utilisateur, elle ne peut l’être que par un prestataire de service agréé. Pour plus de renseignements, consultez la page www.apple.com/ca/fr/batteries.Entretien de l’iPod touch Pour nettoyer l’iPod touch, débranchez tous les câbles et éteignez l’iPod touch (appuyez sur le bouton Veille/Activation, maintenez-le enfoncé,puis faites glisser le curseur à l’écran). Utilisez un tissu doux, légèrement humide et sans peluche. Évitez que toute humidité pénètre dans les orifices de l’appareil. N’utilisez pas de produit lavevitre, détergent domestique, aérosol, solvant, alcool, ammoniac ou produit abrasif pour nettoyer l'iPod touch. Redémarrage et réinitialisation de l’iPod touch En cas de dysfonctionnement, le redémarrage ou la réinitialisation de l’iPod touch devrait résoudre le problème. Redémarrage de l’iPod touch : Maintenez le bouton de Marche/Veille enfoncé jusqu’à l’apparition du curseur rouge. Faites glisser votre doigt sur le curserur pour éteindre l’iPod touch. Pour rallumer l’iPod touch, appuyez sur le bouton de Marche/Veille jusqu’à l’apparition du logo Apple. Réinitialisation de l’iPod touch. Maintenez simultanément enfoncés les boutons de Marche/Veille et du menu principal pendant au moins dix secondes jusqu’à l’apparition du logo Apple. Pour plus de suggestions de dépannage, consultez la section L’annexeªDépannage,» à la page 111. 30 Chapitre 2 Notions élémentaires31 L’iPod touch synchronise avec iTunes sur votre ordinateur pour obtenir des morceaux, vidéos et autres contenus que vous avez rassemblés dans votre bibliothèque iTunes. Pour plus de renseignements sur l’ajout de musique et d’autres éléments multimédias à votre bibliothèque iTunes, ouvrez iTunes et choisissez Aide > Aide iTunes. Obtention de musique, vidéo, etc. Pour obtenir de la musique, des vidéos et des podcasts sur votre iPod touch, vous pouvez configurer iTunes sur votre ordinateur de manière à synchroniser le contenu de votre bibliothèque, ou gérer manuellement les éléments multimédias que vous placez sur votre iPod touch. Synchronisation de contenu à partir d’iTunes Vous pouvez obtenir de la musique, de la vidéo et d’autres contenus sur votre iPod touch en synchronisant le contenu à partir d’iTunes. Vous pouvez synchroniser tous vos éléments multimédias ou sélectionner certains morceaux, vidéos et podcasts. Configuration d’iTunes de manière à synchroniser le contenu iPod : 1 Connectez l’iPod touch à votre ordinateur. 2 Dans iTunes, sélectionnez iPod touch dans la barre latérale. 3 Dans les onglets Musique, Films, Émissions TV et Podcasts, sélectionnez le contenu que vous souhaitez transférer sur votre iPod touch. Par exemple, vous pouvez synchroniser certaines listes de lecture de musique et les trois épisodes les plus récents de votre podcast vidéo préféré. 4 Cliquez sur Appliquer. Seuls les morceaux et les vidéos codés dans des formats gérés par l’iPod touch sont transférés sur l’iPod touch. Pour plus de renseignements sur les formats gérés par l’iPod touch, consultez la section ªUn morceau, une vidéo ou autre ne fonctionne pas» à la page 115. 3 Musique et vidéoSi la bibliothèque iTunes contient plus morceaux que ne peut en stocker votre iPod touch, iTunes propose de créer une liste de lecture spéciale pour synchroniser avec l’iPod touch. iTunes remplit la liste de lecture à partir d’une sélection de votre bibliothèque. Vous pouvez ajouter ou supprimer des morceaux à la liste de lecture et synchroniser à nouveau. Si vous écoutez une partie d’un podcast ou d’un livre audio, l’endroit où vous vous êtes arrêté est inclus lors de la synchronisation du contenu avec iTunes. Si vous avez commencé l’écoute sur l’iPod touch, vous pouvez reprendre où vous vous êtes arrêté en utilisant iTunes sur votre ordinateur, et inversement. Pour plus de renseignements sur l’utilisation d’iTunes pour obtenir de la musique et d’autres éléments multimédias sur votre ordinateur, consultez la section ªÉléments né- cessaires» à la page 5. Gestion manuelle du contenu La fonction de gestion manuelle vous permet de choisir seulement la musique, les vidéos et les podcasts que vous souhaitez avoir sur votre iPod touch. Configuration de l’iPod touch pour la gestion manuelle de contenu : 1 Connectez l’iPod touch à votre ordinateur. 2 Dans iTunes, sélectionnez iPod touch dans la barre latérale. 3 Cliquez sur l’onglet Résumé et sélectionnez « Gérer manuellement la musique et les clips vidéo ». 4 Cliquez sur Appliquer. Ajout d’éléments à l’iPod touch : Faites glisser un morceau, une vidéo, un podcast ou une liste de lecture de votre bibliothèque vers iPod touch (dans la barre latérale). Cliquez en maintenant la touche Maj ou Commande enfoncée pour sélectionner plusieurs éléments à ajouter simultanément. iTunes synchronise immédiatement le contenu. Si vous désélectionnez l’option « Gérer manuellement la musique et les clips vidéo », le contenu que vous avez ajouté manuellement est supprimé de l’iPod touch la prochaine fois qu’iTunes synchronise le contenu. Suppression d’éléments de l’iPod touch : Connectez l’iPod touch à votre ordinateur puis sélectionnez l’icône iPod touch dans la barre latérale d’iTunes. Cliquez sur le triangle d’expansion situé à gauche de l’icône pour afficher le contenu. Sélectionnez une zone de contenu, par exemple Musique ou Films, puis sélectionnez les éléments que vous souhaitez supprimer et appuyez sur la touche Suppr du clavier. La suppression d’un élément de l’iPod touch ne supprime pas l’élément de votre bibliothèque iTunes. 32 Chapitre 3 Musique et vidéoChapitre 3 Musique et vidéo 33 Important : Si vous supprimez un élément d’iTunes, il sera également supprimé de l’iPod touch à la prochaine synchronisation. Transfert de contenu acheté à partir d’un autre ordinateur Vous pouvez transférer du contenu présent sur l’iPod touch, qui a été acheté à l’aide d’iTunes sur un ordinateur d’une bibliothèque iTunes vers un autre ordinateur autorisé. L’ordinateur doit être autorisé à lire du contenu à partir de votre compte iTunes. Pour autoriser l’ordinateur, ouvrez iTunes sur l’ordinateur et choisissez Store > Autoriser l’ordinateur. Transfert de contenu acheté : Connectez l’iPod touch à l’autre ordinateur. iTunes vous demande si vous souhaitez transférer le contenu acheté. Conversion de vidéos pour l’iPod touch Vous pouvez ajouter des vidéos autres que celles que vous avez achetées auprès de l’iTunes Store sur votre iPod touch, par exemple des vidéos que vous avez créées dans iMovie sur un Mac ou des vidéos que vous avez téléchargées sur Internet puis ajoutées à iTunes. Si vous essayez d’ajouter une vidéo sur l’iPod touch à partir d’iTunes et qu’un message indique que la vidéo ne peut pas être lue sur l’iPod touch, vous pouvez la convertir. Conversion d’une vidéo pour qu’elle fonctionne avec l’iPod touch: Sélectionnez la vidéo dans votre bibliothèque iTunes et choisissez Avancé > « Convertir la sélection pour l’iPod/iPhone ». Ajoutez ensuite la vidéo convertie à l’iPod touch. Musique et autres audios L’affichage Multi-Touch haute résolution fait de l’écoute de morceaux sur l’iPod touch une expérience tout aussi visuelle que musicale. Vous pouvez faire défiler vos listes de lecture ou utiliser Cover Flow pour explorer les pochettes de vos albums. AVERTISSEMENT : Des renseignements importants sur la prévention de la perte d'audition sont disponibles dans le Guide des informations importantes sur le produit à la page www.apple.com/ca/fr/support/manuals/ipodtouch. Lecture de morceaux Exploration de votre collection : Touchez Listes de lecture, Artistes ou Morceaux. Touchez Plus pour explorer les albums, les livres audio, les compilations, les compositeurs, les genres ou les podcasts. Lecture d’un morceau : Touchez le morceau.Contrôle de la lecture de morceaux Lorsque vous écoutez un morceau, l’écran À l’écoute apparaît. Suivant/Avance rapide Lecture/Pause Retour Liste des pistes Précédent/Retour rapide Volume Mettre en pause un morceau Touchez ou cliquez sur le bouton du micro du casque d’écoute de l’iPod touch. Reprendre la lecture Touchez ou cliquez sur le bouton du micro du casque d’écoute de l’iPod touch. Augmenter ou diminuer le volume Faites glisser le curseur de volume ou utilisez les boutons latéraux de l’iPod touch. Redémarrer un morceau ou un chapitre de livre audio ou de podcast Touchez . Passer au morceau ou chapitre de livre audio ou de podcast précédent ou suivant Touchez deux fois pour passer au morceau précédent. Touchez pour passer au morceau suivant ou appuyez deux fois rapidement sur le bouton du micro du casque d’écoute de l’iPod touch. Effectuer un retour ou une avance rapide Touchez ou et gardez le doigt dessus. Plus vous maintenez le doigt longtemps sur la commande, plus l’opération de retour ou d’avance rapide s’accélère. Retour aux listes de navigation de l’iPod Touchez ou balayez vers la droite par dessus la couverture de l’album. Retour à l’écran À l’écoute Touchez À l’écoute. Afficher les paroles d’un morceau Touchez la couverture de l’album pendant la lecture du morceau. (les paroles n’apparaissent que si vous les avez ajoutées au morceau à l’aide de la fenêtre Infos du morceau dans iTunes.) 34 Chapitre 3 Musique et vidéoChapitre 3 Musique et vidéo 35 Vous pouvez afficher les commandes de lecture à tout moment lorsque vous écoutez de la musique et utilisez une autre application, ou même lorsque l’iPod touch est verrouillé, en double-cliquant le bouton principal . Si vous utilisez une application, les commandes de lecture apparaissent par-dessus l’application. Après avoir utilisé les commandes, vous pouvez les fermer ou toucher Musique pour passer à l’écran À l’écoute. Si l’iPod touch est verrouillé, les commandes apparaissent à l’écran puis disparaissent automatiquement lorsque vous avez fini de les utiliser. Commandes supplémentaires À partir de l’écran À l’écoute, touchez la pochette de l’album. Le commandes de répétition et de lecture aléatoire apparaissent, ainsi que le défileur, le temps écoulé, le temps restant et le numéro du morceau. Les paroles du morceau apparaissent également si vous les avez ajoutées au morceau dans iTunes. Défileur Répétition Aléatoire Tête de lectureRégler l’iPod touch pour la répétition de morceaux Touchez . Touchez à nouveau pour régler l’iPod touch de manière à répéter seulement le morceau actuel. = l’iPod touch est réglé de manière à répéter tous les morceaux de l’album ou la liste en cours. = l’iPod touch est réglé de manière à répéter sans arrêt le morceau en cours de lecture. = l’iPod touch n’est pas réglé pour répéter les morceaux. Passer à n’importe quel endroit d’un morceau Faites glisser la tête de lecture le long du défileur. Régler l’iPod touch pour le choix aléatoire de morceaux Touchez . Touchez à nouveau pour régler l’iPod touch de manière à jouer les morceaux dans l’ordre. = l’iPod touch est réglé de manière à choisir aléatoirement les morceaux. = l’iPod touch est réglé de manière à lire les morceaux dans l’ordre. Choisir aléatoirement les pistes d’une liste de lecture, d’un album ou de toute autre liste de morceaux Touchez Aléatoire en haut de la liste. Par exemple, pour jouer les morceaux dans un ordre aléatoire sur l’iPod touch, choisissez Morceaux > Aléatoire. Que l’iPod touch soit ou non réglé sur la lecture aléatoire, si vous touchez Aléatoire en haut d’une liste des morceaux, l’iPod touch la lit dans un ordre aléatoire. Exploration des pochettes d’album en mode Cover Flow Lorsque vous explorez votre musique, vous pouvez faire pivoter l’iPod touch d’un quart de tour pour afficher votre contenu iTunes en mode Cover Flow et explorer votre musique par pochette d’album. 36 Chapitre 3 Musique et vidéoChapitre 3 Musique et vidéo 37 Affichage du contenu dans Cover Flow Faites pivoter l’iPod touch d’un quart de tour. Parcourir les pochettes d’album Faites glisser ou « feuilletez » vers la gauche ou la droite. Affichage des pistes d’un album Touchez une pochette ou . Lire une piste Touchez la piste. Faites défiler vers le haut ou le bas pour faire défiler les pistes. Revenir à la pochette Touchez la barre de titre ou touchez à nouveau. Lire ou mettre en pause le morceau actuel Touchez ou . Si vous utilisez le casque stéréo inclus, appuyez sur le bouton du microphone. Affichage de toutes les pistes d’un album Affichage de toutes les pistes de l’album contenant le morceau à l’écoute : À partir de l’écran À l’écoute, touchez . Touchez une piste pour la lire. Touchez la vignette de la pochette de l’album pour revenir à l’écran À l’écoute. Barre de classement Retour à l’écran « À l’écoute » Pistes de l’album En affichage de la liste des pistes, vous pouvez affecter des notes aux morceaux. Vous pouvez utiliser des notes pour créer dans iTunes des listes de lecture intelligentes qui se mettent dynamiquement à jour pour inclure par exemple vos morceaux les mieux notés. Affectation d’une note à un morceau : Faites glisser votre pouce sur la barre de classements pour donner au morceau entre zéro et cinq étoiles. Création de listes de lecture directement sur l’iPod touch Création d’une liste de lecture On-The-Go : 1 Touchez Listes de lect. et touchez On-The-Go.2 Recherchez des morceaux à l’aide des boutons situés au bas de l’écran. Touchez un morceau ou une vidéo pour l’ajouter à la liste de lecture. Touchez Tous les morceaux en haut de toute liste de morceaux pour ajouter tous les morceaux de la liste. 3 Lorsque vous avez fini, touchez Terminé. Lorsque vous créez une liste de lecture On-The-Go puis synchronisez l’iPod touch à votre ordinateur, la liste de lecture est enregistrée sur l’iPod touch dans votre bibliothèque iTunes puis supprimée de l’iPod touch. La première est enregistrée sous le nom « On-The-Go 1 », la deuxième sous « On-The-Go 2 » et ainsi de suite. Pour remettre une liste de lecture sur l’iPod touch, sélectionnez l’iPod touch dans la barre latérale d’iTunes, cliquez sur l’onglet Musique et réglez la liste de lecture pour qu’elle se synchronise. Modification d’une liste de lecture On-The-Go :Touchez Listes de lect., On-The-Go et Modifier, puis effectuez l’une des actions suivantes :  Pour déplacer un morceau vers le haut ou vers le bas dans la liste, faites glisser à côté du morceau.  Pour supprimer un morceau de la liste de lecture, touchez à côté du morceau en question puis touchez Supprimer.Lorsque vous supprimez un morceau d’une liste de lecture On-The-Go, il n’est pas supprimé de l’iPod touch.  Pour effacer toute la liste de lecture, touchez Effacer la liste de lecture.  Pour ajouter plus de morceaux, touchez . Vidéos L’iPod touch vous permet de visionner du contenu vidéo comme des films, des clips et des podcasts. Si une vidéo contient des chapitres, vous pouvez passer au chapitre suivant ou précédent ou activer une liste pour lancer la lecture à partir du chapitre de votre choix. Si une vidéo propose plusieurs langues, vous pouvez choisir celle de l’audio ou celle du sous-titrage. Lecture de vidéos Lecture de vidéo : Touchez Vidéos puis la vidéo en question. Affichage des commandes de lecture : Touchez l’écran pour afficher les commandes. Touchez à nouveau pour les masquer. 38 Chapitre 3 Musique et vidéoChapitre 3 Musique et vidéo 39 Dès qu’une partie suffisante de la vidéo s’est téléchargée, la lecture commence. Les vidéos sont lues en mode Écran large pour profiter au mieux de l’affichage. Échelle Lecture/Pause Redémarrer/ Avance rapide Retour rapide Tête de lecture Volume Défileur Run de Gnarls Barkley est disponible sur iTunes dans les pays sélectionnés. Lire ou mettre en pause une vidéo Touchez ou . Augmenter ou diminuer le volume Faites glisser le curseur de volume. Redémarrer une vidéo Faites glisser complètement sur la gauche la tête de lecture sur le défileur, ou touchez si la vidéo n’inclut pas de chapitres. Passage au chapitre précédent ou suivant (le cas échéant) Touchez pour revenir au chapitre précédent. Touchez pour passer au chapitre suivant. Lecture d’un chapitre donné (le cas échéant) Touchez , puis choisissez un chapitre dans la liste. Effectuer un retour ou une avance rapide Touchez ou et gardez le doigt dessus. Passer directement à un point particulier d’une vidéo Faites glisser la tête de lecture le long du défileur. Interrompre une vidéo avant sa fin Touchez Terminé ou appuyez sur le bouton principal .Redimensionner une vidéo de manière à remplir l’écran ou à s’adapter à l’écran Touchez pour que la vidéo remplisse l’écran. Touchez pour qu’elle s’adapte à la taille de l’écran. Vous pouvez également double-toucher la vidéo pour qu’elle remplisse l’écran ou pour qu’elle s’y adapte. Lorsque vous redimensionnez une vidéo de manière à remplir l’écran, il est possible que les côtés ou la partie supérieure soient éliminés de l’affichage. Lorsque vous la redimensionnez de manière à l’adapter à l’écran, il est possible que des barres noires apparaissent en dessous, audessus ou sur les côtés de la vidéo. Sélection d’une autre langue audio (le cas échéant) Touchez , puis choisissez une langue dans la liste Audio. Affichage ou masquage des sous-titres (le cas échéant) Touchez , puis choisissez une langue ou l’option Désactivé dans la liste Sous-titrage. Visionnage de films loués Il vous est possible de louer des films depuis l’iTunes Store pour les visionner sur l’iPod touch. iTunes vous permet de les louer et de les transférer directement sur votre iPod touch. (La location de film n’est pas disponible partout. iTunes version 7.6 ou ulté- rieure, et QuickTime version 7.4.5 ou ultérieure sont requis.) Les films loués ne sont visionnables que pour un temps limité. Le temps qui vous reste pour finir de regarder un film en location apparaît à côté de son titre. Les films sont ensuite automatiquement supprimés à leur expiration. Consultez l’iTunes Store pour connaître les délais d’expiration avant de louer un film. Transfert de films loués sur l’iPod touch: Connectez l’iPod touch à votre ordinateur. Sélectionnez ensuite iPod touch dans la barre latérale d’iTunes, cliquez sur Films, et sélectionnez les films loués que vous souhaitez transférer. Assurez-vous que votre ordinateur est connecté à Internet. Visionnage d’un film loué : Choisissez Vidéos puis sélectionnez un film. 40 Chapitre 3 Musique et vidéoChapitre 3 Musique et vidéo 41 Visionnage de vidéos sur un téléviseur Vous pouvez connecter l’iPod touch à votre téléviseur et regarder vos vidéos sur un écran de plus grande dimension. Utilisez le câble AV Composant Apple, AV Composite Apple, ou tout autre câble compatible iPod touch autorisé. Vous pouvez également utiliser ces câbles avec la station d’accueil Apple Universal Dock pour connecter l’iPod touch à votre téléviseur (La station d’accueil Apple Universal Dock est fournie avec une télécommande qui vous permet de commander la lecture à distance.) Les câbles et stations d’accueil Apple sont disponibles à la vente séparément à la page www.apple.com/ca/fr/ipodstore. Suppression de vidéos à partir de l’iPod touch Vous pouvez supprimer de vidéos de l’iPod touch pour économiser de l’espace. Suppression de vidéo : Dans les listes vidéo, balayez vers la gauche ou la droite sur la vidéo puis touchez Supprimer. Lorsque vous supprimez une vidéo (autre qu’un film loué) à partir de l’iPod touch, elle n’est pas supprimée de votre bibliothèque iTunes et vous pouvez la synchroniser à nouveau vers votre iPod touch ultérieurement. Si vous ne souhaitez pas synchroniser à nouveau la vidéo sur l’iPod touch, configurez iTunes de manière à ne plus le faire. Voir la section ªÉléments nécessaires» à la page 5. Important : Si vous supprimez un film en location depuis l’iPod touch, il est supprimé définitivement et ne peut pas être transféré à nouveau vers votre ordinateur. Réglage d’une minuterie de veille Vous pouvez régler l’iPod touch de manière à interrompre la lecture de musique ou de vidéos après un certain temps. Réglage d’une minuterie de veille : Dans l’écran d’accueil, choisissez Horloge > Minuteur, puis feuilletez pour régler le nombre d’heures et de minutes. Touchez À expiration et choisissez Mettre l’iPod en veille, touchez Choisir puis touchez Démarrer pour lancer la minuterie. À l’expiration de la minuterie, l’iPod touch interrompt la lecture de la musique ou de la vidéo, ferme les éventuelles applications ouvertes et se verrouille.Modification des boutons de navigation Vous pouvez remplacer les boutons Listes de lecture, Artiste, Morceaux ou Vidéos situés au bas de l’écran par d’autres que vous utilisez plus fréquemment. Par exemple, si vous écoutez souvent des podcasts et ne regardez pas beaucoup de vidéos, vous pouvez remplacer le bouton Vidéos par le bouton Podcasts. Modification des boutons de navigation : Touchez Plus puis Modifier, puis faites glisser un bouton vers le bas de l’écran, par-dessus celui que vous souhaitez remplacer. Vous pouvez faire glisser vers la gauche ou la droite les boutons situés au bas de l’écran afin de les réarranger. Touchez Terminé lorsque vous avez fini. Touchez Plus à tout moment pour accéder aux boutons que vous avez remplacés. 42 Chapitre 3 Musique et vidéo43 L'iPod touch vous permet de toujours transporter vos photos avec vous de manière à les partager avec vos proches et vos collègues. Synchronisation de photos avec votre ordinateur iTunes peut synchroniser vos photos avec les applications suivantes :  Mac : iPhoto 4.0.3 ou ultérieur, ou Aperture  PC : Adobe Photoshop Album 2.0 ou ultérieur, ou Adobe Photoshop Elements 3.0 ou ultérieur ªÉléments nécessaires» à la page 5 Voir la section “Éléments nécessaires”. Visionnage de photos Vous pouvez visionner dans Photos les photos synchronisées à partir de votre ordinateur. Visualisation de photos : 1 Dans Photos:  Touchez Photothèque pour visualiser toutes vos photos.  Touchez un album pour visualiser uniquement ces photos. 2 Touchez une vignette pour afficher la photo en plein écran. 4 PhotosAfficher ou masquer les commandes : Touchez la photo en plein écran pour afficher les commandes. Touchez à nouveau pour les masquer. Affichage d’une photo en mode paysage : Faites pivoter l’iPod touch d’un quart de tour. La photo se réoriente automatiquement et couvre tout l’écran si elle est en format Paysage. Zoom avant sur une partie d’une photo : Double-touchez l’endroit sur lequel vous souhaitez zoomer. Double-touchez à nouveau pour effectuer un zoom arrière Vous pouvez également pincer l’image pour l’agrandir ou écarter les doigts pour la réduire. Exploration d’une photo: Faites glisser la photo. 44 Chapitre 4 PhotosChapitre 4 Photos 45 Affichage de la photo précédente ou suivante : Feuilletez vers la gauche ou la droite Touchez l’écran pour afficher les commandes puis ou . Diaporamas Vous pouvez visualiser vos photos dans un diaporama, accompagné d’une musique de fond. Affichage de photos dans un diaporama : Choisissez un album photo, puis touchez . Vous pouvez également toucher pour démarrer un diaporama lorsque vous visualisez une photo individuelle. Si vous ne voyez pas , touchez la photo pour afficher les commandes. Arrêt d’un diaporama : Touchez l’écran. Réglage d’un diaporama : Dans Réglages, choisissez Photos puis réglez les options suivantes :  Pour définir la durée d’apparition de chaque diapositive, touchez Afficher chaque photo pendant puis choisissez une durée.  Pour définir des effets de transition lors du passage d’une photo à la suivante, touchez Transition puis choisissez un type de transition.  Pour définir la répétition des diaporamas, activez ou désactivez Répéter.  Pour définir l’affichage aléatoire des photos, activez ou désactivez Aléatoire. Écoute de musique pendant un diaporama : Dans iPod, jouez un morceau puis choisissez Photos dans l’écran d’accueil et démarrez un diaporama.Fond d’écran Une photo apparaît en tant que fond d’écran lorsque vous déverrouillez votre iPod touch. Choix d’une photo comme fond d’écran : 1 Choisissez une photo, touchez , puis touchez Utiliser en fond d’écran. 2 Faites glisser la photo pour la déplacer, pincez-la pour la réduire ou écartez les doigts pour l’agrandir, jusqu’à ce qu’elle prenne les dimensions souhaitées. 3 Touchez Valider. Vous pouvez également choisir parmi plusieurs images de fond d’écran incluses sur l’iPod touch en choisissant Réglages > Fond d’écran >Fond d’écran à partir de l’écran d’accueil. Enregistrement d’images à partir d’un message électronique ou d’une page web Vous pouvez ajouter à votre photothèque des images jointes à un message électronique ou à une page web. Ajout de photo à votre photothèque : Maintenez votre doigt sur la photo puis touchez Enregistrer l’image. L’image est ajoutée à votre album Photothèque. Vous pouvez télécharger les images de votre dans l’application photo de votre ordinateur en connectant votre iPod touch à votre ordinateur. Envoi d’une photo par courrier électronique Envoi d’une photo par courrier électronique : Choisissez une photo, touchez , puis Envoyer par courrier. L'iPod touch doit être configuré pour le courrier électronique. Voir ªOrganisation du courrier électronique» à la page 74. Envoi de photo à une Galerie MobileMe Si vous avez un compte MobileMe, vous pouvez directement envoyer des photos de votre iPod touch vers une galerie que vous avez créée. Vous pouvez également envoyer les photos vers la galerie MobileMe d’une autre personne si celle-ci a activé les contributions par courrier électronique. Avant de pouvoir envoyer des photos à une galerie, vous devez :  configurer votre compte MobileMe sur l’iPod touch 46 Chapitre 4 PhotosChapitre 4 Photos 47  publier une galerie MobileMe et autoriser le téléchargement par courrier électronique Pour plus d’informations sur la création de galeries, consultez l’Aide MobileMe. Envoi de photo à votre galerie : Choisissez une photo et touchez , puis touchez Envoyer à la Galerie. Attribution d’une photo à un contact Vous avez la possibilité d’attribuer une photo à un contact. Attribution d’une photo à un contact : 1 Choisir une photo enregistrée sur iPod touch et toucher . 2 Touchez « Assigner à un contact » puis désignez le contact. 3 Positionnez et redimensionnez la photo jusqu’à ce qu’elle ait l’aspect souhaité. Faites glisser la photo pour la déplacer, pincez les doigts pour l’agrandir et écartez-les pour la réduire. 4 Touchez Valider. Vous pouvez également affecter une photo à un contact dans Contacts en touchant Modifier, puis en touchant l’icône d’image.48 iTunes Wi-Fi Music Store Vous pouvez effectuer des recherches dans le catalogue musical de l’iTunes Wi-Fi Music Store ou parcourir, écouter des extraits, acheter et télécharger des morceaux et des albums, le tout directement de l’iPod touch. Le contenu acheté est automatiquement copié dans votre bibliothèque iTunes dès que vous synchronisez l’iPod touch avec votre ordinateur. Pour pouvoir utiliser l’iTunes Wi-Fi Music Store, vous devez accéder à un réseau Wi-Fi connecté à Internet à l’aide de votre iPod touch. Pour plus de renseignements sur la connexion à un réseau Wi-Fi, consultez la section ªConnexion à Internet» à la page 28. Vous aurez également besoin d’un compte iTunes Store pour acheter des morceaux en mode Wi-Fi (l’iTunes Wi-Fi Music Store est seulement disponibles dans certains pays). Si vous ne disposez encore pas d’un compte iTunes Store, ouvrez iTunes sur votre ordinateur et choisissez Store > Compte pour en configurer un. Remarque : Vous ne pouvez pas accéder à l’iTunes Wi-Fi Music Store par le biais d’un réseau de données cellulaire. Si vous tentez d’accéder à l’iTunes Wi-Fi Music Store sans vous connecter à un réseau Wi-Fi, un message d’erreur s’affiche. Recherche de morceaux et d’albums Parcourez les sélections pour voir les nouveautés et les recommandations de l’iTunes Wi-Fi Music Store. Parcourez les classements pour voir les morceaux et albums les plus vendus dans plusieurs catégories. Si vous recherchez un morceau, un album ou un artiste donné, utilisez le champ Recherche>. 5 iTunes StoresChapitre 5 iTunes Stores 49 Exploration de morceaux et albums recommandés : Touchez Sélection et sélectionnez une catégorie en haut de l’écran. Exploration des classements de morceaux et albums : Touchez Classements, choisissez une catégorie, puis touchez Classement morceaux ou Classement albums.Recherche de morceaux et albums : Touchez Recherche, le champ de recherche, saisissez un ou plusieurs mots, puis touchez Rechercher. Affichage des morceaux d’un album Touchez l’album. Affichage de l’album contenant un morceau : Double-touchez le morceau. Parcours des sélections Starbucks Si vous vous connectez à un réseau Wi-Fi Starbucks dans certains emplacements Starbucks (aux États-Unis seulement), l’icône Starbucks apparaît au bas de l’écran à côté de Sélection. Touchez l’icône Starbucks pour connaître le morceau diffusé dans le café et pour parcourir les collections Starbucks de titres recommandés. Une liste des emplacements Starbucks désignés se trouve à la page www.apple.com/itunes/starbucks. 50 Chapitre 5 iTunes StoresChapitre 5 iTunes Stores 51 Découverte du morceau à l’écoute : Touchez Starbucks. Le morceau en cours de lecture apparaît en haut de l’écran. Touchez le morceau pour accéder à l’album qui le contient et retrouver les autres morceaux de l’album. Affihage des Morceaux récents et d’autres listes de lectures Starbucks : Touchez Starbucks, puis choisissez Morceaux récents l’une des listes de lecture Starbucks. Achat de morceaux et d’albums Lorsque vous trouvez un morceau ou un album qui vous plaît dans l’iTunes Wi-Fi Music Store, vous pouvez l’acheter et le télécharger sur l’iPod touch. Il vous est possible d’écouter un extrait du morceau avant de l’acheter pour vous assurer qu’il s’agit bien d’un morceau que vous voulez. Dans les emplacements Starbucks désignés (disponible seulement aux États-Unis), vous pouvez également écouter un extrait du morceau diffusé, et l’acheter le cas échéant, ainsi que d’autres morceaux des collections Starbucks de titres recommandés. Écoute d’un extrait de morceau : Touchez le morceau. Achat et téléchargement d’un morceau ou album : 1 Touchez le prix, puis l’option Acheter. Si vous aviez ouvert une session sur votre compte iTunes Store dans iTunes la dernière fois que vous avez synchronisé votre iPod touch, vous n’avez pas besoin de saisir à nouveau votre identifiant de compte. Dans le cas contraire, il vous est demandé de saisir votre identifiant. 2 Saisissez votre mot de passe, puis touchez OK. Votre achat est débité de votre compte iTunes Store. Pour tout achat supplémentaire effectué dans un délai de quinze minutes, le mot de passe ne vous est pas redemandé.Un avertissement s'affiche si vous avez déjà acheté un ou plusieurs morceaux d’un album. Touchez Acheter si vous voulez acheter l’intégralité de l’album, y compris les morceaux déjà acquis, ou touchez Annuler si vous voulez acheter seulement des morceaux précis parmi ceux restants. Certains albums prévoient du contenu en bonus, téléchargé dans la bibliothèque iTunes de votre ordinateur. Tout ces bonus ne sont pas transférés directement sur votre iPod touch. Affichage du statut des morceaux et albums téléchargés : Touchez Téléchargés. Pour interrompre un téléchargement, touchez . Si vous avez besoin d’éteindre votre iPod touch ou de quitter la zone de votre connexion Wi-Fi, vous pouvez interrompre le téléchargement sans inquiétude. L’iPod touch redémarre le téléchargement lorsque l’iPod touch accède à un réseau WiFi connecté à Internet. Sinon, si vous ouvrez iTunes sur votre ordinateur, l’application termine alors le téléchargement sur votre bibliothèque iTunes. Les morceaux achetés s’ajoutent à une liste de lecture intitulée Achats sur l’iPod touch. Si vous supprimez cette liste, iTunes en crée une nouvelle lorsque vous achetez un article auprès de l’iTunes Wi-Fi Music Store. App Store Vous pouvez directement rechercher, explorer, acheter et télécharger des applications à partir de l’App Store sur votre iPod touch, ainsi que rédiger des avis. Vous pouvez également installer les applications que vous avez achetées ou téléchargées par le biais d’iTunes sur votre ordinateur lors de votre dernière synchronisation de l’iPod touch. Les applications que vous téléchargez et installez à partir de l’App Store sur votre iPod touch sont sauvegardées dans votre bibliothèque iTunes la prochaine fois que vous synchronisez votre iPod touch avec votre ordinateur. Pour utiliser l’App Store, l’iPod touch doit être connecté à Internet. Vous aurez également besoin d’un compte iTunes Store (disponible dans de nombreux pays) afin de télécharger des applications. Si vous ne disposez encore pas d’un compte iTunes Store, ouvrez iTunes sur votre ordinateur et choisissez Store > Compte pour en configurer un. Exploration et recherche Explorez les sélections, les nouveautés et les recommandations de l’App Store. Parcourez les 25 applications les plus populaires. Si vous recherchez une application donnée, utilisez Recherche. 52 Chapitre 5 iTunes StoresChapitre 5 iTunes Stores 53 Exploration des applications sélectionnées : Touchez Sélection et sélectionnez une catégorie sélectionnée en haut de l’écran. Exploration par catégorie : Touchez Catégories et sélectionnez une genre pour afficher une liste d’applications.Exploration des 25 applications les plus téléchargées : Touchez Top 25 puis parcourez la liste d’applications. Recherche d’applications : Touchez Recherche, le champ de recherche, saisissez un ou plusieurs mots, puis touchez Rechercher. 54 Chapitre 5 iTunes StoresChapitre 5 iTunes Stores 55 Écran Informations Touchez n’importe quelle application d’une liste pour afficher davantage d’informations, par exemple le prix courant de l’application, les avis rédigés et d’autres informations. Si vous avez déjà installé l’application, la mention « Installée » s’affiche sur l’écran d’informations à la place du prix. Envoi par courrier électronique d’un lien vers une application : À partir de l’écran Infos, touchez Recommander à un ami. Consultation d’avis : Dans l’écran Infos, touchez Avis. Téléchargement d’applications Lorsque vous trouvez une application qui vous plaît dans l’App Store, vous pouvez l’acheter et la télécharger sur votre iPod touch. Si l’application est gratuite, vous pouvez la télécharger sans frais après avoir fourni les informations de votre compte iTunes. Une fois que vous téléchargez une application, elle s’installe immédiatement sur votre iPod touch. Achat et téléchargement d’application : 1 Touchez le prix (ou touchez Gratuit), puis touchez Acheter. Si vous aviez ouvert une session sur votre compte iTunes Store dans iTunes la dernière fois que vous avez synchronisé votre iPod touch, vous n’avez pas besoin de saisir à nouveau votre identifiant de compte. Dans le cas contraire, il vous est demandé de saisir votre identifiant. 2 Saisissez votre mot de passe, puis touchez OK.Les téléchargements d’achats sont débités sur votre compte iTunes Store. Pour tout téléchargement supplémentaire effectué dans un délai de quinze minutes, le mot de passe ne vous est pas redemandé. Consultation du statut du téléchargement d’applications : Une fois que vous avez commencé le téléchargement d’une application, son icône apparaît sur votre écran d’accueil et indique le statut du téléchargement et de l’installation. Si vous avez besoin d’éteindre votre iPod touch ou de quitter la zone de votre connexion réseau, vous pouvez interrompre le téléchargement sans inquiétude. L’iPod touch redémarre le téléchargement lorsque l’iPod touch accède à un réseau connecté à Internet. Suppression d’applications de l’App Store Vous pouvez supprimer des applications que vous avez installées à partir de l’App Store. Si vous supprimez une application, les données associées à l’application ne seront plus à la disposition de l’iPod touch, même si vous réinstallez l’application. Vous pouvez réinstaller à partir de votre bibliothèque iTunes n’importe quelle application et les éventuelles donnée associées à partir du moment où vous avez sauvegardé l’application par synchronisation avec l’ordinateur. Si vous essayez de supprimer une application qui n’a pas été sauvegardée sur votre ordinateur, une alarme apparaît. Suppression d’une application de l’App Store : 1 Touchez l’icône d’une application de l’écran d’accueil et maintenez le doigt dessus jusqu’à ce que les icônes se mettent à bouger. 2 Touchez le « x » situé dans le coin de l’application à supprimer. 3 Touchez Supprimer, puis appuyez sur le bouton principal pour enregistrer votre disposition actuelle. Pour écraser les données associées à une application, utilisez l’option « Effacer contenu et réglages » dans les réglages de l’iPod touch. Consultez la section ªRéinitialisation de l'iPod touch» à la page 102. Rédaction d’avis et signalement de problèmes Vous pouvez rédiger et soumettre vos propres avis sur une application ou signaler directement un problème applicatif sur l’iPod touch. Rédaction d’un avis : 1 Dans l’écran Infos, touchez Avis. 2 Dans l’écran Avis, touchez , puis « Rédiger un avis ». 56 Chapitre 5 iTunes StoresChapitre 5 iTunes Stores 57 3 Sélectionnez le nombre d’étoiles (entre 1 et 5) pour la note que vous donnez à l’application et saisissez le titre de l’avis et des commentaires facultatifs. Si vous avez rédigé des avis par le passé, votre pseudonyme est déjà indiqué. Dans le cas contraire, il vous est demandé de créer un pseudonyme pour votre avis. 4 Touchez Envoyer par courrier. Vous devez avoir ouvert une session sur votre compte iTunes Store pour pouvoir soumettre des avis. Signalement de problème : Dans l’écran Avis, touchez , puis touchez « Signaler un problème ». Sélectionnez un problème dans la liste, ou tapez des commentaires facultatifs et touchez Signaler. Mise à jour d’applications Chaque fois que vous accédez à l’App Store, il recherche des mises à jour éventuelles des applications que vous avez installées. Par défaut, l’App Store recherche également automatiquement des mises à jour chaque semaine. L’icône App Store indique le nombre total de mises à jour d’application disponibles. Si une mise à jour est disponible et que vous accédez à l’App Store, l’écran Mises à jour apparaît immédiatement. Les mises à jour d’application sont gratuites. Elles sont télé- chargées et installée automatiquement lorsque vous choisissez de le faire. Les mises à niveau d’application sont de nouvelles versions qui peuvent être achetées et télé- chargées à partir de l’App Store sur l’iPod touch ou à partir de l’iTunes Store sur votre ordinateur. Mise à jour d’une application : 1 Au bas de l’écran, touchez Mises à jour. 2 Touchez une application pour afficher plus de renseignements sur la mise à jour. 3 Touchez Mettre à jour. Mise à jour de toutes les applications : Au bas de l’écran, touchez Mises à jour puis touchez Tout mettre à jour. Si vous essayez de mettre à jour une application achetée à partir d’un autre compte iTunes Store, l’identifiant et le mot de passe du compte en question vous sont demandés avant le téléchargement de la mise à jour.Synchronisation du contenu acheté iTunes synchronise automatiquement les morceaux, albums et applications que vous avez achetés sur l’iPod touch vers votre bibliothèque iTunes lorsque vous connectez l’iPod touch à votre ordinateur. Ceci vous permet d’écouter sur votre ordinateur les articles que vous avez achetés et offre une sauvegarde si vous supprimez des applications ou du contenu acheté de votre iPod touch. «Les morceaux sont synchronisés dans la liste de lecture « Acheté sur ». iTunes crée la liste de lecture si elle n’existe pas. iTunes copie également vos achats dans la liste de lecture Achats utilisée pour les achats effectués sur votre ordinateur, si cette liste de lecture existe et qu’elle est configurée pour se synchroniser avec l’iPod touch. Les applications sont synchronisées dans la liste Applications de votre bibliothèque iTunes. iTunes crée la liste si elle n’existe pas. Vérification des achats Vous pouvez utiliser iTunes pour vérifier que tous les morceaux, vidéos, applications et autres articles que vous avez achetés auprès de l’iTunes Wi-Fi Music Store ou l’App Store se trouent dans votre bibliothèque iTunes. Il peut s’avérer judicieux de procéder ainsi si un téléchargement s’est interrompu. Vérification de vos achats : 1 Assurez-vous que votre ordinateur est connecté à Internet. 2 Dans iTunes, choisissez Store > Recherchez les achats effectués.. 3 Saisissez l’identifiant de votre compte iTunes Store et son mot de passe, puis cliquez sur Rechercher. Les achats qui ne se trouvent pas encore sur votre ordinateur sont téléchargés. La liste de lecture Achats reprend tous vos achats. Comme vous pouvez ajouter ou supprimer des éléments de la liste, cette dernière peut ne pas être exacte. Pour voir tous vos achats, assurez-vous d’avoir ouvert une session avec votre compte, choisissez Store > Visualiser mon compte, et cliquez sur Historique des achats. 58 Chapitre 5 iTunes StoresChapitre 5 iTunes Stores 59 Mise à jour de votre compte iPod touch récupère vos informations de compte iTunes Store depuis iTunes. Vous pouvez afficher et modifier les informations de votre compte iTunes Store en utilisant iTunes sur votre ordinateur. Affichage et modification des informations de votre compte iTunes Store : Dans iTunes, choisissez Store > Visualiser mon compte. Vous devez avoir ouvert une session sous votre compte iTunes Store. Si l’option « Visualiser mon compte » n’apparaît pas dans le menu Store, choisissez Store > Se connecter. Achat de musique ou d’applications à partir d’un autre compte iTunes Store : Ouvrez une session avec ce compte lorsque vous vous connectez à l’iTunes WiFi Music Store ou que vous achetez ou téléchargez une application de l’App Store.60 Safari Safari vous permet de surfer le web et de consulter des pages web sur l’iPod touch comme si vous utilisiez un ordinateur. Vous pouvez créer des signets sur l’iPod touch et les synchroniser avec votre ordinateur. Ajoutez des Web Clip pour accéder rapidement à vos sites favoris depuis l’écran d’accueil. Visualisation de pages web Vous pouvez afficher les pages web en mode portrait ou paysage. Faites pivoter l’iPod touch : la page web pivote alors et sa taille est ajustée automatiquement. Ouverture de pages web Ouverture d’une page web : Touchez le champ d’adresse puis tapez l’adresse web et touchez Accéder. Si le champ d’adresse n’est pas visible, touchez la barre d’état située en haut de l’écran pour faire rapidement défiler jusqu’au champ d’adresse situé en haut de la page web. 6 Autres applicationsChapitre 6 Autres applications 61 À mesure que vous tapez, les adresses web commençant avec les mêmes lettres apparaissent. Il s’agit de pages enregistrées dans les signets ou de pages que vous avez ouvertes récemment. Touchez une adresse pour accéder à cette page. Continuez à taper si vous souhaitez saisir une adresse web ne faisant pas partie de la liste. Effacement du texte dans le champ d’adresse : Touchez le champ d’adresse, puis touchez . Zoom et défilement Zoom arrière ou avant : Double-touchez une colonne sur une page web pour étendre la colonne. Double-touchez à nouveau pour effectuer un zoom arrière. Vous pouvez également pincer l’image pour l’agrandir ou la réduire manuellement. Défilement d’une page Faites glisser la page vers le haut, le bas ou le côté. Pendant le défilement, vous pouvez toucher et faire glisser n’importe quel endroit de la page sans activer les éventuels liens. Défilement d’une image sur une page web Utilisez deux doigts pour faire défiler une image sur une page web. Utiliser un doigt pour faire défiler la page web entière. Faites rapidement défiler jusqu’au début d’une page web Touchez la barre d’état dans la partie supérieure de l’écran iPod touch. Navigation dans les pages web Généralement, les liens présents dans des pages web vous dirigent vers d’autres sites. Suivi d’un lien sur une page web : Touchez le lien. Les liens sur l’iPod touch peuvent également afficher un emplacement dans Plans ou créer un message électronique préadressé. Pour revenir à Safari après qu’un lien a ouvert une autre application, appuyez sur le bouton du menu principal et touchez Safari.Afficher l’adresse de destination d’un lien Touchez le lien et maintenez votre doigt dessus. L’adresse apparaît à côté de votre doigt. Vous pouvez toucher une image et maintenir votre doigt dessus pour vérifier si elle contient un lien. Interruption du chargement d’une page web. Touchez . Actualisation d’une page web Touchez . Retour à la page précédente ou suivante Touchez ou au bas de l’écran. Retourner à une page visualisée récemment Touchez puis touchez Historique. Pour effacer l’historique, touchez Effacer. Envoi d’une adresse de page web par courrier électronique Touchez puis touchez « Envoyer un lien vers cette page par courrier électronique ». Enregistrement d’une image ou d'une photo sur votre album Pellicule Touchez et maintenez votre doigt sur l’image, puis touchez Enregistrer l’image. Ouverture de plusieurs pages Vous pouvez avoir jusqu’à huit pages ouvertes simultanément. Certains liens ouvrent automatiquement une nouvelle page au lieu de remplacer la page actuelle. Le nombre situé dans l’icône de pages au bas de l’écran indique le nombre de pages ouvertes. Si aucun nombre ne s’affiche, cela signifie qu’une seule page est ouverte. Par exemple : = une page est ouverte = trois pages sont ouvertes Ouverture d’une nouvelle page : Touchez puis touchez Nouvelle page. Accès à une autre page : Touchez et feuilletez vers la droite ou la gauche. Touchez la page que vous souhaitez afficher. 62 Chapitre 6 Autres applicationsChapitre 6 Autres applications 63 Fermeture d’une page : Touchez puis . Il est impossible de fermer une page si c’est la seule ouverte. Saisie de champs de texte Certaines pages web disposent de champs de texte et de formulaires à remplir. Appel du clavier Touchez à l’intérieur d’un champ de texte. Passage à un autre champ de texte Touchez un autre champ de texte ou touchez le bouton Suivant et Précédent. Envoi d’un formulaire Une fois que vous avez fini de remplir un formulaire, touchez Accéder ou Rechercher. Une fois que vous avez fini de remplir les champs de texte sur la page, touchez Accéder ou Rechercher. Fermeture du clavier sans envoyer le formulaire Touchez Terminé Recherche sur le Web Par défaut, Safari utilise Google pour effectuer les recherches. Vous pouvez également utiliser Yahoo! pour effectuer vos recherches. Recherche sur le web : 1 Touchez pour afficher le champ de recherche. 2 Tapez un mot ou une phrase décrivant ce que vous recherchez, puis touchez Google. 3 Touchez un lien dans la liste de résultats pour ouvrir une page web. Réglage de Safari pour utiliser les recherches Yahoo! : À partir de l’écran d’accueil , choisissez Réglages > Safari > Moteur de recherche, puis choisissez Yahoo!. Signets Vous pouvez mettre en signet des pages web que vous souhaitez consulter à nouveau ultérieurement. Mise en signet de page web : Ouvrez la page et touchez Touchez ensuite Ajouter un signet. Lorsque vous enregistrez un signet, vous pouvez modifier son titre. Par défaut, les signets sont enregistrés dans le dossier de plus haut niveau de Signets. Touchez Signets pour choisir un dossier différent. Si vous utilisez Safari sur un Mac, ou Safari ou Microsoft Internet Explorer sur un PC, vous pouvez synchroniser vos signets avec le navigateur web de votre ordinateur. Synchronisation de signets avec votre ordinateur : 1 Connectez l’iPod touch à votre ordinateur. 2 Dans iTunes, sélectionnez iPod touch dans la barre latérale.3 Cliquez sur l’onglet Infos, sélectionnez “Synchronisez les signets ...” sous Navigateur web, puis cliquez sur Appliquer. ªSynchronisation avec iTunes» à la page 6 voir la section “Synchronisation avec iTunes”; Synchronisation de signets avec MobileMe : Dans Réglages sur l’iPod touch, sélectionnez Signets dans votre compte MobileMe.ªConfiguration de comptes.» à la page 11 Voir la section “Configuration de compte”. Ouverture d’une page web mise en signet : Touchez puis choisissez un signet ou touchez un dossier pour voir les signets qui s’y trouvent. Modification d’un signet ou d’un dossier de signets : Touchez , choisissez le dossier qui contient le signet ou le dossier que vous souhaitez modifier, puis touchez Modifier. Touchez , choisissez le dossier qui contient le signet ou le dossier que vous souhaitez modifier, puis touchez Modifier.  Pour créer un nouveau dossier, touchez Nouveau dossier.  Pour supprimer un signet ou un dossier, touchez , puis touchez Supprimer.  Pour repositionner un signet ou un dossier, faites glisser .  Pour en modifier le nom ou l’adresse, ou pour le changer de dossier, touchez le signet ou dossier. Lorsque vous avez terminé, touchez Terminé. Web Clip Ajoutez des Web Clip à l’écran d’accueil pour accélérer l’accès à vos pages web préfé- rées. Les Web Clip apparaissent sous forme d’icônes sur l’écran d’accueil. Vous pouvez les réarranger, ainsi que les autres icônes. Voir ªApplications iPod touch» à la page 17. Ajout d’un Web Clip: Ouvrez la page web et touchez Touchez ensuite « Ajouter à l’écran d’accueil ». Lorsque vous ouvrez un Web Clip, Safari effectue un zoom automatique et défile jusqu’à la zone de la page web affichée lorsque vous avez enregistré le Web Clip. La zone affichée est également utilisée pour créer l’icône pour le Web Clip sur votre écran d’accueil, à moins que la page web intègre sa propre icône. Lorsque vous ajoutez un Web Clip, vous pouvez modifier son nom. Si le nom est trop long (plus de 10 caractères environ), il risque d’apparaître abrégé sur l’écran d’accueil. Les Web Clip ne sont pas des signets et ne sont pas synchronisés par MobileMe ou iTunes. Suppression d’un Web Clip : 1 Touchez n’importe quelle icône de l’écran d’accueil et maintenez le doigt dessus jusqu’à ce que les icônes commencent à bouger. 64 Chapitre 6 Autres applicationsChapitre 6 Autres applications 65 2 Touchez le « x » situé dans l’angle du Web Clip que vous souhaitez supprimer. 3 Touchez Supprimer, puis appuyez sur le bouton principal pour enregistrer votre disposition actuelle. Calendrier Calendrier vous permet de visualiser vos événements dans une liste continue, présentée par jour ou par mois. Synchronisez l’iPod touch avec les calendriers de votre ordinateur. Créez, modifiez ou annulez des rendez-vous sur l’iPod touch et synchronisez-les avec votre ordinateur. Si vous avez un compte Microsoft Exchange, vous pouvez recevoir des invitations à des réunions et y répondre. Synchronisation de calendriers Vous pouvez synchroniser Calendrier d’une des manières suivantes :  Dans iTunes, utilisez les sous-fenêtres de préférences de l’iPod touch pour synchroniser avec iCal ou Microsoft Entourage sur un Mac, ou Microsoft Outlook 2003 ou 2007 sur un PC lorsque vous connectez l’iPod touch à votre ordinateur.ªSynchronisation avec iTunes» à la page 6 voir la section “Synchronisation avec iTunes”;  Dans les Réglages de l’iPod touch, sélectionnez Calendrier dans votre compte MobileMe ou Microsoft Exchange pour synchroniser sans fil les informations de votre calendrier.ªConfiguration de comptes.» à la page 11 Voir la section “Configuration de compte”. Ajout d’événements de calendrier à l’iPod touch Vous pouvez également saisir et modifier des événements de calendrier directement sur l’iPod touch. Ajout d’un événement : Touchez et saisissez les informations sur l’événement, puis touchez Terminé. Vous pouvez saisir les informations suivantes :  Titre  Lieu  Heures de début et de fin (ou activez Sur la journée si l’événement se déroule toute la journée)  Récurrence : aucune, tous les jours, toutes les semaines, toutes les deux semaines, tous les mois ou tous les ans  Alarme : de cinq minutes à deux jours avant l’événementLorsque vous définissez une alarme, l’option pour définir une seconde alarme apparaît. Lorsqu’une alarme se déclenche, l’iPod touch affiche un message. Vous pouvez également régler l’iPod touch de manière qu’il produise un son (voir ci-dessous). Important : Lorsque vous êtes en déplacement, l'iPod touch risque de ne pas vous avertir à la bonne heure locale. Pour régler manuellement l’heure correcte, consultez la section “Date et heure”.ªDate et heure» à la page 101  Notes Pour sélectionner le calendrier auquel ajouter l’événement, touchez Calendrier. Les calendriers en lecture seule n’apparaissent pas dans la liste. Modification d’un événement Touchez l’événement, puis touchez Modifier. Supprimer un événement Touchez l’événement, touchez Modifier, puis faites défiler et touchez Supprimer l’événement. Réponse à des invitations à des réunions Si vous avez configuré un compte Microsoft Exchange sur votre iPod touch avec les calendriers activés, vous pouvez recevoir des invitations à des réunions envoyées par d’autres personnes de votre organisation, et y répondre. Lorsque vous recevez une invitation, la réunion apparaît dans votre calendrier, entourée d’une ligne en pointillés. L’icône située dans l’angle inférieur droit de l’écran et l’icône Calendrier de l’écran d’accueil indiquent chacune le nombre total de nouvelles invitations que vous avez reçues. Nombre d’invitations à des réunions 66 Chapitre 6 Autres applicationsChapitre 6 Autres applications 67 Réponse à une invitation dans Calendrier : 1 Touchez dans le calendrier une invitation à une réunion, ou touchez pour afficher l’écran Événement et touchez une invitation.  Touchez "Invitation de” pour obtenir les coordonnées de l’organisateur de la réunion. Touchez l’adresse électronique pour envoyer un message à l’organisateur.  Touchez Participants pour afficher les autres personnes invitées à la réunion. Touchez un nom pour afficher les coordonnées du participant. Touchez l’adresse électronique pour envoyer un message au participant.  Touchez Alarme pour régler l’iPod touch de manière à produire une alarme sonore avant la réunion.  Touchez Annoter pour ajouter des commentaires au message électronique de ré- ponse envoyé à l’organisateur de la réunion. Vos commentaires apparaîtront également dans l’écran d’information de la réunion. Les remarques sont ajoutées par l’organisateur de la réunion. 2 Touchez Accepter, Peut-être ou Décliner. Lorsque vous tentez d’accepter, acceptez ou déclinez l’invitation, un message électronique de réponse, comprenant les éventuels commentaires que vous avez ajoutés, est envoyé à l’organisateur. Si vous acceptez ou tentez d’accepter la réunion, vous pouvez toujours modifier votre réponse ultérieurement. Touchez Annoter si vous souhaitez modifier vos commentaires. Les invitations à des réunions Exchange sont également envoyées dans un message électronique qui vous permet d’ouvrir l’écran d’information de la réunion à partir de Mail.Ouverture d’une invitation à une réunion dans un message électronique : Touchez l’invitation. Alarmes Réglage des alarmes de calendrier : Dans Réglages, choisissez Sons puis activez Alarmes de calendrier dans le menu Général > Effets sonores puis sélectionnez si vous souhaitez activer les effets sonores par le biais du haut-parleur interne, des écouteurs, ou les deux. Si l’option Effets sonores est désactivée, l’iPod touch affiche un message lorsqu’un événement est sur le point de se produire, mais il ne produit aucun son. Alarmes sonores pour les invitations : Dans Réglages, choisissez “Mail, Contacts, Calendrier”. Sous Calendrier, touchez Alarme Nouv. invitation pour l’activer. Affichage de votre calendrier Vous pouvez afficher vos événements de calendrier dans une liste, par jour ou par mois. Les événements de tous vos calendriers synchronisés apparaissent dans le même calendrier sur l’iPod touch. Basculement d’affichage : Touchez Liste, Jour ou Mois.  Présentation en liste : tous les rendez-vous et événements apparaissent dans une liste que vous pouvez faire défiler.  Présentation par jour : faites défiler vers le haut ou vers le bas pour afficher les évé- nements d’une journée. Touchez ou pour afficher les événements de la veille ou du lendemain. 68 Chapitre 6 Autres applicationsChapitre 6 Autres applications 69  Présentation par mois : Touchez une journée pour afficher ses événements. Touchez ou pour afficher le mois précédent ou suivant. Les jours marqués d’un point contiennent des événements programmés Ajouter un événement Changer de présentation Événements du jour sélectionné Aller à aujourd’hui Répondre à une invitation du calendrier Affichage des détails d’un événement : Touchez l’événement. Réglage de l’iPod touch de manière à régler les heures des événements sur un fuseau horaire sélectionné : 1 Dans Réglages, choisissez Général > Date et heure. 2 Activation de la gestion de fuseau horaire. 3 Touchez Fuseau horaire et recherchez une ville principale située dans le fuseau horaire souhaité. Lorsque la gestion de fuseau horaire est activée, Calendrier affiche les dates et heures des événements dans le fuseau horaire de la ville sélectionnée. Lorsque la gestion de fuseau horaire est désactivée, Calendrier affiche les dates et heures des événements dans le fuseau local, tel qu’indiqué par l’heure réseau.Mail Mail fonctionne avec MobileMe, Microsoft Exchange et de nombreux autres systèmes populaires de courrier électronique, notamment Yahoo! Mail, Google Mail et AOL, ainsi que d’autres systèmes de messagerie POP3 and IMAP standard. Vous pouvez envoyer et recevoir des photos et des éléments graphiques intégrés et visualiser des PDF et d’autres pièces jointes. Configuration de comptes de messagerie Vous pouvez configurer des comptes de messagerie sur iPod touch d’une des maniè- res suivantes :  dans iTunes, utilisez les volets de Préférences iPod touch pour synchroniser les réglages de vos comptes de messagerie depuis votre ordinateur :ªSynchronisation avec iTunes» à la page 6 voir la section “Synchronisation avec iTunes”;  configurer un compte directement sur votre iPod touch.ªConfiguration de comptes.» à la page 11 Voir la section “Configuration de compte”. Envoi de courrier électronique. Vous pouvez envoyer un message électronique à quiconque possédant une adresse électronique. Composition et envoi de message : 1 Touchez . 2 Tapez un nom ou une adresse électronique dans le champ À, ou touchez pour ajouter un nom à partir de vos contacts. Lors de la saisie d’une adresse électronique, les adresses électroniques correspondantes de votre liste de contacts apparaissent en dessous. Touchez une adresse pour l’ajouter. Pour ajouter davantage de noms, touchez Retour ou . Remarque : Si vous rédigez un message à partir de votre compte Microsoft Exchange et avez accès à la Liste d’accès global (GAL) de votre entreprise, les adresses correspondantes provenant de vos contacts sur l'iPod touch apparaissent d’abord, suivies des adresses GAL correspondantes. 3 Touchez Cc/Cci/De si vous souhaitez copier d’autres personnes (directement ou en copie invisible). Si vous avez plusieurs comptes de messagerie, vous pouvez touchez le champ De pour changer le compte à partir duquel vous envoyez des messages. 4 Saisissez l’objet, puis votre message. Vous pouvez toucher Retour pour passer d’un champ au champ suivant. 5 Touchez Envoyer par courrier. 70 Chapitre 6 Autres applicationsChapitre 6 Autres applications 71 Envoi d’une photo dans un message Dans Photos, choisissez une photo, touchez , puis touchez Envoyer par courrier. La photo est envoyée à partir de votre compte de messagerie par défaut ªMail» à la page 106 (voir la section “Mail” du chapitre Réglages). Enregistrement du brouillon d’un message à terminer ultérieurement Touchez Annuler, puis Enregistrer. Le message est enregistré dans Brouillons. Réponse à un message. Touchez . Touchez Répondre pour répondre uniquement à l’expéditeur ou Répondre à tous pour répondre à l’expéditeur ainsi qu’à tous les destinataires. Tapez votre message de réponse, puis touchez Envoyer. Les fichiers ou images joints au message initial ne sont pas renvoyés. Réexpédition d’un message Ouvrez un message et touchez , puis Transférer. Ajoutez une ou plusieurs adresses électroniques, saisissez votre message, puis touchez Envoyer. Lorsque vous transférez un message, vous pouvez inclure les fichiers ou images joints au message d’origine. Envoi d’un message à une personne présente dans un champ d’adresse Ouvrez le message et touchez un nom ou une adresse électronique, puis touchez Courrier électronique. Relève de la boîte aux lettres et lecture du courrier électronique L’icône Mail indique le nombre total de messages non lus dans toutes vos boîtes de réception. Vous pouvez avoir d’autres messages non lus dans d’autres boîtes à lettres. Nombre de courriers électroniques non lus dans votre boîte de réception Sur chaque écran de compte figure le nombre de messages non lus dans chaque boîte à lettres. Nombre de messages non lus Tapotez ici pour voir tous vos comptes de messagerieTouchez une boîte à lettres pour afficher son contenu. Les messages non lus sont accompagnés d’un point bleu . Messages non écoutés Lire un message : Touchez une boîte à lettres, puis touchez un message. À l’intérieur d’un message, touchez ou pour afficher le message précédent ou le message suivant. Zoom sur une partie d’un message Double-touchez la zone du message sur laquelle vous souhaitez zoomer. Double-touchez à nouveau pour effectuer un zoom arrière. Redimensionnement de toute colonne ou texte pour l’adapter à l’écran. Double-touchez le texte. Redimensionnement manuel d’un message Pincez le texte pour le réduire, écartez les doigts pour l’agrandir. Suivi d’un lien Touchez le lien. Les liens de type texte sont généralement soulignés en bleu. De nombreuses images sont également des liens. Un lien peut mener à afficher une page web, ouvrir une carte, composer un numéro de téléphone ou ouvrir un nouveau message électronique dont le champ du destinataire est déjà rempli Les liens web et les liens de cartographie ouvrent Safari ou Plans sur l’iPod touch. Pour retourner à votre courrier électronique, appuyez sur le Bouton principal et touchez Mail. Afficher l’adresse de destination d’un lien Touchez le lien et maintenez votre doigt dessus. L’adresse apparaît à côté de votre doigt. L'iPod touch affiche la plupart des formats d’images en pièces jointes (JPEG, GIF et TIFF) dans le corps du texte des messages électroniques. L'iPod touch peut lire de nombreux formats de fichiers audio en pièces jointes (notamment MP3, AAC, WAV et AIFF). Vous pouvez télécharger et afficher des fichiers (notamment fichiers PDF, pages web, fichiers texte et documents au format Pages, Keynote, Numbers, Microsoft Word, Excel ou PowerPoint) joints aux messages que vous recevez. 72 Chapitre 6 Autres applicationsChapitre 6 Autres applications 73 Ouverture d’un fichier joint : Touchez la pièce jointe. Elle se télécharge sur votre iPod touch puis s’ouvre. Tapotez sur la pièce jointe à télécharger Vous pouvez afficher les pièces jointes en mode portrait ou paysage. Si le format d’une pièce jointe n’est pas géré par l’iPod touch, vous pouvez voir le nom du fichier mais pas l’ouvrir. L'iPod touch gère les types de documents suivants : .doc Microsoft Word .docx Microsoft Word (XML) .htm page web .html page web .key Keynote .numbers Numbers .pages Pages .pdf Preview, Adobe Acrobat .ppt Microsoft PowerPoint .pptx Microsoft PowerPoint (XML) .txt texte .vcf coordonnées .xls Microsoft Excel .xlsx Microsoft Excel (XML) Enregistrement d’une photo en pièce jointe sur la bibliothèque photo de votre album Pellicule : Maintenez votre doigt sur l’image puis touchez “Enregistrer image”.Relève du courrier électronique Choisissez une boîte à lettres ou touchez à tout moment. Affichage de tous les destinataires d’un message Touchez Détails. Touchez un nom ou une adresse électronique pour afficher les informations de contact du destinataire. Touchez alors une adresse électronique ou un message de texte pour contacter la personne. Touchez Masquer pour ne pas afficher les destinataires. Ajout à votre liste de contacts d’un destinataire de courrier électronique. Touchez le message et, si nécessaire, touchez Détails pour afficher les destinataires. Touchez un nom ou une adresse électronique et touchez « Créer un nouveau contact » ou « Ajouter à un contact ». Signalement d’un message comme non lu. Ouvrez le message et touchez « Signaler comme non lu ». Un point bleu s’affiche en regard du message dans la liste de la boîte à lettres (et disparaît lorsque vous l’ouvrez de nouveau). Ouverture d’une invitation à une réunion : Touchez l’invitation. Vous pouvez obtenir les coordonnées de l’organisateur et des autres participants, configurer une alerte, ajouter des remarques à l’événement et ajouter des commentaires à inclure dans votre réponse envoyée à l’organisateur. Vous pouvez tenter d’accepter, accepter ou décliner l’invitation.ªRéponse à des invitations à des réunions» à la page 66Voir la section “Réponse à une invitation à une réunion”. Activation et désactivation du mode “Push”: Dans Réglages, choisissez Nouvelles données puis touchez Push.ªNouvelles données» à la page 96Voir la section “Nouvelles données”. Organisation du courrier électronique Vous pouvez supprimer des messages l’un après l’autre ou sélectionner un groupe à supprimer d’un coup. Vous pouvez également déplacer des messages d’une boîte à lettres ou d’un dossier à l’autre. Suppression de message : Ouvrez le message et touchez . Vous pouvez également toucher Modifier puis toucher à côté du message. 74 Chapitre 6 Autres applicationsChapitre 6 Autres applications 75 Vous pouvez aussi directement supprimer un message dans la liste des messages de la boîte à lettres : balayez à gauche ou à droite sur le titre du message puis touchez Supprimer. Pour afficher le bouton Supprimer, faites balayer le message vers la gauche ou vers la droite. Suppression de plusieurs messages : Pendant la consultation d’une liste de messages, touchez Modifier, sélectionnez les messages que vous souhaitez supprimer, puis touchez Supprimer. Déplacement d’un message vers une boîte à lettres ou un dossier différent : Pendant la consultation d’un message, touchez , puis choisissez une boîte à lettres ou un dossier. Déplacement de plusieurs messages : Pendant la consultation d’une liste de messages, touchez Modifier, sélectionnez les messages que vous souhaitez déplacer, puis touchez Déplacer et sélectionnez une boîte à lettres ou un dossier.YouTube YouTube présente des vidéos de courte durée envoyées par des personnes du monde entier. (Ce service n’est pas disponible dans toutes les langues et n’est pas disponible partout.) Recherche et visualisation de vidéos Vous pouvez parcourir YouTube ou rechercher les vidéos que vous souhaitez regarder. Exploration de vidéos : Touchez Sélection, Populaires ou Signets, Vous pouvez également toucher Plus pour parcourir Récentes, Les mieux cotées ou Historique.  Sélection : vidéos passées en revue et conseillées par l’équipe de YouTube.  Populaires : vidéos les plus visionnées par les utilisateurs de YouTube. Touchez Tout pour afficher la liste des vidéos les plus visionnées de tous les temps, ou Aujourd’hui ou Cette semaine pour afficher les vidéos les plus visionnées pendant la dernière journée ou semaine.  Signets : vidéos que vous avez mises en signet.  Récentes : les plus récentes ajoutées sur Youtube  Les mieux cotées : vidéos les mieux cotées par les utilisateurs de YouTube. Pour noter une vidéo, accédez à www.youtube.com.  Historique : vidéos que vous avez visionnés le plus récemment. Recherche d’une vidéo : 1 Touchez Recherche puis touchez le champ de recherche YouTube. 2 Touchez un mot ou une phrase décrivant ce que vous recherchez, puis touchez Rechercher. Touchez Recherche puis touchez le champ de recherche YouTube. Lecture de vidéo : Touchez la vidéo. Elle commence à se télécharger sur l’iPod touch et une barre de progression apparaît. Dès qu’une partie suffisante de la vidéo s’est téléchargée, la lecture commence. Touchez la vidéo. 76 Chapitre 6 Autres applicationsChapitre 6 Autres applications 77 Dès qu’une partie suffisante de la vidéo s’est téléchargée, la lecture commence. Lorsque la lecture d’une vidéo commence, les commandes disparaissent pour ne pas gêner. Afficher/masquer les commandes vidéo : Touchez l’écran. Suivant/ Avance rapide Lecture/Pause Courrier électronique Échelle Progression du téléchargement Volume Précédent/Retour rapide Signet Tête de lecture Défileur Lire ou mettre en pause une vidéo Touchez ou . Augmenter ou diminuer le volume Faites glisser le curseur de volume. Vous pouvez également utiliser les boutons de volume laté- raux de l’iPod touch. Redémarrer une vidéo Touchez . Passer à la vidéo suivante ou précédente Touchez deux fois pour passer à la vidéo précédente. Passer à la vidéo suivante ou précédente Effectuer un retour ou une avance rapide Touchez ou et gardez le doigt dessus. Passer directement à un point particulier d’une vidéo Faites glisser la tête de lecture le long du défileur. Interrompre une vidéo avant sa fin Touchez Terminé ou appuyez sur le bouton principal . Basculer le redimensionnement de la vidéo entre le remplissage de l’écran et l’adaptation à l’écran. Double-touchez la vidéo. Basculer le redimensionnement de la vidéo entre le remplissage de l’écran et à l’adaptation à l’écran. Double-touchez la vidéo. Touchez à côté de la vidéo et touchez Créer un signet. Mettre une vidéo en signet Touchez Signets pour afficher vos vidéos mises en signet. Envoyer un lien vers la vidéo par courrier électronique Touchez à côté de la vidéo et touchez Partager. Vous pouvez également commencer à lire la vidéo puis toucher . Vous pouvez également commencer à lire la vidéo puis toucher . Lisez l’intégralité de la vidéo, touchez Terminé en cours de lecture ou touchez à côté d’une vidéo d’une liste. iPod touch affiche le classement de la vidéo, la date de son ajout et d’autres informations. Lisez l’intégralité de la vidéo, touchez Terminé en cours de lecture ou touchez à côté d’une vidéo d’une liste. Modification des boutons de navigation Vous pouvez remplacer les boutons Sélection, Populaires, Signets et Recherche situés au bas de l’écran par d’autres que vous utilisez plus fréquemment. Supposons que vous regardiez souvent les vidéos les mieux cotées mais ne regardiez pas beaucoup les vidéos conseillées. Vous pouvez dans ce cas remplacer le bouton Sélection par le bouton Les mieux cotées. Modification des boutons de navigation : Touchez Plus puis Modifier, puis faites glisser un bouton vers le bas de l’écran, par-dessus celui que vous souhaitez remplacer. Vous pouvez faire glisser vers la gauche ou la droite les boutons situés au bas de l’écran afin de les réarranger. Lorsque vous avez fini, touchez Terminé. 78 Chapitre 6 Autres applicationsChapitre 6 Autres applications 79 Pendant que vous explorez les vidéos, touchez Plus pour accéder aux boutons d’accès qui ne sont pas visibles. Ajout de vos propres vidéos à YouTube Pour plus de renseignements sur la manière d’ajouter vos propres vidéos à YouTube, accédez à www.youtube.com et touchez Aide. Bourse Bourse vous permet de consulter les dernières cotations des titres sélectionnés. Visualisation des cours de la bourse Visualisation des cours de la Bourse Les cotations peuvent être décalées de 20 minutes au maximum. Ajouter un indice boursier ou un fonds au visualiseur de titres : 1 Touchez , puis . 2 Tapez un symbole, un nom de société, un indice ou un nom de fond, puis touchez Rechercher. 3 Choisissez un élément dans la liste de recherche. Afficher l’évolution d’un titre sur une période plus longue ou plus courte : Touchez un symbole de titre, puis touchez 1d, 1w, 1m, 3m, 6m, 1y ou 2y. Affichage de l’évolution d’un titre sur une période Suppression de titre : Touchez et touchez à côté d’un titre, puis touchez Supprimer. Réorganisation de titres : Touchez . Puis faites glisser à côté d’un titre vers un autre endroit de la liste. Affichage de la modification en valeur ou en pourcentage : Touchez le nombre représentant la modification. Passage entre l’affichage de la variation des titres en pourcentage et celle en valeur Vous pouvez également toucher et touchez % ou Nombres. Pour obtenir plus d’informations Consulter des informations sur un titre à Yahoo.com : Sélectionnez le titre et touchez .Vous pouvez visualiser des nouvelles, des informations et des sites web associés au titre, par exemple. Plans Plans fournit des plans de ville, des vues satellites et des vues mixtes de lieux à travers le monde. Vous pouvez obtenir des itinéraires détaillés et des informations sur la circulation (à certains endroits). À certains endroits, vous pouvez également connaître et suivre votre emplacement actuel (approximatif) et utiliser ces informations pour obtenir un itinéraire jusqu’à ou à partir d’un autre endroit.1 AVERTISSEMENT : Des informations importantes concernant la conduite et la navigation en toute sécurité sont disponibles dans le Guide des informations importantes sur le produità la page www.apple.com/ca/fr/support/manuals/ipodtouch. Recherche et visualisation de lieux Recherche d’emplacement et consultation de plan : 1 Touchez le champ de recherche pour activer le clavier. 2 Tapez une adresse, une intersection, une région, un lieu connu, un signet, un contact ou un code postal. 3 Touchez Rechercher. Une épingle indique l’emplacement. Touchez l'épingle pour afficher le nom ou la description du lieu. Tapotez sur pour obtenir des renseignements sur le lieu et des itinéraires ou ajouter le lieu à vos signets ou à votre liste de contacts 1 Les plans, les itinéraires et les informations géographiques dépendent des données recueillies et des services fournis par de tierces parties. Ces services de données sont soumises à modification et ne sont pas disponibles dans toutes les zones géographiques. Par conséquent, certains plans, itinéraires ou informations géographiques sont susceptibles de ne pas être disponibles, d’être inexacts ou incomplets. Pour en savoir plus, rendez-vous sur www.apple.com/ca/fr/ipodtouch. Afin de déterminer votre situation géographique, des données sont regroupées dans un formulaire qui ne vous identifie pas personnellement. Si vous ne souhaitez pas que ces données soient rassemblées, n’utilisez pas cette fonctionnalité. Si vous n’utilisez pas cette fonctionnalité, le fonctionnement de votre iPod touch n’est pas altéré. 80 Chapitre 6 Autres applicationsChapitre 6 Autres applications 81 Trouver votre emplacement actuel et activer le mode suivi : Touchez . L'iPod touch utilise les Services de localisation pour déterminer votre emplacement actuel (approximatif). Services de localisation utilise les informations disponibles provenant du réseau de données cellulaire, des réseaux Wi-Fi locaux (si vous avez activé le mode Wi-Fi), et GPS (si vous avez un “iPhone G”). Plus les informations sont exactes, plus votre emplacement est indiqué avec précision. Cette fonctionnalité n’est pas disponible partout. Si les services de localisation sont désactivés, il vous sera demandé de les activer. Il est impossible de trouver et de suivre votre emplacement si les services de localisation sont désactivés.ªService de localisation» à la page 99Voir la section “Services de localisation”. Un cercle est utilisé pour indiquer votre emplacement approximatif. Lorsque vous vous déplacez, l’iPod touch met à jour votre emplacement et règle le plan de manière que l’indicateur de votre emplacement reste au centre de l’écran. Si vous touchez à nouveau ou faites glisser le plan, l’ iPod touch continue à mettre à jour votre emplacement mais arrête de le centrer, de sorte que l’indicateur d’emplacement peut se retrouver hors de l’écran. Remarque : Pour économiser l’autonomie de la batterie, désactivez l’option Service de localisation lorsque vous ne l’utilisez pas. Dans Réglages, choisissez Général > Services de localisation. Utilisez le repère sur le plan : Touchez , puis touchez Placer un repère.Une épingle est déposée sur le plan. Vous pouvez alors la faire glisser vers l’endroit de votre choix. Déplacer rapidement la épingle vers la zone actuellement affichée : Touchez , puis touchez Replacer le repère. Zoom sur une partie d’une carte Pincez la carte. Zoom sur une partie de la carte Double-touchez à nouveau la partie sur laquelle vous souhaitez effectuer un autre zoom avant. ou double-touchez la partie sur laquelle vous souhaitez zoomer. Pincez la carte. Zoom arrière Vous pouvez pincer à nouveau la carte pour effectuer un autre zoom arrière. Déplacer ou faire défiler vers un autre endroit du plan Faites glisser la page vers le haut, le bas, la gauche ou la droite. Afficher une vue satellite ou mixte : Touchez , puis touchez Satellite ou Mixte pour afficher uniquement une vue satellite ou un plan des rues associé à une vue satellite. Touchez Carte pour revenir à l’affichage de la carte. 82 Chapitre 6 Autres applicationsChapitre 6 Autres applications 83 Affichage de l’emplacement de l’adresse d’une personne répertoriée dans votre liste des contacts Touchez dans le champ de recherche, puis touchez Contacts et choisissez un contact. Pour situer une adresse de cette façon, le contact doit inclure au moins une adresse. Si le contact compte plusieurs adresses, vous devez choisir l’adresse que vous souhaitez localiser. Vous pouvez également trouver l’emplacement d’une adresse en touchant l’adresse directement dans Contacts. Ajout d’un lieu à votre liste des contacts Recherchez un lieu, touchez l’épingle qui lui est associée, touchez à côté du nom ou de la description, puis touchez « Créer un nouveau contact » ou « Ajouter un contact ». Mise en signet d’emplacements Vous pouvez associer des signets aux emplacements que vous souhaitez retrouver ultérieurement. Mise en signet d’un emplacement : Recherchez un lieu, touchez l’épingle qui lui est associée, touchez à côté du nom ou de la description, puis touchez Ajouter aux signets. Afficher un emplacement mis en signet ou accédé récemment : Touchez dans le champ de recherche, puis touchez Signets ou Historique. Itinéraires Vous pouvez obtenir un itinéraire pas à pas vers la destination de votre choix. Obtention d’itinéraires : 1 Touchez Itinéraire. 2 Saisissez les lieux de départ et d’arrivée dans les champs de départ et d’arrivée. Par défaut, l’iPod touch démarre l’application sur l’emplacement approximatif actuel (si les informations sont disponibles). Touchez dans l’un des champs, puis choisissez un emplacement dans Signets (dont votre emplacement approximatif actuel et l’épingle déposée, le cas échéant), Historique ou Contacts. Par défaut, “iPhone” part de votre emplacement approximatif (en cas de disponibilité du service). Pour inverser l’itinéraire, touchez . 3 Touchez Itinéraire, puis effectuez l’une des opérations suivantes :  Pour afficher un itinéraire étape par étape, touchez Départ, puis touchez pour afficher la partie suivante de l’itinéraire. Touchez Itinéraire, puis effectuez l’une des opérations suivantes : Pour afficher tous les itinéraires d’une liste, touchez puis touchez Liste. Touchez n’importe quel élément de la liste pour afficher un plan représentant ce tronçon du trajet. Le temps de conduit approximatif apparaît en haut de l’écran. Si des données de circulation sont disponibles, la durée du trajet est modifiée en conséquence. Pour trouver un itinéraire, vous pouvez également trouver un emplacement sur la carte, touchez l’épingle qui lui correspond, touchez puis touchez Itinéraire vers ce lieu ou Itinéraire à partir de ce lieu. Basculer les points de départ et d’arrivée pour inverser l’itinéraire : Touchez . Si ne s’affiche pas, touchez Liste, puis touchez Modifier. Afficher les itinéraires récemment consultés : Touchez dans le champ de recherche, puis touchez Historique. Afficher l’état de la circulation Lorsque cela est possible, vous avez accès à l’état de la circulation des autoroutes sur le plan. Afficher ou masquer l’état de la circulation : Touchez , puis touchez Afficher la circulation ou Masquer la circulation. 84 Chapitre 6 Autres applicationsChapitre 6 Autres applications 85 Selon l’état de la circulation, des codes de couleur sont attribués aux autoroutes : Gris = aucune donnée disponible actuellement Rouge = moins de 40 km/h Jaune = entre 40 et 80 km/h Vert = plus de 80 km/h Si les autoroutes ne sont pas codées par des couleurs, vous risquez de devoir effectuer un zoom arrière jusqu’au niveau ou les routes principales apparaissent. Il est aussi possible que l’état de la circulation ne soit pas disponible pour la région concernée. Recherche et contact de commerces Recherche d’un commerce : 1 Recherchez un lieu (tel qu’une ville et une région ou un pays ou une adresse postale) ou faites défiler vers un lieu d’une carte. 2 Tapez le type de commerce dans le champ texte et touchez Rechercher. Des épingles apparaissent pour les emplacements correspondants. Par exemple, si vous localisez votre ville, tapez « films », puis touchez Rechercher, des épingles indiquent tous les cinémas de l’endroit où vous habitez. Touchez l’épingle qui indique un commerce pour en afficher le nom ou la description. Rechercher des commerces sans commencer par rechercher l’emplacement : Tapez des mots-clés, tels que :  restaurants paris france  apple inc new yorkContacter un commerce ou demander un itinéraire : Touchez l’épingle qui pointe vers une entreprise, puis touchez à côté du nom. Obtenir des itinéraires Visiter le site web Tapotez sur pour afficher les informations sur le contact Vous pouvez procéder comme suit :  Touchez un numéro de téléphone à appeler, une adresse électronique à laquelle envoyer un message électronique ou une adresse web à consulter.  Pour obtenir des itinéraires, touchez Itinéraire à partir d’ici ou Itinéraire jusqu’ici.  Pour ajouter le commerce à votre liste des contacts, faites défiler et touchez Créer un nouveau contact ou « Ajouter au contact ». Consulter une liste des commerces trouvés au cours de la recherche : Dans l’écran Carte, touchez Liste. Touchez un commerce pour voir son emplacement. Vous pouvez également toucher à côté d’un commerce pour afficher les informations qui lui sont associées. Météo Utilisez Météo pour obtenir la température actuelle et voir une prévision météorologique sur six jours pour une ou plusieurs villes mondiales. 86 Chapitre 6 Autres applicationsChapitre 6 Autres applications 87 Affichage de bulletins météo Touchez Météo à partir de l’écran d’accueil pour afficher la météo actuelle pour la ville sélectionnée. Prévisions à 6 jours Température actuelle Conditions actuelles Minima et maxima du jour Ajouter et supprimer des villes Nombre de villes enregistrées Si le tableau météo est bleu clair, il fait jour dans cette ville, c’est-à-dire entre 6 h 00 et 18 h 00. Si le tableau météo est violet foncé, il fait nuit dans cette ville, c’est-à-dire entre 18h00 et 6h00. Ajout d’une ville : 1 Touchez , puis . 2 Saisissez un nom de ville ou un code postal, puis touchez Rechercher. 3 Choisissez une ville dans la liste de recherche. Passage à une autre ville : Feuilletez vers la gauche ou la droite Le nombre de points apparaissant au-dessous du tableau météo indique le nombre de villes stockées Réorganisation des villes : Touchez , puis faites glisser à côté d’une ville vers un nouvel emplacement dans la liste. Suppression d’une ville : Touchez et touchez à côté d’une ville, puis touchez Supprimer. Affichage de la température en degrés Fahrenheit ou Celsius : Touchez , puis touchez °F ou °C. Obtention de bulletins météo supplémentaires Vous pouvez visualiser un bulletin météo plus détaillé, des nouvelles et des sites web associés à la ville, par exemple. Consultez des informations à propos d’une ville sur Yahoo.com : Touchez .Horloge Horloge vous permet d’afficher l’heure à différents endroits du monde, de définir une alarme, d’utiliser un chronomètre et de régler une minuterie. Horloges mondiales Vous pouvez ajouter des horloges pour afficher l’heure dans d’autres villes importantes du monde et d’autres fuseaux horaires. Afficher les horloges : Touchez Horloge. Si la face de l’horloge est blanche, il fait jour dans la ville correspondance. Si la face est noire, il y fait nuit. Si vous avez plus de quatre horloges, feuilletez pour les faire défiler. Ajouter une horloge : 1 Touchez Horloge. 2 Touchez , puis tapez le nom d’une ville. Ajout d’une horloge 3 Touchez une ville pour ajouter une horloge qui lui correspond. Si vous ne voyez pas la ville que vous recherchez, essayez une autre ville située dans le même fuseau horaire. Suppression d’une horloge : Touchez Horloges puis Modifier. Touchez ensuite à côté d’une horloge et touchez Supprimer. Réordonner les horloges : Touchez Horloges puis Modifier. Faites ensuite glisser à côté d’une horloge vers un nouvel emplacement dans la liste. Alarmes Vous pouvez régler plusieurs alarmes. Réglez chaque alarme de manière qu’elle sonne les jours que vous indiquez, ou une seule fois. Réglage d’une alarme : 1 Touchez Alarme puis . 2 Ajustez l’un des réglages suivants :  Pour régler une alarme de manière qu’elle se répète certains jours, touchez Récurrence et choisissez les jours.  Pour choisir la sonnerie d’une alarme, touchez Sonorité. 88 Chapitre 6 Autres applicationsChapitre 6 Autres applications 89  Pour indiquer si un rappel est associé à l’alarme, activez ou désactivez Rappel d’alarme. Si l’option Rappel d’alarme est activée et que vous touchez Rappel d’alarme lorsque l’alarme sonne, celle-ci s’arrête et sonne à nouveau dix minutes plus tard..  Pour donner une description à l’alarme, touchez Libellé. L'iPod touch affiche le libellé lorsque l’alarme sonne. Si au moins une alarme est réglée et activée, l’icône apparaît dans la barre d’état de l’iPod touch, en haut de l’écran. Activation et désactivation d’une alarme : Touchez Alarme et activez ou désactivez l’alarme de votre choix. Si une alarme est désactivée, elle ne sonnera plus sauf si vous la réactivez. Si une alarme est réglée pour ne sonner qu’une fois, elle se désactive automatiquement après avoir sonné. Vous pouvez la réactiver. Modification des réglages d’une alarme : Touchez Alarme puis Modifier, puis touchez à côté de l’alarme que vous souhaitez modifier. Suppression d’une alarme : Touchez Alarme puis touchez Modifier et à côté de l’alarme et touchez Supprimer. Chronomètre Utilisez le chronomètre pour chronométrer un événement : 1 Touchez Chronomètre. 2 Touchez Démarrer pour démarrer le chronomètre  Pour enregistrer les temps au tour, touchez Tour après chaque tour.  Pour mettre le chronomètre en pause, touchez Arrêter. Touchez Démarrer pour redémarrer.  Pour réinitialiser le chronomètre, touchez Réinitialiser lorsque le chronomètre est en pause. Si vous démarrez le chronomètre puis passez à une autre application de l’iPod touch, le chronomètre continue à fonctionner en arrière-plan. Minuterie Réglage du minuteur : Touchez Minuteur, puis feuilletez pour régler le nombre d’heures et de minutes. Touchez Démarrer pour lancer le minuteur. Choix de la sonnerie : Touchez Sonnerie. Réglage d’une minuterie de veille : Réglez la minuterie, touchez Sonnerie et choisissez Mettre l’iPod en veille. Lorsqu’une minuterie de veille est réglée, l’iPod touch arrête la lecture de la musique ou de la vidéo lorsque la minuterie s’arrêteSi vous démarrez la minuterie puis passez à une autre application de l’iPod touch, la minuterie continue à fonctionner en arrière-plan. Calculette Utilisation de la Calculette Touchez les chiffres et fonctions de la Calculette comme vous le feriez avec une véritable calculatrice. Lorsque vous touchez sur le bouton d’addition, de soustraction, de multiplication ou de division, un cadre blanc apparaît autour du bouton pour indiquer l’opération à effectuer. Faites pivoter l’iPod touch pour obtenir une calculatrice scientifique étendue. Fonctions mémoire standard  C : touchez pour effacer le nombre affiché.  MC : touchez pour effacer la mémoire.  M+ : touchez pour ajouter le nombre affiché au nombre en mémoire. Si la mémoire ne contient aucun nombre, touchez pour stocker en mémoire le nombre affiché.  M- : touchez pour soustraire le nombre affiché du nombre en mémoire.  MR : touchez pour remplacer le nombre affiché par le nombre en mémoire. Si le bouton est entouré d’un anneau blanc, un nombre est stocké en mémoire. Le nombre affiché reste en mémoire lorsque vous basculez entre la calculatrice normale et la calculatrice scientifique. Touches de la calculatrice scientifique Faites pivoter l’iPod touch en orientation paysage pour afficher la calculatrice scientifique. 90 Chapitre 6 Autres applicationsChapitre 6 Autres applications 91 2 Transforme les boutons trigonométriques (sin, cos, tan, sinh, cosh et tanh) en leur fonction inverse (sin-1, cos-1, tan-1, sinh-1, cosh-1 et tanh-1). Transforme également ln en log2 et e x en 2 x . Touchez à nouveau 2 pour restituer les fonctions d’origine des boutons. ( Ouvre une expression entre parenthèses. Les expressions peuvent être imbriquées. ) Ferme une expression entre parenthèses. % Calcule des pourcentages, ajoute des majorations et soustrait des remises. Pour calculer le pourcentage, utilisez-le avec la touche de multiplication (x). Par exemple, pour calculer 8 % de 500, saisissez 500 x 8 % = ce qui retourne 40. Pour ajouter une majoration ou soustraire une remise, utilisez-la avec la touche plus (+) ou moins (–). Par exemple, pour calculer le coût total d’un article de 500 $ avec une taxe de 8 %, saisissez 500 + 8 % = ce qui retourne 540. 1/x Retourne l’inverse d’une valeur au format décimal. x 2 Élève une valeur au carré. x 3 Élève une valeur au cube. y x Touchez entre deux valeurs pour élever la première à la puissance de la deuxième. Par exemple, pour calculer 3^4, saisissez 3 y x 4 = ce qui retourne 81. x! Calcule la factorielle d’une valeur. √ Calcule la racine carrée d’une valeur. x √y Touchez entre deux valeurs x et y pour calculer la racine x-ième de y. Par exemple, pour calculer 4 √81, saisissez 81 x √y 4 = ce qui retourne 3. log Retourne le logarithme de base 10 d’une valeur. sin Calcule le sinus d’une valeur. sin -1 Calcule le sinus inverse d’une valeur. (Disponible lorsque le deuxième bouton est enfoncé.) cos Calcule le cosinus d’une valeur. cos -1 Calcule le cosinus inverse d’une valeur. (Disponible lorsque le deuxième bouton est enfoncé.) tan Calcule la tangente d’une valeur. tan -1 Calcule la tangente inverse d’une valeur. (Disponible lorsque le deuxième bouton est enfoncé.) ln Calcule le logarithme naturel d’une valeur.log2 Calcule le logarithme de base 2 d’une valeur. (Disponible lorsque le deuxième bouton est enfoncé.) sinh Calcule le sinus hyperbolique d’une valeur. sinh -1 Calcule le sinus hyperbolique inverse d’une valeur. (Disponible lorsque le deuxième bouton est enfoncé.) cosh Calcule le cosinus hyperbolique d’une valeur. cosh -1 Calcule le cosinus hyperbolique inverse d’une valeur. (Disponible lorsque le deuxième bouton est enfoncé.) tanh Calcule la tangente hyperbolique d’une valeur. tanh -1 Calcule la tangente hyperbolique inverse d’une valeur. (Disponible lorsque le deuxiè- me bouton est enfoncé.) e x Touchez après avoir saisi une valeur pour élever la constante « e » (2,718281828459045...) à la puissance correspondante. 2 x Calcule 2 à la puissance correspondante. Par exemple, 10 2 x = 1024. (Disponible lorsque le deuxième bouton est enfoncé.) Rad Change de mode pour exprimer les fonctions trigonométriques en radians. Deg Change de mode pour exprimer les fonctions trigonométriques en degrés. π Entre la valeur de π (3,141592653589793...). EE Opérateur qui multiplie la valeur affichée par 10 à la puissance de la valeur que vous saisissez ensuite. Rand Retourne un nombre aléatoire entre 0 et 1. Notes Rédaction et lecture de notes Les notes sont classées par date d’ajout, la note la plus récente figurant au début de la liste. Les premiers mots de chaque note apparaissent dans la liste Ajout de note : Touchez , puis tapez la note et touchez OK. Lecture d’une note : Touchez la note. Touchez ou pour afficher la note précé- dente ou suivante. Modification d’une note : Touchez la note, n’importe où, pour activer le clavier. Suppression d’une note : Touchez la note, puis touchez . 92 Chapitre 6 Autres applicationsChapitre 6 Autres applications 93 Envoi de note par courrier électronique Envoi d’une note par courrier électronique : Touchez la note, puis touchez . Pour envoyer une note par courrier électronique, l’iPod touch doit être configuré pour le courrier électronique. Voir ªOrganisation du courrier électronique» à la page 74. Contacts Importation et synchronisation des contacts Vous pouvez ajouter des contacts à l’iPod touch des manières suivantes :  Dans iTunes, synchronisez vos contacts avec des applications de votre ordinateurªSynchronisation avec iTunes» à la page 6(voir la section “Synchronisation avec iTunes”)  Configuration de comptes MobileMe ou Microsoft Exchange sur l’iPod touch, avec Calendrier activé (voir la section ªConfiguration de comptes.» à la page 11)  Installez un profil qui configure un compte Exchange avec Calendrier activéªInstallation de profils de configuration» à la page 13(voir la section “Installation de profils de configuration”)  Saisie de contacts directement sur l’iPod touch  Importation de contacts à partir d’une carte SIM Recherche de contacts Vous pouvez rechercher des contacts synchronisés avec l’iPod touch par nom, adresse ou toute autre information incluse dans les contacts. Si vous avez configuré un compte Microsoft Exchange sur l’iPod touch, vous pourrez peut-être rechercher dans la liste globale d’adresses (GAL) de votre entreprise des contacts à l’intérieur de l’organisation. Lorsque vous tapez des informations de recherche, les contacts dont les informations correspondent apparaissent immédiatement au cours de la saisie. Recherche de contacts : Dans Contacts, touchez le champ de recherche situé en haut de toute liste de contacts et saisissez un nom, une adresse ou d’autres informations. Recherche dans un GAL : Touchez Groupes, touchez Annuaires au bas de la liste puis saisissez un nom, une adresse ou d’autres informations. Vous ne pouvez pas modifier les contacts de votre GAL ni les enregistrer sur votre iPod touch.Gestion des contacts sur l’iPod touch Ajout d’un contact sur l’iPod touch: Touchez Contacts puis . Suppression d’un contact Dans Contacts, choisissez un contact, puis touchez Modifier. Faites défiler et touchez Supprimer le contact. Ajout d’un contact depuis le clavier Touchez Clavier et saisissez un numéro, puis touchez . Touchez Créer un nouveau contact et saisissez les informations de l’appelant, ou touchez « Ajouter à un contact » et choisissez un contact. Modification des informations de contact Dans Contacts, choisissez un contact, puis touchez Modifier. Pour ajouter un élément, touchez . Pour supprimer un élément, touchez . Saisie d’une pause dans un numéro Touchez puis Pause. Les pauses apparaissent sous la forme de virgules lorsque le numéro est enregistré. Attribution d’une photo à un contact : 1 Touchez Contacts et choisissez un contact. 2 Touchez Modifier et touchez Ajouter une photo ou touchez la photo existante. 3 Touchez Choisir une photo et choisissez une photo. 4 Faites glisser et redimensionnez la photo comme souhaité. 5 Touchez Valider. 94 Chapitre 6 Autres applications95 Réglages vous permet de personnaliser les applications de l’iPod touch , de régler la date et l’heure, de configurer votre connexion réseau et de saisir d’autres préférences pour l'iPod touch. Wi-Fi Les réglages Wi-Fi déterminent si l’iPod touch utilise des réseaux locaux Wi-Fi pour se connecter à Internet. Activation et désactivation du mode Wi-Fi : Choisissez Wi-Fi puis activez ou désactivez le mode Wi-Fi. Rejoindre un réseau Wi-Fi : Choisissez Wi-Fi, patientez quelques instants pendant que l’iPod touch détecte les réseaux à portée puis sélectionnez un réseau. Si nécessaire, saisissez un mot de passe et touchez Rejoindre (Les réseaux qui nécessitent un mot de passe sont accompagnés d’une icône de verrouillage .) Une fois que vous avez rejoint manuellement un réseau Wi-Fi, l’iPod touch s’y connecte automatiquement chaque fois que le réseau est à portée. Si plusieurs réseaux déjà utilisés se trouvent à portée, l’iPod touch se connecte au dernier réseau utilisé. Lorsque l’iPod touch est connecté à un réseau Wi-Fi, l’icône Wi-Fi située dans la barre d’état en haut de l’écran indique la force de la connexion. Le nombre de barres affichées est proportionnel à la qualité du signal. Réglage de l’iPod touch pour confirmer l’accès à un nouveau réseau : Choisissez WiFi et activez ou désactivez l’option « Confirmer l’accès ». 7 RéglagesLorsque vous essayez d’accéder à Internet, à l’aide de Safari ou Courrier par exemple, et que vous n’êtes pas à portée d’un réseau Wi-Fi que vous avez déjà utilisé, cette option indique à l'iPod touch de rechercher un autre réseau. L'iPod touch affiche une liste des réseaux Wi-Fi disponibles que vous pouvez choisir. (Les réseaux qui nécessitent un mot de passe sont accompagnés d’une icône de verrouillage.) Si l’option “Confirmer l’accès” est désactivée, vous devez rejoindre manuellement un réseau pour vous connecter à Internet lorsqu’aucun réseau déjà utilisé ni aucun réseau de données cellulaire n’est disponible. Oubli de réseau de sorte que l’iPod touch ne s’y connecte plus automatiquement : Choisissez Wi-Fi et touchez à côté d’un réseau auquel vous vous êtes connecté auparavant. Touchez ensuite « Oublier ce réseau ». Rejoindre un réseau Wi-Fi fermé : Pour rejoindre un réseau Wi-Fi qui n’est pas indiqué dans liste des réseaux découverts, choisissez Wi-Fi > Autre et saisissez le nom du réseau. Si le réseau requiert un mot de passe, touchez Sécurité, sélectionnez le type de sécurité qu’utilise le réseau puis saisissez le mot de passe. Vous devez connaître le nom du réseau, le mot de passe et le type de sécurité afin de vous connecter à un réseau fermé. Certains réseaux Wi-Fi peuvent nécessiter la saisie ou l’ajustement de réglages supplé- mentaires, par exemple un identifiant client ou une adresse IP statique. Demandez à l’administrateur réseau quels réglages utiliser. Ajustement des réglages pour vous connecter à un réseau : Choisissez Wi-Fi puis touchez à côté d’un réseau. VPN Ce réglage apparaît lorsque vous avez configuré un réseau virtuel (VPN) sur l’iPod touch, ce qui vous permet d’activer ou désactiver le mode VPN..ªRéseau» à la page 98Voir la section “Réseau”. Nouvelles données Ce réglage vous permet d’activer ou de désactiver le mode Push pour MobileMe, Microsoft Exchange, Yahoo! Mail, et tout autre compte « Push » que vous avez configuré sur l’iPod touch. Les comptes « Push » envoient automatiquement des nouvelles informations sur votre ordinateur ou sur l’iPod touch lorsqu’elles apparaissent sur le serveur. Vous pouvez désactiver le mode « Push » pour interrompre la livraison de courrier électronique et d’autres informations ou augmenter l’autonomie de la batterie. 96 Chapitre 7 RéglagesChapitre 7 Réglages 97 Lorsque le mode « Push » est désactivé, ou pour les comptes qui ne gèrent pas ce mode, il est toujours possible d’« aller récupérer » les données, c’est-à-dire que l’iPod touch peut vérifier si de nouvelles informations sont disponibles sur le serveur. Utilisez le réglage Nouvelles données pour indiquer à quelle fréquence demander les données. Pour optimiser l’autonomie de votre batterie, indiquez une fréquence faible. Activation du mode « Push » : Touchez Nouvelles données puis touchez pour activer le mode « Push ». Réglage de l’intervalle de récupération des données : Touchez Nouvelles données puis touchez la fréquence avec laquelle vous souhaitez récupérer des données pour tous les comptes. Limitez cette fréquence pour augmenter l’autonomie de la batterie. Pour des renseignements sur la manière d’ajuster les réglages de compte avancés, consultez la section “Comptes”.ªComptes» à la page 105 Luminosité La luminosité de l’écran influe sur l’autonomie de la batterie. Baissez la luminosité de l’écran pour prolonger la période avant qu’une recharge de l'iPod touch devienne né- cessaire ou utilisez le mode Réglage automatique. Réglage de la luminosité de l’écran : Choisissez Luminosité et faites glisser le curseur. Réglage de l’ajustement automatique de la luminosité de l’iPod touch : Choisissez Luminosité et activez ou désactivez Luminosité automatique. Si la luminosité automatique est activée, l'iPod touch ajuste la luminosité de l’écran en fonction des conditions d’éclairage actuelles à l’aide du capteur de lumière ambiante intégré. Général Les réglages Général comprennent la date et l’heure, la sécurité, le réseau et d’autres réglages ayant un effet sur plusieurs applications. Ces réglages permettent également d’obtenir des informations concernant l'iPod touchet de restaurer les réglages d’origine de l'iPod touch. Informations Choisissez Général > Informations pour obtenir des renseignements sur l’iPod touch, notamment :  le nombre de morceaux, vidéos et photos qu’il contient ;  la capacité totale de stockage ;  l’espace disponible ; la version du logiciel ;  les numéros de série et de modèle ;  les adresses Wi-Fi ;  les informations légales. Fond d’écran Une photo apparaît en tant que fond d’écran lorsque vous déverrouillez votre iPod touch. Vous pouvez sélectionner l’une des images fournies avec l’iPod touchou utiliser une photo que vous avez synchronisée avec l'iPod touch à partir de votre ordinateur. Choix du fond d’écran : Choisissez Fond d’écran et choisissez une photo. Effets sonores iPod touch peut produire des effets sonores lorsque vous :  réception d’une alerte que vous avez configurée ;  verrouillez ou déverrouillez l’iPod touch  effectuez une saisie à l’aide du clavier. Activation et désactivation des effets sonores : Choisissez Général > Effets sonores et indiquez si vous souhaitez que les effets sonores soit émis par le haut-parleur interne, le casque ou les deux. Sélectionnez Non pour désactiver les effets sonores. Réseau Utilisez les réglages Réseau pour configurer une connexion VPN (réseau privé virtuel) ou les réglages d’accès Wi-Fi., ou pour activer ou désactiver les Données à l’étranger. Ajout d’une nouvelle configuration VPN : Choisissez Général > Réseau > VPN > Ajouter une configuration VPN. Les connexions VPN utilisées au sein d’organisations vous permettent de communiquer des informations privées de manière sécurisée sur un réseau non privé. Vous pouvez être amené à configurer un réseau VPN pour notamment accéder à votre compte de courrier électronique professionnel sur l’iPod touch. iPod touch peut se connecter à des réseaux VPN utilisant les protocoles L2TP, PPTP ou Cisco IPSec. Les réseaux VPN fonctionnent à la fois sur les connexions Wi-Fi et les connexions de réseau de données cellulaire. Demandez à votre administrateur réseau quels réglages utiliser. Dans la plupart des cas, si vous avez configuré un VPN sur votre ordinateur, vous pouvez utiliser les mêmes réglages de VPN pour l'iPod touch. 98 Chapitre 7 RéglagesChapitre 7 Réglages 99 Lorsque vous avez saisi les réglages de la connexion VPN, un commutateur VPN apparaît au niveau supérieur du menu Réglages. Vous pouvez l’utiliser pour activer ou désactiver la connexion VPN. Modification d’une configuration VPN : Choisissez Général > Réseau > VPN et touchez la configuration que vous souhaitez mettre à jour. Activation et désactivation du réseau VPN : Touchez Réglages et activez ou désactivez VPN. Suppression d’une configuration VPN : Choisissez Général > Réseau > VPN, touchez la flèche bleue située à droite du nom de la configuration puis touchez Supprimer le VPN au bas de l’écran de configuration. Utilisation du mode Wi-Fi : ªWi-Fi» à la page 95Voir la section “Wi-Fi”. Service de localisation Service de localisation permet aux applications telles que Plans et Appareil photo de recueillir et utiliser des données indiquant votre emplacement. Service de localisation ne corrèle pas les données recueillies avec vos informations personnelles. Votre emplacement approximatif est déterminé à l’aide des informations disponibles provenant des données du réseau cellulaire, réseaux Wi-Fi locaux (si vous avez activé le mode WiFi) et GPS (si vous avez un “iPhone G”).réseaux Wi-Fi locaux (si vous avez activé le mode Wi-Fi). Vous pouvez désactiver Service de localisation si vous ne souhaitez pas utiliser cette fonction. Si vous désactivez Service de localisation, il vous sera demandé de le réactiver la prochaine fois qu’une application tente d’utiliser la fonction. Activation et désactivation de Service de localisation : Choisissez Général > Service de localisation et activez ou désactivez l’option Service de localisation. Remarque : Pour économiser l’autonomie de la batterie, désactivez l’option Service de localisation lorsque vous ne l’utilisez pas. Verrouillage automatique Le verrouillage de l’iPod touch désactive l’affichage de manière à économiser votre batterie et à empêcher toute utilisation de l'iPod touch. Réglage de la durée de déclenchement du verrouillage de l’iPod touch : Choisissez Général > Verrouillage auto. et choisissez une durée.Verrouillage par code Par défaut, l’iPod touch ne vous oblige pas à saisir un code pour le déverrouiller . Définition d’un mot de passe : Choisissez Général > Verrouillage par code et saisissez un code de 4 chiffres puis saisissez le code à nouveau à titre de vérification. L'iPod touch vous demande alors de saisir le code pour le déverrouiller. Désactivation du verrouillage par code : Choisissez Général > Verrouillage par code et touchez Désactiver le code, puis saisissez votre code. Changement de code : Choisissez Général > Verrouillage par code et touchez Changer le code, saisissez votre code actuel puis saisissez deux fois votre nouveau code. Si vous oubliez votre code, vous devrez restaurer le logiciel de l’iPod touch. Voir ª» à la page 118. Réglage du délai d’activation du verrouillage par code : Choisissez Général > Verrouillage par code > Exiger le code, puis sélectionnez le délai d’inactivité de l'iPod touch avant que vous deviez saisir votre code pour le déverrouiller. Affichage d’un aperçu des SMS lorsque l’iPod touch est verrouillé : Choisissez Général > Verrouillage par code et touchez pour activer l’aperçu des SMS. Restrictions Vous pouvez définir des restrictions pour le contenu iPod utilisable par certaines applications de l’iPod touch. Par exemple, les parents peuvent limiter l’accès à de la musique au contenu explicite dans les listes de lecture ou désactiver intégralement l’accès à YouTube. Tout contenu musical ou vidéo explicite acheté sur l’iTunes Store sera masqué. Le contenu explicite est marqué comme tel par leurs distributeurs (comme les maisons de disques) lorsqu’ils sont vendus sur l’iTunes Store. Safari est désactivé et son icône est supprimée de l’écran principal. Vous ne pouvez pas naviguer sur Internet ou accéder aux Web Clips. YouTube est désactivé et son icône est supprimée de l’écran principal. L’iTunes Wi-Fi Music Store est désactivé et son icône est supprimée de l’écran principal. Vous ne pouvez pas écouter un extrait, acheter ou télécharger du contenu. L’App Store est désactivé et son icône est supprimée de l’écran principal. Vous ne pouvez pas installer d’applications lorsque l’iPod touch se synchronise avec iTunes. 100 Chapitre 7 RéglagesChapitre 7 Réglages 101 Définition de restrictions : 1 Choisissez Général > Restrictions puis touchez Activer les restrictions. 2 Saisissez le code à quatre chiffres. 3 Saisissez-le à nouveau. 4 Définissez les restrictions souhaitées en activant ou désactivant les commandes individuelles. Par défaut, toutes les commandes sont activées (pas de restrictions). Touchez un élément pour le désactiver ou restreindre son utilisation. Désactivation de toutes les restrictions : Choisissez Général > Restrictions, puis saisissez le code. Touchez Désactiver les restrictions, puis saisissez à nouveau le code. Si vous oubliez votre code, vous devrez restaurer le logiciel de l’iPod touch à partir d’iTunes. Voir ª» à la page 118. Date et heure Ces réglages s’appliquent à l’heure indiquée dans la barre d’état en haut de l’écran et dans les horloges mondiales et calendriers. Définition du format 24 heures ou 12 heures de l'iPod touch : Choisissez Général > Date et heure et activez ou désactivez l’option Réglage automatique. Réglage manuel de la date et de l’heure : Choisissez Général > Date et heure et dé- sactivez l’option Réglages automatiques. Touchez Fuseau horaire et saisissez le nom d’une ville principale située dans votre fuseau horaire. Touche le bouton de retour « Date et heure » puis touchez « Régler la date et l’heure » et saisissez la date et l’heure. Clavier Activation et désactivation des majuscules automatiques : Choisissez Général > Clavier et activez ou désactivez l’option Maj. automatiques. Par défaut, l’iPod touch capitalise automatiquement les mots lorsque vous tapez un signe de ponctuation terminant une phrase ou le caractère de retour à la ligne Activation et désactivation du verrouillage des majuscules : Choisissez Général > Clavier et activez ou désactivez l’option Maj. verrouillées. Si le verrouillage des majuscules est activé et que vous double-touchez la touche Maj du clavier, toutes les lettres que vous tapez sont en majuscules. La touche Maj devient bleue lorsque le verrouillage de majuscules est activé. Activation et désactivation du raccourci clavier « . » : Choisissez Général > Clavier et activez ou désactivez le raccourci « . ». Le raccourci « . » vous permet de double-toucher la barre d’espace pour saisir un point suivi d’un espace lors de la frappe. Il est activé par défaut.Activation et désactivation des claviers internationaux Choisissez Général > Claviers > Claviers internationaux et activez les claviers souhaités. Si plusieurs claviers sont activés, touchez pour basculer entre eux lorsque vous tapez du texte. Lorsque vous touchez le symbole, le nom du nouveau clavier actif apparaît brièvement. ªClaviers internationaux» à la page 25Voir la section “Claviers internationaux”. International Utilisez les réglages International pour définir la langue de l'iPod touch, activer ou dé- sactiver les claviers de différentes langues et régler les formats de date, d’heure et de numéro de téléphone pour votre région. Réglage de la langue de l’iPod touch : Choisissez Général > International > Langue, choisissez la langue souhaitée et touchez OK. Activation et désactivation des claviers internationaux Choisissez Général > International > Claviers internationaux et activez les claviers souhaités. Si plusieurs claviers sont activés, touchez pour basculer entre eux lorsque vous tapez du texte. Lorsque vous touchez le symbole, le nom du nouveau clavier actif apparaît brièvement.ªClaviers internationaux» à la page 25Voir la section “Claviers internationaux”. Réglage des formats de date, d’heure et de numéro de téléphone : Choisissez Général > International > Format régional, et choisissez votre région. Réinitialisation de l'iPod touch Réinitialisation de tous les réglages : Choisissez Général > Réinitialiser et touchez Réinitialiser les réglages réseau. Vos préférences et réglages sont tous réinitialisés. Les informations, telles que vos contacts, calendriers et les fichiers multimédias (musique et vidéo) ne sont pas supprimées. Effacer tout le contenu et les réglages : Connectez l’iPod touch à votre ordinateur ou à un adaptateur secteur. Choisissez Général > Réinitialiser et touchez « Effacer contenu et réglages ». Cette fonctionnalité réinitialise tous les réglages à leurs valeurs par défaut et supprime de manière définitive toutes vos informations et éléments multimédias de votre iPod touch en effaçant toutes les données stockées sur l’iPod touch. 102 Chapitre 7 RéglagesChapitre 7 Réglages 103 Important : Vous ne pouvez pas utiliser votre iPod touch pendant que les données sont en cours d’effacement. Cette opération peut prendre une à quatre heures ou plus en fonction de la capacité de stockage de votre iPod touch. Réinitialisation du dictionnaire clavier : Choisissez Général > Réinitialiser et touchez Réinitialiser le dictionnaire clavier. Vous ajoutez des mots au dictionnaire du clavier en rejetant les mots que l’iPod touch suggère lors de la frappe. Touchez un mot pour rejeter la correction et ajouter votre mot au dictionnaire de clavier. La réinitialisation du dictionnaire de clavier efface tous les mots que vous avez ajoutés. Réinitialisation des réglages réseau : Choisissez Général > Réinitialiser et touchez Réinitialiser les réglages réseau. Lorsque vous réinitialisez les réglages réseau, la liste des réseaux déjà utilisés et des réglages VPN est supprimée. Wi-Fi est désactivé puis réactivé : vous êtes alors déconnecté de tout réseau le cas échéant. Les réglages Wi-Fi et « Confirmer l’accès » restent activés. Réinitialisation de la disposition de l’écran principal : Choisissez Général > Réinitialiser et touchez Réinitialiser l’écran principal. Réinitialisation des alertes de localisation : Choisissez Général > Réinitialiser et touchez Réinitialiser alertes de localisation. Les alertes de localisation sont les demandes d’utilisation de Service de localisation effectuées par les applications (notamment Appareil et Plans). L'iPod touch arrête d’afficher l’alerte associée à une application la deuxième fois que vous touchez OK. Touchez Réinitialiser alertes de localisation pour reprendre l’utilisation des alertes. Musique Les réglages Musique s’appliquent aux morceaux, aux podcasts et aux livres audio. Réglage d’iTunes de manière à lire tous les morceaux au même niveau sonore : Dans iTunes, choisissez iTunes > Préférences si vous utilisez un Mac, ou Édition > Préférences si vous utilisez un PC, puis cliquez sur Lecture et sélectionnez Égaliseur de volume. Réglage de l’iPod touch de manière à utiliser les réglages de volume d’iTunes (Égaliseur de volume) :Choisissez Musique et activez l’option Égaliseur de volume. Vous pouvez augmenter la vitesse de lecture des livres audio pour de manière à les entendre plus rapidement, ou diminuer la vitesse de manière à les entendre plus clairement.Réglage de la vitesse de lecture des livres audio : Choisissez Musique > Vitesse livres audio puis choisissez lente, normale ou rapide. Utilisation de l’égaliseur pour modifier le son de l’iPod touch de manière à s’adapter à un son ou style donné : Choisissez Musique > Égaliseur et choisissez un réglage. Réglage d’une limite de volume pour la musique et les vidéos : Choisissez Musique > Volume maximum et faites glisser le curseur pour régler le volume maximum. Touchez Verrouiller le volume maximum pour affecter un code de manière à éviter que le réglage ne soit modifié. AVERTISSEMENT : Des informations importantes sur la prévention de la perte d’audition sont disponibles dans le Guide des informations importantes sur le produità la page www.apple.com/ca/fr/support/manuals/ipodtouch. Vidéo Les réglages vidéo s’appliquent au contenu vidéo, y compris les films loués. Vous pouvez régler à quel endroit reprendre la lecture des vidéos que vous avez démarrées auparavant, activer ou désactiver les sous-titres et régler l’iPod touch de manière à restituer les vidéos sur votre téléviseur. Réglage du point de reprise de lecture : Choisissez Vidéo > Démarrer, puis sélectionnez si vous souhaitez que les vidéos dont vous avez commencé la lecture reprennent au début ou à l’endroit où vous avez les avez interrompues. Activation et désactivation des sous-titres : Choisissez Vidéo et activez ou désactivez l’option Sous-titres codés. Utilisez ces réglages pour définir la manière dont l’iPod touch restitue les vidéos sur votre téléviseur. Pour plus de renseignements sur l’utilisation de l’iPod touch de manière à restituer des vidéos sur votre téléviseur, consultez la section ª» à la page 40. Activation et désactivation de l’écran large : Choisissez iPodVidéo et activez ou dé- sactivez l’option Écran large. Réglage du signal TV sur NTSC ou PAL : Choisissez iPodVidéo > Signal télévision et sélectionnez NTSC ou PAL. NTSC et PAL sont des normes de diffusion de télévision. NTSC affiche 480i et PAL affiche 576i. Votre téléviseur peut utiliser l’une ou l’autre de ces normes suivant l’endroit où il a été commercialisé. Si vous n’êtes pas sûr du réglage à utiliser, vérifiez la documentation qui accompagne votre téléviseur. 104 Chapitre 7 RéglagesChapitre 7 Réglages 105 Photos Utilisez les réglages Photos pour indiquer la façon dont les diaporamas affichent vos photos. Réglage de la durée d’affichage de chaque diapositive : Choisissez Photos > Afficher chaque photo pendant et sélectionnez la durée. Réglage d’un effet de transition : Choisissez Photos > Transition et sélectionnez un effet de transition. Réglage de la répétition des diaporamas : Choisissez Photos et activez ou désactivez la répétition. Réglage de l’apparition des photos par ordre aléatoire ou trié : Choisissez Photos et activez ou désactivez la lecture aléatoire. Mail, Contacts, Calendrier Utilisez les réglages Mail, Contacts, Calendrier pour configurer et personnaliser les comptes associés à votre iPod touch:  Microsoft Exchange  MobileMe  Google Mail  Carnet d’adresses Yahoo!, Mail  AOL  Autres systèmes de messagerie POP et IMAP Comptes La section Comptes vous permet de configurer des comptes sur votre iPod touch. Les réglages spécifiques qui apparaissent dépendent du type de compte que vous configurez. Votre prestataire de service ou administrateur système doit pouvoir vous fournir les informations nécessaires. Pour plus de renseignements sur l’ajout de comptes, consultez la section “Configuration de comptes”.ªConfiguration de comptes.» à la page 11 Modification des réglages d’un compte : Choisissez « Mail, Contacts, Calendrier », choisissez un compte puis effectuez les modifications souhaitées. Les modifications apportées aux réglages d’un compte ne sont pas synchronisées avec votre ordinateur. Vous pouvez donc configurer vos comptes pour qu’ils fonctionnent avec votre iPod touch sans toucher les réglages de compte sur votre ordinateur.Interruption de l’utilisation d’un compte : Choisissez « Mail, Contacts, Calendrier », choisissez un compte puis désactivez l’option Compte. Lorsqu’un compte est désactivé, l'iPod touch ne l’affiche pas, n’y envoie pas de courrier électronique et ne vérifie pas le courrier électronique associé et ne synchronise aucune autre information avec ce compte tant que vous ne le réactivez pas. Ajustement des réglages avancés : Choisissez « Mail, Contacts, Calendrier », choisissez un compte puis effectuez l’une des opérations suivantes :  Pour indiquer si les brouillons, les messages envoyés et les messages supprimés sont stockés sur l’iPod touch ou à distance sur votre serveur de messagerie (comptes IMAP uniquement), touchez Avancé et choisissez Brouillons, Messages envoyés ou Messages supprimés. Si vous stockez des messages sur l’iPod touch, vous pouvez alors les consulter même si l’iPod touch n’est pas connecté à Internet.  Pour régler la période après laquelle les messages sont supprimés de manière définitive de Mail sur votre iPod touch, touchez Avancé puis touchez Supprimer, puis choisissez une durée : Jamais, Après un jour, d’une semaine ou d’un mois.  Pour ajuster les réglages du serveur de messagerie, sous « Serveur de réception » ou « Serveur d’envoi », touchez Nom d’hôte, Nom d’utilisateur ou Mot de passe. Demandez les réglages appropriés à l’administrateur de votre réseau ou à votre fournisseur d’accès à Internet.  Pour ajuster les réglages SSL et de mot de passe, touchez Avancé. Demandez les réglages appropriés à l’administrateur de votre réseau ou à votre fournisseur d’accès à Internet. Suppression d’un compte de l’iPod touch: Choisissez « Mail, Contacts, Calendrier », choisissez un compte puis faites défiler vers le bas et touchez Supprimer le compte. La suppression d’un compte revient à supprimer l’accès au compte à partir de votre iPod touch. Tous les messages électroniques et les informations sur les contacts, calendriers et signets synchronisés avec le compte sont supprimés de l’iPod touch. Cependant, la suppression d’un compte n’élimine pas le compte ou les informations associées à ce compte de votre ordinateur. Mail Les réglages de Mail, sauf indication contraire, s’appliquent à tous les comptes configurés sur votre iPod touch. Réglage du nombre de messages affichés sur l’iPod touch: Choisissez « Mail, Contacts, Calendrier » > Afficher, puis choisissez un réglage. 106 Chapitre 7 RéglagesChapitre 7 Réglages 107 Pour les comptes Microsoft Exchange, choisissez le nombre de jours de courrier électronique que vous souhaitez télécharger. Pour tous les autres comptes, choisissez le nombre de messages récents à afficher (25, 50, 75,100 ou 200). Pour télécharger des messages supplémentaires, dans Mail, faites défiler vers le bas de votre boîte de réception et touchez « Télécharger...plus ». Réglage du nombre de lignes de chaque messages affichées en aperçu dans la liste de messages : Choisissez « Mail, Contacts, Calendrier » > Aperçu, puis choisissez un réglage. Vous pouvez choisir d’afficher jusqu’à cinq lignes de chaque message. Ainsi, vous pouvez vous faire une idée du contenu des messages mentionnés dans la liste d’une boîte à lettres. Réglage d’une taille de police minimale pour les messages : Choisissez « Mail, Contacts, Calendrier » > Taille des caractères, puis choisissez petite, moyenne, grande, très grande ou géante. Réglage de l’affichage par l’iPod touch des libellés À et Cc dans les listes de messages : Choisissez « Mail, Contacts, Calendrier » puis activez ou désactivez l’option Champs À / Cc. Si l’option Champs À / Cc est activée, l’icône To ou Cc à côté de chaque message d’une liste indique si le message vous a été directement envoyé ou si vous étiez en copie. Réglage de la confirmation de suppression de message sur l’iPod touch : Choisissez « Mail, Contacts, Calendrier » et activez ou désactivez l’option Confirmer suppression. Si l’option « Confirmer suppression » est activée, vous devez toucher , puis confirmer en touchant Supprimer. Réglage de l’envoi automatique de copie par l’iPod touch pour chaque message envoyé : Choisissez Mail, puis activez ou désactivez l’option M’ajouter en Cci. Réglage du compte de messagerie par défaut : Choisissez « Mail, Contacts, Calendrier » > Compte par défaut, puis choisissez un compte. Ce réglage détermine le compte à partir duquel est envoyé un message que vous créez sur une autre application iPod touch , par exemple lorsque vous envoyez une photo à partir de Photos or touchez l’adresse électronique d’un commerce dans Plans. Pour envoyer le message à partir d’un compte différent, touchez le champ De dans le message puis choisissez un autre compte.Ajout d’une signature à vos messages : Choisissez Mail > Signature, puis tapez une signature. Vous pouvez régler l’iPod touch de manière à ajouter une signature (par exemple votre citation favorite ou votre nom, position et numéro de téléphone) au bas de chaque message que vous envoyez. Contacts Réglage de l’ordre des contacts : Choisissez « Mail, Contacts, Calendrier » puis, sous Contacts, touchez Ordre de tri et effectuez l’une des opérations suivantes :  Pour afficher le prénom en premier, touchez Prénom Nom  Pour afficher le nom en premier, Touchez Nom, Prénom. Réglage de l’affichage des contacts : Choisissez « Mail, Contacts, Calendrier » puis, sous Contacts, touchez Ordre d’affichage et effectuez l’une des opérations suivantes :  Pour afficher le prénom en premier, touchez Prénom Nom.  Pour afficher le nom de famille en premier, touchez Nom Prénom. Calendrier Configuration des alarmes sonores déclenchées à la réception d’une invitation à une réunion : Choisissez « Mail, Contacts, Calendrier » et, sous Calendrier, touchez « Alerte nouv. invitation » pour activer l’option. Réglage de la période historique pendant laquelle les événements de calendrier sont affichés sur l’iPod touch : Choisissez « Mail, Contacts, Calendrier » > Synchroniser, puis choisissez une durée. Activation de la gestion de fuseau horaire dans Calendrier.Choisissez « Mail, Contacts, Calendrier » > Heure locale, puis activer l’option Heure locale. Pour sélectionner un fuseau horaire pour les calendriers, touchez Fuseau horaire et saisissez le nom d’une ville importante. Lorsque la gestion de fuseau horaire est activée, Calendrier affiche les dates et heures des événements dans le fuseau horaire de la ville sélectionnée. Lorsque la gestion de fuseau horaire est désactivée, Calendrier affiche les dates et heures des événements dans le fuseau local, tel qu’indiqué par l’heure réseau. Important : Lorsque vous êtes en déplacement, l’iPod touch peut ne pas afficher les événements ou faire sonner les alertes à la bonne heure locale. Pour régler manuellement l’heure correcte, consultez la section “Date et heure”.ªDate et heure» à la page 101 108 Chapitre 7 RéglagesChapitre 7 Réglages 109 Safari Les réglages Safari vous permettent de sélectionner votre moteur de recherche Internet, de régler les options de sécurité et (pour les développeurs), d’activer le mode débogage. Général Vous pouvez utiliser Google ou Yahoo! pour effectuer des recherches sur Internet. Sélection d’un moteur de recherche : Choisissez Safari > Moteur de recherche et sé- lectionnez le moteur de recherche que vous souhaitez utiliser. Sécurité Par défaut, Safari est réglé pour afficher des fonctions à partir du web, notamment certains films, animations et applications web. Vous pouvez désactiver certaines de ces possibilités afin de protéger l’iPod touch contre les risques liés à la sécurité sur Internet. Modification des réglages de sécurité : Choisissez Safari, puis effectuez l’une des opé- rations suivantes :  Pour activer ou désactiver JavaScript, activez ou désactivez l’option JavaScript. JavaScript permet aux développeurs web de contrôler les éléments de la page. Par exemple, une page qui utilise JavaScript pourrait afficher la date et l’heure actuelles ou faire qu’une page liée apparaisse dans une nouvelle fenêtre surgissante.  Pour activer ou désactiver les modules externes, activez ou désactivez l’option Modules. Les modules externes permettent à Safari de lire certains types de fichiers audio et vidéo et d’afficher des fichiers Microsoft Word et des documents Microsoft Excel.  Pour bloquer ou autoriser les pop-up, activez ou désactivez la fonction Bloquer les pop-up. Le blocage des pop-up empêche seulement l’apparition des fenêtres surgissantes qui apparaissent lorsque vous fermez une page ou ouvrez une page en tapant son adresse. Il ne bloque pas les pop-up qui apparaissent lorsque vous cliquez sur un lien.  Pour régler si Safari accepte les cookies, touchez Accepter les cookies et choisissez Jamais, des sites visités ou Toujours. Un cookie est un ensemble d’informations qu’un site web place sur l'iPod touch pour que le site web se souvienne de vous lors de votre prochaine visite.Les pages web peuvent ainsi être personnalisées pour vous en fonction des informations que vous pouvez avoir fournies. Certaines pages ne fonctionnent pas correctement tant que l’iPod touch n’est pas réglé pour accepter les cookies..  Pour effacer l’historique des pages web consultées, touchez Effacer l’historique.  Pour effacer les cookies de Safari, touchez Effacer les cookies. Pour effacer la mémoire cache, touchez Vider le cache. La mémoire cache du navigateur stocke le contenu des pages de manière qu’elles s’ouvrent plus rapidement la prochaine fois que vous le consultez. Si une page que vous avez ouverte n’affiche pas de nouveau contenu, l’effacement de la mémoire cache est susceptible d’aider. Développeur La Console peut vous aider à résoudre des erreurs de page web. Si elle est activée, la console apparaît automatiquement lorsqu’une erreur de page web se produit. Activation et désactivation de la console de débogage : Choisissez Safari > Développeur, et activez ou désactivez l’option Console. 110 Chapitre 7 Réglages111 Général L’image de batterie faible apparaît L’iPod touch n’est presque plus alimenté et doit être rechargé pendant un délai pouvant aller jusqu’à dix minutes avant de pouvoir l’utiliser. Pour plus de renseignements sur la recharge de l’iPod touch, consultez la section ªRecharge de la batterie.» à la page 28. ou L’iPod touch ne répond pas  La batterie de l’iPod touch est peut-être faible. Connectez l’iPod touch à votre ordinateur ou à son adaptateur secteur pour le recharger. Voir la section ªRecharge de la batterie.» à la page 28.  Appuyez sur le bouton principal et maintenez-le enfoncé pendant au moins six secondes jusqu’à ce que l’application que vous utilisiez se ferme.  Si cela ne fonctionne pas, éteignez l’iPod touch puis rallumez-le. Maintenez le bouton de veille/réactivation enfoncé, situé en haut de l’iPod touch pendant quelques secondes jusqu’à ce que le curseur rouge apparaisse, puis faites glisser le curseur. Maintenez ensuite le bouton de veille/réactivation enfoncé jusqu’à ce que le logo Apple apparaisse.  Si cela ne donne rien, réinitialisez l’iPod touch. Maintenez enfoncé les boutons de Marche/Veille et du menu principal pendant au moins dix secondes jusqu’à ce que le logo Apple apparaisse. A L’annexe Dépannage112 L’annexe A Dépannage L’iPod touch ne répond toujours pas après sa réinitialisation  Réinitialisez les réglages de l’iPod touch. Dans l’écran d’accueil, choisissez Réglages > Général > Réinitialiser > Réinitialiser tous les réglages. Toutes vos préférences sont réinitialisées mais vos données et fichiers multimédias ne sont pas supprimés.  Si cela ne donne rien, effacez tout contenu de l’iPod touch. Voir la section ªRéinitialisation de l'iPod touch» à la page 102.  Si cela reste sans effet, restaurez le logiciel de l’iPod touch. Voir la section ª» à la page 118. Le message « Cet accessoire n’est pas géré par l’iPod touch » apparaît. L’accessoire que vous avez connecté peut ne pas fonctionner avec l’iPod touch. Assurez-vous qu’aucun débris ne se trouve dans le connecteur Dock. L’écran Connectez-vous à iTunes apparaît L’L’iPod touch doit être enregistré auprès d’iTunes. Connectez l’iPod touch à votre ordinateur et ouvrez iTunes s’il ne s’est pas ouvert automatiquement. iTunes et synchronisation L’iPod touch n’apparaît pas dans iTunes ou vous ne parvenez pas à synchroniser  La batterie de l’iPod touch peut avoir besoin d’être rechargée. Pour plus de renseignements sur la recharge de l’iPod touch, consultez la section ªRecharge de la batterie.» à la page 28.  Déconnectez les autres appareils USB de votre ordinateur et connectez l’iPod touch à un autre port USB 2.0 de votre ordinateur (pas sur votre clavier).  Redémarrez votre ordinateur et reconnectez-y l’iPod touch.  Téléchargez et installez (ou réinstallez) la dernière version d’iTunes à partir de www.apple.com/ca/fr/itunes. La synchronisation ne fonctionne pas  La batterie de l’iPod touch peut avoir besoin d’être rechargée. Pour plus de renseignements sur la recharge de l’iPod touch, consultez la section ªRecharge de la batterie.» à la page 28.  Déconnectez les autres appareils USB de votre ordinateur et connectez l’iPod touch à un autre port USB 2.0 de votre ordinateur (pas sur votre clavier).  Redémarrez votre ordinateur et reconnectez-y l’iPod touch.  Téléchargez et installez (ou réinstallez) la dernière version d’iTunes à partir de www.apple.com/ca/fr/itunes.L’annexe A Dépannage 113 Les contacts, calendriers ou signets ne se synchronisent pas  Téléchargez et installez (ou réinstallez) la dernière version d’iTunes à partir de www.apple.com/ca/fr/itunes.  Si vous avez configuré un compte MobileMe ou Microsoft Exchange sur votre iPod touch, iTunes ne synchroniser pas les contacts, calendriers ou signets que vous configurez pour une synchronisation dans le volet de préférences Infos de l’iPod touch. Vous devez désactivez tous les éléments de MobileMe ou Exchange que vous ne souhaitez pas synchroniser par le biais d’iTunes. Dans Réglages, touchez « Mail, Contacts, Calendrier », touchez le compte MobileMe ou Exchange et désélectionnez les éléments que vous souhaitez synchroniser par le biais d’iTunes. Si vous avez à la fois un compte MobileMe et un compte Exchange, vous devez désélectionnez les éléments dans les deux comptes. Remarque : Lorsque vous désélectionnez Contacts ou Calendrier dans votre compte MobileMe ou Exchange, les informations sur le contact ou calendrier ne sont plus accessibles par le biais de l’iPod touch. Vous ne souhaitez pas synchroniser d’informations de l’iPod touch vers votre ordinateur Remplacez les contacts, calendriers, comptes de messagerie et signets sur l’iPod touch par les informations de votre ordinateur. Remplacement des informations présentes sur l’iPod touch : 1 Ouvrez iTunes. 2 Lorsque vous connectez l’iPod touch à votre ordinateur, maintenez enfoncées les touches Commande et Option (si vous utilisez un Mac) ou Maj et Contrôle (si vous utilisez un PC) jusqu’à l’apparition d’iPod touch dans la barre latérale d’iTunes. Cela empêche que l’iPod touch lance la synchronisation automatiquement. 3 Sélectionnez iPod touch dans la barre latérale iTunes puis cliquez sur l’onglet Infos. 4 Sous « Remplacer les informations sur cet iPod touch », sélectionnez Contacts, Calendriers, Comptes Mail ou Signets. Vous pouvez sélectionner plusieurs types d’informations, si vous le souhaitez. 5 Cliquez sur Appliquer. Les informations du type sélectionné sont supprimées de l’iPod touch et remplacées par le contenu de votre ordinateur. Lors de la prochaine synchronisation, l’iPod touch se synchronise normalement en ajoutant sur l’ordinateur les informations que vous avez enregistrées sur l’iPod touch et vice-versa.114 L’annexe A Dépannage Le carnet d’adresses Yahoo! ou Google ne se synchronise pas Il est possible qu’iTunes ne puisse se connecter à Yahoo! ou Google. Assurez-vous d’être connecté à Internet et que vous avez saisi l’identifiant et le mot de passe corrects dans iTunes. Connectez l’iPod touch à votre ordinateur, cliquez sur l’onglet Infos dans iTunes, cliquez sur Configurer dans la section Contacts, puis saisissez votre identifiant et votre mot de passe actuels. Le carnet d’adresses Yahoo! contient toujours des contacts supprimés à partir de l’iPod touch Le carnet d’adresses Yahoo! ne permet pas la suppression par synchronisation de contacts contenant un identifiant Messenger. Pour supprimer un contact contenant un identifiant Messenger, ouvrez une session sur votre compte Yahoo! en ligne et supprimez le contact à l’aide du carnet d’adresses Yahoo!. Safari, Mail et Contacts Une pièce jointe ne s’ouvre pas Le type de fichier peut ne pas être géré. L’iPod touch gère les formats de fichiers suivants pour les pièces jointes : .doc Microsoft Word .docx Microsoft Word (XML) .htm page web .html page web .key Keynote .numbers Numbers .pages Pages .pdf Preview, Adobe Acrobat .ppt Microsoft PowerPoint .pptx Microsoft PowerPoint (XML) .txt texte .vcf coordonnées .xls Microsoft Excel .xlsx Microsoft Excel (XML)L’annexe A Dépannage 115 Le courrier ne peut être livré (délai d’inactivité atteint sur le port 25) Il peut être nécessaire de modifier le réglage de port du serveur de messagerie sortant de l’un de vos comptes de messagerie. Pour plus de renseignements, accédez à la page www.apple.com/ca/fr/support/ipodtouch et recherchez « Je peux recevoir du courrier sur l’iPod touch mais pas en envoyer ». Les contacts GAL n’apparaissent pas Vérifiez vos réglages Microsoft Exchange pour vous assurer de contacter le bon serveur. Dans Réglages, touchez « Mail, Contacts, Calendrier » et choisissez un compte pour afficher ses réglages. Si vous essayez de chercher des contacts GAL dans Contacts, touchez Groupes puis Annuaires au bas de la liste. Son, musique et vidéo Pas de son  Débranchez et reconnectez vos écouteurs. Assurez-vous que le connecteur est bien enfoncé.  Vérifiez que le volume n’est pas complètement coupé.  Il est possible que la musique sur l’iPod touch soit en pause. À partir de l’écran d’accueil, toucher Musique, toucher À l’écoute puis toucher .  Vérifiez si la limite du volume est activée. Dans l’écran d’accueil, choisissez Réglages > iPod > Volume maximum. Pour plus de renseignements, consultez la section ªMusique» à la page 103.  Assurez-vous que vous utilisez la dernière version d’iTunes (accédez à www.apple.com/ca/fr/itunes).  Si vous utilisez le port de sortie audio de la station d’accueil en option, assurez-vous que votre stéréo ou vos enceintes externes sont sous tension et fonctionnent. Un morceau, une vidéo ou autre ne fonctionne pas Le morceau a peut-être été encodé dans un format que l’iPod touch ne prend pas en charge. Les formats de fichier audio suivants sont pris en charge par l’iPod touch. Ils englobent les formats de livres audio et de podcasts :  AAC (M4A, M4B, M4P, jusqu’à 320 Kbps)  Apple Lossless (format compressé de haute qualité)  MP3 (jusqu’à 320 Kbps)  MP3 VBR (Variable Bit Rate, débit binaire variable)  WAV  AA (texte parlé audible.com, formats 2, 3 et 4)116 L’annexe A Dépannage  AAX (texte parlé audible.com, format AudibleEnhanced)  AIFF Les formats de fichier vidéo suivants sont pris en charge par l’iPod touch :  H.264 (profil de base de niveau 3.0)  MPEG-4 (profil simple) Un morceau encodé au format Apple Lossless présente un son de qualité CD optimale, mais n’occupe que la moitié environ de l’espace utilisé par un morceau encodé au format AIFF ou WAV. Un même titre encodé au format AAC ou MP3 occupe encore moins d’espace. Lors de l’importation de musique à partir d’un CD à l’aide d’iTunes, le son est converti par défaut au format AAC. iTunes pour Windows vous permet de convertir les fichiers WMA non protégés au format AAC ou MP3. Cela peut s’avérer utile si vous disposez d’une bibliothèque de musique encodée au format WMA. L’iPod touch ne gère pas les fichiers audio WMA, MPEG Layer 1, MPEG Layer 2 ni les fichiers audible.com format 1. Si vous possédez dans votre bibliothèque iTunes un morceau ou une vidéo non pris en charge par l’iPod touch, il se peut que la conversion dans un format que l’iPod touch prend en charge vous soit possible. Reportez-vous à l’Aide iTunes pour en savoir plus. iTunes Store L’iTunes Wi-Fi Music Store n’est pas disponible Pour pouvoir utiliser l’iTunes Wi-Fi Music Store, vous devez accéder à un réseau Wi-Fi connecté à Internet à l’aide de votre iPod touch. Pour plus de renseignements, consultez la section ªAccès à un réseau Wi-Fi» à la page 28. Le magasin en ligne iTunes Wi-Fi Music Store n’est pas disponible dans tous les pays. Impossible d’acheter de la musique ou des applications Pour acheter des morceaux à partir de l’iTunes Wi-Fi Music Store (seulement disponible dans certains pays) ou des applications à partir de l’App Store, vous devez disposer d’un compte iTunes Store. Ouvrez iTunes sur votre ordinateur et choisissez Store > Créer un compte. Sauvegarde de l’iPod touch iTunes crée des sauvegarde des réglages, applications téléchargées et autres informations sur l’iPod touch. Vous pouvez utiliser une sauvegarde pour restaurer ces éléments sur votre iPod touch après une restauration de logiciel ou pour transférer les informations sur un autre iPod touch.L’annexe A Dépannage 117 La sauvegarde d’un iPod touch et sa restauration à partir d’une sauvegarde sont des opération différentes de la synchronisation de contenu et d’autres éléments (notamment musique, podcasts, sonneries, photos, vidéos et applications téléchargés via iTunes) avec votre bibliothèque iTunes. Les sauvegardes comprennent les réglages, applications téléchargées et autres informations qui résident sur l’iPod touch. Vous pouvez restaurer ces éléments à partir d’une sauvegarde à l’aide d’iTunes, mais vous pouvez également devoir synchroniser à nouveau le contenu de votre bibliothèque iTunes. Création de sauvegardes Il est possible de créer des sauvegardes par l’une des manières suivantes :  Une fois que l’iPod touch a été configuré pour se synchroniser avec un ordinateur donné, iTunes effectue automatiquement une sauvegarde de l’iPod touch sur cet ordinateur lorsque vous effectuez une synchronisation. iTunes ne sauvegarde pas autoamtiquement un iPod touch non configuré pour se synchroniser avec cet ordinateur. Si vous avez configuré l’iPod touch pour se synchroniser automatiquement avec iTunes sur un ordinateur donné, iTunes sauvegarde l’iPod touch chaque fois que vous le connectez à cet ordinateur. La synchronisation automatique est activée par défaut. iTunes n’effectue qu’une sauvegarde à chaque connexion, même si vous effectuez plus synchronisations avant de vous déconnecter.  Si vous choisissez de mettre à jour le logiciel de l’iPod touch, iTunes sauvegarde automatiquement l’iPod touch même s’il n’est pas configuré pour se synchroniser avec iTunes sur cet ordinateur.  Si vous choisissez de restaurer le logiciel de l’iPod touch, iTunes vous demande si vous souhaitez sauvegarder l’iPod touch avant la restauration. Restauration à partir d’une sauvegarde Vous pouvez restaurer les réglages, les applications téléchargées et d’autres informations à partir d’une sauvegare, ou utiliser cette fonctionnalité pour transférer les élé- ments en question vers un autre iPod touch. Restauration de l’iPod touch à partir d’une sauvegarde : 1 Connectez l’iPod touch à l’ordinateur avec lequel vous synchronisez habituellement. 2 Dans iTunes, sélectionnez iPod touch dans la barre latérale puis cliquez sur l’onglet Résumé. 3 Cliquez sur Restaurer pour réinstaller le logiciel de l’iPod touch, restaurer ses réglages par défaut et supprimer les données qui sont stockées sur l’iPod touch. Dans iTunes 7.7, vous pouvez également restaurer à partir d’une sauvegarde sans supprimer les données stockées sur l’iPod touch.118 L’annexe A Dépannage Remarque : Les données supprimées ne sont plus accessibles via l’interface utilisateur de l’iPod touch, mais elles ne sont pas effacées de manière définitive de votreiPod touch jusqu’à ce qu’elles soient écrasées par des données nouvelles. Pour plus de renseignements sur la manière d’effacer de manière définitive tout le contenu et les réglages, voir la section ªRéinitialisation de l'iPod touch» à la page 102. À l’invite, sélectionnez l’option de restauration de vos réglages, applications téléchargées et autres informations à partir d’une sauvegarde et sélectionnez la sauvegarde que vous souhaitez utiliser. Les sauvegardes multiples sont énumérées par appareil en ordre chronologique, la plus récente sauvegarde pour un appareil apparaissant en premier. Suppression d’une sauvegarde Vous pouvez supprimer une sauvegarde de l’iPod touch à partir de la liste des sauvegardes dans iTunes version 7.5 ou ultérieure. Vous pouvez par exemple utiliser cette fonction si une sauvegarde a été créée sur l’ordinateur de quelqu’un d’autre. Suppression d’une sauvegarde : 1 Dans iTunes, ouvrez les préférences iTunes.  Windows : Choisissez Édition > Préférences.  Mac : Choisissez iTunes > Préférences. 2 Cliquez sur Synchronisation (l’iPod touch n’a pas besoin d’être connecté). 3 Sélectionnez la sauvegarde que vous souhaitez supprimer et cliquez sur Supprimer la sauvegarde. 4 Confirmez que vous souhaitez supprimer la sauvegarde sélectionnée en cliquant sur Supprimer la sauvegarde. 5 Cliquez sur OK pour fermer la fenêtre de préférences iTunes. Pour plus de renseignements sur les sauvegardes, notamment sur les réglages et autres informations stockées dans une sauvegarde, consultez l’article support.apple. com/kb/HT1766?viewlocale=fr_FR.L’annexe A Dépannage 119 Mise à jour et restauration du logiciel de l’iPod touch Vous pouvez utilisez iTunes pour mettre à jour ou réinstaller le logiciel de l’iPod touch, restaurer les réglages par défaut et supprimer toutes les données de l’iPod touch.  Si vous effectuez une mise à jour, le logiciel de l’iPod touch est mis à jour mais vos applications téléchargées, réglages et morceaux ne sont pas touchés.  Si vous effectuez une restauration, la dernière version du logiciel de l’iPod touch est réinstallée, les réglages par défauts restaurés et les données stockées sur l’iPod touch supprimées, y compris les applications téléchargées, morceaux, vidéos, contacts, photos, informations de calendrier ainsi que toutes les autres données. Dans iTunes 7.7, vous pouvez également restaurer à partir d’une sauvegarde sans supprimer les données stockées sur l’iPod touch. Remarque : Les données supprimées ne sont plus accessibles via l’interface utilisateur de l’iPod touch, mais elles ne sont pas effacées de manière définitive de votreiPod touch jusqu’à ce qu’elles soient écrasées par des données nouvelles. Pour plus de renseignements sur la manière d’effacer de manière définitive tout le contenu et les réglages, voir la section ªRéinitialisation de l'iPod touch» à la page 102. Mise à jour ou restauration de l’iPod touch : 1 Assurez-vous que vous disposez d’une connexion Internet et avez installé la dernière version d’iTunes depuis l’adresse www.apple.com/ca/fr/itunes. 2 Connectez l’iPod touch à votre ordinateur. 3 Sélectionnez iPod touch dans la barre latérale d’iTunes et cliquez sur l’onglet Résumé. 4 Cliquez sur « Rechercher les mises à jour ». iTunes vous indique alors si une version plus récente du logiciel de l’iPod touch est disponible. 5 Cliquez sur Mettre à jour pour installer la dernière version en date du logiciel Vous pouvez également cliquer sur Restaurer pour effectuer une restauration. Suivez les instructions à l’écran pour terminer le processus de restauration. Pour plus de renseignements sur la mise à jour et la restauration du logiciel de l’iPod touch, consultez l’article http://support.apple.com/kb/HT1414.120 L’annexe A Dépannage Fonctions d’accessibilité de l’iPod touch Les fonctions suivantes peuvent vous faciliter l’usage de l’iPod touch si vous avez un handicap. Sous-titres codés Si des vidéos prévoient le sous-titrage codé, vous pouvez activer la fonction. Voir la section ªVidéo» à la page 104. Taille minimale de police pour les messages Mail Vous pouvez définir une taille de police minimale pour le texte composant les courriers électroniques sur la taille Grande, Très grande ou Géante pour en améliorer la lisibilité. Voir la section ªMail» à la page 106. Zoom Double-touchez ou pincez des pages web, des photos et des cartes pour les agrandir. Voir la section ªZoom avant ou arrière» à la page 23. Accès universel sous Mac OS X Tirez parti des fonctionnalités d’accès universel de Mac OS X lorsque vous utilisez iTunes pour synchroniser des données de votre bibliothèque iTunes avec votre iPod touch. Dans le Finder, choisissez Aide > Aide Mac, puis recherchez « accès universel ». Pour plus de renseignements sur les fonctions d’accessibilité de l’iPod touch, consultez la page www.apple.com/fr/accessibility.121 Informations relatives à la sécurité, au logiciel et au service après-vente Le tableau suivant explique où obtenir plus d’informations sur l’iPod touch en matière de sécurité, de logiciel et de service après-vente. Pour en savoir plus sur : Procédez ainsi L’usage de l’iPod touch en toute sécurité Des renseignements récents importants sur la sécurité et la réglementation sont disponibles dans le Guide des informations importantes sur le produit à la page www.apple.com/ca/fr/support/manuals/ipodtouch. iPod touch : conseils en matière de service après-vente et d’assistance, forums de discussion et téléchargements de logiciels Apple Consultez la page www.apple.com/ca/fr/support/ipodtouch. Les toutes dernières informations sur l’ iPod touch Consultez la page www.apple.com/ca/fr/ipodtouch. L’utilisation d’iTunes Ouvrez iTunes et choisissez Aide > Aide iTunes. Un didacticiel iTunes en ligne se trouve à la page www.apple.com/ca/fr/support/itunes. (non disponible partout). MobileMe Accédez à la page www.me.com/fr. L’utilisation d’iPhoto sous Mac OS X Ouvrez iPhoto et choisissez Aide > Aide iPhoto. L’utilisation de Carnet d’adresses sous Mac OS X Ouvrez Carnet d’adresses et choisissez Aide > Aide de Carnet d’adresses. L’utilisation d’iCal sous Mac OS X Ouvrez iCal et choisissez Aide > Aide iCal. Microsoft Outlook, Carnet d’adresses Windows, Adobe Photoshop Album et Adobe Photoshop Elements Consultez la documentation fournie avec ces applications. B L’annexe Autres ressources122 L’annexe B Autres ressources Pour en savoir plus sur : Procédez ainsi L’obtention du service assuré par la garantie Commencez par suivre les conseils prodigués dans ce guide et dans les ressources en ligne. Accédez alors à www.apple.com/ca/fr/support ou consultez le Guide des informations importantes sur le produit à la page www.apple.com/ca/fr/support/manuals/ipodtouch. Utilisation de l’iPod touch dans un contexte d’entreprise Accédez à la page www.apple.com/fr/iphone/enterprise. Guide de l’utilisateur optimisé pour iPod touch Le Guide de l’utilisateur de l’iPod touch, optimisé pour un affichage sur l’iPod touch, est disponible à la page: http://help.apple.com/ipodtouchK © 2008 Apple Inc. Tous droits réservés. Apple, le logo Apple, AirPort, Cover Flow, FireWire, iCal, iPhoto, iPod, iTunes, Keynote, Mac, Macintosh, Mac OS, Numbers, Pages et Safari sont des marques d'Apple Inc., déposées aux États-Unis et dans d'autres pays. Finder, iPhone, Multi-Touch et Shuffle sont des marques d'Apple Inc. iTunes Store est une marque de service d'Apple Inc., déposée aux États-Unis et dans d'autres pays. MobileMe est une marque de service d'Apple Inc. Adobe et Photoshop sont des marques ou des marques déposées d’Adobe Systems Incorporated, aux États-Unis et/ou dans d’autres pays. Finder, Safari et Shuffle sont des marques d’Apple Inc. Adobe et Photoshop sont des marques ou des marques déposées d’Adobe Systems Incorporated aux États-Unis et/ou dans d’autres pays. Les autres noms de produits et d’entreprises mentionnés dans le présent document peuvent être des marques de leurs propriétaires respectifs. Tout arrangement, accord ou garantie, le cas échéant, s’applique directement entre le revendeur et les utilisateurs potentiels. La mention de produits tiers n’est effectuée qu’à des fins informatives et ne constitue en aucun cas une approbation ni une recommandation. Apple n’assume aucune responsabilité vis-à-vis des performances ou de l’utilisation de ces produits. Apparatus Claims des États-Unis Brevets numéro L’ingénierie inverse et le désassemblage sont interdits. C019-1261/2008-07 Félicitations, vous et votre MacBook Pro étiez faits l’un pour l’autre.Dites bonjour à votre MacBook Pro. www.apple.com/fr/macbookpro finder Finder Parcourez vos fichiers de la même manière que vous naviguez parmi vos morceaux de musique avec Cover Flow. Aide Mac Caméra iSight intégrée avec iChat Discutez en vidéo avec vos amis et votre famille, où qu’ils soient dans le monde. Aide Mac isight MacBook Pro Trackpad Multi-Touch Faites défiler des fichiers, ajustez des images et agrandissez du texte rien qu’avec vos doigts. Aide Mac trackpad Pincez et agrandissez Faites pivoter Faites défiler Feuilletez Cliquez n’importe oùTime Machine Sauvegardez et restaurez automatiquement vos fichiers. Aide Mac Spotlight Trouvez tout ce que vous recherchez sur votre Mac. Aide Mac time machine spotlight Safari Profitez pleinement du web grâce au navigateur le plus rapide du monde. Aide Mac safari Coup d’œil Prévisualisez vos fichiers en un clin d’œil. Aide Mac Mac OS X Snow Leopard www.apple.com/fr/macosx iLife ’11 www.apple.com/fr/ilife iPhoto Vos clichés avec ce quelque chose en plus. Aide iPhoto iMovie Vos films époustouflants en quelques minutes. Aide iMovie GarageBand Créez facilement un morceau au son peaufiné. Aide GarageBand coup d’œil photos film enregistrementTable des matières 5 Chapitre 1 : Prêt, feu, configurez ! 9 Contenu de la boîte 9 Configuration du MacBook Pro 17 Extinction ou suspension d’activité de votre MacBook Pro Chapitre 2 : Votre MacBook Pro au quotidien 20 Caractéristiques de base de votre MacBook Pro 22 Fonctionnalités du clavier de votre MacBook Pro 24 Ports présents sur votre MacBook Pro 26 Utilisation du trackpad Multi-Touch 30 Utilisation de la batterie du MacBook Pro 32 Comment obtenir des réponses à vos doutes Chapitre 3 : Améliorez les performances de votre MacBook Pro 39 Remplacement du disque dur 47 Installation de mémoire supplémentaire Table des matières6 Table des matières Chapitre 4 : À tout problème sa solution 55 Problèmes vous empêchant d’utiliser votre MacBook Pro 59 Utilisation d’Apple Hardware Test 60 Problèmes de connexion à Internet 63 Problèmes de communication sans fil avec AirPort Extreme 64 Maintien à jour de vos logiciels 65 Réinstallation des logiciels fournis avec le MacBook Pro 66 Utilisation d’Utilitaire de disque 67 Informations, services et assistance 70 Localisation du numéro de série de votre produit Chapitre 5 : Dernières recommandations 72 Informations importantes concernant la sécurité 75 Informations importantes sur la manipulation 78 Ergonomie 80 Apple et l’environnement 81 Regulatory Compliance InformationAide Mac Assistant migration www.apple.com/fr/macbookpro Prêt, feu, configurez ! 18 Chapitre 1 Prêt, feu, configurez ! Le MacBook Pro est conçu pour être configuré rapidement et utilisé immédiatement. Si vous n’avez jamais utilisé de MacBook Pro ou si vous n’êtes pas familiarisé avec les ordinateurs Macintosh, vous trouverez dans ce chapitre des instructions qui vous aideront à débuter. Important : lisez attentivement toutes les instructions d’installation (et les consignes de sécurité à partir de la page 71) avant d’utiliser votre ordinateur pour la première fois. Si vous êtes un utilisateur expérimenté, peut-être êtes-vous déjà en mesure d’utiliser votre nouvel ordinateur. Veillez néanmoins à consulter les informations du Chapitre 2, « Votre MacBook Pro au quotidien », pour découvrir les nouvelles fonctionnalités de ce MacBook Pro. Vous trouverez la plupart des réponses à vos questions dans l’Aide Mac. Pour en savoir plus sur l’utilisation de l’Aide Mac, consultez la rubrique « Comment obtenir des réponses à vos doutes » à la page 32. Comme Apple publie régulièrement de nouvelles versions et mises à jour de ses logiciels système, il est possible que les images de ce manuel soient légèrement différentes de ce que vous voyez à l’écran.Chapitre 1 Prêt, feu, configurez ! 9 Contenu de la boîte Adaptateur secteur Câble secteur MagSafe de 85 W ® Configuration du MacBook Pro Le MacBook Pro est conçu pour être configuré rapidement et utilisé immédiatement. Les pages suivantes contiennent des informations qui vous guideront tout au long du processus de configuration, notamment des opérations suivantes :  Le branchement de l’adaptateur secteur MagSafe 85 W.  Le branchement des câbles et l’accès à un réseau.  La mise sous tension du MacBook Pro et l’utilisation du trackpad.  La configuration d’un compte d’utilisateur et d’autres paramètres via Assistant réglages.  La configuration des préférences et du bureau Mac OS X.10 Chapitre 1 Prêt, feu, configurez ! Important : retirez le film protecteur qui entoure l’adaptateur secteur MagSafe 85 W avant de configurer le MacBook Pro. Étape 1 : Branchez l’adaptateur secteur MagSafe 85 W pour alimenter le MacBook Pro et recharger sa batterie. Assurez-vous que la fiche CA est complètement insérée dans l’adaptateur et que les broches de la fiche sont complètement déployées. Branchez la fiche CA de votre adaptateur sur une prise secteur, puis branchez le connecteur MagSafe sur le port secteur MagSafe. En approchant le connecteur MagSafe du port, vous ressentirez la force d’un aimant l’attirant. Connecteur MagSafe Câble secteur Fiche CA ¯ Port secteur MagSafe Pour rallonger le câble de l’adaptateur secteur, remplacez la fiche CA par le câble d’alimentation secteur. Tirez d’abord sur la fiche CA pour la retirer de l’adaptateur, puis branchez le câble d’alimentation secteur inclus sur l’adaptateur, en vous assurant que tout est branché correctement.Chapitre 1 Prêt, feu, configurez ! 11 Lorsque vous déconnectez l’adaptateur secteur d’une prise de courant ou de l’ordinateur, débranchez la prise et non le câble. La première fois que vous branchez l’adaptateur secteur sur le MacBook Pro, la lampe témoin du connecteur MagSafe s’allume. Si la lumière est orange, la batterie est en cours de rechargement. Une lampe témoin verte indique que la batterie est complètement chargée. Si aucune lumière ne s’allume, assurez-vous que le connecteur est correctement branché et que l’adaptateur secteur est branché sur une prise de courant. Étape 2 : Connectez-vous à un réseau sans fil ou câblé.  Pour utiliser un réseau sans fil à l’aide de la technologie intégrée AirPort Extreme, assurez-vous que la borne d’accès sans fil est activée et que vous disposez du nom du réseau. Après avoir allumé votre MacBook Pro, l’Assistant réglages vous guide à travers le processus de connexion. Pour obtenir des conseils de dépannage, consultez la page 63.  Pour utiliser une connexion câblée, reliez votre MacBook Pro et un modem câble, un modem DSL ou un réseau à l’aide d’un câble Ethernet.12 Chapitre 1 Prêt, feu, configurez ! ® Câble Ethernet Port Ethernet Gigabit (10/100/1000Base-T) GChapitre 1 Prêt, feu, configurez ! 13 Étape 3 : Appuyez brièvement sur le bouton d’alimentation (®) pour allumer votre MacBook Pro. Votre ordinateur émet un signal sonore lorsque vous l’allumez. ® ® Bouton d’alimentation Le démarrage du MacBook Pro prend quelques instants. Après le démarrage, Assistant réglages s’ouvre automatiquement. Si votre MacBook Pro ne s’allume pas, consultez la rubrique « Si votre MacBook Pro ne s’allume ou ne démarre pas » à la page 57.14 Chapitre 1 Prêt, feu, configurez ! Étape 4 : Configurez votre MacBook Pro à l’aide d’Assistant réglages La première fois que vous démarrez votre MacBook Pro, l’Assistant réglages se met en route. Il vous aide à saisir les informations de connexion à Internet et au courrier électronique ainsi qu’à configurer un compte d’utilisateur sur votre MacBook Pro. Si vous possédez déjà un ordinateur Macintosh, l’Assistant réglages peut vous aider à transférer automatiquement les fichiers, les applications et d’autres informations de votre ancien ordinateur par une connexion Ethernet ou une connexion sans fil. Consultez la rubrique suivante, « Migration d’informations vers votre MacBook Pro », pour en savoir plus. Si vous ne comptez pas conserver ou utiliser votre autre Mac, il est préférable de lui retirer son autorisation à lire la musique, les clips vidéo ou les livres audio achetés sur l’iTunes Store. Le retrait de l’autorisation d’un ordinateur empêche la lecture par un tiers de tout morceau, vidéo ou livre audio acheté et permet de libérer l’autorisation afin qu’elle puisse être utilisée. Pour en savoir plus sur le retrait de l’autorisation d’accès, choisissez Aide iTunes dans le menu Aide d’iTunes.Chapitre 1 Prêt, feu, configurez ! 15 Migration d’informations vers votre MacBook Pro Vous pouvez suivre les invites de l’Assistant réglages pour effectuer la migration des comptes d’utilisateurs, fichiers, applications existant(e)s, et d’autres informations à partir d’un autre Mac. Pour cela, procédez de l’une des manières suivantes :  Utilisez un câble FireWire pour brancher les deux ordinateurs ensemble et transférer les informations  Utilisez un câble Ethernet reliant directement les deux ordinateurs, ou connectez ces derniers au même réseau  Sans câble, directement entre les deux ordinateurs, ou en ayant les deux ordinateurs sur le même réseau sans fil Avant de procéder à la migration, faites une Mise à jour de logiciels sur votre autre Mac. Assurez-vous que ce dernier possède une des versions suivantes de Mac OS X : Mac OS X 10.4.11 ou Mac OS X 10.5.6 (ou ultérieur). Vous pouvez choisir les éléments (comptes d’utilisateur, documents, séquences, musique, photos, etc.) dont vous souhaitez effectuer la migration sur votre MacBook Pro. Important : n’utilisez pas l’autre Mac tant que la migration n’est pas terminée. Si vous n’utilisez pas l’Assistant réglages pour transférer vos informations lors du premier démarrage de l’ordinateur, vous pouvez le faire ultérieurement. Si la connexion est interrompue pendant la migration, vous pouvez reprendre cette dernière ultérieurement en vous servant de l’Assistant migration de votre MacBook Pro et de l’autre Mac. Allez dans le dossier Applications, ouvrez le dossier Utilitaires, puis double-cliquez sur Assistant migration.16 Chapitre 1 Prêt, feu, configurez ! Étape 5 : Personnalisez le bureau Mac OS X et définissez les préférences. Barre des menus Menu Aide Icône de recherche Spotlight Icône du Finder Dock Icône Préférences SystèmeChapitre 1 Prêt, feu, configurez ! 17 Vous pouvez rapidement personnaliser le bureau à l’aide des Préférences Système. Choisissez le menu Pomme () > Préférences Système dans la barre des menus ou cliquez sur l’icône Préférences Système dans le Dock. Les Préférences Système constituent votre centre de commande pour la plupart des réglages de votre MacBook Pro. Pour en savoir plus, ouvrez l’Aide Mac et recherchez « Préférences Système » ou la préférence que vous souhaitez modifier. Extinction ou suspension d’activité de votre MacBook Pro Lorsque vous avez terminé de travailler avec le MacBook Pro, suspendez son activité ou éteignez-le. Suspension de l’activité de votre MacBook Pro Suspendez l’activité de votre MacBook Pro si vous ne comptez vous en éloigner que quelques instants. Vous pourrez ensuite le réactiver rapidement sans avoir à le redémarrer. Pour suspendre l’activité de votre MacBook Pro, procédez de l’une des manières suivantes :  Rabattez l’écran.  Choisissez le menu Pomme () > Suspendre l’activité dans la barre des menus.  Appuyez sur le bouton d’alimentation (®) et cliquez sur Suspendre l’activité dans la zone de dialogue qui apparaît.  Choisissez le menu Pomme () > Préférences Système, cliquez sur Économiseur d’énergie, puis définissez un délai pour la suspension d’activité.18 Chapitre 1 Prêt, feu, configurez ! AVIS : patientez quelques secondes jusqu’à ce que la lampe témoin de suspension d’activité clignote (signalant que l’activité de l’ordinateur est suspendue et que le disque dur a cessé de tourner) avant de déplacer le MacBook Pro. Tout déplacement de votre ordinateur lorsque le disque dur est en train de tourner risque d’endommager ce dernier et d’entraîner une perte de données ou l’impossibilité de démarrer à partir du disque dur. Pour réactiver le MacBook Pro :  Si l’écran est fermé, il suffit de l’ouvrir pour réactiver le MacBook Pro.  Si l’écran est déjà ouvert, appuyez sur le bouton d’alimentation (®) ou sur l’une des touches du clavier. À la réactivation de votre MacBook Pro, vos applications, vos documents et vos réglages sont conservés tels que vous les aviez laissés. Extinction de votre MacBook Pro Si vous ne comptez pas utiliser votre MacBook Pro pendant deux jours ou plus, il est préférable de l’éteindre. La lampe témoin de suspension d’activité reste allumée quelques instants au moment de l’extinction. Pour éteindre le MacBook Pro, procédez de l’une des manières suivantes : m Choisissez le menu Pomme () > Éteindre dans la barre des menus. m Appuyez sur le bouton d’alimentation (®) et cliquez sur Éteindre dans la zone de dialogue qui apparaît. Si vous comptez ranger votre MacBook Pro pour une durée prolongée, consultez la rubrique « Informations importantes sur la manipulation » à la page 75 pour obtenir des informations sur les mesures à prendre pour éviter que votre batterie ne se décharge complètement.Aide Mac Mac OS X www.apple.com/fr/macosx Votre MacBook Pro au quotidien 220 Chapitre 2 Votre MacBook Pro au quotidien Caractéristiques de base de votre MacBook Pro ® ® Bouton d’alimentation Lampe témoin de la caméra Caméra iSight Haut-parleurs stéréo integrés Lampes témoins de la batterie (côté) Microphone Lampe témoin de suspension d’activité Récepteur à infrarouge Trackpad Lecteur optique à chargement par fente Logement de sécuritéChapitre 2 Votre MacBook Pro au quotidien 21 Caméra iSight intégrée et lampe témoin Cette caméra permet d’organiser des vidéoconférences à l’aide de l’application iChat, de prendre des photos à travers Photo Booth ou de capturer de la vidéo avec iMovie. La lampe témoin brille lorsque la caméra fonctionne. Micro intégré Capturez des sons grâce au micro (situé au-dessus de la touche Échap de votre clavier) ou discutez avec des amis en direct et en haut débit à l’aide de l’application iChat incluse. Haut-parleurs stéréo intégrés Permettent d’écouter de la musique, des films, des jeux et d’autres types de données multimédias. Batterie intégrée et témoins de la batterie Utilisez la batterie lorsque vous n’êtes pas à proximité d’une prise de courant. Appuyez sur le bouton de la batterie pour activer les lampes témoins du niveau de charge. Trackpad Vous pouvez cliquer ou double-cliquer n’importe où sur le trackpad. Touchez le trackpad avec un ou plusieurs doigts pour déplacer le pointeur ou utiliser les gestes Multi-Touch (décrits à la page 26). Lampe témoin de suspension d’activité Une lumière blanche clignote lorsque le MacBook Pro est en suspension d’activité. Récepteur à infrarouge Associé à une télécommande Apple Remote (disponible séparément), le récepteur à infrarouge vous permet de contrôler, jusqu’à une distance de 9,1 mètres, les applications Front Row et Keynote sur votre MacBook Pro. Logement de sécurité Ce logement vous permet de protéger votre ordinateur contre le vol en y fixant un cadenas et un câble (disponible séparément). SuperDrive à chargement par fente Ce lecteur optique permet de lire et de graver des CD et DVD de taille standard.22 Chapitre 2 Votre MacBook Pro au quotidien ® Bouton d’alimentation Permet d’allumer, d’éteindre ou de suspendre l’activité du MacBook Pro. Fonctionnalités du clavier de votre MacBook Pro ® Touche de fonction (fn) esc F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 — C - Touches de réglage du volume Touches de réglage de luminosité Touche d’éjection de disques Touche silence Exposé Dashboard Touches multimédia Touches d'éclairage du clavier ’Chapitre 2 Votre MacBook Pro au quotidien 23 Fonction (Fn) Maintenez cette touche enfoncée pour activer les actions personnalisées affectées aux touches de fonction (F1 à F12). Pour apprendre comment personnaliser les touches de fonction, choisissez Aide > Aide Mac dans la barre des menus, puis recherchez « touches de fonction ». ¤ Touches de réglage de luminosité (F1, F2) Augmentez ( ) ou diminuez ( ) la luminosité de l’écran. Touche Exposé (F3) Vous permet d’ouvrir Exposé pour accéder rapidement à toutes vos fenêtres ouvertes. Touche Dashboard (F4) Vous permet d’ouvrir le Dashboard pour accéder à vos widgets. o Touches d’éclairage du clavier (F5, F6) Permettent d’augmenter (o) ou de diminuer (ø) la luminosité de l’éclairage du clavier. ’ Touches multimédia (F7, F8, F9) Permettent de rembobiner ( ), de lire ou de mettre en pause (’), ou encore d’effectuer une avance rapide ( ) dans un morceau, une séquence ou un diaporama. — Touche silence (F10) Permet de désactiver le son provenant des haut-parleurs intégrés et du port de sortie audio. - Touches de réglage du volume (F11, F12) Permettent d’augmenter (-) ou de baisser (–) le volume du son provenant des hautparleurs intégrés et du port de sortie casque. C Touche d’éjection de disques Maintenez cette touche enfoncée pour éjecter un disque que vous n’utilisez pas. Il est également possible d’éjecter un disque en faisant glisser son icône dans la Corbeille.24 Chapitre 2 Votre MacBook Pro au quotidien Ports présents sur votre MacBook Pro ® ¯ Port Ethernet Gigabit (10/100/1000Base-T) G Port de sortie de ligne audio f Port d’entrée de ligne audio Port Mini , DisplayPort £ Ports USB 2.0 d Logement ExpressCard/34 Port d’adaptateur secteur MagSafe Port FireWire 800 HChapitre 2 Votre MacBook Pro au quotidien 25 ¯ Port d’adaptateur secteur MagSafe Branchez-y l’adaptateur secteur MagSafe 85 W (inclus) pour recharger la batterie du MacBook Pro. G Port Ethernet Gigabit (10/100/1000Base-T) Permet de se connecter à un réseau Ethernet haute vitesse, un modem câble ou DSL ou encore un autre ordinateur. Le port Ethernet détecte automatiquement les périphériques Ethernet sans avoir besoin de câble croisé Ethernet. H Un port FireWire 800 Ce port permet de brancher sur l’ordinateur des périphériques externes à haute vitesse tels que des caméras vidéo numériques et des périphériques de stockage. £ Port Mini DisplayPort (sortie vidéo) Permet de connecter votre ordinateur à un écran ou à un système de projection externe doté d’un connecteur DVI ou VGA. Vous pouvez acheter des adaptateurs correspondant aux différents formats vidéo compatibles. d Trois ports USB 2.0 (Universal Serial Bus) haut débit Grâce à ces ports, vous pouvez brancher entre autres un iPod, un iPhone, une souris, un clavier, une imprimante, un disque dur, un appareil photo numérique, une manette de jeu, un modem sur votre MacBook Pro. , Port d’entrée audio Permet de connecter un micro ou un appareil audio numérique à votre MacBook Pro. f Port de sortie audio Permet de connecter des haut-parleurs externes, un casque (y compris iPhone) ou tout autre périphérique audio numérique. Logement ExpressCard/34 Développez les fonctionnalités de votre MacBook Pro grâce aux cartes ExpressCard standard de 34 mm. Pour éjecter une ExpressCard, appuyer doucement dessus pour activer le ressort puis retirez-la du logement.26 Chapitre 2 Votre MacBook Pro au quotidien Remarque : les adaptateurs et autres accessoires sont vendus séparément sur www.apple.com/fr/store et dans votre magasin Apple. Utilisation du trackpad Multi-Touch Le trackpad vous permet de déplacer le pointeur et de réaliser divers gestes Multi-Touch. Contrairement aux trackpads habituels, celui du MacBook Pro fonctionne comme un bouton en vous permettant de cliquer n’importe où sur sa surface. Pour activer les gestes Multi-touch, visionner des vidéos d’apprentissage des gestes et définir d’autres options pour le trackpad, choisissez le menu Pomme () > Préférences Système, puis cliquez sur Trackpad. Voici différentes manières d’utiliser le trackpad de votre MacBook Pro :  Le défilement à deux doigts vous permet de défiler rapidement vers le haut, le bas ou latéralement dans la fenêtre active. Cette option est activée par défaut. Vous pouvez aussi activer ou désactiver le défilement dynamique. Lorsque cette option est activée, l’écran continue de défiler un instant après que vous retiriez vos doigts du trackpad. Elle est particulièrement pratique pour naviguer dans de longs documents et listes.Chapitre 2 Votre MacBook Pro au quotidien 27  Le clic secondaire ou « clic droit » vous permet d’accéder aux commandes du menu contextuel. • Pour configurer le clic secondaire à deux doigts n’importe où sur le trackpad, sélectionnez Clic secondaire sous l’option Deux doigts dans les préférences Trackpad. • Pour configurer une zone de clic secondaire à un doigt dans le coin inférieur gauche ou droit du trackpad, sélectionnez Clic secondaire sous l’option Un doigt dans les préférences Trackpad. Zone de clic secondaire Remarque : vous pouvez également effectuer un clic secondaire en maintenant la touche Contrôle (Ctrl) enfoncée au moment où vous cliquez.28 Chapitre 2 Votre MacBook Pro au quotidien Les gestes de trackpad suivants fonctionnent dans certaines applications. Pour effectuer ces gestes, faites glisser légèrement vos doigts sur la surface du trackpad. Pour en savoir plus, reportez-vous aux préférences Trackpad ou choisissez Aide > Aide Mac, puis lancez une recherche sur le mot « trackpad ».  En resserrant ou en écartant deux doigts vous pouvez effectuer un zoom avant ou arrière dans les PDF, les images, les photos, etc.  En pivotant deux doigts vous pouvez faire pivoter des photos, des pages, etc.Chapitre 2 Votre MacBook Pro au quotidien 29  Le balayage à trois doigts vous permet de feuilleter rapidement un document, de revenir à la photo précédente ou de passer à la suivante et bien plus encore.  Le balayage à quatre doigts fonctionne dans le Finder et dans toutes les applications. En faisant défiler quatre doigts vers la gauche ou la droite, vous activez Permutation d’applications qui vous permet de passer d’une application ouverte à une autre. Si vous balayez à quatre doigts vers le haut ou le bas, Exposé affiche le bureau ou toutes les fenêtres ouvertes. Pour activer ou désactiver un geste, sélectionnez le menu Pomme () > Préférences Système, puis cliquez sur Trackpad. Cochez ou décochez les cases pour activer ou désactiver les gestes.30 Chapitre 2 Votre MacBook Pro au quotidien Utilisation de la batterie du MacBook Pro Lorsque l’adaptateur secteur MagSafe n’est pas branché, le MacBook Pro puise son alimentation de sa batterie intégrée. L’autonomie du MacBook Pro varie en fonction des applications utilisées et des périphériques externes qui sont connectés à votre MacBook Pro. La désactivation de fonctions comme AirPort Extreme ou la technologie sans fil Bluetooth® et la réduction de la luminosité de l’écran peuvent contribuer à économiser la batterie lors des voyages en avion par exemple. De nombreuses Préférences Système sont automatiquement réglées pour optimiser l’autonomie de la batterie. Il est possible de déterminer la charge restante de la batterie en observant les huit lampes témoins du niveau de la batterie, qui se trouvent sur le côté gauche de votre MacBook Pro. Appuyez sur le bouton situé en regard des lampes témoins afin que ces dernières s’allument brièvement pour indiquer la charge restante de la batterie. Important : si un seul témoin est allumé, le niveau restant est très faible. Si aucun témoin ne s’allume, c’est que la batterie est totalement vide et que le MacBook Pro ne peut alors pas démarrer sans que l’adaptateur secteur ne soit branché sur une prise de courant. Branchez l’adaptateur secteur pour permettre à la batterie de se recharger. Pour en savoir plus sur les lampes témoins de la batterie, consultez la page 58.Chapitre 2 Votre MacBook Pro au quotidien 31 Vous pouvez également vérifier la charge restante de la batterie en observant l’icône d’état ( ) de la batterie qui se trouve dans la barre des menus. Le niveau affiché dépend de la quantité d’énergie restant dans la batterie, mais aussi des applications et des périphériques en cours d’utilisation, ainsi que des réglages actuels de votre système. Pour disposer de plus d’énergie, fermez des applications, déconnectez les périphériques non utilisés et réglez la fonction d’Économiseur d’énergie. Pour en savoir plus sur l’économie de la batterie et obtenir des astuces pour améliorer ses performances, rendez-vous à l’adresse www.apple.com/fr/batteries/notebooks.html. Recharge de la batterie Lorsque l’adaptateur secteur fourni avec le MacBook Pro est branché, la batterie se recharge, que l’ordinateur soit éteint, allumé ou en suspension d’activité. La recharge est toutefois plus rapide si l’ordinateur est éteint ou en mode de suspension d’activité. La batterie de votre MacBook Pro peut être remplacée uniquement par un fournisseur de services agréé d’Apple ou un revendeur Apple.32 Chapitre 2 Votre MacBook Pro au quotidien Comment obtenir des réponses à vos doutes De plus amples informations sur l’utilisation du MacBook Pro sont disponibles dans l’Aide Mac qui s’affiche sur votre ordinateur et sur Internet, à l’adresse www.apple.com/fr/support/macbookpro. Pour faire apparaître l’Aide Mac : 1 Cliquez sur l’icône du Finder dans le Dock (la barre des icônes située au bord de l’écran). 2 Cliquez sur le menu Aide dans la barre des menus et procédez de l’une des manières suivantes : a Saisissez une question ou un terme dans le champ de recherche, puis sélectionnez une rubrique dans la liste des résultats ou sélectionnez « Afficher tous les résultats » pour voir toutes les rubriques. b Choisissez Aide Mac pour ouvrir la fenêtre de l’Aide Mac, qui vous permet de cliquer sur des liens ou de saisir une question.Chapitre 2 Votre MacBook Pro au quotidien 33 Informations supplémentaires Pour en savoir plus sur l’utilisation de votre MacBook Pro, consultez le tableau suivant : Pour obtenir des informations sur : Reportez-vous aux sources suivantes : L’installation de mémoire Chapitre 3, « Améliorez les performances de votre MacBook Pro » à la page 37. Le dépannage de votre MacBook Pro en cas de problème Chapitre 4, « À tout problème sa solution » à la page 53. L’obtention de services et d’une assistance pour votre MacBook Pro « Informations, services et assistance » à la page 67. Vous pouvez également vous rendre sur le site d’assistance Apple à l’adresse www.apple.com/fr/support/macbookpro. L’utilisation de Mac OS X Site web de Mac OS X à l’adresse www.apple.com/fr/macosx. Vous pouvez également rechercher « Mac OS X » dans l’Aide Mac. La migration depuis un PC vers un Mac « Pourquoi vous adorerez le Mac » à l’adresse www.apple.com/fr/getamac/whymac. L’utilisation des applications iLife Site web d’iLife à l’adresse www.apple.com/fr/ilife. Vous pouvez également ouvrir une application iLife, ouvrir l’Aide de cette application, puis saisir une question dans le champ de recherche. La modification des Préférences Système Préférences Système, accessibles en choisissant le menu Pomme (K) > Préférences Système. Vous pouvez également rechercher « préférences système » dans l’Aide Mac. Utilisation du trackpad Ouvrez Préférences Système, puis cliquez sur Trackpad. L’utilisation de la caméra iSight Recherchez « iSight » dans l’Aide Mac. L’utilisation du clavier Recherchez « clavier » dans l’Aide Mac.34 Chapitre 2 Votre MacBook Pro au quotidien Pour obtenir des informations sur : Reportez-vous aux sources suivantes : L’utilisation de la technologie sans fil AirPort Extreme Page web d’assistance AirPort à l’adresse www.apple.com/fr/support/airport. Vous pouvez également ouvrir l’Aide Mac et rechercher le terme « AirPort ». L’utilisation de la technologie sans fil Bluetooth Page web d’assistance Bluetooth à l’adresse www.apple.com/fr/support/bluetooth. Vous pouvez aussi ouvrir l’utilitaire Échange de fichiers Bluetooth (dans le dossier Utilitaires du dossier Applications) et sélectionner Aide > Aide Bluetooth. L’entretien de la batterie Recherchez « batterie » dans l’Aide Mac. La connexion d’une imprimante Recherchez « impression » dans l’Aide Mac. Les connexions FireWire et USB Recherchez « FireWire » ou « USB » dans l’Aide Mac. La connexion à Internet Recherchez « Internet » dans l’Aide Mac. La connexion d’un moniteur externe Recherchez « port affichage » dans l’Aide Mac. La télécommande Apple Remote Recherchez « télécommande » dans l’Aide Mac. Front Row Recherchez « Front Row » dans l’Aide Mac La gravure d’un CD ou DVD Recherchez « graver disque » dans l’Aide Mac. Les caractéristiques Page web des spécifications, à l’adresse support.apple.com/specs (en anglais). Vous pouvez également ouvrir Informations Système en choisissant le menu Pomme (K) > « À propos de ce Mac » dans la barre des menus, puis en cliquant sur Plus d’infos.Chapitre 2 Votre MacBook Pro au quotidien 35 Pour obtenir des informations sur : Reportez-vous aux sources suivantes : Actualités, téléchargement gratuits et catalogues en ligne des logiciels et du matériel Apple Site web d’Apple à l’adresse www.apple.com/fr. Instructions, assistance technique et manuels des produits Apple Site web d’assistance Apple à l’adresse www.apple.com/support/fr.Aide Mac Mémoire RAM www.apple.com/fr/store Améliorez les performances de votre MacBook Pro 338 Chapitre 3 Améliorez les performances de votre MacBook Pro Ce chapitre fournit des informations et des instructions pour l’installation d’un disque dur plus performant et la mise en place de mémoire supplémentaire dans votre MacBook Pro. AVERTISSEMENT : Apple vous recommande de confier l’ajout de mémoire et la mise en place d’un nouveau disque dur à un technicien agréé Apple. Consultez les informations sur le dépannage et l’assistance qui accompagnent votre ordinateur pour savoir comment contacter Apple. Tout dommage causé à votre matériel en tentant d’installer vous-même de la mémoire ou un disque dur n’est pas couvert par la garantie limitée de votre ordinateur. Vous ne pouvez pas remplacer la batterie de votre MacBook Pro vous-même. Si vous pensez que votre batterie doit être changée, contactez un revendeur Apple ou un fournisseur de services agréé Apple.Chapitre 3 Améliorez les performances de votre MacBook Pro 39 Remplacement du disque dur Vous pouvez remplacer le disque dur de votre MacBook Pro par un modèle plus performant. Le disque dur se trouve à côté de la batterie intégrée lorsque vous ouvrez le fond de votre MacBook Pro. Le disque dur de remplacement doit être de 2,5 pouces et doté d’un connecteur Serial ATA (SATA). Important : Apple vous recommande de sauvegarder les données de votre disque dur avant de l’enlever et de le remplacer. Apple décline toute responsabilité en cas de perte de données. Pour remplacer le disque dur de votre MacBook Pro : 1 Éteignez votre MacBook Pro. Débranchez l’adaptateur secteur, le câble Ethernet, les câbles USB, le verrou de sécurité et tous les autres câbles connectés au MacBook Pro afin d’éviter toute détérioration de ce dernier. AVERTISSEMENT : les composants internes de votre MacBook Pro risquent d’être chauds. Si vous venez d’utiliser votre MacBook Pro, attendez 10 minutes après l’avoir éteint, afin de laisser aux composants internes le temps de se refroidir. 2 Retournez votre MacBook Pro et retirez les dix (10) vis qui maintiennent le fond du boîtier. Retirez les vis les plus courtes des angles, comme indiqué sur l’illustration. Soulevez ce dernier et placez-le sur le côté.40 Chapitre 3 Améliorez les performances de votre MacBook Pro Important : comme ces vis sont de longueurs différentes, prenez note de leur longueur et de leur position respective pour pouvoir les replacer correctement. Rangez-les en lieu sûr à portée de main. Petit GrandChapitre 3 Améliorez les performances de votre MacBook Pro 41 Important : en retirant le fond du boîtier, vous avez mis à nu des composants internes fragiles. Ne touchez rien d’autre que la structure de montage du disque dur lorsque vous retirez ou ajoutez un disque dur. 3 Touchez une surface métallique à l’intérieur de l’ordinateur afin de décharger toute électricité statique que vous pourriez avoir emmagasinée.42 Chapitre 3 Améliorez les performances de votre MacBook Pro 4 Repérez l’attache qui se trouve au-dessus du disque dur. Utilisez un tournevis cruciforme pour desserrer les deux vis imperdables qui maintiennent l’attache en place. Rangez cette dernière en lieu sûr à portée de main. 5 Tirez sur la languette prévue à cet effet pour soulever doucement le disque et l’extraire de la baie. Attache LanguetteChapitre 3 Améliorez les performances de votre MacBook Pro 43 6 Tenez le disque dur par les côtés tout en tirant doucement sur le connecteur qui se trouve sur le côté droit du disque afin de le déconnecter. N’écrasez pas le disque entre vos doigts et évitez de toucher les circuits situés sur la face inférieure du disque. Connecteur Le connecteur est relié à un câble et demeure à l’intérieur de la baie de disque dur.44 Chapitre 3 Améliorez les performances de votre MacBook Pro Important : il y a quatre (4) vis de montage sur les côtés de votre disque dur. Si votre nouveau disque dur n’est pas fourni avec des vis de montage, récupérez les vis de votre ancien disque dur et montez-les sur le nouveau avant de l’installer. Vis de montage 7 Branchez le connecteur sur la partie droite du nouveau disque dur.Chapitre 3 Améliorez les performances de votre MacBook Pro 45 8 Insérez le nouveau disque dur en le tenant incliné et en vous assurant que les vis de montage sont correctement placées. 9 Replacez l’attache et serrez les vis.46 Chapitre 3 Améliorez les performances de votre MacBook Pro 10 Remettez le fond du boîtier en place. Remettez à leur place respective et serrez les dix vis que vous avez retirées à l’étape 2 après vous être assuré que les plus courtes étaient dans les angles, comme indiqué sur l’illustration. Petit Grand Pour obtenir des informations sur l’installation de Mac OS X et des applications incluses, consultez la rubrique « Réinstallation deslogicielsfournis avec le MacBook Pro » à la page 65.Chapitre 3 Améliorez les performances de votre MacBook Pro 47 Installation de mémoire supplémentaire Votre ordinateur est doté de deux logements de mémoire auxquels vous pouvez accéder en retirant le fond du boîtier. Le MacBook Pro est doté d’une mémoire DDR3 (Double Data Rate) SDRAM (Synchronous Dynamic Random-Access Memory) à 1066 MHz, d’un minimum de quatre gigaoctets (4 Go). Chaque logement de mémoire peut accueillir un module SDRAM conforme aux spécifications suivantes :  Module DDR3 (Double Data Rate Small Outline Dual Inline Memory Module)  30 mm  204 broches  2 Go ou 4 Go  Mémoire RAM de type PC3-8500 DDR3 SO-DIMM à 1066 MHz Vous pouvez ajouter deux modules de mémoire de 4 Go pour un total de 8 Go de mémoire au maximum. Pour des performances optimales, remplissez les deux logements de mémoire en y installant des modules identiques. Pour installer de la mémoire dans votre MacBook Pro : 1 Suivez les étapes 1 à 3 à partir de la page 39. Important : en retirant le fond du boîtier, vous mettez à nu des composants internes fragiles. Veillez à ne toucher que la structure de montage de la mémoire lorsque vous retirez ou que vous ajoutez de la mémoire.48 Chapitre 3 Améliorez les performances de votre MacBook Pro 2 Repoussez vers l’extérieur les leviers qui se trouvent sur les côtés du module de mémoire, afin de libérer le module du logement de la carte mémoire. La carte mémoire se dégage alors en se soulevant légèrement d’un côté. Avant de la retirer, assurez-vous que les encoches en demi-cercle sont bien visibles. Si ce n’est pas le cas, réessayez en repoussant les leviers vers l’extérieur.Chapitre 3 Améliorez les performances de votre MacBook Pro 49 3 Saisissez le module de mémoire en le tenant par ses encoches, puis retirez-le du logement. 4 Retirez l’autre module de mémoire. Important : saisissez les modules de mémoire en les tenant par les côtés et en veillant à ne pas toucher les connecteurs dorés. 5 Insérez le nouveau module de mémoire dans le logement : a Alignez l’encoche du bord doré du module sur celle qui se trouve dans le logement de mémoire inférieur. b Inclinez la carte et poussez-la dans le logement. c Utilisez deux doigts pour exercer une pression ferme et uniforme afin de pousser le module de mémoire vers le bas. Vous devez entendre un clic indiquant que la mémoire est correctement insérée. d Répétez l’opération pour installer un module de mémoire supplémentaire dans le logement supérieur. Appuyez sur le module pour vous assurer qu’il est bien de niveau.50 Chapitre 3 Améliorez les performances de votre MacBook Pro Encoches 6 Suivez les instructions de replacement de la plaque du socle, présentées à l’étape 10 à la page 46.Chapitre 3 Améliorez les performances de votre MacBook Pro 51 Reconnaissance de la nouvelle mémoire par le MacBook Pro Après avoir ajouté de la mémoire au MacBook Pro, vérifiez si elle est reconnue. Pour vérifier la mémoire de votre ordinateur : 1 Démarrez votre MacBook Pro. 2 Lorsque le bureau Mac OS X apparaît, choisissez le menu Pomme () dans la barre des menus, puis sélectionnez « À propos de ce Mac ». Pour en savoir plus sur la quantité de mémoire installée sur votre ordinateur, ouvrez Informations système en cliquant sur Plus d’infos, puis cliquez sur Mémoire. Si votre MacBook Pro ne reconnaît pas la mémoire ou ne démarre pas correctement, assurez-vous qu’elle est compatible avec votre MacBook Pro et correctement installée.Aide Mac Aide www.apple.com/fr/support À tout problème sa solution 454 Chapitre 4 À tout problème sa solution Vous pouvez rencontrer, à titre exceptionnel, des problèmes en utilisant le MacBook Pro. Lisez la suite pour obtenir des conseils de dépannage utiles en cas de problème. Vous trouverez des informations supplémentaires concernant le dépannage dans l’Aide Mac et sur le site web d’assistance consacré au MacBook Pro, à l’adresse www.apple.com/fr/support/macbookpro. Il existe généralement une solution simple et rapide aux problèmes que vous pouvez rencontrer à l’utilisation du MacBook Pro. Réfléchissez aux conditions qui ont entraîné l’apparition de ce problème. Ce récapitulatif de la totalité des opérations effectuées avant que le problème ne survienne permet de restreindre les causes possibles et de trouver la solution. Les éléments à noter comprennent:  les applications que vous étiez en train d’utiliser quand le problème est apparu ; les problèmes qui n’apparaissent qu’avec une application spécifique peuvent indiquer que cette application n’est pas compatible avec la version de Mac OS X installée sur votre ordinateur ;  les nouveaux logiciels installés, notamment ceux qui ont ajouté des éléments à votre dossier Système ;  tout nouveau composant matériel installé (mémoire supplémentaire ou périphérique, par exemple).Chapitre 4 À tout problème sa solution 55 Problèmes vous empêchant d’utiliser votre MacBook Pro Si votre MacBook Pro ne répond plus ou que le pointeur se fige Il peut arriver, très rarement, qu’une application se « bloque » à l’écran. Mac OS X offre un moyen de fermer une application bloquée sans redémarrer votre ordinateur. Pour forcer la fermeture d’une application : 1 Appuyez sur les touches Commande (x) + Option + Échap ou choisissez le menu Pomme () > Forcer à quitter dans la barre des menus. La boîte de dialogue « Forcer à quitter des applications » apparaît. L’application est sélectionnée. 2 Cliquez sur Forcer à quitter. L’application se ferme, en laissant toutes les autres applications ouvertes. Si nécessaire, vous pouvez également redémarrer le Finder à partir de cette zone de dialogue. Enregistrez ensuite votre travail dans les applications ouvertes, puis redémarrez l’ordinateur afin de vous assurer que le problème est entièrement réglé. Si le problème survient fréquemment, choisissez Aide > Aide Mac dans la barre des menus en haut de l’écran. Recherchez le mot « bloquer » pour obtenir de l’aide en cas de blocage ou d’absence de réponse de l’ordinateur. Si le problème ne survient que lorsque vous utilisez une application particulière, vérifiez auprès de son éditeur si elle est compatible avec votre ordinateur. Pour obtenir des informations de contact et une assistance concernant les logiciels fournis avec le MacBook Pro, rendez-vous à l’adresse www.apple.com/guide.56 Chapitre 4 À tout problème sa solution Si vous savez qu’une application est compatible, vous devrez peut-être réinstaller le logiciel système de votre ordinateur. Consultez la rubrique « Réinstallation des logiciels fournis avec le MacBook Pro » à la page 65. Si le MacBook Pro se bloque au démarrage, si un point d’interrogation clignotant apparaîtou si l’écran est éteint et que la lampe témoin de suspension d’activité reste allumée (pas en mode de suspension d’activité) Le point d’interrogation clignotant signifie généralement que l’ordinateur ne parvient pas à localiser le logiciel système sur le disque dur interne ou sur tout disque externe relié à l’ordinateur.  Patientez quelques secondes. Si l’ordinateur ne démarre pas de suite, éteignez-le en maintenant le bouton d’alimentation (®) enfoncé pendant 8 à 10 secondes. Débranchez tous les périphériques externes puis tentez de redémarrer l’ordinateur en appuyant sur le bouton d’alimentation (®) tout en maintenant la touche Option enfoncée. Lorsque votre ordinateur démarre, cliquez sur l’icône du disque dur, puis sur la flèche droite. Une fois que l’ordinateur a démarré, ouvrez Préférences Système et cliquez sur Démarrage. Sélectionnez un dossier Système local de Mac OS X.  Si cela ne donne pas de résultats, tentez de réparer le disque à l’aide d’Utilitaire de disque : • Insérez le DVD d’installation de Mac OS X dans votre ordinateur. • Redémarrez ensuite votre ordinateur en maintenant la touche C enfoncée lors du démarrage. • Choisissez Installation dans la barre des menus puis sélectionnez Ouvrir Utilitaire de disque. Lorsqu’Utilitaire de disque s’ouvre, suivez les instructions de la sous-fenêtre S.O.S pour savoir s’il est en mesure de réparer le disque.Chapitre 4 À tout problème sa solution 57 Si Utilitaire de disque ne résout pas le problème, vous devrez peut-être réinstaller le logiciel système de votre ordinateur. Consultez la rubrique « Réinstallation des logiciels fournis avec le MacBook Pro » à la page 65. Si votre MacBook Pro ne s’allume ou ne démarre pas Tentez les opérations suivantes dans l’ordre jusqu’à ce que votre ordinateur s’allume :  Assurez-vous que l’adaptateur secteur est connecté à l’ordinateur et branché sur une prise de courant en état de marche. Veillez à utiliser l’adaptateur secteur MagSafe 85 W fourni avec le MacBook Pro. Si l’adaptateur secteur ne recharge plus l’ordinateur et que la lampe témoin du connecteur MagSafe ne s’allume pas lorsque vous branchez le câble d’alimentation, essayez de débrancher le câble puis de le brancher à nouveau afin de le réinitialiser ou essayer à partir d’une autre prise.  Vérifiez si votre batterie à besoin d’être rechargée. Appuyez sur le petit bouton qui se trouve sur le côté gauche de votre ordinateur. Vous devez voir apparaître un à huit témoins lumineux indiquant le niveau de charge de la batterie. Si une seule lampe témoin est allumée, branchez votre adaptateur secteur pour recharger l’ordinateur. Pour en savoir plus sur les lampes témoins de la batterie, consultez la page 58.  Si le problème persiste, fermez tous les documents ouverts et quittez toutes les applications. Pour rétablir les réglages d’origine de l’ordinateur (tout en préservant vos fichiers), appuyez en même temps et pendant cinq secondes sur la touche Maj gauche, la touche Option (alt) gauche, la touche Contrôle gauche et le bouton d’alimentation (®) jusqu’à ce que l’ordinateur redémarre.  Si vous avez récemment ajouté de la mémoire, assurez-vous qu’elle est correctement installée et qu’elle est compatible avec votre ordinateur. Vérifiez si le retrait de cette mémoire et la remise en place de l’ancienne permet à l’ordinateur de démarrer (voir la page 47).58 Chapitre 4 À tout problème sa solution  Pour réinitialiser la PRAM, appuyez sur le bouton d’alimentation (®) et maintenez immédiatement les touches Commande (x), Option, P et R enfoncées jusqu’à ce que vous entendiez une deuxième fois le signal sonore de démarrage.  Si vous ne parvenez toujours pas à démarrer le MacBook Pro, consultez la rubrique « Informations, services et assistance » à la page 67 qui contient les informations nécessaires pour prendre contact avec Apple. Si l’écran devient subitement noir ou que votre MacBook Pro se bloque Essayez de redémarrer votre MacBook Pro. 1 Débranchez tout périphérique connecté à votre MacBook Pro excepté l’adaptateur secteur. 2 Appuyez sur le bouton d’alimentation (®) pour redémarrer le système. 3 Le niveau de charge de la batterie doit atteindre au moins 10 pour cent avant la connexion d’un périphérique et la reprise du travail. Pour savoir où en est la charge de la batterie, cliquez sur l’icône d’état de la batterie ( ) dans la barre des menus ou jetez un œil aux témoins de la batterie, à gauche de votre MacBook Pro. Le moniteur pourrait également s’assombrir si les fonctions d’économie d’énergie de la batterie sont en place. Si vous appuyez sur le bouton de la batterie et que toutes les lampes témoins clignotent cinq fois de suite Votre batterie doit être remplacée. Prenez contact avec un magasin Apple Store ou un fournisseur de services agréé Apple.Chapitre 4 À tout problème sa solution 59 Si vous appuyez sur le bouton de la batterie et que les lampes témoins clignotent cinq fois de suite de gauche à droite, puis de droite à gauche Votre batterie n’est pas reconnue. Prenez contact avec un magasin Apple Store ou un fournisseur de services agréé Apple. Si vous oubliez votre mot de passe Vous pouvez réinitialiser votre mot de passe d’administrateur et les mots de passe de tous les autres comptes. 1 Insérez le DVD d’installation de Mac OS X. Redémarrez ensuite votre ordinateur en maintenant la touche C enfoncée lors du démarrage. 2 Choisissez Utilitaires > « Réinitialiser le mot de passe » dans la barre des menus, puis suivez les instructions à l’écran. En cas de problème à l’éjection d’un disque Fermez toutes les applications susceptibles d’utiliser le disque et essayez à nouveau. Si cela ne donne pas de résultats, redémarrez l’ordinateur, puis maintenez immédiatement le bouton du trackpad enfoncé. Utilisation d’Apple Hardware Test Si vous pensez qu’il y a un problème avec les composants matériels du MacBook Pro, vous pouvez utiliser l’application Apple Hardware Test pour savoir si tel est le cas (les composants affectés peuvent être la mémoire ou le processeur, par exemple). Pour utiliser Apple Hardware Test : 1 Déconnectez tous les périphériques externes de votre ordinateur, sauf l’adaptateur secteur.60 Chapitre 4 À tout problème sa solution Si un câble Ethernet est connecté, déconnectez-le. 2 Redémarrez ensuite votre ordinateur en maintenant la touche D enfoncée lors du démarrage. 3 Lorsque l’écran de sélection d’Apple Hardware Test s’affiche, choisissez votre langue. 4 Appuyez sur la touche Retour ou cliquez sur la flèche droite. 5 Lorsque l’écran principal d’Apple Hardware Test s’affiche (après 45 secondes environ), suivez les instructions à l’écran. 6 En cas de détection d’un problème, Apple Hardware Test affiche un code d’erreur. Notez le code d’erreur avant d’entreprendre les démarches d’assistance. Si Apple Hardware Test ne détecte pas de panne matérielle, il est probable que le problème soit lié aux logiciels. Si la procédure ne fonctionne pas, insérez le DVD d’installation des applications pour lancer l’outil Apple Hardware Test. Pour en savoir plus, consultez le fichier « À propos d’AHT » qui se trouve sur le DVD d’installation des applications fourni avec votre ordinateur. Problèmes de connexion à Internet Votre MacBook Pro dispose de l’application Assistant réglages de réseau pour vous aider tout au long de la procédure de configuration d’une connexion à Internet. Ouvrez Préférences Système, puis cliquez sur Réseau. Cliquez sur le bouton « Assistant » pour ouvrir Assistant réglages de réseau. En cas de problème avec votre connexion à Internet, vous pouvez essayer les méthodes exposées dans cette rubrique pour votre type de connexion ou vous pouvez utiliser Diagnostic réseau.Chapitre 4 À tout problème sa solution 61 Pour utiliser Diagnostic réseau : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur Réseau puis cliquez sur « Assistant ». 3 Cliquez sur Diagnostic pour lancer Diagnostic réseau. 4 Suivez les instructions à l’écran. Si Diagnostic réseau n’est pas en mesure de résoudre le problème, celui-ci se situe peut-être au niveau du fournisseur d’accès à Internet auquel vous essayez de vous connecter, du périphérique externe utilisé pour la connexion au fournisseur d’accès à Internet ou du serveur auquel vous essayez d’accéder. Vous pouvez également tenter de réaliser les opérations suivantes. Connexions à Internet par modem câble, modem DSL ou réseau local (LAN) Assurez-vous que tous les câbles du modem sont correctement branchés, y compris le câble d’alimentation du modem, le câble reliant le modem à l’ordinateur et le câble raccordant le modem à la prise murale. Vérifiez également les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet. Éteignez puis rallumez le modem et réinitialisez les composants matériels du modem. Éteignez le modem câble ou DSL, puis rallumez-le après quelques minutes. Certains fournisseurs d’accès à Internet conseillent de débrancher le câble d’alimentation du modem. Si votre modem dispose d’un bouton de réinitialisation, vous pouvez l’actionner avant ou après avoir éteint puis rallumé le modem. Important : les instructions relatives aux modems ne concernent pas les utilisateurs de réseau LAN. Contrairement aux utilisateurs de modems câble et DSL, les utilisateurs de réseau LAN peuvent disposer de concentrateurs, commutateurs, routeurs et autres blocs de connexion. Ils doivent faire appel à leur administrateur réseau plutôt qu’à un FAI.62 Chapitre 4 À tout problème sa solution Connexions PPPoE Si vous ne parvenez pas à vous connecter à votre fournisseur d’accès à Internet via PPPoE (Point to Point Protocol over Ethernet), assurez-vous que les informations que vous avez saisies dans les préférences Réseau sont correctes. Pour vérifier les réglages de vos préférences Réseau : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur Réseau. 3 Cliquez sur Ajouter (+) en bas de la liste des services de connexion réseau et choisissez PPPoE dans le menu local Interface. 4 Choisissez une interface pour le service PPPoE dans le menu local Ethernet. Choisissez Ethernet si vous vous connectez à un réseau câblé ou AirPort si vous vous connectez à un réseau sans fil. 5 Saisissez les informations fournies par votre fournisseur d’accès, tel que le nom du compte, le mot de passe et le nom du service PPPoE (si votre fournisseur d’accès le demande). 6 Cliquez sur Appliquer pour activer les réglages.Chapitre 4 À tout problème sa solution 63 Connexions au réseau Assurez-vous que le câble Ethernet est branché sur le MacBook Pro et sur le réseau. Vérifiez les câbles et l’alimentation de vos routeurs et concentrateurs Ethernet. Si vous disposez de plusieurs ordinateurs tentant de partager une connexion à Internet, assurez-vous que votre réseau est correctement configuré. Vous devez savoir si votre FAI fournit une seule ou plusieurs adresses IP, autrement dit, une pour chaque ordinateur. Si une seule adresse IP est fournie, vous devez disposer d’un routeur capable de partager la connexion ; on parle alors de conversion d’adresse réseau (NAT) ou de masquage d’adresses IP. Pour obtenir des informations sur la configuration, consultez la documentation fournie avec votre routeur ou contactez la personne qui a configuré votre réseau. La borne d’accès AirPort peut être utilisée pour que plusieurs ordinateurs partagent une adresse IP. Pour obtenir des informations sur l’utilisation d’une borne d’accès AirPort, consultez l’Aide Mac ou rendez-vous sur le site web AirPort Extreme, à l’adresse www.apple.com/fr/support/airport. Si ces méthodes s’avèrent insuffisantes pour résoudre les problèmes rencontrés, adressez-vous à votre fournisseur d’accès à Internet ou à votre administrateur réseau. Problèmes de communication sans fil avec AirPort Extreme En cas de problème avec les communications sans fil AirPort Extreme  Vérifiez que l’ordinateur ou le réseau auquel vous souhaitez vous connecter est activé et dispose d’un point d’accès sans fil.  Assurez-vous que le logiciel est correctement configuré conformément aux instructions incluses avec votre borne d’accès ou point d‘accès.64 Chapitre 4 À tout problème sa solution  Assurez-vous que l’autre ordinateur ou le point d’accès au réseau se trouve dans la zone de couverture de l’antenne de votre ordinateur. Des appareils électroniques ou des structures métalliques se trouvant à proximité peuvent interférer avec les communications sans fil et réduire la portée de votre antenne. Vous pouvez éventuellement améliorer la réception en tournant et en réorientant l’ordinateur.  Vérifiez l’icône d’état AirPort (Z) dans la barre des menus. Jusqu’à quatre barres de mesure apparaissent pour afficher la puissance du signal. Si les barres ne s’affichent pas, tentez de changer de place.  Pour plus d’informations, consultez l’Aide AirPort (choisissez Aide > Aide Mac, puis Bibliothèque > Aide AirPort dans la barre des menus) ainsi que les instructions fournies avec votre appareil sans fil. Maintien à jour de vos logiciels Vous pouvez vous connecter à Internet pour télécharger et installer automatiquement les dernières versions de logiciels, gestionnaires et autres améliorations fournies par Apple. Chaque fois que vous vous connectez à Internet, « Mise à jour de logiciels » consulte les mises à jour disponibles pour votre ordinateur. Vous pouvez configurer votre MacBook Pro afin qu’il recherche régulièrement les mises à jour disponibles, pour que vous puissiez ensuite télécharger et installer les mises à jour de logiciels. Pour rechercher des logiciels mis à jour : 1 Choisissez le menu Pomme () > Préférences Système. 2 Cliquez sur l’icône « Mise à jour de logiciels » et suivez les instructions à l’écran.  Pour plus d’informations, recherchez « Mise à jour de logiciels » dans l’Aide Mac.  Pour obtenir les toutes dernières informations sur Mac OS X, rendez-vous à l’adresse www.apple.com/fr/macosx.Chapitre 4 À tout problème sa solution 65 Réinstallation des logiciels fournis avec le MacBook Pro Les disques d’installation de logiciels fournis avec votre MacBook Pro permettent de réinstaller Mac OS X et les applications livrées avec votre ordinateur. Vous pouvez installer Mac OS X sans effacer le volume cible, ce qui vous permet de conserver vos fichiers et réglages, mais si vous le souhaitez, vous pouvez effacer le volume pour supprimer toutes vos données avant de réinstaller Mac OS X et les applications. Important : Apple vous recommande de sauvegarder les données de votre disque dur avant de procéder à la restauration des logiciels. Apple décline toute responsabilité en cas de perte de données. Installation de Mac OS X Pour installer Mac OS X : 1 Sauvegardez vos fichiers importants. 2 Insérez le DVD d’installation de Mac OS X fourni avec votre ordinateur. 3 Double-cliquez sur Installation Mac OS X. 4 Suivez les instructions à l’écran. Remarque : pour restaurer les réglages d’origine de Mac OS X sur votre MacBook Pro, vous devez d’abord effacer le volume cible. Pour ce faire, vous pouvez avoir recours à Utilitaire de disque pendant l’installation. Pour savoir comment procéder, consultez l’article correspondant de la base de connaissance à l’adresse support.apple.com/kb/HT3910?viewlocale=fr_FR. 5 Une fois l’installation terminée, cliquez sur Redémarrer pour redémarrer votre ordinateur. 6 Suivez les instructions données par l’Assistant réglages pour configurer votre compte utilisateur.66 Chapitre 4 À tout problème sa solution Si vous effacez votre disque dur pendant l’installation, vous devez réinstaller vos applications ; consultez la section suivante. Réinstallation des applications Si vous avez effacé votre disque dur lors de la réinstallation de Mac OS X, vous devez également réinstaller les applications fournies avec votre MacBook Pro (comme les applications iLife). Pour installer les applications fournies avec votre MacBook Pro : 1 Sauvegardez vos fichiers importants. 2 Insérez le DVD d’installation des applications fourni avec votre MacBook pro. 3 Double-cliquez sur « Install Bundled Software ». 4 Suivez les instructions à l’écran. 5 Cliquez sur Fermer une fois l’installation terminée. Utilisation d’Utilitaire de disque Vous pouvez utiliser Utilitaire de disque pour réparer, vérifier ou effacer le disque dur de votre MacBook Pro. Pour utiliser Utilitaire de disque : 1 Insérez le DVD d’installation de Mac OS X fourni avec votre ordinateur. 2 Double-cliquez sur Installation Mac OS X. 3 Après avoir sélectionné votre langue, choisissez Utilitaires > Ouvrir Utilitaire de disque, puis suivez les instructions affichées dans la sous-fenêtre S.O.S. pour savoir si Utilitaire de disque peut réparer votre disque. 4 Quittez le programme d’installation de Mac OS X.Chapitre 4 À tout problème sa solution 67 Si Utilitaire de disque ne résout pas le problème, essayez de réinstaller le logiciel système de votre MacBook Pro. Consultez la rubrique « Réinstallation des logiciels fournis avec le MacBook Pro » à la page 65. Informations, services et assistance Outre le disque dur et la mémoire, votre MacBook Pro ne contient aucune pièce que vous puissiez réparer vous-même. Si vous avez besoin de services de réparation, adressez-vous à Apple ou portez votre MacBook Pro chez un fournisseur de services agréé Apple. Vous trouverez de plus amples informations sur le MacBook Pro en ligne, dans l’aide à l’écran, dans Informations Système et via Apple Hardware Test. Informations en ligne Pour obtenir des informations en ligne sur le service et l’assistance, rendez-vous sur www.apple.com/fr/support. Choisissez votre pays dans le menu local. Vous pouvez faire des recherches dans la base de données AppleCare Knowledge Base, vérifiez si de nouvelles mises à jour de logiciels sont disponibles ou obtenir de l’aide dans les forums de discussion Apple. Aide à l’écran Vous pouvez chercher des réponses à vos questions ainsi que des instructions et des informations concernant le dépannage dans l’Aide Mac. Choisissez Aide > Aide Mac.68 Chapitre 4 À tout problème sa solution Informations Système Pour obtenir des informations sur le MacBook Pro, servez-vous d’Informations Système. Cette application vous fournit la liste des composants matériels et des logiciels installés, le numéro de série et de version du système d’exploitation, la quantité de mémoire installée, etc. Pour ouvrir Informations Système, choisissez le menu Pomme () > À propos de ce Mac dans la barre des menus, puis cliquez sur Plus d’infos. Service et assistance AppleCare Votre MacBook Pro s’accompagne d’une assistance technique de 90 jours et d’un an de couverture pour les réparations de matériel effectuées dans les magasins Apple Store ou les centres de réparations agréés Apple, tel qu’un fournisseur de services agréé Apple. Vous avez la possibilité d’étendre la durée de cette couverture en adhérant à un programme AppleCare Protection Plan. Pour en savoir plus, rendez-vous sur www.apple.com/fr/support/products ou visitez le site web correspondant à votre pays (voir la liste ci-dessous). Si vous avez besoin d’assistance, le personnel d’assistance par téléphone AppleCare peut vous aider à installer et à ouvrir les applications, et propose des services de dépannage élémentaires. Appelez le centre d’assistance le plus proche de chez vous (gratuit pendant les 90 premiers jours). Gardez la date d’achat et le numéro de série de votre MacBook Pro à portée de main lorsque vous appelez. Remarque : la période de 90 jours d’assistance gratuite par téléphone débute à la date d’achat. Des frais téléphoniques peuvent éventuellement s’appliquer.Chapitre 4 À tout problème sa solution 69 Pays Téléphone Site web Allemagne (49) 01805 009 433 www.apple.com/de/support Autriche (43) 0810 300 427 www.apple.com/at/support Belgique (flamand) (français) (32) 070 700 772 (32) 070 700 773 www.apple.com/benl/support www.apple.com/befr/support France (Metropolitain) (DOM-TOM) (33) 0805 540 003 www.apple.com/fr/support Luxembourg (352) 800 24550 www.apple.com/befr/support Suisse (français) (allemand) (41) 0848 000 132 (41) 0848 000 132 www.apple.com/chfr/support www.apple.com/chde/support Les numéros de téléphone sont susceptibles d’être modifiés. Les tarifs téléphoniques locaux et nationaux peuvent s’appliquer. Une liste complète est disponible sur Internet : www.apple.com/support/contact/phone_contacts.html70 Chapitre 4 À tout problème sa solution Localisation du numéro de série de votre produit Utilisez l’une des méthodes suivantes pour trouver le numéro de série de votre ordinateur :  Retournez votre MacBook Pro. Le numéro de série est gravé sur le boîtier, près de la charnière. Numéro de série  Choisissez le menu Pomme () dans la barre des menus, puis sélectionnez « À propos de ce Mac ». Cliquez sur le numéro de version sous « Mac OS X » pour passer du numéro de version de Mac OS X au numéro de révision, puis au numéro de série.  Cliquez sur l’icône du Finder, puis ouvrez /Applications/Utilitaires/Informations Système. Cliquez ensuite sur Matériel dans la sous-fenêtre Contenu.Aide Mac Ergonomie www.apple.com/fr/environment Dernières recommandations 572 Chapitre 5 Dernières recommandations Afin d’assurer votre sécurité et de préserver votre matériel, veillez à observer ces consignes concernant le nettoyage et la manipulation de votre MacBook Pro ainsi que l’aménagement d’un espace de travail confortable. Gardez ces instructions dans un endroit facile d’accès pour vous et pour les utilisateurs éventuels. AVERTISSEMENT : la garantie du fabricant pourra être annulée si votre ordinateur a été utilisé ou stocké de manière impropre. Informations importantes concernant la sécurité AVERTISSEMENT : ne pas suivre ces consignes pourrait déclencher un feu, occasionner des décharges électriques ou entraîner tout type de blessure ou dommage. Batterie intégrée Ne retirez pas la batterie de votre MacBook Pro. La batterie doit être remplacée uniquement par un fournisseur de services agréé Apple. Interrompez l’utilisation de votre MacBook Pro s’il tombe ou semble cassé, tordu, déformé ou abîmé. N’exposez pas l’ordinateur à des températures supérieures à 100 °C. Manipulation correcte Installez le MacBook Pro sur un plan de travail stable en veillant à ce que l’air puisse circuler librement sous l’ordinateur et autour de celui-ci. N’utilisez pas le MacBook Pro en le posant sur un coussin ou tout autre objet de structure non solide car cela pourrait empêcher les conduits d’aération de fonctionner correctement. Évitez également de placer des objets sur le clavier lorsque vous utilisez votre MacBook Pro. N’introduisez jamais d’objets d’aucune sorte dans les ouvertures servant à la ventilation.Chapitre 5 Dernières recommandations 73 La partie inférieure du MacBook Pro peut chauffer au cours d’une utilisation normale de l’appareil. S’il est posé sur vos genoux et que la chaleur qu’il dégage vous gêne, posez-le plutôt sur un plan de travail stable. Eau et endroits humides Évitez de placer votre MacBook Pro à proximité de sources de liquide telles que des boissons, un évier, un lavabo, une baignoire ou une douche, par exemple. Protégez votre MacBook Pro de l’humidité et des intempéries (neige, pluie et brouillard par exemple). Adaptateur secteur MagSafe 85 W Veillez à ce que la fiche ou le câble d’alimentation secteur CA soit totalement enclenché dans l’adaptateur secteur avant de brancher ce dernier sur une prise de courant. N’utilisez que l’adaptateur secteur qui accompagne le MacBook Pro ou, au besoin, un adaptateur secteur agréé Apple compatible avec ce produit. L’adaptateur secteur peut chauffer au cours d’une utilisation normale de l’appareil. Branchez toujours l’adaptateur secteur directement sur la prise de courant ou posez-le par terre, dans un endroit correctement aéré. Débranchez l’adaptateur secteur et débranchez tous les autres câbles si l’un des cas suivants se présente :  Vous cherchez à ajouter de la mémoire ou à remplacer le disque dur.  Vous souhaitez nettoyer le boîtier (pour ce faire, suivez à la lettre les instructions fournies à la page 77).  La prise ou le câble d’alimentation est endommagé.  Le MacBook Pro ou l’adaptateur secteur est exposé à la pluie ou à une humidité excessive, ou du liquide a été versé dans le boîtier.  Le MacBook Pro ou l’adaptateur secteur a subi une chute, le boîtier a été endommagé ou vous pensez qu’une réparation est nécessaire.74 Chapitre 5 Dernières recommandations Le port secteur MagSafe contient un aimant qui peut effacer les données d’une carte de crédit, d’un iPod ou d’autres appareils. Pour protéger vos données, ne placez pas de matériaux ou d’appareils à sensibilité magnétique (comme ceux cités précédemment ou autres) à moins de 25 mm de ce port. Si des résidus quelconques se trouvent dans le port secteur MagSafe, enlevez-les doucement à l’aide d’un bâtonnet de coton. Spécifications de l’alimentation MagSafe :  Fréquence : phase unique de 50 à 60 Hz  Tension de secteur : de 100 à 240 V  Tension de sortie : 18,5 V CC, 4,6 A Diminution de l’acuité auditive Vous risquez une perte d’audition irréparable si vous utilisez un casque ou des écouteurs à un volume sonore élevé. L’oreille peut s’adapter petit à petit à des volumes sonores de plus en plus élevés qui peuvent sembler normaux, mais qui risquent à la longue d’endommager votre système auditif. En cas de sifflements ou de perte d’acuité auditive, arrêtez d’utiliser le casque ou les écouteurs et consultez un médecin. Plus le volume est élevé, plus votre audition risque d’être affectée rapidement. Pour protéger votre système auditif, les spécialistes conseillent de prendre les mesures suivantes :  Limitez la durée d’utilisation à volume élevé de vos écouteurs ou de votre casque d’écoute.  Évitez d’augmenter le volume afin de bloquer les bruits environnants.  Baissez le volume si vous ne parvenez pas à entendre une personne qui parle à côté de vous.Chapitre 5 Dernières recommandations 75 Activités à haut risque Cet ordinateur n’est pas conçu pour être utilisé dans des installations nucléaires, pour la navigation ou la communication aérienne, pour le contrôle du trafic aérien, ni dans aucune autre situation où une panne du système informatique pourrait entraîner la mort, des blessures ou de graves dommages écologiques. Informations concernant le laser pour lecteurs optiques AVERTISSEMENT : la mise en place de réglages ou la réalisation d’opérations qui ne sont pas spécifiés dans le manuel de votre appareil risque de vous exposer à des rayonnements dangereux. Le lecteur optique de votre ordinateur contient un laser qui est entièrement sans danger si l’on en fait un usage normal mais qui peut s’avérer dangereux pour les yeux s’il est démonté. Afin d’assurer votre sécurité, ce dispositif ne doit être réparé que par un fournisseur de services agréé Apple. Informations importantes sur la manipulation AVIS : ne pas suivre les présentes instructions sur la manipulation peut provoquer des dommages à votre MacBook Pro ou à d’autres objets. Environnement d’utilisation L’utilisation de votre MacBook Pro en dehors de ces plages peut gêner son bon fonctionnement :  Température de fonctionnement : de 10 à 35 °C  Température de stockage : de -20 à 45 °C76 Chapitre 5 Dernières recommandations  Humidité relative : de 5 % à 90 % (sans condensation)  Altitude de fonctionnement : de 0 à 3 048 mètres (de 0 à 10 000 pieds) Mise sous tension de votre MacBook Pro N’allumez jamais le MacBook Pro tant que tous ses composants internes ou externes ne sont pas en place. L’utilisation de l’ordinateur alors que certains composants manquent peut s’avérer dangereuse et risque de l’endommager. Transport du MacBook Pro Si vous transportez le MacBook Pro dans un sac ou dans un attaché-case, assurez-vous que ce dernier ne contient pas d’objets non attachés (des trombones ou des pièces de monnaie, par exemple) qui pourraient pénétrer accidentellement dans l’ordinateur par un orifice d’aération ou la fente du lecteur optique ou se coincer à l’intérieur d’un port. Maintenez également à l’écart du port secteur MagSafe tout objet à sensibilité magnétique. Utilisation des connecteurs et des ports Ne forcez jamais l’insertion d’un connecteur dans un port. Lorsque vous connectez un périphérique, assurez-vous que le port n’est pas obstrué, que le connecteur est adapté au port et qu’il est correctement orienté par rapport à ce dernier. Utilisation du lecteur optique Le lecteur SuperDrive du MacBook Pro prend en charge les disques standard de 12 cm. Les disques de forme irrégulière et de moins de 12 cm ne peuvent pas être lus. Manipulation des parties en verre Votre MacBook Pro contient des composants en verre, notamment l’écran et le trackpad. Si elles sont abîmées, n’utilisez pas votre MacBook Pro tant qu’il n’a pas été réparé par un fournisseur de services agréé Apple.Chapitre 5 Dernières recommandations 77 Stockage du MacBook Pro Si vous décidez de ranger votre MacBook Pro pendant une longue période, placez-le dans un endroit frais (idéalement à 22 °C) et déchargez au moins la moitié de la batterie. Lorsque vous ne touchez plus à votre MacBook Pro pendant plus de cinq mois, déchargez la batterie à environ 50 pour cent. Pour conserver les capacités de la batterie, rechargez la batterie jusqu’à 50 pour cent tous les six mois environ. Nettoyage du MacBook Pro Lorsque vous nettoyez le boîtier de votre MacBook Pro et de ses composants, éteignez d’abord le MacBook Pro et débranchez-le du secteur. Puis, pour nettoyer le boîtier de l’ordinateur, utilisez un chiffon doux, humide et non pelucheux. Évitez les infiltrations d’humidité par quelque ouverture que ce soit. Ne vaporisez jamais de liquide directement sur l’ordinateur. N’utilisez ni aérosols, ni dissolvants, ni abrasifs qui pourraient endommager les finitions de l’appareil. Nettoyage de l’écran de votre MacBook Pro Pour nettoyer l’écran de votre MacBook Pro, éteignez d’abord celui-ci et débranchez-le du secteur. Humidifiez ensuite, à l’eau seulement, le chiffon fourni et essuyez l’écran. Ne vaporisez jamais de liquide directement sur l’écran.78 Chapitre 5 Dernières recommandations Ergonomie Voici quelques conseils pour la mise en place d’un environnement de travail sain. Clavier et trackpad Lorsque vous tapez au clavier ou que vous vous servez du trackpad, vos épaules doivent être détendues. Le bras et l’avant-bras doivent former un angle droit, la main étant placée dans le prolongement du poignet. Position à éviter Position recommandée Vous devez avoir les mains et les doigts détendus lorsque vous tapez au clavier ou que vous utilisez le trackpad. Évitez de replier les pouces à l’intérieur des paumes.Chapitre 5 Dernières recommandations 79 Position à éviter Position recommandée Modifiez fréquemment la position de vos mains pour éviter la fatigue. Après un travail continu et intensif sur ordinateur, certains utilisateurs peuvent ressentir des douleurs aux mains, aux poignets ou aux bras. Si ces douleurs persistent, consultez un spécialiste. Souris externe Si vous utilisez une souris externe, veillez à ce qu’elle se trouve à hauteur du clavier. Ménagez un espace suffisant pour la manipuler avec aisance. Siège Optez pour un siège de bureau réglable et offrant un dossier et une assise confortables. Réglez la hauteur du siège de telle sorte que vos cuisses reposent à l’horizontale et vos pieds à plat sur le sol. Le dossier du siège doit soutenir votre région lombaire, c’est-à- dire la partie inférieure de votre dos. Suivez les instructions du fabricant de sorte que le réglage du dossier soit parfaitement adapté à votre morphologie.80 Chapitre 5 Dernières recommandations Au besoin, relevez le siège de manière à ce que vos avant-bras et vos mains soient placés correctement par rapport au clavier. Si, dans ce cas, vos pieds ne reposent plus à plat sur le sol, utilisez un repose-pied inclinable et réglable en hauteur. Si vous disposez d’un bureau modulaire, vous pouvez abaisser le niveau du plan de travail pour éviter l’emploi d’un repose-pied. Une troisième solution consiste à utiliser un bureau dont le poste de saisie est situé plus bas que le plan de travail. Écran intégré Réglez l’angle d’affichage afin d’optimiser l’affichage dans votre environnement. Ne forcez pas l’écran si vous rencontrez une résistance. L’angle d’ouverture maximal de l’écran ne peut dépasser 130 degrés. Réglez la luminosité et le contraste de l’écran chaque fois que vous déplacez l’ordinateur ou que l’éclairage ambiant change. Vous trouverez d’autres informations concernant l’ergonomie sur Internet : www.apple.com/about/ergonomics Apple et l’environnement Apple Inc. reconnaît sa responsabilité en matière de réduction de l’impact de ses produits et de ses activités sur l’environnement. Des informations supplémentaires sont disponibles sur Internet: www.apple.com/fr/environment81 FCC Compliance Statement This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. See instructions if interference to radio or television reception is suspected. L‘utilisation de ce dispositif est autorisée seulement aux conditions suivantes: (1) il ne doit pas produire de brouillage et (2) l’utilisateur du dispositif doit étre prêt à accepter tout brouillage radioélectrique reçu, même si ce brouillage est susceptible de compromettre le fonctionnement du dispositif. Radio and Television Interference This computer equipment generates, uses, and can radiate radiofrequency energy. If it is not installed and used properly—that is, in strict accordance with Apple’s instructions—it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in Part 15 of FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. You can determine whether your computer system is causing interference by turning it off. If the interference stops, it was probably caused by the computer or one of the peripheral devices. If your computer system does cause interference to radio or television reception, try to correct the interference by using one or more of the following measures: • Turn the television or radio antenna until the interference stops. • Move the computer to one side or the other of the television or radio. • Move the computer farther away from the television or radio. • Plug the computer into an outlet that is on a different circuit from the television or radio. (That is, make certain the computer and the television or radio are on circuits controlled by different circuit breakers or fuses.) If necessary, consult an Apple Authorized Service Provider or Apple. See the service and support information that came with your Apple product. Or consult an experienced radio/television technician for additional suggestions. Important: Changes or modifications to this product not authorized by Apple Inc. could void the EMC compliance and negate your authority to operate the product. This product has demonstrated EMC compliance under conditions that included the use of compliant peripheral devices and shielded cables (including Ethernet network cables) between system components. It is important that you use compliant peripheral devices and shielded cables between system components to reduce the possibility of causing interference to radios, television sets, and other electronic devices. Responsible party (contact for FCC matters only): Apple Inc. Corporate Compliance 1 Infinite Loop M/S 26-A Cupertino, CA 95014 Wireless Radio Use This device is restricted to indoor use when operating in the 5.15 to 5.25 GHz frequency band. Cet appareil doit être utilisé à l’intérieur. Exposure to Radio Frequency Energy The radiated output power of the AirPort Extreme technology is below the FCC radio frequency exposure limits. Nevertheless, it is advised to use the wireless equipment in such a manner that the potential for human contact during normal operation is minimized. FCC Bluetooth Wireless Compliance The antenna used with this transmitter must not be colocated or operated in conjunction with any other antenna or transmitter subject to the conditions of the FCC Grant. Bluetooth Industry Canada Statement This Class B device meets all requirements of the Canadian interference-causing equipment regulations. Cet appareil numérique de la Class B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada.82 Industry Canada Statement Complies with the Canadian ICES-003 Class B specifications. Cet appareil numérique de la classe B est conforme à la norme NMB-003 du Canada. This device complies with RSS 210 of Industry Canada. Bluetooth Europe—EU Declaration of Conformity This wireless device complies with the R&TTE Directive. Europe—EU Declaration of Conformity The equipment complies with the RF Exposure Requirement 1999/519/EC, Council Recommendation of 12 July 1999 on the limitation of exposure of the general public to electromagnetic fields (0 Hz to 300 GHz). Hereby, Apple Inc. declares that this 802.11a/b/g/n Mini-PCIe card is in compliance with the R&TTE Directive. Complies with European Low Voltage and EMC Directives. See: www.apple.com/euro/compliance Korea Warning Statements Singapore Wireless Certification Taiwan Wireless Statements Taiwan Class B Statement VCCI Class B Statement83 External USB Modem Information When connecting your Product Name to the phone line using an external USB modem, refer to the telecommunications agency information in the documentation that came with your modem. ENERGY STAR ® Compliance As an ENERGY STAR ® partner, Apple has determined that standard configurations of this product meet the ENERGY STAR ® guidelines for energy efficiency. The ENERGY STAR ® program is a partnership with electronic equipment manufacturers to promote energyefficient products. Reducing energy consumption of products saves money and helps conserve valuable resources. This computer is shipped with power management enabled with the computer set to sleep after 10 minutes of user inactivity. To wake your computer, click the mouse or trackpad button or press any key on the keyboard. For more information about ENERGY STAR ® , visit: www.energystar.gov Türkiye84 Informations sur l’élimination et le recyclage Le symbole ci-dessus signifie que vous devez vous débarrasser de votre produit selon les normes et la législation de votre pays. Lorsque votre produit n’est plus utilisable, contactez Apple ou les autorités locales afin de connaître les possibilités de recyclage. Pour en savoir plus sur le programme de recyclage Apple, consultez le site www.apple.com/fr/environment/recycling. Brazil—Disposal Information: Brasil: Informações sobre descarte e reciclagem. O símbolo indica que este produto e/ou sua bateria não devem ser descartadas no lixo doméstico. Quando decidir descartar este produto e/ou sua bateria, faça-o de acordo com as leis e diretrizes ambientais locais. Para informações sobre o programa de reciclagem da Apple, pontos de coleta e telefone de informações, visite www.apple.com/br/environment. Union européenne—instructions concernant l’élimination des déchets : Le symbole ci-dessus signifie que vous devez vous débarrasser de votre produit sans le mélanger avec les ordures ménagères, selon les normes et la législation de votre pays. Lorsque ce produit n’est plus utilisable, portez-le dans un centre de traitement des déchets agréé par les autorités locales. Certains centres acceptent les produits gratuitement. Le traitement et le recyclage séparé de votre produit lors de son élimination aideront à préserver les ressources naturelles et à protéger l’environnement et la santé des êtres humains. Informations sur l’enlèvement de la batterie Jetez vos batteries usagées en respectant les lois et les consignes environnementales de votre pays. California: The coin cell battery in the optional Apple Remote contains perchlorates. Special handling and disposal may apply. Refer to: www.dtsc.ca.gov/hazardouswaste/perchlorate Deutschland: Dieses Gerät enthält Batterien. Bitte nicht in den Hausmüll werfen. Entsorgen Sie dieses Gerätes am Ende seines Lebenszyklus entsprechend der maßgeblichen gesetzlichen Regelungen. Nederlands: Gebruikte batterijen kunnen worden ingeleverd bij de chemokar of in een speciale batterijcontainer voor klein chemisch afval (kca) worden gedeponeerd. Taiwan:K Apple Inc. © 2010 Apple Inc. Tous droits réservés. En application des lois et conventions en vigueur, aucune reproduction totale ni partielle du manuel n’est autorisée, sauf consentement écrit préalable d’Apple. Tout a été mis en œuvre pour que les informations présentées dans ce manuel soient exactes. Apple n’est pas responsable des erreurs de reproduction ou d’impression. Apple 1 Infinite Loop Cupertino, CA 95014 408-996-1010 www.apple.com Le logo Apple est une marque d’Apple Inc. déposée aux États-Unis et dans d’autres pays. En l’absence du consentement écrit d’Apple, l’utilisation à des fins commerciales de ce logo via le clavier (Option + 1) peut constituer un acte de contrefaçon et de concurrence déloyale. Apple, le logo Apple, AirPort, AirPort Extreme, Cover Flow, Exposé, FileVault, FireWire, GarageBand, iCal, iChat, iLife, iMovie, iPhone, iPhoto, iPod, iSight, iTunes, Keynote, Mac, MacBook, Macintosh, Mac OS, MagSafe, Photo Booth, Safari, Snow Leopard, Spaces, Spotlight, SuperDrive et Time Machine sont des marques d’Apple Inc. déposées aux États-Unis et dans d’autres pays. Finder, le logo FireWire et Multi-Touch sont des marques d’Apple Inc. AppleCare, Apple Store et iTunes Store sont des marques de service d’Apple Inc. déposées aux États-Unis et dans d’autres pays. ENERGY STAR ® est une marque déposée aux États-Unis. Intel, Intel Core et Xeon sont des marques d’Intel Corp. aux États-Unis et dans d’autres pays. La marque et les logos Bluetooth ® sont la propriété de Bluetooth SIG, Inc. et sont concédés sous licence par Apple Inc. Les autres noms de produits et de sociétés sont la propriété de leurs détenteurs respectifs. Les produits commercialisés par des entreprises tierces ne sont mentionnés que pour information, sans aucune intention de préconisation ni de recommandation. Apple décline toute responsabilité quant à l’utilisation et au fonctionnement de ces produits. Fabriqué sous licence de Dolby Laboratories. « Dolby », « Pro Logic » et le logo double-D sont des marques déposées de Dolby Laboratories. Ouvrages confidentiels inédits, © 1992–1997 Dolby Laboratories, Inc. Tous droits réservés. Publié simultanément aux États-Unis et au Canada. Comment démarrer 1 www.apple.com/fr/supportInstallez Leopard 3 Installez Leopard Pour mettre à niveau Mac OS X à la version Leopard, insérez votre disque d’installation et double-cliquez sur « Installation Mac OS X ». Cliquez ensuite sur Redémarrer. Votre ordinateur redémarre alors et le programme d’installation de Mac OS X s’ouvre.  Apple Inc. © 2007 Apple Inc. Tous droits réservés. Apple, le logo Apple, Boot Camp, Exposé, FireWire, iCal, iPhoto, Keynote, Mac et Mac OS sont des marques d’Apple Inc. déposées aux États-Unis et dans d’autres pays. Aperture, Cover Flow, Finder, iPhone, Leopard, Safari et Spotlight sont des marques d’Apple Inc. AppleCare est une marque de service d’Apple Inc. déposée aux États-Unis et dans d’autres pays. .Mac est une marque de service d’Apple Inc. Les noms des autres produits et sociétés mentionnés ci-inclus peuvent être des marques de leurs détenteurs respectifs. Apple commercialisant fréquemment des nouvelles versions et des mises à jour de ses logiciels, il se peut que les images illustrant cet ouvrage ne correspondent pas à ce que vous pouvez voir à l’écran.4 Installez Leopard Installez Leopard 5 Lancez l’installation Cliquez sur Installer pour lancer l’installation de Mac OS X 10.5. Une fois l’installation terminée, votre ordinateur redémarre. Cliquez sur Personnaliser si vous voulez changer les éléments installés. Cliquez sur Options si vous voulez sélectionner un autre type d’installation. Pour des informations complémentaires, accédez au dossier Instructions situé sur votre disque d’installation. Sélectionnez la destination Sélectionnez votre disque de démarrage ou le volume où la version de Mac OS X à mettre à niveau se trouve. Sélectionnez un volume. Il se peut que vous ne soyez pas en mesure d’installer Leopard sur certains volumes. Vous trouverez ici des informations importantes relatives à l’installation.À la rencontre de Leopard 2 www.apple.com/fr/macosx8 Bureau Bureau 9 Piles (“Stacks”) Piles constitue un moyen pratique d’accéder à vos documents. Les dossiers déjà placés dans le Dock se transforment automatiquement en piles. Pour créer une pile, faites glisser un dossier contenant des documents sur le Dock. Si vous cliquez sur une pile, ses éléments s’a∑ chent alors sous forme de grille ou d’éventail au-dessus de l’icône. Bureau Du menu au Dock, Leopard présente un nouveau look et se complète de Piles, un nouveau moyen de toujours rester organisé.10 Bureau Bureau 11 Personnalisation Piles s’a∑ che automatiquement sous forme d’éventail ou de grille selon le nombre d’éléments se trouvant dans la pile. Vous pouvez indiquer le style à utiliser et modifi er l’ordre de la pile. Pour personnaliser une pile, placez le pointeur sur l’icône de la pile puis maintenez enfoncé le bouton de la souris jusqu’à ce qu’un menu apparaisse. Pile Téléchargements Le Dock comprend une pile Documents et une pile Téléchargements. Les éléments que vous téléchargez par le biais de Safari, de Mail ou d’iChat se placent toujours dans la pile Téléchargements de façon à les retrouver rapidement. Le téléchargement le plus récent apparaît ici. Cliquez sur la pile Téléchargements pour retrouver les éléments que vous avez téléchargés.12 Finder Finder 13 Cover Flow Cover Flow vous permet de visualiser entre autres vos séquences vidéo, vos présentations et vos fi chiers PDF dans des aperçus de grande taille, au fur et à mesure que vous tournez les pages de leur représentation. Cliquez sur ce bouton pour activer Cover Flow. Faites glisser le curseur pour faire défi ler vos documents l’un après l’autre. Placez le pointeur sur un élément pour lire une séquence vidéo ou pour consulter les pages d’un document par exemple. Finder Visualisez vos fi chiers dans Cover Flow et parcourez-les rapidement.14 Finder Finder 15 Spotlight Dans une fenêtre du Finder ou dans la barre des menus, utilisez Spotlight pour rechercher des éléments situés sur les disques de votre ordinateur. Si vous lancez souvent la même recherche, enregistrez-la dans la section Rechercher de la barre latérale. Tapez votre recherche dans le champ de recherche. Cliquez sur Enregistrer pour ajouter un dossier intelligent à la barre latérale. Retrouvez les résultats de votre recherche dans Cover Flow. Barre latérale La barre latérale du Finder simplifi e l’accès aux dossiers de votre ordinateur, à des ordinateurs partagés connectés à votre réseau et à vos recherches enregistrées. Les recherches d’usage courant sont incluses dans la barre latérale. Vous pouvez aussi ajouter vos propres recherches. Les ordinateurs partagés accessibles depuis votre réseau apparaissent automatiquement à cet endroit.16 Finder Finder 17 Partage d’écran Le partage d’écran vous permet d’accéder au bureau d’ordinateurs partagés de votre réseau. Vous pouvez ainsi, entre autres, contrôler leur usage, modifi er des réglages, le tout depuis votre ordinateur. Sélectionnez l’ordinateur puis cliquez sur Partage d’écran. Vous retrouvez ainsi le bureau de l’autre ordinateur dans une fenêtre. Pour que l’a∑ chage occupe tout votre écran, cliquez sur le bouton Plein écran. Pour activer la barre d’outils, choisissez Présentation > A∑ cher la barre Accédez d’outils. immédiatement au dossier Public de n’importe quel ordinateur partagé. Recherchez des documents situés sur des ordinateurs partagés. Ordinateurs partagés Les ordinateurs partagés accessibles depuis votre réseau apparaissent automatiquement dans la barre latérale de façon à ce que vous puissiez retrouver rapidement les documents qu’ils contiennent.18 Finder Finder 19 Retour vers Mon Mac À l’aide de votre compte .Mac, d’une connexion Internet et avec les services de partage et « Retour vers Mon Mac » activés, vous avez accès à n’importe lequel de vos ordinateurs, de n’importe où à travers Internet. Retour vers Mon Mac est activé automatiquement. Les ordinateurs « Retour vers Mon Mac » apparaissent dans la barre latérale. Partage Vous pouvez partager, entre autres, vos fi chiers, votre site web, l’a∑ chage de votre écran, avec d’autres ordinateurs connectés à votre réseau. Pour activer la fonctionnalité, ouvrez les Préférences Système puis cliquez sur Partage. Cliquez sur le bouton Ajouter (+) pour sélectionner les utilisateurs et les groupes pouvant partager vos fi chiers. Cliquez sur le bouton Ajouter (+) pour sélectionner le dossier de votre choix à partager.20 Coup d’œil Coup d’œil 21 Visualisez des documents Coup d’œil s’utilise à partir du Finder, de Time Machine et de Mail. Pour a∑ cher un élément dans Coup d’œil, sélectionnez-le et appuyez sur la barre d’espace. Cliquez sur le bouton Coup d’œil accessible depuis la barre d’outils de la fenêtre du Finder. Cliquez sur cette icône pour agrandir l’aperçu en plein écran. Coup d’œil Visualisez des aperçus de qualité pour, entre autres, des séquences, des fi chiers PDF, des présentations ou des feuilles de calcul, sans pour autant ouvrir l’application qui leur est associée.22 Coup d’œil Coup d’œil 23 A∑ chez vos collections d’éléments Coup d’œil vous permet d’a∑ cher plusieurs éléments en une seule fois. Pour passer automatiquement en revue les éléments, cliquez sur le bouton de lecture. Cliquez sur le bouton Appareil photo pour ajouter une photo à iPhoto. Cliquez sur le bouton Feuille d’index pour visualiser tous les éléments. Cliquez sur une image de la feuille d’index pour l’a∑ cher. Chaque diapo d’une présentation Keynote apparaît à cet endroit. Parcourez vos données En visualisant des documents dans Coup d’œil, vous pouvez tourner chaque page constituant votre document ou a∑ cher chaque diapo d’une présentation Keynote.24 Time Machine Time Machine 25 Activez Time Machine Pour pouvoir utiliser Time Machine, branchez simplement un disque FireWire ou USB sur votre ordinateur, puis cliquez sur « Utiliser en tant que disque de sauvegarde » dans la zone de dialogue qui s’a∑ che. Lorsque vous activez Time Machine, l’outil sauvegarde les données de votre ordinateur sur le disque sélectionné. Time Machine Sauvegardez automatiquement votre Mac. S’il vous manque un document, voyagez dans le temps pour le récupérer.26 Time Machine Time Machine 27 Défi nissez les préférences Time Machine Pour défi nir les options de Time Machine, ouvrez les préférences Time Machine. Vous pouvez sélectionner un autre disque de sauvegarde ou indiquer des dossiers ou des disques à ne pas inclure à vos copies de sauvegarde. Cliquez sur Options pour sélectionner les éléments à ne pas sauvegarder. Récupérez vos fi chiers Recherchez en toute simplicité un document manquant en retrouvant l’aspect qu’avait votre bureau auparavant. Time Machine procède à une copie de sauvegarde chaque heure de la journée en cours, puis e∂ ectue des copies de sauvegarde journalières. Tapez le nom du document que vous recherchez dans le champ de recherche. Lorsque vous retrouvez le document, sélectionnez-le puis cliquez sur Restauration. Cliquez sur la fl èche allant vers l’arrière pour revenir dans le temps. Parcourez les éléments de votre copie de sauvegarde à l’aide de Cover Flow. Coup d’œil vous permet de vérifi er un document avant de le restaurer.28 Spaces Spaces 29 Organisez vos fenêtres Activez Spaces dans les préférences Exposé et Spaces, et appuyez sur F8 pour a∑ cher vos espaces. Pour organiser vos fenêtres, faites-les glisser de l’espace actif sur un autre espace. Faites glisser les fenêtres à regrouper dans le même espace. Spaces Organisez votre travail et manipulez-le en regroupant les fenêtres des applications en « espaces ». Passez ensuite rapidement d’un de vos espaces à l’autre.30 Spaces Spaces 31 Personnalisez les espaces Après avoir activé Spaces, vous pouvez ajouter d’autres espaces. Vous pouvez aussi a∂ ecter des applications à des espaces précis de façon à ce que les fenêtres de chaque application s’ouvrent toujours dans le même espace. Ajoutez des rangées et des colonnes pour créer les espaces nécessaires. Choisissez les raccourcis clavier qui vous conviennent. Cliquez sur le bouton Ajouter (+) pour a∂ ecter des applications aux espaces. Faites glisser les espaces pour les réorganiser. Permutez les espaces Pour passer d’un espace à l’autre, appuyez sur Contrôle + [touche fl échée]. Pour accéder directement à un espace, appuyez sur Contrôle + [numéro]. Réorganisez les espaces selon vos besoins. Utilisez les raccourcis clavier pour passer rapidement d’un espace à l’autre.32 Mail Mail 33 Modèles En créant un message, sélectionnez un modèle pour lui appliquer le style qu’il faut, que ce soit pour une fête ou une occasion plus solennelle. L’ajout de photos est simple grâce au navigateur de photos. Cliquez sur ce bouton pour choisir le modèle à utiliser. Sélectionnez un type de modèle, puis cliquez sur le modèle à utiliser. Sélectionnez des photos d’iPhoto, de Photo Booth ou d’Aperture. Les photos apparaissent à cet endroit. Faites-en glisser une sur votre message. Mail Les modèles conçus par Apple vous permettent d’envoyer des courriers électroniques élaborés incluant des photos.34 Mail Mail 35 Détection des données Vous pouvez défi nir des événements iCal à partir de dates incluses dans vos courriers électroniques. L’ajout du nom, des numéros de téléphone et des adresses aux fi ches de vos contacts est des plus simples. Vous pouvez même situer des adresses sur un carte a∑ chée dans Safari. Placez le pointeur sur la date, le nom ou l’adresse, puis cliquez sur le triangle pour choisir une option. Notes et tâches à réaliser Centralisez toutes vos notes et vos tâches à réaliser. Gri∂ onnez des rappels, la liste des courses et des informations dont vous avez besoin. Ajoutez à vos éléments des images, des URL et des pièces jointes. Cliquez à cet endroit pour défi nir les options de la tâche à réaliser. Les éléments apparaissent automatiquement dans iCal. Retrouvez vos notes et vos tâches à réaliser dans la section Rappels de la barre latérale. Cliquez sur un des boutons pour créer une note ou une tâche à réaliser. Pour créer une tâche à réaliser, sélectionnez le texte d’une note et cliquez sur Tâche.36 iChat iChat 37 Arrière-plans vidéo Utilisez des arrière-plans vidéo dans vos conversations pour « simuler » que vous êtes quelque part dans le monde. iChat comprend des séquences et des images fi xes que vous pouvez exploiter, mais vous pouvez aussi ajouter votre propre vidéo ou photo. Ajoutez vos propres séquences ou des images personnelles servant d’arrière-plan vidéo. Sélectionnez un arrière-plan vidéo puis sortez du champ de l’image un instant. Cliquez sur E∂ ets pour sélectionner un e∂ et vidéo. iChat Rendez vos conversations plus attrayantes en utilisant des e∂ ets vidéo, tels que les arrière-plans. Démontrez votre talent avec iChat theater.38 iChat iChat 39 iChat theater Pour a∑ cher des photos, des séquences ou des présentations lors d’une conversation vidéo, lancez la conversation puis faites glisser le ou les fi chiers à a∑ cher dans la fenêtre de la conversation. Demandez l’avis de votre contact sur votre présentation. Contrôlez votre présentation à travers cette fenêtre. E∂ ets Vous pouvez sélectionner des e∂ ets vidéo pour rendre en direct vos conversations plus vivantes et intéressantes. Cliquez sur l’e∂ et de votre choix pour l’utiliser. Cliquez sur l’e∂ et au centre pour rétablir la présentation d’origine.40 iChat iChat 41 Conversations en onglets Utilisez les conversations en onglets si vous suivez de nombreuses conversations à la fois. Pour ce faire, ouvrez la sous-fenêtre Messages des préférences iChat, puis sélectionnez « Rassembler les conversations dans une seule fenêtre ». Cliquez sur une conversation pour y revenir. La dernière réponse de votre contact s’a∑ che. Partage d’écran iChat Le partage d’écran vous permet de contrôler l’ordinateur d’un contact pour lui montrer comment réaliser une opération plutôt que de lui expliquer. Cliquez ici pour permuter les écrans. Pour copier un document sur cet ordinateur, faites-le glisser sur la fenêtre. Sélectionnez un contact disposant de la fonctionnalité de conversation vidéo, puis cliquez sur le bouton Partage d’écran.42 iChat iChat 43 Envoi de SMS Échangez des SMS à partir d’iChat avec un contact utilisant un téléphone portable, tel que l’iPhone. Choisissez Fichier > Envoyer un SMS, puis tapez le numéro de téléphone de votre contact. Ce contact peut recevoir les SMS. Remarque : l’envoi de SMS n’est disponible que sur les téléphones portables aux États-Unis. Disponibilité Si vous possédez plusieurs comptes .Mac, AIM, Jabber ou Google Talk, vous pouvez en ouvrir la session simultanément dans iChat. Utilisez une image GIF animée pour votre photo en tant que contact. Choisissez Invisible si vous cherchez à savoir qui est disponible sans pour autant être vu.44 Dashboard Dashboard 45 Accédez à la page web dans Safari et cliquez sur ce bouton. Web clip Pour créer un widget, accédez à une page web dans Safari puis choisissez Fichier > Ouvrir dans Dashboard. Safari sélectionne automatiquement les zones de la page selon l’endroit où vous placez le pointeur sur la page. Une fois sélectionné la partie qui vous intéresse, cliquez sur Ajouter. Faites glisser le rectangle de sélection sur les informations voulues puis cliquez. Vous pouvez ensuite redimensionner la sélection établie. Dashboard Créez votre propre widget à partir de n’importe quel segment d’une page web et retrouvez-en les actualisations dans Dashboard.46 Safari Safari 47 Navigation par onglets Vous pouvez désormais faire glisser les onglets pour les réorganiser entre eux ou en dehors du navigateur pour ouvrir une nouvelle fenêtre. Pour fusionner les fenêtres ouvertes en une seule fenêtre à onglets, choisissez Fenêtre > Fusionner toutes les fenêtres. Faites glisser les onglets pour réorganiser l’ordre dans lequel ils apparaissent. Faites glisser un onglet en dehors de la fenêtre pour le placer dans une fenêtre distincte. Pour passer d’un onglet à l’autre, appuyez sur Commande + Maj + Crochet fermant ( ] ) ou sur Commande + Maj + Crochet ouvrant ( [ ). Safari Le plus beau navigateur web est encore plus simple à utiliser grâce à la navigation dynamique par onglets mais aussi à d’autres fonctionnalités inédites.48 Safari Safari 49 Ouvrez le fi chier PDF dans Aperçu ou enregistrez-le dans votre pile Téléchargements. A∑ chage de documents PDF Vous pouvez a∑ cher des fi chiers PDF dans la fenêtre de Safari. De nouvelles commandes sont à votre disposition pour manipuler ces fi chiers plus facilement. Pour accéder à ces commandes, déplacez le pointeur vers le bas de la fenêtre de Safari. Recherche Pour rechercher du texte dans une page web, choisissez Édition > Rechercher > Rechercher, puis tapez le texte recherché. Pour retrouver plus facilement ce que vous recherchez, Safari met en surbrillance tous les résultats. Safari met en surbrillance les résultats trouvés sur la page web de façon à ce que puissiez les localiser facilement. Cliquez sur ces fl èches pour placer la surbrillance sur une occurrence spécifi que.50 Contrôles parentaux Contrôles parentaux 51 Limites de temps Décidez du moment où vos enfants peuvent utiliser l’ordinateur en réglant les limites de temps en semaine, pendant le week-end et les horaires de nuit. Indiquez combien d’heures par jour votre enfant est autorisé à utiliser l’ordinateur. Précisez les heures de nuit auxquelles votre enfant ne peut pas utiliser l’ordinateur, pendant les jours d’école et pendant le week-end. Contrôles parentaux Pour que vos enfants ne dépassent pas les bornes... informatiques. Gérez le temps que vos enfants passent devant l’ordinateur et ce qu’ils font de son utilisation.52 Contrôles parentaux Contrôles parentaux 53 Limites pour Mail et iChat Protégez vos enfants des inconnus en indiquant ceux qui peuvent entretenir une conversation avec eux et échanger des courriers électroniques. Saisissez votre adresse électronique afi n d’être informé si vos enfants essaient de communiquer avec quelqu’un qui n’est pas dans la liste. Cliquez sur le bouton Ajouter (+) pour ajouter une adresse. Activez cette option pour autoriser vos enfants à n’accéder qu’à des sites web spécifi ques. Limites sur le contenu Pour restreindre l’accès de vos enfants aux sites web qu’ils ont le droit de visiter, cliquez sur Contenu puis sélectionnez le niveau de restrictions que vous voulez appliquer. Sélectionnez cette option pour limiter l’accès tenté à des sites web pour adultes. Cliquez sur Personnaliser si vous voulez indiquer les sites web que vos enfants peuvent et ne peuvent pas visiter.54 Contrôles parentaux Contrôles parentaux 55 Sélectionnez l’ordinateur de votre enfant et ouvrez une session. Sélectionnez ensuite le nom d’utilisateur de votre enfant. Activez cette option sur l’ordinateur de votre enfant. Contrôles parentaux à distance Gérez depuis votre ordinateur les contrôles parentaux pour l’accès de votre enfant à son ordinateur. En activant les contrôles parentaux, sélectionnez l’option « Gérer les contrôles parentaux à partir d’un autre ordinateur ». Historiques Utilisez la sous-fenêtre Historiques pour vérifi er l’activité de vos enfants devant l’ordinateur et sur Internet. Retrouvez les sites web que vos enfants ont visités.56 Photo Booth Photo Booth 57 Arrière-plans vidéo Faites comme si vous étiez quelque part dans le monde (ou loin de ce monde) à l’aide d’arrière-plans vidéo lorsque vous prenez un instantané. Sélectionnez un arrière-plan puis sortez du champ de l’image un instant. Photo Booth Découvrez de nouvelles façons de vous divertir avec les nouveaux types d’instantanés. Les arrière-plans vidéo o∂ rent des possibilités en plus.58 Photo Booth Photo Booth 59 Lors de l’aperçu d’un plan vidéo, déplacez le pointeur sur l’image pour contrôler la lecture. Plans vidéo Mettez au point un plan vidéo vous représentant avec des e∂ ets et des arrière-plans. Utilisez votre plan comme message de salutations vidéo incluant de l’audio, à envoyer à vos proches dans un courrier électronique. Cliquez sur le bouton Plan vidéo. Images constituées de quatre instantanés Vous pouvez désormais prendre des photos composées de quatre instantanés. Exportez votre image sur quatre instantanés en tant qu’image GIF animée et utilisez-la pour votre photo de contact dans iChat. Pendant l’aperçu d’une image sur quatre instantanés, cliquez sur une image pour la prévisualiser et choisir comment l’utiliser. Cliquez sur le bouton représentant les quatre instantanés regroupés.60 Front Row Front Row 61 Sélectionnez ce que vous voulez regarder. Télécommande Apple Remote Pour ouvrir Front Row, appuyez sur le bouton Menu de votre télécommande Apple Remote. Appuyez sur les touches de volume pour mettre en surbrillance les éléments. Appuyez sur la touche de lecture pour sélectionner l’élément en surbrillance. Appuyez sur Menu pour revenir au menu précédent. Servez-vous de votre télécommande Apple Remote, installez-vous confortablement et profi tez du programme. Front Row Profi tez de vos divertissements numériques sur votre Mac, de n’importe où dans la pièce où vous êtes. Installez-vous confortablement et prenez votre télécommande. Que le spectacle commence.62 Front Row Front Row 63 Données multimédia partagées À partir de Front Row, vous pouvez visionner des divertissements numériques partagés par d’autres ordinateurs connectés à votre réseau. Cliquez à cet endroit pour a∑ cher des photos partagées sur votre réseau. Sélectionnez le mode d’a∑ chage de vos photos par Front Row. Choisissez l’album photo ou l’événement iPhoto à a∑ cher. Galerie photos Transformez votre Mac en galerie compilant vos photos favorites. Grâce à Front Row, vous pouvez a∑ cher vos photos dans iPhoto, dans Photo Booth et dans Aperture.64 Boot Camp Boot Camp 65 Installez Boot Camp Ouvrez l’Assistant réglages de Boot Camp (situé dans le dossier Utilitaires accessible à partir du dossier Applications) et imprimez le Guide d’installation et de confi guration de Boot Camp. Créez ensuite une partition pour Windows. Imprimez ce document afi n de pouvoir suivre les instructions pendant l’installation de Windows. Faites glisser le curseur de division pour défi nir la taille de la partition Windows. Si vous avez installé une version bêta de Boot Camp, vous n’avez seulement qu’à installer les nouveaux gestionnaires Windows en accédant à Windows et en insérant le disque d’installation de Mac OS X 10.5. Boot Camp Pour utiliser une application Windows sur votre Mac, installez Boot Camp et votre copie de Windows. Vous êtes alors fi n prêt.66 Boot Camp Boot Camp 67 Passez d’un système à l’autre Sous Mac OS X, ouvrez les Préférences Disque de démarrage pour sélectionner votre partition Windows. Sous Windows, ouvrez la rubrique Boot Camp dans le Panneau de confi guration, puis cliquez sur Disque de démarrage. Sélectionnez votre partition Windows, puis cliquez sur Redémarrer. Sélectionnez votre disque de démarrage Mac OS X, puis cliquez sur Redémarrer. Installez Windows Insérez votre disque d’installation de Windows XP ou de Windows Vista et cliquez sur Démarrer l’installation. Cliquez sur ce bouton une fois prêt à installer Windows sur votre Mac. Installez les gestionnaires Windows une fois terminées l’installation et la confi guration de Windows.Besoin d’aide ? 3 www.apple.com/fr/support70 Assistance Apple Assistance Apple 71 Informations sur le service et l’assistance AppleCare Votre produit Mac OS X comprend une assistance gratuite téléphonique de 90 jours. Les techniciens de l’assistance par téléphone AppleCare peuvent vous aider pour l’ouverture et l’installation d’applications et pour résoudre des problèmes simples. Consultez le tableau ci-dessous pour connaître le centre d’assistance le plus proche. Gardez la date d’achat et le numéro de série de votre ordinateur Apple à portée si vous appelez. Remarque : des frais de communication téléphonique peuvent s’appliquent. Vous pouvez étendre votre couverture en faisant l’acquisition du programme AppleCare Protection Plan. Pour en savoir plus sur le programme AppleCare Protection Plan, rendez-vous sur le site web des produits et services AppleCare à l’adresse www.apple.com/fr/support/products. Pour obtenir des informations complémentaires pour contacter le service d’assistance d’Apple, rendez-vous à l’adresse www.apple.com/fr/support/contact. (Les numéros de téléphone sont sujets à modifi cation.) Numéros de l’assistance technique Belgique (32) 070 700 773 www.apple.com/befr/support Canada (en français) 1-800-263-3394 www.apple.com/ca/fr/support France (33) 0825 888 024 www.apple.com/fr/support Luxembourg (352) 800 24550 www.apple.com/befr/support Suisse (41) 0848 000 132 www.apple.com/chfr/support En savoir plus, réparations et assistance Ressources en ligne Pour accéder aux informations en ligne de service et d’assistance, visitez la page www.apple.com/fr/support. Sélectionnez votre pays à partir du menu local. Vous pouvez y rechercher les mises à jour de logiciels et les manuels les plus récents, retrouver des réponses par le biais de la base de connaissances AppleCare (interface en anglais) ou obtenir de l’aide à travers les forums de discussion d’Apple. Aide à l’écran Vous retrouverez souvent des réponses à vos questions, ainsi que des instructions et des informations pour résoudre des problèmes, à l’aide du menu Aide disponible dans certaines applications. Choisissez Aide dans le menu Aide du Finder, tapez quelques mots dans le champ de recherche et appuyez sur Retour. Informations Système Utilisez Informations Système pour accéder aux informations relatives à votre ordinateur. Informations Système énumère les matériels et les logiciels installés sur votre ordinateur, indique son numéro de série et la version de son système d’exploitation, la capacité de la mémoire installée, ainsi que la charge restante de la batterie. Pour ouvrir Informations Système, choisissez dans la barre des menus le menu Pomme () > À propos de ce Mac, puis cliquez sur le bouton « Plus d’infos ». 72 73 Apple-labeled computer at a time. You agree not to install, use or run the Apple Software on any non-Applelabeled computer, or to enable others to do so. This License does not allow the Apple Software to exist on more than one computer at a time, and you may not make the Apple Software available over a network where it could be used by multiple computers at the same time. B. Family Pack. If you have purchased a Mac OS X Family Pack, this License allows you to install and use one (1) copy of the Apple Software on up to a maximum of fi ve (5) Apple-labeled computers at a time as long as those computers are located in the same household and used by persons who occupy that same household. By “household” we mean a person or persons who share the same housing unit such as a home, apartment, mobile home or condominium, but shall also extend to student members who are primary residents of that household but residing at a separate on-campus location. The Family Pack License does not extend to business or commercial users. C. You may make one copy of the Apple Software (excluding the Boot ROM code and other Apple fi rmware that is embedded or otherwise contained in Apple-labeled hardware) in machine-readable form for backup purposes only; provided that the backup copy must include all copyright or other proprietary notices contained on the original. Apple Boot ROM code and fi rmware is provided only for use on Apple-labeled hardware and you may not copy, modify or redistribute the Apple Boot ROM code or fi rmware, or any portions thereof. D. Certain components of the Apple Software, and third party open source programs included with the Apple Software, have been or may be made available by Apple on its Open Source web site (http://www. opensource.apple.com/) (collectively the “Open-Sourced Components”). You may modify or replace only these Open-Sourced Components; provided that: (i) the resultant modifi ed Apple Software is used, in place of the unmodifi ed Apple Software, on a single Apple-labeled computer; and (ii) you otherwise comply with the terms of this License and any applicable licensing terms governing use of the Open-Sourced Components. Apple is not obligated to provide any updates, maintenance, warranty, technical or other support, or services for the resultant modifi ed Apple Software. You expressly acknowledge that if failure or damage to Apple hardware results from modifi cation of the OpenSourced Components of the Apple Software, such failure or damage is excluded from the terms of the Apple hardware warranty. E. Apple has provided, as part of the Apple Software package, access to certain third party software as a convenience. To the extent that the Apple Software contains third party software, Apple has no express or implied obligation to provide any technical or other support for such software. Please contact the appropriate software vendor or manufacturer directly for technical support and customer service related to its software and products. F. Except as and only to the extent permitted by applicable licensing terms governing use of the Open-Sourced Components, or by applicable law, you may not copy, decompile, reverse engineer, disassemble, modify, or SOFTWARE LICENSE AGREEMENT FOR MAC OS X APPLE INC. SOFTWARE LICENSE AGREEMENT FOR MAC OS X Single Use and Family Pack License for use on Apple-labeled Systems PLEASE READ THIS SOFTWARE LICENSE AGREEMENT (“LICENSE”) CAREFULLY BEFORE USING THE APPLE SOFTWARE. BY USING THE APPLE SOFTWARE, YOU ARE AGREEING TO BE BOUND BY THE TERMS OF THIS LICENSE. IF YOU DO NOT AGREE TO THE TERMS OF THIS LICENSE, DO NOT USE THE SOFTWARE. IF YOU DO NOT AGREE TO THE TERMS OF THE LICENSE, YOU MAY RETURN THE APPLE SOFTWARE TO THE PLACE WHERE YOU OBTAINED IT FOR A REFUND. IF THE APPLE SOFTWARE WAS ACCESSED ELECTRONICALLY, CLICK “DISAGREE/ DECLINE”. FOR APPLE SOFTWARE INCLUDED WITH YOUR PURCHASE OF HARDWARE, YOU MUST RETURN THE ENTIRE HARDWARE/SOFTWARE PACKAGE IN ORDER TO OBTAIN A REFUND. IMPORTANT NOTE: This software may be used to reproduce, modify, publish and distribute materials. It is licensed to you only for reproduction, modifi cation, publication and distribution of non-copyrighted materials, materials in which you own the copyright, or materials you are authorized or legally permitted to reproduce, modify, publish or distribute. If you are uncertain about your right to copy, modify, publish or distribute any material, you should contact your legal advisor. 1. General. The software (including Boot ROM code), documentation and any fonts accompanying this License whether preinstalled on Apple-labeled hardware, on disk, in read only memory, on any other media or in any other form (collectively the “Apple Software”) are licensed, not sold, to you by Apple Inc. (“Apple”) for use only under the terms of this License, and Apple reserves all rights not expressly granted to you. The rights granted herein are limited to Apple’s and its licensors’ intellectual property rights in the Apple Software as licensed hereunder and do not include any other patents or intellectual property rights. You own the media on which the Apple Software is recorded but Apple and/or Apple’s licensor(s) retain ownership of the Apple Software itself. The terms of this License will govern any software upgrades provided by Apple that replace and/or supplement the original Apple Software product, unless such upgrade is accompanied by a separate license in which case the terms of that license will govern. Title and intellectual property rights in and to any content displayed by or accessed through the Apple Software belongs to the respective content owner. Such content may be protected by copyright or other intellectual property laws and treaties, and may be subject to terms of use of the third party providing such content. This License does not grant you any rights to use such content nor does it guarantee that such content will continue to be available to you. 2. Permitted License Uses and Restrictions. A. Single Use. This License allows you to install, use and run one (1) copy of the Apple Software on a single 74 75 educational institutional facility (i.e., college campus, public or private K-12 schools). 4. Consent to Use of Data. You agree that Apple and its subsidiaries may collect and use technical and related information, including but not limited to technical information about your computer, system and application software, and peripherals, that is gathered periodically to facilitate the provision of software updates, product support and other services to you (if any) related to the Apple Software, and to verify compliance with the terms of this License. Apple may use this information, as long as it is in a form that does not personally identify you, to improve our products or to provide services or technologies to you. 5. Termination. This License is e∂ ective until terminated. Your rights under this License will terminate automatically without notice from Apple if you fail to comply with any term(s) of this License. Upon the termination of this License, you shall cease all use of the Apple Software and destroy all copies, full or partial, of the Apple Software. 6. Limited Warranty on Media. Apple warrants the media on which the Apple Software is recorded and delivered by Apple to be free from defects in materials and workmanship under normal use for a period of ninety (90) days from the date of original retail purchase. Your exclusive remedy under this Section shall be, at Apple’s option, a refund of the purchase price of the product containing the Apple Software or replacement of the Apple Software which is returned to Apple or an Apple authorized representative with a copy of the receipt. THIS LIMITED WARRANTY AND ANY IMPLIED WARRANTIES ON THE MEDIA INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, OF SATISFACTORY QUALITY, AND OF FITNESS FOR A PARTICULAR PURPOSE, ARE LIMITED IN DURATION TO NINETY (90) DAYS FROM THE DATE OF ORIGINAL RETAIL PURCHASE. SOME JURISDICTIONS DO NOT ALLOW LIMITATIONS ON HOW LONG AN IMPLIED WARRANTY LASTS, SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU. THE LIMITED WARRANTY SET FORTH HEREIN IS THE ONLY WARRANTY MADE TO YOU AND IS PROVIDED IN LIEU OF ANY OTHER WARRANTIES (IF ANY) CREATED BY ANY DOCUMENTATION, PACKAGING OR OTHERWISE. THIS LIMITED WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS, AND YOU MAY ALSO HAVE OTHER RIGHTS WHICH VARY BY JURISDICTION. 7. Disclaimer of Warranties. YOU EXPRESSLY ACKNOWLEDGE AND AGREE THAT USE OF THE APPLE SOFTWARE IS AT YOUR SOLE RISK AND THAT THE ENTIRE RISK AS TO SATISFACTORY QUALITY, PERFORMANCE, ACCURACY AND EFFORT IS WITH YOU. EXCEPT FOR THE LIMITED WARRANTY ON MEDIA SET FORTH ABOVE AND TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE APPLE SOFTWARE AND ANY SERVICES PERFORMED OR PROVIDED BY THE APPLE SOFTWARE (“SERVICES”) ARE PROVIDED “AS IS”, WITH ALL FAULTS AND WITHOUT WARRANTY OF ANY KIND, AND APPLE AND APPLE’S LICENSORS (COLLECTIVELY REFERRED TO AS “APPLE” FOR THE PURPOSES OF SECTIONS 7 and 8) HEREBY DISCLAIM ALL WARRANTIES AND CONDITIONS WITH RESPECT TO THE APPLE SOFTWARE AND ANY SERVICES, EITHER EXPRESS, IMPLIED OR STATUTORY, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES AND/OR CONDITIONS OF MERCHANTABILITY, OF SATISFACTORY QUALITY, OF FITNESS FOR A PARTICULAR PURPOSE, OF ACCURACY, OF QUIET ENJOYMENT, AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. APPLE DOES NOT WARRANT AGAINST INTERFERENCE WITH YOUR create derivative works of the Apple Software or any part thereof. THE APPLE SOFTWARE IS NOT INTENDED FOR USE IN THE OPERATION OF NUCLEAR FACILITIES, AIRCRAFT NAVIGATION OR COMMUNICATION SYSTEMS, AIR TRAFFIC CONTROL SYSTEMS, LIFE SUPPORT MACHINES OR OTHER EQUIPMENT IN WHICH THE FAILURE OF THE APPLE SOFTWARE COULD LEAD TO DEATH, PERSONAL INJURY, OR SEVERE PHYSICAL OR ENVIRONMENTAL DAMAGE. G. If you use Setup/Migration Assistant to transfer software from one Apple-labeled computer to another Apple-labeled computer, please remember that continued use of the original copy of the software may be prohibited once a copy has been transferred to another computer, unless you already have a licensed copy of such software on both computers. You should check the relevant software license agreements for applicable terms and conditions. 3. Transfer. You may not rent, lease, lend, redistribute or sublicense the Apple Software. Subject to the restrictions set forth below, you may, however, make a one-time permanent transfer of all of your license rights to the Apple Software (in its original form as provided by Apple) to another party, provided that: (a) the transfer must include all of the Apple Software, including all its component parts (excluding Apple Boot ROM code and fi rmware), original media, printed materials and this License; (b) you do not retain any copies of the Apple Software, full or partial, including copies stored on a computer or other storage device; and (c) the party receiving the Apple Software reads and agrees to accept the terms and conditions of this License. You may not rent, lease, lend, redistribute, sublicense or transfer any Apple Software that has been modifi ed or replaced under Section 2D above. All components of the Apple Software are provided as part of a bundle and may not be separated from the bundle and distributed as standalone applications. Apple Software provided with a particular Apple-labeled hardware product may not run on other models of Apple-labeled hardware. Updates: If an Apple Software update completely replaces (full install) a previously licensed version of the Apple Software, you may not use both versions of the Apple Software at the same time nor may you transfer them separately. NFR (Not for Resale) and Evaluation Copies: Notwithstanding other sections of this License, Apple Software labeled or otherwise provided to you on a promotional or not-for-resale basis may only be used for demonstration, testing and evaluation purposes and may not be resold or transferred. Apple System Restore Copies: Restore CDs or DVDs that may accompany an Apple hardware bundle, or are otherwise provided by Apple in connection with an Apple hardware bundle, contain a copy of the Apple Software that is to be used for diagnostic and restorative purposes only. These CDs and DVDs may be resold or transferred only as part of the Apple hardware bundle. Academic Copies: If the Apple Software package has an academic label or if you acquired the Apple Software at an academic discount, you must be an Eligible Educational End User to use the Apple Software. “Eligible Educational End Users” means students, faculty, sta∂ and administration attending and/or working at an 76 77 8. Limitation of Liability. TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT SHALL APPLE BE LIABLE FOR PERSONAL INJURY, OR ANY INCIDENTAL, SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES WHATSOEVER, INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, LOSS OF DATA, BUSINESS INTERRUPTION OR ANY OTHER COMMERCIAL DAMAGES OR LOSSES, ARISING OUT OF OR RELATED TO YOUR USE OR INABILITY TO USE THE APPLE SOFTWARE, HOWEVER CAUSED, REGARDLESS OF THE THEORY OF LIABILITY (CONTRACT, TORT OR OTHERWISE) AND EVEN IF APPLE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. SOME JURISDICTIONS DO NOT ALLOW THE LIMITATION OF LIABILITY FOR PERSONAL INJURY, OR OF INCIDENTAL OR CONSEQUENTIAL DAMAGES, SO THIS LIMITATION MAY NOT APPLY TO YOU. In no event shall Apple’s total liability to you for all damages (other than as may be required by applicable law in cases involving personal injury) exceed the amount of fi fty dollars ($50.00). The foregoing limitations will apply even if the above stated remedy fails of its essential purpose. 9. Digital Certifi cates. General. The Apple Software contains functionality that allows it to accept digital certifi cates either issued from Apple or from third parties. YOU ARE SOLELY RESPONSIBLE FOR DECIDING WHETHER OR NOT TO RELY ON A CERTIFICATE WHETHER ISSUED BY APPLE OR A THIRD PARTY. YOUR USE OF DIGITAL CERTIFICATES IS AT YOUR SOLE RISK. APPLE MAKES NO WARRANTIES OR REPRESENTATIONS, EXPRESS OR IMPLIED, AS TO MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE, ACCURACY, SECURITY, OR NON-INFRINGEMENT OF THIRD PARTY RIGHTS WITH RESPECT TO DIGITAL CERTIFICATES. You agree that (a) you will not falsify or misuse any certifi cate; (b) you will use Digital Certifi cates for legal purposes only and in accordance with any applicable Certifi cate Policy, Certifi cate Practice Statement or other Certifi cate Authority business practice disclosures; (c) you are solely responsible for preventing any unauthorized user from making use of your Digital Certifi cates; and (d) you will revoke any certifi cate that you have reason to believe has been compromised. Use of Digital Certifi cates in iChat. The Apple Software allows you to encrypt your iChat communications. This feature uses digital certifi cates to verify that the iChat is coming from the iChat screen name that appears in the iChat window and to encrypt and decrypt the chat. It does not verify the identity of the person using that screen name. Apple does not guarantee that there will be no hacking or intrusions into the chat. YOUR USE OF THIS FEATURE IN CONNECTION WITH ICHAT IS AT YOUR SOLE RISK. APPLE MAKES NO WARRANTIES OR REPRESENTATIONS, EXPRESS OR IMPLIED, AS TO MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE, ACCURACY, SECURITY, OR NON-INFRINGEMENT OF THIRD PARTY RIGHTS WITH RESPECT TO THE USE OF DIGITAL CERTIFICATES AND/OR ENCRYPTION IN ICHAT. By using the Apple Software, you agree that (a) you will take no action that interferes with the normal operation of digital certifi cates or encryption used in an iChat session or otherwise falsify the digital certifi cate used to validate a screen name; (b) you will use the encrypted iChat function solely for legal purposes; (c) you are solely responsible for preventing any unauthorized user from having access to any certifi cate or private key stored on your computer; and (d) you will revoke any certifi cate that you have reason to believe is compromised. Apple’s Certifi cate Policy and Certifi cate Practice Statements ENJOYMENT OF THE APPLE SOFTWARE, THAT THE FUNCTIONS CONTAINED IN, OR SERVICES PERFORMED OR PROVIDED BY, THE APPLE SOFTWARE WILL MEET YOUR REQUIREMENTS, THAT THE OPERATION OF THE APPLE SOFTWARE OR SERVICES WILL BE UNINTERRUPTED OR ERROR-FREE, THAT THE APPLE SOFTWARE OR SERVICES WILL BE COMPATIBLE WITH THIRD PARTY SOFTWARE, OR THAT DEFECTS IN THE APPLE SOFTWARE OR SERVICES WILL BE CORRECTED. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY APPLE OR AN APPLE AUTHORIZED REPRESENTATIVE SHALL CREATE A WARRANTY. SHOULD THE APPLE SOFTWARE OR SERVICES PROVE DEFECTIVE, YOU ASSUME THE ENTIRE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES OR LIMITATIONS ON APPLICABLE STATUTORY RIGHTS OF A CONSUMER, SO THE ABOVE EXCLUSION AND LIMITATIONS MAY NOT APPLY TO YOU. The Apple Software automatically references, displays, links to, and provides web services related to, sites and information located worldwide throughout the Internet. Because Apple has no control over such sites and information, Apple makes no guarantees as to such sites and information, including but not limited to: (a) the accuracy, availability, sequence, completeness, currency, content, validity or quality of any such sites and information, or (b) whether an Apple search completed through the Apple Software may locate unintended or objectionable content. Because some of the content on the Internet consists of material that is adult-oriented or otherwise objectionable to some people or viewers under the age of 18, the results of any search or entering of a particular URL using the Apple Software may automatically and unintentionally generate links or references to objectionable material. By using the Apple Software, you acknowledge that Apple makes no representations or warranties with regard to any sites or information displayed by or accessed through the Apple Software, or any web services performed by the Apple Software in relation to such sites or information. Apple, its o∑ cers, a∑ liates and subsidiaries shall not, directly or indirectly, be liable, in any way, to you or any other person for the content you receive using the Apple Software or for any inaccuracies, errors in or omissions from the content. Financial information displayed by the Apple Software is for general informational purposes only and is not intended to be relied upon as investment advice. Before executing any securities transaction based upon information obtained through the Apple Software, you should consult with a fi nancial professional. Neither Apple nor any of its content providers guarantees the accuracy, completeness, or timeliness of stock information appearing within the Apple Software. The Apple Software may be used to conduct automated translations. As automated translations are performed by software tools and do not involve any human intervention or verifi cation, it is not advisable to rely upon such translations where absolute accuracy is required. Backup functions performed by the Apple Software are only carried out at certain times and are subject to hardware limitations such as drive storage capacity. Apple and its licensors reserve the right to change, suspend, remove, or disable access to any Services at any time without notice. In no event will Apple be liable for the removal of or disabling of access to any such Services. Apple may also impose limits on the use of or access to certain Services, in any case and without notice or liability.78 79 for such free software under the terms of the GPL or LGPL, as the case may be, without charge except for the cost of media, shipping, and handling, upon written request to Apple. The GPL/LGPL software is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY, without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. A copy of the GPL and LGPL is included with the Apple Software. C. The Apple Software includes certain software licensed under the IBM Public License Version 1.0 (IPL) or the Common Public License Version 1.0 (CPL). A copy of the source code for the IPL and CPL licensed software may be found in Apple’s Open Source repository. See Apple’s Open Source web site (http://www.opensource.apple. com/) for information on how to obtain the source code. THE IPL AND CPL SOFTWARE IS PROVIDED ON AN “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED INCLUDING, WITHOUT LIMITATION, ANY WARRANTIES OR CONDITIONS OF TITLE, NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. NEITHER APPLE, IBM NOR ANY OTHER CONTRIBUTOR TO THE IPL AND CPL SOFTWARE SHALL HAVE ANY LIABILITY FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, WITHOUT LIMITATION, LOST PROFITS), HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OR DISTRIBUTION OF THE IPL AND CPL SOFTWARE OR THE EXERCISE OF ANY RIGHTS GRANTED HEREUNDER, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. D. MPEG-2 Notice. To the extent that the Apple Software contains MPEG-2 functionality, the following provision applies: ANY USE OF THIS PRODUCT OTHER THAN CONSUMER PERSONAL USE IN ANY MANNER THAT COMPLIES WITH THE MPEG-2 STANDARD FOR ENCODING VIDEO INFORMATION FOR PACKAGED MEDIA IS EXPRESSLY PROHIBITED WITHOUT A LICENSE UNDER APPLICABLE PATENTS IN THE MPEG-2 PATENT PORTFOLIO, WHICH LICENSE IS AVAILABLE FROM MPEG LA, L.L.C, 250 STEELE STREET, SUITE 300, DENVER, COLORADO 80206. E. Use of MPEG-4. This product is licensed under the MPEG-4 Systems Patent Portfolio License for encoding in compliance with the MPEG-4 Systems Standard, except that an additional license and payment of royalties are necessary for encoding in connection with (i) data stored or replicated in physical media which is paid for on a title by title basis and/or (ii) data which is paid for on a title by title basis and is transmitted to an end user for permanent storage and/or use. Such additional license may be obtained from MPEG LA, LLC. See http://www. mpegla.com for additional details. This product is licensed under the MPEG-4 Visual Patent Portfolio License for the personal and non-commercial use of a consumer for (i) encoding video in compliance with the MPEG-4 Visual Standard (“MPEG-4 Video”) and/ or (ii) decoding MPEG-4 video that was encoded by a consumer engaged in a personal and non-commercial activity and/or was obtained from a video provider licensed by MPEG LA to provide MPEG-4 video. No license is granted or shall be implied for any other use. Additional information including that relating to promotional, internal and commercial uses and licensing may be found at: http://www.apple.com/certifi cateauthority. 10. Export Control. You may not use or otherwise export or reexport the Apple Product except as authorized by United States law and the laws of the jurisdiction in which the Apple Product was obtained. In particular, but without limitation, the Apple Product may not be exported or re-exported (a) into any U.S. embargoed countries or (b) to anyone on the U.S. Treasury Department’s list of Specially Designated Nationals or the U.S. Department of Commerce Denied Person’s List or Entity List. By using the Apple Product, you represent and warrant that you are not located in any such country or on any such list. 11. Government End Users. The Apple Software and related documentation are “Commercial Items”, as that term is defi ned at 48 C.F.R. §2.101, consisting of “Commercial Computer Software” and “Commercial Computer Software Documentation”, as such terms are used in 48 C.F.R. §12.212 or 48 C.F.R. §227.7202, as applicable. Consistent with 48 C.F.R. §12.212 or 48 C.F.R. §227.7202-1 through 227.7202-4, as applicable, the Commercial Computer Software and Commercial Computer Software Documentation are being licensed to U.S. Government end users (a) only as Commercial Items and (b) with only those rights as are granted to all other end users pursuant to the terms and conditions herein. Unpublished-rights reserved under the copyright laws of the United States. 12. Controlling Law and Severability. This License will be governed by and construed in accordance with the laws of the State of California, as applied to agreements entered into and to be performed entirely within California between California residents. This License shall not be governed by the United Nations Convention on Contracts for the International Sale of Goods, the application of which is expressly excluded. If for any reason a court of competent jurisdiction fi nds any provision, or portion thereof, to be unenforceable, the remainder of this License shall continue in full force and e∂ ect. 13. Complete Agreement; Governing Language. This License constitutes the entire agreement between the parties with respect to the use of the Apple Software licensed hereunder and supersedes all prior or contemporaneous understandings regarding such subject matter. No amendment to or modifi cation of this License will be binding unless in writing and signed by Apple. Any translation of this License is done for local requirements and in the event of a dispute between the English and any non-English versions, the English version of this License shall govern. 14. Third Party Acknowledgements. A. Portions of the Apple Software utilize or include third party software and other copyrighted material. Acknowledgements, licensing terms and disclaimers for such material are contained in the “online” electronic documentation for the Apple Software, and your use of such material is governed by their respective terms. B. Certain software libraries and other third party software included with the Apple Software are free software and licensed under the terms of the GNU General Public License (GPL) or the GNU Library/Lesser General Public License (LGPL), as the case may be. You may obtain a complete machine-readable copy of the source code 80 81 may be obtained from MPEG LA, LLC. See http: //www.mpegla.com. For answers to frequently asked questions regarding use fees under the MPEG LA Visual Patent Portfolio License see www.apple.com/mpeg4 or www. apple.com/quicktime/products/qt/faq.html. F. H.264/AVC Notice. To the extent that the Apple Software contains AVC encoding and/or decoding functionality, commercial use of H.264/AVC requires additional licensing and the following provision applies: THE AVC FUNCTIONALITY IN THIS PRODUCT IS LICENSED HEREIN ONLY FOR THE PERSONAL AND NONCOMMERCIAL USE OF A CONSUMER TO (i) ENCODE VIDEO IN COMPLIANCE WITH THE AVC STANDARD (“AVC VIDEO”) AND/OR (ii) DECODE AVC VIDEO THAT WAS ENCODED BY A CONSUMER ENGAGED IN A PERSONAL AND NON-COMMERCIAL ACTIVITY AND/OR AVC VIDEO THAT WAS OBTAINED FROM A VIDEO PROVIDER LICENSED TO PROVIDE AVC VIDEO. INFORMATION REGARDING OTHER USES AND LICENSES MAY BE OBTAINED FROM MPEG LA L.L.C. SEE HTTP://WWW.MPEGLA.COM. G. AMR Notice. The Adaptive Multi-Rate (“AMR”) encoding and decoding functionality in this product is not licensed to perform cellular voice calls, or for use in any telephony products built on the QuickTime architecture for the Windows platform. The AMR encoding and decoding functionality in this product is also not licensed for use in a cellular communications infrastructure including: base stations, base station controllers/radio network controllers, switching centers, and gateways to and from the public switched network. H. FAA Notice. Aircraft Situation Display and National Airspace System Status Information data (collectively “Flight Data”) displayed through the Apple Software is generated by the Federal Aviation Administration. You agree not to redistribute Flight Data without the prior written consent of the FAA. The FAA and Apple disclaim all warranties, expressed or implied (including the implied warranties of merchantability and fi tness for a particular purpose), regarding the use and accuracy of the Flight Data. You agree that the FAA and Apple shall not be liable, either collectively or individually, for any loss, damage, claim, liability, expense, or penalty, or for any indirect, special, secondary, incidental, or consequential damages deriving from the use of the Flight Data. The Apple Software is not sponsored or endorsed by the FAA. The FAA is not responsible for technical or system problems, and you should not contact the FAA regarding such problems or regarding operational tra∑ c fl ow issues. I. Use of Adobe Color Profi les. You may use the Adobe Color Profi le software included with the Apple Software pursuant to this License, but Adobe is under no obligation to provide any support for the Color Profi les hereunder, including upgrades or future versions of the Profi les or other items. In addition to the provisions of Sections 7 and 8 above, IN NO EVENT WILL ADOBE BE LIABLE TO YOU FOR ANY DAMAGES, CLAIMS OR COSTS WHATSOEVER. The Adobe Color Profi le software distributed with the Apple Software is also available for download from Adobe at www.adobe.com. EA0390 Rev. 8-14-07 CONTRAT DE LICENCE DE LOGICIEL POUR MAC OS X APPLE INC. Licence d’utilisation individuelle et familiale destinée aux systèmes Apple VEUILLEZ LIRE ATTENTIVEMENT CE CONTRAT DE LICENCE DE LOGICIEL (« LICENCE ») AVANT D’UTILISER LE LOGICIEL APPLE. EN UTILISANT CE LOGICIEL, VOUS RECONNAISSEZ ÊTRE LIÉ PAR LES TERMES DE CETTE LICENCE. SI VOUS ÊTES EN DÉSACCORD AVEC LES TERMES DE CETTE LICENCE, N’UTILISEZ PAS CE LOGICIEL. SI VOUS ÊTES EN DÉSACCORD AVEC LES TERMES DE LA LICENCE, VEUILLEZ RESTITUER LE LOGICIEL APPLE À L’ENDROIT OÙ VOUS L’AVEZ ACQUIS POUR EN OBTENIR LE REMBOURSEMENT. SI VOUS ACCÉDEZ À CE LOGICIEL DE MANIÈRE ÉLECTRONIQUE, CLIQUEZ SUR « REFUSER ». POUR UN LOGICIEL APPLE INCLUS DANS UNE ACQUISITION DE MATÉRIEL, VEUILLEZ RESTITUER L’INTÉGRALITÉ DU PAQUET LOGICIEL/MATÉRIEL AFIN D’OBTENIR SON REMBOURSEMENT. REMARQUE IMPORTANTE : ce logiciel peut être utilisé pour reproduire, modifi er, publier et distribuer des données. Sa licence vous est exclusivement accordée pour la reproduction, la modifi cation, la publication et la distribution de données non protégées par des droits d’auteur, de données dont vous possédez les droits d’auteur ou de données que vous êtes légalement autorisé à reproduire, modifi er, publier ou distribuer. En cas d’incertitude quant à votre droit de copier, de modifi er, de publier ou de distribuer des données, il est préférable de vous informer auprès de votre conseiller juridique. 1. Généralités. Apple Inc. (« Apple ») vous concède une licence sur, et en aucun cas ne vous vend, le logiciel (incluant le code de ROM de démarrage), toute documentation et polices de caractères accompagnant la présente licence, qu’ils soient préinstallés sur un matériel Apple, sur disquette, sur mémoire morte (ROM), sur tout autre support et sous toute autre forme (collectivement, le « logiciel Apple »), uniquement en vue d’une utilisation conforme aux termes de cet accord. Apple se réserve la totalité des droits qui ne vous sont pas expressément conférés. Les droits accordés ici se limitent aux droits de propriété intellectuelle d’Apple et de ses concédants sur le logiciel Apple faisant l’objet de la présente licence et ne comprennent aucun autre brevet ni droit de propriété intellectuelle. Vous êtes propriétaire du support sur lequel le logiciel Apple est enregistré, mais Apple et/ou les concédants d’Apple restent propriétaires du logiciel Apple. Les droits accordés par les termes de cette licence s’appliquent à toutes les mises à niveau de logiciel fournies par Apple servant à remplacer et/ou compléter le logiciel Apple d’origine, à moins que ces mises à niveau ne comprennent une licence distincte. Le titre et les droits de propriété intellectuelle associés aux contenus a∑ chés dans le logiciel Apple ou rendus accessibles via ce dernier sont la propriété de leur détenteur. Ces contenus sont susceptibles d’être protégés par des copyrights ou autres traités sur la propriété intellectuelle et peuvent êtres soumis à des conditions d’utilisation énoncées par la tierce partie les fournissant. La présente licence ne vous confère aucun droit d’utilisation pour ces contenus ni ne garantit la disponibilité dudit contenu.82 83 2. Utilisations permises de la licence et restrictions. A. Utilisation unique. Cette Licence vous autorise à installer, utiliser et exécuter un (1) seul exemplaire du logiciel Apple sur un seul ordinateur Apple à la fois. Vous acceptez de ne pas installer, utiliser ou exécuter le logiciel Apple sur un ordinateur n’étant pas de marque Apple et ne pas autoriser d’autres personnes à le faire. La licence n’autorise pas la présence du logiciel Apple sur plus d’un ordinateur à la fois ni sur un réseau où il peut être utilisé sur plusieurs ordinateurs à la fois. B. Paquet familial. Si vous avez acheté un Paquet Familial Mac OS X, cette Licence vous autorise à installer et à utiliser un (1) exemplaire du logiciel Apple sur un maximum de cinq (5) ordinateurs Apple à la fois à condition que ces ordinateurs soient situés dans le même foyer et soient utilisés par des personnes occupant ledit foyer. « Foyer » désigne une ou des personnes partageant le même logement, tel qu’un appartement, une maison, une maison mobile ou une copropriété et s’étend également aux étudiants résidant principalement dans le foyer en question mais vivant dans un campus situé dans un autre lieu. La Licence du Paquet Familial n’est pas applicable aux utilisateurs professionnels ou commerciaux. C. Vous êtes autorisé à e∂ ectuer une copie du logiciel Apple (à l’exception du code d’initialisation ROM et de tout autre programme interne Apple incorporé ou contenu dans le matériel Apple) lisible par ordinateur à des fi ns de sauvegarde uniquement, après y avoir intégré tous les avis concernant le copyright et autres avis de propriétaire présents sur la version originale. Le code d’initialisation ROM et le programme interne Apple ne sont fournis que dans le but d’être utilisés sur un matériel Apple et vous n’êtes pas autorisé à copier, à modifi er ou à redistribuer le code d’initialisation ROM ou le programme interne, en partie ou en totalité. D. Certains composants de ce logiciel Apple et des logiciels libres de tierce partie qui l’accompagnent ont été ou peuvent être mis à disposition par Apple sur son site web de logiciels libres (http://www.opensource.apple.com/, sous l’intitulé collectif « composants de logiciels libres »). Vous ne pouvez modifi er ou remplacer ces composants, qu’à condition : (i) que le logiciel Apple modifi é qui en résulte ne soit utilisé, au lieu du logiciel Apple non modifi é, que sur un seul ordinateur Apple ; et (ii) que vous respectiez par ailleurs les termes de cette licence et de toute autre clause régissant l’utilisation des composants de logiciels libres. Apple n’est nullement tenu d’assurer la mise à jour, l’entretien, la garantie, l’assistance technique ou autre, ou les services du logiciel Apple modifi é résultants. Vous consentez expressément qu’en cas de panne ou de dégâts sur le matériel Apple résultant de la modifi cation des composants de logiciels libres du logiciel Apple, ladite panne ou lesdits dégâts sont exclus des conditions de garantie du logiciel Apple. E. Apple fournit, au sein du paquet du logiciel Apple, l’accès à certains logiciels de tierce partie à titre de commodité. Dans la mesure où le logiciel Apple contient des logiciels de tierce partie, Apple n’a aucune obligation expresse ou implicite de fournir une quelconque assistance technique ou autre pour lesdits logiciels. Veuillez contacter directement le fabricant ou le revendeur approprié afi n d’obtenir une assistance technique et un service après-vente en lien avec ses logiciels et produits. F. Dans toute la mesure permise par les termes de licence applicables concernant l’usage des composants de logiciels libres et les dispositions légales applicables, vous ne pouvez copier, décompiler, procéder à l’ingénierie inverse, désassembler, modifi er ni créer des produits dérivés du logiciel Apple ou de toute partie de ce dernier. LE LOGICIEL APPLE N’EST PAS DESTINÉ À ÊTRE UTILISÉ DANS LE FONCTIONNEMENT D’INSTALLATIONS NUCLÉAIRES, DE SYSTÈMES DE NAVIGATION OU DE COMMUNICATION AÉRIENNES, DE SYSTÈMES DE CONTRÔLE DE TRAFIC AÉRIEN, D’APPAREILS DE SURVIE ARTIFICIELLE OU AUTRES ÉQUIPEMENTS DÈS LORS QU’UNE DÉFAILLANCE DU LOGICIEL APPLE POURRAIT PROVOQUER LA MORT OU DE GRAVES DOMMAGES CORPORELS OU ÉCOLOGIQUES. G. Si vous utilisez l’Assistant réglages/migration pour transférer le logiciel d’un ordinateur Apple vers un autre ordinateur Apple, veuillez noter que l’utilisation continue de la copie d’origine du logiciel peut être interdite une fois qu’une copie a été transférée sur un autre ordinateur, à moins que vous ne disposiez déjà d’une copie dudit logiciel fournie sous licence sur chaque ordinateur. Il est recommandé de consulter les contrats de licence de logiciel appropriés pour connaître les termes et conditions applicables. 3. Transfert. Vous ne pouvez louer, louer en crédit bail, prêter ni concéder des licences du logiciel Apple. Conformément aux restrictions ci-dessous, vous pouvez toutefois e∂ ectuer le transfert unique et permanent de tous vos droits sur le logiciel Apple à une autre partie, à condition : (a) que ce transfert comprenne la totalité du logiciel Apple, y compris la totalité de ses composants (excepté le code d’initialisation ROM et le programme interne), données d’origine, documents imprimés ainsi que la licence ; (b) que vous ne conserviez aucune copie du logiciel Apple, complète ou partielle, y compris toute copie stockée sur ordinateur ou toute autre unité de stockage ; et (c) que la partie bénéfi ciaire prenne connaissance et accepte les termes et conditions de la présente licence. Vous ne pouvez louer, louer en crédit bail, prêter, redistribuer, concéder ni transférer un logiciel Apple qui a été modifi é ou remplacé, conformément à la section 2D ci-dessus. Tous les composants du logiciel Apple sont fournis conjointement et ne peuvent être isolés pour être distribués comme application autonome. Le logiciel Apple fourni avec un matériel Apple particulier peut ne pas fonctionner sur un autre matériel Apple. Mises à jour : si une mise à jour de logiciel Apple remplace l’intégralité (installation complète) d’une version précédente de ce logiciel Apple pour laquelle une licence avait été accordée, vous n’êtes pas autorisé à utiliser les deux versions du logiciel Apple en même temps ni à les céder séparément. Vente interdite des copies et copies d’évaluation : nonobstant le contenu d’autres sections de la présente licence, les logiciels Apple ou ceux faisant l’objet d’une o∂ re promotionnelle ou ceux interdits à la vente ne peuvent s’utiliser qu’à des fi ns de démonstration, d’essai et d’évaluation. Ils ne peuvent être en aucun cas revendus ou transférés. Copies de restauration du système Apple : les CD ou DVD de restauration pouvant accompagner le paquet du matériel Apple ou fournis par Apple en relation avec un paquet contenant un matériel Apple, contiennent une 84 85 copie du logiciel Apple utilisé uniquement à des fi ns de diagnostic et de restauration. Ces CD et DVD peuvent être revendus ou transférés uniquement en tant que partie du paquet contenant le matériel Apple. Copies réservées à l’usage académique : si l’emballage d’origine de votre logiciel Apple porte une étiquette académique, ou si vous avez acquis le logiciel Apple à un tarif préférentiel destiné au milieu académique, vous devez répondre au profi l d’utilisateur fi nal éducatif éligible pour utiliser ce logiciel. Cette désignation regroupe les étudiants, les facultés, le personnel et l’administration d’un établissement ou d’une institution où est dispensé un enseignement (campus universitaire, école fondamentale publique ou privée, par exemple). 4. Accord relatif à l’utilisation des données. Vous acceptez qu’Apple ainsi que ses fi liales puissent rassembler et utiliser des informations techniques et a∂ érentes, incluant, sans s’y limiter, des informations techniques concernant votre ordinateur, votre système, vos logiciels et les périphériques. Ces informations sont recueillies régulièrement afi n de faciliter les o∂ res de mises à jour de logiciels, de support aux produits et de services divers proposées au client (le cas échéant) et relatives aux logiciels Apple, ainsi que pour vérifi er la conformité aux termes de la licence. Apple peut utiliser ces informations, en veillant à ce que l’identité du client ne soit pas dévoilée, afi n d’améliorer ses produits ou de proposer des services et des technologies au client. 5. Terme de la licence. Cette licence est d’application jusqu’à son terme. Vos droits découlant de cette licence prendront automatiquement fi n sans notifi cation de la part d’Apple Apple si vous ne vous conformez pas à l’une quelconque de ses dispositions. Dès l’expiration de cette licence, vous serez tenu de cesser toute utilisation du logiciel Apple et de détruire tous les exemplaires, complets ou partiels, dudit logiciel. 6. Garantie limitée des supports. Apple garantit les supports sur lesquels le logiciel Apple est enregistré contre tout vice de matériau et de main d’œuvre dans le cadre d’une utilisation normale, pendant une période de quatre-vingt-dix (90) jours à compter de la date d’achat initiale du produit. Votre seul recours, en vertu du présent article, se limite, et ceci à la discrétion d’Apple, soit au remboursement du prix du produit contenant le logiciel Apple, soit au remplacement du logiciel Apple, lorsqu’il est restitué à Apple ou à un représentant autorisé d’Apple avec une copie de la facture. CETTE GARANTIE LIMITÉE ET TOUTES GARANTIES IMPLICITES CONCERNANT LE SUPPORT, Y COMPRIS DE FAÇON NON LIMITATIVE LES GARANTIES IMPLICITES DE QUALITÉ MARCHANDE, DE QUALITÉ SATISFAISANTE ET D’ADÉQUATION À UN OBJECTIF PARTICULIER, SONT LIMITÉES À UNE DURÉE DE QUATRE-VINGT-DIX (90) JOURS À COMPTER DE LA DATE D’ACHAT INITIALE DU PRODUIT. CERTAINES LÉGISLATIONS NE PERMETTANT PAS DE LIMITER LA DURÉE D’UNE GARANTIE IMPLICITE, IL EST POSSIBLE QUE LA LIMITATION MENTIONNÉE CI-DESSUS NE VOUS CONCERNE PAS. CETTE LIMITATION DE GARANTIE TELLE QU’ELLE EST EXPRIMÉE CI-DESSUS EST LA SEULE GARANTIE QUI VOUS SOIT ACCORDÉE ET EXCLUT EXPRESSÉMENT L’APPLICATION DE TOUTE AUTRE GARANTIE (LE CAS ÉCHÉANT) DÉCOULANT DE TOUT DOCUMENT OU EMBALLAGE. CETTE GARANTIE LIMITÉE VOUS DONNE DES DROITS SPÉCIFIQUES. IL SE PEUT EN OUTRE QUE VOUS BÉNÉFICIEZ D’AUTRES DROITS QUI VARIENT SELON LES LÉGISLATIONS. 7. Exclusion de garanties. VOUS RECONNAISSEZ ET ADMETTEZ EXPRESSÉMENT QUE L’UTILISATION DU LOGICIEL APPLE EST À VOS RISQUES ET PÉRILS ET QUE LA TOTALITÉ DU RISQUE RELATIF À LA QUALITÉ, AUX PERFORMANCES, À L’EXACTITUDE ET AU MANIEMENT SATISFAISANTS REPOSE SUR VOUS. À L’EXCEPTION DE LA GARANTIE LIMITÉE DES SUPPORTS STIPULÉE CI-DESSUS ET DANS LES LIMITES MAXIMALES AUTORISÉES PAR LA LÉGISLATION EN VIGUEUR, LE LOGICIEL APPLE ET TOUT SERVICE RÉALISÉ OU FOURNI PAR LE LOGICIEL APPLE (« SERVICES ») SONT FOURNIS « TELS QUELS » AVEC TOUS SES DÉFAUTS ET SANS AUCUNE GARANTIE D’AUCUNE SORTE. APPLE ET LES CONCÉDANTS D’APPLE (DÉSIGNÉS COLLECTIVEMENT PAR L’EXPRESSION « APPLE » AUX FINS DES DISPOSITIONS DES PARAGRAPHES 7 ET 8) EXCLUENT PAR LA PRÉSENTE LICENCE LA TOTALITÉ DES GARANTIES ET CONDITIONS, EXPLICITES, TACITES OU LÉGALES, Y COMPRIS DE FAÇON NON LIMITATIVE LES GARANTIES ET/OU CONDITIONS IMPLICITES DE QUALITÉ MARCHANDE, DE QUALITÉ SATISFAISANTE, D’ADÉQUATION À UN OBJECTIF PARTICULIER, D’EXACTITUDE, DE SÉRÉNITÉ D’UTILISATION ET DE NON EMPIÉTEMENT SUR LES DROITS DE TIERCES PARTIES, LE TOUT À L’ÉGARD DE TOUT SERVICE ET DU LOGICIEL APPLE. APPLE NE GARANTIT NULLEMENT L’ABSENCE DE PERTURBATIONS LORS DE VOTRE UTILISATION DU LOGICIEL APPLE, QUE LES FONCTIONS CONTENUES DANS LE LOGICIEL APPLE OU QUE LES SERVICES RÉALISÉS OU FOURNIS PAR LEDIT LOGICIEL CORRESPONDRONT À VOS BESOINS, QUE LE FONCTIONNEMENT DES SERVICES OU DU LOGICIEL APPLE SERA ININTERROMPU OU EXEMPT D’ERREUR, QUE LES SERVICES OU LE LOGICIEL APPLE SERONT COMPATIBLES AVEC LES LOGICIELS DE TIERCE PARTIE OU QUE TOUT DÉFAUT DES SERVICES OU DU LOGICIEL APPLE SERA CORRIGÉ. AUCUNE INFORMATION NI AUCUN CONSEIL COMMUNIQUÉS VERBALEMENT OU PAR ÉCRIT PAR APPLE OU PAR L’UN DE SES REPRÉSENTANTS AUTORISÉS NE POURRA CONSTITUER UNE GARANTIE. SI LES SERVICES OU LE LOGICIEL APPLE S’AVÉRAIENT DÉFECTUEUX, VOUS ASSUMERIEZ SEUL LE COÛT TOTAL DE TOUTE RÉVISION, RÉPARATION OU RECTIFICATION NÉCESSAIRES. CERTAINES LÉGISLATIONS NE PERMETTANT NI L’EXCLUSION DE GARANTIES IMPLICITES, NI LES RESTRICTIONS AUX DROITS EN VIGUEUR DES CONSOMMATEURS, IL EST POSSIBLE QUE L’EXCLUSION ET LES LIMITES MENTIONNÉES CI-DESSUS NE VOUS CONCERNENT PAS. Le logiciel Apple référence, a∑ che, fournit et renvoie automatiquement à des services web, des sites et des informations d’origine globale se trouvant sur Internet. Apple n’exerçant aucun contrôle sur ces sites et ces informations, il ne garantit nullement, notamment, (a) la précision, la disponibilité, la succession, la totalité, la validité, le contenu ou la qualité de ces sites et de ces informations, ou (b) qu’une recherche e∂ ectuée via le logiciel Apple ne mène vers des contenus imprévus ou discutables. Certains contenus disponibles sur Internet étant destinés à un public de plus de 18 ans ou étant de nature à heurter la sensibilité de certains utilisateurs de moins de 18 ans, toute recherche ou saisie d’une URL particulière avec le logiciel Apple peut automatiquement et involontairement générer des liens ou des références à des contenus à caractère discutable. En utilisant le logiciel Apple vous reconnaissez qu’Apple n’est ni responsable ni garant d’aucun site ni d’aucune information a∑ chés ou rendus accessibles par le logiciel Apple, ni d’aucun service web réalisé par le logiciel Apple en lien avec ces sites ou ces informations. Apple, ses dirigeants, a∑ liés et fi liales ne peuvent en aucun cas, directement ou indirectement, être tenus responsables envers vous ou tout autre 86 87 personne du contenu auquel vous accédez en utilisant le logiciel Apple, ni d’aucune inexactitude, erreur ou omission de ce contenu. Les informations fi nancières apparaissant dans le logiciel Apple ne sont inclues qu’à titre d’information d’ordre général et ne sauraient être utilisées sous forme de conseil en placement. Avant d’exécuter toute transaction sécurisée basée sur les informations obtenues par le biais du logiciel Apple, vous devriez consulter un professionnel fi nancier. Ni Apple ni aucun de ses fournisseurs de contenu garantit l’exactitude, l’intégralité ou l’actualité des informations sur les titres boursiers apparaissant dans le logiciel Apple. Il se peut que le logiciel Apple soit utilisé pour proposer des services de traduction automatisée. Puisque ce type de traduction est accompli par des outils logiciels et ne met en œuvre aucune intervention ou vérifi cation humaine, il est déconseillé de se fi er à ces traductions où la précision est primordiale. Les fonctions de sauvegarde réalisées par le logiciel Apple sont uniquement e∂ ectuées à certains moments et sont soumises à des restrictions telles que la capacité de stockage du lecteur. Apple et ses concédants de licence se réservent le droit de modifi er, de suspendre, de supprimer ou de désactiver l’accès à tout Service, à tout moment et sans préavis. En aucun cas Apple ne sera tenu responsable de la suppression ou de la désactivation de l’accès auxdits Services. Apple peut également imposer des restrictions quant à l’utilisation ou l’accès à certains Services, en toutes circonstances, sans préavis et sans être en aucun cas responsable. 8. Limitation de responsabilité. DANS LA MESURE OÙ LA LÉGISLATION NE L’INTERDIT PAS, EN AUCUN CAS APPLE NE SERA RESPONSABLE DE DOMMAGE CORPOREL NI DE QUELCONQUE DOMMAGE ACCIDENTEL, SPÉCIAL, INDIRECT OU ACCESSOIRE, Y COMPRIS DE FAÇON NON LIMITATIVE, LES DOMMAGES DUS AUX PERTES DE BÉNÉFICES, PERTES DE DONNÉES, INTERRUPTION DES ACTIVITÉS OU TOUT AUTRE DOMMAGE COMMERCIAL OU PERTE COMMERCIALE RÉSULTANT DE OU RELATIFS À VOTRE UTILISATION OU VOTRE INAPTITUDE À UTILISER LE LOGICIEL APPLE, QUELLE QU’EN SOIT LA CAUSE, SANS TENIR COMPTE DE LA THÉORIE DE LA RESPONSABILITÉ (QUE CE SOIT POUR RUPTURE DE CONTRAT, EN RESPONSABILITÉ CIVILE, OU AUTRE) ET MÊME SI APPLE A ÉTÉ INFORMÉ DE LA POSSIBILITÉ DE TELS DOMMAGES. CERTAINES JURIDICTIONS NE PERMETTANT PAS LA LIMITATION DE RESPONSABILITÉ POUR DOMMAGES PERSONNELS, INDIRECTS OU ACCESSOIRES, IL EST POSSIBLE QUE CETTE LIMITATION NE VOUS CONCERNE PAS. La responsabilité totale d’Apple envers vous au titre de tout dommage (en dehors de ce que la législation pourrait exiger dans les cas impliquant une blessure) n’excédera en aucun cas la somme de cinquante dollars (50 $). Les limitations susdites s’appliqueront même si le recours indiqué ci-dessus fait défaut à sa vocation essentielle. 9. Certifi cats numériques. Général. Les logiciels Apple permettent d’accepter des certifi cats numériques émis soit par Apple soit par des tiers. VOUS ÊTES SEUL RESPONSABLE DE VOTRE DÉCISION DE FAIRE CONFIANCE OU PAS À UN CERTIFICAT, QU’IL PROVIENNE D’APPLE OU D’UN TIERS. L’UTILISATION DE CERTIFICATS NUMÉRIQUES EST À VOTRE PROPRE RISQUE. APPLE NE DONNE AUCUNE GARANTIE OU REPRÉSENTATION, EXPRESSE OU IMPLICITE, CONCERNANT LA QUALITÉ MARCHANDE OU L’ADÉQUATION À UN USAGE PARTICULIER, LA PRÉCISION, LA SÉCURITÉ OU LA NON VIOLATION DES DROITS DE TIERS EN CE QUI CONCERNE LES CERTIFICATS NUMÉRIQUES. Vous acceptez que (a) vous ne falsifi erez ni abuserez d’aucun certifi cat ; (b) vous utiliserez les certifi cats numériques seulement à des fi ns légales et en accord avec la Politique de certifi cat applicable, la Déclaration de pratique de certifi cation ou autres divulgations de pratiques commerciales en accord avec l’Autorité de certifi cation ; (c) vous êtes seul responsable d’empêcher qu’un utilisateur non autorisé utilise vos certifi cats numériques ; et (d) vous refuserez tout certifi cat dont la fi abilité n’est pas garantie. Utilisation des certifi cats numériques avec iChat. Les logiciels Apple vous permettent de crypter vos communications iChat. Cette fonctionnalité utilise les certifi cats numériques pour vérifi er que votre conversation iChat provient du nom de contact iChat qui apparaît dans la fenêtre iChat, ainsi que pour crypter et décrypter la conversation. Elle ne permet pas de vérifi er l’identité de la personne qui utilise ce nom de contact. Apple n’o∂ re aucune garantie quant au piratage et aux intrusions dans la conversation. L’UTILISATION QUE VOUS FAITES DE CETTE FONCTIONNALITÉ EST À VOTRE PROPRE RISQUE. APPLE NE DONNE AUCUNE GARANTIE OU REPRÉSENTATION, EXPRESSE OU IMPLICITE, CONCERNANT LA QUALITÉ MARCHANDE OU L’ADÉQUATION À UN USAGE PARTICULIER, LA PRÉCISION, LA SÉCURITÉ OU LA NON VIOLATION DES DROITS DE TIERS EN CE QUI CONCERNE LES CERTIFICATS NUMÉRIQUES ET/OU LE CRYPTAGE DANS ICHAT. En utilisant les logiciels Apple, vous acceptez que (a) vous n’entreprendrez aucune action pouvant interférer avec le fonctionnement normal des certifi cats numériques ou le cryptage utilisé dans une session iChat et que vous ne falsifi erez pas le certifi cat numérique utilisé pour valider un nom de contact ; (b) vous utiliserez la fonction de cryptage d’iChat uniquement à des fi ns légales ; (c) vous êtes seul responsable d’empêcher qu’un utilisateur non autorisé ait accès à tout certifi cat ou clé privée mémorisés sur votre ordinateur ; et (d) vous refuserez tout certifi cat dont la fi abilité n’est pas garantie. La Politique de certifi cation et la Déclaration de pratique de certifi cation d’Apple sont disponibles sur : http://www.apple.com/certifi cateauthority. 10. Contrôle des exportations. Vous ne pouvez utiliser, exporter ou réexporter le logiciel Apple que conformément à la législation des États-Unis et à la législation du pays dans lequel vous avez acquis le logiciel Apple. En particulier, mais sans limitation, le logiciel Apple ne peut être exporté ni réexporté (a) vers tout pays soumis à embargo des États-Unis ou (b) à toute personne fi gurant sur la liste « Specially Designated Nationals » du Ministère des Finances des États-Unis ou sur les listes « Denied Persons » ou « Denied Entity » du Ministère du Commerce des États-Unis. En utilisant le logiciel Apple, vous déclarez et garantissez n’être pas situé dans un de ces pays ou inscrit sur les listes mentionnées ci-dessus. Vous acceptez également de ne pas utiliser les logiciels Apple à des fi ns non autorisées par la législation des États-Unis, y compris, et sans aucune limitation, le développement, la conception, la fabrication ou la production d’éléments nucléaires, de missiles ou d’armes chimiques ou biologiques. 11. Gouvernement des États-Unis. Le logiciel et la documentation constituent des « Commercial Items » (éléments commerciaux), tel que ce terme est défi ni dans la clause 48 C.F.R. (Code of Federal Rules) §2.101, consistant en « Commercial Computer Software » (logiciel) et « Commercial Computer Software 88 89 Documentation » (documentation), tels que ces termes sont utilisés dans les clauses 48 C.F.R. §12.212 ou 48 C.F.R. §227.7202. Conformément à la clause 48 C.F.R. §12.212 ou 48 C.F.R. §227.7202-1 à 227.7202-4, le « Commercial Computer Software » et le « Commercial Computer Software Documentation » sont fournis sous licence au gouvernement des États-Unis (a) uniquement comme « Commercial Items » et (b) uniquement accompagnés des droits octroyés à tous les autres utilisateurs conformément aux termes et conditions ci-inclus. Droits non publiés réservés en vertu de la législation des droits d’auteur en vigueur aux États-Unis. 12. Loi applicable et divisibilité du contrat. Cette licence sera régie et interprétée en conformité avec la législation de l’état de Californie, telle qu’elle s’applique aux accords conclus et réalisés entièrement en Californie entre résidents californiens. Cette licence ne sera pas régie par la convention des Nations Unies sur les contrats de vente internationale de biens, dont l’application est expressément exclue. Si pour une raison quelconque un tribunal ayant juridiction juge qu’une disposition de la présente licence est inapplicable, en totalité ou en partie, les autres dispositions de la présente licence resteront entièrement applicables. 13. Accord complet. Cette licence constitue l’intégralité de l’accord entre les parties quant à l’utilisation du logiciel Apple objet de la présente licence, et remplace toutes les propositions ou accords antérieurs ou actuels, écrits ou verbaux, à ce sujet. Aucun amendement ni aucune modifi cation de cette licence ne prendront e∂ et à moins d’être stipulés par écrit et signés par un représentant dûment agréé d’Apple. Toute traduction de la présente licence est e∂ ectuée pour des besoins locaux. En cas de litige entre la version anglaise et toute autre version, seule la version anglaise sera d’application. 14. Mentions concernant les tierces parties. A. Certaines portions du logiciel Apple utilisent ou comportent des logiciels de tierces parties et des mentions concernant les droits d’auteurs. Les remerciements, les termes des licences et les exclusions de garanties des dits éléments fi gurent dans la documentation électronique du logiciel Apple, et l’utilisation de ces données est dictée par leurs conditions respectives. B. Certaines bibliothèques de logiciels et autres logiciels de tierce partie inclus avec le logiciel Apple sont des logiciels gratuits dont la licence est régie par les termes de la licence GPL (General Public License) de GNU ou de la licence bibliothèque/LGPL (Lesser General Public License), le cas échéant. Il est possible d’obtenir, par simple demande écrite à Apple, une copie électronique du code source du logiciel libre, selon les termes de la licence GPL ou LGPL sans aucun frais, à l’exception de ceux de support, d’envoi et de traitement. Le logiciel GPL/LGPL est distribué dans un but utilitaire, mais SANS AUCUNE GARANTIE, pas même la garantie implicite de QUALITÉ MARCHANDE ou D’APTITUDE À UNE FIN SPÉCIFIQUE. Une copie des licences GPL et LGPL est fournie avec le logiciel Apple. C. Le logiciel Apple comprend certains logiciels soumis aux termes de la licence IBM Public License Version 1.0 (IPL) ou de la licence Common Public License Version 1.0 (CPL). Une copie du code source du logiciel sous licence IPL et CPL est disponible dans le dépôt (repository) Open Source d’Apple. Consultez le site web Open Source d’Apple à l’adresse pour en savoir plus sur l’obtention du code source. LE LOGICIEL IPL ET CPL EST FOURNI « EN L’ÉTAT », SANS AUCUNE GARANTIE NI CONDITION D’AUCUNE SORTE, EXPRESSE OU TACITE, Y COMPRIS, SANS AUCUNE LIMITATION, TOUTE GARANTIE OU CONDITION DE TITRE, DE NON-CONTREFAÇON, DE QUALITÉ MARCHANDE OU D’APTITUDE À UNE UTILISATION PARTICULIÈRE. NI APPLE, NI IBM, NI AUCUNE DES PARTIES AYANT CONTRIBUÉ AU LOGICIEL IPL ET CPL NE SERONT EN AUCUN CAS ENGAGÉS POUR TOUS DOMMAGES DIRECTS, INDIRECTS, ACCESSOIRES, SPÉCIAUX, EXEMPLAIRES OU CONSÉCUTIFS (Y COMPRIS, SANS S’Y LIMITER, LES BÉNÉFICES MANQUÉS), QUELLE QU’EN SOIT LA RAISON OU TOUTE THÉORIE DE RESPONSABILITÉ, PAR CONTRAT, STRICTE RESPONSABILITÉ OU RESPONSABILITÉ EN CAS DE PRÉJUDICE (Y COMPRIS EN CAS DE NÉGLIGENCE), ET DÉCOULANT DE L’UTILISATION OU DE LA DISTRIBUTION DU LOGICIEL IPL ET CPL OU DE L’EXERCICE DES DROITS CITÉS PLUS BAS, MÊME APRÈS AVERTISSEMENT DE LA POSSIBILITÉ DE CES DOMMAGES. D. Avis MPEG-2. Si le logiciel Apple contient des fonctionnalités MPEG-2, la clause ci-dessous est applicable : TOUT USAGE DE CE PRODUIT POUR D’AUTRES FINS QU’UNE UTILISATION PERSONNELLE EN ACCORD AVEC LA NORME MPEG-2 D’ENCODAGE D’INFORMATIONS VIDÉO POUR CRÉER DES PRODUITS PRÊTS À L’EMPLOI EST EXPRESSÉMENT INTERDIT SANS LICENCE RESPECTANT LES BREVETS APPLICABLES DU PORTEFEUILLE DE BREVETS MPEG-2, DISPONIBLE AUPRÈS DE : MPEG LA, L.L.C, 250 STEELE STREET, SUITE 300, DENVER, COLORADO 80206. E. Utilisation du MPEG-4. La licence de ce produit vous est concédée d’après les termes de la licence du portefeuille de brevets de MPEG-4 Systems pour l’encodage selon la norme des systèmes MPEG-4. Une licence additionnelle et le paiement d’une redevance sont toutefois nécessaires pour l’encodage (i) de données stockées ou dupliquées dans un média physique payé titre par titre et/ou (ii) de données payées titre par titre et transmises à un utilisateur fi nal pour un stockage et/ou une utilisation permanent(e)s. Vous pouvez vous procurer cette licence additionnelle auprès de MPEG LA, LLC. Pour en savoir plus, rendez-vous sur le site http://www.mpegla.com (en anglais). La licence de ce produit vous est concédée d’après les termes de la licence du portefeuille de brevets de MPEG- 4 Visual dans le cadre d’une utilisation privée à but non commercial par un consommateur pour (i) l’encodage de vidéo selon la norme MPEG-4 Visual (« Vidéo au format MPEG-4 ») et/ou (ii) le décodage de vidéo MPEG-4 encodée par un consommateur engagé dans une activité privée à but non commercial et/ou obtenue d’un fournisseur vidéo sous licence de MPEG LA pour distribuer de la vidéo au format MPEG-4. Aucune licence ne saurait être accordée ou être considérée comme implicite pour toute autre utilisation. Des informations complémentaires sur l’utilisation à des fi ns promotionnelles, internes et commerciales et sur l’attribution de licence dans de tels cas sont disponibles auprès de MPEG LA, LLC. Rendez-vous sur le site http://www.mpegla.com (en anglais). Pour obtenir les réponses aux questions fréquemment posées au sujet des frais répondant à la licence du portefeuille de brevets de la norme Visual de MPEG LA, consultez le site www. apple.com/mpeg4 (en anglais) ou www.apple.com/quicktime/products/qt/faq.html (également en anglais).90 F. Notifi cation relative au H.264/AVC. Dans la mesure où les logiciels Apple incluent la fonctionnalité de décodage et/ou d’encodage AVC, l’usage commercial de H.264/AVC requiert une concession de licence complémentaire et la disposition suivante s’applique : LA PRÉSENTE LICENCE POUR LA FONCTIONNALITÉ AVC DE CE PRODUIT N’EST ACCORDÉE QUE DANS LE CADRE D’UN USAGE PERSONNEL ET NON COMMERCIAL D’UN CONSOMMATEUR POUR (i) ENCODER DE LA VIDÉO SELON LES NORMES D’ENCODAGE AVC (« AVC VIDÉO ») ET/OU (ii) DÉCODER DE LA VIDÉO AVC ENCODÉE PAR UN CONSOMMATEUR DANS LE CADRE D’UNE ACTIVITÉ PERSONNELLE ET NON COMMERCIALE ET/OU DE LA VIDÉO AVC PROVENANT D’UN FOURNISSEUR VIDÉO AUTORISÉ À FOURNIR DE LA VIDÉO AVC. LES INFORMATIONS RELATIVES AUX AUTRES USAGES ET LICENCES SONT DISPONIBLES AUPRÈS DE MPEG LA L.L.C. CONSULTEZ LE SITE HTTP://WWW.MPEGLA.COM. G. Avis AMR. La fonctionnalité de codage et décodage Adaptive Multi-Rate (« AMR ») de ce produit ne fait pas l’objet d’une licence permettant d’e∂ ectuer des appels depuis ou sur un téléphone portable, ou permettant son utilisation sur n’importe quel produit de téléphonie conçu selon l’architecture QuickTime pour la plateforme Windows. La fonctionnalité de codage et décodage AMR de ce produit ne fait pas l’objet d’une licence pour l’utilisation au sein d’une infrastructure de communication cellulaire telle que les stations de base, les contrôleurs de station de base ou de réseau radio, les centrales téléphoniques et les réseaux commutés publics. H. Avis FAA. Les données provenant de National Airspace System Status Information (informations d’état du système aérien national) et du projet Aircraft Situation Display (suivi des vols dans l’espace aérien), a∑ chées dans le logiciel Apple, sont générées par la Federal Aviation Administration, FAA. Vous acceptez de ne pas redistribuer de données concernant les vols sans l’accort préalable écrit de la FAA. La FAA et Apple refusent toute garantie, exprimée ou implicite (y compris les garanties de qualité marchande et d’adéquation à un usage particulier), quant à l’utilisation et à l’authenticité des données sur les vols. Vous acceptez que la FAA et Apple ne peuvent être responsables, aussi bien collectivement qu’individuellement, de toute perte, dommage, plainte, responsabilité, remboursement ou pénalité, ni même de tout dommage indirect, spécial, secondaire, accessoire ou conséquent dérivant de l’utilisation de ces données. Le logiciel Apple n’est ni parrainé ni endossé par la FAA. La FAA n’est pas responsable des problèmes techniques ou liés au système, et vous ne devez pas contacter la FAA au sujet de tels problèmes ou de problèmes liés au trafi c aérien opérationnel. I. Utilisation des profi ls de couleur Adobe. Vous pouvez utiliser le logiciel Adobe Color Profi le fourni avec le logiciel Apple Software conformément à cette licence, mais Adobe n’est pas tenu de fournir le support pour les profi ls de couleur ci-dessous, notamment les mises à jour ou les prochaines versions des profi ls ou de tout autre élément. En plus des dispositions présentées dans les sections 7 et 8 ci-dessus, ADOBE NE SERA EN AUCUN CAS RESPONSABLE DES ÉVENTUELS DOMMAGES, RÉCLAMATIONS OU FRAIS DONT VOUS POUVEZ FAIRE L’OBJET. Le logiciel de profi ls de couleur Adobe qui est fourni avec le logiciel Apple peut également être téléchargé à l’adresse www.adobe.com. EA0390 Révisé le 14 août 2007 iPod USB Power AdapterEnglish 3 iPod USB Power Adapter The iPod USB Power Adapter is for use with iPod shuffle, and with all iPods with Dock Connectors. Note: Your power adapter may look different from the one pictured here. Connect your iPod to the power adapter using the USB cable that came with your iPod. If you have an original iPod shuffle, you can connect it directly to the power adapter. Then extend the electrical prongs (if necessary) and plug the adapter into an electrical outlet to charge the iPod battery. AC plug adapter iPod USB Power Adapter USB cable that came with your iPod4 English You can also connect the power adapter to an iPod Dock and place iPod in the Dock. For information on charging times, see the manual that came with your iPod. Important: If your power adapter has retractable prongs, be sure to extend them completely before you plug the adapter into the outlet. Safety The only way to shut off power to your power adapter completely is to disconnect it from the power source. Always leave space around your power adapter. Don’t use it in a location where airflow around the power adapter is obstructed, such as a bookcase. When connecting or disconnecting your power adapter, always hold it by its sides. Keep your fingers away from the metal part of the plug. Before connecting the USB cable to the power adapter, make sure there are no foreign objects inside the power adapter’s USB port. The power adapter is a high-voltage component and should not be opened for any reason, even when iPod is off.English 5 Never force a connector into the power adapter USB port. If the connector and port do not join with reasonable ease, make sure that the connector matches the port and that you have positioned the connector correctly in relation to the port. Keep your power adapter away from sources of liquid, such as drinks, washbasins, bathtubs, shower stalls, rain, and so on. Take care not to spill any food or liquid on the power adapter. If you do, unplug the power adapter before cleaning up the spill. In case of a spill, you may have to send your equipment to Apple for service. Do not attempt to open your power adapter or disassemble it. You run the risk of electric shock and voiding the limited warranty. No user-serviceable parts are inside. If the power adapter appears to be damaged or does not function properly, go to www.apple.com/support for instructions on how to obtain warranty service. Specifications Input: AC 100-240 volts (V), 50/60 hertz (Hz) Output: DC 5V, 1 A678Français 9 Adaptateur secteur USB iPod Power Adapter L’adaptateur secteur de l’iPod USB Power Adapter est à utiliser avec l’iPod shuffle ou tout autre iPod muni du connecteur Dock. Remarque : votre adaptateur secteur peut être différent de celui illustré ci-dessus. Branchez votre iPod à l’adaptateur secteur grâce au câble USB fourni avec votre iPod. Si vous disposez du tout premier iPod shuffle, vous pouvez le brancher directement à l’adaptateur. Adaptateur CA Adaptateur secteur USB iPod Power Adapter Câble USB fourni avec votre iPod10 Français Étendez ensuite les broches électriques (si besoin), puis branchez l’adaptateur à une prise électrique afin de recharger la batterie de l’iPod. Vous pouvez aussi placer votre iPod sur son socle iPod Dock et brancher ce dernier à l’adaptateur secteur. Pour de plus amples informations sur les temps de charge de la batterie, reportez-vous au manuel fourni avec votre iPod. Important : si votre adaptateur secteur est doté de broches électriques à enrouleur, assurezvous de les étendre au maximum avant de brancher l’adaptateur sur la prise. Sécurité Le seul moyen de couper complètement le courant de votre adaptateur secteur est de le débrancher de sa source électrique. Gardez toujours un peu d’espace autour de votre adaptateur secteur. Ne l’utilisez pas dans un endroit où l’air ne circule pas autour de l’adaptateur, comme c’est le cas dans une bibliothèque.Français 11 Lorsque vous branchez ou débranchez votre adaptateur secteur, tenez-le toujours par ses côtés. Ne touchez pas la partie en métal de la prise. Avant de brancher le câble USB à l’adaptateur secteur, assurez-vous qu’aucun objet n’est logé dans le port USB de ce dernier. L’adaptateur secteur est un composant à haut voltage et ne doit en aucun cas être ouvert, même si l’iPod est éteint. Ne forcez jamais de connecteur à entrer dans le port USB de l’adaptateur. Si le connecteur et le port ne s’adaptent pas relativement facilement, assurez-vous qu’ils sont bien prévus pour se brancher ensemble et que vous avez positionné correctement le connecteur par rapport au port. Éloignez l’adaptateur secteur des liquides et sources de liquides, tels que les boissons, les lavabos, les baignoires, les blocs de douche, la pluie, etc.12 Français Prenez garde de ne pas faire tomber de nourriture ou de liquide sur l’adaptateur secteur. Si le cas se présente, débranchez l’adaptateur secteur avant de l’essuyer. Si vous renversez quelque chose dessus, il peut s’avérer nécessaire de renvoyer votre équipement à Apple pour le faire réviser. N’essayez pas d’ouvrir ou de démonter votre adaptateur secteur. Vous risquez de recevoir une décharge électrique et d’annuler la garantie limitée. L’appareil ne contient pas de pièces pouvant être réparées par l’utilisateur. Si l’adaptateur secteur semble endommagé ou ne fonctionne pas correctement, rendezvous sur le site www.apple.com/fr/support pour connaître les conditions de réparation dans le cadre de la garantie. Spécifications Entrée : CA 100-240 volts (V), 50/60 hertz (Hz) Sortie : CC 5V, 1 ADeutsch 13 iPod USB Power Adapter (Netzteil) Der iPod USB Power Adapter (Netzteil) kann mit dem iPod shuffle und allen iPod Playern mit Dock Connector verwendet werden. Hinweis: Ihr Netzteil sieht möglicherweise anders als hier dargestellt aus. Schließen Sie den iPod mit dem mitgelieferten USB-Kabel an das Netzteil an. Wenn Sie einen original iPod shuffle besitzen, können Sie diesen direkt an das Netzteil anschließen. Netzteilstecker iPod USB Power Adapter (Netzteil) Mit dem iPod geliefertes USB-Kabel14 Deutsch Klappen Sie dann die Steckerstifte (falls erforderlich) heraus und schließen Sie das Netzteil an eine Steckdose an, um die iPod Batterie zu laden. Sie können das Netzteil auch mit einem iPod Dock verbinden und den iPod in das Dock stellen. Informationen zu Ladezeiten finden Sie im Handbuch, das Sie mit Ihrem iPod erhalten haben. Wichtig: Wenn Ihr Netzteil herausklappbare Steckerstifte besitzt, stellen Sie sicher, dass Sie diese vollständig herausgeklappt haben, bevor Sie das Netzteil an die Steckdose anschließen. Sicherheit Die einzige Möglichkeit, die Stromzufuhr zum Netzteil komplett zu unterbrechen, besteht darin, das Kabel des Netzteils vom Stromnetz zu trennen. Achten Sie darauf, dass um das Netzteil ausreichend Freiraum vorhanden ist. Verwenden Sie es nur in Umgebungen, in denen eine ausreichende Luftzirkulation gewährleistet ist. Verwenden Sie es zum Beispiel nicht in einem Aktenkoffer oder Ähnlichem.Deutsch 15 Halten Sie das Netzteil an den Seiten, wenn Sie es vom Stromnetz trennen oder daran anschließen. Achten Sie darauf, die Metallstifte des Steckers nicht zu berühren. Stellen Sie vor dem Anschließen des USBKabels an das Netzteil sicher, dass sich keine Fremdkörper im USB-Anschluss des Netzteils befinden. Bei dem Netzteil handelt es sich um ein Hochspannungsbauteil, das unter keinen Umständen geöffnet werden darf, auch dann nicht, wenn der iPod ausgeschaltet ist. Versuchen Sie niemals, einen Stecker mit Gewalt an den USB-Anschluss des Netzteils anzuschließen. Wenn sich der Stecker nicht relativ einfach mit dem Netzteil verbinden lässt, vergewissern Sie sich, dass der Stecker zum Anschluss passt und Sie den Stecker wie erforderlich mit dem Anschluss ausgerichtet haben. Schützen Sie Ihr Netzteil vor Feuchtigkeit und Witterungseinflüssen. Legen Sie es nicht in der Nähe von Getränken, Waschbecken, Bade- und Duschwannen und anderen Feuchtigkeitsquellen ab.16 Deutsch Achten Sie darauf, dass das Netzteil nicht durch Speisereste oder Flüssigkeiten verunreinigt wird. Wenn dies doch einmal passiert, trennen Sie das Netzteil vom Stromnetz, bevor Sie es reinigen. Unter Umständen ist es erforderlich, Ihre Geräte an Apple zur Wartung zu senden. Versuchen Sie keinesfalls, das Netzteil zu öffnen oder auseinander zu bauen. Dabei kann es zu einem Kurzschluss kommen, und Sie riskieren den Verlust des Garantieanspruchs. Im Innern des Gerätes befinden sich keine Komponenten, die vom Benutzer gewartet werden können. Wenn das Netzteil beschädigt ist oder nicht korrekt funktioniert, finden Sie Näheres zu Ihren Garantieansprüchen und zu Service und Support unter folgender Adresse: www.apple.com/de/support. Technische Daten Eingangsleistung: 100 - 240 V Wechselstrom, 50/60 Hz Ausgangsleistung: 5 V Gleichstrom, 1,0 A17 Disposal and Recycling Information When this product has reached the end of its useful life, please dispose of it according to your local environmental laws and guidelines. For information about Apple’s recycling program, go to www.apple.com/environment/summary.html. European Union—Disposal Information: The symbol above means that according to local laws and regulations your product should be disposed of separately from household waste. When this product reaches its end of life, take it to a collection point designated by local authorities. Some collection points accept products for free. The separate collection and recycling of your product at the time of disposal will help conserve natural resources and ensure that it is recycled in a manner that protects human health and the environment.18 Union Européenne : informations sur l’élimination Le symbole ci-dessus signifie que vous devez vous débarasser de votre produit sans le mélanger avec les ordures ménagères, selon les normes et la législation de votre pays. Lorsque ce produit n’est plus utilisable, portez-le dans un centre de traitement des déchets agréé par les autorités locales. Certains centres acceptent les produits gratuitement. Le traitement et le recyclage séparé de votre produit lors de son élimination aideront à préserver les ressources naturelles et à protéger l’environnement et la santé des êtres humains. Europäische Union – Informationen zur Entsorgung Das Symbol oben bedeutet, dass dieses Produkt entsprechend den geltenden gesetzlichen Vorschriften und getrennt vom Hausmüll entsorgt werden muss. Geben Sie dieses Produkt zur Entsorgung bei einer offiziellen Sammelstelle ab. Bei einigen Sammelstellen können Produkte zur Entsorgung unentgeltlich abgegeben werden. Durch das separate Sammeln und Recycling werden die natürlichen Ressourcen geschont und es ist sichergestellt, dass beim Recycling des Produkts alle Bestimmungen zum Schutz von Gesundheit und Umwelt beachtet werden.19 Unione Europea: informazioni per l’eliminazione Questo simbolo significa che, in base alle leggi e alle norme locali, il prodotto dovrebbe essere eliminato separatamente dai rifiuti casalinghi. Quando il prodotto diventa inutilizzabile, portarlo nel punto di raccolta stabilito dalle autorità locali. Alcuni punti di raccolta accettano i prodotti gratuitamente. La raccolta separata e il riciclaggio del prodotto al momento dell’eliminazione aiutano a conservare le risorse naturali e assicurano che venga riciclato in maniera tale da salvaguardare la salute umana e l’ambiente. Europeiska unionen – uttjänta produkter Symbolen ovan betyder att produkten enligt lokala lagar och bestämmelser inte får kastas tillsammans med hushållsavfallet. När produkten har tjänat ut måste den tas till en återvinningsstation som utsetts av lokala myndigheter. Vissa återvinningsstationer tar kostnadsfritt hand om uttjänta produkter. Genom att låta den uttjänta produkten tas om hand för återvinning hjälper du till att spara naturresurser och skydda hälsa och miljö.Apple and the Environment At Apple, we recognize our responsibility to minimize the environmental impacts of our operations and products. For more information, go to www.apple.com/environment/summary.html. www.apple.com/ipod/support © 2006 Apple Computer, Inc. All rights reserved. Apple, the Apple logo, and iPod are trademarks of Apple Computer, Inc., registered in the U.S. and other countries. Shuffle is a trademark of Apple Computer, Inc. 0Z034-3775-A Printed in XXXX Feuille d’opérations de Mac OS X Server Les réglages du serveur suivant sont indiqués dans les tableaux ci-dessous : Serveur : Élément Description Vos informations Identité du serveur distant pour l’installation et la configuration Pour l’installation et la configuration interactives d’un serveur distant sur le sous-réseau local, l’une de ces valeurs du serveur : - Adresse IP au format IPv4 (000.000.000.000). - Nom d’hôte (serveur.exemple.com). - Adresse MAC (00:03:93:71:26:52). Pour les installations et configurations à partir de la ligne de commande ou d’un sous-réseau distant, l’adresse IP du serveur cible au format IPv4. Mot de passe prédéfini (pour l’installation et la configuration à distance) Les 8 premiers chiffres du numéro de série du serveur cible, imprimé sur l’étiquette collée sur l’ordinateur. Pour les anciens ordinateurs ne portant pas ce type de numéro, tapez 12345678. Type d’installation Mise à niveau à partir de la version 10.3.9 ou 10.2.8, installation complète sans formatage de disque ou installation spéciale. Le volume (partition) cible est effacé lorsque vous effectuez une nouvelle installation. Disque ou partition cible Nom du disque ou de la partition (volume) cible. Format de disque (lorsque l’effacement du disque est validé) Format du disque cible. Dans la plupart des cas, utilisez Mac OS Étendu (journalisé). Vous pouvez également utiliser Mac OS Étendu. N’utilisez pas système de fichiers UNIX ou tout autre format sensible à la casse. Partitionnement de disque (lorsque l’effacement du disque est validé) Indiquez si vous souhaitez partitionner le disque cible. La taille minimum recommandée d’une partition de disque cible est de 10 Go.2 Mise en miroir RAID (lorsque l’effacement du disque est validé et que vous disposez d’un deuxième disque physique sur le serveur cible) Indiquez si vous souhaitez configurer la mise en miroir RAID. Le deuxième disque est utilisé automatiquement si le disque principal n’est pas disponible. Si le disque cible comporte une partition unique et que le deuxième disque physique comporte une partition unique sans aucune donnée, vous pouvez configurer la mise en miroir RAID après l’installation. Cependant, afin d’éviter toute perte de données, configurez la mise en miroir RAID le plus tôt possible. Utilisation de données de configuration enregistrées Si vous voulez utiliser les données de configuration enregistrées pour configurer ce serveur, identifiez le fichier ou le répertoire dans lequel elles sont stockées . Si les données sont cryptées, identifiez également la phrase secrète. Si vous souhaitez enregistrer des réglages dans un fichier ou un répertoire, utilisez l’une des deux lignes suivantes. Enregistrement des données de configuration dans un fichier Nommez le fichier à l’aide de l’une des options suivantes : - .plist (incluez les zéros de début, mais omettez les deux-points). Par exemple, 0030654dbcef.plist. - .plist. Par exemple, 10.0.0.4.plist. - .plist. Par exemple, monserveur.plist. - .plist (8 premiers caractères seulement). Par exemple, ABCD1234.plist. - .plist. Par exemple, monserveur.exemple.com.plist. - .plist. Par exemple, 10.0.plist (trouve 10.0.0.4 et 10.0.1.2). - generique.plist (fichier que tout serveur reconnaîtra, utilisé pour configurer les serveurs qui nécessitent les mêmes valeurs de configuration). Si vous choisissez de crypter le fichier, vous pouvez enregistrer la phrase secrète dans un fichier nommé selon les conventions ci-dessus, mais utilisez l’extension .pass et non .plist. Placez le(s) fichier(s) à un emplacement où le ou les serveurs cible peuvent le détecter. Un serveur peut détecter les fichiers qui résident sur un volume monté localement dans /Volumes/*/Auto Server Setup/, où * correspond à n’importe quel périphérique monté sous /Volumes. Élément Description Vos informations3 Enregistrement de données de configuration dans un répertoire Accédez au répertoire dans lequel vous souhaitez enregistrer la configuration, puis nommez l’enregistrement de configuration à l’aide d’une des options suivantes : - (insérez les zéros à gauche mais omettez les deux-points). Par exemple, 0030654dbcef. - . Par exemple, 10.0.0.4. - . Par exemple, monserveur. - (8 premiers caractères seulement). Par exemple, ABCD1234. - . Par exemple, monserveur.exemple.com. - . Par exemple, 10.0 (trouve 10.0.0.4 et 10.0.1.2). - generique (fichier que tout serveur reconnaîtra, utilisé pour configurer les serveurs qui nécessitent les mêmes valeurs de configuration). Si vous choisissez de crypter le fichier, vous pouvez enregistrer la phrase secrète dans un fichier nommé à l’aide des conventions ci-dessus, mais utilisez l’extension .pass. Placez le fichier de phrase secrète à un emplacement où le ou les serveurs cible peuvent le détecter. Un serveur peut détecter le fichier s’il réside sur un volume monté localement dans /Volumes/*/Auto Server Setup/, où * correspond à tout périphérique monté sous /Volumes. Langue Langue à utiliser pour l’administration du serveur (anglais, japonais, français ou allemand). La langue affecte les formats de date et d’heure du serveur, le texte affiché et l’encodage par défaut utilisé par le serveur AFP. Configuration de clavier Clavier de l’administration du serveur. Élément Description Vos informations4 Numéro de série Numéro de série de votre copie de Mac OS X Server. Le format du numéro de série du serveur est xsvr-104-999-x-zzz-zzz-zzz-zzz-zzz-zzz-z, où x est une lettre, 9 un chiffre et z une lettre ou un chiffre. Le premier (xsvr) et le quatrième (x) élément doivent être en minuscules. Excepté si vous possédez une licence de site, vous avez besoin d’un numéro de série unique pour chaque serveur. Vous trouverez le numéro de série du logiciel serveur imprimé sur les documents fournis avec le logiciel. Si vous possédez une licence de site, vous devez saisir le nom du propriétaire enregistré et l’organisation exactement tels qu’ils ont été spécifiés par votre représentant Apple. Si vous configurez un serveur avec un fichier de configuration ou un enregistrement de répertoire générique et que le numéro de série ne correspond pas à une licence de site, vous devez saisir le numéro de série du serveur à l’aide d’Admin Serveur. Nom long de l’administrateur (parfois appelé nom complet ou nom réel) Un nom long ne doit pas être composé de plus de 255 octets. Le nombre de caractères va de 255 caractères romains à 85 caractères de 3 octets. Ce nom peut comporter des espaces Il ne doit pas être identique à un nom d’utilisateur prédéfini, tel que l’administrateur système. Il respecte la casse dans la fenêtre d’ouverture de session, mais pas lors de l’accès aux serveurs de fichiers. Nom abrégé de l’administrateur Le nom abrégé peut contenir jusqu’à 255 caractères romains, même s’il se limite généralement à huit ou moins. Ce nom ne peut être composé que des caractères a à z, A à Z, 0 à 9, _ (trait de soulignement) ou - (trait d’union). Évitez les noms abrégés affectés par Apple à des utilisateurs prédéfinis, tels que « root ». Mot de passe de l’administrateur Cette valeur distingue les majuscules des minuscules et doit contenir au moins 4 caractères. Il s’agit également du mot de passe de l’utilisateur root. Si vous enregistrez cette valeur, veillez à conserver cette feuille d’opérations en lieu sûr. À l’issue de la configuration, utilisez le Gestionnaire de groupe de travail pour changer le mot de passe de ce compte. Élément Description Vos informations5 Nom d’hôte Vous ne pouvez pas spécifier ce nom lors de la configuration du serveur. L’Assistant du serveur configure le nom d’hôte sur AUTOMATIC dans /etc/hostconfig. Avec ce réglage, le nom d’hôte du serveur est le premier nom qui est vrai dans cette liste : - Le nom fourni par le serveur DHCP ou BootP pour l’adresse IP principale. - Le premier nom renvoyé par une requête DNS inversé (adresse-vers-nom) pour l’adresse IP principale. - Le nom d’hôte local. - Le nom « localhost ». Nom de l’ordinateur Le nom AppleTalk et le nom par défaut utilisé pour SLP/DA. Indiquez un nom de 63 caractères ou moins, mais évitez d’utiliser les caractères =, : et @. L’Explorateur réseau du Finder utilise SMB/CIFS pour rechercher les ordinateurs qui permettent le partage de fichiers Windows. Les espaces sont supprimés d’un nom d’ordinateur pour une utilisation avec SMB/CIFS, et le nom ne doit pas contenir plus de 15 caractères, sans caractères spéciaux et sans ponctuation. Nom d’hôte local Le nom qui désigne un ordinateur sur un sousréseau local. Il peut contenir des lettres minuscules, des chiffres et/ou des traits d’union (mais pas aux extrémités). Le nom se termine par « .local » et doit être unique sur un sous-réseau local. Données d’interface réseau Votre serveur est équipé d’un port Ethernet intégré et éventuellement d’un autre port intégré ou ajouté. Enregistrez les informations de chaque port à activer. Enregistrez les données relatives à chaque port dans le tableau fourni plus loin dans cette feuille d’opérations. Élément Description Vos informations6 Utilisation des répertoires Sélectionnez l’un des éléments suivants : - Serveur autonome (utilisez uniquement le répertoire local). - Connecté à un système de répertoire (obtenez des informations d’un autre répertoire partagé du serveur). Si vous sélectionnez cette option, utilisez l’une des quatre lignes suivantes de ce tableau pour indiquer la façon dont le serveur se connecte au répertoire. - Maître Open Directory (fournissez les informations de répertoire aux autres ordinateurs). Si vous choisissez cette option, utilisez la ligne Utilisation du maître Open Directory. - Aucune modification (pour les mises à niveau seulement). Utilisation de Tel que spécifié par le serveur DHCP Le répertoire à utiliser sera identifié par un serveur DHCP configuré pour fournir l’adresse et la base de recherche d’un serveur LDAP (option DHCP 95) ou l’adresse et la balise d’un serveur NetInfo hérité. Utilisation d’un serveur Open Directory Le répertoire à utiliser sera un répertoire LDAP identifié par un serveur DHCP ou par la spécification d’une adresse IP ou d’un nom de domaine pour le serveur LDAP. Utilisation d’un serveur NetInfo Le répertoire à utiliser sera un répertoire parent NetInfo sur un serveur Apple existant. Choisissez un ou plusieurs moyens de localiser ce répertoire : - Diffusion. - DHCP. - Adresse IP statique (indiquez l’adresse IP et la balise NetInfo). Utilisation d’un autre serveur de répertoire Le ou les répertoires à utiliser seront configurés à l’aide de l’application Format de répertoire une fois la configuration du serveur terminée. Utilisation de maître Open Directory Vous pouvez éventuellement indiquer que vous voulez activer un contrôleur de domaine principal Windows sur le serveur. Indiquez un nom d’ordinateur et un domaine Windows pour le serveur. Le nom d’ordinateur et le domaine peuvent contenir les caractères a à z, A à Z, 0 à 9, -, mais pas de . ou d’espace ; en outre, ils ne peuvent pas être composés uniquement de chiffres. Terminez la configuration du répertoire à héberger à l’aide d’Admin Serveur une fois la configuration du serveur achevée. Élément Description Vos informations7 Les réglages de configuration du port suivant apparaissent dans le tableau ci-dessous : Automatisation du démarrage du service Indiquez si vous souhaitez lancer automatiquement l’un des services ci-après au démarrage du serveur. Ces services ne nécessitent aucune autre configuration : Service de fichiers Apple Apple Remote Desktop Service FTP Service iChat Service de courrier Service NetBoot Service d’horloge de réseau Service QuickTime Streaming Service de mise à jour de logiciels Service web Service WebDAV Service de journal web (Weblog) Service de fichiers Windows Service Xgrid Agent Service Xgrid Controller Fuseau horaire Choisissez le fuseau horaire que le serveur doit utiliser. Horloge réseau Indiquez éventuellement un serveur horloge de réseau. Apple recommande de préserver la précision de l’horloge du serveur en la synchronisant avec un serveur horloge de réseau. Élément Description Vos informations Nom du port :Ethernet intégré Élément Description Vos informations Nom du périphérique Un nom UNIX du port au format enx, où x commence par 0. Reportez-vous au manuel fourni avec le matériel pour connaître la valeur de x pour le port que vous décrivez. La valeur en0 désigne toujours un port Ethernet intégré. en0 Adresse Ethernet L’adresse MAC (Media Access Control) du port (00:00:00:00:00:00). Cette valeur se trouve généralement sur un autocollant apposé sur le serveur, mais vous pouvez également exécuter Informations Système Apple ou un outil de ligne de commande tel que networksetup pour retrouver cette valeur. TCP/IP et AppleTalk Indiquez si vous souhaitez activer le port pour TCIP/IP et/ou AppleTalk. Vous pouvez connecter un port à Internet en activant TCP/IP et utiliser le même port ou un autre port pour AppleTalk. N’activez pas plus d’un port pour AppleTalk.8 Ordre des ports Si vous activez plusieurs ports, indiquez l’ordre dans lequel vous devez accéder aux ports lors de la tentative de connexion à un réseau. L’ensemble du trafic réseau non local utilise le premier port actif. Réglages TCP/IP Utilisez l’une des quatre lignes suivantes de ce tableau. Manuellement Indiquez ces réglages si vous souhaitez spécifier manuellement les réglages TCP/IP : - Adresse IP (000.000.000.000). Adresse statique unique. - Masque de sous-réseau (000.000.000.000). Utilisé pour localiser le sous-réseau sur le réseau local où se trouve le serveur. Ce masque est utilisé pour déduire la partie réseau de l’adresse du serveur ; ce qui reste identifie l’ordinateur serveur sur ce réseau. - Routeur (000.000.000.000) prenant en charge le sous-réseau sur lequel réside le serveur. Le routeur est l’ordinateur du sous-réseau local vers lequel sont envoyés les messages si l’adresse IP cible ne se trouve pas sur le sous-réseau local. - Serveurs DNS (000.000.000.000) utilisés pour convertir les adresses IP en noms DNS complets (et inversement) pour le port. - Domaines de recherche (facultatif). Noms à ajouter automatiquement aux adresses Internet lorsque vous ne les tapez pas entièrement. Par exemple, si vous indiquez campus.univ.edu comme domaine de recherche, vous pouvez saisir serveur1 dans la zone de dialogue Se connecter au serveur du Finder pour vous connecter à serveur1.campus.univ.edu. Via DHCP avec saisie manuelle de l’adresse IP Indiquez ces réglages si vous souhaitez utiliser un serveur DHCP pour attribuer une adresse IP statique et éventuellement d’autres réglages au port. Assurez-vous que le serveur DHCP est déjà configuré et que le service DHCP est en cours d’exécution lorsque vous lancez la configuration du serveur : - Adresse IP (000.000.000.000). Adresse statique unique. - Serveurs DNS (000.000.000.000) utilisés pour convertir les adresses IP en noms DNS complets (et inversement) pour le port. - Domaines de recherche (facultatif). Noms à ajouter automatiquement aux adresses Internet lorsque vous ne les tapez pas entièrement. Par exemple, si vous indiquez campus.univ.edu comme domaine de recherche, vous pouvez saisir serveur1 dans la zone de dialogue Se connecter au serveur du Finder pour vous connecter à serveur1.campus.univ.edu. Élément Description Vos informations9 Via DHCP Indiquez ces réglages si vous souhaitez utiliser un serveur DHCP pour attribuer une adresse IP dynamique et éventuellement d’autres réglages au port. Assurezvous que le serveur DHCP est déjà configuré et que le service DHCP est en cours d’exécution lorsque vous lancez la configuration du serveur : - Identifiant client DHCP (facultatif). Chaîne utile pour reconnaître un port lorsque son adresse IP change. Ne spécifiez pas d’identifiant client DHCP lors de l’utilisation de l’Assistant du serveur pour configurer le serveur à distance. En revanche, après la configuration, utilisez les préférences Réseau du serveur pour définir un identifiant client DHCP. - Serveurs DNS (000.000.000.000) utilisés pour convertir les adresses IP en noms DNS complets (et inversement) pour le port. - Domaines de recherche (facultatif). Noms à ajouter automatiquement aux adresses Internet lorsque vous ne les tapez pas entièrement. Par exemple, si vous indiquez campus.univ.edu comme domaine de recherche, vous pouvez saisir serveur1 dans la zone de dialogue Se connecter au serveur du Finder pour vous connecter à serveur1.campus.univ.edu. Via BootP Spécifiez ces réglages si vous souhaitez utiliser un serveur de protocole Bootstrap pour attribuer une adresse IP au port identifié. Avec BootP, la même adresse IP est toujours affectée à une interface réseau particulière. Elle est utilisée principalement pour les ordinateurs qui démarrent à partir d’une image NetBoot : - Serveurs DNS (000.000.000.000) utilisés pour convertir les adresses IP en noms de domaine complets (et inversement) pour le port. - Domaines de recherche (facultatif). Noms à ajouter automatiquement aux adresses Internet lorsque vous ne les tapez pas entièrement. Par exemple, si vous indiquez campus.univ.edu comme domaine de recherche, vous pouvez saisir serveur1 dans la zone de dialogue Se connecter au serveur du Finder pour vous connecter à serveur1.campus.univ.edu. Élément Description Vos informations10 Les réglages de configuration du port suivant apparaissent dans le tableau ci-dessous : IPv6 Pour configurer l’adressage IPv6 pour le port, sélectionnez Automatiquement ou Manuellement. Choisissez Automatiquement si vous souhaitez que le serveur génère automatiquement une adresse IPv6 pour le port. Choisissez Manuellement pour spécifier des réglages IPv6 : - Adresse IPv6. Généralement au format 0000:0000:0000:0000:0000:0000:0000:0000. - Routeur. Adresse IPv6 du routeur sur le sous-réseau local. - Longueur du préfixe. Nombre de bits significatifs du masque de sous-réseau utilisés pour identifier le réseau. Réglages Ethernet Pour configurer automatiquement les réglages Ethernet pour le port, choisissez Automatiquement. Vous pouvez choisir Manuellement (Avancé) pour spécifier les réglages si vous avez des besoins particuliers concernant le réseau auquel le serveur est connecté. Notez que des réglages Ethernet incorrects peuvent affecter les performances réseau ou rendre un port inutilisable : - Vitesse. Vitesse Ethernet maximale, en bits par seconde, pour toute transmission via le port. Sélectionnez l’une des options suivantes :sélection automatique, 10baseT/UTP, 100baseTX et 1000baseTX. - Duplex. Détermine si les paquets d’entrée et de sortie sont transmis simultanément (duplex intégral) ou en alternance (semi-duplex). - Taille maximale de paquet (MTU). Paquet le plus grand envoyé ou reçu par le port. MTU signifie « unité de transfert maximale », exprimée en octets. L’augmentation de la taille de paquet améliore le débit, mais les périphériques qui reçoivent le paquet (commutateurs, routeurs, etc.) doivent prendre en charge cette taille de paquet. Sélectionnez l’une des options suivantes : Standard (1500), Jumbo (9000) ou Personnaliser (saisissez une valeur comprise entre 72 et 1500). Élément Description Vos informations Nom du port : Élément Description Vos informations Nom du périphérique Un nom UNIX du port au format enx, où x commence par 0. Reportez-vous au manuel fourni avec le matériel pour connaître la valeur de x pour le port que vous décrivez. La valeur en0 désigne toujours un port Ethernet intégré. Adresse Ethernet L’adresse MAC (Media Access Control) du port (00:00:00:00:00:00). Cette valeur se trouve généralement sur un autocollant apposé sur le serveur, mais vous pouvez également exécuter Informations Système Apple ou un outil de ligne de commande tel que networksetup pour retrouver cette valeur.11 TCP/IP et AppleTalk Indiquez si vous souhaitez activer le port pour TCP/IP et/ou AppleTalk. Vous pouvez connecter un port à Internet en activant TCP/IP et utiliser le même port ou un autre port pour AppleTalk. N’activez pas plus d’un port pour AppleTalk. Ordre des ports Si vous activez plusieurs ports, indiquez l’ordre dans lequel vous devez accéder aux ports lors de la tentative de connexion à un réseau. L’ensemble du trafic réseau non local utilise le premier port actif. Réglages TCP/IP Utilisez l’une des quatre lignes suivantes de ce tableau. Manuellement Indiquez ces réglages si vous souhaitez spécifier manuellement les réglages TCP/IP : - Adresse IP (000.000.000.000). Adresse statique unique. - Masque de sous-réseau (000.000.000.000). Utilisé pour localiser le sous-réseau sur le réseau local où se trouve le serveur. Ce masque est utilisé pour déduire la partie réseau de l’adresse du serveur ; ce qui reste identifie l’ordinateur serveur sur ce réseau. - Routeur (000.000.000.000) prenant en charge le sous-réseau sur lequel réside le serveur. Le routeur est l’ordinateur du sous-réseau local vers lequel sont envoyés les messages si l’adresse IP cible ne se trouve pas sur le sous-réseau local. - Serveurs DNS (000.000.000.000) utilisés pour convertir les adresses IP en noms DNS complets (et inversement) pour le port. - Domaines de recherche (facultatif). Noms à ajouter automatiquement aux adresses Internet lorsque vous ne les tapez pas entièrement. Par exemple, si vous indiquez campus.univ.edu comme domaine de recherche, vous pouvez saisir serveur1 dans la zone de dialogue Se connecter au serveur du Finder pour vous connecter à serveur1.campus.univ.edu. Via DHCP avec saisie manuelle de l’adresse IP Indiquez ces réglages si vous souhaitez utiliser un serveur DHCP pour attribuer une adresse IP statique et éventuellement d’autres réglages au port. Assurez-vous que le serveur DHCP est déjà configuré et que le service DHCP est en cours d’exécution lorsque vous lancez la configuration du serveur : - Adresse IP (000.000.000.000). Adresse statique unique. - Serveurs DNS (000.000.000.000) utilisés pour convertir les adresses IP en noms DNS complets (et inversement) pour le port. - Domaines de recherche (facultatif). Noms à ajouter automatiquement aux adresses Internet lorsque vous ne les tapez pas entièrement. Par exemple, si vous indiquez campus.univ.edu comme domaine de recherche, vous pouvez saisir serveur1 dans la zone de dialogue Se connecter au serveur du Finder pour vous connecter à serveur1.campus.univ.edu. Élément Description Vos informations12 Via DHCP Indiquez ces réglages si vous souhaitez utiliser un serveur DHCP pour attribuer une adresse IP dynamique et éventuellement d’autres réglages au port. Assurezvous que le serveur DHCP est déjà configuré et que le service DHCP est en cours d’exécution lorsque vous lancez la configuration du serveur : - Identifiant client DHCP (facultatif). Chaîne utile pour reconnaître un port lorsque son adresse IP change. Ne spécifiez pas d’identifiant client DHCP lors de l’utilisation de l’Assistant du serveur pour configurer le serveur à distance. En revanche, après la configuration, utilisez les préférences Réseau du serveur pour définir un identifiant client DHCP. - Serveurs DNS (000.000.000.000) utilisés pour convertir les adresses IP en noms DNS complets (et inversement) pour le port. - Domaines de recherche (facultatif). Noms à ajouter automatiquement aux adresses Internet lorsque vous ne les tapez pas entièrement. Par exemple, si vous indiquez campus.univ.edu comme domaine de recherche, vous pouvez saisir serveur1 dans la zone de dialogue Se connecter au serveur du Finder pour vous connecter à serveur1.campus.univ.edu. Via BootP Spécifiez ces réglages si vous souhaitez utiliser un serveur de protocole Bootstrap pour attribuer une adresse IP au port identifié. Avec BootP, la même adresse IP est toujours affectée à une interface réseau particulière. Elle est utilisée principalement pour les ordinateurs qui démarrent à partir d’une image NetBoot : - Serveurs DNS (000.000.000.000) utilisés pour convertir les adresses IP en noms DNS complets (et inversement) pour le port. - Domaines de recherche (facultatif). Noms à ajouter automatiquement aux adresses Internet lorsque vous ne les tapez pas entièrement. Par exemple, si vous indiquez campus.univ.edu comme domaine de recherche, vous pouvez saisir serveur1 dans la zone de dialogue Se connecter au serveur du Finder pour vous connecter à serveur1.campus.univ.edu. Élément Description Vos informationsIPv6 Pour configurer l’adressage IPv6 pour le port, sélectionnez Automatiquement ou Manuellement. Choisissez Automatiquement si vous souhaitez que le serveur génère automatiquement une adresse IPv6 pour le port. Choisissez Manuellement pour spécifier des réglages IPv6 : - Adresse IPv6. Généralement au format 0000:0000:0000:0000:0000:0000:0000:0000. - Routeur. Adresse IPv6 du routeur sur le sous-réseau local. - Longueur du préfixe. Nombre de bits significatifs du masque de sous-réseau utilisés pour identifier le réseau. Réglages Ethernet Pour configurer automatiquement les réglages Ethernet pour le port, choisissez Automatiquement. Vous pouvez choisir Manuellement (Avancé) pour spécifier les réglages si vous avez des besoins particuliers concernant le réseau auquel le serveur est connecté. Notez que des réglages Ethernet incorrects peuvent affecter les performances réseau ou rendre un port inutilisable : - Vitesse. Vitesse Ethernet maximale, en bits par seconde, pour toute transmission via le port. Sélectionnez l’une des options suivantes :Sélection automatique, 10baseT/UTP, 100baseTX et 1000baseTX. - Duplex. Détermine si les paquets d’entrée et de sortie sont transmis simultanément (duplex intégral) ou en alternance (semi-duplex). - Taille maximale de paquet (MTU). Paquet le plus grand envoyé ou reçu par le port. MTU signifie « unité de transfert maximale », exprimée en octets. L’augmentation de la taille de paquet améliore le débit, mais les périphériques qui reçoivent le paquet (commutateurs, routeurs, etc.) doivent prendre en charge cette taille de paquet. Sélectionnez l’une des options suivantes : Standard (1500), Jumbo (9000) ou Personnaliser (saisissez une valeur comprise entre 72 et 1500). Élément Description Vos informations © 2006 Apple Computer, Inc. Tous droits réservés. Apple, le logo Apple, AppleTalk, Mac, Mac OS, Macintosh, QuickTime et Xgrid sont des marques d’Apple Computer, Inc. déposées aux États-Unis et dans d’autres pays. Apple Remote Desktop et Finder sont des marques d’Apple Computer Inc. Juillet 2006. F019-0742 Time Capsule Installationshandbuch3 Inhalt 5 Kapitel 1: Einführung 7 Informationen zu Ihrer Time Capsule-Basisstation 9 Die AirPort-Software 10 Systemvoraussetzungen 12 Die Statusanzeigen der Time Capsule-Basisstation 15 Kapitel 2: Konfigurieren Ihrer Time Capsule-Basisstation 16 Verwenden der Time Capsule-Basisstation zum Erstellen eines drahtlosen Netzwerks 19 Verwenden des AirPort-Dienstprogramms 21 Einrichten eines neuen drahtlosen Netzwerks 22 Konfigurieren und Freigeben des Internetzugangs 24 Festlegen erweiterter Optionen 25 Ermöglichen des Netzwerkzugriffs durch drahtlose Clients ohne Eingabe eines Kennworts 27 Verwenden von Time Machine mit Ihrer Time Capsule-Basisstation 29 Kapitel 3: Tipps zur Fehlerbeseitigung 29 Sie können keine Verbindung zum Internet herstellen 29 Sie haben Ihr Netzwerk- oder Time Capsule-Kennwort vergessen 31 Ihre Time Capsule-Basisstation reagiert nicht4 Inhalt 32 Die Statusanzeige der Time Capsule-Basisstation blinkt gelb 33 Ihr Drucker reagiert nicht 34 Aktualisieren der AirPort-Software 35 Überlegungen zur Platzierung der Time Capsule-Basisstation 36 Mögliche Störquellen, die Interferenzen mit AirPort verursachen können 37 Kapitel 4: Weitere Informationen, Service und Support 39 Anhang: Time Capsule – Technische Daten und Sicherheitsinformationen 43 Regulatory Compliance Information1 5 1 Einführung Herzlichen Glückwunsch zum Kauf von Time Capsule. Bitte lesen Sie dieses Handbuch, um die Basisstation in Betrieb zu nehmen. Die neue Time Capsule-Basisstation ermöglicht eine vollständig automatisierte Datensicherung über Ihr Wi-Fi-Netzwerk. Mit dem Programm „Time Machine“ unter Mac OS X 10.5.2 Leopard (oder neuer) lassen sich ganz einfach und automatisch Sicherungskopien der Daten aller Computer in Ihrem Netzwerk auf einer einzigen Time Capsule-Basisstation anlegen. Gleichzeitig dient Time Capsule auch als eine AirPort Extreme-Basisstation, die einen gleichzeitigen drahtlosen Dualband-Netzwerkbetrieb ermöglicht. Bei der Konfiguration Ihrer Time Capsule richtet diese zwei High-Speed-Wi-Fi-Netzwerke ein:  Ein 2,4 Gigahertz- (GHz) Netzwerk für 802.11b-, 802.11g- und 802.11n-Geräte wie iPhone, iPod touch und ältere Computer  Ein 5 GHz-Netzwerk für 802.11n- und 802.11a-Geräte wie neuere Computer und Apple TV6 Kapitel 1 Einführung Geräte für die drahtlose Kommunikation können das Netzwerk nutzen, das ihnen eine optimale Leistung und Kompatibilität bietet. Die Time Capsule-Basisstation stellt den Computern und Geräten in Ihrem Netzwerk eine Breitband-Internetverbindung für die gemeinsame Nutzung bereit. Mit Time Capsule haben Sie folgende Möglichkeiten:  Verwenden des Programms „Time Machine“ unter Mac OS X 10.5.2 (oder neuer) zum Ausführen einer Datensicherung aller Computer in Ihrem drahtlosen Netzwerk sowie von Computern, die via Ethernet mit Ihrer Time Capsule verbunden sind. Hinweis: Abhängig davon, wie viele Daten Sie sichern wollen, kann die erste Datensicherung mit Time Capsule und Time Machine relativ lange dauern, etwa über Nacht oder sogar länger. Sie können die erste Datensicherung beschleunigen, indem Sie Ihren Computer über ein Ethernetkabel mit dem LAN-Anschluss der Time Capsule verbinden. Weitere Informationen zum Verwenden von Time Machine finden Sie im Abschnitt „Verwenden von Time Machine mit Ihrer Time Capsule-Basisstation“ auf Seite 27.  Erstellen eines durch Kennwort geschützten drahtlosen privaten Netzwerks, Herstellen einer Verbindung zum Internet und Freigeben der Verbindung für andere Computer oder Wi-Fi-Geräte wie iPhone, iPod touch und Apple TV. Sie können Daten mit anderen mit dem Netzwerk verbundenen Computern gemeinsam nutzen.  Einrichten eines Gastnetzwerks mit oder ohne Kennwortschutz, um drahtlosen Geräten wie Computern, iPhone, iPod touch und Apple TV nur den Internetzugang bereitzustellen.Kapitel 1 Einführung 7  Verbinden der Time Capsule-Basisstation mit Ihrem Ethernetnetzwerk. MacintoshComputer, Windows XP- oder Windows Vista-Computer, die für die drahtlose Kommunikation konfiguriert sind, können dann auf ein komplettes Netzwerk zugreifen, ohne durch Kabel verbunden zu sein.  Anschließen eines kompatiblen USB-Druckers an Ihre Time Capsule-Basisstation. Kompatible Computer in Ihrem AirPort-Netzwerk können diesen Drucker dann drahtlos oder via Kabel verwenden.  Verbinden einer zusätzlichen USB-Festplatte mit der Time Capsule-Basisstation. Kompatible Computer in Ihrem AirPort-Netzwerk können dann drahtlos oder per Kabel auf Informationen auf der Festplatte zugreifen.  Verbinden eines USB-Hub mit der Time Capsule-Basisstation und Anschließen mehrerer USB-Geräte wie Drucker oder Festplatten. Alle Computer im Netzwerk können danach auf diese Geräte zugreifen. Wichtig: Installieren Sie das AirPort-Dienstprogramm 5.4 von der CD, die Sie mit Ihrer Time Capsule-Basisstation erhalten haben. Oder laden Sie das Dienstprogramm mithilfe der Softwareaktualisierung. Vorherige Versionen des AirPort-Assistenten und des AirPort Admin-Dienstprogramms sind mit dieser Time Capsule-Basisstation nicht kompatibel. Informationen zu Ihrer Time Capsule-Basisstation Ihre Time Capsule-Basisstation ist mit fünf Anschlüssen an der Rückseite ausgestattet:  Einem 10/100/1000BASE-T Gigabit Ethernet-WAN-Anschluss (Wide Area Network) für die Anbindung eines DSL- oder Kabelmodems oder für den Anschluss an ein vorhandenes Ethernetnetzwerk 8 Kapitel 1 Einführung  Drei 10/100/1000BASE-T Gigabit Ethernet-LAN-Anschlüsse (Local Area Network) für die Anbindung von Ethernetgeräten wie Druckern oder Computern oder für den Anschluss an ein vorhandenes Ethernetnetzwerk  Einem USB-Anschluss für die Anbindung eines kompatiblen USB-Druckers, einer USB-Festplatte oder eines USB-Hubs für den Anschluss verschiedener Geräte Die Reset-Taste neben den Anschlüssen wird für die Fehlerbeseitigung Ihrer Time Capsule-Basisstation verwendet. Die Statusanzeige vorne am Gerät zeigt den aktuellen Status an. Statusanzeige Internet-WAN-Anschluss Netzanschluss Netzkabel USB-Anschluss Reset-Taste Ethernetanschlüsse Anschluss für Diebstahlsicherung Anzeige für EthernetaktivitätKapitel 1 Einführung 9 Die AirPort-Software Ihre Time Capsule-Basisstation funktioniert mit dem AirPort-Dienstprogramm, das auf der Time Capsule-CD enthalten ist. Installieren Sie das AirPort-Dienstprogramm und befolgen Sie die Anleitungen auf den folgenden Seiten, um die Time Capsule-Basisstation und Ihr drahtloses AirPort-Netzwerk zu konfigurieren. Hinweis: Für die Konfiguration von Time Capsule ist das AirPort-Dienstprogramm Version 5.4 erforderlich. Mit älteren Versionen der AirPort-Software ist diese Time CapsuleBasisstation nicht kompatibel. AirPort-Dienstprogramm Verwenden Sie das AirPort-Dienstprogramm für die Konfiguration Ihrer Time CapsuleBasisstation, sodass Sie ein drahtloses Netzwerk einrichten, die Verbindung zum Internet herstellen und kompatible USB-Drucker und USB-Festplatten gemeinsam verwenden können. Sie können Ihre Time Capsule-Basisstation auch mit einem vorhandenen drahtlosen AirPort Extreme-Netzwerk verbinden. Das AirPort-Dienstprogramm eignet sich auch für die Konfiguration und Verwaltung von Time Capsule-, AirPort Extreme- und AirPort Express-Basisstationen. Verwenden Sie das Dienstprogramm, um die Einstellungen für Netzwerk, Datenweiterleitung und Sicherheit sowie weitere Optionen manuell festzulegen. Z AirPort-Symbol in der Menüleiste Mithilfe des AirPort-Symbols in der Menüleiste können Sie schnell zwischen AirPortNetzwerken wechseln, die Signalqualität des derzeit ausgewählten Netzwerks überwachen, ein Computer-zu-Computer-Netzwerk einrichten und die AirPort-Kommunikation aktivieren oder deaktivieren. Das AirPort-Symbol wird bei Computern mit Mac OS X in der Menüleiste angezeigt. 10 Kapitel 1 Einführung Systemvoraussetzungen Für die Verwendung von Time Capsule benötigen Sie einen Computer, der drahtlos arbeiten kann und mit den Standards IEEE 802.11a, 802.11b oder 802.11g oder mit einer Entwurfsversion des IEEE 802.11n-Standards konform ist. Damit Sie die Time CapsuleBasisstation konfigurieren können, muss Ihr Computer die unten genannten Systemvoraussetzungen erfüllen. Hinweis: Sie benötigen Mac OS X 10.5.2 (oder neuer), um die Time Capsule-Basisstation mit Time Machine von Mac OS X Leopard nutzen zu können. Zum Konfigurieren Ihrer Time Capsule-Basisstation mit einem Macintosh-Computer benötigen Sie Folgendes:  Einen Macintosh-Computer mit einer installierten AirPort- oder AirPort Extreme-Karte für die drahtlose Konfiguration oder einen Macintosh-Computer, der für die Konfiguration via Ethernet über ein Ethernetkabel mit der Time Capsule-Basisstation verbunden ist  Mac OS X 10.4 (oder neuer)  AirPort-Dienstprogramm 5.4 (oder neuer) Zum Konfigurieren der Time Capsule-Basisstation mit einem Windows-PC benötigen Sie Folgendes:  Einen Windows-PC mit einer Prozessorgeschwindigkeit von mindestens 300 MHz und einer kompatiblen 802.11a-, 802.11b- oder 802.11g-Karte für die drahtlose Kommunikation oder einer Karte für die drahtlose Kommunikation, die mit einer Entwurfsversion des Standards IEEE 802.11n konform ist  Windows XP Home oder Professional (mit installiertem Service Pack 2) oder Windows VistaKapitel 1 Einführung 11  AirPort-Dienstprogramm 5.4 (oder neuer) Anschließen der Time Capsule-Basisstation an das Stromnetz Bevor Sie Ihre Time Capsule-Basisstation an das Stromnetz anschließen, verbinden Sie zuerst die jeweiligen Kabel mit den Anschlüssen, die Sie verwenden wollen:  Verbinden Sie das an Ihr DSL- oder Kabelmodem angeschlossene Ethernetkabel (sofern Sie auf das Internet zugreifen werden) mit dem Ethernet-WAN-Anschluss (<).  Verbinden Sie ein USB-Kabel mit dem USB-Anschluss (d) der Time Capsule-Basisstation und einem kompatiblen USB-Drucker (sofern Sie über einen USB-Drucker drucken werden), einer Festplatte oder einem Hub.  Verbinden Sie ein Ethernetkabel mit einem Ethernetgerät und den Ethernet-LANAnschlüssen (G). Nachdem Sie die Kabel für alle vorgesehenen Geräte angeschlossen haben, verbinden Sie das Netzkabel mit dem Netzanschluss der Time Capsule-Basisstation und dann die Basisstation mit dem Stromnetz. Ein Ein-/Ausschalter ist nicht vorhanden. Wichtig: Verwenden Sie nur das mit der Time Capsule-Basisstation gelieferte Netzkabel. Nachdem Sie die Time Capsule-Basisstation mit dem Stromnetz verbunden haben, blinkt die Statusanzeige eine Sekunde lang grün und leuchtet dann während des Startvorgangs gelb. Nach Abschluss des Startvorgangs blinkt die Statusanzeige gelb, bis die Time Capsule-Basisstation mit den korrekten Einstellungen aktualisiert wurde. Nachdem die Time Capsule-Basisstation korrekt konfiguriert und mit dem Internet bzw. einem Netzwerk verbunden ist, leuchtet die Statusanzeige grün. Wenn Sie Ethernetkabel mit den Ethernetanschlüssen verbinden, leuchten die Statusanzeigen über den Anschlüssen permanent grün.12 Kapitel 1 Einführung Die Statusanzeigen der Time Capsule-Basisstation In der folgenden Tabelle werden die Modi der Statusanzeigen der Time CapsuleBasisstation und deren Bedeutung erläutert. Anzeige Status/Beschreibung Aus Die Time Capsule-Basisstation ist nicht am Stromnetz angeschlossen. Leuchtet gelb Die Time Capsule-Basisstation beendet gerade den Startvorgang. Blinkt gelb Die Time Capsule-Basisstation kann keine Verbindung zum Netzwerk oder dem Internet herstellen oder hat ein Problem festgestellt. Vergewissern Sie sich, dass Sie das AirPort-Dienstprogramm installiert haben. Stellen Sie mithilfe des Dienstprogramms die Ursache für das Blinken der gelben Statusanzeige fest. Vgl. „Die Statusanzeige der Time Capsule-Basisstation blinkt gelb“ auf Seite 32. Leuchtet grün Ihre Time Capsule-Basisstation ist eingeschaltet und funktioniert ordnungsgemäß. Wenn Sie „Aufblinken bei Aktivität“ aus dem Einblendmenü „Statusanzeige“ im Bereich „Basisstation“ der AirPort-Einstellungen im AirPort-Dienstprogramm auswählen, blinkt die Statusanzeige ggf. grün, um normale Aktivität anzuzeigen. Blinkt gelb und grün Beim Starten ist möglicherweise ein Problem aufgetreten. Die Time Capsule-Basisstation wird neu gestartet. Leuchtet blau Die Time Capsule-Basisstation ist bereit, einem drahtlosen ClientComputer den Zugriff auf das Netzwerk zu ermöglichen (vgl. „Ermöglichen des Netzwerkzugriffs durch drahtlose Clients ohne Eingabe eines Kennworts“ auf Seite 25).Kapitel 1 Einführung 13 Nächste Schritte Nachdem Sie die Time Capsule-Basisstation angeschlossen haben, konfigurieren Sie sie mithilfe des AirPort-Dienstprogramms für Ihre Internetverbindung, den USB-Drucker oder die USB-Festplatte oder für ein vorhandenes Netzwerk. Das AirPort-Dienstprogramm befindet sich auf einem Computer mit Mac OS X im Ordner „Dienstprogramme“ innerhalb des Ordner „Programme“. Auf einem Computer mit Windows XP oder Windows Vista finden Sie das Dienstprogramm unter „Start“ > „Programme“ > „AirPort“.2 15 2 Konfigurieren Ihrer Time CapsuleBasisstation Dieses Kapitel enthält Informationen und Anleitungen dazu, wie Sie Ihre Time Capsule-Basisstation mit dem Internet verbinden und mit dem AirPort-Dienstprogramm konfigurieren, um ein drahtloses Netzwerk zu erstellen oder auf ein solches Netzwerk zuzugreifen. Das vorliegende Kapitel erläutert, wie Sie die Time Capsule mit dem Internet verbinden und den Assistenten des AirPort-Dienstprogramms für die Konfiguration Ihres Netzwerks und anderer Funktionen Ihrer Time Capsule-Basisstation verwenden. Weitere Informationen zu drahtlosen Netzwerken sowie zu den erweiterten Funktionen des AirPort-Dienstprogramms finden Sie im Dokument „Konzipieren von AirPort-Netzwerken – Verwenden des AirPort-Dienstprogramms (Mac OS X 10.5 + Windows)“, das auf folgender Webseite verfügbar ist: www.apple.com/de/support/airport. Nachdem Sie das AirPort-Dienstprogramm von der mit der Time Capsule-Basisstation gelieferten CD installiert haben, können Sie einen Großteil Ihrer Netzwerkkonfigurationsaufgaben mithilfe des Assistenten des AirPort-Dienstprogramms ausführen. Zum Festlegen erweiterter Optionen wählen Sie „Manuelle Konfiguration“ aus dem Menü „Basisstation“ des AirPort-Dienstprogramms aus (vgl. „Festlegen erweiterter Optionen“ auf Seite 24).16 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation Verwenden der Time Capsule-Basisstation zum Erstellen eines drahtlosen Netzwerks Wenn Sie Time Capsule für den Netzwerk- und Internetzugang einrichten, können die folgenden Computer und Geräte auf das drahtlose AirPort-Netzwerk zugreifen, um Dateien bereitzustellen, Computerspiele zu spielen und Internetprogramme wie Webbrowser und E-Mail-Programme zu verwenden:  Macintosh-Computer mit AirPort- oder AirPort Extreme-Karten  Computer, die mit den Standards 802.11a, 802.11b und 802.11g sowie der Entwurfsversion des IEEE 802.11n-Standards konform sind  Andere Wi-Fi-Geräte Die via Ethernet mit der Time Capsule-Basisstation verbundenen Computer können ebenfalls auf das Netzwerk zugreifen, um Dateien gemeinsam zu nutzen und eine Verbindung zum Internet herzustellen. Mit Mac OS X 10.5.2 (oder neuer) können Sie Time Machine so konfigurieren, dass auf der Time Capsule-Basisstation eine Datensicherung aller Computer im Netzwerk erstellt wird. Weitere Informationen hierzu finden Sie im Abschnitt „Verwenden von Time Machine mit Ihrer Time Capsule-Basisstation“ auf Seite 27. Wenn Sie einen kompatiblen USB-Drucker an Ihre Time Capsule-Basisstation anschlie- ßen, können unterstützte Computer im Netzwerk (drahtlos oder per Kabel verbunden) auf diesen Drucker zugreifen.Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 17 Verwenden der Time Capsule-Basisstation zum Erstellen eines drahtlosen Netzwerks Gehen Sie wie folgt vor, um das drahtlose Netzwerk zu konfigurieren: 1 Schließen Sie Ihr DSL- oder Kabelmodem an Ihre Time Capsule-Basisstation an. Verwenden Sie hierzu den Ethernet-WAN-Anschluss (<). zum Internet DSL- oder Kabelmodem < Internet-WAN-Anschluss Gemeinsam genutzter Drucker Time Capsule zu USB-Anschlüssen 2,4 oder 5 GHz 2,4 GHz 2,4 oder 5 GHz18 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 2 Wenn Sie einen USB-Drucker im Netzwerk freigeben möchten, verbinden Sie ihn über ein USB-Kabel mit dem Time Capsule-USB-Anschluss (d) oder mit einem USB-Hub. 3 Öffnen Sie das AirPort-Dienstprogramm (im Ordner Dienstprogramme“ innerhalb des Ordners „Programme“ auf einem Computer mit Mac OS X und unter „Start“ > „Programme“ > „AirPort“ auf einem Computer mit Windows), wählen Sie die Time CapsuleBasisstation aus und klicken Sie dann auf „Fortfahren“. 4 Befolgen Sie die auf dem Bildschirm angezeigten Anweisungen zum Erstellen eines neuen Netzwerks. Gehen Sie wie folgt vor, um von einem Computer mit Mac OS X 10.5 zu drucken: 1 Wählen Sie „Apple“ > „Systemeinstellungen“ und klicken Sie dann auf „Drucken & Faxen“. 2 Klicken Sie auf „Hinzufügen“ (+) und wählen Sie Ihren Drucker aus der Liste aus. 3 Klicken Sie auf die Taste „Hinzufügen“. Wird Ihr Drucker nicht in der Liste aufgeführt, suchen Sie mithilfe der Symbole in der Symbolleiste danach. Gehen Sie wie folgt vor, um von einem Computer mit Mac OS X 10.3 oder 10.4 zu drucken: 1 Öffnen Sie das Drucker-Dienstprogramm (im Ordner „Dienstprogramme“ innerhalb des Ordners „Programme“). 2 Wählen Sie den Drucker aus der Liste aus. Wenn der Drucker nicht in der Liste enthalten ist, klicken Sie auf „Hinzufügen“ und wählen Sie „Bonjour“ aus dem Einblendmenü aus. Wählen Sie anschließend den Drucker aus der Liste aus.Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 19 Gehen Sie wie folgt vor, um von einem Computer mit Windows XP oder Windows Vista zu drucken: 1 Installieren Sie das Programm „Bonjour für Windows“, das sich auf der mit der Time Capsule-Basisstation gelieferten CD befindet. 2 Befolgen Sie die Anweisungen auf dem Bildschirm, um Ihren Drucker anzuschließen. AirPort-fähige Computer oder Computer, die mit anderen Karten oder Adaptern für die drahtlose Kommunikation ausgestattet sind, können über Time Capsule die Verbindung zum Internet herstellen. Die mit den Time Capsule-Ethernetanschlüssen verbundenen Computer können ebenfalls auf das Netzwerk und das Internet zugreifen. Drahtlose Computer und mit den Ethernetanschlüssen verbundene Computer können über Time Capsule auch untereinander kommunizieren. Verwenden des AirPort-Dienstprogramms Verwenden Sie den Assistenten des AirPort-Dienstprogramms, um Ihre Time CapsuleBasisstation zu konfigurieren. Das AirPort-Dienstprogramm wird auf Ihrem Computer installiert, wenn Sie die Software von der Time Capsule-CD installieren. Macintosh-Computer mit Mac OS X 10.4 oder neuer: 1 Öffnen Sie das AirPort-Dienstprogramm (im Ordner „Dienstprogramme“ innerhalb des Ordners „Programme“). 2 Wählen Sie Ihre Time Capsule-Basisstation aus und klicken Sie auf „Fortfahren“. Wird die Time Capsule nicht angezeigt, die Sie konfigurieren wollen, klicken Sie auf „Erneut suchen“, um nach verfügbaren drahtlosen Geräten zu suchen. Wählen Sie dann die gewünschte Basisstation aus der Liste aus.20 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 3 Befolgen Sie die angezeigten Anleitungen, um Ihre Time Capsule-Basisstation und Ihr drahtloses Netzwerk zu konfigurieren. Computer mit Windows XP (mit Service Pack 2) oder Windows Vista: 1 Öffnen Sie das AirPort-Dienstprogramm, das sich unter „Start“ > „Programme“ > „AirPort“ befindet. 2 Wählen Sie Ihre Time Capsule-Basisstation aus und klicken Sie auf „Fortfahren“. 3 Befolgen Sie die angezeigten Anleitungen, um Ihre Time Capsule-Basisstation und Ihr drahtloses Netzwerk zu konfigurieren. Beantworten Sie anschließend die Fragen des Assistenten des AirPort-Dienstprogramms zur Art des Netzwerks, das Sie verwenden möchten, und zu den Diensten, die konfiguriert werden sollen. Der Assistent unterstützt Sie auch bei der Eingabe der passenden Einstellungen.Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 21 Wenn Sie mit Time Capsule auf das Internet zugreifen, müssen Sie bei einem Internetanbieter für einen Breitband-Account (DSL- oder Kabelmodem) registriert sein oder eine Verbindung zum Internet über ein vorhandenes Ethernetnetzwerk besitzen. Wenn Sie von Ihrem Internetanbieter zusätzliche Informationen erhalten haben (zum Beispiel eine statische IP-Adresse oder eine DHCP-Client-ID), müssen Sie diese Informationen möglicherweise im AirPort-Dienstprogramm eingeben. Legen Sie diese Informationen bereit, bevor Sie mit der Konfiguration von Time Capsule beginnen. Einrichten eines neuen drahtlosen Netzwerks Sie können den Assistenten des AirPort-Dienstprogramms auch zum Erstellen eines neuen drahtlosen Netzwerks verwenden. Der Assistent führt Sie durch die Schritte, die zum Benennen Ihres Netzwerks, zum Schützen Ihres Netzwerks durch ein Kennwort und zum Festlegen anderer Optionen erforderlich sind. Gehen Sie wie folgt vor, wenn Sie einen USB-Drucker oder eine USB-Festplatte in Ihrem Netzwerk gemeinsam nutzen möchten: 1 Schließen Sie den Drucker oder die Festplatte an den USB-Anschluss (d) der Time Capsule-Basisstation an. 2 Öffnen Sie das AirPort-Dienstprogramm, das sich auf einem Macintosh-Computer im Ordner „Dienstprogramme“ innerhalb des Ordners „Programme“ oder auf einem Computer mit Windows XP unter „Start“ > „Programme“ > „AirPort“ befindet. 3 Wählen Sie Ihre Time Capsule-Basisstation aus und klicken Sie auf „Fortfahren“. Wird die Time Capsule nicht angezeigt, die Sie konfigurieren wollen, klicken Sie auf „Erneut suchen“, um nach verfügbaren drahtlosen Geräten zu suchen. Wählen Sie dann die gewünschte Basisstation aus der Liste aus.22 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 4 Befolgen Sie die auf dem Bildschirm angezeigten Anweisungen zum Erstellen eines neuen Netzwerks. Konfigurieren und Freigeben des Internetzugangs Wenn Sie Ihren Internetzugang mit anderen für die drahtlose Kommunikation ausgelegten Computern im Netzwerk oder mit Computern, die mit den Ethernetanschlüssen verbunden sind, gemeinsam nutzen möchten, müssen Sie die Time Capsule als AirPortBasisstation einrichten. Nach der Konfiguration Ihrer Time Capsule können Computer über das AirPort-Netzwerk auf das Internet zugreifen. Die Time Capsule-Basisstation stellt die Verbindung zum Internet her und verteilt Informationen an die Computer. Schließen Sie Ihr DSL- oder Kabelmodem an den Ethernet-WAN-Anschluss (<) der Time Capsule-Basisstation an, bevor Sie das AirPort-Dienstprogramm zum Konfigurieren Ihrer Basisstation verwenden. Wird die Time Capsule-Basisstation an ein Ethernetnetzwerk mit Internetzugriff angeschlossen, empfiehlt es sich, die Internetverbindung via Ethernet bereitzustellen. Verwenden Sie den Assistenten des AirPort-Dienstprogramms, um die Einstellungen Ihres Internetanbieters einzugeben und zu konfigurieren, wie Time Capsule die Einstellungen für andere Computer bereitstellt. 1 Öffnen Sie das AirPort-Dienstprogramm, das sich auf einem Computer mit Mac OS X im Ordner „Dienstprogramme“ innerhalb des Ordner „Programme“ befindet. Auf einem Computer mit Windows XP oder Windows Vista finden Sie das Dienstprogramm unter „Start“ > „Programme“ > „AirPort“.Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 23 2 Wählen Sie Ihre Time Capsule-Basisstation aus und klicken Sie auf „Fortfahren“. Wenn Sie Änderungen an einer Time Capsule-Basisstation vornehmen, die bereits konfiguriert wurde, müssen Sie ggf. eine Verbindung zum vorhandenen Netzwerk herstellen, bevor Sie Einstellungen der Time Capsule-Basisstation ändern. Verwenden Sie auf einem Macintosh das AirPort-Symbol in der Menüleiste, um das drahtlose Netzwerk auszuwählen, das Sie ändern möchten. Bewegen Sie auf einem Computer mit Windows XP den Mauszeiger auf das Symbol für die drahtlose Verbindung und warten Sie, bis der Name des AirPort-Netzwerks (SSID) angezeigt wird. Wählen Sie anschließend dieses Netzwerk aus der Liste aus, wenn mehrere Netzwerke verfügbar sind. 3 Befolgen Sie die Anweisungen auf dem Bildschirm, um Ihre Time Capsule-Basisstation zu konfigurieren und den Internetzugang freizugeben. Mit dem AirPort-Dienstprogramm können Sie Ihre Time Capsule-Basisstation und Ihr Netzwerk schnell und einfach konfigurieren. Wenn Sie weitere Optionen wie eine Zugriffsbeschränkung für Ihr Netzwerk festlegen oder erweiterte DHCP-Optionen einstellen wollen, wählen Sie „Manuelle Konfiguration“ aus dem Menü „Basisstation“ des AirPort-Dienstprogramms aus. 24 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation Festlegen erweiterter Optionen Konfigurieren Sie Ihre Time Capsule-Basisstation mit dem AirPort-Dienstprogramm manuell, wenn Sie erweiterte Time Capsule-Optionen wie zusätzliche Sicherheitsoptionen, geschlossene Netzwerke, DHCP-Lease-Dauer, Zugriffssteuerung, Signalstärke, Benutzer-Accounts und mehr festlegen möchten. Gehen Sie wie folgt vor, um erweiterte Optionen festzulegen: 1 Öffnen Sie das AirPort-Dienstprogramm, das sich auf einem Macintosh-Computer im Ordner „Dienstprogramme“ innerhalb des Ordners „Programme“ oder auf einem Computer mit Windows XP unter „Start“ > „Programme“ > „AirPort“ befindet. 2 Sind in der Liste mehrere drahtlose Geräte enthalten, wählen Sie das Gerät aus, das Sie konfigurieren möchten. Wird die Time Capsule nicht angezeigt, die Sie konfigurieren wollen, klicken Sie auf „Erneut suchen“, um nach verfügbaren drahtlosen Geräten zu suchen. Wählen Sie dann die gewünschte Basisstation aus der Liste aus. Wenn Sie Änderungen an einer Time Capsule-Basisstation vornehmen, die bereits konfiguriert wurde, müssen Sie ggf. eine Verbindung zum vorhandenen Netzwerk herstellen, bevor Sie Einstellungen der Time Capsule-Basisstation ändern. Verwenden Sie auf einem Macintosh das AirPort-Symbol in der Menüleiste, um das drahtlose Netzwerk auszuwählen, das Sie ändern möchten. Bewegen Sie auf einem Computer mit Windows XP den Mauszeiger auf das Symbol für die drahtlose Verbindung und warten Sie, bis der Name des AirPort-Netzwerks (SSID) angezeigt wird. Wählen Sie anschließend dieses Netzwerk aus der Liste aus, wenn mehrere Netzwerke verfügbar sind.Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 25 3 Wählen Sie „Manuelle Konfiguration“ aus dem Menü „Basisstation“ aus. Werden Sie zur Eingabe eines Kennworts aufgefordert, geben Sie dieses ein. Weitere Informationen zu den Funktionen für die manuelle Konfiguration im AirPortDienstprogramm finden Sie im Dokument „Konzipieren von AirPort-Netzwerken – Verwenden des AirPort-Dienstprogramms (Mac OS X 10.5 + Windows)“ auf folgender Webseite: www.apple.com/de/support/airport. Ermöglichen des Netzwerkzugriffs durch drahtlose Clients ohne Eingabe eines Kennworts Wenn das Netzwerk mit einem WPA Personal- oder WPA/WPA2 Personal-Kennwort geschützt ist, können Sie Clients den drahtlosen Zugriff auf Ihr Netzwerk erlauben, ohne dass das Netzwerkkennwort eingegeben werden muss. Wenn Sie einem Client den Zugriff auf Ihr Netzwerk erlauben, werden Name und MACAdresse für die drahtlose Kommunikation (oder AirPort-ID) des Clients in der Zugriffsliste im AirPort-Dienstprogramm gespeichert, bis Sie den Client wieder aus der Liste entfernen. Sie können auch eine 24-Stunden-Zugriffsberechtigung festlegen, sodass der Client nach Ablauf dieser Zeit nicht mehr auf das Netzwerk zugreifen kann. Wenn Sie den Zugriff auf Ihr drahtloses Netzwerk freigeben, muss der Client kein Netzwerkkennwort eingeben.26 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation Gehen Sie wie folgt vor, um einem Client Zugriff auf Ihr Netzwerk ohne Eingabe eines Netzwerkkennworts zu erlauben: 1 Öffnen Sie das AirPort-Dienstprogramm, wählen Sie Ihre Time Capsule-Basisstation aus und wählen Sie dann „Manuelle Konfiguration“ aus dem Menü „Basisstation“ aus. Geben Sie bei Bedarf das Kennwort ein. 2 Wählen Sie „Drahtlose Clients hinzufügen“ aus dem Menü „Basisstation“ aus. 3 Legen Sie fest, auf welche Weise die Clients auf das Netzwerk zugreifen dürfen:  Wählen Sie „PIN“, damit eine vorgegebene achtstellige Nummer vor dem ClientZugriff eingegeben werden muss.  Wählen Sie „Erster Versuch“, damit der erste Client, der versucht, auf das Netzwerk zuzugreifen, die Netzwerkverbindung herstellen kann. Während die Time Capsule darauf wartet, dass der Client die Verbindung zum Netzwerk herstellt, leuchtet die Statusanzeige blau. Wählen Sie „Zugriff für Client auf 24 Stunden beschränken“, wenn Sie Ihr Netzwerk nur einen Tag lang für den Zugriff durch andere freigeben wollen. Wird diese Option nicht ausgewählt, kann der Client so lange auf das Netzwerk zugreifen, bis Sie ihn aus der Zugriffsliste entfernen.Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation 27 Verwenden von Time Machine mit Ihrer Time CapsuleBasisstation Mit Time Machine von Mac OS X Leopard können Sie Sicherungskopien aller Daten auf Ihrem Computer anlegen, u. a. von Fotos, Musik, Filmen und Dokumenten. Nachdem Sie Time Machine konfiguriert haben, wird in regelmäßigen Abständen automatisch eine Datensicherung Ihres Computers ausgeführt. Wenn Sie Mac OS X 10.5.2 (oder neuer) verwenden, werden Sie beim ersten Verbindungsaufbau zur Time Capsule-Basisstation von Time Machine gefragt, ob Sie die Basisstation als Speicherort für Ihre Sicherungskopien verwenden möchten. Klicken Sie auf „Als Backup-Volume verwenden“. Time Machine übernimmt dann alle weiteren Schritte für Sie. Verwenden Sie die Systemeinstellung „Time Machine“ von Mac OS X Leopard, um automatische Datensicherungen festzulegen, ein anderes Sicherungsvolume auszuwählen oder sonstige Einstellungen anzupassen. Gehen Sie wie folgt vor, um Time Machine auf einem Computer mit Mac OS X Leopard zu konfigurieren oder anzupassen: 1 Wählen Sie „Apple“ > „Systemeinstellungen“ und klicken Sie dann auf „Time Machine“. 2 Stellen Sie den Schalter auf „Ein“. 3 Klicken Sie auf „Volume wechseln“. 4 Wählen Sie Ihre Time Capsule-Basisstation aus und klicken Sie auf „Für Backup verwenden“.28 Kapitel 2 Konfigurieren Ihrer Time Capsule-Basisstation Abhängig davon, wie viele Daten Sie sichern wollen, kann die erste Datensicherung mit Time Capsule und Time Machine relativ lange dauern, etwa über Nacht oder sogar länger. Zum Beschleunigen der ersten Datensicherung verbinden Sie die Time Capsule über Ethernet mit Ihrem Computer. Bei allen folgenden Datensicherungen sichert Time Machine nur die Dateien, die sich seit der letzten Sicherung geändert haben. Daher dauern die folgenden Sicherung auch nicht mehr so lange. Die Time Capsule ist eine hervorragende Sicherungslösung für Mobilcomputer. Da die erste Datensicherung relativ lange dauern kann, sollten Sie das Netzteil an Ihren Mobilcomputer anschließen. Hierdurch wird Batteriestrom eingespart und zudem ist sichergestellt, dass die Datensicherung nicht unterbrochen wird. Ferner empfiehlt es sich, den Mobilcomputer im selben Raum wie die Time Capsule zu platzieren, um eine optimale drahtlose Kommunikation zu gewährleisten. Wenn Sie Ihren Mac während einer Datensicherung ausschalten oder den Ruhezustand aktivieren, stoppt Time Machine die Sicherung und setzt sie nach dem Einschalten des Mac oder Beenden des Ruhezustands an der Stelle fort, an der sie unterbrochen wurde. Weitere Informationen zu Time Machine erhalten Sie, indem Sie auf einem Computer mit Mac OS X Leopard „Hilfe“ > „Mac-Hilfe“ aus dem Menü „Finder“ auswählen und dann den Begriff „Time Machine“ in das Suchfeld eingeben.3 29 3 Tipps zur Fehlerbeseitigung Anhand der Tipps in diesem Kapitel können Sie die meisten Probleme mit Ihrer Time Capsule-Basisstation schnell beheben. Sie können keine Verbindung zum Internet herstellen  Versuchen Sie, von Ihrem Computer direkt eine Verbindung zum Internet herzustellen. Ist dies nicht möglich, überprüfen Sie, ob Ihre Netzwerkeinstellungen korrekt sind. Wenn die Netzwerkeinstellungen Ihrer Meinung nach korrekt sind und dennoch keine Verbindung aufgebaut wird, wenden Sie sich an Ihren Internetanbieter (ISP).  Vergewissern Sie sich, dass Sie die Verbindung zum korrekten Netzwerk herstellen. Sie haben Ihr Netzwerk- oder Time Capsule-Kennwort vergessen Sie können das Kennwort für das AirPort-Netzwerk oder für die Time CapsuleBasisstation löschen, indem Sie die Time Capsule-Basisstation zurücksetzen. Gehen Sie wie folgt vor, um das Time Capsule-Kennwort zurückzusetzen: 1 Drücken Sie mit einem spitzen Gegenstand (etwa einem Kugelschreiber) auf die Reset-Taste und halten Sie die Taste ca. eine (1) Sekunde gedrückt. Wichtig: Wenn Sie die Reset-Taste länger als eine Sekunde gedrückt halten, gehen Ihre Netzwerkeinstellungen möglicherweise verloren.30 Kapitel 3 Tipps zur Fehlerbeseitigung 2 Wählen Sie Ihr AirPort-Netzwerk aus.  Verwenden Sie auf einem Macintosh-Computer das AirPort-Symbol in der Menüleiste, um das von Time Capsule eingerichtete Netzwerk auszuwählen. (Der Netzwerkname ändert sich nicht.)  Bewegen Sie auf einem Computer mit Windows XP den Mauszeiger auf das Symbol für die drahtlose Verbindung und warten Sie, bis der Name des AirPort-Netzwerks (SSID) angezeigt wird. Wählen Sie diesen aus der Liste aus, wenn mehrere Netzwerke verfügbar sind. 3 Öffnen Sie das AirPort-Dienstprogramm (das auf einem Macintosh-Computer im Ordner „Dienstprogramme“ innerhalb des Ordners „Programme“ oder auf einem Computer mit Windows XP unter „Start“ > „Programme“ > „AirPort“ befindet). 4 Wählen Sie Ihre Time Capsule-Basisstation aus und wählen Sie dann „Manuelle Konfiguration“ aus dem Menü „Basisstation“ aus. 5 Klicken Sie in der Symbolleiste auf „AirPort“ und klicken Sie dann auf „Basisstation“. 6 Geben Sie ein neues Kennwort für Ihre Time Capsule-Basisstation ein. 7 Klicken Sie auf „Drahtlos“ und wählen Sie eine Verschlüsselungsmethode aus dem Einblendmenü „Schutz“ aus, um die Verschlüsselung und den Kennwortschutz für Ihr AirPort-Netzwerk zu aktivieren. Wenn Sie die Verschlüsselung aktiviert haben, geben Sie ein neues Kennwort für Ihr AirPort-Netzwerk ein. 8 Klicken Sie auf „Aktualisieren“, um die Time Capsule-Basisstation neu zu starten und die neuen Einstellungen zu laden.Kapitel 3 Tipps zur Fehlerbeseitigung 31 Ihre Time Capsule-Basisstation reagiert nicht Trennen Sie die Basisstation vom Stromnetz und schließen Sie sie dann wieder an das Stromnetz an. Wenn Ihre Time Capsule-Basisstation gar nicht mehr reagiert, müssen Sie sie möglicherweise auf die Werkseinstellungen zurücksetzen. Wichtig: Durch das Zurücksetzen Ihrer Time Capsule, werden alle aktuellen Einstellungen gelöscht und die Originaleinstellungen der Time Capsule-Basisstation wiederhergestellt. Gehen Sie wie folgt vor, um die Werkseinstellungen der Time Capsule-Basisstation wiederherzustellen: m Drücken Sie mit einem spitzen Gegenstand (etwa einem Kugelschreiber) auf die ResetTaste und halten Sie die Taste gedrückt, bis die Statusanzeige rasch hintereinander blinkt (etwa 5 Sekunden). Ihre Time Capsule-Basisstation wird auf die folgenden Einstellungen zurückgesetzt:  Die Time Capsule-Basisstation empfängt die IP-Adresse über DHCP.  Der Netzwerkname wird auf „Apple Network XXXXXX“ zurückgesetzt (wobei XXXXXX durch die letzten sechs Stellen der AirPort-ID ersetzt wird).  Das Time Capsule-Kennwort wird auf public zurückgesetzt. Reagiert die Time Capsule-Basisstation auch weiterhin nicht, versuchen Sie Folgendes: 1 Trennen Sie die Time Capsule-Basisstation vom Stromnetz. 2 Drücken Sie mit einem spitzen Gegenstand auf die Reset-Taste und halten Sie die Taste gedrückt, während Sie die Time Capsule-Basisstation mit dem Stromnetz verbinden.32 Kapitel 3 Tipps zur Fehlerbeseitigung Die Statusanzeige der Time Capsule-Basisstation blinkt gelb Möglicherweise ist das Ethernetkabel nicht korrekt angeschlossen, die Time CapsuleBasisstation befindet sich nicht in Reichweite eines AirPort-Netzwerks oder es besteht ein Problem bei Ihrem Internetanbieter. Wenn Sie über ein DSL- oder Kabelmodem mit dem Internet verbunden sind, wurde die Verbindung des Modems mit dem Netzwerk oder dem Internet möglicherweise unterbrochen. Trennen Sie das Modem vom Stromnetz, auch wenn es korrekt zu arbeiten scheint. Warten Sie einige Sekunden und schlie- ßen Sie es dann erneut an. Vergewissern Sie sich, dass die Time Capsule-Basisstation via Ethernet direkt mit dem Modem verbunden ist, bevor Sie die Stromversorgung des Modems wiederherstellen. Weitere Informationen zu den Gründen für das Blinken der Statusanzeige erhalten Sie, indem Sie das AirPort-Dienstprogramm öffnen, Ihre Time Capsule-Basisstation auswählen und dann „Manuelle Konfiguration“ aus dem Menü „Basisstation“ auswählen. Klicken Sie auf „Basisstation-Status“, um Informationen über die blinkende Statusanzeige einzublenden. Sie können auch die Option „Basisstation überwachen – Probleme melden“ in den AirPort-Einstellungen auswählen. Tritt an der Basisstation ein Problem auf, wird das AirPort-Dienstprogramm geöffnet und zeigt ausführliche Anleitungen zur Fehlerbeseitigung an.Kapitel 3 Tipps zur Fehlerbeseitigung 33 Ihr Drucker reagiert nicht Wenn Sie einen Drucker an den USB-Anschluss der Time Capsule-Basisstation angeschlossen haben und die Computer im AirPort-Netzwerk nicht drucken können, versuchen Sie, das Problem wie folgt zu beheben: 1 Vergewissern Sie sich, dass der Drucker am Stromnetz angeschlossen und eingeschaltet ist. 2 Vergewissern Sie sich, dass die Kabel korrekt am Drucker und am USB-Anschluss der Time Capsule-Basisstation angeschlossen sind. 3 Vergewissern Sie sich, dass der Drucker im Wartelistenfenster auf den ClientComputern ausgewählt ist. Macintosh-Computer mit Mac OS X 10.5 oder neuer:  Wählen Sie „Apple“ > „Systemeinstellungen“ und klicken Sie dann auf „Drucken & Faxen“.  Klicken Sie auf „Hinzufügen“ (+) und wählen Sie Ihren Drucker aus der Liste aus. Klicken Sie dann auf die Taste „Hinzufügen“. Macintosh-Computer mit Mac OS X 10.2.7 oder neuer:  Öffnen Sie das Drucker-Dienstprogramm (im Ordner „Dienstprogramme“ innerhalb des Ordners „Programme“).  Klicken Sie auf „Hinzufügen“, wenn der Drucker nicht in der Liste angezeigt wird.  Wählen Sie „Bonjour“ aus dem Einblendmenü aus. Wählen Sie den Drucker aus und klicken Sie auf „Hinzufügen“ (+).34 Kapitel 3 Tipps zur Fehlerbeseitigung Computer mit Windows XP:  Wählen Sie „Einstellungen“ > „Drucker und Faxgeräte“ aus dem Menü „Start“.  Wählen Sie den Drucker aus. Ist der Drucker nicht in der Liste enthalten, klicken Sie auf „Drucker hinzufügen“ und folgen Sie den Anweisungen auf dem Bildschirm. 4 Schalten Sie den Drucker aus, warten Sie einige Sekunden und schalten Sie den Drucker dann erneut ein. Aktualisieren der AirPort-Software Die AirPort-Software wird von Apple regelmäßig aktualisiert. Es wird empfohlen, die Time Capsule-Basisstation regelmäßig zu aktualisieren, damit sie immer mit der neusten Software arbeitet. Sie können das Feld „Beim Öffnen des AirPort-Dienstprogramms nach Updates suchen“ oder „Nach Updates suchen“ in den AirPort-Einstellungen markieren. Wenn Sie das Feld „Nach Updates suchen“ markieren, wählen Sie ein Zeitintervall wie „wöchentlich“ aus dem Einblendmenü aus, damit automatisch nach Aktualisierungen gesucht wird.Kapitel 3 Tipps zur Fehlerbeseitigung 35 Überlegungen zur Platzierung der Time Capsule-Basisstation Die folgenden Empfehlungen sollen Ihnen helfen, die maximale Reichweite und eine optimale Netzwerkabdeckung mit Time Capsule zu erreichen.  Platzieren Sie Ihre Time Capsule-Basisstation in einem offenen Bereich, in dem keine Hindernisse wie Möbel oder Wände die Signalübertragung stören können. Das Gerät sollte wenn möglich nicht in der Nähe von Metallflächen platziert werden.  Wenn Sie die Time Capsule-Basisstation hinter Möbelstücken platzieren, halten Sie einen Abstand von mindestens 2,5 cm zwischen der Time Capsule-Basisstation und dem Möbelstück ein.  Vermeiden Sie es, Ihre Time Capsule-Basisstation an einem Standort zu platzieren, der auf drei oder mehr Seiten von Metallflächen umgeben ist.  Wenn Sie die Time Capsule-Basisstation zusammen mit Ihrer Stereoanlage als Multimedia-Center nutzen wollen, achten Sie darauf, dass die Time Capsule-Basisstation nicht von Audio-, Video- oder Netzkabeln umgeben ist. Positionieren Sie Ihre Time Capsule-Basisstation so, dass die Kabel nur auf einer Seite liegen. Halten Sie einen möglichst großen Abstand zwischen der Time Capsule-Basisstation und den Kabeln ein.  Platzieren Sie Ihre Time Capsule-Basisstation wenn möglich mindestens 7,6 Meter entfernt von einem Mikrowellenherd, einem schnurlosen 2,4- oder 5-GHz-Telefon oder anderen Störquellen.  Platzieren Sie oben auf der Time Capsule keine anderen Objekte (Bücher, Papiere, kleine Tiere etc.). Diese können die Kühlung der Time Capsule beeinträchtigen.36 Kapitel 3 Tipps zur Fehlerbeseitigung Mögliche Störquellen, die Interferenzen mit AirPort verursachen können Je weiter eine Interferenzquelle entfernt ist, desto unwahrscheinlicher ist es, dass sie Probleme verursacht. Folgende Komponenten bzw. Vorkommnisse können Störungen mit der AirPort-Kommunikation verursachen:  Mikrowellenherde  DSS- (Direct Satellite Service) Funkfrequenzverlust  Original-Koaxialkabel, das mit bestimmten Typen von Satellitenschüsseln geliefert wird. Erkundigen Sie sich beim Hersteller des Geräts nach neueren Kabeln.  Bestimmte elektrische Komponenten wie Stromleitungen, Leitungen von elektrischen Bahnen und Kraftwerke  Schnurlose Telefone, die im 2,4- oder 5-GHz-Bereich arbeiten. Wenn es zu Problemen mit Ihrer Telefon- oder AirPort-Kommunikation kommt, wechseln Sie den Kanal Ihrer Basisstation bzw. Ihres Time Capsule-Netzwerks oder verwenden Sie einen anderen Kanal für Ihr Telefon.  Nebeneinander platzierte Basisstationen, die benachbarte Kanäle verwenden. Verwendet beispielsweise Basisstation A Kanal 1, so sollte für Basisstation B Kanal 6 oder 11 angegeben werden.4 37 4 Weitere Informationen, Service und Support Im Internet und in der Online-Hilfe finden Sie weitere Informationen zur Verwendung der Time Capsule-Basisstation. Online verfügbare Ressourcen Die neusten Informationen zu Time Capsule finden Sie unter: www.apple.com/de/airport. Wenn Sie die Time Capsule-Basisstation nicht bereits bei der Installation der Software von der Time Capsule-CD registriert haben, besuchen Sie zum Registrieren die folgende Website: www.apple.com/de/register. AirPort-Support-Informationen, Foren mit produktspezifischen Informationen und Feedback sowie die neuste Apple-Software zum Laden finden Sie unter dieser Adresse: www.apple.com/de/support/airport. Wenn Sie allgemeine Support-Informationen wünschen, besuchen Sie die Website www.apple.com/de/support und wählen Sie dann ggf. Ihr Land aus.38 Kapitel 4 Weitere Informationen, Service und Support Online-Hilfe Wenn Sie mehr über die Verwendung des AirPort-Dienstprogramms mit Time Capsule erfahren möchten, öffnen Sie das AirPort-Diensprogramm und wählen Sie „Hilfe“ > „AirPort-Dienstprogramm-Hilfe“. Hinweise zur Garantie Wenn die Time Capsule-Basisstation beschädigt wurde oder nicht ordnungsgemäß funktioniert, beachten Sie bitte zunächst die Tipps und Informationen zur Fehlerbeseitigung in diesem Handbuch, in der Online-Hilfe sowie in den Online-Ressourcen. Funktioniert die Time Capsule-Basisstation auch weiterhin nicht, informieren Sie sich auf der Webseite www.apple.com/de/support über die Inanspruchnahme von Garantieleistungen. Seriennummer Ihrer Time Capsule-Basisstation Die Seriennummer befindet sich auf der Unterseite Ihrer Time Capsule-Basisstation.39 Anhang Time Capsule – Technische Daten und Sicherheitsinformationen Spezifikationen der Time Capsule-Basisstation  Frequenzbereich: 2,4 und 5 GHz  Funkausgangsleistung: bis zu 23 dBm (nominal)  Standards: Der Standard 802.11 DSSS mit 1 und 2 MBit/Sek., die Standards 802.11a, 802.11b, 802.11g und eine Entwurfsversion der 802.11n-Spezifikation Schnittstellen  1 RJ-45 10/100/1000BASE-T Gigabit Ethernet-WAN (<)  3 RJ-45 10/100/1000BASE-T Gigabit Ethernet-LAN (G)  Universal Serial Bus (USB d) 2.0  802.11 a/b/g/n AirPort Extreme-Funktechnologie Umgebungsbedingungen  Betriebstemperatur: 0 °C bis 35 °C  Lagertemperatur: –25 °C bis 60 °C  Relative Luftfeuchtigkeit (Betrieb): 20 % bis 80 %, nicht kondensierend  Relative Luftfeuchtigkeit (Lagerung): 10 % bis 90 %, nicht kondensierend40 Anhang Time Capsule – Technische Daten und Sicherheitsinformationen Abmessungen und Gewicht  Länge: 197,0 mm  Breite: 197,0 mm  Höhe: 36,33 mm  Gewicht: 1,6 Kilogramm Hardware-MAC-Adressen (Media Access Control) Auf der Unterseite des Gehäuses der Time Capsule-Basisstation sind drei Hardwareadressen aufgedruckt:  AirPort-ID: Die zwei Adressen, die zur Identifizierung der Time Capsule-Basisstation in einem drahtlosen Netzwerk verwendet werden.  Ethernet-ID: Diese Adresse wird möglicherweise von Ihrem Internetanbieter benötigt, um den Internetzugang über die Time Capsule-Basisstation herzustellen. Sicherer Umgang mit der Time Capsule-Basisstation  Die einzige Möglichkeit, die Stromzufuhr vollständig zu unterbrechen, besteht darin, die Time Capsule-Basisstation vom Stromnetz zu trennen.  Halten Sie den Stecker stets an den Seiten, wenn Sie die Time Capsule-Basisstation an die Netzsteckdose anschließen bzw. davon trennen. Achten Sie darauf, die Metallstifte des Steckers nicht zu berühren.  Die Time Capsule-Basisstation darf niemals geöffnet werden, auch dann nicht, wenn sie nicht am Stromnetz angeschlossen ist. Wenn Ihre Time Capsule-Basisstation gewartet werden muss, lesen Sie Kapitel 4 „Weitere Informationen, Service und Support“ auf Seite 37. Anhang Time Capsule – Technische Daten und Sicherheitsinformationen 41  Versuchen Sie niemals, einen Stecker mit Gewalt in einen Anschluss zu stecken. Lässt sich der Stecker nicht problemlos anschließen, passt er vermutlich nicht in den Anschluss. Vergewissern Sie sich, dass Stecker und Anschluss übereinstimmen und dass Sie den Stecker korrekt mit dem Anschluss ausgerichtet haben. Hinweise zu Betriebs- und Lagertemperatur  Wenn Ihre Time Capsule-Basisstation in Betrieb ist, wird das Gehäuse warm. Das Time Capsule-Gehäuse fungiert als Wärmeableiter, der die Wärme aus dem Inneren des Geräts nach außen an die kühlere Luft abgibt. Meiden von Feuchtigkeitsquellen  Platzieren Sie die Time Capsule-Basisstation nicht in der Nähe von Getränken, Waschbecken, Badewannen, Duschen und anderen Feuchtigkeitsquellen.  Schützen Sie die Time Capsule-Basisstation vor direkter Sonneneinstrahlung, Nässe, Feuchtigkeit und Witterungseinflüssen aller Art.  Achten Sie darauf, dass keine Flüssigkeiten in Ihre Time Capsule-Basisstation gelangen. Ist dies dennoch einmal der Fall, trennen Sie die das Gerät vom Stromnetz, bevor Sie es reinigen.  Verwenden Sie die Time Capsule-Basisstation nicht im Freien. Die Time CapsuleBasisstation ist zur Verwendung in Innenräumen konzipiert. ACHTUNG: Verwenden Sie Ihre Time Capsule-Basisstation niemals in der Nähe von Feuchtigkeitsquellen, um Kurzschlüsse oder Verletzungen zu vermeiden.42 Anhang Time Capsule – Technische Daten und Sicherheitsinformationen Nehmen Sie Reparaturen nicht selbst vor Hinweise zur Handhabung Ihre Time Capsule-Basisstation kann durch unsachgemäße Handhabung oder Lagerung beschädigt werden. Achten Sie darauf, die Time Capsule-Basisstation beim Transport nicht fallen zu lassen. ACHTUNG: Versuchen Sie nicht, Ihre Time Capsule-Basisstation zu öffnen oder Teile auszubauen. Dies kann einen Kurzschluss verursachen und Sie riskieren den Verlust des Garantieanspruchs. Im Innern des Gerätes befinden sich keine Komponenten, die vom Benutzer gewartet werden können.43 Regulatory Compliance Information Wireless Radio Use This device is restricted to indoor use due to its operation in the 5.15 to 5.25 GHz frequency range to reduce the potential for harmful interference to cochannel Mobile Satellite systems. Cet appareil doit être utilisé à l’intérieur. Exposure to Radio Frequency Energy The radiated output power of this device is well below the FCC and EU radio frequency exposure limits. However, this device should be operated with a minimum distance of at least 20 cm between its antennas and a person’s body and the antennas used with this transmitter must not be colocated or operated in conjunction with any other antenna or transmitter subject to the conditions of the FCC Grant. FCC Declaration of Conformity This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions:(1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. See instructions if interference to radio or television reception is suspected. Radio and Television Interference This computer equipment generates, uses, and can radiate radio-frequency energy. If it is not installed and used properly—that is, in strict accordance with Apple’s instructions—it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in Part 15 of FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. You can determine whether your computer system is causing interference by turning it off. If the interference stops, it was probably caused by the computer or one of the peripheral devices. If your computer system does cause interference to radio or television reception, try to correct the interference by using one or more of the following measures:  Turn the television or radio antenna until the interference stops.  Move the computer to one side or the other of the television or radio.  Move the computer farther away from the television or radio.  Plug the computer into an outlet that is on a different circuit from the television or radio. (That is, make certain the computer and the television or radio are on circuits controlled by different circuit breakers or fuses.) If necessary, consult an Apple Authorized Service Provider or Apple. See the service and support information that came with your Apple product. Or, consult an experienced radio/television technician for additional suggestions. Important: Changes or modifications to this product not authorized by Apple Inc. could void the EMC compliance and negate your authority to operate the product.44 This product was tested for FCC compliance under conditions that included the use of Apple peripheral devices and Apple shielded cables and connectors between system components. It is important that you use Apple peripheral devices and shielded cables and connectors between system components to reduce the possibility of causing interference to radios, television sets, and other electronic devices. You can obtain Apple peripheral devices and the proper shielded cables and connectors through an Apple-authorized dealer. For non-Apple peripheral devices, contact the manufacturer or dealer for assistance. Responsible party (contact for FCC matters only) Apple Inc., Corporate Compliance, 1 Infinite Loop M/S 26-A, Cupertino, CA 95014-2084 Industry Canada Statement This Class B device meets all requirements of the Canadian interference-causing equipment regulations. Cet appareil numérique de la Class B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. VCCI Class B Statement Europe—EU Declaration of Conformity For more information, see www.apple.com/euro/ compliance. Europäische Union – Informationen zur Entsorgung Dieses Symbol weist darauf hin, dass dieses Produkt entsprechend den geltenden gesetzlichen Vorschriften und getrennt vom Hausmüll entsorgt werden muss. Geben Sie dieses Produkt zur Entsorgung bei einer offiziellen Sammelstelle ab. Bei einigen Sammelstellen können Produkte zur Entsorgung unentgeltlich abgegeben werden. Durch getrenntes Sammeln und Recycling werden die Rohstoff-Reserven geschont, und es ist sichergestellt, dass beim Recycling des Produkts alle Bestimmungen zum Schutz von Gesundheit und Umwelt eingehalten werden. Hinweise zur Entsorgung und zum Recycling Dieses Produkt besitzt eine interne Batterie. Bitte entsorgen Sie die Batterie entsprechend den geltenden gesetzlichen und umweltrechtlichen Vorschriften. Informationen über das Recycling-Programm von Apple finden Sie auf der Website: www.apple.com/de/environment. California: The coin cell battery in your product contains perchlorates. Special handling and disposal may apply. Refer to www.dtsc.ca.gov/hazardouswaste/ perchlorate.45 Deutschland: Dieses Gerät enthält Batterien. Bitte nicht in den Hausmüll werfen. Entsorgen Sie dieses Gerät am Ende seines Lebenszyklus den maßgeblichen gesetzlichen Regelungen entsprechend. Nederlands: Gebruikte batterijen kunnen worden ingeleverd bij de chemokar of in een speciale batterijcontainer voor klein chemisch afval (kca) worden gedeponeerd. Taiwan: Singapore Wireless Certification46 Taiwan Warning Statements Korea Warning Statements © 2009 Apple Inc. Alle Rechte vorbehalten. Apple, das Apple-Logo, AirPort, AirPort Express, AirPort Extreme, Apple TV, Bonjour, iPod, Leopard, Macintosh, Mac OS und Time Capsule sind Marken der Apple Inc., die in den USA und weiteren Ländern eingetragen sind. Finder, iPhone und Time Machine sind Marken der Apple Inc. Andere hier genannte Produkt- und Herstellernamen sind Marken ihrer jeweiligen Rechtsinhaber.www.apple.com/airport www.apple.com/support/airport D019-1384-A Mac OS X Server Administration de QuickTime Streaming et Broadcasting Pour Leopard version 10.5K Apple Inc. © 2007 Apple Inc. Tous droits réservés. Le propriétaire ou l’utilisateur autorisé d’une copie valide du logiciel Serveur Enchaînement QuickTime peut reproduire cette publication à des fins d’apprentissage de l’utilisation de ce logiciel. Aucune partie de cette publication ne peut être reproduite ou transmise à des fins commerciales, telles que la vente de copies ou la fourniture de services d’assistance payants. Tous les efforts ont été déployés pour garantir la précision des informations contenues dans ce manuel. Apple, Inc. n’est pas responsable des erreurs d’impression ou de frappe. Le logo Apple est une marque d’Apple Inc. déposée aux États-Unis et dans d’autres pays. L’utilisation de ce logo à des fins commerciales via le clavier (Option + 1) pourra constituer un acte de contrefaçon et/ou de concurrence déloyale. Apple, le logo Apple, AirPort, AppleScript, FireWire, iMac, iMovie, iTunes, Mac, le logo Mac, Macintosh, Mac OS, QuickTime, Xgrid et Xserve sont des marques d’Apple Inc., déposées aux États-Unis et dans d’autres pays. Finder est une marque d’Apple Inc. Adobe et PostScript sont des marques d’Adobe Systems Incorporated. Tous les autres noms de produits sont des marques de leurs propriétaires respectifs. Les produits commercialisés par des entreprises tierces ne sont mentionnés qu’à titre d’information, sans aucune intention de préconisation ni de recommandation. Apple ne se porte pas garant de ces produits et décline toute responsabilité quant à leur fonctionnement. F019-0930/01-09-2007 3 1 Table des matières Préface 7 À propos de ce guide 7 Nouveautés de QTSS (QuickTime Streaming Server) pour Mac OS X Server 10.5 9 La suite de produits QuickTime 9 Contenu de ce guide 10 Utilisation de l’aide à l’écran 11 Guides d’administration de Mac OS X Server 12 Affichage des guides PDF à l’écran 12 Impression de guides PDF 13 Obtention de mises à jour de documentation 13 Obtention d’informations supplémentaires Chapitre 1 15 Vue d’ensemble de QuickTime Streaming 15 Qu’est-ce que la diffusion en continu ? 16 Comparaison entre diffusion en direct et diffusion à la demande 16 Comparaison entre le téléchargement progressif (HTTP) et le téléchargement par enchaînement (RTP/RTSP) 17 Enchaînement Lecture instantanée 17 Configuration simplifiée pour la vidéo en direct 18 Comment recevoir des flux de données multimédias 19 Comparaison entre multidiffusion et monodiffusion 20 Relais Chapitre 2 21 Configuration de votre serveur Enchaînement QuickTime 21 Configurations matérielle et logicielle requises pour l’enchaînement QuickTime 21 Configuration requise pour l’ordinateur de visualisation 21 Configuration requise pour la diffusion en direct 22 Considérations relatives à la bande passante 22 Configuration de votre serveur de diffusion 23 Test de votre configuration 24 Accès aux données multimédia diffusées par votre serveur Chapitre 3 25 Gestion de votre serveur Enchaînement QuickTime 25 Utilisation de l’application basée sur le Web pour gérer l’enchaînement QuickTime 26 Utilisation d’Admin Serveur pour gérer l’enchaînement QuickTime4 Table des matières 26 Démarrage ou arrêt du service de diffusion 26 Modification du nombre maximum de connexions de diffusion 27 Modification du débit de diffusion maximum 27 Changement du répertoire réservé aux flux de données multimédias 27 Association de l’ordinateur d’administration du serveur de diffusion à une adresse IP 28 Hébergement de flux provenant de plusieurs répertoires multimédia utilisateur 28 Configuration de flux de relais 29 Modification des réglages d’historique de diffusion QuickTime 30 Lecture des historiques de diffusion QuickTime 30 Sécurité et accès 31 Diffusion de flux à travers des coupe-feu via le port 80 32 Diffusion à travers des coupe-feu ou des réseaux avec traduction d’adresses 32 Changement du mot de passe requis pour envoyer un flux de diffusion MP3 32 Utilisation de la monodiffusion automatique (Annonce) à l’aide de QTSS sur un ordinateur distinct 33 Tâches de gestion avancées 33 Contrôle de l’accès aux flux de données multimédias 37 Configuration d’un relais multidiffusion Chapitre 4 39 Dépannage et informations techniques 39 Utilisation de fichiers d’historique pour surveiller la diffusion de listes de lecture 39 Les fichiers multimédia ne sont pas diffusés correctement 40 Les utilisateurs ne peuvent pas se connecter à votre diffusion 40 Les utilisateurs reçoivent des messages d’erreur lors de la diffusion de données Chapitre 5 43 Utilisation de QuickTime Broadcaster 43 Quand utiliser un serveur de diffusion 44 Configuration de votre premier flux 44 Configuration de QuickTime Broadcaster 46 Choix d’une méthode de diffusion 46 Sélection des réglages de compression 47 Création de préréglages 47 Qu’est-ce qu’un fichier SDP ? 48 Sélection des réglages réseau 48 Utilisation de la méthode Monodiffusion automatique (Annonce) 49 Utilisation de la méthode Monodiffusion manuelle 49 Utilisation de la méthode Multidiffusion 50 Aperçu de votre diffusion 51 Configuration d’une diffusion audio uniquement 51 Changement de source audio 52 Ajout de notes à votre diffusion 52 Ajout d’indices à un fichier de séquence 53 Enregistrement de réglages à l’aide de préréglagesTable des matières 5 53 Modification de la taille de l’image de diffusion 53 Changement de source vidéo 54 Choix de l’assembleur de paquets 54 Enregistrement de réglages de diffusion 55 Diffusion vers des téléphones portables 55 À propos des coupe-feu 55 Limitation de l’accès à votre diffusion 56 Conseils et dépannage 56 Je suis invité à saisir un mot de passe 56 Utilisation optimisée de la bande passante disponible 56 Conseils pour le choix des réglages de compression vidéo 57 Conseils pour le choix des réglages de compression audio 57 Si la vidéo devient floue, hachée ou figée 58 Automatisation de QuickTime Broadcaster avec AppleScript Chapitre 6 59 Exemple de configuration 59 Enchaînement de présentations, en direct et à la demande 61 Configuration 69 Création d’une page Web pour simplifier l’accès 70 Prise de vue de la présentation en direct 71 Archivage de la présentation en direct Glossaire 73 Index 81 7 Préface À propos de ce guide Découvrez la suite de produits QuickTime ainsi que les nouveautés de cette version de QuickTime Streaming Server. La suite de services de Mac OS X Server 10.5 inclut QuickTime Streaming Server (QTSS). QTSS est préinstallé sur le matériel serveur Apple. En termes de conception et de configuration, QTSS est semblable à Apache, le logiciel serveur Web populaire également inclus avec Mac OS X Server. Si vous êtes expérimenté dans l’utilisation d’Apache, QTSS vous semblera familier. Si vous avez administré un serveur de diffusion QuickTime à l’aide d’Admin Web, une application basée sur le Web, vous pouvez poursuivre de cette manière. Admin Web est utile pour administrer un serveur de diffusion à distance ou depuis des ordinateurs non Macintosh. Pour plus d’informations, consultez la section « Utilisation de l’application basée sur le Web pour gérer l’enchaînement QuickTime » à la page 25. Admin Serveur pour Mac OS X Server inclut des options permettant d’effectuer les opérations que vous réalisiez avec Admin Web. Nouveautés de QTSS (QuickTime Streaming Server) pour Mac OS X Server 10.5 Intégré à Mac OS X Server 10.5, QuickTime Streaming Server 6 est le serveur de diffusion Apple normalisé le plus puissant du marché et dont la diffusion mobile, l’intégration avec Mac OS X Server et la prise en charge des standards ont été améliorées. QTSS 6 offre les améliorations suivantes :  Prise en charge de la norme 3GPP version 6 : QuickTime Streaming Server 6 a été mis à jour pour inclure la prise en charge de la dernière version de la spécification 3GPP (version 6), offrant une meilleure compatibilité avec les appareils mobiles du monde entier.  Adaptation au débit de la norme 3GPP version 6 : QuickTime Streaming Server 6 permet la prise en charge de l’adaptation au débit 3GPP version 6 pour une expé- rience de diffusion en continu plus fluide sur les appareils mobiles, même lors de surcharges de réseau. 8 Préface À propos de ce guide  Prise en charge Open Directory : QuickTime Streaming Server 6 vous permet de limiter l’accès au contenu diffusé en continu aux utilisateurs et groupes enregistrés dans le Gestionnaire de groupe de travail de Mac OS X Server.  Exécution à 64 bits : QuickTime Streaming Server 6 prend en charge l’exécution à 64 bits en natif. Les autres fonctionnalités de QTSS sont les suivantes :  3GPP natif : diffusez des fichiers 3GPP vers tout lecteur compatible avec le format 3GPP.  Diffusion de MPEG-4 natif : diffusez des fichiers MPEG-4 à indices conformes à la norme ISO vers tout lecteur ou périphérique MPEG-4 également conforme à la norme ISO.  Diffusion de fichiers audio MP3 : créez votre station de radio sur Internet. Vous pouvez distribuer des fichiers MP3 standard à l’aide de protocoles compatibles Icecast via HTTP. Créez une liste de lecture de fichiers MP3 et distribuez-les vers des clients MP3 tels qu’iTunes et WinAmp pour une expérience de direct simulé.  Protection contre les coupures : la technologie Apple de protection contre les coupures, un ensemble de fonctionnalités offrant une qualité de service, utilise la bande passante disponible pour garantir la lecture la plus nette possible.  Lecture instantanée : les utilisateurs dotés d’une connexion haut débit et qui visualisent un flux de données vidéo à l’aide de QuickTime 6 ou ultérieur bénéficient de la fonction de lecture instantanée. Cette fonction améliore la mise des données en mémoire tampon en réduisant considérablement la durée de cette opération. La lecture instantanée permet également aux utilisateurs équipés d’une connexion haut débit d’utiliser le curseur de durée pour faire défiler un flux de données à la demande en avant ou en arrière, la lecture étant mise à jour instantanément.  Authentification : l’authentification Digest et Basic, ainsi que l’authentification par les services d’annuaire vous permettent de contrôler l’accès aux données multimé- dia protégées.  Prise en charge de la diffusion de films HD : QTSS est en mesure de diffuser simultanément des milliers de films encodés à 1280 x 720, 24p, 5 mbps à partir d’un seul serveur Xserve.  Prise en charge de la diffusion au format H.264 : QTSS prend en charge la diffusion de contenu en direct et à la demande encodé avec le codec vidéo H.264, fourni avec QuickTime.  QuickTime Broadcaster : inclus dans Mac OS X Server, QuickTime Broadcaster fournit une prise en charge intégrale de la diffusion de contenu au format MPEG-4 sur Internet.  Listes de lecture côté serveur : vous pouvez diffuser un ensemble de fichiers multimédias comme s’il s’agissait d’une diffusion en direct. Cela peut s’avérer idéal pour la création et la gestion d’une station de radio ou de télévision virtuelle.  Prise en charge de relais : vous pouvez facilement configurer plusieurs couches de serveurs afin de diffuser des flux de données vers un nombre quasi illimité de clients.Préface À propos de ce guide 9 La suite de produits QuickTime La suite de produits QuickTime est unique en ce sens qu’elle inclut tous les logiciels dont vous avez besoin pour produire, transmettre et recevoir des flux de données. Chaque produit est entièrement conçu pour une compatibilité maximale avec tous les autres composants de la suite. La suite QuickTime est constituée des produits suivants :  QuickTime Player : l’application gratuite QuickTime Player est simple à utiliser et conçue pour lire, manipuler et visualiser des fichiers vidéo, audio, de réalité virtuelle (VR) ou graphiques compatibles avec QuickTime.  QuickTime Pro : la puissante version pro de QuickTime Player offre de nombreuses fonctions de création multimédia. Vous pouvez capturer des séquences audio et vidéo, créer des diaporamas, coder des séquences vidéo et audio, éditer des pistes de films, créer des pistes d’indices, générer des présentations et regrouper des centaines de types de données multimédias en un seul fichier de film.  QTSS (QuickTime Streaming Server) : inclus avec Mac OS X Server, le logiciel QTSS vous permet de diffuser, via Internet, des données multimédia en temps réel ou à la demande à l’aide des protocoles standard du marché, sans avoir à payer de licence par flux. Les utilisateurs voient les données dès qu’elles parviennent à l’ordinateur ; ils n’ont pas à attendre le téléchargement des fichiers.  Darwin Streaming Server : (DSS) cette version gratuite et open source de QTSS prend en charge des plate-formes d’entreprise courantes telles que Linux, Windows Server 2003 et Solaris. Téléchargeable en code source, elle peut être compilée sur diverses plates-formes en modifiant certains fichiers source spécifiques. Contenu de ce guide Le présent guide contient les chapitres suivants :  Le chapitre 1, « Vue d’ensemble de QuickTime Streaming » décrit les concepts et les termes propres à la diffusion en continu.  Le chapitre 2, « Configuration de votre serveur Enchaînement QuickTime » décrit le matériel et les logiciels requis et fournit des instructions pour configurer et tester votre serveur de diffusion.  Le chapitre 3, « Gestion de votre serveur Enchaînement QuickTime » fournit des instructions pas à pas pour utiliser l’application Admin Serveur en vue d’administrer et de contrôler un serveur de diffusion localement ou à distance.  Le chapitre 4, « Dépannage et informations techniques » décrit les problèmes courants et apporte des informations sur la marche à suivre en cas d’incidents lors de la diffusion de données multimédias.  Le chapitre 5, « Utilisation de QuickTime Broadcaster » fournit des informations sur l’utilisation du logiciel Apple maintes fois récompensé pour la diffusion professionnelle d’événements en direct.10 Préface À propos de ce guide  Le chapitre 6, « Exemple de configuration » fournit des informations sur les composants clés nécessaires à la configuration de la diffusion générique sur le web. De plus, le glossaire propose de brèves définitions des termes utilisés dans QuickTime Streaming et dans ce guide. Remarque : étant donné qu’Apple publie régulièrement de nouvelles versions et mises à jour de ses logiciels, les illustrations de ce document peuvent être différentes de celles qui s’affichent à l’écran. Utilisation de l’aide à l’écran Vous pouvez obtenir des instructions à l’écran concernant chaque tâche dans l’application Visualisation Aide pour gérer Leopard Server. Vous pouvez visualiser l’aide sur un serveur ou sur un ordinateur administrateur. (Un ordinateur administrateur est un ordinateur Mac OS X sur lequel est installé le logiciel d’administration de serveur Leopard Server.) Pour obtenir de l’aide pour une configuration avancée de Leopard Server : m Ouvrez Admin Serveur ou le Gestionnaire de groupe de travail, puis :  Utilisez le menu Aide pour rechercher la tâche que vous voulez exécuter.  Choisissez Aide > Aide Admin Serveur ou Aide > Aide Gestionnaire de groupe de travail pour parcourir et rechercher des rubriques d’aide. L’aide à l’écran contient des instructions extraites de Administration du serveur et d’autres guides d’administration avancée cités dans « Guides d’administration de Mac OS X Server ». Pour consulter les rubriques d’aide du serveur les plus récentes : m Assurez-vous que le serveur ou l’ordinateur serveur est connecté à Internet lorsque vous voulez obtenir de l’aide. Visualisation Aide extrait et met en cache automatiquement les rubriques d’aide les plus récentes concernant le serveur. Lorsque vous n’êtes pas connecté à Internet, Visualisation Aide affiche les rubriques d’aide mises en cache.Préface À propos de ce guide 11 Guides d’administration de Mac OS X Server Premiers contacts couvre l’installation et le paramétrage de configurations standard et de groupes de travail de Mac OS X Server. Pour des configurations avancées, Administration du serveur couvre la planification, l’installation, la configuration et l’administration serveur en général. Une série de guides supplémentaires, énumérés ci-dessous, couvre la planification, la configuration et la gestion avancées de chaque service. Vous pouvez vous procurer ces guides au format PDF sur le site web de documentation de Mac OS X Server : www.apple.com/fr/server/documentation Ce guide ... explique comment : Premiers contacts et Feuille d’opération d’installation et de configuration Installer Mac OS X Server et le configurer pour la première fois. Administration de ligne de commande Installer, configurer et gérer Mac OS X Server à l’aide des outils de ligne de commande UNIX et des fichiers de configuration. Administration des services de fichier Partager des volumes ou dossiers d’un certain serveur parmi les clients de serveur à l’aide des protocoles AFP, NFS, FTP et SMB. Administration du service iCal Configurer et gérer le service de calendrier partagé iCal. Administration du service iChat Configurer et gérer le service de messagerie instantanée iChat. Configuration de la sécurité de Mac OS X Rendre les ordinateurs (clients) Mac OS X plus sûrs, pour répondre aux exigences des clients du secteur privé ou public. Configuration de la sécurité de Mac OS X Server Rendre Mac OS X Server et l’ordinateur sur lequel il est installé plus sûrs, pour répondre aux exigences des clients du secteur privé ou public. Administration du service de messagerie Configurer et gérer les services de messagerie IMAP, POP et SMTP sur le serveur. Administration des services de réseau Installer, configurer et administrer les services DHCP, DNS, VPN, NTP, coupe-feu IP, NAT et RADIUS sur le serveur. Administration d’Open Directory Configurer et gérer les services d’annuaire et d’authentification et configurer des clients pour accéder aux services d’annuaire. Administration de Podcast Producer Configurer et gérer le service Podcast Producer pour enregistrer, traiter et distribuer des podcasts. Administration du service d’impression Héberger les imprimantes partagées et gérer les files d’attente et travaux d’impression associés. Administration de QuickTime Streaming et Broadcasting Capturer et encoder du contenu QuickTime. Configurer et gérer le service de diffusion QuickTime pour fournir des flux de données multimédia en direct ou à la demande. Administration du serveur Effectuer une installation et une configuration avancée du logiciel serveur et gérer les options qui s’appliquent à plusieurs services ou au serveur dans son intégralité. Administration de Mise à jour de logiciels et d’Imagerie système Utiliser NetBoot, NetInstall et Mise à jour de logiciels pour automatiser la gestion du système d’exploitation et les autres logiciels utilisés par les ordinateurs client.12 Préface À propos de ce guide Affichage des guides PDF à l’écran Lorsque vous lisez la version PDF d’un guide à l’écran :  Affichez les signets pour voir les grandes lignes du guide, puis cliquez sur un signet pour accéder à la rubrique de votre choix.  Recherchez un mot ou un groupe de mots pour afficher une liste des endroits où il apparaît dans le document. Cliquez sur l’une des occurrences pour afficher la page complète.  Cliquez sur une référence croisée pour accéder directement à la rubrique référencée. Cliquez sur un lien web pour visiter le site web dans votre navigateur. Impression de guides PDF Si vous souhaitez imprimer un guide, suivez ces instructions pour économiser du papier et de l’encre :  Économisez de l’encre ou du toner en n’imprimant pas la couverture.  Économisez l’encre de couleur sur une imprimante couleur en activant dans les sousfenêtres de la zone de dialogue Imprimer une option permettant d’imprimer en niveaux de gris ou en noir et blanc.  Réduisez l’encombrement du document imprimé et économisez du papier en imprimant plusieurs pages du document par feuille de papier. Dans la zone de dialogue Imprimer, passez l’échelle à 115 % (155 % pour Premiers contacts). Sélectionnez ensuite Mise en page dans le menu local sans titre. Si votre imprimante prend en charge l’impression recto-verso (ou duplex), sélectionnez l’une des options Recto-verso. Sinon, choisissez 2 dans le menu local Pages par feuille, et choisissez éventuellement Simple extra fine dans le menu Bordure. (Si vous utilisez Mac OS X 10.4 ou une version antérieure, le réglage Échelle se trouve dans la zone de dialogue Format d’impression et les réglages Mise en page dans la zone de dialogue Imprimer.) Mise à niveau et migration Utiliser les réglages de données et de services d’une version antérieure de Mac OS X Server ou de Windows NT. Gestion des utilisateurs Créer et gérer les comptes utilisateur, les groupes et les ordinateurs. Configurer les préférences gérées des clients Mac OS X. Administration des technologies web Configurer et gérer les technologies web (web, blog, WebMail, wiki, MySQL, PHP, Ruby on Rails et WebDAV). Informatique à haute performance et administration Xgrid Configurer et gérer les grappes de serveurs de calcul sur des systè- mes Xserve et des ordinateurs Mac. Glossaire Mac OS X Server Comprendre les termes utilisés pour les produits de serveur et les produits de stockage. Ce guide ... explique comment :Préface À propos de ce guide 13 Vous voudrez peut-être agrandir les pages imprimées même si vous n’imprimez pas en recto-verso, car la taille des pages au format PDF est inférieure à celle du papier d’imprimante standard. Dans la zone de dialogue Imprimer ou Format d’impression, essayez de passer l’Échelle sur 115 % (155 % pour Premiers contacts, pour les pages de la taille d’un CD). Obtention de mises à jour de documentation Régulièrement, Apple publie des pages d’aide révisées et de nouvelles éditions de guides. Certaines pages d’aide révisées viennent mettre à jour les dernières éditions des guides.  Pour afficher de nouvelles rubriques d’aide à l’écran pour une application de serveur, assurez-vous que votre ordinateur serveur ou administrateur est connecté à Internet et cliquez sur les liens disponibles pour télécharger les dernières rubriques d’aide à jour et rester au courant des mises à jour, dans la page d’aide principale de l’application.  Pour télécharger les guides les plus récents au format PDF, rendez-vous sur le site web de documentation de Mac OS X Server : www.apple.com/fr/server/documentation Obtention d’informations supplémentaires Pour plus d’informations, consultez les ressources suivantes :  Documents Ouvrez-moi : mises à jour importantes et informations spécifiques. Recherchez-les sur les disques du serveur.  Site web de Mac OS X Server (www.apple.com/fr/server/macosx) : passerelle vers des informations détaillées sur des produits et technologies.  Site web de support de Mac OS X Server (www.apple.com/fr/support/macosxserver) : accès à des centaines d’articles provenant de l’organisation d’assistance Apple.  Site web de discussion Apple (discussions.apple.com) : un moyen de partager des questions, des connaissances et des conseils avec d’autres administrateurs.  Site web de listes de diffusion Apple (www.lists.apple.com) : abonnez-vous à des listes de diffusion afin de pouvoir communiquer par courrier électronique avec d’autres administrateurs.  Site web des produits QuickTime Streaming Server : contient les informations les plus récentes sur les principales fonctionnalités, les derniers téléchargements et la configuration minimale requise, ainsi que des liens vers d’autres pages de support. www.apple.com/fr/quicktime/streamingserver  QuickTime pour le web : excellent ouvrage de la série Apple QuickTime Developer Series qui explique comment intégrer à un site web de la vidéo, du son enregistré, des animations Flash, des séquences de réalité virtuelle, des séquences MIDI, du texte, des images fixes, des flux en direct, des jeux et l’interactivité de l’utilisateur. 14 Préface À propos de ce guide Le disque d’accompagnement inclut QuickTime Pro et un ensemble complet d’outils de développement pour Windows et Macintosh. Vous trouverez ce livre primé, publié par Morgan Kaufmann, ainsi que d’autres titres utiles sur le site web didactique de QuickTime. www.apple.com/fr/quicktime/tools_tips/books.html.  Site web des services QuickTime : fournit la liste des fournisseurs de service de diffusion. www.apple.com/fr/quicktime/resources.  Site web du groupe de travail IETF : documents RFC, mémorandums sur les standards RTP et RTSP. www.ietf.org/rfc/rfc1889.txt (RTP) www.ietf.org/rfc/rfc2326.txt (RTSP) (en anglais).  Site web du code source : accès au code source de Darwin Streaming Server, informations pour les développeurs et FAQ. developer.apple.com/darwin/projects/streaming (en anglais).1 15 1 Vue d’ensemble de QuickTime Streaming Pour pouvoir configurer votre QuickTime Streaming Server, il est important de comprendre ce qu’est la diffusion en continu. Qu’est-ce que la diffusion en continu ? La diffusion en continu est la distribution de contenu multimédia, tel que les films et les présentations vidéo, sur un réseau en direct. Un ordinateur (serveur de diffusion en continu) envoie les données multimédia à un autre ordinateur (client), lequel lit les données au fur et à mesure de leur réception. Avec la diffusion en continu, aucun fichier n’est téléchargé sur le disque dur de l’ordinateur destinataire. Vous pouvez enchaîner l’envoi des données selon différents débits, d’une simple connexion par modem à une connexion à haut débit. De la même façon que vous avez besoin d’un serveur web pour héberger un site web, l’envoi de flux de données via Internet ou un réseau local nécessite un serveur de diffusion en continu qui transmet les flux audio et vidéo à la demande. Lorsque les destinataires sont peu nombreux, le même ordinateur peut exécuter le logiciel de serveur Web, le logiciel de serveur de courrier et le logiciel de serveur de diffusion. En revanche, si les destinataires sont plus nombreux, un ou plusieurs ordinateurs sont généralement dédiés aux serveurs de diffusion. Lorsqu’un utilisateur demande un flux (à l’aide d’un logiciel client tel que QuickTime Player), la demande est gérée à l’aide du protocole RTSP (Real-Time Streaming Protocol). Les flux sont envoyés à l’aide du protocole RTP (Real-Time Transport Protocol). Un serveur de diffusion peut soit créer des flux à partir de séquences QuickTime stockées sur disque dur, soit transmettre des flux en direct auxquels il a accès. Le logiciel QTSS (QuickTime Streaming Server) vous permet de diffuser :  des émissions en direct,  de la vidéo à la demande,  des listes de lecture de contenu préenregistré.16 Chapitre 1 Vue d’ensemble de QuickTime Streaming Comparaison entre diffusion en direct et diffusion à la demande Les flux de données multimédia en temps réel sont transmis de deux façons : en direct et à la demande. Le serveur Enchaînement QuickTime utilise les deux modes. Les événements en direct tels que les concerts, les discours et les présentations sont généralement diffusés via Internet au moment même où ils se déroulent, à l’aide de logiciels de diffusion tels que QuickTime Broadcaster. Ces logiciels de diffusion codent une source en direct, telle que la vidéo provenant d’une caméra, en temps réel et envoient le flux résultant vers le serveur. Le serveur envoie (ou “sert”) alors le flux en direct aux clients. Quel que soit l’instant où un utilisateur se connecte au flux, tout le monde voit la même portion de flux au même moment. Vous pouvez simuler une expérience en direct à l’aide de contenus enregistrés, en diffusant à partir d’une source archivée (telle qu’un magnétophone) ou en créant des listes de lecture sur le serveur. Avec la diffusion à la demande, d’un film ou d’un discours archivé par exemple, chaque client lit le flux depuis le début, de sorte que personne n’arrive en retard. Aucun logiciel de diffusion n’est requis pour la diffusion à la demande. Comparaison entre le téléchargement progressif (HTTP) et le téléchargement par enchaînement (RTP/RTSP) Le téléchargement progressif (parfois appelé « Démarrage rapide ») est une méthode qui consiste à distribuer un film via Internet de sorte que sa lecture puisse commencer avant que le fichier ne soit complètement téléchargé. Avec le téléchargement progressif, toutes les données requises pour lire un film se trouvent en début de fichier, de sorte que QuickTime peut commencer la lecture du film dès que la première partie du fichier a été transférée. Contrairement à l’enchaînement, qui permet de visualiser des films sans télécharger aucun fichier, les films à démarrage rapide sont réellement téléchargés sur l’ordinateur destinataire. Un tel film peut être autonome, auquel cas toutes les données sont stockées dans le film proprement dit, ou inclure des pointeurs faisant référence à des données situées sur Internet. Vous pouvez visualiser les films à téléchargement progressif dans un navigateur web, à l’aide du module QuickTime, ou dans QuickTime Player. Vous pouvez créer des films à téléchargement progressif pour des spectateurs ayant des vitesses de connexion variables (appelés films de référence) et un film par enchaî- nement pour les spectateurs utilisant les connexions les plus rapides.Chapitre 1 Vue d’ensemble de QuickTime Streaming 17 Enchaînement Lecture instantanée Les utilisateurs qui regardent un flux vidéo à l’aide de QuickTime 6 ou ultérieur peuvent bénéficier de la fonctionnalité Lecture instantanée. Cette dernière constitue un progrès dans la technologie Apple de protection contre les coupures, qui permet de réduire considérablement les temps de mise en mémoire tampon, procurant ainsi une expé- rience de visualisation instantanée. Les utilisateurs peuvent faire défiler la vidéo en cliquant, comme si elle se trouvait sur leur disque dur. Les utilisateurs doivent disposer d’une connexion à haut débit pour bénéficier de la diffusion en lecture instantanée. La réactivité de la diffusion en Lecture instantanée dépend du débit du contenu, de sa taille et de la bande passante disponible. Elle peut également être affectée par le codec utilisé. Configuration simplifiée pour la vidéo en direct La figure ci-dessous illustre une configuration de diffusion vidéo et audio en continu. (La plupart des caméras vidéo disposent d’un microphone intégré.) Vous pouvez diffuser les séquences audio en utilisant uniquement un microphone, une table de mixage et tout autre équipement audio approprié. Un ordinateur MacBook Pro équipé du logiciel QuickTime Broadcaster capture et encode des données vidéo et audio. Le signal encodé est envoyé via un réseau IP (Internet Protocol) vers un serveur qui exécute le logiciel QTSS (QuickTime Streaming Server). QTSS sur le serveur envoie le signal, via Internet ou un réseau local, aux ordinateurs client qui demandent le flux à l’aide de QuickTime Player. Serveur de diffusion Broadcaster18 Chapitre 1 Vue d’ensemble de QuickTime Streaming Il est possible également d’exécuter QuickTime Broadcaster et QTSS sur le même ordinateur. Si vous effectuez une diffusion à une large audience (disons, plus de 100 personnes), toutefois, il est préférable d’exécuter QuickTime Broadcaster et QTSS sur des ordinateurs séparés. Comment recevoir des flux de données multimédias Lorsque vous regardez et écoutez des transmissions aériennes ou par câble, à la télévision ou à la radio, les longueurs d’onde utilisées sont dédiées à cette transmission. Ces transmissions sont le plus souvent non compressées et nécessitent de grandes quantités de bande passante. Ce n’est pas un problème, car elles ne doivent pas partager la bande de fréquence utilisée. Lorsque vous envoyez ces mêmes données via Internet, la bande passante utilisée n’est plus dédiée uniquement à ce flux de transmission. Les données doivent alors partager une bande passante extrêmement limitée avec des milliers, voire des millions d’autres transmissions transitant via Internet. Par conséquent, les données multimédia sont encodées et compressées avant d’être transmises via Internet. Les fichiers qui en résultent sont enregistrés dans un emplacement spécifique et le logiciel serveur de diffusion, tel que QTSS, envoie les données multimédia via Internet aux ordinateurs client. Les utilisateurs Macintosh et Windows peuvent visualiser les flux de données multimé- dia à l’aide de QuickTime Player (disponible gratuitement sur le site web Apple) ou de toute autre application gérant les fichiers QuickTime ou MPEG-4 standard. Vous pouvez également configurer des flux que les utilisateurs peuvent visualiser à partir d’un navigateur web, à condition que le module QuickTime soit installé. Lorsqu’un utilisateur commence la lecture de flux de données multimédias dans une page Web, le plug-in QuickTime envoie une demande au serveur de diffusion et ce dernier répond en envoyant le contenu multimédia à l’ordinateur client. Vous devez spécifier dans la page Web le contenu à envoyer au client : un film QuickTime situé dans un répertoire spécifié, une diffusion en direct ou une liste de lecture stockée sur le serveur de diffusion. Les flux 3GP peuvent également être visualisés sur des téléphones portables compatibles avec la diffusion en continu.Chapitre 1 Vue d’ensemble de QuickTime Streaming 19 Comparaison entre multidiffusion et monodiffusion QTSS gère le transport réseau multidiffusion et monodiffusion pour la distribution des flux de données multimédia. Lors d’une multidiffusion, un seul flux est partagé par les clients (voir illustration ci-dessous). Chaque client se branche sur le flux comme une radio se branche sur une émission FM. Cette technique réduit l’encombrement sur le réseau, mais nécessite un réseau qui ait accès à la dorsale de multidiffusion (Mbone) pour le contenu distribué via Internet, ou qui permette la multidiffusion de contenu distribué en réseau privé restreint. En monodiffusion, chaque client lance son propre flux, entraînant la génération de nombreuses connexions un à un entre le client et le serveur (voir illustration ci-dessous). Le fait d’avoir plusieurs clients connectés en monodiffusion à une diffusion en continu sur un réseau local peut provoquer un trafic réseau élevé, mais cette technique est la plus fiable pour la distribution via Internet puisqu’aucune prise en charge de transport spéciale n’est requise. Multidiffusion Monodiffusion20 Chapitre 1 Vue d’ensemble de QuickTime Streaming Relais Les relais sont utiles dans le cas d’une diffusion à de nombreux spectateurs situés à différents endroits. Le serveur QTSS dispose également d’une fonction de relais, ce qui permet de répartir la charge des flux de données multimédia entre les serveurs et d’utiliser au mieux la bande passante du réseau. Utilisé en tant que serveur relais, QTSS réexpédie un flux à partir d’une source (par exemple Live Broadcaster, QuickTime Streaming Server) vers un serveur de destination. Le plus souvent employés dans le cadre d’une diffusion en direct, les relais servent lorsque les spectateurs sont situés dans des endroits différents, tels que plusieurs bâtiments d’un campus ou dans différents pays. Le serveur source se trouve généralement à l’endroit de la diffusion en direct et réexpé- die le flux aux serveurs situés aux différents emplacements. Une entreprise peut par exemple diffuser la présentation d’un PDG en la relayant du siège social vers les succursales. Dans ce cas, seul un flux de données est diffusé sur Internet et les spectateurs des succursales se connectent aux serveurs de destination via le réseau local (LAN), ce qui réduit la charge sur le serveur source et permet à tout le monde de profiter d’une diffusion de meilleure qualité. Pour des informations détaillées sur la configuration des relais, consultez la section « Configuration de flux de relais » à la page 28. Serveur relais Source Internet Clients Clients Serveur de destination Serveur de destination Siège social de l’entreprise Succursales2 21 2 Configuration de votre serveur Enchaînement QuickTime L’objectif de ce chapitre est de vous permettre de configurer et d’utiliser rapidement votre serveur de diffusion QuickTime. Les instructions de ce chapitre supposent que vous avez installé et configuré Mac OS X Server version 10.5. Pour savoir comment configurer Mac OS X Server, consultez le document intitulé Mac OS X Server Premiers contacts avec la version 10.5 ou ultérieure, inclus sur un disque d’installation de Mac OS X Server et téléchargeable à l’adresse www.apple.com/fr/server/documentation. Configurations matérielle et logicielle requises pour l’enchaî- nement QuickTime La configuration requise pour QTSS est décrite dans le guide Premiers contacts. Configuration requise pour l’ordinateur de visualisation Tout ordinateur sur lequel est installé QuickTime 4 ou ultérieur peut afficher les données multimédias envoyées par le serveur de diffusion. Pour un résultat optimal, Apple recommande QuickTime 7 ou ultérieur. Pour bénéficier de la fonctionnalité Lecture instantanée avec QuickTime Streaming Server 4.1 ou ultérieur, QuickTime 6 ou un version ultérieure et une connexion Internet haut débit sont nécessaires. Tout lecteur MPEG-4 conforme à la norme ISO peut afficher des fichiers MPEG-4 et tout périphérique compatible 3GP des fichiers .3GP. Il est possible d’écouter des flux de listes de lecture MP3 à l’aide d’iTunes ou de tout autre lecteur compatible de flux MP3, tel que WinAmp. Téléchargez QuickTime Player sur le site web QuickTime : www.apple.com/fr/quicktime. Configuration requise pour la diffusion en direct Pour diffuser du contenu en direct, vous pouvez utiliser QuickTime Broadcaster, inclus et installé avec Mac OS X Server.22 Chapitre 2 Configuration de votre serveur Enchaînement QuickTime Pour diffuser des données audio ou vidéo en direct, vous avez besoin du matériel suivant :  Matériel source pour les données audio, vidéo ou les deux, par exemple un magné- toscope, un caméscope et un microphone.  Un ordinateur équipé de QuickTime Broadcaster ou de tout autre logiciel de diffusion (ordinateur G4 ou plus rapide recommandé pour la diffusion MPEG-4), ainsi qu’une carte de capture vidéo ou audio. Remarque : QuickTime Broadcaster gère la capture vidéo à partir de la plupart des sources à technologie FireWire (notamment les caméscopes numériques (DV), certaines webcams et les boîtiers de conversion DV) pour un processus de diffusion simple et rapide avec des résultats de qualité professionnelle.  128 Mo de RAM (256 Mo recommandé pour une diffusion professionnelle).  QuickTime 6 ou ultérieur. Considérations relatives à la bande passante Il n’est généralement pas souhaitable de connecter un serveur de diffusion à Internet ou à un réseau local (LAN) via un modem DSL (Digital Subscriber Line) ou un modem câble. Le serveur serait en effet très limité par la bande passante relativement faible de ces modems pour le téléchargement de données vers le serveur. Dans certains cas, l’utilisation d’un serveur sur une connexion DSL peut entraîner la rupture d’un contrat de service. Avant de configurer le serveur, consultez le fournisseur d’accès associé à votre modem câble ou DSL. Lors de la création de flux RTP (Real-Time Transport Protocol), vous obtiendrez les meilleures performances si les flux ne dépassent pas 75 % de la bande passante client prévue. Par exemple, n’utilisez pas un débit supérieur à 21 kilobits par seconde (Kbps) pour une connexion par modem à 28 Kbps. Pour une connexion classique par modem 56 K, ne dépassez pas 40 Kbps. Pour une connexion client T1 (1500 Kbps), n’utilisez pas un débit supérieur à 1125 Kbps. Configuration de votre serveur de diffusion Configurez le serveur de diffusion, testez votre configuration et accédez aux données multimédia diffusées par votre serveur. Pour configurer votre serveur de diffusion : 1 Ouvrez Admin Serveur. 2 Dans la liste Services, sélectionnez l’ordinateur que vous voulez configurer en tant que serveur de diffusion en continu QuickTime. 3 Cliquez sur Réglages généraux dans la barre d’outils, puis cliquez sur l’onglet Services. 4 Dans la liste des services, sélectionnez QuickTime Streaming, puis cliquez sur Enregistrer.Chapitre 2 Configuration de votre serveur Enchaînement QuickTime 23 5 Sélectionnez QuickTime Streaming dans la liste Serveurs pour afficher et modifier les réglages. 6 Pour démarrer le service QuickTime Streaming, cliquez sur le bouton de lecture dans l’angle inférieur gauche de la fenêtre Admin Serveur. Test de votre configuration Des échantillons de séquences QuickTime sont inclus avec QTSS dans le dossier par défaut des séquences, ce qui vous permet de tester la configuration du serveur. Ces échantillons peuvent être visualisés à l’aide de QuickTime Player. Remarque : l’échantillon de fichier MP3 inclus est uniquement destiné à une liste de lecture MP3 de diffusion. Il ne peut pas être diffusé à la demande à l’aide du protocole RTSP car il n’a pas été préparé pour la diffusion en continu, ce qui requiert un processus dit d’optimisation. Pour tester la configuration de votre serveur en visualisant un échantillon de film : 1 Sur un autre ordinateur, ouvrez QuickTime Player. 2 Cliquez sur Fichier > Ouvrir l’URL dans le nouveau lecteur. 3 Tapez l’URL suivante : rtsp://nom_hôte/sample_300kbit.mov Remplacez nom_hôte par le nom d’hôte ou l’adresse IP du serveur de diffusion en continu QuickTime et choisissez une séquence ayant un débit adapté à votre bande passante. 4 Cliquez sur OK. QuickTime Player se connecte au serveur et lit le film dans une nouvelle fenêtre. Si un message de type « Fichier introuvable » s’affiche, vérifiez que vous avez correctement saisi l’URL, notamment en respectant la casse. Si votre serveur de diffusion est un serveur multi-adressage (si l’ordinateur héberge également un serveur web, par exemple), il se peut que vous deviez spécifier une autre adresse IP pour l’enchaînement. (Un serveur web utilise le port 80 ; dans certaines configurations de clients QuickTime, QTSS utilise aussi le port 80.) Vous pouvez choisir ou ajouter une adresse IP pour le serveur de diffusion dans la sousfenêtre QuickTime Streaming d’Admin Serveur. Cliquez sur Réglages, sur Liaisons IP, puis cochez la case Liaison correspondant à l’adresse IP souhaitée. La configuration initiale de votre logiciel QTSS est terminée. Les réglages complémentaires dépendent de votre matériel et de vos logiciels, de vos connexions réseau, du nombre prévu de spectateurs, ainsi que du type de données que vous souhaitez diffuser. Pour plus d’informations sur la détermination de ces réglages et sur l’utilisation du serveur de diffusion, consultez le chapitre 3, « Gestion de votre serveur Enchaînement QuickTime », le chapitre 6, « Exemple de configuration » et les ressources présentées à la page 13.24 Chapitre 2 Configuration de votre serveur Enchaînement QuickTime Accès aux données multimédia diffusées par votre serveur Pour lire des flux de données multimédia, les utilisateurs doivent disposer de QuickTime 4 ou ultérieur (ou d’un lecteur MP4). Vous trouverez ci-dessous les instructions à fournir aux utilisateurs qui souhaitent visualiser les flux multimédias diffusés par votre serveur. Pour visualiser des flux de données multimédias : 1 Ouvrez QuickTime Player. 2 Choisissez Fichier > Ouvrir l’URL. 3 Tapez l’URL du fichier multimédia. Exemple : rtsp://monserveur.com/monfichier Remplacez monserveur.com par le nom de domaine de l’ordinateur QTSS et monfichier par le nom de la séquence ou du fichier multimédia. Cette URL suppose que la séquence ou le fichier multimédia se trouve au niveau supé- rieur du répertoire multimédia. Si des séquences se trouvent dans des sous-dossiers du répertoire, ajoutez le dossier concerné au nom de chemin. Par exemple : rtsp://monserveur.com/mondossier/monfichier.mov Si vous souhaitez que les utilisateurs visualisent les flux de données multimédia à l’aide d’un navigateur web, vous devez configurer une page web pour afficher les données multimédia et fournir aux utilisateurs l’URL de cette page. Remarque : il est déconseillé de taper une adresse URL RTSP directement dans le champ d’adresse du navigateur web, certains navigateurs ne comprenant pas le terme « rtsp ».3 25 3 Gestion de votre serveur Enchaînement QuickTime Ce chapitre contient des informations sur la diffusion de flux de données à travers des coupe-feu, la configuration de relais et l’administration à distance d’un serveur Enchaînement QuickTime. Pour configurer et gérer QuickTime Streaming Server (QTSS), vous devez utiliser l’application Admin Serveur installée avec Mac OS X Server (version 10.5 ou ultérieure). Cette application offre une interface utilisateur standard pour toutes les plates-formes compatibles et vous permet d’administrer le serveur de diffusion localement ou à distance. Admin Serveur vous permet de modifier les réglages généraux, de surveiller les utilisateurs connectés, de visualiser les fichiers d’historique, de gérer l’utilisation de la bande passante et de relayer des flux d’un serveur à un autre. Utilisation de l’application basée sur le Web pour gérer l’enchaînement QuickTime Si vous avez précédemment administré un serveur de diffusion QuickTime à l’aide de l’application d’administration web (Admin Web), vous pouvez continuer ainsi. L’application Admin Web est utile pour administrer un serveur de diffusion à distance ou depuis des ordinateurs autres que Mac. Pour activer Admin Web : 1 Dans Admin Serveur, sélectionnez QuickTime Streaming sous le serveur dans la liste Serveurs. 2 Cliquez sur Réglages. 3 Cliquez sur Accès. 4 Sélectionnez « Activer l’administration basée sur le Web », puis saisissez un nom et un mot de passe à utiliser pour accéder au site web d’administration. 5 Cliquez sur Enregistrer.26 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime Pour plus d’informations sur l’utilisation d’Admin Web, consultez le guide de l’administrateur QTSS/Darwin Streaming Server, disponible à l’adresse developer.apple.com/darwin/ (en anglais). Remarque : si vous avez utilisé l’application Admin Web pour administrer un serveur de diffusion QuickTime, vous trouverez les fonctionnalités d’administration dans l’application Admin Serveur de Mac OS X. Utilisation d’Admin Serveur pour gérer l’enchaînement QuickTime Cette section contient des instructions pour l’utilisation d’Admin Serveur pour les tâches telles que le démarrage ou l’arrêt du service de diffusion en continu, la configuration d’un serveur multi-adressage et la modification de réglages tels que le nombre maximum de connexions et le débit maximum autorisé. Démarrage ou arrêt du service de diffusion Vous pouvez démarrer ou arrêter le service de diffusion à partir de la sous-fenêtre QuickTime Streaming d’Admin Serveur. Pour démarrer ou arrêter le service de diffusion : 1 Ouvrez Admin Serveur. 2 Dans la liste Serveurs, cliquez sur QuickTime Streaming pour le serveur. 3 En haut de la fenêtre, cliquez sur Démarrer le service ou sur Arrêter le service. Modification du nombre maximum de connexions de diffusion Lorsque le nombre maximum de connexions spécifié est atteint, un message indiquant que le serveur est occupé ou que la bande passante est insuffisante (erreur 453) s’affiche pour les utilisateurs qui tentent de se connecter. Pour modifier le nombre maximum de connexions : 1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs. 2 Cliquez sur Réglages. 3 Tapez un nombre dans le champ Nombre de connexions max. 4 Cliquez sur Enregistrer.Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 27 Modification du débit de diffusion maximum Si le débit maximal est atteint, personne d’autre ne peut se connecter. Les utilisateurs qui tentent de se connecter reçoivent un message indiquant que le serveur est occupé (erreur 453). Pour modifier le débit maximal : 1 Dans Admin Serveur, cliquez sur Enchaînement QuickTime sous le serveur dans la liste Ordinateurs et services. 2 Cliquez sur Réglages. 3 Saisissez un chiffre dans la zone Débit maximal et choisissez mégabits par seconde (Mbps) ou kilobits (Kbps) dans le menu local. Vous pouvez choisir d’associer QTSS à toutes les adresses IP répertoriées ou uniquement aux adresses sélectionnées. 4 Cliquez sur Enregistrer. Changement du répertoire réservé aux flux de données multimédias QuickTime Streaming Server comporte un répertoire multimédia principal (/Library/ QuickTimeStreaming/Movies/). Si vous le souhaitez, vous pouvez spécifier un autre répertoire pour vos données multimédia. Par exemple, vous voulez basculer sur un répertoire d’un autre disque dur. Assurez-vous que le propriétaire du nouveau répertoire est bien l’utilisateur système « qtss ». Le propriétaire peut être modifié à partir du Gestionnaire de groupe de travail, du Finder ou de la ligne de commande. Pour spécifier un autre répertoire multimédia : 1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs. 2 Cliquez sur Réglages. 3 Tapez un chemin d’accès dans le champ texte Répertoire multimédia ou cliquez sur le bouton en regard du champ afin de choisir un dossier. 4 Cliquez sur Enregistrer. Association de l’ordinateur d’administration du serveur de diffusion à une adresse IP Si votre ordinateur d’administration du serveur de diffusion est de type multi-adressage (si vous hébergez également un serveur web, par exemple), vous pouvez indiquer l’adresse IP à associer à QTSS. Pour spécifier une adresse IP : 1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs. 2 Cliquez sur Réglages, puis sur Associations IP. 3 Cochez la case Liaison pour l’adresse IP souhaitée. 4 Cliquez sur Enregistrer.28 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime Hébergement de flux provenant de plusieurs répertoires multimédia utilisateur QTSS ne peut comporter qu’un seul répertoire multimédia principal. Cependant, en activant la prise en charge des répertoires de départ, les utilisateurs peuvent diffuser des fichiers ou des listes de lecture à la demande, à partir de leur répertoire de départ. Pour configurer QTSS afin qu’il diffuse des séquences provenant des répertoires de départ des utilisateurs : 1 Dans Admin Serveur, cliquez sur Enchaînement QuickTime. 2 Cliquez sur Réglages, puis sur Accès. 3 Sélectionnez “Activer la diffusion depuis le répertoire de départ”. 4 Cliquez sur Enregistrer. 5 Demandez aux utilisateurs de placer leurs films QuickTime dans le dossier créé dans leur répertoire de départ (//Sites/Streaming). Pour visualiser une séquence dans un répertoire privé, tapez l’URL suivante : rtsp://nom_hôte.com/~utilisateur1/exemple.mov Remarque : pour diffuser un flux en direct à partir d’un répertoire autre que le répertoire multimédia, vous devez créer un fichier qtaccess. Pour plus d’informations, consultez le Guide de l’administrateur de QTSS disponible à l’adresse developer.apple.com/darwin/ (en anglais). Configuration de flux de relais Vous devez utiliser des relais pour accepter un flux provenant d’un serveur de diffusion et le transférer, ou le relayer, vers un autre serveur de diffusion. Chaque relais est constitué d’une source et d’une ou plusieurs destinations. Pour configurer un relais : 1 Dans le volet Réglages du service Enchaînement QuickTime, cliquez sur Relais. 2 Cliquez sur le bouton Ajouter (+) en regard de la liste Relais. 3 Tapez un nom pour le relais dans le champ Nom du relais. 4 Choisissez une option dans le menu local Type de relais. Le type de relais définit la source du relais. Il existe trois options :  L’option Demander une diffusion entrante ordonne au serveur de diffusion d’envoyer à l’ordinateur source une demande pour le flux entrant avant qu’il ne soit relayé. Vous pouvez utiliser cette fonctionnalité pour relayer une diffusion en direct (à partir d’un autre serveur) ou pour demander un fichier stocké et le convertir en un flux sortant en direct. L’option « Demander une diffusion entrante » est couramment utilisée dans le cas de flux UDP non annoncés diffusés par QuickTime Broadcaster ou tout autre encodeur.  L’option UDP non annoncé permet de relayer depuis le serveur des flux sur une adresse IP et des numéros de ports spécifiques.Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 29  L’option UDP annoncé ordonne au serveur d’attendre le flux entrant, puis de le relayer. Les relais configurés pour attendre des flux annoncés ne peuvent accepter que les flux multimédias utilisant le protocole d’annonce RTSP. L’option UDP annoncé s’utilise dans le cas d’une diffusion automatique (annoncée) via QuickTime Broadcaster ou tout autre encodeur prenant en charge le protocole d’annonce RTSP. 5 Si vous choisissez « Demander une diffusion entrante » ou « UDP annoncé », saisissez le nom d’hôte DNS ou l’adresse IP de l’ordinateur source dans le champ IP source. 6 Si vous choisissez « Demander une diffusion entrante » ou « UDP annoncé », saisissez le chemin d’accès au flux dans le champ Chemin. 7 Si vous choisissez « Demander une diffusion entrante » ou « UDP annoncé » et que l’ordinateur source requiert l’authentification des diffusions automatiques, saisissez un nom d’utilisateur et un mot de passe. 8 Assurez-vous que l’option Activer le relais est sélectionnée et cliquez sur le bouton Précédent. 9 Cliquez sur le bouton Ajouter (+) en regard de la liste Destinations. Il existe deux types de destinations :  L’option UDP non annoncé permet de relayer depuis le serveur des flux sur une adresse IP spécifique et des numéros de ports. Il faut alors créer manuellement un fichier SDP  L’option UDP annoncé permet de relayer et d’annoncer le flux à l’adresse IP de destination depuis le serveur. Le fichier SDP est alors automatiquement généré à la destination. 10 Tapez les informations demandées et cliquez sur le bouton Précédent. 11 Répétez les étapes 9 et 10 pour chaque destination, puis cliquez sur Enregistrer. Pour activer ou désactiver un relais, cochez ou décochez la case Activer en regard du relais dans la liste. Pour supprimer un relais, sélectionnez-le, puis cliquez sur le bouton Supprimer (–). Modification des réglages d’historique de diffusion QuickTime Vous pouvez spécifier que chaque historique soit réinitialisé après un certain nombre de jours. Pour modifier les réglages d’historique : 1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs. 2 Cliquez sur Réglages. 3 Cliquez sur Consignation. L’historique des accès est mis à jour uniquement lorsque les connexions client sont interrompues. Un client connecté au moment d’une panne de courant ou d’une défaillance du serveur n’est pas consigné et n’apparaît pas dans l’historique des accès lorsque le serveur est relancé.30 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime Les fichiers d’historique sont stockés dans le répertoire /Bibliothèque/QuickTimeStreaming/Logs/. Lecture des historiques de diffusion QuickTime QTSS fournit les fichiers d’historique suivants :  Historiques des erreurs. Ces fichiers regroupent des erreurs telles que les problèmes de configuration. Par exemple, si une adresse IP spécifique est introuvable ou que certains des fichiers de diffusion ont été supprimés.  Historiques des accès. Lorsque quelqu’un lit un film diffusé à partir de votre serveur, l’historique fournit des informations telles que la date, l’heure et l’adresse IP de l’ordinateur utilisé. Les fichiers d’historiques de QTSS sont stockés dans Library/QuickTimeStreaming/Logs. Les historiques de QTSS sont au format W3C standard, ce qui vous permet d’utiliser certains outils d’analyse standard pour analyser les données. Sécurité et accès Il existe un certain niveau de sécurité inhérent à la diffusion en temps réel, dans la mesure où le contenu n’est transmis que si le client en a besoin et où aucun fichier n’est conservé. Toutefois, d’autres problèmes de sécurité peuvent néanmoins se présenter. Le serveur de diffusion utilise les protocoles RTSP/RTP IETF standard. Le protocole RTSP fonctionne sur TCP, le protocole RTP sur UDP. De nombreux coupe-feu sont configurés pour limiter les paquets TCP par numéro de port et filtrer le port UDP. Il existe trois options permettant de diffuser des flux en présence de coupe-feu via QTSS. Ces options ne s’excluent pas mutuellement. Généralement, une ou plusieurs options sont employées afin d’obtenir la configuration la plus souple possible. Les trois configurations ci-dessous sont destinées aux clients derrière un coupe-feu.  Diffusion sur le port 80. Cette option permet au serveur de diffusion d’encapsuler l’ensemble du trafic RTSP et RTP dans des paquets TCP sur le port 80. Ce port étant utilisé par défaut pour le trafic web HTTP, le contenu diffusé en continu est filtré par la plupart des coupe-feu. L’inconvénient de cette encapsulation est qu’elle diminue les performances réseau et que des connexions client plus rapides sont nécessaires pour éviter d’interrompre la diffusion. Elle augmente également la charge sur le serveur.  Option Ouvrir les ports adaptés sur le coupe-feu. Avec cette option, il est possible d’accéder au serveur de diffusion via RTSP/RTP sur les ports par défaut ; elle permet également de mieux exploiter les ressources réseau, ne requiert pas de connexions client plus rapides et n’impose pas de charge importante au serveur. Les ports qui doivent être ouverts incluent :  Port TCP 80 : utilisé pour signaler et diffuser des flux de données par RTSP/HTTP (si activé sur le serveur)Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 31  Port TCP 554 : utilisé pour RTSP  Ports UDP 6970-9999 : utilisé pour la diffusion de flux de données UDP. Une plage inférieure de ports UDP, généralement entre 6970 et 6999, peut être utilisée.  Port TCP 7070 : utilisé éventuellement pour RTSP. (Real Server utilise ce port ; QTSS/Darwin peut également être configuré pour y recourir).  Ports UDP 8000 et 8001 : peut être ouvert pour la diffusion Icecast MP3.  Configuration d’un serveur proxy de diffusion en continu. Le serveur proxy est placé dans la zone DMZ du réseau, une zone située entre un coupe-feu externe relié à Internet et un coupe-feu interne entre la zone DMZ et le réseau interne. Avec des règles de coupefeu, les paquets avec les ports indiqués ci-dessus sont autorisés à passer entre le serveur proxy et les clients via le coupe-feu interne, ainsi qu’entre le serveur proxy et Internet via le coupe-feu externe. Cependant, les clients ne sont pas autorisés à se connecter directement à des ressources externes sur ces ports. De cette façon, tous les paquets destinés à être envoyés sur le réseau interne sont transmis via le serveur proxy, d’où une sécurité accrue du réseau. Diffusion de flux à travers des coupe-feu via le port 80 Si vous configurez un serveur de diffusion sur Internet et que certains de vos clients se trouvent derrière des coupe-feu qui n’autorisent que le trafic web, activez la diffusion sur le port 80. Avec cette option, le serveur de diffusion accepte les connexions sur le port 80, le port par défaut pour le trafic web, et les clients QuickTime peuvent se connecter à votre serveur de diffusion même s’ils se trouvent derrière un coupe-feu destiné uniquement au web. Si vous activez l’enchaînement sur le port 80, veillez à désactiver tout serveur Web possédant la même adresse IP, afin d’éviter les conflits avec votre serveur de diffusion. Pour diffuser des flux QuickTime via le port HTTP 80 : 1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs. 2 Cliquez sur Réglages. 3 Cliquez sur Associations IP. 4 Sélectionnez l’option “Activer la diffusion sur le port 80”. Important : si vous activez la diffusion sur le port 80, assurez-vous que votre serveur n’exé- cute pas également un serveur web tel qu’Apache. L’exécution de QTSS et d’un serveur Web avec diffusion sur le port 80 peut provoquer un conflit de port entraînant le comportement anormal de l’un ou des deux serveurs.32 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime Diffusion à travers des coupe-feu ou des réseaux avec traduction d’adresses Le serveur de diffusion envoie des données à l’aide de paquets UDP. Les coupe-feu conçus pour protéger les informations d’un réseau bloquent souvent les paquets UDP. Les ordinateurs client situés derrière un coupe-feu qui bloque les paquets UDP ne peuvent recevoir les flux de données multimédia. Cependant, le serveur de diffusion autorise également la diffusion via des connexions HTTP, ce qui permet la visualisation des données multimédias, même à travers des coupe-feu configurés de manière très restrictive. Certains ordinateurs client situés sur des réseaux qui utilisent la traduction d’adresses peuvent également s’avérer incapables de recevoir des paquets UDP, mais ils peuvent recevoir les données multimédia diffusées via des connexions HTTP. Si les utilisateurs rencontrent des problèmes pour visualiser les données multimédia à travers un coupe-feu ou sur un réseau qui utilise la traduction d’adresses, ils doivent procéder à la mise à niveau de leur logiciel client avec QuickTime 5 ou une version ultérieure. Si les problèmes persistent, leur administrateur réseau doit leur fournir les réglages appropriés pour le serveur proxy de diffusion et le transport de diffusion sur leur ordinateur. Les administrateurs réseau peuvent également configurer leur logiciel coupe-feu afin d’autoriser les diffusions RTP et RTSP. Changement du mot de passe requis pour envoyer un flux de diffusion MP3 La diffusion de données MP3 vers un autre serveur nécessite une authentification. Pour changer le mot de passe de diffusion MP3 : 1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs. 2 Cliquez sur Réglages, puis sur Accès. 3 Tapez un nouveau mot de passe dans la zone « Mot de passe de diffusion MP3 ». 4 Cliquez sur Enregistrer. Utilisation de la monodiffusion automatique (Annonce) à l’aide de QTSS sur un ordinateur distinct Vous pouvez réaliser une diffusion de QuickTime Broadcaster vers QTSS. Ce réglage peut également permettre de recevoir des flux UDP annoncés d’un autre serveur QuickTime Streaming Server via un relais à l’aide de la méthode de transmission Monodiffusion automatique (Annonce). Pour cela, vous devez créer un nom d’utilisateur et un mot de passe de diffusion sur le serveur de diffusion en continu.Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 33 Pour créer un nom d’utilisateur et un mot de passe de diffusion sur le serveur de diffusion : 1 Dans Admin Serveur, cliquez sur QuickTime Streaming sous le serveur dans la liste Serveurs. 2 Cliquez sur Réglages, puis sur Accès. 3 Cochez la case « Accepter les diffusions entrantes ». 4 Cliquez sur Définir le mot de passe et tapez le nom et le mot de passe. 5 Cliquez sur Enregistrer. Tâches de gestion avancées En plus des fonctions disponibles via Admin Serveur, QTSS inclut également des fonctionnalités avancées qui permettent une plus grande personnalisation du serveur depuis la ligne de commande. Il s’agit entre autres de la création d’utilisateurs et de groupes QTSS avec des fichiers qtaccess, du contrôle de l’accès au contenu et de la configuration de relais multidiffusion. Contrôle de l’accès aux flux de données multimédias Vous pouvez configurer l’authentification pour contrôler l’accès client aux fichiers de données multimédia. Vous pouvez utiliser le Gestionnaire de groupe de travail pour spé- cifier qui peut accéder aux fichiers multimédia ou vous pouvez utiliser un fichier d’accès. Pour contrôler l’accès à l’aide d’Open Directory : m Autorisez chaque utilisateur dans le Gestionnaire de groupe de travail. Pour en savoir plus, reportez-vous au Guide d’administration d’Open Directory. Pour contrôler l’accès à l’aide d’un fichier d’accès : Deux schémas d’authentification sont pris en charge : basic et digest. Par défaut, le serveur utilise la méthode d’authentification digest la plus sûre. Il est également possible de contrôler l’accès à la liste de lecture et l’accès de l’administrateur à votre serveur de diffusion. L’authentification ne permet pas de contrôler l’accès aux données diffusées à partir d’un serveur relais. L’administrateur du serveur relais doit configurer une d’authentification spécifique aux données relayées. La fonctionnalité de gestion de l’accès utilisateur étant intégrée au serveur de diffusion, elle est activée en permanence. Pour que le contrôle d’accès fonctionne, vous devez disposer d’un fichier d’accès dans le répertoire sélectionné comme répertoire multimédia. Si aucun fichier d’accès ne figure dans le répertoire multimédia du serveur de diffusion, tous les clients ont accès aux données du répertoire. 1 Servez-vous de l’utilitaire de ligne de commande qtpasswd pour créer des comptes utilisateur avec mots de passe. 2 Créez un fichier d’accès et placez-le dans le répertoire multimédia à protéger.34 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 3 Si vous souhaitez désactiver l’authentification d’un répertoire multimédia, supprimez le fichier d’accès (qtaccess) ou renommez-le (par exemple, qtaccess.désactivé). Création d’un fichier d’accès Un fichier d’accès est un fichier texte appelé qtaccess et contenant des informations sur les utilisateurs et les groupes autorisés à visualiser les données multimédia du répertoire dans lequel le fichier d’accès est stocké. Le répertoire que vous utilisez pour stocker les flux de données multimédias peut contenir d’autres répertoires et chacun peut disposer de son propre fichier d’accès. Lorsqu’un utilisateur tente de visualiser un fichier multimédia, le serveur interroge un fichier d’accès qui lui indique si l’utilisateur est autorisé à visualiser les données multimédias. Le serveur examine tout d’abord le répertoire contenant le fichier multimédia. Si aucun fichier d’accès n’est trouvé, il examine le répertoire parent. Le premier fichier d’accès trouvé est utilisé pour déterminer si l’utilisateur est autorisé à visualiser le fichier multimédia. Le fichier d’accès du serveur de diffusion fonctionne comme celui du serveur Web Apache. Il est possible de créer un fichier d’accès avec n’importe quel éditeur de texte. Le nom du fichier doit être qtaccess et le fichier peut contenir tout ou partie des informations suivantes : AuthName AuthUserFile AuthGroupFile < nom de fichier de groupe> require user require group require valid-user require any-user Les termes qui ne sont pas entre crochets pointus sont des mots-clés. Les informations entre crochets pointus sont les informations que vous fournissez. Enregistrez le fichier d’accès en texte brut (et non au format .rtf ou autre). Voici une brève explication de chaque mot-clé :  message est le texte que vos utilisateurs voient lorsque la fenêtre d’ouverture de session apparaît. Le message est facultatif. Si votre message contient des espaces vides (par exemple, l’espace entre les termes), placez l’intégralité du message entre guillemets.  nom de fichier d’utilisateur est le chemin et le nom du fichier d’utilisateur. Sous Mac OS X, le chemin par défaut est /Library/QuickTimeStreaming/Config/qtusers.  nom de fichier de groupe est le chemin et le nom du fichier de groupe. Sous Mac OS X, le chemin par défaut est /Library/QuickTimeStreaming/Config/qtgroups. Un fichier de groupe est facultatif. Si vos utilisateurs sont nombreux, il est peut-être plus commode de configurer un ou plusieurs groupes et d’en saisir les noms plutôt que de dresser la liste des utilisateurs.Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 35  nom d’utilisateur est un utilisateur autorisé à ouvrir une session et à consulter le fichier multimédia. Le nom d’utilisateur doit se trouver dans le fichier d’utilisateur spécifié. Vous pouvez également spécifier valid-user, qui désigne tout utilisateur valide.  nom de groupe est un groupe dont les membres sont autorisés à ouvrir une session et à consulter le fichier multimédia. Le groupe et ses membres doivent apparaître dans le fichier de groupe spécifié. Vous pouvez également utiliser les balises d’utilisateur suivantes :  valid-user désigne tout utilisateur défini dans le fichier qtusers. L’instruction “require valid-user” indique que tout utilisateur authentifié dans le fichier qtusers a accès aux fichiers multimédias. Si cette balise est utilisée, le serveur invite l’utilisateur à saisir un nom d’utilisateur et un mot de passe.  any-user permet à tout utilisateur de visualiser des données sans saisir de nom ou de mot de passe.  AuthScheme est un mot-clé avec les valeurs « basic » ou « digest » à un fichier qtaccess. Le réglage d’authentification est alors remplacé répertoire par répertoire. Si vous avez apporté des modifications personnalisées au fichier d’accès qtaccess par défaut, sachez que tout changement des réglages utilisateur de diffusion dans Admin Serveur affecte le fichier qtaccess par défaut à la racine du répertoire des séquences. Par conséquent, les modifications personnalisées que vous avez apportées ne seront pas conservées. Éléments indispensables à l’accès aux données multimédia protégées Les utilisateurs doivent disposer de QuickTime 5 ou ultérieur pour avoir accès à un fichier multimédia pour lequel l’authentification digest est activée. Si votre serveur de diffusion est configuré pour utiliser l’authentification basic, les utilisateurs doivent disposer de QuickTime 4.1 ou ultérieur. Les utilisateurs doivent saisir leur nom d’utilisateur et leur mot de passe pour visualiser le fichier. Les utilisateurs qui disposent d’une version anté- rieure de QuickTime et tentent d’accéder à un fichier multimédia verront apparaître le message d’erreur suivant “401 : Non autorisé”. Ajout de comptes d’utilisateur et de mots de passe Il est possible d’ajouter un compte d’utilisateur et un mot de passe en ouvrant une session sur l’ordinateur serveur. Pour ajouter un compte d’utilisateur : 1 Connectez-vous au serveur en tant qu’utilisateur root, ouvrez une fenêtre Terminal et saisissez : qtpasswd Vous pouvez aussi utiliser sudo pour exécuter la commande comme root. 2 Saisissez un mot de passe pour l’utilisateur et tapez-le à nouveau lorsque vous y êtes invité.36 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime Ajout ou suppression de groupes Vous pouvez modifier le fichier /Library/QuickTimeStreaming/Config/qtgroups dans n’importe quel éditeur de texte, du moment qu’il respecte ce format : : Pour Windows, le chemin est c:\Program Files\Darwin Streaming Server\qtgroups. Pour les autres plate-formes prises en charge, le chemin est /etc/streaming/qtgroups. Pour ajouter ou supprimer un groupe, il suffit de modifier le fichier de groupe configuré. Apport de modifications au fichier d’utilisateur ou de groupe Vous pouvez modifier le fichier d’utilisateur ou de groupe en ouvrant une session sur l’ordinateur serveur. Pour supprimer un utilisateur d’un fichier d’utilisateur ou de groupe : 1 Ouvrez une session sur l’ordinateur serveur en tant qu’administrateur et utilisez un éditeur de texte pour ouvrir le fichier d’utilisateur ou de groupe. 2 Supprimez la ligne du nom d’utilisateur et des mots de passe cryptés dans le fichier d’utilisateur. 3 Supprimez le nom d’utilisateur dans le fichier de groupe. Pour changer le mot de passe d’un utilisateur : 1 Connectez-vous à l’ordinateur serveur en tant qu’utilisateur root, ouvrez Terminal et saisissez : qtpasswd Vous pouvez aussi utiliser sudo pour exécuter la commande comme root. 2 Saisissez un nouveau mot de passe pour les utilisateurs. Le mot de passe saisi remplace le mot de passe du fichier. Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 37 Configuration d’un relais multidiffusion La configuration d’un relais multidiffusion vous permet de recevoir un flux monodiffusion d’un serveur et de le relayer vers un réseau local (LAN) en multidiffusion. (Le réseau doit être activé pour la multidiffusion pour que les utilisateurs puissent accéder au flux.) Voici les étapes à suivre pour la configuration. Pour relayer un flux entrant en tant que flux multidiffusion : 1 Configurez un relais multidiffusion sur le serveur de diffusion : a Si la source de diffusion du relais est configurée en tant que Monodiffusion automatique (Annonce), choisissez UDP annoncé comme Type de relais. Si la source de diffusion du relais est configurée en tant que Monodiffusion manuelle, choisissez Demander une diffusion entrante comme Type de relais. b Réglez l’IP source du relais sur 127.0.0.1. c Configurez le chemin d’accès au fichier sdp annoncé (spécifié à l’étape 2) ou non annoncé (copié manuellement sur le serveur) comme chemin d’accès au relais. Il s’agit du chemin d’accès au répertoire Séquences de votre serveur de diffusion. N’oubliez pas d’inclure l’extension “.sdp”. d Si vous utilisez Monodiffusion automatique sur le diffuseur/encodeur, choisissez « UDP annoncé » comme Type de relais. Si la source est une monodiffusion manuelle, sélectionnez Demander une diffusion entrante. e Laissez vides les zones de nom d’utilisateur et de mot de passe. L’authentification n’est pas requise si vous utilisez l’adresse de bouclage (127.0.0.1). f Créez une destination pour le relais en cliquant sur l’icône « + », puis spécifiez une adresse de multidiffusion valide pour l’adresse IP de destination. Choisissez UDP non annoncé comme Type de destination. Prenez un chiffre pair comme numéro de port de base UDP (par exemple, entre 9000 et 9996). Le TTL multidiffusion est le nombre de routeurs par lesquels la multidiffusion va passer, selon la typologie du réseau sur lequel vous travaillez. g Cliquez sur Enregistrer. 2 Configurez QuickTime Broadcaster de façon à ce qu’il envoie une Monodiffusion automatique (Annonce) ou une Monodiffusion manuelle au serveur. Pour la Monodiffusion automatique, le nom de fichier spécifié dans Broadcaster est créé sur le serveur (l’extension .sdp est ajoutée par défaut). Vous trouverez plus d’informations sur la Monodiffusion automatique à la page 32. Pour la Monodiffusion manuelle, le fichier .sdp doit être exporté de Broadcaster et copié manuellement dans le répertoire Séquences du serveur de diffusion en continu. 3 Une fois la diffusion démarrée, testez le flux tel qu’il apparaît depuis le serveur dans QuickTime Player en ouvrant l’URL suivante : rtsp:///.38 Chapitre 3 Gestion de votre serveur Enchaînement QuickTime 4 Pour permettre aux clients d’accéder au relais multidiffusion, faites une copie du fichier SDP et modifiez celle-ci comme suit : a Allez à la ligne qui commence par c=IN IP4 et remplacez l’adresse IP par celle de multidiffusion indiquée à l’étape 1. b Allez à la première ligne commençant par m= (généralement, m=audio) et remplacez le 0 par le port de base spécifié à l’étape 1 (par exemple, 9000). c Allez à la deuxième ligne commençant par m= (généralement, m=video), et remplacez le 0 par le port de base plus 2 (9002). 5 Enregistrez le fichier à un emplacement accessible par les clients :  Si vous placez le fichier sur un serveur HTTP ou FTP, les clients peuvent accéder à la multidiffusion dans QuickTime Player en ouvrant l’une de ces URL :  http:///  ftp:///  Si vous placez le fichier SDP de multidiffusion sur un serveur Web ou l’envoyez par mail aux clients, ceux-ci peuvent l’ouvrir dans QuickTime Player.  Si vous placez le fichier SDP de multidiffusion sur un serveur Web, le type MIME doit être correctement configuré sur le serveur en tapant : mime type extension application/sdp sdp Vous pouvez de même ouvrir le fichier SDP ou l’URL dans QuickTime Pro, enregistrer le fichier en tant que séquence autonome .mov et l’envoyer aux clients ou l’intégrer à une page web, etc. Vous pouvez arrêter une diffusion et en démarrer une nouvelle sous le même nom, du moment que le nom du fichier SDP de diffusion n’est pas modifié. Cependant, si vous modifiez un paramètre du fichier SDP, vous devez répéter les étapes 4 et 5 à chaque nouvelle diffusion.4 39 4 Dépannage et informations techniques Ce chapitre contient des informations sur les opérations à effectuer si vous rencontrez des problèmes lors de la diffusion de données. Utilisation de fichiers d’historique pour surveiller la diffusion de listes de lecture Si vous activez la consignation, vous pouvez utiliser le fichier d’historique pour résoudre les problèmes qui se produisent au cours d’une diffusion. Voici quelques conseils pour résoudre des problèmes pouvant survenir :  Si les données de la liste de lecture ne sont pas diffusées, utilisez Admin Serveur pour vous assurer que le serveur de diffusion est en cours d’exécution.  Si le serveur de diffusion est en cours d’exécution, assurez-vous qu’un processus nommé PlaylistBroadcaster est exécuté sur l’ordinateur serveur. Si tel est le cas, arrêtez la diffusion, supprimez du répertoire de données du serveur de diffusion le fichier SDP relatif à la diffusion, puis redémarrez cette dernière. Un nouveau fichier SDP est généré lorsque vous redémarrez la diffusion. Les fichiers multimédia ne sont pas diffusés correctement Essayez de diffuser un échantillon de séquence afin de déterminer si le serveur y parvient. Des échantillons sont fournis avec le serveur. Si le serveur diffuse l’échantillon, le problème provient peut-être de la préparation de votre fichier de film. Recréez le film. Si l’échantillon n’est pas diffusé, le problème provient peut-être de l’ordinateur serveur ou du réseau. Vérifiez les éléments suivants :  Vérifiez l’activité du serveur de diffusion et, si nécessaire, réduisez le nombre maximal de connexions ou le débit.40 Chapitre 4 Dépannage et informations techniques  Si le problème se produit sur un ordinateur client, assurez-vous que l’utilisateur dispose des réglages Proxy et Transport de diffusion en continu appropriés. L’administrateur du réseau de l’ordinateur client doit pouvoir fournir les réglages corrects.  Assurez-vous que le logiciel client gère le format de fichier diffusé.  Vérifiez la structure de l’URL.  Vérifiez la liste de lecture. Si vous avez créé une liste de lecture en boucle contenant des fichiers MPEG-1 QuickTime à indices, les clients QuickTime risquent de rencontrer des problèmes pour visualiser le flux. Les utilisateurs ne peuvent pas se connecter à votre diffusion Assurez-vous que QuickTime 4 (ou une version ultérieure) est installé sur l’ordinateur client. Si les utilisateurs se connectent via un navigateur Web, assurez-vous que le plugin QuickTime 4 est installé correctement. Considérez également les éléments suivants :  Assurez-vous que les utilisateurs disposent de l’URL correcte.  Si les utilisateurs tentent de se connecter à votre diffusion via HTTP, veillez à désactiver tout serveur Web susceptible d’entrer en conflit avec votre serveur de diffusion. Par ailleurs, assurez-vous que la diffusion en continu sur le port 80 est activée dans la sous-fenêtre Réglages généraux d’Admin Serveur QTSS. Les utilisateurs reçoivent des messages d’erreur lors de la diffusion de données Voici la signification des messages :  Code d’erreur 401 : l’utilisateur a tenté d’accéder à un fichier protégé. La mise à niveau vers QuickTime 5 ou une version ultérieure peut s’avérer nécessaire.  Code d’erreur 404 : le serveur ne peut pas localiser l’URL saisie par l’utilisateur. Assurez-vous que les utilisateurs saisissent l’URL appropriée pour la diffusion. Conseillez aux utilisateurs de ne pas saisir une URL RTSP dans l’adresse d’emplacement du navigateur web. Les URL RTSP sont utilisées uniquement avec la commande Ouvrir l’URL de QuickTime Player.  Code d’erreur 415 : le fichier de film ne comporte pas d’indications ou dispose d’une ressource compressée. Vous devez réaffecter des indications au film à l’aide de la version Pro de QuickTime Player. Vous pouvez également essayer de diffuser de façon native des fichiers MP3 à la demande (c’est-à-dire sous forme de téléchargement HTTP). La gestion QTSS des flux MP3 concerne les flux en direct compatibles Shoutcast/Icecast (tels que ceux créés par une liste de lecture MP3) ou les flux en direct d’autres diffuseurs en direct compatibles MP3. Pour diffuser des fichiers MP3 individuels à la demande (plutôt que sous forme de flux en direct), hébergez simplement ces fichiers sur un serveur web.Chapitre 4 Dépannage et informations techniques 41  Code d’erreur 453 : le serveur est trop occupé pour que les utilisateurs puissent visualiser le flux. Les utilisateurs doivent réessayer plus tard. Vous pouvez augmenter le nombre maximal de connexions dans la sous-fenêtre Réglages généraux d’Admin Serveur QTSS.  Code d’erreur 454 : la connexion au serveur a été interrompue. Les utilisateurs doivent relancer la visualisation du flux. Vérifiez si le serveur se trouve derrière un coupefeu ou si le client utilise un logiciel de traduction d’adresses réseau (NAT). Consultez « Diffusion de flux à travers des coupe-feu via le port 80 » à la page 31 et « Diffusion à travers des coupe-feu ou des réseaux avec traduction d’adresses » à la page 32.  Code d’erreur 5420 : le serveur n’est peut-être pas en cours d’exécution. Vérifiez-le puis redémarrez-le si nécessaire. Vérifiez si le serveur se trouve derrière un coupe-feu ou si le client utilise un logiciel de traduction d’adresses réseau (NAT). Consultez les sections « Diffusion de flux à travers des coupe-feu via le port 80 » à la page 31 et « Diffusion à travers des coupe-feu ou des réseaux avec traduction d’adresses » à la page 32.5 43 5 Utilisation de QuickTime Broadcaster Ce chapitre explique le fonctionnement de QuickTime Broadcaster, le logiciel d’encodage en direct maintes fois récompensé d’Apple pour la diffusion d’événements en direct de qualité professionnelle. QuickTime Broadcaster tire pleinement parti de QuickTime, la plus puissante technologie multimédia numérique sur Internet. QuickTime Broadcaster, QuickTime Streaming Server (QTSS) et QuickTime composent le premier système de diffusion Internet intégral basé sur le format MPEG-4 du marché, ce qui vous permet d’atteindre le nombre sans cesse croissant des utilisateurs de QuickTime Player, mais aussi tout lecteur MPEG-4 compatible ISO. QuickTime Broadcaster fournit une présentation basique incluant des préréglages pour les configurations de diffusion les plus courantes, qui permet de démarrer la diffusion en quelques clics. Vous pouvez aussi personnaliser vos propres réglages dans la vue développée, puis les enregistrer et les partager avec d’autres. Quand utiliser un serveur de diffusion Pour envoyer votre contenu sur Internet ou à plusieurs personnes sur un réseau local sur lequel la multidiffusion n’a pas été activée, vous avez besoin d’un serveur de diffusion. Le serveur de diffusion réplique le flux unique à partir de QuickTime Broadcaster et autorise plusieurs lecteurs QuickTime Player à se connecter à la diffusion. Vous pouvez utiliser QuickTime Broadcaster sans serveur de diffusion pour envoyer votre contenu vers un seul spectateur (équipé de QuickTime Player), ou vers plusieurs spectateurs à l’aide du mode de transmission en multidiffusion.44 Chapitre 5 Utilisation de QuickTime Broadcaster Configuration de votre premier flux Vous pouvez configurer votre premier flux et le diffuser en moins de cinq minutes. Les instructions suivantes permettent de configurer une connexion directe un à un (sans utiliser QTSS ni aucun autre logiciel de diffusion en continu) vers un ordinateur doté de QuickTime Player. Vous devez connaître l’adresse IP de l’ordinateur destinataire. 1 Connectez un caméscope ou un autre appareil d’entrée vidéo à votre ordinateur. 2 Ouvrez QuickTime Broadcaster et, si la fenêtre développée est ouverte, cliquez sur Masquer les détails. 3 Choisissez les options dans les menus locaux Audio et Vidéo les plus proches de votre situation. 4 Cliquez sur Afficher les détails, sur Réseau, puis choisissez Monodiffusion manuelle dans le menu local Transmission. 5 Dans le champ Adresse, saisissez l’adresse IP de l’ordinateur destinataire. Pour les autres réglages, conservez les valeurs par défaut. 6 Dans QuickTime Broadcaster, choisissez Fichier > Exporter SDP. Le fichier enregistré dans cette étape est le fichier SDP (Session Description Protocol), qui contient des informations dont votre public aura besoin pour regarder votre diffusion. 7 Envoyez ou copiez le fichier SDP vers l’ordinateur qui sera utilisé pour visualiser votre contenu. 8 Sur l’ordinateur expéditeur, démarrez la diffusion en cliquant sur Diffuser dans la fenêtre QuickTime Broadcaster. Pour visualiser le contenu, double-cliquez sur le fichier SDP sur l’ordinateur destinataire. Configuration de QuickTime Broadcaster Dans cet exemple, QuickTime Broadcaster est installé sur un ordinateur portable. Connectez un caméscope FireWire à l’ordinateur portable, mettez le caméscope sous tension et vérifiez que QuickTime Broadcaster le reconnaît. 1 Ouvrez QuickTime Broadcaster et cliquez sur Afficher les détails. 2 Cliquez sur Vidéo et sélectionnez une source vidéo dans le menu local Source. Si le caméscope est reconnu, il apparaît dans le menu Source. Les réglages vidéo doivent être actifs également (non estompés).Chapitre 5 Utilisation de QuickTime Broadcaster 45 Si le caméscope n’apparaît pas dans le menu Source, quittez QuickTime Broadcaster, assurez-vous que le caméscope est connecté et sous tension, puis ouvrez de nouveau QuickTime Broadcaster. Si votre caméscope n’apparaît toujours pas, consultez le site web de QuickTime ou le site web d’assistance et de support AppleCare pour en savoir plus sur la compatibilité et les autres problèmes. En cas de diffusion vers QTSS situé sur un autre ordinateur, comme dans notre exemple, il est recommandé d’utiliser la méthode de transmission Monodiffusion automatique (Annonce). Elle est simple à configurer. 3 Dans QuickTime Broadcaster, cliquez sur Afficher les détails, sur Réseau, puis choisissez Monodiffusion automatique (Annonce) dans le menu local Transmission. 4 Dans la sous-fenêtre Réseau, tapez l’adresse IP ou le nom d’hôte de l’ordinateur destinataire, un nom pour le fichier diffusé, le nom d’utilisateur et le mot de passe de l’utilisateur de QuickTime Broadcaster, ainsi que la durée de mise en mémoire tampon (ou acceptez la valeur par défaut). Remarque : la durée de mise en mémoire tampon fixe le nombre de secondes pendant lesquelles QuickTime place la diffusion en mémoire tampon avant la lecture. Pour les connexions haut débit, QuickTime Player 6 (ou ultérieur) remplit la mémoire tampon plus rapidement que le temps réel, ce qui permet la visualisation en mode Lecture instantanée. 5 Cliquez sur Diffusion et démarrez QTSS (s’il n’est pas déjà en cours d’exécution) en sélectionnant l’ordinateur dans Admin Serveur, en cliquant sur Enchaînement QuickTime, puis en cliquant sur Démarrer le service. Pour déterminer si le flux en direct peut être visualisé sur un client, ouvrez QuickTime Player sur un ordinateur client et choisissez Fichier > Ouvrir l’URL dans un nouveau lecteur. 6 Tapez l’URL RTSP (Real-Time Streaming Protocol) affichée dans la section Emplacement de la fenêtre QuickTime Broadcaster (par exemple, rtsp://monserveur.com/monflux.sdp). Remarque : l’URL reconnaît les majuscules et minuscules et doit être saisie exactement comme dans la fenêtre de QuickTime Broadcaster. La lecture du flux en direct doit alors commencer dans QuickTime Player. 7 Testez la configuration. Ce test doit être le plus réaliste possible. Testez les éléments suivants :  Configurez votre équipement tel qu’il sera utilisé pour la présentation réelle, si possible au même emplacement.  Demandez à un collègue de jouer le rôle du présentateur, ou mieux, demandez au présentateur de participer au test, afin d’en faire une répétition.  Vérifiez l’image vidéo et le son.  Vérifiez que les clients du réseau local et d’Internet peuvent se connecter au flux en direct.46 Chapitre 5 Utilisation de QuickTime Broadcaster  Ajustez si nécessaire la position du caméscope et du microphone, ainsi que l’éclairage, et résolvez les autres problèmes éventuels. Choix d’une méthode de diffusion La méthode de diffusion que vous choisissez dépend de la taille de l’audience prévue :  Lorsque vous diffusez un événement en direct vers un seul spectateur, vous pouvez utiliser QuickTime Broadcaster sur Mac OS X ; vous n’avez pas besoin d’un logiciel serveur. L’envoi de contenu vers un seul destinataire est appelé monodiffusion. La monodiffusion est la méthode de diffusion générale sur Internet la plus courante. Le destinataire de la monodiffusion doit être équipé d’un ordinateur sur lequel QuickTime Player, QuickTime Streaming Server (QTSS) ou Darwin Streaming Server est installé. Si le destinataire est doté d’un logiciel serveur, le serveur peut transfé- rer votre diffusion vers plusieurs spectateurs.  Pour un public de quelques centaines d’utilisateurs connectés, un seul ordinateur Mac peut exécuter à la fois QuickTime Broadcaster et QTSS. QuickTime Broadcaster envoie le flux vers QTSS, qui renvoie ensuite le flux vers un groupe de clients. Le nombre de clients pouvant se connecter à la diffusion dépend de la bande passante disponible et de la capacité du processeur. Une configuration Mac Pro classique prend en charge au moins 200 connexions DSL ou 400 connexions commutées. Cette configuration convient bien aux cours en ligne, aux conférences ou à d’autres événements dont l’audience est limitée.  Si votre contenu doit être visualisé par un grand nombre de personnes, utilisez deux ordinateurs, l’un avec QuickTime Broadcaster pour diffuser le flux, l’autre avec QTSS pour diffuser le flux à de multiples spectateurs.  Si vous êtes sur un réseau sur lequel la multidiffusion est activée, vous pouvez atteindre plusieurs spectateurs via une multidiffusion de votre contenu. La multidiffusion est une méthode de diffusion sur un réseau local (et non sur Internet) utilisant un seul flux qui est partagé entre tous les spectateurs de la diffusion. Chaque spectateur se branche sur la diffusion comme une radio se branche sur une bande d’émission FM. Sélection des réglages de compression QuickTime Broadcaster fournit une large gamme de codecs audio et vidéo pour la compression et la diffusion en continu en temps réel. Cette section vous aide à sélectionner les codecs les mieux adaptés à votre situation. En général, il est préférable de définir les options audio avant les réglages vidéo. Dans QuickTime Broadcaster, vous pouvez choisir n’importe quel compresseur parmi ceux fournis avec QuickTime. Cela vous permet de sélectionner le codec le mieux adapté au type de contenu en cours de diffusion et aux connexions de vos spectateurs.Chapitre 5 Utilisation de QuickTime Broadcaster 47 Pour les débutants, QuickTime Broadcaster inclut des réglages par défaut (des préréglages) optimisés pour les types de contenu et de connexions les plus courants. Par exemple, le réglage par défaut pour la parole est l’audio MPEG-4 (AAC) à 8 kHz mono. Si l’audio MPEG-4 est généralement considéré comme un codec destiné à la musique, il fonctionne également bien pour le contenu parlé. Vous pouvez également créer vos propres réglages dans la sous-fenêtre Audio de QuickTime Broadcaster. (Si vous ne voyez pas le bouton Audio, cliquez sur Afficher les détails.) Les réglages que vous créez peuvent être enregistrés pour une utilisation ultérieure et partagés avec d’autres pour les utiliser avec leurs diffusions. Pour de nombreux types de diffusion, choisissez les réglages vidéo après avoir déterminé la compression audio. La qualité vidéo est généralement moins importante que celle de l’audio, car un son haché ou confus est très difficile à comprendre et provoquera rapidement la frustration de votre public. Les réglages de compression vidéo pour une diffusion dépendent du type d’animation diffusée et de la bande passante disponible du côté des spectateurs. QuickTime Broadcaster fournit des réglages par défaut (préréglages) pour les situations les plus courantes. Par exemple, un contenu vidéo pour des clients situés sur un réseau local (LAN) utilise le codec H.264 avec une taille d’image de 480 x 360 à la fréquence de 30 images par seconde (ips), limitant ainsi le débit de données à 1 372 kilobits par seconde (kbps). Un contenu vidéo pour des clients sur des connexions commutées utilise le codec H.264 avec une taille d’image de 160 x 120 à la fréquence de 6 ips, limitant le débit de données à 30 Kbps. Création de préréglages Après avoir sélectionné un compresseur à utiliser pour l’audio ou la vidéo, vous pouvez affiner vos résultats en sélectionnant des options supplémentaires. Pour la plupart des compresseurs audio, vous pouvez ajuster la fréquence d’échantillonnage ou opter pour un son mono ou stéréo. Bon nombre de compresseurs vidéo vous permettent de définir des fréquences d’images et des réglages d’images clés. Pour déterminer si vous pouvez personnaliser des réglages de codec : m Dans la sous-fenêtre Vidéo de QuickTime Broadcaster, cliquez sur le bouton Options à côté du nom du compresseur. Si le bouton est estompé, aucun autre réglage n’est disponible. Qu’est-ce qu’un fichier SDP ? Un fichier SDP (Session Description Protocol) décrit les paramètres et les réglages d’une diffusion, activant ainsi la réception du contenu par QuickTime Player. Pour visionner une diffusion, ouvrez le fichier SDP à l’aide de QuickTime Player.48 Chapitre 5 Utilisation de QuickTime Broadcaster Vous pouvez créer un fichier SDP pour n’importe laquelle des trois options de transport suivantes :  Monodiffusion automatique (Annonce) : le fichier SDP peut être créé automatiquement sur un serveur QuickTime Streaming Server spécifié. L’adresse de l’emplacement apparaît uniquement dans ce cas.  Monodiffusion manuelle : le fichier SDP est placé sur un serveur de diffusion ou est ouvert directement dans QuickTime Player.  Multidiffusion : le fichier SDP est ouvert manuellement dans QuickTime Player. Pour créer un fichier SDP : m Dans QuickTime Broadcaster, choisissez Fichier > Exporter > SDP. Vous pouvez envoyer le fichier SDP vers un seul spectateur ou vers un serveur de diffusion permettant à plusieurs spectateurs de se connecter à la diffusion. Sélection des réglages réseau Une diffusion en continu réussie requiert une bonne coordination entre les réglages de codec et les réglages réseau. Si vous choisissez un codec haut débit pour être utilisé sur une connexion lente, vous risquez de rencontrer des problèmes de visualisation. Utilisez cette section pour vous aider à choisir les réglages réseau de votre diffusion et comme point de départ pour le réglage des paramètres selon vos besoins. Utilisation de la méthode Monodiffusion automatique (Annonce) Vous pouvez utiliser QuickTime Broadcaster pour diffuser vers QTSS à l’aide de la méthode de transmission Monodiffusion automatique (Annonce). Pour cela, vous avez besoin des éléments suivants :  Un compte utilisateur QuickTime Broadcaster. QuickTime Broadcaster vous demande le nom d’utilisateur et le mot de passe du compte, pour autoriser la création d’un fichier SDP sur le serveur de diffusion. Si vous utilisez QuickTime Broadcaster et QTSS sur le même ordinateur, vous n’avez pas besoin de compte utilisateur QuickTime Broadcaster.  QTSS 4.0 (ou une version ultérieure) installé sur le serveur de diffusion. Pour démarrer une diffusion de type Monodiffusion automatique : 1 Dans QuickTime Broadcaster, cliquez sur Afficher les détails (si la fenêtre développée n’est pas ouverte) puis cliquez sur Réseau. 2 Choisissez Monodiffusion automatique (Annonce) dans le menu local Transmission. 3 Saisissez l’adresse IP ou le nom d’hôte du serveur destinataire, le nom du fichier diffusé, le nom d’utilisateur et le mot de passe du compte utilisateur du serveur de diffusion (le cas échéant) et la durée de mise en mémoire tampon (ou acceptez les réglages par défaut).Chapitre 5 Utilisation de QuickTime Broadcaster 49 4 Cliquez sur Diffuser. Toutes les informations sont envoyées vers le serveur. Vous n’avez pas besoin de créer de fichier SDP. Utilisation de la méthode Monodiffusion manuelle La monodiffusion manuelle est une méthode de diffusion qui requiert que vous exportiez un fichier SDP de QuickTime Broadcaster vers un ordinateur destinataire identifié par son adresse IP. L’application destinataire peut être un simple lecteur QuickTime Player, QTSS ou Darwin Streaming Server (DSS). Si l’application destinataire est QTSS ou DSS, la diffusion est répétée et n’est plus limitée à une seule adresse IP. Pour une diffusion via la méthode Monodiffusion manuelle : 1 Dans QuickTime Broadcaster, si la fenêtre développée n’est pas ouverte, cliquez sur Afficher les détails. 2 Cliquez sur Réseau. 3 Choisissez une option dans le menu local Préréglage. 4 Choisissez Monodiffusion manuelle dans le menu local Transmission. 5 Saisissez l’adresse IP de l’ordinateur destinataire. Pour afficher l’adresse IP d’un ordinateur sous Mac OS X, ouvrez Préférences Système, cliquez sur Réseau, puis choisissez une option dans le menu local Afficher. Sur un ordinateur Windows, ouvrez le Panneau de configuration, puis ouvrez Connexions réseau. 6 Saisissez les numéros du port audio et du port vidéo (ou acceptez les numéros par défaut si vous effectuez une diffusion de un à un) et la durée de mise en mémoire tampon (ou acceptez la durée par défaut). 7 Si vous le souhaitez, saisissez des informations dans la rubrique Notes. 8 Cliquez sur Diffuser. 9 Choisissez Fichier > Exporter > SDP ou Fichier > Exporter > Film. 10 Spécifiez un nom pour le fichier SDP ou le film et cliquez sur Exporter. Si le fichier est exporté vers QuickTime Player, l’utilisateur ouvre le fichier en choisissant Fichier > Ouverture de fichiers. Si le fichier est exporté vers QTSS ou DSS, l’utilisateur choisit Fichier > Ouvrir l’URL. Consultez votre administrateur QTSS ou DSS pour connaître l’adresse URL correcte. Utilisation de la méthode Multidiffusion La multidiffusion est une méthode de diffusion sur un réseau local (et non sur Internet) utilisant un seul flux qui est partagé entre tous les spectateurs de la diffusion. Chaque spectateur se branche sur la diffusion comme une radio se branche sur une bande d’émission FM.50 Chapitre 5 Utilisation de QuickTime Broadcaster La multidiffusion requiert un réseau ayant accès à une dorsale de multidiffusion (MBone) ou sur lequel la multidiffusion est activée. Vous pouvez effectuer une multidiffusion sur un réseau local si la multidiffusion y est activée. Contactez votre administrateur réseau pour savoir si votre réseau prend en charge la multidiffusion. Pour diffuser sur un réseau local à l’aide de la méthode de multidiffusion : 1 Dans QuickTime Broadcaster, si la fenêtre développée n’est pas ouverte, cliquez sur Afficher les détails. 2 Cliquez sur Réseau. 3 Choisissez Multidiffusion dans le menu local Transmission. 4 Cliquez sur Créer une adresse IP. Ainsi, l’adresse IP que vous utilisez pour envoyer la multidiffusion est saisie. Une adresse est créée dans une plage réservée aux multidiffusions. Si votre administrateur réseau a affecté des adresses de multidiffusion spécifiques, vous pouvez saisir une adresse manuellement. 5 Spécifiez un réglage de durée de vie (TTL) ou acceptez le réglage par défaut. Ce réglage spécifie le nombre de fois qu’un flux multimédia peut être transféré d’un routeur vers un autre, avant que le flux ne cesse d’être transmis. La valeur peut être n’importe quel nombre compris entre 1 et 255. Une valeur de 1 atteint les ordinateurs client du réseau local. Plus le nombre est grand, plus la destination des paquets en multidiffusion est lointaine. 6 Choisissez Fichier > Exporter > SPD ou Fichier > Exporter > Film. Ainsi, vous créez un fichier SDP (session description protocol) ou un fichier de séquence QuickTime, que vous pouvez envoyer à d’autres personnes. Pour visualiser la diffusion, double-cliquez sur le fichier SDP ou utilisez QuickTime Player pour ouvrir le fichier de séquence. Aperçu de votre diffusion Vous pouvez afficher un aperçu de votre diffusion dans la fenêtre de QuickTime Broadcaster, avec ou sans compression. Vous pouvez également désactiver la fonction d’aperçu. Choisissez parmi les options suivantes :  Pour afficher un aperçu de votre diffusion depuis la source, choisissez Source dans le menu local Aperçu (au-dessus de la zone d’aperçu vidéo).  Pour afficher un aperçu de votre diffusion avec compression, choisissez Compresser dans le menu local Aperçu, puis faites votre sélection parmi les préréglages proposés dans les menus locaux Audio et Vidéo. (Si aucun menu local n’apparaît sous la zone d’aperçu, cliquez sur Masquer les détails.) Sinon, cliquez sur Afficher les détails. Dans les sous-fenêtres Audio et Vidéo, choisissez les préréglages des menus locaux Préréglage ou spécifiez des réglages de compression personnalisés. Dans la sous-fenêtre Vidéo, réglez le curseur Qualité pour obtenir une meilleure image.Chapitre 5 Utilisation de QuickTime Broadcaster 51  Pour désactiver la fonction d’aperçu, choisissez Aucun dans le menu local Aperçu. L’aperçu vous montre la façon dont la diffusion apparaît dans des conditions idéales. Il ne prend pas en compte les temps d’attente éventuels du réseau ou les limites de bande passante. Configuration d’une diffusion audio uniquement Vous pouvez utiliser QuickTime Broadcaster pour diffuser du contenu audio tel qu’un concert, un discours ou une réunion. QuickTime Broadcaster fonctionne avec :  le son issu de votre caméscope DV ou d’un autre appareil FireWire ;  un lecteur CD externe (pas interne) ;  un microphone ou une autre source audio analogique connectée aux ports d’entrée audio de votre ordinateur ou à un appareil d’entrée audio USB, comme le Griffin iMic. Pour configurer une diffusion audio : 1 Dans la fenêtre de QuickTime Broadcaster, cliquez sur Afficher les détails (si la fenêtre développée n’est pas ouverte) et cliquez sur Audio. 2 Choisissez une source audio dans le menu local Source. Si votre source audio n’apparaît pas dans le menu, quittez QuickTime Broadcaster, assurez-vous que votre équipement est connecté et sous tension, puis réessayez. 3 Choisissez un réglage de compression adapté dans le menu local Préréglage ou spécifiez des réglages personnalisés. 4 Cliquez sur Vidéo et assurez-vous que l’option « Activer le flux vidéo » n’est pas sélectionnée (ce qui désactive le flux vidéo). Si l’audio comporte des commentaires ou que vous ne souhaitez pas les écouter, vous pouvez les désactiver en décochant la case « Haut-parleur » dans la sous-fenêtre Audio. Changement de source audio QuickTime Broadcaster fonctionne avec l’audio d’un caméscope DV ou d’une webcam iSight d’Apple, les ports d’entrée audio de votre ordinateur et les appareils d’entrée audio USB tels que le Griffin iMic. Pour choisir une source audio : 1 Dans la fenêtre de QuickTime Broadcaster, cliquez sur Afficher les détails (si la fenêtre développée n’est pas ouverte) et cliquez sur Audio. 2 Choisissez une source audio dans le menu local Source.52 Chapitre 5 Utilisation de QuickTime Broadcaster Si une source audio est branchée et fournit une entrée, vous devriez entendre du son via l’ordinateur (si l’option « Haut-parleur » de la sous-fenêtre Audio est cochée) et les réglages audio devraient être disponibles (non estompés). Si votre source audio n’apparaît pas dans le menu local Source, quittez QuickTime Broadcaster, assurez-vous que votre équipement est connecté et sous tension, puis réessayez. Ajout de notes à votre diffusion Vous pouvez ajouter un titre, une note de droits d’auteur et d’autres annotations à votre diffusion. Pour ajouter des notes : 1 Dans QuickTime Broadcaster, cliquez sur Réseau. Si vous ne voyez pas le bouton Réseau, cliquez sur Afficher les détails. 2 Sous Notes, remplissez les champs souhaités. Votre public peut consulter ces informations en choisissant Fenêtre > Afficher les informations de la séquence dans QuickTime Player. (Les spectateurs qui ne possèdent pas QuickTime Pro ne voient que les trois premières annotations.) Ajout d’indices à un fichier de séquence Vous pouvez enregistrer une copie compressée avec indices de votre diffusion sous la forme d’un fichier de séquence. La séquence est enregistrée sur l’ordinateur à partir duquel vous effectuez la diffusion et est prête à être envoyée vers un serveur de diffusion QuickTime pour que les spectateurs puissent voir une rediffusion de l’événement. Pour enregistrer votre diffusion et ajouter des indices à un fichier de séquence : 1 Choisissez QuickTime Broadcaster > Préférences. 2 Dans le champ Enregistrement, spécifiez un chemin (ou cliquez sur Choisir pour choisir un emplacement) vers lequel stocker votre fichier de diffusion. 3 Sélectionnez « Indice pour le serveur de diffusion ». Cette option ajoute une piste d’indices contenant des informations nécessaires pour diffuser votre séquence. 4 Saisissez un nom pour votre séquence et cliquez sur OK. 5 Dans la fenêtre de QuickTime Broadcaster, sélectionnez « Enreg. sur le disque ». 6 Cliquez sur Diffuser. Remarque : l’archive d’une diffusion peut utiliser une grande quantité d’espace disque. Si la diffusion dure plusieurs heures, plusieurs fichiers .mov seront créés. Si tel est le cas, les fichiers sont numérotés en ordre séquentiel (monfilm.mov, monfilm2.mov, etc. par exemple).Chapitre 5 Utilisation de QuickTime Broadcaster 53 Enregistrement de réglages à l’aide de préréglages Vous pouvez enregistrer vos réglages audio, vidéo et réseau afin de les réutiliser ultérieurement. Pour créer un préréglage : 1 Dans QuickTime Broadcaster, choisissez les réglages dans les sous-fenêtres Audio, Vidéo et Réseau. Si vous ne voyez pas ces sous-fenêtres, cliquez sur Afficher les détails. 2 Choisissez Enregistrer ce préréglage dans le menu local Préréglage. 3 Pour réutiliser ces réglages, choisissez votre préréglage dans le menu local Préréglage de chaque sous-fenêtre (Audio, Vidéo ou Réseau). 4 Pour transférer vos préréglages vers un autre ordinateur, choisissez QuickTime Broadcaster > Préférences et saisissez un chemin dans le champ Répertoire des préréglages (ou cliquez sur Choisir et sélectionnez une destination). Remarque : les préréglages doivent être situés dans ~/Library/QuickTime Broadcaster. Les autres personnes utilisant vos préréglages doivent placer leurs fichiers au même emplacement sur leurs ordinateurs. Modification de la taille de l’image de diffusion Vous pouvez modifier la taille de l’image visualisée par votre public. Les grandes tailles d’images sont souvent souhaitables mais elles requièrent plus de bande passante t peuvent être trop exigeantes pour des ordinateurs plus lents (expéditeurs de la diffusion et destinataires). Si le son est plus important que la vidéo dans votre diffusion (diffusion d’un concert ou d’une conférence, par exemple), pensez à réduire la taille d’image pour allouer plus de bande passante à l’audio. Pour modifier la taille de l’image vidéo, votre public reçoit : 1 Dans la fenêtre de QuickTime Broadcaster, cliquez sur Afficher les détails (si la fenêtre développée n’est pas ouverte) et cliquez sur Vidéo. 2 Dans la zone Compression, saisissez des nouvelles valeurs dans les champs Largeur et Hauteur. Cette procédure n’affecte pas la taille de l’image Aperçu dans QuickTime Broadcaster. Changement de source vidéo QuickTime Broadcaster fonctionne avec les caméscopes DV, les webcams iSight Apple, les caméscopes IIDC (pris en charge uniquement dans Mac OS X 10.2 et versions ulté- rieures) et d’autres sources DV (telles que les boîtiers de conversion analogique/DV) que vous pouvez connecter à votre ordinateur via l’interface FireWire.54 Chapitre 5 Utilisation de QuickTime Broadcaster Pour choisir la source vidéo : 1 Dans la fenêtre de QuickTime Broadcaster, cliquez sur Afficher les détails (si la fenêtre développée n’est pas ouverte) et cliquez sur Vidéo. 2 Choisissez une option dans le menu local Source. Si une source vidéo est connectée et fournit une entrée, elle devrait apparaître dans le menu Source et une image d’aperçu devrait s’afficher (si la fonction d’aperçu est activée). Les réglages vidéo devraient également être disponibles (non estompés). Si votre appareil d’entrée n’apparaît pas dans le menu Source, quittez QuickTime Broadcaster, vérifiez que votre appareil d’entrée est connecté et sous tension, puis ouvrez QuickTime Broadcaster à nouveau. Si votre appareil d’entrée n’apparaît toujours pas, il se peut qu’il soit incompatible avec QuickTime Broadcaster. Choix de l’assembleur de paquets Dans la plupart des cas, les réglages de l’assembleur de paquets par défaut pour chaque compresseur n’ont pas besoin d’être modifiés. Si vous connaissez le protocole RTP et souhaitez affiner les réglages de l’assembleur de paquets, vous pouvez modifier les réglages en cliquant sur le bouton Assembleur de paquets dans les sous-fenêtres Audio et Vidéo et en saisissant des valeurs dans les zones de dialogue qui apparaissent :  Dans le cas d’une diffusion AAC vers des téléphones portables, changez l’assembleur de paquets sur MPEG-4 LATM Audio.  Pour une diffusion H.263 vers des téléphones portables, changez l’assembleur de paquets vidéo sur H.263 3GPP. Enregistrement de réglages de diffusion Avec QuickTime Broadcaster, vous pouvez créer vos réglages de diffusion personnalisés et les enregistrer sous des documents pour les utiliser ultérieurement ou les partager avec d’autres personnes. Pour enregistrer un réglage de diffusion personnalisé : 1 Choisissez vos réglages audio, vidéo et réseau. 2 Choisissez Fichier > Enregistrer les réglages de diffusion sous. 3 Spécifiez un nom de fichier et un emplacement. Le fichier que vous enregistrez aura pour extension .qtbr. Une fois le fichier enregistré, double-cliquez sur son icône pour ouvrir QuickTime Broadcaster (si l’application est installée) avec les réglages personnalisés en place. Vous pouvez ensuite cliquer sur Diffuser pour commencer la diffusion.Chapitre 5 Utilisation de QuickTime Broadcaster 55 Diffusion vers des téléphones portables QuickTime Broadcaster inclut la prise en charge de la diffusion vers des téléphones portables compatibles. Il inclut également des préréglages pour les réglages classiques utilisés lors de la diffusion vers des téléphones portables. Pour créer des réglages personnalisés pour une diffusion en continu vers des téléphones portables, contactez le fabricant du téléphone pour déterminer le codec audio et vidéo pris en charge. Généralement, les téléphones multimédia prennent en charge la vidéo MPEG-4 et H.263 et l’audio AAC, AMR ou QCELP. À propos des coupe-feu Les coupe-feu de réseau, qui protègent les réseaux internes d’attaques extérieures, peuvent interférer avec votre capacité à envoyer et à recevoir des diffusions. Si vous effectuez une diffusion, contactez votre administrateur réseau pour vous assurer que les ports sortants sont ouverts pour votre diffusion. De nombreux fournisseurs d’accès à Internet et réseaux d’entreprise bloquent ces ports pour limiter l’utilisation de bande passante et renforcer la sécurité. Lorsque vous envoyez une diffusion, QuickTime Broadcaster utilise les ports suivants par défaut :  Monodiffusion automatique (Annonce) : 554.  Monodiffusion manuelle : saisissez les informations de port dans la sous-fenêtre Réseau. Pour modifier un numéro de port, ajoutez deux points et le numéro de port à la fin de l’adresse IP. 127.0.0.1:7070, par exemple. Les personnes situées derrière un coupe-feu sont susceptibles de visualiser votre diffusion en ajustant les réglages réseau dans les préférences de QuickTime ou en configurant l’utilisation d’un serveur proxy dans les préférences Réseau. Limitation de l’accès à votre diffusion Pour limiter le nombre de spectateurs de votre diffusion, vous pouvez intégrer le film de diffusion dans une page web et contrôler l’accès à la page HTML à l’aide des réglages de sécurité de votre serveur web. Si vous distribuez le fichier SDP ou le film d’annonce de diffusion, toute personne qui obtient le fichier peut visualiser le flux, à moins que vous ne diffusiez derrière un coupe-feu. Si la diffusion est une monodiffusion manuelle, seul l’ordinateur avec l’adresse IP spécifiée peut se connecter.56 Chapitre 5 Utilisation de QuickTime Broadcaster Conseils et dépannage Les conseils qui suivent vous aideront à tirer le meilleur parti de QuickTime Broadcaster. Je suis invité à saisir un mot de passe Lorsque vous diffusez vers QTSS ou DSS via la méthode Monodiffusion automatique (Annonce), vous devez fournir un nom d’utilisateur et un mot de passe pour qu’un compte utilisateur et un fichier de diffusion puissent être créés sur l’ordinateur serveur de diffusion. Pour savoir comment créer un compte utilisateur spécial, consultez l’Aide de QTSS ou de DSS. Le nom d’utilisateur et le mot de passe requis pour une monodiffusion automatique ne sont pas les mêmes que ceux utilisés pour l’utilitaire d’administration web du serveur de diffusion. Utilisation optimisée de la bande passante disponible Lorsque vous configurez votre diffusion, prenez en compte les éléments suivants :  La vitesse de chargement lors d’une diffusion. La plupart des fournisseurs d’accès à Internet limitent la vitesse de chargement entre 128 kilobits par seconde et 256 Kbps. Ce qui signifie que le débit de données total pour votre diffusion (audio et vidéo) ne doit pas dépasser votre vitesse de chargement. En réalité, définissez-la sur une valeur largement inférieure à votre vitesse de chargement pour éviter tout risque de congestion du réseau.  La vitesse de connexions réseau de vos spectateurs. Par exemple, si les spectateurs se connectent à l’aide de modems 56K, vous aurez certainement intérêt à limiter le débit de données total de votre diffusion à 33 Kbps. Les spectateurs bénéficiant de connexions plus rapides peuvent gérer des débits supérieurs, mais même pour ceux disposant d’un accès à Internet de type T1, il est préférable de limiter le débit de données de votre diffusion à 410 Kbps. (Ces chiffres sont des estimations.)  La façon dont l’ordinateur serveur de diffusion ou de diffusion en continu est connecté au réseau et le nombre attendu de spectateurs. Si l’ordinateur serveur de diffusion en continu est sur une ligne T1, un maximum d’environ 25 spectateurs peuvent se connecter à votre diffusion en utilisant des modems commutés 56K. Conseils pour le choix des réglages de compression vidéo Pour de nombreux types de diffusion, choisissez les réglages vidéo après avoir déterminé la compression audio. La qualité vidéo est généralement moins importante que celle de l’audio, car un son haché ou confus est très difficile à comprendre et provoquera rapidement la frustration de votre public. Les réglages de compression vidéo pour une diffusion dépendent largement du type de vidéo diffusée et de la bande passante disponible du côté des spectateurs. QuickTime Broadcaster fournit des réglages par défaut (préréglages) pour les situations les plus courantes.Chapitre 5 Utilisation de QuickTime Broadcaster 57 Par exemple, un contenu vidéo pour des clients situés sur un réseau local (LAN) utilise le codec H.264 avec une taille d’image de 480 x 360 à la fréquence de 30 images par seconde (ips), limitant ainsi le débit de données à 1 372 kilobits par seconde. Un contenu vidéo pour des clients sur des connexions commutées utilise le codec H.264 avec une taille d’image de 160 x 120 à la fréquence de 6 ips, limitant le débit de données à 30 Kbps. Conseils pour le choix des réglages de compression audio En général, il est préférable de définir les options audio avant les réglages vidéo. Dans QuickTime Broadcaster, vous pouvez choisir n’importe quel codec fourni avec QuickTime. Cela vous permet de sélectionner le codec le mieux adapté au type de contenu en cours de diffusion et aux connexions de vos spectateurs. Pour les débutants, QuickTime Broadcaster inclut des réglages par défaut (préréglages) optimisés pour les types de contenu et de connexions les plus courants. Par exemple, le réglage par défaut pour la parole est l’audio MPEG-4 (AAC) à 8 kHz mono. (Même si l’audio MPEG-4 est généralement considéré comme un codec destiné à la musique, il fonctionne également bien pour le contenu parlé.) Pour de l’audio contenant de la musique, le réglage par défaut est le format audio MPEG-4 (AAC) à 20 kilobits par seconde (Kbps) pour les utilisateurs avec une connexion commutée et 128 Kbps pour les utilisateurs d’un réseau local. Si la vidéo devient floue, hachée ou figée Si l’image de votre diffusion apparaît floue, hachée ou figée, il peut s’agir d’une prise de vue avec un caméscope sans mise au point, d’une congestion réseau ou de réglages de compression inadaptés. Pour améliorer la qualité de diffusion, essayez l’une ou plusieurs des opérations suivantes :  Effectuez la mise au point sur le caméscope.  Réduisez le nombre de spectateurs simultanés (à l’aide de la sous-fenêtre QTSS d’Admin Serveur).  Si un destinataire rencontre des problèmes d’images hachées en cours de lecture, ajustez le débit de données de diffusion.  Vérifiez que votre diffusion utilise un codec vidéo optimisé pour la diffusion, comme le codec H.264 ou MPEG-4.  Réduisez la fréquence d’images ou la taille d’image de la vidéo. Le meilleur moyen d’obtenir une diffusion de bonne qualité est de tester différents réglages avant la diffusion. Vous pourrez ainsi déterminer la combinaison de réglages optimale pour votre contenu spécifique et les vitesses de connexion de vos utilisateurs.58 Chapitre 5 Utilisation de QuickTime Broadcaster Automatisation de QuickTime Broadcaster avec AppleScript Vous pouvez utiliser AppleScript pour contrôler QuickTime Broadcaster. Par exemple, vous pouvez utiliser un script pour sélectionner les réglages à utiliser, pour déterminer l’état d’une diffusion et pour démarrer, arrêter ou mettre en pause un flux. Pour des informations détaillées sur les fonctionnalités d’AppleScript prises en charge par QuickTime Broadcaster, faites glisser l’icône de QuickTime Broadcaster sur celle de l’Éditeur de script dans /Applications/AppleScript/.6 59 6 Exemple de configuration Ce chapitre décrit les principaux composants requis pour une configuration générique de diffusion sur le Web, ainsi que la façon dont ils sont interconnectés. Les instructions de configuration qui suivent prennent en considération une configuration de type éducative (campus universitaire, par exemple), mais l’exemple peut s’adapter à plusieurs utilisations :  L’enseignement à distance.  Les communications d’entreprise à l’intention des employés, clients, fournisseurs ou actionnaires.  Un concert ou une présentation ponctuels.  La diffusion dans une crèche à l’intention des parents. Enchaînement de présentations, en direct et à la demande L’exemple de l’illustration suivante montre comment l’administrateur réseau d’une université peut configurer un serveur de diffusion et d’autres composants pour diffuser des pré- sentations, en direct et à la demande, aux étudiants qui utilisent des ordinateurs client connectés au réseau du campus et à Internet.60 Chapitre 6 Exemple de configuration Cette configuration permet aux étudiants qui ne peuvent pas se déplacer pour assister au cours de le visualiser en ligne. Elle permet également aux étudiants de revoir ulté- rieurement une partie du cours en visualisant une version archivée sur leur ordinateur. La configuration de cet exemple, illustrée ci-dessus, présente les caractéristiques suivantes :  Un réseau local existant doté de connexions Ethernet aux salles de cours et aux amphithéâtres à partir desquels les présentations en direct doivent être diffusées.  Un caméscope numérique DV et un microphone installés dans une salle de cours ou un amphithéâtre pour convertir la présentation en direct au format numérique. Le caméscope effectue un enregistrement DV haute qualité de la présentation et fournit le signal numérique qui sera codé pour la diffusion en direct.  Le caméscope numérique DV est connecté par l’intermédiaire d’un port FireWire à un ordinateur portable qui exécute QuickTime Broadcaster, lequel encode la présentation en direct numérisée et transmet le signal via une connexion Ethernet au serveur de diffusion sur le réseau du campus.  Un serveur de diffusion, tel qu’un serveur Xserve monté en rack, fonctionnant sans moniteur ni clavier. Le serveur exécute Mac OS X Server avec QTSS configuré pour transmettre la présentation encodée en direct sous forme de flux monodiffusion vers chaque ordinateur client (sur le réseau du campus ou sur Internet) qui se connecte à la diffusion. Le serveur Xserve est livré avec Mac OS X Server et QTSS préinstallés. Serveur de diffusion Broadcaster Internet Clients sur Internet Clients sur le réseau localChapitre 6 Exemple de configuration 61  Différents types d’ordinateur client disposant de QuickTime Player ou de tout autre logiciel compatible MPEG-4 pour accéder au serveur de diffusion Xserve via le réseau du campus. D’autres ordinateurs client peuvent accéder au serveur de diffusion via Internet.  L’ordinateur portable de diffusion qui exécute iMovie est utilisé pour produire des versions à la demande haute qualité de la présentation en direct une fois celle-ci terminée. La présentation numérisée enregistrée est transférée, via la connexion FireWire, du caméscope DV vers l’ordinateur afin d’y être compressée. Remarque : QuickTime Broadcaster peut être configuré pour enregistrer sur disque le flux en direct encodé en vue de son archivage. Pour un résultat optimal, il est cependant préférable que la séquence soit encodée séparément.  L’ordinateur portable de diffusion est également utilisé pour contrôler le serveur Xserve à distance via l’application Admin Serveur (ou via Admin Web, l’application d’administration QTSS basée sur le Web). Remarque : l’ordinateur portable peut également être connecté sans fil au réseau local via une borne d’accès AirPort pour une portabilité accrue. La borne d’accès AirPort est compatible avec la norme 802.11 et fonctionne bien avec QTSS. Sa bande passante est largement suffisante pour notre exemple de configuration, tant que d’autres clients n’imposent pas de charge importante sur la même borne d’accès. Configuration Les étapes ci-après montrent comment configurer le serveur QTSS et les autres composants requis pour la diffusion en direct et à la demande dans notre environnement universitaire hypothétique. Étape 1 : Préparation des lieux Une salle de cours standard n’offre pas un environnement de diffusion et d’enregistrement comparable à celui d’un studio professionnel de télévision ou d’enregistrement. Toutefois, les mesures suivantes permettent d’obtenir des résultats satisfaisants :  Rendez-vous dans la salle de classe que vous souhaitez utiliser pour la diffusion en direct, fermez les portes et essayez de détecter tout bruit qui risquerait d’interfé- rer avec une diffusion. Si vous remarquez du bruit provenant d’une pièce, d’une salle de jeu vidéo, du trafic dans la rue ou de toute autre source et que vous ne pouvez pas l’éliminer, trouvez une autre pièce.  S’il n’y a pas de problème de bruit, placez-vous au centre de la pièce, tapez dans vos mains ou criez, et déterminez la présence éventuelle d’un écho. La présence d’un écho risque de nuire à la qualité sonore de la diffusion en direct. Vous pouvez réduire ou supprimer l’écho en posant d’épais rideaux sur les murs nus ou en disposant des panneaux acoustiques en damier sur chaque mur.62 Chapitre 6 Exemple de configuration  Examinez ensuite les sols et les meubles. Les sols recouverts de tapis et les chaises rembourrées constituent un environnement idéal. Le pupitre doit être recouvert d’un tissu ou d’une surface rembourrée pour éviter tout bruit provoqué, par exemple, par un verre que l’orateur pose sur la surface.  Considérez les problèmes d’éclairage. Pour un meilleur contrôle, vous devez pouvoir tirer les stores et compléter l’éclairage de la pièce par un kit d’éclairage portatif pouvant être rapidement installé. Étape 2 : Préparation du réseau Vérifiez que la pièce où doit avoir lieu la diffusion en direct est équipée d’une connexion Ethernet. Si nécessaire, installez, réparez ou remplacez les câbles et les connecteurs à l’aide de composants de haute qualité. N’oubliez pas que la diffusion, surtout en direct, peut solliciter fortement les ressources réseau, en particulier la bande passante disponible. Pour vous assurer que le réseau peut gérer la charge supplémentaire, il peut être nécessaire d’effectuer l’une ou l’ensemble des opérations suivantes :  Déterminez la capacité du réseau existant et calculez le trafic supplémentaire prévisible qui sera généré par la diffusion en direct et à la demande.  Tracez la carte des segments de bande passante de votre réseau, en indiquant la capacité entre tous les points.  Déterminez les applications utilisées dans votre réseau, leur mode d’utilisation, l’emplacement où elles sont hébergées, ainsi que la bande passante qu’elles utilisent normalement pendant les périodes de forte utilisation et de faible utilisation.  En fonction de la configuration et de la capacité de votre réseau, sélectionnez l’emplacement approprié pour installer votre serveur de diffusion, en évitant les goulets d’étranglement potentiels.  Si nécessaire, augmentez la capacité du réseau (ajout de lignes T1, routeurs, commutateurs, etc.) afin de gérer le nombre maximum prévu de spectateurs simultanés en direct, en plus du trafic réseau maximal habituel. Remarque : un réseau local typique fournit en interne une bande passante de 10 à 100 Mbps, une ligne T1 une bande passante de seulement 1,5 Mbps. Les lignes T1 fonctionnent correctement avec les protocoles HTTP et FTP, car les demandes sont alors brèves ou peu urgentes, tandis que l’enchaînement est beaucoup plus exigeant. Ce dernier ne supporte aucun ralentissement : pour garantir la diffusion, les données doivent être transférées au moins aussi rapidement que le débit original. Dans cet exemple, nous supposons un maximum de 10 spectateurs simultanés, pour moitié via le réseau local et pour moitié via Internet, et un débit d’environ 256 Kbps pour chaque flux de monodiffusion. La bande passante maximale complémentaire requise est alors d’environ 3,2 à 3,3 Mbps. Chapitre 6 Exemple de configuration 63 Cette estimation inclut une marge complémentaire de 25 à 30 pour cent pour l’encombrement réseau non planifié et les pics de transmission de flux susceptibles de survenir pour diverses raisons. Étape 3 : Configuration de votre serveur de diffusion Un ordinateur administrateur doit être configuré avant que vous puissiez configurer et gérer votre serveur de diffusion si, comme dans cet exemple, le serveur de diffusion est exécuté en mode headless, soit sans moniteur. Pour plus d’informations sur la configuration d’un ordinateur administrateur, consultez le manuel Mac OS X Server Premiers contacts avec la version 10.5 ou ultérieure (inclus sur le disque d’installation de Mac OS X Server). Pour configurer et gérer QTSS, vous devez utiliser l’application Admin Serveur, installée avec Mac OS X Server. Après la configuration de Mac OS X Server, vous pouvez également utiliser l’application d’administration basée sur le Web, Admin Web, pour administrer QTSS à distance à partir de n’importe quel ordinateur connecté directement au réseau local ou à Internet. Dans cet exemple, nous supposons que l’ordinateur portable de diffusion du système de diffusion illustré est également utilisé à cet effet. Bien que le serveur Xserve soit livré avec Mac OS X Server et QTSS préinstallés, ces logiciels doivent être configurés pour le réseau particulier auquel ils sont ajoutés et pour les utilisations spécifiques pour lesquelles ils sont prévus. Pour plus d’informations sur la configuration de Mac OS X Server, consultez le guide Premiers contacts. Voici quelques-unes des questions auxquelles il est nécessaire de répondre lors de la configuration d’un serveur de diffusion :  L’ordinateur serveur peut-il être dédié uniquement à l’enchaînement ? Il est préférable que votre serveur de diffusion ne soit pas également chargé du service Web, du service de courrier ou de tout autre service. Notre exemple concerne un serveur de diffusion dédié.  Quelle est la quantité de mémoire vive (RAM) nécessaire ? La quantité minimale de mémoire requise pour exécuter QTSS est de 128 mégaoctets (Mo). Prévoyez environ 256 Mo de RAM pour chaque tranche de 50 Mo de débit prévu. Cette configuration suppose 256 Mo de RAM.  Quelle est la quantité d’espace disque requise ? Les fichiers vidéo peuvent être très volumineux. Une présentation d’une heure avec indications, codée à 300 Kbps (non optimisée pour un serveur), nécessite environ 135 Mo d’espace sur disque dur. Un disque dur de 60 Go peut ainsi stocker plus de 400 présentations à ce format. Voici une formule pour calculer la taille des fichiers de diffusion : débitEnBits / 8 bits * duréeEnSecondes = taille du fichier64 Chapitre 6 Exemple de configuration Exemple pour un flux d’une heure à 300 Kbps : 300 000 / 8 bits * 3 600 = 135 000 000 octets = 135 Mo De nombreux réseaux locaux incluent des systèmes de stockage RAID (Redundant Array of Independent Disks) qui procurent des quantités beaucoup plus importantes d’espace disque. Si vous stockez les fichiers de diffusion ailleurs que dans l’emplacement QTSS par défaut (à savoir /Bibliothèque/QuickTimeStreaming/Movies), vous devrez saisir le chemin dans la sous-fenêtre Réglages de QuickTime Streaming, dans Admin Serveur. Consultez la section « Changement du répertoire réservé aux flux de données multimédias » à la page 27. Placez tout fichier SDP (Session Description Protocol) faisant référence à des diffusions Web en direct dans le même emplacement, afin qu’ils puissent être reconnus par QTSS. Dans cet exemple, tous les fichiers de diffusion archivés et les fichiers de référence SDP résident dans le dossier Movies par défaut sur le serveur de diffusion.  Le serveur de diffusion est-il équipé d’une carte réseau appropriée ? La carte réseau est un composant essentiel de votre serveur de diffusion, dans la mesure où elle permet la connectivité Ethernet entre le serveur et votre public. Une carte Ethernet doit fournir un débit minimum de 100 mégaoctets (environ 0,1 gigabit) par seconde.  Où sera placé le serveur de diffusion sur le réseau ? Un coupe-feu sera-t-il utilisé ? Le serveur de diffusion doit se trouver dans un emplacement accessible par les utilisateurs (les étudiants, dans notre exemple) qui se connectent à la fois via le réseau local et via Internet. Il doit également être protégé par un coupe-feu contre l’accès non autorisé au serveur et aux fichiers multimédia archivés. Mac OS X Server inclut le service Coupe-feu IP, qui analyse les paquets IP entrants et les rejette ou les accepte en fonction d’un ensemble de filtres que vous créez. Pour plus d’informations sur la configuration de ce service, consultez le guide d’administration des services réseau.Chapitre 6 Exemple de configuration 65 Des ports spécifiques doivent être ouverts dans le coupe-feu pour autoriser les demandes RTSP (Real-Time Streaming Protocol) provenant des utilisateurs, les séquences vidéo et audio codées provenant du diffuseur, ainsi que les flux sortants transmis aux clients via le réseau local et Internet. Le tableau ci-après répertorie les ports utilisés par QTSS pour les demandes entrantes et sortantes(pour en savoir plus sur l’activation de diffusion QuickTime en présence d’un coupe-feu, consultez la section « Sécurité et accès » à la page 30). Dans cet exemple de configuration, nous supposons que les étudiants qui se connectent au serveur de diffusion via Internet ne se trouvent pas derrière leur propre coupe-feu. Dans ce cas, il n’est pas possible d’activer la diffusion sur le port 80, port généralement destiné au transport du trafic Internet HTTP et autorisé par la plupart des coupe-feu. Utilisation Ports Protocoles Remarques Répondre aux messages des clients (comme Lecture et Pause) TCP (le client démarre -> QTSS) 554, 7070, 8000, 8001, 80 RTSP, RTP, RTCP, MP3 Le port principal est 554. Le port 80 est pris en charge par le client QT en tant qu’autre port TCP possible. Ces ports envoient également des données aux clients. Envoi de données multimé- dias et réception de l’état du client  Données UDP (QTSS -> client) : 6970–6999, nombres pairs  État UDP (QTSS <-> client) : 6971–6999, nombres impairs  Données et état TCP (QTSS <-> client): 554, 7070, 8000, 8001, 80 RTP RTCP RTSP, RTP, RTCP L’état est nécessaire à la connexion ; s’il est bloqué, le serveur déconnecte le client. Les mêmes ports sont utilisés pour répondre aux messages. Réception de diffusions  Données UDP (diffuseur -> QTSS) : 6972–65535, nombres pairs  État UDP RTCP (diffuseur <-> QTSS) : 6973–65535, nombres impairs  TCP (le diffuseur démarre -> QTSS) : 554, 7070, 8000, 8001, 80 RTP RTCP RTSP, RTP, RTCP Les ports dépendent de la configuration du diffuseur. L’état est nécessaire à la connexion ; s’il est bloqué, le serveur déconnecte le diffuseur. Les diffuseurs peuvent diffuser via leur connexion TCP au serveur au lieu d’utiliser les ports UDP. Enchaînement via serveur TCP (le client démarre -> QTSS) : 554, 7070, 8000, 8001, 80 RTSP, RTP, RTCP, MP3 Les mêmes ports sont utilisés pour répondre aux messages et pour recevoir les diffusions via TCP. Diffusions MP3 (par défaut) TCP (client -> QTSS) : 8000 Gestion de QTSS à distance avec Admin Serveur TCP (le client admin démarre -> serveur) : 311 Gestion de QTSS à distance avec Admin Web TCP (le client du navigateur Web démarre -> serveur) : 122066 Chapitre 6 Exemple de configuration Si certains clients se trouvent derrière des coupe-feu, il peut être préférable d’activer la diffusion en continu sur le port 80 pour que ces clients puissent accéder aux flux. Pour obtenir des instructions, consultez la section « Diffusion de flux à travers des coupe-feu via le port 80 » à la page 31. Sera-t-il nécessaire de configurer un compte utilisateur sur le serveur de diffusion ? Dans cet exemple de configuration, vous devez créer un nom d’utilisateur et un mot de passe de diffusion, car le logiciel d’encodage et QTSS résident sur des ordinateurs distincts. La création d’un utilisateur de diffusion permet la création sur le serveur d’un fichier SDP qui fournit des informations sur le format, l’heure et l’auteur d’un flux diffusé en direct. Après avoir spécifié un nom et un mot de passe, vous entrez dans QuickTime Broadcaster. Pour des instructions sur la création ou la modification du nom d’utilisateur et du mot de passe de diffusion, consultez la section « Utilisation de la monodiffusion automatique (Annonce) à l’aide de QTSS sur un ordinateur distinct » à la page 32. Vous devrez utiliser le compte d’administrateur précédemment configuré. Les utilisateurs nécessiteront-ils une authentification pour accéder aux présentations en direct ou archivées ? Dans notre exemple de configuration, aucune authentification n’est nécessaire. Cependant, si vous souhaitez limiter l’accès à vos flux, vous devrez définir des noms d’utilisateur et des mots de passe de diffusion individuels ou de groupe. Pour plus d’informations sur la configuration et la gestion de ce type de compte, consultez les rubriques appropriées de la section « Sécurité et accès » à la page 30. Étape 4 : Configuration pour une diffusion Web en direct Pour notre exemple de configuration, les éléments suivants sont requis :  Un caméscope numérique DV de bonne qualité  Un microphone placé près de l’orateur (sur un pied ou accroché à sa chemise) et connecté à l’entrée audio du caméscope via un câble audio de bonne qualité  Un trépied robuste sur lequel le caméscope sera monté.  Kit d’éclairage portatif Le caméscope est le premier maillon Le caméscope est un élément essentiel car il constitue le premier maillon de la chaîne du signal vidéo. Deux composants principaux déterminent la qualité d’image d’un caméscope numérique DV :  La qualité de la lentille. Plus la qualité de la lentille est élevée, meilleure est l’image.  Le mécanisme de capture d’image. Les caméscopes numériques DV utilisent des capteurs CCD (Charge-Coupled Devices) pour convertir l’image en signaux électroniques. Le nombre et la taille des capteurs CCD affectent la qualité de l’image. Le zoom optique offre une qualité supérieure à celle du zoom numérique, mais l’utilisation du zoom doit être évitée ou réduite au minimum lors d’une présentation diffusée en direct afin d’éviter toute dégradation du flux.Chapitre 6 Exemple de configuration 67 Les caméscopes numériques bas de gamme utilisent un capteur CCD unique pour capturer toute l’image, tandis que les caméscopes haut de gamme utilisent trois capteurs CCD distincts pour balayer le contenu rouge, bleu et vert de l’image, permettant ainsi une qualité supérieure. La taille des capteurs CCD varie de 1/4 à 2/3 de pouce ; les capteurs CCD de plus grande taille offrent une meilleure résolution. Voici d’autres fonctionnalités intéressantes :  Vous devez pouvoir modifier les réglages automatiques du caméscope.  Il est recommandé d’utiliser un microphone séparé pouvant être branché sur le caméscope afin d’obtenir une prise de son optimale. Le microphone intégré du caméscope est inadapté à la plupart des situations.  Le caméscope doit accepter les connecteurs XLR professionnels (plutôt que les connecteurs mini-jack 1/8 de pouce). Il doit également comporter une prise jack de casque d’écoute, permettant de contrôler l’entrée audio.  Enfin, une sortie FireWire permet le transfert numérique et la capture automatisée, ce qui permettra de gagner du temps par la suite. Parlez près du microphone Le microphone constitue le premier maillon de la chaîne du signal audio et est donc également très important. Les microphones dynamiques constituent un bon choix global et vous pouvez en trouver pour environ 100 ı. Le meilleur moyen d’améliorer la qualité audio lorsque l’acoustique de la pièce est de mauvaise qualité consiste à placer le microphone le plus près possible de la personne qui parle. Utilisez un petit micro-cravate attaché à la chemise de l’orateur, juste sous la bouche, ou un microphone à main. Dans le cas d’une conférence à plusieurs intervenants, utilisez plusieurs microphones, si possible fixés sur des pieds solides, ainsi qu’une petite table de mixage. Connectez la sortie stéréo mixée de la table de mixage à l’entrée ligne du caméscope. Si vous utilisez une table de mixage ou un microphone externe, assurez-vous que tous les connecteurs sont fermement branchés, afin de garantir la fiabilité du signal audio. Connectez un casque à la sortie casque du caméscope afin de vous assurer que vous pouvez entendre le signal audio et qu’il ne présente aucune distorsion. Un trépied est essentiel Il est important d’utiliser un caméscope sur trépied lors d’une présentation en direct et d’éviter les panoramiques, inclinaisons, zooms et autres mouvements de caméra. Tout déplacement du caméscope, ne serait-ce que d’un degré, entraîne le changement de chaque pixel de l’image, augmentant ainsi la difficulté de codage du flux. Une scène simple à coder devient soudainement beaucoup plus complexe. Le trépied doit être léger, tout en offrant un support stable pour le poids du caméscope.68 Chapitre 6 Exemple de configuration Procurez-vous un kit d’éclairage simple L’éclairage est un vaste sujet qui n’entre pas dans le cadre de ce guide, mais voici cependant quelques suggestions. Même un caméscope de haute qualité donnera des résultats médiocres si l’éclairage est inadapté. Il est peu probable que l’éclairage standard d’une salle de classe soit adapté à la prise de vue d’une présentation en direct. Il est recommandé d’ajouter au moins un éclairage d’arrière-plan afin de faire ressortir l’orateur. Un kit d’éclairage portatif à trois points, ainsi qu’un ou deux réflecteurs si vous prévoyez des prises de vue extérieures, peuvent améliorer considérablement les résultats. Étape 5 : Configurez Broadcaster pour une monodiffusion automatique (Annonce) En cas de diffusion vers QTSS situé sur un autre ordinateur, comme dans notre exemple, il est recommandé d’utiliser la méthode de transmission Monodiffusion automatique (Annonce). Elle est simple à configurer. Dans cet exemple, QuickTime Broadcaster est installé sur un ordinateur portable. Ce logiciel de codage est inclus sur le CD-ROM de Mac OS X Server et peut également être téléchargé gratuitement à partir du site web QuickTime Broadcaster à l’adresse www.apple.com/fr/quicktime/broadcaster/. Une fois le logiciel de codage installé, connectez le caméscope au portable via le port FireWire, allumez le caméscope et voyez s’il est reconnu par QuickTime Broadcaster. 1 Ouvrez QuickTime Broadcaster et cliquez sur Afficher les détails. 2 Cliquez sur Vidéo et sélectionnez une source vidéo dans le menu local Source. Si le caméscope est reconnu, il apparaît dans le menu Source. Les réglages vidéo doivent être actifs également (non estompés). Si le caméscope n’apparaît pas dans le menu Source, quittez QuickTime Broadcaster, assurez-vous que le caméscope est connecté et sous tension, puis ouvrez de nouveau QuickTime Broadcaster. Si votre caméscope n’apparaît toujours pas, consultez le site web de QuickTime ou le site web d’assistance et de support AppleCare pour en savoir plus sur la compatibilité et les autres problèmes. 3 Dans QuickTime Broadcaster, cliquez sur Afficher les détails, sur Réseau, puis choisissez Monodiffusion automatique (Annonce) dans le menu local Transmission. 4 Dans le volet Réseau, tapez l’adresse IP ou le nom d’hôte du serveur destinataire (Xserve dans cet exemple), un nom pour le fichier diffusé, le nom d’utilisateur et le mot de passe de l’utilisateur de diffusion créé à l’étape 3, ainsi que la durée de mise en mémoire tampon (ou acceptez la valeur par défaut). Remarque : la durée de mise en mémoire tampon fixe le nombre de secondes pendant lesquelles QuickTime place la diffusion en mémoire tampon avant la lecture. Pour les connexions haut débit, QuickTime Player 6 (ou ultérieur) remplit la mémoire tampon plus rapidement que le temps réel, ce qui permet la visualisation en mode “Lecture instantanée”.Chapitre 6 Exemple de configuration 69 5 Cliquez sur Diffusion et démarrez QTSS (s’il n’est pas déjà en cours d’exécution) en sélectionnant l’ordinateur dans Admin Serveur, en cliquant sur Enchaînement QuickTime, puis en cliquant sur Démarrer le service. Pour déterminer si le flux en direct peut être visualisé sur un client, ouvrez QuickTime Player sur l’un des ordinateurs client et effectuez les opérations suivantes : 6 Cliquez sur Fichier > Ouvrir l’URL dans le nouveau lecteur. 7 Tapez l’URL RTSP (Real-Time Streaming Protocol) affichée dans la section Emplacement de la fenêtre QuickTime Broadcaster (par exemple, rtsp://monserveur.com/monflux.sdp). Remarque : l’URL reconnaît les majuscules et minuscules et doit être saisie exactement comme dans la fenêtre QuickTime Broadcaster. La lecture du flux en direct doit alors commencer dans QuickTime Player. Étape 6 : Test de votre configuration La dernière étape consiste à tester la configuration. Ce test doit être le plus réaliste possible.  Configurez votre équipement tel qu’il sera utilisé pour la présentation réelle, si possible dans le même lieu.  Demandez à un collègue de jouer le rôle du présentateur, ou mieux, demandez au présentateur de participer au test, afin d’en faire une “répétition”.  Vérifiez l’image vidéo et le son.  Vérifiez si les clients du réseau local et d’Internet peuvent se connecter au flux en direct.  Ajustez si nécessaire la position du caméscope et du microphone, ainsi que l’éclairage, et résolvez les autres problèmes éventuels. Création d’une page Web pour simplifier l’accès L’accès à partir d’une page Web permet d’éviter aux étudiants d’avoir à mémoriser l’URL RTSP ainsi que le nom du serveur de diffusion et des fichiers SDP. Dans notre exemple, la page Web peut être ajoutée au site web de l’université, mais elle peut également résider sur n’importe quel serveur Web. Les étudiants peuvent accéder à la pré- sentation en direct (ainsi qu’aux archives) en cliquant sur les liens dans leur navigateur. Pour créer un lien vers le flux en direct d’une page web, vous devez incorporer une séquence de diffusion. Pour cela, vous pouvez par exemple créer un film de référence. Il existe plusieurs méthodes pour créer des films de référence, lesquels dirigent un lecteur vers le fichier multimédia en cours). La méthode la plus simple consiste à créer ce film avec QuickTime Pro : 1 Ouvrez QuickTime Player Pro. 2 Dans le menu Fichier, sélectionnez Ouvrir l’URL... 3 Ouvrez l’URL de votre film de diffusion à l’aide de URL RTSP.70 Chapitre 6 Exemple de configuration 4 Enregistrez le film lu sous Séquence autonome. 5 Placez le film enregistré sur votre site web. 6 Faites en sorte que le film de référence soit le premier attribut spécifié dans l’appel de méthode QT WriteObject. Si vous ne disposez pas de QuickTime Pro, vous pouvez créer un film de référence simple avec n’importe quel éditeur de texte. Il suffit de créer un fichier texte contenant une ligne au format suivant : RTSPtextRTSP:/// Enregistrez le fichier au format .mov et placez-le sur votre serveur Web. Pour incorporer le film dans une page Web, utilisez la balise Object/Embed dans le code HTML de la page Web. Par exemple, si le film de référence s’appelle “live.mov” et se trouve dans le même répertoire que la page HTML, la balise suivante incorpore le flux en direct : Nombre de ressources apportent des informations sur la création de pages Web avec des données QuickTime. Voici quelques excellentes références : Quicktime for the Web, de Steven Gulie, est le livre définitif sur la création de pages Web au format QuickTime (avec des clés d’enregistrement de QuickTime Pro). Le site web d’Apple contient des documents relatifs à la balise Object/Embed : www.apple.com/fr/quicktime/authoring/embed.html Prise de vue de la présentation en direct Si tout le travail préparatoire a été effectué selon la procédure décrite ci-dessus et que l’équipement et les connexions ont été testés, la prise de vue devrait être simple. Voici quelques conseils qui permettront d’éviter les problèmes survenant pendant l’événement :  Le jour de la diffusion en direct de l’événement, installez votre matériel suffisamment tôt, afin de pouvoir vérifier une nouvelle fois que tous les composants fonctionnent comme prévu.  Si un public est présent, faites-leur savoir à l’avance que vous allez diffuser la présentation en direct sur le Web et sollicitez leur coopération.  Fixez bien tous les câbles au sol de façon à limiter les risques de trébuchement.Chapitre 6 Exemple de configuration 71  Utilisez un micro directionnel ou, si possible, une connexion audio en direct.  Recherchez les sources potentielles de bruit et prenez si possible les mesures appropriées. Archivage de la présentation en direct Dans notre exemple, l’application iMovie, fournie avec Mac OS X, est installée sur l’ordinateur portable. Cette application permet d’importer le métrage DV enregistré depuis la bande, puis d’encoder et d’archiver les présentations. Pour archiver une présentation en direct, commencez par importer le métrage DV enregistré : 1 Connectez le caméscope numérique DV à l’ordinateur portable via le port FireWire et mettez-le sous tension. 2 Insérez la bande contenant la séquence vidéo à archiver et passez en mode VTR. 3 Sur l’ordinateur portable, ouvrez iMovie et réglez le commutateur de mode situé sous le moniteur iMovie sur le mode Caméra (faites glisser le curseur bleu vers l’icône repré- sentant un caméscope). 4 Utilisez les commandes de lecture afin d’afficher une partie de la bande dans le moniteur iMovie. Si la lecture de la bande ne démarre pas, vérifiez les connexions et assurezvous que le caméscope est sous tension. 5 Rembobinez la bande jusqu’à quelques secondes avant le point où vous souhaitez démarrer l’importation. 6 Cliquez sur Lire sous le moniteur iMovie. 7 Cliquez sur Importer dès que vous voyez le point de la présentation à partir duquel vous souhaitez commencer l’importation. 8 Cliquez de nouveau sur Importer lorsque vous souhaitez arrêter l’importation. 9 Pour éviter que certaines séquences soient incluses dans votre présentation archivée, vous pouvez éditer cette dernière plus tard à l’aide d’iMovie. Important : surveillez l’espace disponible sur disque dur pendant l’importation des données vidéo et la création de votre film iMovie. Une minute de vidéo numérique utilise environ 220 Mo d’espace disque, de sorte qu’une présentation d’une heure peut utiliser plus de 13 gigaoctets d’espace disque. La barre d’état Espace libre, située sous le clip, montre à tout moment la quantité d’espace disque disponible pendant le processus d’importation.72 Chapitre 6 Exemple de configuration Utilisez ensuite iMovie pour compresser et encoder le métrage DV pour la diffusion : 1 Dans iMovie, choisissez Fichier > Exporter le film. 2 Sélectionnez Vers QuickTime dans le menu local Exporter le film. 3 Sélectionnez un format de film dans le menu local Formats. Vous pouvez soit choisir l’un des formats QuickTime optimisés pour différentes utilisations, soit choisir Expert, une option qui offre des réglages QuickTime personnalisés tels que Vidéo MPEG-4. 4 Cliquez sur Exporter. 5 Attribuez un nom à votre film, sélectionnez une destination pour le fichier, puis cliquez sur Enregistrer. Le temps nécessaire à l’enregistrement du film dépend de sa longueur et du format choisi. Remarque : il est recommandé d’enregistrer plusieurs fichiers de diffusion, chacun compressé pour une vitesse de connexion différente. Vous pouvez par exemple choisir des réglages de compression plus faibles pour les clients du réseau du campus et des réglages de compression plus élevés pour les clients qui se connectent via Internet. 6 Une fois que vous avez enregistré le ou les fichiers codés, assurez-vous que chaque fichier est diffusé correctement. 73 Glossaire Glossaire administrateur Utilisateur disposant d’autorisations d’administration de serveur ou de domaine de répertoires. Les administrateurs sont toujours membres du groupe “admin” prédéfini. Adresse IP Adresse numérique unique qui identifie un ordinateur sur Internet. AppleScript Langage de pilotage par script dont la syntaxe est semblable à celle de l’anglais, utilisé pour écrire des fichiers de script permettant le contrôle de votre ordinateur. AppleScript fait partie du système d’exploitation Mac et est donc inclus sur chaque ordinateur Macintosh. autorisations Droit d’accéder à des zones restreintes d’un système ou d’effectuer certaines tâches (telles que des tâches de gestion) dans le système. AVI Audio Visual Interleave. Format de fichier vidéo Windows. bande passante Capacité d’une connexion réseau, mesurée en bits ou octets par seconde, à transporter des données. bit Unité d’information, dont la valeur peut être 0 ou 1. client Ordinateur (ou utilisateur de l’ordinateur) nécessitant les données ou les services d’un autre ordinateur ou serveur. codec Technologie de compression et de décompression de données. Les codecs peuvent être implémentés dans le logiciel, le matériel ou une combinaison des deux. compression temporelle Compression d’images effectuée entre les images d’une séquence. Cette technique de compression tire parti de la redondance entre images adjacentes d’une séquence pour réduire la quantité de données requises à la représentation précise de chaque image de la séquence. Les séquences soumises à une compression temporelle contiennent généralement des images clé placées à intervalles réguliers. connecteur XLR Connecteur audio à trois broches, qui peut être utilisé avec des câbles équilibrés à trois fils, ce qui permet d’éliminer les interférences électromagnétiques. 74 Glossaire couche Mécanisme d’affectation de priorités aux pistes d’un film ou de chevauchement de sprites. Lorsque QuickTime lit un film, il affiche les images en fonction de leur couche ; les images dont le numéro de couche est inférieur sont affichées au-dessus, celles dont le numéro de couche est supérieur peuvent être masquées par les premières. coupe-feu Logiciel destiné à protéger les applications réseau exécutées sur votre serveur. Le service de coupe-feu IP, qui fait partie du logiciel Mac OS X Server, analyse les paquets IP entrants et rejette ou accepte ces paquets en fonction d’un ensemble de filtres que vous créez. débit Vitesse à laquelle les bits sont transmis sur un réseau, généralement exprimée en bits par seconde. débit de données Quantité d’informations transmises par seconde. diffusion Dans un réseau, transmission d’un message ou de données pouvant être lues par tout client du réseau. La diffusion peut être réalisée en monodiffusion (envoi d’un message à un ordinateur spécifique) ou en multidiffusion (envoi d’un message à une sous-ensemble d’ordinateurs). Dans QuickTime Streaming Server, processus de transmission d’une copie de flux de données sur l’ensemble d’un réseau. diffusion annoncée Méthode, telle que Monodiffusion automatique (Annonce), permettant à un diffuseur de négocier avec un serveur l’acceptation d’une diffusion. diffusion Web Diffusion de séquences vidéo ou audio en direct sur Internet. DNS Domain Name System. Base de données distribuée qui fait correspondre des adresses IP à des noms de domaines. Un serveur DNS, appelé également “serveur de noms”, conserve une liste des noms et des adresses IP associées à chaque nom. DSL Digital subscriber line. Technologie de transmission de données à haut débit fonctionnant sur les lignes téléphoniques. DV Vidéo numérique. Format numérique d’enregistrement sur bandes, utilisant une compression d’environ 5:1 pour générer une qualité Betacam sur une cassette de très petite taille. enchaînement Distribution en temps réel de données vidéo ou audio via un réseau, sous la forme d’un flux de paquets plutôt que par téléchargement d’un fichier unique. FAI Fournisseur d’accès à Internet. Entreprise qui commercialise un accès à Internet et propose généralement l’hébergement Web d’applications de commerce électronique et de services de courrier. fichier d’accès Fichier texte nommé qtaccess et contenant des informations sur les utilisateurs et les groupes autorisés à visualiser les données multimédias du répertoire dans lequel le fichier d’accès est stocké. Glossaire 75 fichier M3U Métafichier audio créé à l’aide d’un éditeur de texte et enregistré sur un serveur Web. Le fichier dirige le navigateur Web de l’utilisateur vers une liste de lecture MP3 résidant sur le même serveur Web et ouvre le lecteur MP3 de l’utilisateur. film Structure de données temporelles gérée par QuickTime. Un film QuickTime peut contenir du son, de la vidéo, des animations ou une combinaison de ces différents types de données. Un film QuickTime contient une ou plusieurs pistes, chacune représentant un flux de données unique du film. film de référence Fichier .mov créé à l’aide d’un utilitaire tel que MakeRefMovie, disponible gratuitement auprès d’Apple pour les ordinateurs Macintosh et Windows. Le fichier contient l’emplacement d’un fichier multimédia de diffusion et peut également contenir l’emplacement de plusieurs fichiers de diffusion. Un fichier de référence inclus sous forme de lien dans une page Web, par exemple, peut diriger un lecteur client vers la présentation à la demande codée en fonction de sa vitesse de connexion particulière. FireWire Technologie matérielle pour l’échange de données avec des périphériques, définie par la norme IEEE 1394. flux réfléchi Diffusion en direct distribuée en tant que flux monodiffusion. Les listes de lecture de film et MP4 génèrent également des flux réfléchis. flux relayé Flux transmis d’un serveur à un ou plusieurs autres. Les relais peuvent également être utilisés pour générer un flux multidiffusion. QTSS ne gère pas le relais de flux MP3. fréquence d’échantillonnage Nombre d’échantillons par seconde utilisé pour les données audio. Plus la fréquence est élevée, meilleure est la qualité audio. fréquence d’images clé Fréquence à laquelle les images clé sont placées dans des séquences de données temporellement compressées. FTP File Transfer Protocol. Protocole permettant aux ordinateurs de transférer des fichiers sur un réseau. Les clients FTP dont le système d’exploitation gère le protocole FTP peuvent se connecter à un serveur de fichiers et télécharger des fichiers, en fonction des autorisations d’accès dont ils bénéficient. La plupart des navigateurs Internet et bon nombre d’applications gratuites (“freeware”) peuvent être utilisés pour accéder à un serveur FTP. HTML Hypertext Markup Language. Ensemble de symboles ou de codes insérés dans un fichier à afficher par un navigateur Web. Le balisage indique au navigateur Web comment afficher les mots et images d’une page Web pour l’utilisateur. HTTP Hypertext Transfer Protocol. Protocole client/serveur utilisé pour le World Wide Web. Le protocole HTTP permet à un navigateur Web d’accéder à un serveur Web et de demander des documents multimédias créés en code HTML. IEEE Institute of Electrical and Electronics Engineers, Inc. Organisation dédiée à la promotion des normes de l’ingénierie informatique et électrique.76 Glossaire image Dans Enchaînement QuickTime, image dans un film ou une séquence d’images. image clé Échantillon provenant d’une séquence d’échantillons temporellement compressés, dont les informations sont indépendantes de celles des autres échantillons de la séquence. Les images clé sont placées dans des séquences temporellement compressées, selon une fréquence déterminée par la fréquence d’images clé. indices Processus qui crée une piste pour chaque piste de données diffusable du fichier, afin d’indiquer au serveur Enchaînement QuickTime comment et quand diffuser chaque trame de données. Le processus d’insertion d’indications effectue à l’avance les calculs nécessaires, ce qui permet à QTSS de diffuser un plus grand nombre de flux. Il permet également l’utilisation de nouveaux codecs sans qu’il soit nécessaire de mettre le serveur à niveau. IP Internet Protocol. Également appelé IPv4. Méthode utilisée conjointement avec le protocole TCP (Transmission Control Protocol) pour envoyer des données d’un ordinateur à un autre via un réseau local ou via Internet. Le protocole IP distribue les paquets de données, tandis que le protocole TCP effectue le suivi des paquets. JavaScript Langage de pilotage par script utilisé pour ajouter une certaine interactivité aux pages Web. LAN Réseau local. Réseau établi au sein d’un même bâtiment, par opposition à un réseau étendu (WAN) qui relie des installations géographiquement disséminées. Lecture instantanée Dans Enchaînement QuickTime, avancée dans la technologie Apple de protection contre les coupures (en attente de brevet) pour réduire considérablement les temps de mise en mémoire tampon : la visualisation est instantanée pour la diffusion de flux vidéo à travers des connexions haut débit. liste de lecture Ensemble de fichiers multimédias du dossier de données QTSS, dont la lecture s’effectue de manière séquentielle ou aléatoire. Mac OS X Version la plus récente du système d’exploitation Apple. Mac OS X associe la fiabilité d’UNIX à la simplicité d’utilisation de Macintosh. Mac OS X Server Plate-forme de serveur puissante, capable de gérer immédiatement les clients Mac, Windows, UNIX et Linux et offrant un ensemble de services de réseau et de groupes de travail extensible, ainsi que des outils perfectionnés de gestion à distance. MBONE Infrastructure de multidiffusion. Réseau virtuel gérant la multidiffusion IP. Un réseau MBONE utilise le même support physique qu’Internet, mais est conçu pour réassembler les paquets de données de multidiffusion afin qu’ils aient l’aspect de paquets de données de diffusion individuelle. Glossaire 77 MIDI Musical Instrument Digital Interface. Format standard d’échange de données audio et d’envoi d’instructions à des ordinateurs, des synthés et tout autre périphérique de musique électronique. monodiffusion Transmission de données vers un destinataire ou client unique. Si un film est diffusé en monodiffusion à un utilisateur employant RSTP, celui-ci peut parcourir librement un film à la demande. Monodiffusion automatique (Annonce) Méthode de distribution d’une diffusion sur un serveur de diffusion, dans laquelle un fichier SDP est automatiquement copié et tenu à jour sur le serveur. Un mot de passe et un nom d’utilisateur de diffusion doivent être créés avant le démarrage d’une telle diffusion. Monodiffusion manuelle Méthode de transmission en direct d’un flux de données vers un client QuickTime Player unique ou vers un ordinateur qui exécute QTSS. Un fichier SDP est généralement créé par l’application de diffusion et doit ensuite être envoyé manuellement au spectateur ou au serveur de diffusion. mov Extension de fichier des films QuickTime d’Apple, utilisée pour nommer à la fois les fichiers de redirection de film et les fichiers multimédias QuickTime proprement dits. MP3 MPEG layer 3. Format de compression audio. MPEG-4 Norme ISO basée sur le format de fichier QuickTime et qui définit des formats de compression et des fichiers multimédias. multi-adressage Capacité à gérer plusieurs connexions réseau. Lorsque plusieurs connexions sont disponibles, Mac OS X sélectionne la meilleure connexion en fonction de l’ordre indiqué dans les préférences réseau. multidiffusion Généralement, transmission simultanée d’un message à un sous-ensemble d’ordinateurs sur un réseau. Voir aussi diffusion, monodiffusion. Dans QuickTime Streaming, mode efficace de diffusion, de type 1 à n. Les utilisateurs peuvent se joindre à une multidiffusion ou la quitter, mais ils ne peuvent pas interagir avec elle. NAT Network Address Translation. Méthode de connexion de plusieurs ordinateurs à Internet (ou à tout autre réseau IP) à l’aide d’une adresse IP unique. NAT convertit les différentes adresses IP attribuées aux ordinateurs sur le réseau privé interne en une adresse IP commune pour les communications Internet. octet Unité de mesure élémentaire de données ; équivaut à huit bits (ou chiffres binaires). open-source Terme désignant le développement coopératif de logiciels par la communauté Internet. Le principe de base consiste à impliquer le plus grand nombre possible de personnes dans l’écriture et le débogage du code, en publiant le code source et en encourageant la constitution d’une large communauté de développeurs qui peuvent proposer des modifications et des améliorations. 78 Glossaire ordinateur administrateur Ordinateur Mac OS X sur lequel vous avez installé les applications de serveur situées sur le CD Serveur Mac OS X Server Admin. paquet Unité d’informations constituée d’un en-tête, d’informations, d’un élément de détection d’erreurs et d’enregistrements complémentaires. QTSS utilise des paquets TCP, UDP et IP pour communiquer avec les clients. piste Structure de données QuickTime qui représente un flux de données unique dans un film QuickTime. Un film peut contenir une ou plusieurs pistes. Chaque piste est indépendante des autres pistes du film et représente son propre flux de données. piste de modification Piste d’un film qui modifie les données ou la présentation d’autres pistes. Par exemple, une piste “tween” est une piste de modification. piste tween Piste qui modifie l’affichage d’autres pistes. pixel Point unique d’une image, dotée d’une couleur et d’une valeur de luminosité données. plug-in de navigateur Logiciels que vous intégrez à un navigateur afin de permettre l’affichage de formats de données spécifiques. point de montage Dans le domaine de la diffusion en continu, chaîne utilisée pour identifier un flux en direct, qu’il soit de film relayé, de film non relayé ou MP3. Les points de montage qui décrivent les flux de film en direct se terminent toujours par une extension .sdp. port Sorte de fente virtuelle de boîte aux lettres. Un serveur utilise des numéros de port pour déterminer l’application qui doit recevoir les paquets de données. Les coupe-feu utilisent les numéros de port pour déterminer si les paquets de données sont autorisés à traverser un réseau local. Le terme “port” fait généralement référence à un port TCP ou UDP. protocole Ensemble de règles qui détermine la façon dont les données sont échangées entre deux applications. QTSS QuickTime Streaming Server. Technologie permettant de diffuser des données en temps réel sur Internet. QuickTime Ensemble d’extensions système Macintosh ou bibliothèque de liens dynamiques Windows gérant la composition et la lecture de films. QuickTime Player Application incluse dans le logiciel système QuickTime et permettant la lecture des films QuickTime. QuickTime Pro Version de QuickTime Player dotée de fonctionnalités avancées, de montage essentiellement. Glossaire 79 RAID Redundant Array of Independent (ou Inexpensive) Disks. Regroupement de plusieurs disques durs physiques en une matrice, ce qui permet d’accéder rapidement aux données stockées et/ou de créer une image des données pour les récupérer en cas de défaillance du disque. La matrice RAID apparaît sous forme d’unité unique de stockage. Voir aussi Matrice RAID, Niveau RAID. relais Dans QuickTime Streaming Server, un relais reçoit un flux entrant puis le transfère à un ou plusieurs serveurs de diffusion. Les relais permettent de réduire la consommation de bande passante Internet et sont utiles diffuser vers de nombreux spectateurs situés dans des emplacements différents. En matière de messagerie électronique, un relais est un serveur de messagerie SMTP qui envoie les courriers entrants à un autre serveur SMTP, mais non à sa destination finale. RTP Real-Time Transport Protocol. Protocole de transport réseau “point à point” adapté aux applications qui transmettent des données en temps réel (audio, vidéo ou simulation) par l’intermédiaire de services de réseau en multi ou en monodiffusion. RTSP Real Time Streaming Protocol. Protocole de couche applicative servant à contrôler la transmission des données ayant des propriétés de temps réel. Ce protocole RTSP propose une structure extensible qui permet de transmettre les données en temps réel sous contrôle et sur demande, des données audio ou vidéo par exemple. Les sources de données peuvent inclure aussi bien des données en temps réel que des clips enregistrés. SDP Session Description Protocol. Fichier texte utilisé avec le serveur Enchaînement QuickTime, qui fournit des informations sur le format, l’heure et l’auteur d’une diffusion en direct et transmet à l’ordinateur de l’utilisateur les instructions de connexion. serveur proxy Serveur placé entre une application client, telle qu’un navigateur Web, et un serveur réel. Le serveur proxy intercepte toutes les requêtes destinées au serveur réel pour vérifier s’il ne peut y répondre lui-même. Si ce n’est pas le cas, il fait suivre la requête au serveur réel. SMTP Simple Mail Transfer Protocol. Protocole utilisé pour envoyer et transférer le courrier. Sa capacité à placer les messages entrants en file d’attente étant limitée, il n’est généralement utilisé que pour envoyer des messages, POP ou IMAP étant utilisés pour les recevoir. sous-réseau IP Partie d’un réseau IP, qui peut être un segment de réseau physiquement indépendant, partageant une adresse réseau avec d’autres parties du réseau et identifiée par un numéro de sous-réseau. sprite Image animée gérée par QuickTime. Une telle image est définie une seule fois, puis elle est animée par des commandes qui en modifient la position ou l’apparence. SSL Secure Sockets Layer. Protocole permettant d’envoyer sur Internet des informations cryptées et authentifiées. Les versions plus récentes de SSL sont appelées TLS (Transport Level Security).80 Glossaire TCP Transmission Control Protocol. Méthode utilisée avec le protocole IP (Internet Protocol) pour envoyer, via Internet, des données sous forme d’unités de messages entre ordinateurs. Le protocole IP se charge de gérer le transfert des données, alors que le protocole TCP effectue le suivi individuel des unités de données (appelées “paquets”). Chaque message est fractionné en plusieurs unités afin d’assurer un routage efficace via Internet. téléchargement progressif Données d’un film transmises vers le client via le protocole HTTP. Le film peut être visualisé par l’utilisateur pendant le transfert. Il ne s’agit pas d’un mode de diffusion de flux de données. TTL Time-to-live. Durée spécifiée pendant laquelle les informations DNS sont stockées dans la mémoire cache. Lorsqu’une paire nom de domaine/adresse IP se trouve en mémoire cache depuis plus longtemps que la durée TTL spécifiée, l’entrée est supprimée du cache du serveur de noms (mais pas du serveur DNS principal). UDP User Datagram Protocol. Méthode de communication utilisant le protocole IP pour envoyer une unité de données (appelée datagramme) d’un ordinateur à un autre sur un réseau. Les applications réseau qui ont de toutes petites unités de données à échanger peuvent utiliser le protocole UDP à la place du protocole TCP. utilisateur de diffusion Utilisateur ayant l’autorisation de diffuser vers le serveur de diffusion. Le nom d’utilisateur et le mot de passe de diffusion sont définis dans le volet Réglages généraux d’Admin Serveur Enchaînement et sont utilisés conjointement avec les diffusions annoncées. Il n’est pas nécessaire de créer un utilisateur de diffusion pour les diffusions UDP. valide Uniform Resource Locator. Adresse d’un ordinateur, d’un fichier ou d’une ressource accessible sur un réseau local ou sur Internet. L’adresse URL se compose du nom du protocole utilisé pour accéder à la ressource, du nom de domaine qui identifie un ordinateur spécifique sur Internet et de la description hiérarchique de l’emplacement du fichier sur l’ordinateur. VBR Variable bit rate. Méthode de compression de données qui tire parti des changements de débit des données. vitesse de défilement Dans un film, il s’agit du nombre d’images par seconde. wav Format Windows de fichier audio. XML Langage de balisage extensible, semblable au HTML, mais plus formel et plus souple. 81 Index Index A accès administrateur 40 fichier 33, 34 listes de lecture 28, 33 mots de passe 32, 35 QTSS 22, 24, 30, 31, 32, 34 QuickTime Broadcaster 55, 56 utilisateur 32, 33, 35, 48, 64, 66 acoustique du lieu de diffusion 61 Admin Serveur 25, 26, 27, 63 Admin Web 7, 25, 63 adresses. Voir adresses IP adresses IP 27 Annonce. Voir Monodiffusion automatique any-user balise 35 appareils photo configuration pour la vidéo 17, 68 AppleScript 58 archivage des présentations en direct 71 assembleur de paquets, QuickTime Broadcaster 54 attribut de durée de vie (TTL) 50 audio allocation de bande passante 53 diffusion audio uniquement 51 équipement pour 17, 22, 67 préréglages 47 réglage de source 51 réglages de compression 56, 57 authentification digest 33 QTSS 8, 32, 33, 35, 66 QuickTime Broadcaster 56 AuthScheme mot-clé 35 B bande passante lecture instantanée 17 nombre maximum de connexions 26 recommandations 22, 56, 62 relais 20 taille d’image 53 vue d’ensemble 18 borne d’accès AirPort 61 C caméscopes archivage des présentations 71 configuration pour la vidéo 60 dépannage 57 qualité d’image 66 capacité de disque dur pour la diffusion 63 CCD (Charge-Coupled Devices) 66 clients contrôle de l’accès 32, 33 dépannage 40 groupes 36 Voir aussi utilisateurs codecs 47 comptes authentification 33 groupe 36 utilisateur 35, 36, 48, 66 configuration diffusion en continu et en direct de données multimédia 22, 23, 62, 63, 69 Monodiffusion automatique 48, 68 QTSS 22, 23 QuickTime Broadcaster 44 relais 28 connexions large bande 17, 21, 22 coupe-feu 30, 31, 32, 55, 64 D Darwin Streaming Server. Voir DSS débit, modification du maximum 26, 27 débits, connexion 21, 22 dépannage 30, 39, 40, 57 diffusion considérations acoustiques 61 éclairage du lieu 62, 68 en direct 17, 70 MP3 32 serveur de diffusion 43, 60, 63 sur sites web 55, 6982 Index Voir aussi QuickTime Broadcaster diffusion de données multimédia Fast Start 16 diffusion en continu de données multimédia accès 22, 24, 30, 31, 32, 34 diffusion à la demande de 59, 61 Lecture instantanée 8, 17 méthodes de réception 18 multidiffusion ou monodiffusion 19 ou téléchargement progressif 16 processus pour 16, 18 relais de 8, 20 vue d’ensemble 15, 16 diffusion en continu et en direct de données multimédia archivage 71 audio 67 configuration de site web 69 configuration du serveur 63 configuration réseau 22, 23, 62 diffusion de 16, 61, 70 environnement 61 ou à la demande 59, 61 vidéo 17, 66, 68 diffusion sur téléphone portable 55 distribution à la demande 59, 61 domaines, annuaire 8 dossiers de départ 28 dossiers multimédia 27, 28 DSL (Digital Subscriber Line) 22 DSS (Darwin Streaming Server) 9 duplication de réglages. Voir préréglages durée de mise en mémoire tampon 45 DV (Digital Video) 60, 66, 71 E éclairage du lieu de diffusion 62, 68 F fichiers contrôle d’accès 34 contrôle de l’accès 33 MP3 21, 23, 32 MPEG-1 40 MPEG-4 18, 21, 22, 43, 47, 57 qtacess 34 qtgroups 34 qtusers 34 SDP 47 Voir aussi fichiers compressés fichiers compressés aperçu et 50 assembleur de paquets 54 audio 56, 57 préréglages 47 vidéo 47, 53, 56, 57, 72 vue d’ensemble 18 films à indices 52 dépannage 39 notes 52 référence 16, 69 téléchargement progressif 16 vue d’ensemble 8 FireWire 44 G Gestionnaire de groupe de travail, authentification 33 H historiques 29, 30, 39 HTTP (Hypertext Transfer Protocol) 16, 30, 32 I IETF (Internet Engineering Task Force) standard 30 iMovie 72 infrastructure de multidiffusion. Voir MBONE Internet Engineering Task Force. Voir IETF L liaison, serveur de diffusion 27 ligne T1 56, 62 listes de lecture accès 28, 33 côté serveur 8 dépannage 39 historiques 39 M MBONE (dorsale de multidiffusion) 19, 50 mémoire, QTSS 63 message mot-clé 34 messages d’erreur. Voir dépannage microphones 17, 51, 67, 71 modems câble 22 monodiffusion 19, 46, 48, 49 Monodiffusion automatique configuration 48, 68 contrôle de l’accès 32, 56 fichier SDP 48 ports pour 55 relais multidiffusion et 37 vue d’ensemble 45 Monodiffusion manuelle 48, 49 mots de passe 32, 35, 56 multi-adressage 27 multidiffusion 19, 37, 46, 48, 49 musique. Voir audio; fichiers MP3; diffusion en continu de données multimédiaIndex 83 N NIC (network interface card) 64 nom d’utilisateur mot-clé 35 nom de fichier utilisateur mot-clé 34 nom de groupe mot-clé 35 nom du fichier de groupe mot-clé 34 notes, film 52 O Open Directory 8, 33 options d’interface en ligne de commande 33, 34 ordinateur administrateur 63 P plug-in QuickTime 18 ports 30, 31, 65 préférences Son. Voir audio préréglages 47, 53 problèmes. Voir dépannage procédures de configuration. Voir configuration processus PlaylistBroadcaster 39 protocoles 30 Voir aussi protocoles spécifiques Q QTSS (QuickTime Streaming Server) configuration requise 21 QuickTime Broadcaster aperçu 50 AppleScript pour l’automatisation 58 assembleur de paquets 54 capacité de disque dur 63 capture vidéo 22 configuration 44 contrôle de l’accès 55, 56 coupe-feu 55 dépannage 56, 57 diffusion en direct 16, 61, 70 diffusion sur téléphone portable 55 enregistrement des réglages 54 fichier SDP 47 introduction 8, 17, 43 méthodes de diffusion 46, 56 Monodiffusion automatique 48 Monodiffusion manuelle 49 multidiffusion 49 notes 52 préréglages 47, 53 présentations 60, 66, 68 réglages audio 51, 56 réglages de compression 47, 54, 56, 57 réglages réseau 48 réglages vidéo 53, 57 séquences à indices 52 site Web 55 QuickTime Player 9 QuickTime Pro 9 QuickTime Streaming Server (QTSS) accès 22, 24, 30, 31, 32, 34 Admin Serveur 25 Admin Web 7, 25 arrêt 26 authentification 8, 32, 33, 35, 66 configuration 22, 23 connexions 26, 39 considérations de mémoire 63 débit maximum 26, 27 démarrage 26 dépannage 39, 40 dossiers multimédia 27, 28 gestion de 25, 26 historiques 29, 30, 39 outils en ligne de commande 34 préparation d’une pr 63 préparation de présentation 60 réglages réseau 19, 27, 32, 62 relais 20, 28, 37 sécurité 30, 31, 32 utilisation du port 30, 31, 65 vue d’ensemble 7, 9 R RAM (random-access memory) 63 Real-Time Streaming Protocol. Voir RTSP Real-Time Transport Protocol. Voir RTP réglages du serveur proxy 31 réglages réseau adresses IP 27 configuration de la diffusion en continu et en direct 62 considérations de coupe-feu 32 diffusion en continu et en direct de données multimédia 22, 23 NIC 64 QuickTime Broadcaster 48 transport QTSS 19 relais configuration 28 contrôle de l’accès 33 multidiffusion 37 QTSS et 20 vue d’ensemble 8, 20 répertoires. Voir dossiers RTP (Real-Time Transport Protocol) 15, 16, 22, 30, 65 RTSP (Real-Time Streaming Protocol) 15, 16, 23, 30, 65 S SDP (Session Description Protocol) 47, 49 sécurité84 Index coupe-feu 30, 31, 32, 55, 64 mots de passe 32, 35, 56 QTSS 30, 31, 32 Voir aussi accès; authentification séquences à indices 52 dépannage 40 diffusion à plusieurs utilisateurs 28 serveurs Apache 7 diffuser 43, 60 diffusion 63 DSS 9 proxy 31 service coupe-feu IP 64 service sans fil 61 Session Description Protocol. Voir SDP sites web, diffusion sur 55, 69 T TCP (Transmission Control Protocol) 30, 65 technologie de protection contre les coupures 8, 17 téléchargement de données 16 téléchargement progressif 16 traduction d’adresses 32 Transmission Control Protocol. Voir TCP trépied, caméscope 67 spécification 3GPP 7 U UDP (User Datagram Protocol) 28, 30, 32, 65 URL (Uniform Resource Locators) 24, 40 utilisateurs connexion 39, 46 contrôle de l’accès 32, 33, 35, 48, 64, 66 dépannage 40 dossiers de départ 28 problèmes de bande passante 26, 56 V valid-user balise 35 vidéo capture vidéo 22 configuration 60, 66 numérique. Voir DV QuickTime Broadcaster 53, 57 réglages de compression 47, 53, 56, 57, 72 Voir aussi appareils photo; films Time Capsule Opstillingsvejledning3 Indholdsfortegnelse 5 Kapitel 1: Introduktion 7 Om Time Capsule 8 Om AirPort-softwaren 9 Hvad du har brug for 11 Statuslampen på Time Capsule 13 Kapitel 2: Indstille Time Capsule 14 Bruge Time Capsule til at indstille et trådløst netværk 17 Bruge AirPort-værktøj 19 Oprettelse af et nyt trådløst netværk 19 Konfigurere og dele Internetadgang 21 Angivelse af avancerede indstillinger 22 Give trådløse klienter adgang til dit netværk uden en adgangskode 23 Bruge Time Machine med Time Capsule 25 Kapitel 3: Tip og fejlfinding 25 Hvis du ikke kan oprette forbindelse til Internet 25 Hvis du har glemt adgangskoden til netværket eller Time Capsule 26 Hvis Time Capsule ikke svarer4 Indholdsfortegnelse 27 Hvis statuslampen på Time Capsule blinker orange 28 Hvis printeren ikke svarer 29 Opdatere AirPort-software 29 Anbefalinger til placering af Time Capsule 30 Forhold, der kan skabe forstyrrelser for AirPort 31 Kapitel 4: Yderligere oplysninger, service og support 33 Appendiks: Specifikationer og retningslinjer for sikkerhed for Time Capsule 36 Regulatory Compliance Information1 5 1 Introduktion Tillykke med Time Capsule. Læs denne introduktion for at komme i gang. Den nye Time Capsule tilbyder enkelheden ved helt automatisk sikkerhedskopiering på dit Wi-Fi-netværk. Med programmet Time Machine i Mac OS X v10.5.2 Leopard og nyere versioner kan du automatisk sikkerhedskopiere alle computerne på netværket til en enkelt Time Capsule. Time Capsule er derudover en komplet AirPort Extreme-base, som gør det muligt for flere at bruge trådløst “dual-band”-netværk samtidig. Når du indstiller din Time Capsule, opretter den to hurtige Wi-Fi-netværk:  Et 2,4 GHz netværk til 802.11b-, 802.11g- og 802.11n-enheder, f.eks. iPhone, iPod touch og ældre computere  Et 5 GHz netværk til 802.11n- og 802.11a-enheder, f.eks. nyere computere og Apple TV Trådløse enheder opretter forbindelse til det netværk, som har den bedste ydeevne og kompatibilitet, og Time Capsule deler din bredbåndsforbindelse til Internet med computere og enheder på netværket.6 Kapitel 1 Introduktion Med Time Capsule kan du:  Bruge programmet Time Machine i Mac OS X v10.5.2 (og nyere version) til at sikkerhedskopiere alle computerne på dit trådløse netværk samt computere, der er sluttet til Time Capsule via Ethernet. Bemærk: Den første sikkerhedskopiering med Time Capsule og Time Machine kan vare en hel nat eller endnu længere, afhængigt af hvor mange data du sikkerhedskopierer. Du kan gøre den første sikkerhedskopiering hurtigere ved at bruge et Ethernet-kabel til at forbinde computeren med LAN-porten på Time Capsule. Der findes flere oplysninger om brug af Time Machine i “Bruge Time Machine med Time Capsule” på side 23.  Oprette et trådløst hjemmenetværk, som er beskyttet af en adgangskode, oprette forbindelse til Internet og dele forbindelsen med andre computere eller Wi-Fienheder som iPhone, iPod touch og Apple TV. Du kan også dele arkiver mellem computere, som er tilsluttet netværket.  Oprette et gæstenetværk med eller uden adgangskodebeskyttelse, så du kan nøjes med at give trådløse enheder som f.eks. computere, iPhone, iPod touch og Apple TV adgang til Internet.  Slutte Time Capsule til et Ethernet-netværk. Macintosh-, Windows XP- og Windows Vista-computere med trådløse funktioner får derefter adgang til et helt netværk uden at være tilsluttet med et kabel.  Slutte en understøttet USB-printer til Time Capsule. Kompatible computere på AirPort-netværket – både trådløse og kabelforbundne – kan udskrive til printeren.Kapitel 1 Introduktion 7  Slutte en ekstra USB-harddisk til Time Capsule. Kompatible computere på AirPortnetværket – både trådløse og kabelforbundne – kan få adgang til oplysningerne på harddisken.  Slutte et USB-samlingspunkt til Time Capsule og derefter tilslutte flere USB-enheder, f.eks. printere eller harddiske. Alle computere på netværket har adgang til disse enheder. Vigtigt: Installer AirPort-værktøj 5.4 fra den cd, der fulgte med Time Capsule, eller hent det vha. Softwareopdatering. Tidligere versioner af AirPort-indstillingsassistent og AirPort-administrationsværktøj er ikke kompatible med denne Time Capsule. Om Time Capsule Der er fem porte på bagsiden af Time Capsule:  En 10/100/1000Base-T Gigabit Ethernet WAN-port (Wide Area Network) til tilslutning af et DSL- eller kabelmodem eller til tilslutning til et eksisterende Ethernet-netværk  Tre 10/100/1000Base-T Gigabit Ethernet LAN-porte (Local Area Network) til tilslutning af Ethernet-enheder som printere og computere eller til tilslutning til et eksisterende Ethernet-netværk 8 Kapitel 1 Introduktion  En USB-port til tilslutning af en kompatibel USB-printer, -harddisk eller et -samlingspunkt til tilslutning af flere enheder Nulstillingsknappen ud for portene bruges til fejlsøgning af Time Capsule. Statuslampen på forsiden viser den aktuelle status. Om AirPort-softwaren Time Capsule kan arbejde med AirPort-værktøj, som findes på cd'en til Time Capsule. Installer AirPort-værktøj, og følg instruktionerne på de følgende sider for at opstille Time Capsule og det trådløse AirPort-netværk. Statuslampe Internet WAN-port Netstik Netledning Nulstillingsknap USB-port Ethernet-porte Plads til sikkerhedslås Ethernet– aktivitetslampeKapitel 1 Introduktion 9 Bemærk: Du skal bruge AirPort-værktøj v5.4 til at indstille Time Capsule. Denne Time Capsule er ikke kompatibel med tidligere versioner af AirPort-software. Hvad du har brug for Når du vil bruge Time Capsule, skal du have en computer med trådløse funktioner, der overholder IEEE 802.11a-, 802.11b- eller 802.11g-standarder eller et udkast til IEEE 802.11n-specifikationen. Hvis du vil indstille Time Capsule, skal computeren opfylde de krav, der er anført herunder. Bemærk: Hvis du vil bruge Time Capsule med Time Machine i Mac OS X Leopard, skal du bruge Mac OS X v10.5.2 eller en nyere version. AirPort-værktøj Brug AirPort-værktøj til at indstille Time Capsule, så du kan oprette et trådløst netværk, oprette forbindelse til Internet og dele kompatible USB-printere og -harddiske. Du kan også slutte Time Capsule til et eksisterende trådløst AirPort Extreme-netværk. AirPort-værktøj er også et avanceret værktøj til indstilling og administration af Time Capsule, AirPort Extreme- og AirPort Express-baser. Brug det, når du skal justere netværks-, routing-, sikkerheds- og andre avancerede indstillinger. Z AirPort-statusmenu Brug AirPort-statusmenuen på menulinjen til hurtigt at skifte mellem AirPort-netværk, overvåge signalstyrken på det valgte netværk, oprette et computer til computernetværk og slå AirPort til og fra. Statusmenuen er tilgængelig på computere, der bruger Mac OS X. 10 Kapitel 1 Introduktion Du skal bruge følgende for at indstille Time Capsule med en Macintosh:  En Macintosh-computer med et installeret AirPort- eller AirPort Extreme-kort, så den kan indstilles til trådløs brug, eller en Macintosh-computer, der er sluttet til Time Capsule med et Ethernet-kabel, så den kan indstilles vha. Ethernet  Mac OS X v10.4 eller en nyere version  AirPort-værktøj v5.4 eller en nyere version Du skal bruge følgende for at indstille Time Capsule med en Windows-computer:  En Windows-computer med 300 MHz eller højere processorhastighed og et kompatibelt trådløst 802.11a-, 802.11b- eller 802.11g-kort eller et trådløst kort, der overholder et udkast til IEEE 802.11n-specifikationen  Windows XP Home eller Professional (med Service Pack 2 installeret) eller Windows Vista  AirPort-værktøj v5.4 eller en nyere version Slutte Time Capsule til elnettet Før du slutter Time Capsule til en stikkontakt, skal du sætte de relevante kabler i de porte, du vil bruge:  Slut det Ethernet-kabel, der er sluttet til dit DSL- eller kabelmodem (hvis du vil oprette forbindelse til Internet), til Ethernet WAN-porten (<).  Slut et USB-kabel, der er sluttet til USB-porten (d) på Time Capsule, til en kompatibel USB-printer (hvis du vil udskrive til en USB-printer), en -harddisk eller et -samlingspunkt.  Slut et Ethernet-kabel fra en Ethernet-enhed til Ethernet LAN-portene (G). Når du har sluttet kablerne til alle de enheder, du vil bruge, skal du sætte netledningen i netstikket og slutte Time Capsule til en stikkontakt. Der er ingen afbryderknap.Kapitel 1 Introduktion 11 Vigtigt: Brug kun den netledning, der fulgte med Time Capsule. Når du slutter Time Capsule til en stikkontakt, blinker statusindikatoren grønt i et sekund, hvorefter den lyser orange, mens Time Capsule starter. Når Time Capsule er startet, blinker statusindikatoren orange, indtil Time Capsule er opdateret med de korrekte indstillinger. Statusindikatoren lyser konstant grønt, når Time Capsule er korrekt indstillet og forbundet med Internet eller et netværk. Når du slutter Ethernet-kabler til Ethernet-portene, lyser lamperne over portene grønt. Statuslampen på Time Capsule I følgende tabel forklares rækkefølgen af indikatorerne på Time Capsule og deres betydning. Indikator Status/beskrivelse Slukket Time Capsule er ikke sluttet til en stikkontakt. Lyser orange Time Capsule er ved at færdiggøre startsekvensen. Blinker orange Time Capsule kan ikke oprette forbindelse til netværket eller Internet, eller der er opstået et problem. Kontroller, at du har installeret AirPort-værktøj, og brug det til at få oplysninger om, hvad årsagen til de blinkende statusindikatorer kan være. Se “Hvis statuslampen på Time Capsule blinker orange” på side 27. Lyser grønt Time Capsule er tændt og fungerer korrekt. Hvis du vælger Blink ved aktivitet på lokalmenuen Statusindikator (i vinduet Base i AirPort-indstillinger i AirPort-værktøj), blinker statusindikatoren måske grønt for at vise normal aktivitet.12 Kapitel 1 Introduktion Hvad er det næste? Når du har tilsluttet Time Capsule , skal du bruge AirPort-værktøj til at indstille den til at bruge Internetforbindelsen, USB-printeren eller -harddisken eller et eksisterende netværk. AirPort-værktøj ligger i mappen Hjælpeprogrammer i mappen Programmer på en computer med Mac OS X og i Start > Alle programmer > AirPort på en computer med Windows XP eller Windows Vista. Blinker orange og grønt Måske er der et problem med at starte. Time Capsule genstarter og prøver igen. Lyser blåt Time Capsule er klar til at give en trådløs klient adgang til netværket. Se “Give trådløse klienter adgang til dit netværk uden en adgangskode” på side 22. Indikator Status/beskrivelse2 13 2 Indstille Time Capsule Dette kapitel indeholder oplysninger om og instruktioner i, hvordan du forbinder Time Capsule med Internet, og hvordan du bruger AirPort-værktøj til at indstille eller oprette forbindelse til et trådløst netværk. Dette kapitel indeholder en oversigt over, hvordan du forbinder Time Capsule med Internet, og hvordan du bruger indstillingsassistenten i AirPort-værktøj til at indstille netværket samt andre funktioner på Time Capsule. Hvis du ønsker flere oplysninger om trådløse netværk og de avancerede funktioner i AirPort-værktøj, henvises du til dokumentet “Design af AirPort-netværk vha. AirPort-værktøj (Mac OS X v10.5 + Windows)”, der findes på www.apple.com/dk/support/airport. Når du har installeret AirPort-værktøj fra den cd, der fulgte med Time Capsule, kan du udføre de fleste indstillinger af netværket og konfigurationsopgaver vha. indstillingsassistenten i AirPort-værktøj. Hvis du vil foretage avancerede indstillinger, skal du vælge Manuel indstilling på Basemenuen i AirPort-værktøj. Se “Angivelse af avancerede indstillinger” på side 21.14 Kapitel 2 Indstille Time Capsule Bruge Time Capsule til at indstille et trådløst netværk Når du indstiller Time Capsule til at levere netværks- og Internetadgang, kan følgende computere og enheder bruge det trådløse AirPort-netværk til at dele arkiver, spille og benytte Internetprogrammer som f.eks. webbrowsere og e-postprogrammer:  Macintosh-computere med AirPort- eller AirPort Extreme-kort  Trådløse computere, som opfylder kravene til 802.11a-, 802.11b-, 802.11g- og udkastet til IEEE 802.11n-specifikationerne  Andre Wi-Fi-enheder Computere, der er sluttet til Time Capsule vha. Ethernet, kan også få adgang til netværket for at dele arkiver og oprette forbindelse til Internet. Med Mac OS X v10.5.2 og nyere versioner kan du indstille Time Machine til at sikkerhedskopiere alle computerne på netværket til Time Capsule. Se “Bruge Time Machine med Time Capsule” på side 23, hvis du ønsker yderligere oplysninger. Hvis du slutter en kompatibel USB-printer til Time Capsule, kan understøttede computere på netværket (kabelforbundne og trådløse) udskrive til den.Kapitel 2 Indstille Time Capsule 15 Bruge Time Capsule til at oprette et trådløst netværk Den indstilles på følgende måde: 1 Slut DSL- eller kabelmodemmet til Time Capsule vha. Ethernet WAN-porten (<). 2 Hvis du planlægger at dele en USB-printer på netværket, skal du slutte den til Time Capsules USB-port (d) eller til et USB-samlingspunkt med et USB-kabel. til Internet DSL- eller kabelmodem < Internet WAN-port Fælles printer Time Capsule til USB-porte 2,4 eller 5 GHz 2,4 GHz 2,4 eller 5 GHz16 Kapitel 2 Indstille Time Capsule 3 Åbn AirPort-værktøj (ligger i mappen Hjælpeprogrammer i mappen Programmer på en computer med Mac OS X og i Start > Alle programmer > AirPort på en computer med Windows), vælg Time Capsule, og klik derefter på Fortsæt. 4 Følg vejledningen på skærmen, hvis du vil oprette et nyt netværk. Du udskriver fra en computer, der bruger Mac OS X v10.5, på følgende måde: 1 Vælg Apple > Systemindstillinger, og klik på Udskriv & fax. 2 Klik på Tilføj (+), og vælg printeren på listen. 3 Klik på knappen Tilføj. Hvis printeren ikke er på listen, kan du bruge knapperne på værktøjslinjen til at søge efter den. Du udskriver fra en computer, der bruger Mac OS X v10.3 eller 10.4, på følgende måde: 1 Åbn Printerværktøj (ligger i mappen Hjælpeprogrammer i mappen Programmer). 2 Vælg printeren på listen. Hvis printeren ikke står på listen, skal du klikke på Tilføj og vælge Bonjour på lokalmenuen. Vælg derefter printeren på listen. Du udskriver fra en computer, der bruger Windows XP eller Windows Vista, på følgende måde: 1 Installer Bonjour til Windows fra den cd, der fulgte med Time Capsule. 2 Tilslut printeren som beskrevet i instruktionerne på skærmen. Computere, der bruger AirPort, og computere, der bruger andre trådløse kort eller moduler, opretter forbindelse til Internet gennem Time Capsule. Computere der er sluttet til Time Capsules Ethernet-porte, kan også få adgang til netværket og oprette forbindelse til Internet.Kapitel 2 Indstille Time Capsule 17 Trådløse computere og computere sluttet til Ethernet-portene kan også kommunikere med hinanden via Time Capsule. Bruge AirPort-værktøj Du indstiller og konfigurerer Time Capsule med indstillingsassistenten i AirPort-værktøj. AirPort-værktøj installeres på din computer, når du installerer software fra cd'en med Time Capsule. På en Macintosh-computer med Mac OS X v10.4 eller en nyere version: 1 Åbn AirPort-værktøj, der ligger i mappen Hjælpeprogrammer i mappen Programmer. 2 Vælg Time Capsule, og klik på Fortsæt. Hvis du ikke kan se den Time Capsule, du vil konfigurere, skal du klikke på Søg igen for at søge efter tilgængelige trådløse enheder og derefter vælge din Time Capsule på listen. 3 Følg vejledningen på skærmen for at indstille Time Capsule og det trådløse netværk. På en computer med Windows XP (med Service Pack 2) eller Windows Vista: 1 Åbn AirPort-værktøj, som ligger i Start > Alle programmer > AirPort. 2 Vælg Time Capsule, og klik på Fortsæt.18 Kapitel 2 Indstille Time Capsule 3 Følg vejledningen på skærmen for at indstille Time Capsule og det trådløse netværk. Indstillingsassistenten i AirPort-værktøj stiller en række spørgsmål om den type netværk, du vil bruge, og de tjenester, du vil indstille, og hjælper dig med at indtaste de korrekte indstillinger. Hvis du bruger Time Capsule til at oprette forbindelse til Internet, skal du have en bredbåndsforbindelse (med DSL- eller kabelmodem) og en konto hos en Internetudbyder eller en Internetforbindelse via et eksisterende Ethernet-netværk. Hvis du har modtaget bestemte oplysninger fra din Internetudbyder (f.eks. en fast IP-adresse eller en id til DHCP-klient), skal du måske angive dem i AirPort-værktøj. Hav oplysningerne parat, når du indstiller Time Capsule.Kapitel 2 Indstille Time Capsule 19 Oprettelse af et nyt trådløst netværk Du kan bruge indstillingsassistenten i AirPort-værktøj til at oprette et nyt trådløst netværk. Indstillingsassistenten fører dig gennem de trin, der er nødvendige for at navngive netværket, beskytte netværket med en adgangskode og angive andre indstillinger. Hvis du planlægger at dele en USB-printer eller USB-harddisk på netværket: 1 Slut printeren eller harddisken til USB-porten på Time Capsule (d). 2 Åbn AirPort-værktøj, der ligger i mappen Hjælpeprogrammer i mappen Programmer på en Macintosh og i Start > Alle programmer > AirPort på en computer med Windows XP. 3 Vælg Time Capsule, og klik på Fortsæt. Hvis du ikke kan se den Time Capsule, du vil konfigurere, skal du klikke på Søg igen for at søge efter tilgængelige trådløse enheder og derefter vælge din Time Capsule på listen. 4 Følg vejledningen på skærmen, hvis du vil oprette et nyt netværk. Konfigurere og dele Internetadgang Hvis du planlægger at dele Internetforbindelsen med trådløse computere på netværket eller med computere sluttet til Ethernet-porte, skal Time Capsule indstilles som en AirPort-base. Når Time Capsule er indstillet, kan computere oprette forbindelse til Internet via AirPort-netværket. Time Capsule opretter forbindelse til Internet og sender oplysninger til computere over det trådløse netværk.20 Kapitel 2 Indstille Time Capsule Før du bruger AirPort-værktøj til at indstille Time Capsule, skal du slutte DSL- eller kabelmodemmet til Time Capsules Ethernet WAN-port (<). Hvis du slutter Time Capsule til et Ethernet-netværk med Internetadgang, skal du slutte den til Ethernetnetværket. Brug indstillingsassistenten i AirPort-værktøj til at angive Internetudbyderens indstillinger og til at konfigurere, hvordan Time Capsule skal dele indstillingerne med andre computere. 1 Åbn AirPort-værktøj, som ligger i mappen Hjælpeprogrammer i mappen Programmer på en computer med Mac OS X og i Start > Alle programmer > AirPort på en computer med Windows XP. 2 Vælg Time Capsule, og klik på Fortsæt. Hvis du foretager ændringer i en Time Capsule, der er indstillet, kan det være nødvendigt at oprette forbindelse til det netværk, den har oprettet, før du foretager ændringer i Time Capsule. Du vælger det trådløse netværk, du vil ændre, vha. AirPort-statusmenuen på menulinjen på Macintosh. På en computer, der bruger Windows XP, skal du holde markøren over symbolet for den trådløse forbindelse, indtil du kan se netværkets navn (SSID) og derefter vælge det på listen, hvis der er flere tilgængelige netværk. 3 Følg instruktionerne på skærmen for at konfigurere og dele Internetadgang på Time Capsule. Det er hurtigt og nemt at indstille Time Capsule og netværket med AirPort-værktøj. Hvis du vil foretage yderligere indstillinger til netværket, f.eks. begrænse adgangen eller foretage avancerede DHCP-indstillinger, kan du vælge Manuel indstilling på Basemenuen i AirPort-værktøj. Kapitel 2 Indstille Time Capsule 21 Angivelse af avancerede indstillinger Brug AirPort-værktøj til at indstille Time Capsule manuelt, hvis du vil foretage avancerede indstillinger af Time Capsule, f.eks. avancerede sikkerhedsindstillinger, lukkede netværk, længde på DHCP lease, adgangskontrol, energibesparelser, brugerkonti m.m. Du foretager avancerede indstillinger på følgende måde: 1 Åbn AirPort-værktøj, der ligger i mappen Hjælpeprogrammer i mappen Programmer på en Macintosh og i Start > Alle programmer > AirPort på en computer med Windows XP. 2 Hvis der er mere end en trådløs enhed på listen, skal du vælge den, du vil ændre. Hvis du ikke kan se den Time Capsule, du vil konfigurere, skal du klikke på Søg igen for at søge efter tilgængelige trådløse enheder og derefter vælge din Time Capsule på listen. Hvis du foretager ændringer i en Time Capsule, der er indstillet, kan du det være nødvendigt at oprette forbindelse til det netværk, den har oprettet, før du foretager ændringer i Time Capsule. Du vælger det trådløse netværk, du vil ændre, vha. AirPort-statusmenuen på menulinjen på Macintosh. På en computer, der bruger Windows XP, skal du holde markøren over symbolet for den trådløse forbindelse, indtil du kan se netværkets navn (SSID) og derefter vælge det på listen, hvis der er flere tilgængelige netværk. 3 Vælg Manuel indstilling på Basemenuen. Indtast adgangskoden, hvis du bliver bedt om det. Du kan finde flere oplysninger om manuel indstilling i AirPort-værktøj i “Design af AirPort-netværk vha. AirPort-værktøj (Mac OS X v10.5 + Windows)” på www.apple.com/dk/support/airport.22 Kapitel 2 Indstille Time Capsule Give trådløse klienter adgang til dit netværk uden en adgangskode Hvis dit netværk er beskyttet med en adgangskode vha. WPA Personal eller WPA/WPA2 Personal, kan du give trådløse klienter adgang til netværket, uden at de behøver skrive adgangskoden til netværket. Når du giver en klient adgang til dit netværk, opbevares klientens navn og trådløse MAC-adresse (eller AirPort-id) i adgangskontrollisten i AirPort-værktøj, indtil du fjerner klienten fra listen. Du kan også give adgang, der er begrænset til 24 timer, hvorefter klienten ikke længere kan oprette adgang til dit netværk. Når du giver en klient adgang til dit trådløse netværk, behøver klienten ikke at skrive adgangskoden til netværket. Du giver en klient adgang til dit netværk uden at skulle indtaste netværksadgangskoden på følgende måde: 1 Åbn AirPort-værktøj, vælg din Time Capsule, og vælg Manuel indstilling på Basemenuen. Skriv evt. adgangskoden. 2 Vælg Tilføj trådløs klient på Basemenuen. 3 Vælg, hvordan klienten skal have adgang til netværket:  Vælg PIN for at skrive det ottecifrede tal, der leveres af den klient, som anmoder om adgang til netværket.  Vælg “Første forsøg” for at give den første klient, der forsøger at oprette forbindelse, adgang til netværket. Når Time Capsule venter på, at en klient opretter forbindelse til netværket, blinker lysdioden blåt.Kapitel 2 Indstille Time Capsule 23 Vælg “Begræns klienters adgang til 24 timer”, hvis du kun vil give adgang til netværket i et døgn. Hvis du ikke vælger denne mulighed, har klienten adgang til netværket, indtil du fjerner den fra listen. Bruge Time Machine med Time Capsule Med programmet Time Machine i Mac OS X Leopard kan du sikkerhedskopiere alt på din computer, inkl. fotografier, musik, film og dokumenter. Når du har indstillet Time Machine, sikkerhedskopierer det automatisk din computer med regelmæssige mellemrum. Hvis du bruger Mac OS X v10.5.2 eller en nyere version, vil Time Machine, første gang du opretter forbindelse til Time Capsule, spørge dig, om du vil bruge programmet til at sikkerhedskopiere dine arkiver. Klik på “Brug som disk til sikkerhedskopi”, hvorefter Time Machine sørger for resten. Brug vinduet Time Machine i Systemindstillinger i Mac OS X Leopard til at indstille automatisk sikkerhedskopiering, vælge en anden disk til sikkerhedskopier eller justere andre indstillinger. Du indstiller eller justerer Time Machine på en computer, der bruger Mac OS X Leopard, på følgende måde: 1 Vælg Apple > Systemindstillinger, og klik derefter på Time Machine. 2 Skub kontakten til TIL. 3 Klik på Skift disk. 4 Vælg Time Capsule, og klik på “Brug til sikkerhedskopi”.24 Kapitel 2 Indstille Time Capsule Den første sikkerhedskopiering med Time Capsule og Time Machine kan vare en hel nat eller endnu længere, afhængigt af hvor mange data du sikkerhedskopierer. Du kan gøre den første sikkerhedskopiering hurtigere ved at slutte Time Capsule til computeren via Ethernet. Ved efterfølgende sikkerhedskopiering kopierer Time Machine kun de arkiver, der er ændret siden den forrige sikkerhedskopiering, så derfor tager sikkerhedskopieringen ikke lige så lang tid. Time Capsule er en fantastisk, trådløs løsning til sikkerhedskopiering af bærbare computere. Da den første sikkerhedskopiering kan vare temmelig længe, skal du slutte din bærbare computer til strømforsyningen – på den måde sparer du på batteriet og sikrer, at sikkerhedskopieringen ikke afbrydes. Du opnår desuden den bedste trådløse ydeevne, hvis du anbringer den bærbare computer i samme lokale som Time Capsule. Hvis du lukker din Mac ned eller sætter den på vågeblus under sikkerhedskopieringen, stopper Time Machine sikkerhedskopieringen og fortsætter derefter på samme sted, når din Mac er startet igen. Du kan få flere oplysninger om Time Machine, hvis du vælger Hjælp > Mac-hjælp på Hjælpemenuen på en computer, der bruger Mac OS X Leopard, og derefter skriver Time Machine i søgefeltet.3 25 3 Tip og fejlfinding Du kan hurtigt løse de fleste problemer med Time Capsule ved at følge de råd, der findes i dette kapitel. Hvis du ikke kan oprette forbindelse til Internet  Prøv at oprette forbindelse til Internet direkte fra computeren. Hvis du ikke kan oprette forbindelse, skal du sikre dig, at dine netværksindstillinger er korrekte. Hvis de ser ud til at være korrekte, og du stadig ikke kan oprette forbindelse, skal du kontakte Internetudbyderen.  Sørg for, at du opretter forbindelse til det rigtige trådløse netværk. Hvis du har glemt adgangskoden til netværket eller Time Capsule Du kan slette adgangskoden til AirPort-netværket og Time Capsule ved at nulstille Time Capsule. Du nulstiller adgangskoden til Time Capsule på følgende måde: 1 Brug en spids genstand (f.eks. en kuglepen) til at trykke på og holde nulstillingsknappen inde i et sekund. 26 Kapitel 3 Tip og fejlfinding Vigtigt: Hvis du holder nulstillingsknappen inde i mere end et sekund, kan du miste dine netværksindstillinger. 2 Vælg dit AirPort-netværk.  På en Macintosh skal du bruge AirPort-statusmenuen på menulinjen til at vælge det netværk, der er oprettet af Time Capsule (navnet på netværket ændres ikke).  På en computer, der bruger Windows XP, skal du holde markøren over symbolet for den trådløse forbindelse, indtil du kan se AirPort-netværkets navn (SSID) og derefter vælge det på listen, hvis der er flere tilgængelige netværk. 3 Åbn AirPort-værktøj (ligger i mappen Hjælpeprogrammer i mappen Programmer på en Macintosh og i Start > Alle programmer > AirPort på en computer med Windows XP). 4 Vælg Time Capsule, og vælg derefter Manuel indstilling på Basemenuen. 5 Klik på AirPort på værktøjslinjen, og klik derefter på Base. 6 Skriv en ny adgangskode til Time Capsule. 7 Klik på Trådløs, og vælg en krypteringsmetode på lokalmenuen Trådløs sikkerhed for at slå kryptering til og aktivere og aktivere adgangskodebeskyttelse på AirPort-netværket. Hvis du slår kryptering til, skal du skrive en ny adgangskode til AirPort-netværket. 8 Klik på Opdater for at genstarte Time Capsule og indlæse de nye indstillinger. Hvis Time Capsule ikke svarer Prøv at afmontere den og tilslutte den igen. Hvis Time Capsule holder helt op med at svare, skal du måske nulstille den.Kapitel 3 Tip og fejlfinding 27 Vigtigt: Når du nulstiller Time Capsule, slettes alle de aktuelle indstillinger, og fabriksindstillingerne til Time Capsule gendannes. Du nulstiller Time Capsule til fabriksindstillingerne på følgende måde: m Brug en spids genstand (f.eks. en kuglepen) til at trykke på og holde nulstillingsknappen inde, indtil statusindikatoren blinker hurtigt (omkring 5 sekunder). Time Capsule nulstilles med følgende indstillinger:  Time Capsule modtager IP-adressen vha. DHCP.  Netværkets navn nulstilles til Apple Network XXXXXX (hvor XXXXXX erstattes med de sidste seks cifre i AirPort-id'en).  Adgangskoden til Time Capsule nulstilles til public. Hvis Time Capsule stadig ikke reagerer, kan du prøve følgende: 1 Afmonter Time Capsule. 2 Brug en spids genstand til at trykke på og holde nulstillingsknappen inde, mens du tilslutter Time Capsule. Hvis statuslampen på Time Capsule blinker orange Ethernet-kablet er måske ikke tilsluttet korrekt, Time Capsule er måske uden for et AirPort-netværks rækkevidde, eller der kan være et problem hos Internetudbyderen. Hvis du har oprettet forbindelse til Internet via et DSL- eller kabelmodem, har modemmet måske tabt forbindelsen til netværket eller Internet. Selvom modemmet tilsyneladende fungerer korrekt, kan du prøve at afmontere modemmets strømforsyning, vente et par sekunder og derefter tilslutte det igen. Sørg for, at Time Capsule er sluttet direkte til modemmet via Ethernet, før du tilslutter modemmets strømforsyning igen.28 Kapitel 3 Tip og fejlfinding Hvis du vil vide mere om, hvorfor lampen blinker orange, kan du åbne AirPort-værktøj, vælge Time Capsule og derefter vælge Manuel indstilling på Basemenuen. Klik på Status for base for at se oplysninger om den blinkende lampe. Du kan også vælge “Overvåg baser” i AirPort-indstillinger. Hvis der er et problem i basen, åbner AirPort-værktøj og hjælper dig med at løse problemet. Hvis printeren ikke svarer Hvis du har sluttet en printer til USB-porten på Time Capsule, og computerne på AirPort-netværket ikke kan udskrive, kan du prøve at gøre følgende: 1 Sørg for, at printeren er tilsluttet og tændt. 2 Kontroller, at kablerne er sluttet korrekt til printeren og til USB-porten på Time Capsule. 3 Sørg for, at printeren er valgt på printerlisten på klientcomputerne. På en Macintosh-computer med Mac OS X v10.5 eller en nyere version:  Vælg Apple > Systemindstillinger, og klik på Udskriv & fax.  Klik på Tilføj (+), vælg printeren på listen, og klik derefter på Tilføj (+). På en Macintosh-computer med Mac OS X v10.2.7 eller en nyere version:  Åbn Printerværktøj, der ligger i mappen Hjælpeprogrammer i mappen Programmer.  Klik på Tilføj, hvis printeren ikke står på listen.  Vælg Bonjour på lokalmenuen, vælg printeren, og klik derefter på Tilføj (+). På en computer, der bruger Windows XP:  Åbn “Printere og faxenheder” på menuen Start.Kapitel 3 Tip og fejlfinding 29  Vælg printeren. Hvis printeren ikke står på listen, skal du klikke på Tilføj printer og derefter følge vejledningen på skærmen. 4 Sluk for printeren, vent nogle sekunder, og tænd den derefter igen. Opdatere AirPort-software Apple frigiver regelmæssigt opdateringer til AirPort-softwaren. Det anbefales, at du opdaterer Time Capsule, så den bruger den nyeste software. Du kan vælge “Søg efter opdateringer, når AirPort-værktøj starter” eller “Søg efter opdateringer” i AirPort-indstillinger. Hvis du vælger “Søg efter opdateringer”, skal du vælge en tidsangivelse, f.eks. ugentligt, på lokalmenuen for automatisk at søge efter opdateringer. Anbefalinger til placering af Time Capsule Følgende anbefalinger kan hjælpe med til, at Time Capsule opnår den maksimale trådløse rækkevidde og den optimale netværksdækning.  Placer Time Capsule i et åbent område, hvor der er få forhindringer, som f.eks. store møbler eller vægge. Anbring den ikke i nærheden af metalliske overflader.  Hvis du anbringer Time Capsule bag møbler, skal der mindst være 2,5 cm afstand mellem Time Capsule og kanten af møblet.  Undgå at anbringe Time Capsule på steder, der er omgivet af metaloverflader på tre eller flere sider. 30 Kapitel 3 Tip og fejlfinding  Hvis du anbringer Time Capsule i et underholdningscenter med dit stereoudstyr, skal du undgå at omgive Time Capsule fuldstændigt med lyd-, video- og strømkabler. Anbring Time Capsule, så kablerne er på den ene side. Sørg for, at der er så meget afstand som muligt mellem Time Capsule og kablerne.  Forsøg at anbringe Time Capsule mindst 8 m fra mikrobølgeovne og trådløse 2,4 eller 5 GHz telefoner eller andre kilder til forstyrrelse.  Anbring ikke andre genstande (bøger, aviser, små kæledyr osv.) oven på Time Capsule. De kan måske forhindre kølingen af Time Capsule. Forhold, der kan skabe forstyrrelser for AirPort Jo længere væk kilden til forstyrrelse er, desto mindre sandsynligt er det, at den skaber problemer. Følgende kan forstørre AirPort-kommunikationen:  Mikrobølgeovne.  DSS-radiosignaler (Direct Satellite Service)  Det originale koaksiale kabel, der følger med visse typer parabolantenner. Kontakt producenten af udstyret for at få nogle nyere kabler.  Visse elektriske enheder som højspændingsledninger, elektriske jernbanespor og elværker  Trådløse telefoner, der virker inden for 2,4 og 5 GHz båndet. Hvis du har problemer med din telefon eller AirPort-kommunikation, kan du skifte den kanal, som basen eller Time Capsule bruger, eller skifte kanal på telefonen.  Tilstødende baser, der bruger kanaler i nærheden. Hvis f.eks. base A er indstillet til kanal 1, bør base B indstilles til kanal 6 eller 11.4 31 4 Yderligere oplysninger, service og support Du kan finde flere oplysninger om brugen af Time Capsule på Internet og i hjælpen på skærmen. Kilder på Internet Du kan se de nyeste oplysninger om Time Capsule på www.apple.com/dk/airport. Hvis du vil registrere Time Capsule (hvis du ikke gjorde det, da du installerede software på cd'en med Time Capsule), skal du gå til www.apple.com/register. Oplysninger om service og support til AirPort, forskellige fora med produktoplysninger og feedback samt den nyeste software fra Apple findes på www.apple.com/dk/support/airport. Du kan få support uden for USA ved at gå ind på www.apple.com/dk/support og derefter vælge dit land.32 Kapitel 4 Yderligere oplysninger, service og support Hjælp på skærmen Hvis du vil vide mere om brugen af AirPort-værktøj sammen med Time Capsule, skal du åbne AirPort-værktøj og vælge Hjælp > Hjælp til AirPort-værktøj. Garantiservice Hvis Time Capsule er beskadiget eller ikke fungerer korrekt, skal du følge vejledningen i dette hæfte, i hjælpen på skærmen og i ressourcerne på Internet. Hvis Time Capsule stadig ikke virker, skal du gå til www.apple.com/dk/support for at få oplysninger om, hvordan du får garantiservice. Finde serienummeret på Time Capsule Serienummeret er trykt i bunden af Time Capsule.33 Appendiks Specifikationer og retningslinjer for sikkerhed for Time Capsule Specifikationer for Time Capsule  Frekvens: 2,4 og 5 GHz  Sendestyrke: Op til 23 dBm (nominelt)  Standarder: 802.11 DSSS 1 og 2 Mbps, 802.11a-, 802.11b-, 802.11g-specifikationer og udkast til 802.11n-specifikation Grænseflader  1 RJ-45 10/100/1000Base-T Gigabit Ethernet WAN (<)  3 RJ-45 10/100/1000Base-T Gigabit Ethernet LAN (G)  USB 2.0 (Universal Serial Bus) (d)  Trådløs 802.11 a/b/g/n AirPort Extreme Specifikationer for omgivelser  Driftstemperatur: 0° C til 35° C  Opbevaringstemperatur: –25° C til 60° C  Relativ luftfugtighed (drift): 20% til 80%  Relativ luftfugtighed (opbevaring): 10% til 90%, ikke kondenserende34 Appendiks Specifikationer og retningslinjer for sikkerhed for Time Capsule Størrelse og vægt  Længde: 197,0 mm  Bredde: 197,0 mm  Højde: 36,33 mm  Vægt: 1,6 kg MAC-adresser (Media Access Control) på hardware Time Capsule har tre hardwareadresser trykt i bunden af kabinettet:  AirPort-id: De to adresser bruges til at identificere Time Capsule på et trådløst netværk.  Ethernet-id: Det kan være nødvendigt at opgive denne adresse til din Internetudbyder for at slutte Time Capsule til Internet. Sikker brug af Time Capsule  Du kan kun afbryde strømmen til Time Capsule ved at tage ledningen ud af stikkontakten.  Når du tænder eller slukker for Time Capsule, skal du altid holde den i siderne. Sørg for, at du ikke rører ved metalbenene på stikket.  Time Capsule må under ingen omstændigheder åbnes, heller ikke når den er afmonteret. Hvis Time Capsule har brug for service, skal du læse “Yderligere oplysninger, service og support” på side 31.  Tving aldrig et stik ind i en port. Hvis stikket ikke kan sættes i porten uden besvær, passer det sikkert ikke til porten. Sørg for, at du bruger det rigtige stik, og hold stikket korrekt i forhold til porten.Appendiks Specifikationer og retningslinjer for sikkerhed for Time Capsule 35 Om drifts- og opbevaringstemperaturer  Når du bruger Time Capsule, vil kabinettet normalt blive varmt. Time Capsulekabinettet fungerer som en kølende overflade, der overfører varme fra enhedens inderside til den køligere luft udenfor. Undgå våde steder  Hold Time Capsule væk fra væsker som f.eks. drikkevarer, håndvaske, badekar, brusekabiner osv.  Beskyt Time Capsule mod direkte sollys og regn eller anden fugt.  Pas på ikke at spilde mad eller væske på Time Capsule. Hvis du gør det, skal du tage ledningen ud af stikkontakten, før du fjerner det spildte.  Brug ikke Time Capsule udendørs. Time Capsule er beregnet til indendørs brug. Foretag ikke selv reparationer Om håndtering Time Capsule kan blive beskadiget, hvis den ikke opbevares og håndteres korrekt. Vær omhyggelig med ikke at tabe Time Capsule, når du transporterer den. ADVARSEL: Reducer risikoen for elektrisk stød eller beskadigelse ved at undlade at bruge Time Capsule i eller i nærheden af vand eller våde områder. ADVARSEL: Forsøg ikke at åbne Time Capsule eller skille enheden ad. Du risikerer at få elektrisk stød, og at den begrænsede garanti ikke længere gælder. Udstyret indeholder ingen komponenter, som brugeren selv kan reparere eller udskifte.36 Regulatory Compliance Information Wireless Radio Use This device is restricted to indoor use due to its operation in the 5.15 to 5.25 GHz frequency range to reduce the potential for harmful interference to cochannel Mobile Satellite systems. Cet appareil doit être utilisé à l’intérieur. Exposure to Radio Frequency Energy The radiated output power of this device is well below the FCC and EU radio frequency exposure limits. However, this device should be operated with a minimum distance of at least 20 cm between its antennas and a person’s body and the antennas used with this transmitter must not be colocated or operated in conjunction with any other antenna or transmitter subject to the conditions of the FCC Grant. FCC Declaration of Conformity This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. See instructions if interference to radio or television reception is suspected Radio and Television Interference This computer equipment generates, uses, and can radiate radio-frequency energy. If it is not installed and used properly—that is, in strict accordance with Apple’s instructions—it may cause interference with radio and television reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in Part 15 of FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. You can determine whether your computer system is causing interference by turning it off. If the interference stops, it was probably caused by the computer or one of the peripheral devices. If your computer system does cause interference to radio or television reception, try to correct the interference by using one or more of the following measures:  Turn the television or radio antenna until the interference stops.  Move the computer to one side or the other of the television or radio.  Move the computer farther away from the television or radio.  Plug the computer into an outlet that is on a different circuit from the television or radio. (That is, make certain the computer and the television or radio are on circuits controlled by different circuit breakers or fuses.) If necessary, consult an Apple Authorized Service Provider or Apple. See the service and support information that came with your Apple product. Or, consult an experienced radio/television technician for additional suggestions. Important: Changes or modifications to this product not authorized by Apple Inc. could void the EMC compliance and negate your authority to operate the product.37 This product was tested for FCC compliance under conditions that included the use of Apple peripheral devices and Apple shielded cables and connectors between system components. It is important that you use Apple peripheral devices and shielded cables and connectors between system components to reduce the possibility of causing interference to radios, television sets, and other electronic devices. You can obtain Apple peripheral devices and the proper shielded cables and connectors through an Apple-authorized dealer. For non-Apple peripheral devices, contact the manufacturer or dealer for assistance. Responsible party (contact for FCC matters only) Apple Inc., Corporate Compliance, 1 Infinite Loop M/S 26-A, Cupertino, CA 95014-2084 Industry Canada Statement This Class B device meets all requirements of the Canadian interference-causing equipment regulations. Cet appareil numérique de la Class B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. VCCI Class B Statement Europa – erklæring om opfyldelse af EU-krav Du kan læse mere på webstedet www.apple.com/euro/compliance. Den Europæiske Union – oplysninger om bortskaffelse Dette symbol betyder, at dit produkt bør bortskaffes adskilt fra husholdningsaffald i henhold til nationale love og regulativer. Når dette produkts livscyklus er forbi, skal du aflevere det på en genbrugsplads, som er godkendt af de lokale myndigheder. På nogle genbrugspladser er det gratis at aflevere produkter. Den indsamling og genbrug af dit produkt, som sker i forbindelse med bortskaffelsen, hjælper med at bevare naturens ressourcer, og sikrer, at produktet genbruges på en måde, som beskytter vores sundhed og miljø. Oplysninger om bortskaffelse og genbrug Produktet har et internt batteri. Brugte batterier skal genbruges eller destrueres i henhold til gældende regler. Der findes oplysninger om Apples genbrugsprogram på www.apple.com/environment. California: The coin cell battery in your product contains perchlorates. Special handling and disposal may apply. Refer to www.dtsc.ca.gov/hazardouswaste/perchlorate. Deutschland: Dieses Gerät enthält Batterien. Bitte nicht in den Hausmüll werfen. Entsorgen Sie dieses Gerätes am Ende seines Lebenszyklus entsprechend der maßgeblichen gesetzlichen Regelungen. Nederlands: Gebruikte batterijen kunnen worden ingeleverd bij de chemokar of in een speciale batterijcontainer voor klein chemisch afval (kca) worden gedeponeerd.38 Taiwan: Singapore Wireless Certification Taiwan Warning Statements Korea Warning Statements © 2009 Apple Inc. Alle rettigheder forbeholdes. Apple, Apple-logoet, AirPort, AirPort Express, AirPort Extreme, Apple TV, Bonjour, iPod, Leopard, Macintosh, Mac OS og Time Capsule er varemærker tilhørende Apple Inc. og er registreret i USA og andre lande. Finder, iPhone og Time Machine er varemærker tilhørende Apple Inc. Andre nævnte produkt- og firmanavne kan være varemærker tilhørende deres respektive ejere.www.apple.com/airport www.apple.com/support/airport DK019-1384 iPod nano Benutzerhandbuch2 2 Inhalt Kapitel 1 4 iPod nano-Grundlagen 4 Der iPod nano im Überblick 5 Verwenden der Bedienelemente des iPod nano 10 Verwenden der Menüs des iPod nano 13 Der interne Lautsprecher des iPod nano 14 Verbinden und Trennen des iPod nano 17 Die Batterie des iPod nano Kapitel 2 21 Einrichten des iPod nano 22 Einrichten Ihrer iTunes-Mediathek 22 Importieren von Musik in iTunes 24 Hinzufügen weiterer Details zu Ihrer iTunes-Mediathek 24 Verwalten Ihrer Musik 26 Importieren von Videos in iTunes 27 Hinzufügen von Musik, Videos und anderen Inhalten zum iPod nano 27 Erstmaliges Verbinden des iPod nano mit einem Computer 29 Automatisches Synchronisieren von Musik 31 Automatisches Synchronisieren von Videos 33 Hinzufügen von Podcasts zum iPod nano 33 Hinzufügen von iTunes U-Inhalten zum iPod nano 34 Hinzufügen von Hörbüchern zum iPod nano 35 Hinzufügen weiterer Inhalte zum iPod nano 35 Manuelles Verwalten des iPod nano 37 Einrichten von VoiceOver Kapitel 3 38 Anhören von Musik 38 Abspielen von Musik und anderem Audiomaterial 45 Verwenden der Funktion „Genius“ auf dem iPod nano 56 Abspielen von Podcasts 56 Abspielen von iTunes U-Inhalten 57 Anhören von HörbüchernInhalt 3 Kapitel 4 58 Ansehen von Videos 58 Ansehen von Videos auf dem iPod nano 59 Ansehen von Videos auf einem an den iPod nano angeschlossenen Fernsehgerät Kapitel 5 62 Verwenden der Videokamera 63 Aufnehmen von Video 64 Abspielen aufgenommener Videos 65 Löschen aufgenommener Videos 65 Importieren aufgenommener Videos auf Ihren Computer Kapitel 6 69 Anhören von FM-Radiosendungen 71 Einstellen des FM-Radios 72 Stoppen von Live-Radiosendungen 75 Kennzeichnen von Titeln für die Synchronisierung mit iTunes 76 Verwenden des Menüs „Radio“ Kapitel 7 78 Fotofunktionen 81 Anzeigen von Fotos 84 Hinzufügen von Fotos vom iPod nano zu einem Computer Kapitel 8 85 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 85 Verwenden des iPod nano als Schrittzähler 88 Aufzeichnen von Sprachmemos 91 Verwenden zusätzlicher Einstellungen 96 Synchronisieren von Kontakten, Kalendern und Aufgabenlisten 98 Mono Audio 98 Verwenden der Sprachausgabe für Menüs als Bedienungshilfe 99 Verwenden des iPod nano als externes Volume 100 Sichern und Lesen von Textnotizen 101 iPod nano-Zubehör Kapitel 9 103 Tipps und Fehlerbeseitigung 103 Allgemeine Vorschläge 110 Aktualisieren und Wiederherstellen der iPod-Software Kapitel 10 111 Sicherheit und Pflege 111 Wichtige Sicherheitsinformationen 115 Wichtige Informationen zur Handhabung Kapitel 11 116 Weitere Informationen, Service und Support1 4 1 iPod nano-Grundlagen Lesen Sie in diesem Kapitel, welche Funktionen Ihr iPod nano bietet, wie Sie seine Bedienelemente benutzen und vieles mehr. Der iPod nano im Überblick Lernen Sie die Bedienelemente des iPod nano kennen: 30-poliger Anschluss Click Wheel Vor/Schneller Vorlauf Mitteltaste Kopfhöreranschluss Taste „Menu“ Zurück/Schneller Rücklauf Start/Pause Schalter „Hold“ Mikrofon ObjektivKapitel 1 iPod nano-Grundlagen 5 Neue Merkmale und Funktionen des iPod nano  Größerer 2,2"-Bildschirm  Gehäuse aus poliertem Aluminium  Integrierte Videokamera für die Aufnahme von Videos mit Spezialeffekten  FM-Radio mit Pausenfunktion für Live-Sendungen und Kennzeichnung von Titeln für den Kauf im iTunes Store (Kennzeichnung möglicherweise nicht in allen Ländern möglich)  Lautsprecher und Mikrofon integriert  Schrittzähler zur Aufzeichnung von Trainingserfolgen Verwenden der Bedienelemente des iPod nano Die Bedienelemente des iPod nano sind einfach zu finden und zu verwenden. Drücken Sie eine beliebige Taste, um den iPod nano einzuschalten. Wenn Sie den iPod nano das erste Mal einschalten, wird das Sprachmenü angezeigt. Blättern Sie mit dem Click Wheel zu Ihrer Sprache und drücken Sie dann die Mitteltaste, um die Sprache auszuwählen. Nun wird das Hauptmenü in Ihrer Sprache angezeigt. Verwenden Sie das Click Wheel und die Mitteltaste, um durch die Menüs auf dem Bildschirm zu navigieren und um Musiktitel abzuspielen, Einstellungen zu ändern und Informationen abzurufen. Bewegen Sie den Daumen leicht über das Click Wheel, um eine Menüoption hervorzuheben. Drücken Sie die Mitteltaste, um die Option auszuwählen. Drücken Sie die Taste „Menu“, um zum vorherigen Menü zurückzuwechseln.6 Kapitel 1 iPod nano-Grundlagen Für folgende Funktionen verwenden Sie die iPod nano-Bedienelemente: Funktion Aktion Einschalten des iPod nano Drücken Sie eine beliebige Taste. Ausschalten des iPod nano Drücken Sie die Taste „Start/Pause“ (’) und halten Sie diese gedrückt. Einschalten der Hintergrundbeleuchtung Drücken Sie eine beliebige Taste oder verwenden Sie das Click Wheel. Deaktivieren der iPod nanoBedienelemente (damit die Tasten nicht aus Versehen gedrückt werden) Schieben Sie den Schalter „Hold“ auf „Hold“ (ein orangefarbenes Feld wird angezeigt). Zurücksetzen des iPod nano (wenn er nicht reagiert) Schieben Sie den Schalter „Hold“ auf „Hold“ und wieder in die vorherige Position. Drücken Sie die Taste „Menu“ und die Mitteltaste gleichzeitig etwa 6 Sekunden lang, bis das Apple-Logo zu sehen ist. Auswählen eines Menüobjekts Blättern Sie mit dem Click Wheel zum gewünschten Objekt und drücken Sie die Mitteltaste, um das Objekt auszuwählen. Zurückkehren zum vorherigen Menü Drücken Sie die Taste „Menu“. Zurückkehren direkt zum Hauptmenü Drücken und halten Sie die Taste „Menu“. Zugreifen auf weitere Optionen Drücken und halten Sie die Mitteltaste, bis ein Menü angezeigt wird. Suchen nach einem Titel Wählen Sie „Musik“ aus dem Hauptmenü. Suchen nach einem Video Wählen Sie „Videos“ aus dem Hauptmenü. Abspielen eines Musiktitels oder Videos Wählen Sie den Musiktitel oder das Video aus und drücken Sie die Mitteltaste oder die Taste „Start/Pause“ (’). Der iPod nano muss auf dem Computer ausgeworfen werden, damit Musiktitel und Videos abgespielt werden können. Anhalten eines Musiktitels oder Videos Drücken Sie die Taste „Start/Pause“ (’) oder ziehen Sie den Stecker der Ohrhörer aus dem Anschluss. Ändern der Lautstärke Wenn der Bildschirm „Sie hören“ zu sehen ist, können Sie hierzu das Click Wheel verwenden. Abspielen aller Musiktitel in einer Wiedergabeliste oder einem Album Wählen Sie eine Wiedergabeliste oder ein Album aus und drücken Sie die Taste „Start/Pause“ (’). Zufällige Wiedergabe Wählen Sie „Zufällige Titel“ aus dem Hauptmenü. Wechseln zu einem zufällig gewählten Titel Schütteln Sie den iPod nano. Aktivieren oder Deaktivieren der Option „Schütteln“ für die Zufallswiedergabe Wählen Sie „Einstellungen“ > „Wiedergabe“, wählen Sie „Schütteln“ und wählen Sie dann „Zufällig“ oder „Aus“.Kapitel 1 iPod nano-Grundlagen 7 Wechseln zu einer beliebigen Stelle in einem Musiktitel oder Video Drücken Sie, wenn der Bildschirm „Sie hören“ zu sehen ist, die Mitteltaste, um den Navigationsbalken einzublenden (die Abspielposition auf dem Balken gibt die aktuelle Position im Titel an) und navigieren Sie dann zu einem beliebigen Punkt im Musiktitel oder Video. Springen zum nächsten Musiktitel oder Kapitel in einem Hörbuch oder Podcast Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘). Erneutes Abspielen eines Musiktitels oder Videos von Anfang an Drücken Sie die Taste „Zurück/Schneller Rücklauf“ (]). Vor- oder Zurückspulen eines Titels, eines Videos oder einer gestoppten Radiosendung Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) bzw. „Zurück/ Schneller Rücklauf“ (]) und halten Sie diese gedrückt. Hinzufügen eines Titels zur „On-The-Go“-Wiedergabeliste Spielen Sie einen Musiktitel ab oder wählen Sie ihn aus. Drücken Sie dann die Mitteltaste und halten Sie diese gedrückt, bis ein Menü angezeigt wird. Wählen Sie „Zu On-the-Go hinzufügen“ und drücken Sie die Mitteltaste. Abspielen des vorherigen Musiktitels oder Kapitels in einem Hörbuch oder Podcast Drücken Sie zweimal die Taste „Zurück/Schneller Rücklauf“ (]). Erstellen einer GeniusWiedergabeliste Spielen Sie einen Musiktitel ab oder wählen Sie ihn aus. Drücken Sie dann die Mitteltaste und halten Sie diese gedrückt, bis ein Menü angezeigt wird. Wählen Sie „Genius starten“ und drücken Sie dann die Mitteltaste (die Option „Genius starten“ wird nur dann auf dem Bildschirm „Sie hören“ angezeigt, wenn für den ausgewählten Titel Genius-Daten vorliegen). Sichern einer GeniusWiedergabeliste Erstellen Sie eine Genius-Wiedergabeliste, wählen Sie „Liste sichern“ und drücken Sie dann die Mitteltaste. Abspielen einer gesicherten Genius-Wiedergabeliste Wählen Sie aus dem Menü „Wiedergabelisten“ eine Genius-Wiedergabeliste aus und drücken Sie dann die Taste „Start/Pause“ (’). Abspielen einer GeniusMischung (Genius-Mix) Wählen Sie „Genius-Mixe“ aus dem Menü „Musik“. Wählen Sie eine Mischung und drücken Sie dann die Taste „Start/Pause“ (’). Aufnehmen von Videos Wählen Sie „Videokamera“ aus dem Hauptmenü. Drücken Sie die Mitteltaste, um die Aufnahme zu starten oder zu stoppen. Aufnehmen von Videos mit Spezialeffekten Drücken Sie vor der Aufnahme die Mitteltaste und halten Sie sie gedrückt, um Effekte anzuzeigen. Blättern Sie dann mit dem Click Wheel durch die Effekte und wählen Sie mit der Mitteltaste den gewünschten Effekt aus. Drücken Sie erneut die Mitteltaste, um die Aufnahme zu starten. Wiedergeben aufgenommener Videos Drücken Sie die Mitteltaste, um die Aufnahme zu beenden. Drükken Sie dann die Taste „Menu“, um den Bildschirm „Film“ zu öffnen. Wählen Sie ein Video aus und spielen Sie es durch Drücken der Mitteltaste ab. Funktion Aktion8 Kapitel 1 iPod nano-Grundlagen Ansehen aufgenommener Videos Wählen Sie aus dem Menü „Videos“ die Option „Filme“ aus. Wählen Sie dann ein Video aus und drücken Sie die Taste „Start/Pause“ (’). Anhören von FM-Radiosendungen Wählen Sie „Radio“ aus dem Hauptmenü. Auswählen eines FM-Radiosenders Verwenden Sie das Click Wheel, um den gewünschten Sender einzustellen. Wechseln zwischen FM-Radiosendern Wenn die Radiosenderauswahl angezeigt wird, drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]), um zum nächsten oder vorherigen Radiosender zu wechseln. Nicht verfügbar, wenn Radiosender als Favoriten gesichert werden. Suchen nach FM-Radiosendern Wenn die Radiosenderauswahl angezeigt wird, drücken und halten Sie die Taste „Vor/Schneller Vorlauf“ (‘). Drücken Sie die Mitteltaste, um die Sendersuche zu stoppen. Sichern eines FM-Radiosenders als Favoriten Drücken und halten Sie die Mitteltaste, bis ein Menü angezeigt wird. Wählen Sie dann „Voreinstellung hinzufügen“. Stoppen und Fortsetzen von Live-Radiosendungen Drücken Sie in einem beliebigen Bildschirm die Taste „Start/Pause“ (’), während Sie Radio hören. Drücken Sie erneut die Taste „Start/ Pause“ (’), um die Wiedergabe fortzusetzen. Bei einer Änderung des Radiosenders werden gestoppte Radiosendungen gelöscht. Wechseln zwischen Radiosenderauswahl und dem Bildschirm „Live-Pause“ Drücken Sie die Mitteltaste. Kennzeichnen eines Titels im Radio Drücken Sie die Mitteltaste und halten Sie sie gedrückt, um Titel zu kennzeichnen, die über ein entsprechendes Symbol verfügen. Synchronisieren Sie Ihren iPod mit iTunes, um eine Hörprobe gekennzeichneter Titel abzuspielen und sie zu kaufen. Verwenden des Schrittzählers (Pedometer) Wählen Sie aus dem Menü „Extras“ die Option „Fitness“ und anschließend „Pedometer“ aus. Drücken Sie die Mitteltaste, um die Erfassung der Trainingsdaten zu starten oder zu stoppen. Aufnehmen eines Sprachmemos Wählen Sie aus dem Menüs „Extras“ die Option „Sprachmemos“. Drücken Sie die Taste „Start/Pause“ (’), um die Aufnahme zu starten oder zu stoppen. Drücken Sie die Mitteltaste, um Kapitelmarkierungen hinzuzufügen. Ermitteln der Seriennummer des iPod nano Wählen Sie aus dem Hauptmenü „Einstellungen“ > „Über“ und drücken Sie die Mitteltaste, bis die Seriennummer angezeigt wird. Alternativ können Sie auf der Rückseite des iPod nano nachsehen. Funktion AktionKapitel 1 iPod nano-Grundlagen 9 Deaktivieren der Bedienelemente des iPod nano Wenn Sie vermeiden möchten, versehentlich den iPod nano einzuschalten oder Bedienelemente zu aktivieren, können Sie diese mit dem Schalter „Hold“ deaktivieren. Mit dem Schalter „Hold“ wird das Click Wheel deaktiviert, ebenso wie Funktionen, die durch Bewegung aktiviert werden, etwa das Schütteln für die Zufallswiedergabe und das Drehen zum Starten oder Beenden von Cover Flow. Gehen Sie wie folgt vor, um die Bedienelemente des iPod nano zu deaktivieren: m Schieben Sie den Schalter „Hold“ auf „Hold“ (ein orangefarbenes Feld wird angezeigt). Wenn Sie die Bedienelemente deaktivieren, während Sie den iPod nano verwenden, wird das gerade abgespielte Objekt (Titel, Wiedergabeliste, Podcast oder Video) weiterhin abgespielt. Auch der Schrittzähler zählt weiterhin die Schritte, wenn er aktiviert ist. Möchten Sie die Wiedergabe anhalten oder unterbrechen, schieben Sie den Schalter „Hold“ zurück, um die Bedienelemente wieder zu aktivieren.10 Kapitel 1 iPod nano-Grundlagen Verwenden der Menüs des iPod nano Nach dem Einschalten des iPod nano wird das Hauptmenü angezeigt. Wählen Sie Menüoptionen aus, um Funktionen auszuführen oder zu anderen Menüs zu wechseln. Symbole am oberen Rand des Bildschirms zeigen den Status des iPod nano an. Angezeigtes Objekt Funktion Menütitel Zeigt den Titel des aktuellen Menüs an. Der Titel des Menüs wird nicht angezeigt, wenn das Schlosssymbol zu sehen ist. Schrittzählersymbol Wird eingeblendet, wenn der Schrittzähler aktiviert ist. Wiedergabesymbol Das Symbol für „Wiedergabe“ (“) wird angezeigt, wenn ein Musiktitel, ein Video oder ein sonstiges Objekt abgespielt wird. Das Symbol für „Pause“ (1) wird angezeigt, wenn das Objekt angehalten wurde. Batteriesymbol Das Batteriesymbol zeigt den ungefähren Ladezustand der Batterie an. Schlosssymbol Das Schlosssymbol wird angezeigt, wenn der Schalter „Hold“ auf „Hold“ gesetzt ist. Dieses Symbol weist darauf hin, dass die Bedienelemente des iPod nano deaktiviert sind. Das Schlosssymbol ersetzt dann den Menütitel. Menüoptionen Mit dem Click Wheel können Sie durch die Menüoptionen blättern. Drücken Sie die Mitteltaste, um eine Option auszuwählen. Ein Pfeil neben einer Menüoption zeigt an, dass die Option zu einem weiteren Menü oder einem weiteren Bildschirm führt. Vorschaubereich Zeigt Albumcover, Fotos und andere Informationen zum gewählten Menüobjekt an. Menütitel Schrittzählersymbol Batteriesymbol Menüoptionen Vorschaubereich Wiedergabesymbol SchlosssymbolKapitel 1 iPod nano-Grundlagen 11 Hinzufügen oder Löschen von Menüoptionen im Hauptmenü Sie können, falls gewünscht, häufig verwendete Optionen zum iPod nano-Hauptmenü hinzufügen. Sie können beispielsweise die Menüoption „Titel“ zum Hauptmenü hinzufügen, sodass Sie nicht mehr „Musik“ wählen müssen, bevor Sie „Titel“ auswählen können. Gehen Sie wie folgt vor, um Optionen im Hauptmenü hinzuzufügen oder zu löschen: 1 Wählen Sie „Einstellungen“ > „Allgemein“ > „Hauptmenü“. 2 Wählen Sie alle Objekte aus, die im Hauptmenü angezeigt werden sollen. Ein Häkchen weist darauf hin, welche Objekte hinzugefügt wurden. Deaktivieren des Vorschaubereichs Im Vorschaubereich unten im Hauptmenü werden Albumcover, Fotominiaturen, der verfügbare Speicherplatz und weitere Informationen angezeigt. Sie können den Vorschaubereich deaktivieren, um mehr Platz für die Anzeige von Menüobjekten zu erhalten. Gehen Sie wie folgt vor, um den Vorschaubereich zu aktivieren oder zu deaktivieren: m Wählen Sie „Einstellungen“ > „Allgemein“ > „Hauptmenü“ > „Vorschau“ und drücken Sie dann die Mitteltaste, um „Ein“ oder „Aus“ auszuwählen. Im Vorschaubereich werden Albumcover zu einer bestimmten Kategorie nur dann angezeigt, wenn auf dem iPod nano in der entsprechenden Kategorie mindestens fünf Objekte mit Covern vorhanden sind. Festlegen der Schriftgröße in Menüs Der iPod nano kann Text in zwei verschiedenen Größen anzeigen: Standard und Groß. Gehen Sie wie folgt vor, um die Schriftgröße festzulegen: m Wählen Sie „Einstellungen“ > „Allgemein“ > „Schriftgröße“ und wählen Sie dann durch Drücken der Mitteltaste „Standard“ oder „Groß“ aus. Einstellen der Sprache Der iPod nano bietet verschiedene Sprachen zur Auswahl. Gehen Sie wie folgt vor, um die Sprache festzulegen: m Wählen Sie „Einstellungen“ > „Sprache“ und wählen Sie dann eine Sprache aus.12 Kapitel 1 iPod nano-Grundlagen Einstellen des Timers für die Hintergrundbeleuchtung Sie können festlegen, dass die Hintergrundbeleuchtung den Bildschirm für eine bestimmte Dauer beleuchtet, wenn Sie eine Taste drücken oder das Click Wheel verwenden. Die Standardeinstellung hierfür ist 10 Sekunden. Gehen Sie wie folgt vor, um den Timer für die Hintergrundbeleuchtung einzustellen: m Wählen Sie „Einstellungen“ > „Allgemein“ > „Beleuchtung“ und wählen Sie dann die gewünschte Zeitspanne aus. Wählen Sie „Immer ein“, um zu verhindern, dass die Hintergrundbeleuchtung ausgeschaltet wird (bei Auswahl dieser Option verringert sich die Batterieleistung). Einstellen der Helligkeit des Bildschirms Sie können die Helligkeit des iPod nano-Bildschirms anpassen. Gehen Sie wie folgt vor, um die Helligkeit des Bildschirms festzulegen: m Wählen Sie „Einstellungen“ > „Allgemein“ > „Helligkeit“ und passen Sie die Helligkeit mit dem Click Wheel an. Sie können die Helligkeit einstellen, während eine Diashow oder ein Video wiedergegeben wird. Drücken Sie die Mitteltaste, bis der Helligkeitsregler angezeigt wird. Passen Sie die Helligkeit dann mit dem Click Wheel an. Deaktivieren des Click Wheel-Klicktons Beim Blättern durch Menüobjekte kann über die Ohrhörer oder Kopfhörer und den internen Lautsprecher des iPod nano ein Klickton ausgegeben werden. Der Klickton des Click Wheel lässt sich deaktivieren. Gehen Sie wie folgt vor, um den Click Wheel-Klickton zu deaktivieren: m Wählen Sie „Einstellungen“ > „Allgemein“ und setzen Sie die Option „Klicken“ auf „Aus“. Setzen Sie die Option „Klicken“ auf „Ein“, um den Klickton wieder zu aktivieren. Schnelles Blättern durch lange Listen Sie können schnell durch eine lange Liste blättern, indem Sie den Daumen schnell auf dem Click Wheel bewegen. Hinweis: Es werden nicht alle Sprachen unterstützt. Gehen Sie wie folgt vor, um schnell durch Objekte zu blättern: 1 Bewegen Sie Ihren Daumen schnell auf dem Click Wheel, um einen Buchstaben des Alphabets auf dem Bildschirm anzuzeigen. 2 Navigieren Sie mit dem Click Wheel im Alphabet zum ersten Buchstaben des Objekts, das Sie suchen. Objekte, deren erstes Zeichen ein Symbol oder eine Zahl ist, werden nach dem Buchstaben „Z“ aufgeführt.Kapitel 1 iPod nano-Grundlagen 13 3 Nehmen Sie den Daumen kurz vom Click Wheel, um mit normaler Geschwindigkeit zu blättern. 4 Navigieren Sie mit dem Click Wheel zu dem gewünschten Objekt. Informationen zu Ihrem iPod nano Sie können Informationen zu Ihrem iPod nano abrufen, etwa die Größe des verfügbaren Speicherplatzes, die Anzahl der Musiktitel, Videos, Fotos und sonstigen gespeicherten Objekte sowie die Seriennummer, das Modell und die Softwareversion. Gehen Sie wie folgt vor, um Informationen zu Ihrem iPod nano abzurufen: m Wählen Sie „Einstellungen“ > „Über“ und drücken Sie die Mitteltaste, um nacheinander alle Informationsbildschirme einzublenden. Zurücksetzen aller Einstellungen Sie können alle Objekte im Menü „Einstellungen“ auf ihre Standardeinstellung zurücksetzen. Gehen Sie wie folgt vor, um alle Einstellungen zurückzusetzen: m Wählen Sie „Einstellungen“ > „Einstellungen zurücksetzen“ und wählen Sie dann „Zurücksetzen“. Der interne Lautsprecher des iPod nano Mit dem internen Lautsprecher des iPod nano können Sie beliebiges Audiomaterial auf dem iPod nano ohne Ohr- oder Kopfhörer anhören. Eine Ausnahme stellen Sendungen des integrierten FM-Radios dar, das das Kabel von Ohr- oder Kopfhörer als Antenne nutzt. Durch den Anschluss von Ohr- oder Kopfhörern an den iPod nano wird der interne Lautsprecher deaktiviert. Das gerade wiedergegebene Audiomaterial wird weiterhin abgespielt, allerdings nur über die Ohr- oder Kopfhörer. Wenn Sie die Ohr- oder Kopfhörer trennen, während das Audiomaterial wiedergegeben wird, wird die Wiedergabe unterbrochen. Drücken Sie die Taste „Start/Pause“ (’), um das Audiomaterial wieder über den internen Lautsprecher anzuhören. Wenn Sie die Ohr- oder Kopfhörer trennen, während das Radio läuft oder angehalten ist, stoppt die Wiedergabe und eine evtl. angehaltene Radiosendung wird gelöscht. Wenn Sie „Videokamera“ oder „Sprachmemos“ wählen, während Audiomaterial abgespielt wird, wird die Wiedergabe gestoppt.14 Kapitel 1 iPod nano-Grundlagen Verbinden und Trennen des iPod nano Sie verbinden den iPod nano mit Ihrem Computer, um Musik, Videos, Fotos und Dateien zum iPod nano hinzuzufügen, um aufgenommene Videos und Sprachmemos auf den Computer zu importieren und um die Batterie zu laden. Trennen Sie den iPod nano wieder, wenn Sie damit fertig sind. Wichtig: Die Batterie wird nicht aufgeladen, wenn sich Ihr Computer im Ruhezustand befindet. Verbinden des iPod nano Gehen Sie wie folgt vor, um den iPod nano mit Ihrem Computer zu verbinden: m Schließen Sie das mitgelieferte Dock Connector-auf-USB-Kabel an einen HighPower-USB 2.0-Anschluss Ihres Computers und das andere Ende des Kabels an den iPod nano an. Wenn Sie ein iPod Dock verwenden, schließen Sie das Kabel an einen USB 2.0- Anschluss Ihres Computers und das andere Ende an das Dock an. Setzen Sie den iPod nano dann in das Dock. Hinweis: Der USB-Anschluss der meisten Tastaturen liefert nicht ausreichend Strom, um den iPod nano zu laden. Schließen Sie den iPod nano an einen USB 2.0-Anschluss Ihres Computers an. Standardmäßig synchronisiert iTunes Musiktitel auf dem iPod nano automatisch, wenn Sie ihn mit dem Computer verbinden. Sobald die Synchronisierung abgeschlossen ist, können Sie den iPod nano vom Computer trennen. Sie können Musiktitel synchronisieren, während die iPod nano-Batterie aufgeladen wird. Wenn der iPod nano für das automatische Synchronisieren von Musiktiteln konfiguriert ist und Sie ihn an einen anderen Computer anschließen, werden Sie von iTunes vor dem Synchronisieren von Musik aufgefordert, den Vorgang zu bestätigen. Wenn Sie auf „Ja“ klicken, werden die Musiktitel und anderen Audiodateien auf Ihrem iPod nano gelöscht und durch Titel und andere Audiodateien ersetzt, die sich auf dem Computer befinden, mit dem der iPod nano verbunden ist. Informationen zum Hinzufügen von Musik zum iPod nano und Verwenden des iPod nano mit mehreren Computern finden Sie in Kapitel 2 „Einrichten des iPod nano“ auf Seite 21.Kapitel 1 iPod nano-Grundlagen 15 Trennen des iPod nano Trennen Sie den iPod nano keinesfalls während der Synchronisierung. Dem Bildschirm Ihres iPod nano können Sie entnehmen, ob Sie den iPod nano vom Computer trennen können. Trennen Sie den iPod nano nicht, während die Meldung „Verbunden“ oder „Synchronisieren“ angezeigt wird, da ansonsten Dateien auf dem iPod nano beschädigt werden können. Wird eine dieser Meldungen eingeblendet, müssen Sie den iPod nano auswerfen, bevor Sie ihn vom Computer trennen. Wenn das Hauptmenü oder ein großes Batteriesymbol angezeigt wird, können Sie den iPod nano vom Computer trennen. Wenn Sie den iPod nano für eine manuelle Verwaltung von Musiktiteln konfiguriert haben (vgl. „Manuelles Verwalten des iPod nano“ auf Seite 35) oder wenn der iPod nano als Festplatte aktiviert ist (vgl. „Verwenden des iPod nano als externes Volume“ auf Seite 99), müssen Sie den iPod nano immer auswerfen, bevor Sie ihn vom Computer trennen. Falls Sie den iPod nano versehentlich vom Computer trennen, ohne ihn auszuwerfen, verbinden Sie ihn wieder mit Ihrem Computer und synchronisieren Sie ihn erneut.16 Kapitel 1 iPod nano-Grundlagen Gehen Sie wie folgt vor, um den iPod nano auszuwerfen: m Klicken Sie in iTunes auf die Taste „Auswerfen“ (C) neben dem iPod nano in der Geräteliste auf der linken Seite des iTunes-Fensters. Sie können den iPod nano unbesorgt vom Computer trennen, wenn eine dieser beiden Meldungen angezeigt wird: Wenn Sie einen Mac verwenden, können Sie den iPod nano auch auswerfen, indem Sie das iPod nano-Symbol vom Schreibtisch in den Papierkorb bewegen. Wenn Sie einen Windows-PC verwenden, können Sie den iPod nano im Bildschirm „Mein Computer“ auch auswerfen, indem Sie auf das Symbol für das sichere Entfernen von Hardware im Windows-Infobereich klicken und den iPod nano auswählen. Gehen Sie wie folgt vor, um den iPod nano zu trennen: 1 Trennen Sie die Ohr- oder Kopfhörer, wenn diese angeschlossen sind. 2 Trennen Sie das Kabel vom iPod nano. Befindet sich der iPod nano im Dock, nehmen Sie ihn einfach heraus. Kapitel 1 iPod nano-Grundlagen 17 Die Batterie des iPod nano Der iPod nano hat eine interne Batterie, die vom Benutzer nicht entfernt oder ausgetauscht werden kann. Optimale Ergebnisse erzielen Sie, wenn Sie die Batterie beim erstmaligen Verwenden des iPod nano mindestens drei Stunden lang aufladen bzw. so lange aufladen, bis das Batteriesymbol im Statusbereich des Bildschirms anzeigt, dass die Batterie vollständig aufgeladen ist. Wenn der iPod nano längere Zeit nicht verwendet wurde, muss die Batterie möglicherweise aufgeladen werden. Hinweis: Der iPod nano verbraucht auch nach dem Ausschalten Batteriestrom. Die Batterie des iPod nano ist nach ungefähr eineinhalb Stunden zu 80 Prozent und nach ungefähr drei Stunden vollständig aufgeladen. Wenn Sie den iPod nano aufladen, während Sie Dateien hinzufügen, Musik abspielen, Videos ansehen oder eine Diashow vorführen, dauert der Ladevorgang u. U. länger. Aufladen der Batterie des iPod nano Sie haben zwei Möglichkeiten zum Aufladen der Batterie des iPod nano:  Verbinden Sie den iPod nano mit Ihrem Computer.  Verwenden Sie den separat erhältlichen Apple USB Power Adapter (Netzteil). Gehen Sie wie folgt vor, um die Batterie über Ihren Computer aufzuladen: m Schließen Sie den iPod nano an einen USB 2.0-Anschluss Ihres Computers an. Der Computer muss eingeschaltet sein und darf sich nicht im Ruhezustand befinden. Wenn auf dem iPod nano-Bildschirm „Wird geladen“ ein Batteriesymbol sichtbar ist, wird die Batterie aufgeladen. Wird der Bildschirm „Geladen“ angezeigt, ist die Batterie vollständig aufgeladen. Wird keiner der beiden Bildschirme angezeigt, ist der iPod nano möglicherweise nicht an einem High-Power USB-Anschluss angeschlossen. Probieren Sie einen anderen USBAnschluss an Ihrem Computer aus. 18 Kapitel 1 iPod nano-Grundlagen Wichtig: Wenn die Meldung „Wird geladen, bitte warten“ oder „Bitten laden Sie die Batterie auf“ auf dem Bildschirm des iPod nano angezeigt wird, muss erst die Batterie geladen werden, bevor der iPod nano mit Ihrem Computer kommunizieren kann. Beachten Sie hierzu den Abschnitt „Auf dem iPod nano wird die Meldung „Bitte laden Sie die Batterie auf“ angezeigt“ auf Seite 106. Wenn Sie den iPod nano aufladen möchten und Ihr Computer nicht in der Nähe ist, können Sie hierzu den optional erhältlichen Apple USB Power Adapter (Netzteil) verwenden. Gehen Sie wie folgt vor, um die Batterie mit dem Apple USB Power Adapter (Netzteil) aufzuladen: 1 Verbinden Sie den Netzteilstecker mit dem Netzteil (möglicherweise ist dies bereits geschehen). 2 Schließen Sie das Dock Connector-auf-USB-Kabel an das Netzteil und das andere Ende des Kabels an den iPod nano an. 3 Schließen Sie das Netzteil an eine funktionierende Steckdose an. Apple USB Power Adapter (Netzteil) (Ihr Netzteil kann anders aussehen.) iPod-USB-KabelKapitel 1 iPod nano-Grundlagen 19 Die verschiedenen Symbole für den Batteriestatus Wenn der iPod nano nicht an eine Stromquelle angeschlossen ist, zeigt ein Batteriesymbol oben rechts im iPod nano-Bildschirm an, wie viel Batterieladung ungefähr noch vorhanden ist. Ist der iPod nano am Stromnetz angeschlossen, ändert sich das Batteriesymbol, wenn die Batterie aufgeladen wird bzw. vollständig aufgeladen ist. Es ist möglich, den iPod nano vom Computer zu trennen und ihn zu verwenden, bevor die Batterie vollständig aufgeladen ist. Hinweis: Die Anzahl der Ladezyklen bei wiederaufladbaren Batterien ist begrenzt. Daher müssen diese Batterien irgendwann ersetzt werden. Die Batterielaufzeit und die Anzahl der Ladezyklen hängt von der Nutzung und von den gewählten Einstellungen ab. Informationen hierzu finden Sie auf der Website: www.apple.com/de/batteries. Die Batterie ist weniger als 20 % aufgeladen. Die Batterie ist etwa zur Hälfte aufgeladen. Die Batterie ist vollständig aufgeladen. Die Batterie wird aufgeladen (Blitzsymbol). Die Batterie ist vollständig aufgeladen (Steckersymbol).20 Kapitel 1 iPod nano-Grundlagen Verbessern der Batterieleistung mit der Option „Energie sparen“ Mithilfe der Option „Energie sparen“ lässt sich die Zeit zwischen den Ladezyklen der Batterie verlängern, indem der Bildschirm des iPod nano ausgeschaltet wird, wenn Sie die Bedienelemente nicht verwenden. Die Option „Energie sparen“ ist standardmäßig aktiviert. Gehen Sie wie folgt vor, um die Option „Energie sparen“ zu aktivieren oder zu deaktivieren: m Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Energie sparen“ und wählen Sie dann „Ein“ oder „Aus“. Wenn Sie die Option „Energie sparen“ deaktivieren, zeigt der iPod nano nach dem Ausschalten der Hintergrundbeleuchtung den folgenden Hinweis an: Durch Deaktivieren der Option „Energie sparen“ wird der Stromverbrauch über die Batterie erhöht.2 21 2 Einrichten des iPod nano Mithilfe von iTunes auf Ihrem Computer richten Sie den iPod nano für die Wiedergabe Ihrer Musik, Videos und anderer Medieninhalte ein. Zum Aufnehmen von Videos oder Anhören von FM-Radiosendungen ist keine Konfiguration erforderlich. Verwenden von iTunes iTunes ist ein kostenlos erhältliches Programm, das Sie zum Einrichten, Sortieren und Verwalten Ihrer Inhalte auf dem iPod nano verwenden. Mit iTunes können Sie Musik, Hörbücher, Podcasts und mehr mit dem iPod nano synchronisieren. Ist iTunes noch nicht auf Ihrem Computer installiert, können Sie es unter folgender Adresse laden: www.apple.com/de/downloads. Für den iPod nano ist iTunes 9 (oder neuer) erforderlich. iTunes ist als Mac- und Windows-Version verfügbar. Verwenden Sie iTunes, um Musik von CDs und aus dem Internet zu importieren, Musiktitel und andere Audio- und Videoinhalte aus dem iTunes Store zu kaufen, persönliche Sammlungen Ihrer Lieblingstitel (so genannte „Wiedergabelisten“) zu erstellen, diese mit dem iPod nano zu synchronisieren und iPod nano-Einstellungen anzupassen.22 Kapitel 2 Einrichten des iPod nano iTunes verfügt über die Funktion „Genius“, mit der Musiktitel aus Ihrer iTunes-Mediathek sofort in Wiedergabelisten und Mischungen mit aufeinander abgestimmten Titeln gestellt werden. Sie können Genius-Wiedergabelisten, die Sie in iTunes erstellen, mit dem iPod nano synchronisieren und auch direkt auf dem iPod nano Genius-Wiedergabelisten anlegen und Genius-Mischungen anhören. Sie benötigen einen iTunes StoreAccount, um die Funktion „Genius“ verwenden zu können. iTunes bietet zahlreiche weitere Funktionen. Sie können eigene CDs brennen, die sich mit standardmäßigen CD-Playern abspielen lassen (vorausgesetzt, Ihr Computer ist mit einem CD-Brenner ausgestattet), per Streaming übertragene Internet-Radiosendungen anhören, Videos und Fernsehsendungen ansehen, Musiktitel bewerten und vieles mehr. Wenn Sie Informationen zur Verwendung dieser iTunes-Funktionen benötigen, öffnen Sie iTunes und wählen Sie „Hilfe“ > „iTunes-Hilfe“. Wenn auf Ihrem Computer bereits iTunes 9 (oder neuer) installiert ist und Sie die iTunes-Mediathek eingerichtet haben, können Sie mit den Informationen unter „Hinzufügen von Musik, Videos und anderen Inhalten zum iPod nano“ auf Seite 27 fortfahren. Möchten Sie gleich mit der Aufnahme von Videos beginnen oder FM-Radiosendungen anhören, können Sie den iPod nano zu einem späteren Zeitpunkt einrichten. Informationen zum Aufnehmen von Videos finden Sie unter „Verwenden der Videokamera“ auf Seite 62. Informationen über das FM-Radio finden Sie unter „Anhören von FM-Radiosendungen“ auf Seite 69. Einrichten Ihrer iTunes-Mediathek Damit Sie auf dem iPod nano Musik anhören und Videos ansehen können, müssen Sie diese Musik und Videos erst in iTunes auf Ihrem Computer importieren. Importieren von Musik in iTunes Sie haben drei Möglichkeiten, Musiktitel und andere Audiodateien an iTunes zu übertragen.Kapitel 2 Einrichten des iPod nano 23 Kaufen von Musiktiteln und Laden von Podcasts über den iTunes Store Wenn Sie über eine Internetverbindung verfügen, können Sie Musiktitel, Alben und Hörbücher ganz einfach online im iTunes Store kaufen und laden. Sie können auch Podcasts abonnieren und laden und kostenlose bildungsrelevante Inhalte aus iTunes U laden. Wenn Sie Musik online über den iTunes Store erwerben möchten, richten Sie in iTunes einen kostenlosen iTunes-Account ein, suchen Sie nach den gewünschten Titeln und kaufen diese. Wenn Sie bereits einen iTunes-Account haben (auch „Apple ID“ genannt), können Sie sich mit diesem Account beim iTunes Store anmelden und Musiktitel kaufen. Sie benötigen keinen iTunes Store-Account, um Podcasts zu laden oder zu abonnieren. Sie greifen auf den iTunes Store zu, indem Sie iTunes öffnen und links im iTunes-Fenster unter „Store“ auf „iTunes Store“ klicken. Hinzufügen bereits auf dem Computer vorhandener Musiktitel zu Ihrer iTunes-Mediathek Wenn Musiktitel auf Ihrem Computer in Formaten vorliegen, die von iTunes unterstützt werden, können Sie die Titel ganz einfach zu iTunes hinzufügen. Informationen zum Übertragen von Titeln von Ihrem Computer an iTunes erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen. Wenn Sie iTunes für Windows verwenden, können Sie nicht geschützte WMA-Dateien in das AAC- oder MP3-Format konvertieren. Dies ist besonders dann von Vorteil, wenn Sie eine Bibliothek mit Musik im WMA-Format haben. Weitere Informationen hierzu erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ auswählen. Importieren von Musik von Audio-CDs in iTunes iTunes kann Musik und andere Audioinhalte von Ihren Audio-CDs importieren. Wenn eine Internetverbindung besteht, lädt iTunes die Namen der Musiktitel auf der CD aus dem Internet (falls verfügbar) und listet sie im iTunes-Fenster auf. Wenn Sie die Titel zum iPod nano hinzufügen, sind die Titelinformationen ebenfalls enthalten. Informationen zum Importieren von Musik von Ihren CDs in iTunes erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen.24 Kapitel 2 Einrichten des iPod nano Hinzufügen weiterer Details zu Ihrer iTunes-Mediathek Nachdem Sie Ihre Musik in iTunes importiert haben, können Sie weitere Details zur iTunes-Mediathek hinzufügen. Die meisten dieser Details werden auf dem iPod nano angezeigt, wenn Sie Musiktitel hinzufügen. Eingeben von Titelnamen und anderen Informationen Wenn Sie keinen Internetzugang haben, für importierte Musik keine Titelinformationen verfügbar sind oder Sie weitere Informationen (wie Namen von Komponisten) hinzufü- gen möchten, können Sie diese Angaben manuell eingeben. Informationen zum Eingeben von Titelinformationen erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunesHilfe“ wählen. Hinzufügen von Liedtexten Sie können Liedtexte im Nur-Text-Format in iTunes eingeben, sodass Sie den Text während der Wiedergabe des Titels auf dem Bildschirm Ihres iPod nano anzeigen können. Informationen zum Eingeben von Liedtexten erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen. Weitere Informationen hierzu finden Sie im Abschnitt „Anzeigen von Liedtexten auf dem iPod nano“ auf Seite 42. Hinzufügen von CD-Covern Mit den im iTunes Store gekauften Musiktiteln erhalten Sie auch CD-Cover, die mit dem iPod nano angezeigt werden können. Sie können Cover automatisch zu von CDs importierten Titeln hinzufügen, sofern die CDs im iTunes Store verfügbar sind. Cover können auch manuell hinzugefügt werden, wenn sie auf Ihrem Computer abgelegt sind. Weitere Informationen zum Hinzufügen von CD-Covern erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen. Weitere Informationen hierzu finden Sie im Abschnitt „Anzeigen von CD-Covern auf dem iPod nano“ auf Seite 43. Verwalten Ihrer Musik In iTunes können Sie Musiktitel und andere Objekte in so genannten Wiedergabelisten verwalten, die Sie beliebig anordnen können. Sie können beispielsweise Wiedergabelisten mit Titeln erstellen, die Sie beim Sport hören möchten oder die für eine besondere Stimmung geeignet sind. Sie können intelligente Wiedergabelisten anlegen, die basierend auf von Ihnen festgelegten Kriterien automatisch aktualisiert werden. Wenn Sie Musiktitel zu iTunes hinzufügen, die Ihren Kriterien entsprechen, werden diese Titel automatisch zur intelligenten Wiedergabeliste hinzugefügt. Kapitel 2 Einrichten des iPod nano 25 Sie können die Funktion „Genius“ aktivieren und Wiedergabelisten mit Titeln erstellen, die gut zusammenpassen. Die Funktion „Genius“ kann Ihre Musiksammlung auch automatisch verwalten, indem Titel in so genannten „Genius-Mischungen“ sortiert und gruppiert werden. Sie können beliebig viele Wiedergabelisten erstellen und dabei beliebig viele Titel aus Ihrer iTunes-Mediathek verwenden. Wird ein Musiktitel zu einer Wiedergabeliste hinzugefügt oder später daraus entfernt, wird er dadurch nicht aus Ihrer Mediathek entfernt. Informationen zum Einrichten von Wiedergabelisten in iTunes erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen. Hinweis: Informationen zum Erstellen von Wiedergabelisten auf dem iPod nano, wenn der iPod nano nicht mit Ihrem Computer verbunden ist, finden Sie unter „Erstellen von „On-The-Go“-Wiedergabelisten auf dem iPod nano“ auf Seite 48. Aktivieren der Funktion „Genius“ in iTunes Die Funktion „Genius“ sucht Musiktitel in Ihrer Mediathek, die gut zusammenpassen, und erstellt damit Genius-Wiedergabelisten und Genius-Mischungen. Basis einer Genius-Wiedergabeliste ist ein von Ihnen gewählter Musiktitel. iTunes legt dann eine Sammlung von Titeln an, die gut zu dem gewählten Titel passen, und erstellt daraus die Genius-Wiedergabeliste. Bei Genius-Mischungen handelt es sich um vorab gewählte Sammlungen mit gut zueinander passenden Titeln, die von iTunes mit Titeln aus Ihrer Mediathek erstellt werden. Mit Genius-Mischungen genießen Sie Ihre Titel jedes Mal neu. iTunes erstellt bis zu 12 Genius-Mischungen, abhängig von der Auswahl an Musiktiteln in Ihrer iTunesMediathek. Damit Sie die Funktion „Genius“ auf dem iPod nano für die Erstellung von GeniusWiedergabelisten und Genius-Mischungen verwenden können, müssen Sie sie zuerst in iTunes aktivieren. Informationen zum Aktivieren und Verwenden der Funktion „Genius“ in iTunes erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen. In iTunes erstellte Genius-Wiedergabelisten und Genius-Mischungen lassen sich wie jede andere iTunes-Wiedergabeliste mit dem iPod nano synchronisieren. Es ist nicht möglich, Genius-Mischungen manuell zum iPod nano hinzuzufügen. Beachten Sie hierzu den Abschnitt „Synchronisieren von Genius-Wiedergabelisten und GeniusMischungen mit dem iPod nano“ auf Seite 30. Genius ist ein kostenfreier Dienst, für dessen Nutzung allerdings ein iTunes StoreAccount benötigt wird. (Haben Sie noch keinen Account, können Sie bei der Aktivierung von Genius einen solchen Account einrichten.)26 Kapitel 2 Einrichten des iPod nano Importieren von Videos in iTunes Nachfolgend werden verschiedene Möglichkeiten beschrieben, die für den Import von Videos in iTunes zur Auswahl stehen. Kaufen oder Ausleihen von Videos und Laden von Video-Podcasts aus dem iTunes Store Wenn Sie Videos (Filme, Fernsehsendungen und Musikvideos) online im iTunes Store (gehört zu iTunes und ist nur in bestimmten Ländern verfügbar) erwerben oder ausleihen möchten, melden Sie sich bei Ihrem iTunes Store-Account an, suchen nach den gewünschten Videos und kaufen oder leihen sie dann aus. Die Leihfrist eines Leihfilms läuft 30 Tage nach dem Leihdatum oder 24 Stunden nach der ersten Wiedergabe ab (48 Stunden außerhalb den USA), je nachdem, welches Ereignis früher eintritt. Abgelaufene Leihfilme werden automatisch gelöscht. Diese Bestimmungen gelten für Leihfilme in den USA. Die Leihbestimmungen sind von Land zu Land unterschiedlich. Sie greifen auf den iTunes Store zu, indem Sie iTunes öffnen und links im iTunes-Fenster unter „Store“ auf „iTunes Store“ klicken. Sie können Film-Trailer oder eine Vorschau von Fernsehsendungen anzeigen, indem Sie neben dem jeweiligen Objekt auf die Taste „Vorschau“ klicken. Gekaufte Videos werden eingeblendet, wenn Sie (unter „Mediathek“) auf „Filme“ oder „Fernsehsendungen“ oder im Quellenbereich (unter „Store“) auf „Gekaufte Artikel“ klicken. Ausgeliehene Videos werden angezeigt, wenn Sie „Ausgeliehene Filme“ (unter „Mediathek“) auswählen. Bei einigen Objekten stehen weitere Optionen zur Auswahl, z. B. bei Fernsehsendungen, für die Sie eine Berechtigung zum Laden der gesamten Staffel erwerben können. Video-Podcasts finden Sie zusammen mit anderen Podcasts im iTunes Store. Sie können sich bei Video-Podcasts anmelden und diese laden wie alle anderen Podcasts auch. Sie benötigen keinen Benutzer-Account, um Podcasts aus dem iTunes Store zu laden. Beachten Sie hierzu den Abschnitt „Kaufen von Musiktiteln und Laden von Podcasts über den iTunes Store“ auf Seite 23. Erstellen von Versionen eigener Videos für die Verwendung mit dem iPod nano Sie können auf dem iPod nano auch andere Videodateien ansehen, z. B. Videos, die Sie mit iMovie auf einem Mac erstellen, oder Videos, die Sie aus dem Internet laden. Importieren Sie das Video in iTunes und konvertieren Sie es ggf. für die Verwendung auf dem iPod nano. Laden Sie es anschließend auf den iPod nano. iTunes unterstützt viele Videoformate, die auch von QuickTime unterstützt werden. Weitere Informationen hierzu finden Sie im Abschnitt „Musiktitel oder andere Dateien können nicht zum iPod nano hinzugefügt werden“ auf Seite 106.Kapitel 2 Einrichten des iPod nano 27 Einige Videos können möglicherweise direkt nach dem Import in iTunes auf dem iPod nano verwendet werden. Wenn Sie ein Video auf den iPod nano laden wollen (vgl. „Automatisches Synchronisieren von Videos“ auf Seite 31) und die Meldung angezeigt wird, dass das Video auf Ihrem iPod nano nicht abgespielt werden kann, müssen Sie das Video für die Verwendung mit dem iPod nano konvertieren. Abhängig von Dauer und Inhalt eines Videos kann das Konvertieren für die Verwendung mit dem iPod nano mehrere Minuten oder Stunden dauern. Wenn Sie eine Version eines Videos für die Verwendung mit dem iPod nano erstellen, bleibt auch das Originalvideo in Ihrer iTunes-Mediathek. Weitere Informationen zum Konvertieren von Videos für den iPod nano finden Sie in der iTunes-Hilfe (öffnen Sie iTunes und wählen Sie „Hilfe“ > „iTunes-Hilfe“) oder unter folgender Adresse: www.info.apple.com/kbnum/n302758. Hinzufügen von Musik, Videos und anderen Inhalten zum iPod nano Nachdem Ihre Musik und Videos in iTunes importiert und sortiert wurden, können Sie sie ganz leicht zum iPod nano hinzufügen. Wenn Sie festlegen möchten, wie Musik, Videos, Fotos und andere Inhalte von Ihrem Computer zum iPod nano hinzugefügt werden, verbinden Sie den iPod nano mit Ihrem Computer und wählen dann mit iTunes die entsprechenden iPod nano-Einstellungen aus. Erstmaliges Verbinden des iPod nano mit einem Computer Wenn Sie den iPod nano das erste Mal mit Ihrem Computer verbinden (nach der Installation von iTunes), wird iTunes automatisch geöffnet und der iPod nano-Assistent wird angezeigt:28 Kapitel 2 Einrichten des iPod nano Gehen Sie wie folgt vor, um den iPod nano-Assistenten zu verwenden: 1 Geben Sie einen Namen für den iPod nano ein. Dieser Name wird in der Geräteliste links im iTunes-Fenster angezeigt. 2 Wählen Sie Ihre Einstellungen. Die automatische Synchronisierung und VoiceOver werden standardmäßig ausgewählt. Möchten Sie VoiceOver zu diesem Zeitpunkt nicht aktivieren, heben Sie die Auswahl von „VoiceOver aktivieren“ auf. Sollten Sie Ihre Meinung ändern, können Sie VoiceOver jederzeit aktivieren, wenn Sie den iPod nano an Ihren Computer anschließen. Beachten Sie hierzu den Abschnitt „Einrichten von VoiceOver“ auf Seite 37. 3 Klicken Sie auf „Fertig“. Haben Sie VoiceOver bei der Konfiguration aktiviert, befolgen Sie die angezeigten Anleitungen zum Laden und Installieren des VoiceOver Kit. Weitere Informationen hierzu finden Sie im Abschnitt „Verwenden von VoiceOver auf dem iPod nano“ auf Seite 52. Informationen dazu, wie Sie VoiceOver auf dem iPod nano einrichten, finden Sie unter „Einrichten von VoiceOver“ auf Seite 37. Sie können den Gerätenamen und die Einstellungen jederzeit ändern, wenn Sie den iPod nano an Ihren Computer anschließen. Nach dem Klicken auf „Fertig“ wird der Bereich „Übersicht“ eingeblendet. Wenn Sie die automatische Synchronisierung ausgewählt haben, beginnt der iPod nano jetzt mit der Synchronisierung. Automatisches oder manuelles Hinzufügen von Inhalten Es gibt zwei Möglichkeiten, Inhalte zum iPod nano hinzuzufügen:  Automatische Synchronisierung: Wenn Sie den iPod nano mit Ihrem Computer verbinden, wird er automatisch mit den Objekten in Ihrer iTunes-Mediathek aktualisiert. Sie können alle Ihre Musiktitel, Wiedergabelisten, Videos und Podcasts synchronisieren. Sollte nicht die gesamte iTunes-Mediathek auf den iPod nano passen, können Sie nur ausgewählte Objekte synchronisieren. Der iPod nano kann mit nur jeweils einem Computer automatisch synchronisiert werden.  Manuelles Verwalten des iPod nano: Wenn Sie den iPod nano verbinden, können Sie Objekte einzeln auf den iPod nano bewegen und einzeln vom iPod nano löschen. Sie können Musiktitel von mehreren Computern hinzufügen, ohne dass dabei Titel vom iPod nano gelöscht werden. Wenn Sie die Musiktitel selbst verwalten, müssen Sie den iPod nano immer aus iTunes auswerfen, bevor Sie ihn vom Computer trennen.Kapitel 2 Einrichten des iPod nano 29 Automatisches Synchronisieren von Musik Der iPod nano ist standardmäßig so konfiguriert, dass beim Anschließen an Ihren Computer alle Musiktitel und Wiedergabelisten synchronisiert werden. Dies ist die einfachste Möglichkeit, Musik zu Ihrem iPod nano hinzuzufügen. Schließen Sie einfach den iPod nano an Ihren Computer an und die Musiktitel, Hörbücher, Videos und anderen Dateien werden automatisch geladen. Trennen Sie dann den iPod vom Computer. Wenn Sie Musiktitel zu iTunes hinzugefügt haben, seit Ihr iPod nano zuletzt mit dem Computer verbunden war, werden diese Titel mit dem iPod nano synchronisiert. Haben Sie Musiktitel aus iTunes gelöscht, werden diese auch vom iPod nano gelöscht. Gehen Sie wie folgt vor, um Musik mit dem iPod nano zu synchronisieren: m Verbinden Sie den iPod nano mit Ihrem Computer. Wenn der iPod nano für die automatische Synchronisierung konfiguriert ist, beginnt nun die Aktualisierung. Wichtig: Wenn Sie den iPod nano mit einem Computer verbinden, mit dem er nicht synchronisiert ist, werden Sie in einer Meldung gefragt, ob Sie Titel automatisch synchronisieren möchten. Wenn Sie dies bestätigen, werden alle Musiktitel, Hörbücher und Videos auf dem iPod nano gelöscht und durch die Musiktitel und anderen Dateien dieses Computers ersetzt. Beim Synchronisieren von Musik zwischen Ihrem Computer und dem iPod nano wird der Verlauf im iTunes-Statusfenster angezeigt und neben dem iPod nano-Symbol in der Geräteliste wird ein Synchronisierungssymbol angezeigt. Nach Abschluss der Aktualisierung wird in iTunes die Meldung „iPod-Sync abgeschlossen“ angezeigt. Ein Balken unten im iTunes-Fenster gibt an, wie viel Festplattenplatz von den verschiedenen Arten von Inhalten belegt wird. Reicht der Platz auf dem iPod nano nicht für alle Ihre Musiktitel aus, können Sie in iTunes festlegen, dass nur ausgewählte Titel und Wiedergabelisten synchronisiert werden. In diesem Fall werden nur die angegebenen Musiktitel und Wiedergabelisten mit dem iPod nano synchronisiert. Synchronisieren von Musik ausgewählter Wiedergabelisten, Interpreten und Genres mit dem iPod nano Sie können iTunes so einstellen, dass Titel ausgewählter Wiedergabelisten, Interpreten und Genres (Musikrichtungen) mit dem iPod nano synchronisiert werden, wenn die Musik in Ihrer iTunes-Mediathek nicht vollständig auf den iPod nano passt. In diesem Fall wird nur die Musik der angegebenen Wiedergabelisten, Interpreten und Genres mit dem iPod nano synchronisiert.30 Kapitel 2 Einrichten des iPod nano Gehen Sie wie folgt vor, um iTunes so zu konfigurieren, dass Musik von ausgewählten Wiedergabelisten, Interpreten und Genres mit dem iPod nano synchronisiert wird: 1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den Titel „Musik“. 2 Wählen Sie „Musik synchronisieren“ und wählen Sie dann „Ausgewählte Wiedergabelisten, Interpreten und Genres“. 3 Wählen Sie die gewünschten Wiedergabelisten aus. 4 Möchten Sie auch Musikvideos hinzufügen, wählen Sie „Musikvideos einbeziehen“. 5 Soll iTunes verbleibenden Speicherplatz auf dem iPod nano automatisch füllen, wählen Sie „Freien Speicherplatz automatisch mit Titeln füllen“. 6 Klicken Sie auf „Anwenden“. Ist im Bereich „Übersicht“ das Feld „Nur markierte Objekte synchronisieren“ markiert, synchronisiert iTunes nur Objekte, die mit einem Häkchen gekennzeichnet sind. Synchronisieren von Genius-Wiedergabelisten und Genius-Mischungen mit dem iPod nano Sie können iTunes so einstellen, dass Genius-Wiedergabelisten und Genius-Mischungen mit dem iPod nano synchronisiert werden. Genius-Mischungen können nur automatisch synchronisiert werden. Sie können Genius-Mischungen nicht zum iPod nano hinzufügen, wenn Sie dessen Inhalt manuell verwalten. Genius-Wiedergabelisten lassen sich dagegen manuell zum iPod nano hinzufügen. Wenn Sie Genius-Mischungen für die Synchronisierung auswählen, wählt iTunes möglicherweise weitere Titel aus Ihrer Mediathek aus, die Sie nicht angegeben haben, und synchronisiert diese. Gehen Sie wie folgt vor, um iTunes so einzustellen, dass Genius-Wiedergabelisten und ausgewählte Genius-Mixe mit dem iPod nano synchronisiert werden: 1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den Titel „Musik“. 2 Wählen Sie „Musik synchronisieren“ und wählen Sie dann „Ausgewählte Wiedergabelisten, Interpreten und Genres“. 3 Wählen Sie unter „Wiedergabelisten“ die gewünschten Genius-Wiedergabelisten und -Mischungen aus. 4 Klicken Sie auf „Anwenden“.Kapitel 2 Einrichten des iPod nano 31 Wenn Sie Ihre gesamte Musiksammlung synchronisieren, synchronisiert iTunes alle Genius-Wiedergabelisten und Genius-Mischungen. Ist im Bereich „Übersicht“ das Feld „Nur markierte Objekte synchronisieren“ markiert, synchronisiert iTunes nur Objekte, mit einem Häkchen gekennzeichnet sind. Hinzufügen von Videos zum iPod nano Sie fügen Filme und Fernsehsendungen in derselben Weise zu Ihrem iPod nano hinzu, wie Sie auch Musiktitel hinzufügen. Sie können iTunes so konfigurieren, dass alle Filme und Fernsehsendungen automatisch mit dem iPod nano synchronisiert werden, wenn Sie den iPod nano anschließen. Oder Sie konfigurieren iTunes so, dass nur ausgewählte Wiedergabelisten synchronisiert werden. Alternativ können Sie Filme und Fernsehsendungen auch manuell verwalten. Mit dieser Option können Sie Videos von mehreren Computern hinzufügen, ohne bereits vorhandene Videos vom iPod nano zu löschen. Hinweis: Musikvideos werden in iTunes im Bereich „Musik“ mit den Musiktiteln zusammen verwaltet. Beachten Sie hierzu den Abschnitt „Hinzufügen von Musik, Videos und anderen Inhalten zum iPod nano“ auf Seite 27. Wichtig: Sie können einen ausgeliehenen Film nur auf jeweils einem Gerät ansehen. Wenn Sie also beispielsweise einen Film im iTunes Store ausleihen und ihn auf den iPod nano übertragen, können Sie diesen Film nur auf dem iPod nano ansehen. Wenn Sie den Film nach iTunes zurückübertragen, können Sie ihn nur dort ansehen, aber nicht mehr auf dem iPod nano. Für Leihfilme, die zum iPod nano hinzugefügt wurden, gelten alle standardmäßigen Leihfristen. Automatisches Synchronisieren von Videos Der iPod nano ist standardmäßig so konfiguriert, dass beim Anschließen an Ihren Computer alle Filme und Fernsehsendungen synchronisiert werden. Dies ist die einfachste Möglichkeit, Videos zu Ihrem iPod nano hinzuzufügen. Schließen Sie einfach den iPod nano an Ihren Computer an, und die Videos und anderen Dateien werden automatisch geladen. Trennen Sie dann den iPod vom Computer. Wenn Sie Videos zu iTunes hinzugefügt haben, seit Ihr iPod nano zuletzt mit dem Computer verbunden war, werden diese Videos mit dem iPod nano synchronisiert. Haben Sie Videos aus iTunes gelöscht, werden sie auch vom iPod nano gelöscht. Reicht der Platz auf dem iPod nano nicht für alle Ihre Videos aus, können Sie in iTunes festlegen, dass nur ausgewählte Videos synchronisiert werden. Sie können ausgewählte Videos synchronisieren oder ausgewählte Wiedergabelisten, die Videos enthalten. Die Einstellungen für die Synchronisierung von Filmen und Fernsehsendungen sind voneinander unabhängig. Einstellungen für Filme haben keinen Einfluss auf Einstellungen für Fernsehsendungen und umgekehrt.32 Kapitel 2 Einrichten des iPod nano Gehen Sie wie folgt vor, um iTunes für die Synchronisierung von Filmen mit dem iPod nano zu konfigurieren: 1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den Titel „Filme“. 2 Wählen Sie „Filme synchronisieren“. 3 Wählen Sie die gewünschten Filme oder Wiedergabelisten aus. Alle Filme, neue Filme oder nicht gesehene Filme: Wählen Sie „Automatisch einbeziehen: Filme“ und wählen Sie die gewünschte Option aus dem Einblendmenü aus. Ausgewählte Filme oder Wiedergabelisten: Wählen Sie die gewünschten Filme oder Wiedergabelisten aus. 4 Klicken Sie auf „Anwenden“. Ist „Nur markierte Titel und Videos synchronisieren“ im Bereich „Übersicht“ ausgewählt, synchronisiert iTunes nur Filme, die mit einem Häkchen markiert sind. Gehen Sie wie folgt vor, um iTunes für die Synchronisierung von Fernsehsendungen mit dem iPod nano zu konfigurieren: 1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den Titel „Fernsehsendungen“. 2 Wählen Sie „Fernsehsendungen synchronisieren“. 3 Wählen Sie die gewünschten Sendungen, Folgen und Wiedergabelisten aus. Alle Folgen, neue Folgen oder nicht gesehene Folgen: Wählen Sie „Automatisch einbeziehen: Folgen von“ und wählen Sie die gewünschten Optionen aus den Einblendmenüs aus. Folgen ausgewählter Wiedergabelisten: Wählen Sie die gewünschten Wiedergabelisten aus. 4 Klicken Sie auf „Anwenden“. Ist „Nur markierte Titel und Videos synchronisieren“ im Bereich „Übersicht“ ausgewählt, synchronisiert iTunes nur Fernsehsendungen, die mit einem Häkchen markiert sind.Kapitel 2 Einrichten des iPod nano 33 Hinzufügen von Podcasts zum iPod nano Die Einstellungen zum Hinzufügen von Podcasts zum iPod nano sind unabhängig von den Einstellungen zum Hinzufügen von Musiktiteln und Videos. Die Einstellungen für Podcasts haben keinen Einfluss auf die Einstellungen für Musiktitel oder Videos und umgekehrt. Sie können in iTunes festlegen, dass alle oder ausgewählte Podcasts automatisch synchronisiert werden, oder Sie können Podcasts manuell zum iPod nano hinzufügen. Gehen Sie wie folgt vor, um iTunes so einzustellen, dass die Podcasts auf dem iPod nano automatisch aktualisiert werden: 1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den Titel „Podcasts“. 2 Wählen Sie im Bereich „Podcasts“ die Option „Podcasts synchronisieren“ aus. 3 Wählen Sie die gewünschten Podcasts, Folgen und Wiedergabelisten aus und legen Sie Ihre Synchronisierungsoptionen fest. 4 Klicken Sie auf „Anwenden“. Wenn Sie iTunes so konfigurieren, dass Podcasts auf dem iPod nano automatisch synchronisiert werden, wird der iPod nano jedes Mal aktualisiert, wenn Sie ihn an den Computer anschließen. Wenn Sie im Bereich „Übersicht“ das Feld „Nur markierte Titel und Videos synchronisieren“ auswählen, synchronisiert iTunes nur Objekte, die in Ihrer Podcast-Bibliothek und anderen Bibliotheken markiert sind. Hinzufügen von Video-Podcasts zum iPod nano Video-Podcasts werden in derselben Weise zum iPod nano hinzugefügt wie andere Podcasts (vgl. „Hinzufügen von Podcasts zum iPod nano“ auf Seite 33). Ist in einem Podcast Videomaterial enthalten, wird das Video abgespielt, wenn Sie es im Menü „Podcasts“ auswählen. Hinzufügen von iTunes U-Inhalten zum iPod nano Die Einstellungen zum Hinzufügen von iTunes U-Inhalten zum iPod nano haben nichts mit den Einstellungen zum Hinzufügen anderer Inhalte zu tun. iTunes U-Einstellungen haben keinen Einfluss auf andere Einstellungen und umgekehrt. Sie können in iTunes festlegen, dass alle oder ausgewählte iTunes U-Inhalte automatisch synchronisiert werden, oder Sie können iTunes U-Inhalte manuell zum iPod nano hinzufügen.34 Kapitel 2 Einrichten des iPod nano Gehen Sie wie folgt vor, um iTunes so einzustellen, dass der iTunes U-Inhalt auf dem iPod nano automatisch aktualisiert wird: 1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den Titel „iTunes U“. 2 Wählen Sie im Bereich „iTunes U“ die Option „iTunes U synchronisieren“. 3 Wählen Sie die gewünschten Sammlungen, Objekte und Wiedergabelisten aus und legen Sie Ihre Synchronisierungsoptionen fest. 4 Klicken Sie auf „Anwenden“. Wenn Sie iTunes so konfigurieren, dass iTunes U-Inhalte automatisch synchronisiert werden, wird der iPod nano jedes Mal aktualisiert, wenn Sie ihn an den Computer anschließen. Wenn Sie im Bereich „Übersicht“ das Feld „Nur markierte Titel und Videos synchronisieren“ auswählen, synchronisiert iTunes nur Objekte, die in Ihrer iTunes U-Bibliothek und anderen Bibliotheken markiert sind. Hinzufügen von Hörbüchern zum iPod nano Sie können Hörbücher im iTunes Store oder bei audible.com kaufen und laden oder von CDs importieren und auf dem iPod nano anhören. Verwenden Sie iTunes, um Hörbücher zum iPod nano hinzuzufügen. Wenn Sie den iPod nano automatisch synchronisieren, sind alle Hörbücher in Ihrer iTunes-Mediathek in einer Wiedergabeliste mit der Bezeichnung „Hörbücher“ enthalten, die Sie mit dem iPod nano synchronisieren können. Wenn Sie den Inhalt des iPod nano manuell verwalten, können Sie Hörbücher nacheinander hinzufügen. Gehen Sie wie folgt vor, um Hörbücher mit dem iPod nano zu synchronisieren: 1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den Titel „Musik“. 2 Wählen Sie „Musik synchronisieren“ und führen Sie dann einen der folgenden Schritte aus:  Wählen Sie „Die ganze Musikmediathek“.  Wählen Sie „Ausgewählte Wiedergabelisten, Interpreten und Genres“ und wählen Sie dann „Hörbücher“ (unter „Wiedergabelisten“). 3 Klicken Sie auf „Anwenden“. Die Aktualisierung beginnt automatisch.Kapitel 2 Einrichten des iPod nano 35 Hinzufügen weiterer Inhalte zum iPod nano Sie können mithilfe von iTunes auch Fotos, Spiele, Kontakte und mehr mit dem iPod nano synchronisieren. Sie können iTunes so einstellen, dass die Inhalte automatisch synchronisiert werden, oder sie auf dem iPod nano manuell verwalten. Weitere Informationen zum Hinzufügen anderer Arten von Inhalten zum iPod nano finden Sie unter:  „Hinzufügen von Fotos von Ihrem Computer zum iPod nano“ auf Seite 78  „Gehen Sie wie folgt vor, um Spiele automatisch mit dem iPod nano zu synchronisieren:“ auf Seite 90  „Synchronisieren von Kontakten, Kalendern und Aufgabenlisten“ auf Seite 96  „Mono Audio“ auf Seite 98 Manuelles Verwalten des iPod nano Wenn Sie den iPod nano manuell verwalten, können Sie einzelne Musiktitel (inklusive Musikvideos) und Videos (inklusive Filme und Fernsehsendungen) hinzufügen und entfernen. Außerdem haben Sie die Möglichkeit, Musik und Videos von mehreren Computern zum iPod nano hinzuzufügen, ohne Objekte zu löschen, die bereits auf dem iPod nano abgelegt sind. Genius-Mischungen lassen sich nicht manuell zum iPod nano hinzufügen, GeniusWiedergabelisten dagegen schon. Wird die manuelle Verwaltung von Musik und Videos mit dem iPod nano gewählt, werden die Optionen für die automatische Synchronisierung in den Bereichen „Musik“, „Filme“, „Fernsehsendungen“, „Podcasts“, „iTunes U“, „Fotos“, „Kontakte“ und „Spiele“ deaktiviert. Es ist nicht möglich, einige Kategorien manuell zu verwalten und gleichzeitig eine andere automatisch zu synchronisieren. Wenn Sie iTunes für das manuelle Verwalten von Inhalten konfiguriert haben, können Sie dies zu einem späteren Zeitpunkt ändern und die automatische Synchronisierung einstellen. Gehen Sie wie folgt vor, um iTunes für das manuelle Verwalten von Inhalten auf dem iPod nano zu konfigurieren: 1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den Titel „Übersicht“. 2 Wählen Sie „Musik und Videos manuell verwalten“ im Abschnitt „Optionen“ aus. 3 Klicken Sie auf „Anwenden“.36 Kapitel 2 Einrichten des iPod nano Wenn Sie den Inhalt auf dem iPod nano manuell verwalten, müssen Sie den iPod nano immer aus iTunes auswerfen, bevor Sie ihn vom Computer trennen. Wenn Sie einen manuell verwalteten iPod nano mit einem Computer verbinden, wird er in der Geräteliste links im iTunes-Fenster angezeigt. Gehen Sie wie folgt vor, um einen Musiktitel, ein Video oder ein anderes Objekt zum iPod nano hinzuzufügen: 1 Klicken Sie in iTunes auf „Musik“ oder auf ein anderes Objekt unter „Mediathek“ links im iTunes-Fenster. 2 Bewegen Sie einen Musiktitel oder ein anderes Objekt auf den iPod nano in der Geräteliste. Gehen Sie wie folgt vor, um einen Musiktitel, ein Video oder ein anderes Objekt vom iPod nano zu entfernen: 1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus. 2 Wählen Sie einen Musiktitel oder ein anderes Objekt auf dem iPod nano aus und drücken Sie die Rückschritttaste oder die Taste „Entf.“ auf Ihrer Tastatur. Wenn Sie einen Titel oder ein anderes Objekt vom iPod nano entfernen, wird er bzw. es nicht aus der iTunes-Mediathek gelöscht. Gehen Sie wie folgt vor, um eine neue Wiedergabeliste auf dem iPod nano zu erstellen: 1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf die Taste „Hinzufügen“ (+) oder wählen Sie „Ablage“ > „Neue Wiedergabeliste“. 2 Geben Sie einen Namen für die Wiedergabeliste ein. 3 Klicken Sie in der Liste „Mediathek“ auf ein Objekt, etwa „Musik“, und bewegen Sie dann Musiktitel oder sonstige Objekte in die Wiedergabeliste. Gehen Sie wie folgt vor, um Objekte in einer Wiedergabeliste auf dem iPod nano hinzuzufügen oder zu entfernen: m Bewegen Sie ein Objekt in eine Wiedergabeliste auf dem iPod nano, um es hinzuzufügen. Wählen Sie ein Objekt in einer Wiedergabeliste aus und drücken Sie die Rückschritttaste bzw. die Taste „Entf.“ auf Ihrer Tastatur, um das Objekt zu löschen. Gehen Sie wie folgt vor, um iTunes zurückzusetzen, sodass Musik, Videos und Podcasts automatisch synchronisiert werden: 1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den Titel „Übersicht“. 2 Deaktivieren Sie „Musik und Videos manuell verwalten“. 3 Wählen Sie die Bereiche „Musik“, „Filme“, „Fernsehsendungen“ und „Podcasts“ und dann die gewünschten Synchronisierungsoptionen aus. 4 Klicken Sie auf „Anwenden“.Kapitel 2 Einrichten des iPod nano 37 Die Aktualisierung beginnt automatisch. Einrichten von VoiceOver VoiceOver liest auf Wunsch den Namen und Interpreten des Musiktitels vor, den Sie gerade anhören. Wenn Sie die Apple Earphones mit Fernbedienung und Mikrofon oder die In-Ear Headphones mit Fernbedienung und Mikrofon verwenden, können Sie mithilfe von VoiceOver auch in Wiedergabelisten navigieren. Hinweis: VoiceOver ist nicht in allen Sprachen verfügbar. VoiceOver-Optionen werden im Bereich „Übersicht“ in iTunes festgelegt. Wenn Sie Ihren iPod nano konfigurieren, wird VoiceOver standardmäßig aktiviert. Befolgen Sie die angezeigten Anleitungen, um das VoiceOver Kit zu laden und zu installieren. Soll VoiceOver bei der Konfiguration des iPod nano nicht aktiviert werden, deaktivieren Sie die Option „VoiceOver aktivieren“ im Assistenten. Falls Sie Ihre Meinung ändern, können Sie VoiceOver auch zu einem späteren Zeitpunkt aktivieren. Gehen Sie wie folgt vor, um VoiceOver zu einem späteren Zeitpunkt zu aktivieren: 1 Verbinden Sie den iPod nano mit Ihrem Computer. 2 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den Titel „Übersicht“. 3 Wählen Sie unter „Sprachausgabe“ die Option „VoiceOver aktivieren“ aus. 4 Klicken Sie auf „Anwenden“. 5 Befolgen Sie die angezeigten Anleitungen, um das VoiceOver Kit zu laden und zu installieren. 6 Klicken Sie auf „Anwenden“. Nach Abschluss der Synchronisierung wird VoiceOver aktiviert. Wenn Sie anstelle der Standardstimme von VoiceOver eine Systemstimme Ihres Computers verwenden möchten, wählen Sie unter „Sprachausgabe“ im Bereich „Übersicht“ die Option „Systemstimme anstelle der integrierten Stimme verwenden“ aus. Sie können VoiceOver jederzeit deaktivieren, wenn der iPod nano mit dem Computer verbunden ist. Gehen Sie wie folgt vor, um VoiceOver zu deaktivieren: 1 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den Titel „Übersicht“. 2 Heben Sie unter „Sprachausgabe“ die Auswahl der Option „VoiceOver aktivieren“ auf. 3 Klicken Sie auf „Anwenden“. Nach Abschluss der Synchronisierung wird VoiceOver deaktiviert.3 38 3 Anhören von Musik In diesem Kapitel erfahren Sie Näheres über die Wiedergabe unterwegs. Nachdem Sie den iPod nano eingerichtet haben, können Sie Musiktitel, Podcasts, Hörbücher und mehr anhören. Abspielen von Musik und anderem Audiomaterial Beim Abspielen eines Musiktitels wird der Bildschirm „Sie hören“ angezeigt. In der unten stehenden Tabelle werden die Elemente des Bildschirms „Sie hören“ beschrieben. Objekt im Bildschirm Funktion Symbol für „Zufällige Wiedergabe“ Dieses Symbol wird angezeigt, wenn der iPod nano für die Wiederholung von Musiktiteln oder Alben in zufälliger Reihenfolge eingestellt ist. Symbol für Endloswiedergabe Dieses Symbol wird angezeigt, wenn der iPod nano für die Wiederholung aller Musiktitel eingestellt ist. Das Symbol für die einmalige Wiederholung (!) wird angezeigt, wenn der iPod nano nur einen Musiktitel wiederholen soll. Statusbalken Klicken Sie auf die Mitteltaste, um den Navigationsbalken, den Schieberegler für die Funktion „Genius“ oder die Zufallswiedergabe, Wertungen und Liedtexte einzublenden. Cover Symbol für „Zufällige Wiedergabe“ Symbol für Endloswiedergabe Wiedergabesymbol Batteriesymbol TitelinformationenKapitel 3 Anhören von Musik 39 Drücken Sie die Mitteltaste, um im Bildschirm „Sie hören“ durch diese zusätzlichen Objekte zu navigieren: Verwenden Sie das Click Wheel und die Mitteltaste, um nach einem Musiktitel oder einem Musikvideo zu suchen. Wenn Sie Musikvideos aus dem Menü „Musik“ abspielen, hören Sie nur die Musik. Wenn Sie sie aus dem Menü „Videos“ abspielen, sehen Sie auch das zugehörige Video. Gehen Sie wie folgt vor, um einen Musiktitel auszusuchen und abzuspielen: m Wählen Sie „Musik“, suchen Sie nach einem Musiktitel oder Musikvideo und drücken Sie dann die Taste „Start/Pause“ (’). Gehen Sie wie folgt vor, um die Wiedergabelautstärke zu ändern: m Wird der Statusbalken angezeigt, ändern Sie die Lautstärke mit dem Click Wheel. Wird der Statusbalken nicht angezeigt, drücken Sie so lange die Mitteltaste, bis er verfügbar wird. Wiedergabesymbol Wird angezeigt, wenn ein Titel abgespielt wird. Das Symbol für „Pause“ (1) wird angezeigt, wenn der Titel angehalten wurde. Batteriesymbol Zeigt den ungefähren Ladezustand der Batterie an. Titelinformationen Zeigt Musiktitel, Interpreten und Albumtitel an. Cover Zeigt das CD-Cover an, falls es verfügbar ist. Statusbalken Zeigt die vergangene und die verbleibende Zeit für den gerade abgespielten Titel an. Objekt im Bildschirm Funktion Objekt im Bildschirm Funktion Navigationsbalken Ermöglicht das schnelle Navigieren zu einem anderen Teil des Titels. Schieberegler „Genius“ Erstellt eine Genius-Wiedergabeliste, die auf dem aktuellen Musiktitel basiert. Der Schieberegler wird nicht angezeigt, wenn zum aktuellen Titel keine Genius-Informationen verfügbar sind. Schieberegler „Zufall“ Ermöglicht die zufällige Wiedergabe von Titeln oder Alben direkt über den Bildschirm „Sie hören“. Wertung Ermöglicht die Bewertung des Titels. Liedtexte Zeigt den Liedtext des gerade abgespielten Titels an. Liedtexte werden nur angezeigt, wenn Sie sie in iTunes eingegeben haben.40 Kapitel 3 Anhören von Musik Gehen Sie wie folgt vor, um einen anderen Teil eines Titels anzuhören: 1 Drücken Sie die Mitteltaste, bis der Navigationsbalken angezeigt wird. 2 Verwenden Sie das Click Wheel, um die Abspielposition im Navigationsbalken zu bewegen. Gehen Sie wie folgt vor, um basierend auf dem aktuellen Titel eine Genius-Wiedergabeliste zu erstellen: 1 Drücken Sie die Mitteltaste, bis der Navigationsbalken angezeigt wird. 2 Bewegen Sie den Schieberegler mit dem Click Wheel an die Startposition. Der Schieberegler „Genius“ wird nicht angezeigt, wenn zum aktuellen Titel keine GeniusInformationen verfügbar sind.Kapitel 3 Anhören von Musik 41 Gehen Sie wie folgt vor, um Titel im Bildschirm „Sie hören“ in zufälliger Reihenfolge abzuspielen: 1 Drücken Sie die Mitteltaste, bis der Schieberegler für die Zufallswiedergabe angezeigt wird. 2 Bewegen Sie den Schieberegler mit dem Click Wheel zu „Titel“ oder „Alben“.  Wählen Sie „Titel“, um alle Titel auf dem iPod nano in zufälliger Reihenfolge abzuspielen.  Wählen Sie „Alben“, um alle Titel im aktuellen Album der Reihe nach abzuspielen. Der iPod nano wählt dann nach dem Zufallsprinzip ein anderes Album aus und spielt dieses der Reihenfolge nach ab. Gehen Sie wie folgt vor, wenn nur der Ton eines Musikvideos ausgegeben werden soll: m Wählen Sie „Musik“ und suchen Sie nach einem Musikvideo. Wenn Sie das Video abspielen, können Sie es hören, nicht jedoch sehen. Wenn Sie eine Wiedergabeliste anhören, die Video-Podcasts enthält, hören Sie die Podcasts, sehen sie aber nicht. Gehen Sie wie folgt vor, um zum vorherigen Menü zurückzukehren: m Drücken Sie in einem beliebigen Bildschirm die Taste „Menu“.42 Kapitel 3 Anhören von Musik Bewerten von Musiktiteln Sie können Musiktiteln eine Bewertung hinzufügen (von 1 bis zu 5 Sternen), um anzugeben, wie sehr Ihnen ein Titel gefällt. Diese Bewertungen helfen Ihnen dabei, automatisch intelligente Wiedergabelisten in iTunes zu erstellen. Gehen Sie wie folgt vor, um einen Musiktitel zu bewerten: 1 Starten Sie die Wiedergabe des Musiktitels. 2 Drücken Sie, während der Bildschirm „Sie hören“ zu sehen ist, die Mitteltaste, bis die fünf Wertungspunkte angezeigt werden. 3 Verwenden Sie das Click Wheel, um eine Wertung zuzuweisen. Die Wertungen, die Sie Musiktiteln auf dem iPod nano zuweisen, werden bei der Synchronisierung an iTunes übertragen. Hinweis: Video-Podcasts können keine Bewertungen erhalten. Anzeigen von Liedtexten auf dem iPod nano Wenn Sie den Liedtext zu einem Musiktitel in iTunes eingeben (vgl. „Hinzufügen von Liedtexten“ auf Seite 24) und diesen Titel dann zum iPod nano hinzufügen, können Sie den Liedtext auf dem iPod nano anzeigen. Liedtexte werden nur angezeigt, wenn Sie sie zuvor eingegeben haben. Gehen Sie wie folgt vor, um den Liedtext auf dem iPod nano anzuzeigen, während ein Musiktitel abgespielt wird: m Drücken Sie die Mitteltaste, wenn der Bildschirm „Sie hören“ zu sehen ist, bis der Liedtext angezeigt wird. Sie können durch den Liedtext blättern, während der Titel wiedergegeben wird.Kapitel 3 Anhören von Musik 43 Anzeigen von CD-Covern auf dem iPod nano Sofern CD-Cover verfügbar sind, werden sie von iTunes auf dem iPod nano angezeigt. Die Cover sind auf dem iPod nano in Cover Flow, in der Albumliste und beim Abspielen von Titel aus dem Album zu sehen. Gehen Sie wie folgt vor, um CD-Cover auf dem iPod nano anzuzeigen: m Halten Sie den iPod nano horizontal, um Cover Flow zu verwenden, oder spielen Sie einen Titel mit einem verfügbaren Cover ab und zeigen Sie das Cover im Bildschirm „Sie hören“ an. Weitere Informationen zu CD-Covern erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen. Blättern durch Musiktitel mithilfe der Cover Flow-Darstellung Sie können durch Ihre Musiksammlung blättern, indem Sie die Cover Flow-Darstellung verwenden, die eine visuelle Möglichkeit zum Durchsuchen Ihrer Mediathek bietet. Mit Cover Flow werden Ihre Alben alphabetisch nach Name des Interpreten angezeigt. Sie können Cover Flow über das Hauptmenü, ein beliebiges Musikmenü oder den Bildschirm „Sie hören“ aktivieren. Gehen Sie wie folgt vor, um die Cover Flow-Darstellung zu verwenden: 1 Drehen Sie den iPod nano um 90 Grad nach links oder rechts. Cover Flow wird angezeigt. 2 Blättern Sie mit dem Click Wheel durch Ihre Albumcover. 3 Wählen Sie ein Album aus und drücken Sie die Mitteltaste.44 Kapitel 3 Anhören von Musik 4 Wählen Sie mit dem Click Wheel einen Musiktitel aus und drücken Sie dann die Mitteltaste, um den Titel abzuspielen. Sie können in Cover Flow auch rasch durch Ihre Alben blättern, indem Sie den Daumen schnell auf dem Click Wheel bewegen. Hinweis: Es werden nicht alle Sprachen unterstützt. Gehen Sie wie folgt vor, um mit Cover Flow schnell durch Inhalte zu blättern: 1 Bewegen Sie Ihren Daumen schnell auf dem Click Wheel, um einen Buchstaben des Alphabets auf dem Bildschirm anzuzeigen. 2 Navigieren Sie mit dem Click Wheel im Alphabet zum ersten Buchstaben des Interpreten, den Sie suchen. Alben von Interpreten, deren Namen mit einem Symbol oder einer Zahl beginnt, werden nach dem Buchstaben „Z“ aufgeführt. 3 Nehmen Sie den Daumen kurz vom Click Wheel, um mit normaler Geschwindigkeit zu blättern. 4 Wählen Sie ein Album aus und drücken Sie die Mitteltaste. 5 Wählen Sie mit dem Click Wheel einen Musiktitel aus und drücken Sie dann die Mitteltaste, um den Titel abzuspielen. Gehen Sie wie folgt vor, um Cover Flow zu aktivieren oder zu deaktivieren: 1 Wählen Sie im Hauptmenü „Einstellungen“ > „Allgemein“ > „Drehen“. 2 Drücken Sie die Mitteltaste, um „Cover Flow“ oder „Aus“ zu wählen.Kapitel 3 Anhören von Musik 45 Zugreifen auf weitere Befehle Einige weitere iPod nano-Befehle sind direkt über den Bildschirm „Sie hören“ und bestimmte Menüs verfügbar. Gehen Sie wie folgt vor, um auf weitere Befehle zuzugreifen: m Drücken und halten Sie die Mitteltaste, bis ein Menü angezeigt wird. Wählen Sie einen Befehl aus und drücken Sie dann erneut die Mitteltaste. Wird ein Menü nicht angezeigt, sind keine weiteren Befehle verfügbar. Verwenden der Funktion „Genius“ auf dem iPod nano Auch wenn der iPod nano nicht mit Ihrem Computer verbunden ist, können Sie mit der Funktion „Genius“ automatisch Ad-hoc-Wiedergabelisten mit Musiktiteln erstellen, die gut zusammenpassen. Außerdem können Sie Genius-Mischungen abspielen, d. h. vorab ausgewählte Sammlungen mit Titeln, die gut zusammenpassen. Damit Sie diese Funktion nutzen können, müssen Sie Genius zuerst im iTunes Store konfigurieren und dann den iPod nano mit iTunes synchronisieren. Sie haben auch die Möglichkeit, in iTunes Genius-Wiedergabelisten zu erstellen und dann zum iPod nano hinzufügen und Genius-Mischungen mit dem iPod nano zu synchronisieren. Informationen zum Einrichten der Funktion „Genius“ in iTunes erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen. Genius ist ein kostenloser Dienst, zu dessen Nutzung Sie lediglich einen iTunes Store-Account benötigen.46 Kapitel 3 Anhören von Musik Gehen Sie wie folgt vor, um eine Genius-Wiedergabeliste auf dem iPod nano zu erstellen: 1 Wählen Sie einen Musiktitel aus. Drücken und halten Sie dann die Mitteltaste, bis ein Menü angezeigt wird. Sie können einen Titel aus einem Menü oder einer Wiedergabeliste auswählen. Sie können aber auch vom Bildschirm „Sie hören“ aus beginnen. 2 Wählen Sie „Genius starten“. Der Befehl „Genius starten“ wird nicht im Menü mit den zusätzlichen Befehlen angezeigt, wenn eine der folgenden Bedingungen zutrifft:  Sie haben Genius in iTunes nicht konfiguriert und den iPod nano nicht anschließend mit iTunes synchronisiert.  Genius erkennt den ausgewählten Musiktitel nicht.  Genius erkennt den Musiktitel, aber in Ihrer Mediathek befinden sich nicht mindestens zehn ähnliche Titel. 3 Drücken Sie die Mitteltaste. Die neue Wiedergabeliste wird angezeigt. 4 Klicken Sie auf „Wiedergabeliste sichern“, um die Liste zu sichern. Die Wiedergabeliste wird mit dem Namen und Interpreten des Titels gesichert, den Sie zum Erstellen der Wiedergabeliste verwendet haben. 5 Wählen Sie „Aktualisieren“, um eine neue Wiedergabeliste auf Grundlage desselben Musiktitels zu erstellen. Wenn Sie eine gesicherte Wiedergabeliste aktualisieren, ersetzt die neue Liste die vorherige. Die vorherige Wiedergabeliste kann nicht wiederhergestellt werden. Sie können Genius auch über den Bildschirm „Sie hören“ starten. Drücken Sie dazu die Mitteltaste, bis der Schieberegler „Genius“ angezeigt wird, und bewegen Sie den Schieberegler dann mithilfe des Click Wheel nach rechts. Der Schieberegler „Genius“ wird nicht angezeigt, wenn zum aktuellen Titel keine Genius-Informationen verfügbar sind. Die auf dem iPod nano gesicherten Genius-Wiedergabelisten werden wieder mit iTunes synchronisiert, wenn Sie den iPod nano an Ihren Computer anschließen. Gehen Sie wie folgt vor, um eine Genius-Wiedergabeliste abzuspielen: m Wählen Sie „Musik“ > „Wiedergabelisten“ und wählen Sie eine Wiedergabeliste aus.Kapitel 3 Anhören von Musik 47 Abspielen von Genius-Mischungen Genius-Mischungen werden von iTunes erstellt und enthalten Titel aus Ihrer Mediathek, die gut zusammenpassen. Mit Genius-Mischungen genießen Sie Ihre Titel jedes Mal neu. iTunes erstellt bis zu 12 Genius-Mischungen, abhängig von der Auswahl an Musiktiteln in Ihrer iTunes-Mediathek. Informationen zum Synchronisieren von Genius-Mischungen mit dem iPod nano finden Sie unter „Synchronisieren von Genius-Wiedergabelisten und Genius-Mischungen mit dem iPod nano“ auf Seite 30. Gehen Sie wie folgt vor, um eine Genius-Mischung (Genius-Mix) abzuspielen: 1 Wählen Sie „Musik“ > „Genius-Mixe“. 2 Blättern Sie mit den Tasten „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]) durch die Genius-Mischungen. Die Punkte unten auf dem Bildschirm geben an, wie viele Genius-Mischungen mit dem iPod nano synchronisiert sind. 3 Drücken Sie, wenn der Bildschirm einer Genius-Mischung angezeigt wird, die Mitteltaste oder die Taste „Start/Pause“ (’), um die Wiedergabe einer Genius-Mischung zu starten. Wird die gewählte Genius-Mischung abgespielt, ist das Lautsprechersymbol ( ) zu sehen.48 Kapitel 3 Anhören von Musik Erstellen von „On-The-Go“-Wiedergabelisten auf dem iPod nano Sie können „On-The-Go“-Wiedergabelisten auf dem iPod nano erstellen, wenn der iPod nano nicht mit Ihrem Computer verbunden ist. Gehen Sie wie folgt vor, um eine „On-The-Go“- Wiedergabeliste zu erstellen: 1 Wählen Sie einen Musiktitel aus. Drücken und halten Sie dann die Mitteltaste, bis ein Menü angezeigt wird. 2 Wählen Sie „Zu On-The-Go hinzufügen“. 3 Wiederholen Sie die Schritte 1 und 2, um weitere Musiktitel hinzuzufügen. 4 Wählen Sie „Musik“ > „Wiedergabelisten“ > „On-The-Go“, um Ihre Liste der Musiktitel zu durchsuchen und abzuspielen. Sie können auch eine Gruppe mit Musiktiteln hinzufügen. Möchten Sie beispielsweise ein Album hinzufügen, markieren Sie den Albumtitel, drücken und halten Sie die Mitteltaste, bis ein Menü angezeigt wird, und wählen Sie dann „Zu On-The-Go hinzufügen“. Gehen Sie wie folgt vor, um die Musiktitel in der „On-The-Go“-Wiedergabeliste abzuspielen: m Wählen Sie „Musik“ > „Wiedergabelisten“ > „On-The-Go“ und wählen Sie anschließend einen Musiktitel aus. Gehen Sie wie folgt vor, um einen Musiktitel aus der „On-The-Go“-Wiedergabeliste zu entfernen: 1 Wählen Sie einen Musiktitel in der Wiedergabeliste aus. Drücken Sie dann die Mitteltaste und halten Sie diese gedrückt, bis ein Menü angezeigt wird. 2 Wählen Sie „Aus On-the-Go entfernen“ und drücken Sie die Mitteltaste. Gehen Sie wie folgt vor, um die gesamte „On-The-Go“-Wiedergabeliste zu löschen: m Wählen Sie „Musik“ > „Wiedergabelisten“ > „On-The-Go“ > „Wiedergabeliste löschen“ und klicken Sie auf „Löschen“. Gehen Sie wie folgt vor, um die „On-The-Go“-Wiedergabelisten auf dem iPod nano zu sichern: m Wählen Sie „Musik“ > „Wiedergabelisten“ > „On-The-Go“ und sichern Sie die Wiedergabeliste. Die erste Wiedergabeliste wird als „Neue Wiedergabeliste 1” im Menü „Wiedergabelisten“ gesichert. Die „On-The-Go“-Wiedergabeliste wird gelöscht und kann erneut verwendet werden. Sie können eine beliebige Anzahl von Wiedergabelisten sichern. Nachdem Sie eine Wiedergabeliste gesichert haben, können Sie keine Musiktitel mehr aus ihr entfernen.Kapitel 3 Anhören von Musik 49 Gehen Sie wie folgt vor, um die „On-The-Go“-Wiedergabelisten vom iPod nano auf Ihren Computer zu kopieren: m Wenn Ihr iPod nano so konfiguriert ist, dass Musiktitel automatisch aktualisiert werden (vgl. „Automatisches Synchronisieren von Musik“ auf Seite 29) und Sie eine „On-TheGo“-Wiedergabeliste erstellen, wird die Wiedergabeliste automatisch mit iTunes synchronisiert, sobald Sie den iPod nano an den Computer anschließen. Die neue „On-TheGo“-Wiedergabeliste wird in iTunes in der Liste der Wiedergabelisten angezeigt. Sie können die neue Wiedergabeliste genau wie jede andere Wiedergabeliste umbenennen, bearbeiten oder löschen. Durchsuchen von Musiktiteln nach Album oder Interpret Wenn Sie einen Musiktitel hören, können Sie nach weiteren Titeln desselben Interpreten suchen oder alle Titel des aktuellen Albums anzeigen. Gehen Sie wie folgt vor, um Musiktitel nach Album zu suchen: 1 Drücken Sie, während der Bildschirm „Sie hören“ zu sehen ist, die Mitteltaste, bis ein Menü angezeigt wird. 2 Wählen Sie „Album suchen“ und drücken Sie die Mitteltaste. Die anderen Titel des aktuellen Albums, die sich auf Ihrem iPod nano befinden, werden angezeigt. Sie können einen anderen Titel auswählen oder zum Bildschirm „Sie hören“ zurückkehren. Gehen Sie wie folgt vor, um Musiktitel nach Interpret zu suchen: 1 Drücken Sie, während der Bildschirm „Sie hören“ zu sehen ist, die Mitteltaste, bis ein Menü angezeigt wird. 2 Wählen Sie „Interpret suchen“ und drücken Sie die Mitteltaste. Alle anderen Titel dieses Interpreten, die sich auf Ihrem iPod nano befinden, werden aufgelistet. Sie können einen anderen Titel auswählen oder zum Bildschirm „Sie hören“ zurückkehren.50 Kapitel 3 Anhören von Musik Konfigurieren des iPod nano für die zufällige Wiedergabe Sie können den iPod nano so einstellen, dass er Musiktitel, Alben oder Ihre gesamte Mediathek in einer zufälligen Reihenfolge abspielt. Gehen Sie wie folgt vor, um Ihren iPod nano für die Wiedergabe aller Musiktitel in zufälliger Reihenfolge einzustellen: m Wählen Sie „Zufällige Titel“ aus dem Hauptmenü des iPod nano. Der iPod nano spielt nun die Musiktitel aus Ihrer gesamten Musikbibliothek in zufälliger Reihenfolge ab. Hörbücher und Podcasts werden dabei übersprungen. Gehen Sie wie folgt vor, um den iPod nano so einzustellen, dass Musiktitel oder Alben immer in zufälliger Reihenfolge wiedergegeben werden: 1 Wählen Sie „Einstellungen“ aus dem Hauptmenü des iPod nano. 2 Wählen Sie für die Einstellung „Zufall“ die Option „Titel“ oder „Alben“. Wenn Sie den iPod nano für die Zufallswiedergabe konfiguriert haben, spielt der iPod nano Titel in jeder zur Wiedergabe ausgewählten Liste (z. B. einem Album oder einer Wiedergabeliste) in zufälliger Reihenfolge ab. Wenn Sie den iPod nano so einstellen, dass Alben in zufälliger Reihenfolge wiedergegeben werden, spielt der iPod die Titel eines Albums der Reihe nach ab und wählt dann zufällig ein anderes Album aus, dessen Titel dann wiederum der Reihe nach abgespielt werden. Sie können den iPod nano auch so einstellen, dass Musiktitel direkt über den Bildschirm „Sie hören“ in zufälliger Reihenfolge wiedergegeben werden. Gehen Sie wie folgt vor, um den iPod nano so einzustellen, dass Musiktitel über den Bildschirm „Sie hören“ in zufälliger Reihenfolge wiedergegeben werden: 1 Drücken Sie, während der Bildschirm „Sie hören“ zu sehen ist, die Mitteltaste, bis der Schieberegler für die Zufallswiedergabe angezeigt wird. 2 Verwenden Sie das Click Wheel, um den iPod nano für die Zufallswiedergabe von Titeln oder Alben zu konfigurieren. Sie können vorwärts zu einem zufällig gewählten Titel wechseln, indem Sie den iPod nano schütteln.Kapitel 3 Anhören von Musik 51 Gehen Sie wie folgt vor, um die Zufallswiedergabe zu verwenden, während ein Titel abgespielt oder angehalten wird: m Schütteln Sie den iPod nano hin und her. Ein neuer Titel wird abgespielt. Die Verwendung der Schüttelfunktion hat keine Auswirkungen auf Ihre Einstellungen für die Zufallswiedergabe. Gehen Sie wie folgt vor, um die Schüttelfunktion zu deaktivieren: m Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Schütteln“ und wählen Sie „Aus“. Möchten Sie die Schüttelfunktion wieder aktivieren, wählen Sie „Einstellungen“ > „Wiedergabe“ > „Schütteln“ und wählen Sie dann „Zufällig“. Wenn der Schalter „Hold“ auf „HOLD“ gesetzt, das integrierte Radio des iPod nano eingeschaltet oder der Bildschirm deaktiviert ist, ist die Schüttelfunktion ebenfalls deaktiviert. Ist der iPod nano ausgeschaltet, lässt er sich nicht durch Schütteln aktivieren. Konfigurieren des iPod nano für wiederholtes Abspielen Sie können den iPod nano so einstellen, dass ein bestimmter Titel immer wieder wiederholt wird oder dass Titel in einer gewählten Liste wiederholt abgespielt werden. Gehen Sie wie folgt vor, um den iPod nano für das wiederholte Abspielen von Musiktiteln zu konfigurieren: m Wählen Sie „Einstellungen“ aus dem Hauptmenü des iPod nano.  Wenn Sie alle Titel in einer Liste wiederholen möchten, wählen Sie „Wiederholen: Alle“.  Wenn Sie einen Titel wiederholen möchten, wählen Sie „Wiederholen: Ein“.52 Kapitel 3 Anhören von Musik Verwenden von VoiceOver auf dem iPod nano Mithilfe von VoiceOver kann der iPod nano Name und Interpreten des Musiktitels angeben, den Sie gerade hören. VoiceOver steht in verschiedenen Sprachen zur Verfügung. Wenn Sie VoiceOver verwenden möchten, installieren Sie das VoiceOver Kit und aktivieren Sie die Funktion „VoiceOver“ in iTunes. Weitere Informationen hierzu finden Sie im Abschnitt „Einrichten von VoiceOver“ auf Seite 37. Gehen Sie wie folgt vor, um eine Ankündigung des aktuellen Titels zu hören: m Wenn der Bildschirm „Sie hören“ zu sehen ist, drücken Sie die Mitteltaste. Daraufhin hören Sie den Namen und Interpreten des aktuellen Musiktitels. Wenn Sie gerade ein Hörbuch abspielen, werden der Titel des Buchs und der Name des Autors genannt. Wenn Sie die Apple Earphones mit Fernbedienung und Mikrofon oder die In-Ear Headphones mit Fernbedienung und Mikrofon verwenden (verfügbar unter store.apple.com oder bei Ihrem Apple Store vor Ort), können Sie mithilfe von VoiceOver auch durch Wiedergabelisten navigieren. Weitere Informationen hierzu finden Sie in der Dokumentation zu diesem Zubehörprodukten. Suchen nach Musik Sie können Ihren iPod nano nach Musiktiteln, Wiedergabelisten, Albumtiteln, Interpretennamen, Audio-Podcasts und Hörbüchern durchsuchen. Die Suchfunktion sucht nicht in Videos, Notizen, Kalendereinträgen, Kontakten oder Liedtexten. Hinweis: Es werden nicht alle Sprachen unterstützt. Gehen Sie wie folgt vor, um nach Musiktiteln zu suchen: 1 Wählen Sie „Suchen“ aus dem Menü „Musik“. 2 Geben Sie einen Suchbegriff ein, indem Sie mit dem Click Wheel durch das Alphabet navigieren und die Mitteltaste drücken, um die einzelnen Zeichen einzugeben. Der iPod nano beginnt nach der Eingabe des ersten Zeichens mit der Suche und zeigt die Ergebnisse im Suchbildschirm an. Wenn Sie beispielsweise den Buchstaben „b“ eingeben, zeigt der iPod nano alle Titel an, die den Buchstaben „b“ enthalten. Bei Eingabe von „ab“ zeigt der iPod nano alle Objekte mit dieser Buchstabenfolge an. Drücken Sie die Taste „Vor/Schneller Vorlauf“, um ein Leerzeichen einzugeben (‘). Drücken Sie die Taste „Zurück/Schneller Rücklauf“, um das vorherige Zeichen zu löschen (]). 3 Drücken Sie die Taste „Menu“, um die Ergebnisliste anzuzeigen, durch die Sie mithilfe des Click Wheel navigieren können. Die Objekte in der Liste der Suchergebnisse sind mit einem Symbol gekennzeichnet, das ihren Typ angibt: Musiktitel, Video, Interpret, Album, Hörbuch oder Podcast. Kapitel 3 Anhören von Musik 53 Drücken Sie die Mitteltaste, um zum Suchbildschirm zurückzukehren (wenn „Suchen“ im Menü hervorgehoben ist). Anpassen des Menüs „Musik“ Wie im Hauptmenü können Sie auch im Menü „Musik“ Objekte hinzufügen oder entfernen. Sie können beispielsweise eine Sammlung (Compilation) zum Menü „Musik“ hinzufügen, sodass Sie Sammlungen, die aus verschiedenen Quellen zusammengestellt wurden, ganz einfach auswählen können. Gehen Sie wie folgt vor, um Objekte zum Menü „Musik“ hinzuzufügen oder daraus zu entfernen: 1 Wählen Sie „Einstellungen“ > „Allgemein“ > „Musikmenü“. 2 Wählen Sie alle Objekte aus, die im Menü „Musik“ angezeigt werden sollen. Ein Häkchen weist darauf hin, welche Objekte hinzugefügt wurden. Wählen Sie „Menü zurücksetzen“, um die ursprünglichen Einstellungen des Menüs „Musik“ wiederherzustellen. Einstellen der Obergrenze für die Lautstärke Sie können auf Ihrem iPod nano eine Obergrenze für die Lautstärke festlegen und dieser eine Zahlenkombination zuweisen, mit der verhindert wird, dass die Einstellung geändert werden kann. Gehen Sie wie folgt vor, um für den iPod nano eine Obergrenze für die Lautstärke einzustellen: 1 Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Max. Lautstärke“. Der Lautstärkebalken zeigt die aktuelle Lautstärke an. 2 Verwenden Sie das Click Wheel, um eine Obergrenze für die Lautstärke auszuwählen. 3 Drücken Sie die Mitteltaste, um die maximale Lautstärke festzulegen. 4 Wählen Sie „Fertig“, wenn zum Ändern der maximalen Lautstärke keine Zahlenkombination erforderlich sein soll. Gehen Sie wie folgt vor, um festzulegen, dass zum Ändern der maximalen Lautstärke eine Zahlenkombination eingegeben werden muss: 1 Legen Sie die maximale Lautstärke fest und wählen Sie anschließend „Sperren“. 2 Geben Sie im angezeigten Bildschirm eine Zahlenkombination ein. Gehen Sie wie folgt vor, um eine Kombination einzugeben:  Wählen Sie mit dem Click Wheel die erste Zahl für Ihre Zahlenkombination aus. Drücken Sie zur Bestätigung die Mitteltaste und wählen Sie dann die nächste Zahl aus.  Wiederholen Sie diesen Vorgang, um die anderen Ziffern der Zahlenkombination anzugeben. Mithilfe der Taste „Vor/Schneller Vorlauf“ (‘) gelangen Sie zur nächsten Zahl und mit der Taste „Zurück/Schneller Rücklauf“ (]) zur vorherigen Zahl. Drücken Sie die Mitteltaste nach Eingabe der letzten Zahl, um den Zahlencode zu bestätigen.54 Kapitel 3 Anhören von Musik Die Lautstärke von Musiktiteln und anderem Tonmaterial kann je nach Art der Aufnahme und Codierung variieren. Nähere Angaben zum Einstellen einer konstanten Lautstärke in iTunes und auf dem iPod nano finden Sie im Abschnitt „Einstellen einer konstanten Lautstärke für alle Musiktitel“ auf Seite 55. Die Lautstärke kann auch abhängig von den verwendeten Ohr- und Kopfhörern unterschiedlich sein. Zubehörteile, die über den Dock Connector angeschlossen werden, unterstützen keine Obergrenzen für die Lautstärke. Wenn Sie eine Zahlenkombination festgelegt haben, müssen Sie diese eingeben, damit Sie die Obergrenze für die Lautstärke ändern oder löschen können. Gehen Sie wie folgt vor, um die Grenze für die maximale Lautstärke zu ändern: 1 Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Max. Lautstärke“. 2 Wenn Sie eine Zahlenkombination festgelegt haben, geben Sie diese ein. Verwenden Sie das Click Wheel, um die Ziffern auszuwählen, und drücken Sie zur Bestätigung die Mitteltaste. Ein Dreieck im Lautstärkebalken zeigt die aktuelle maximale Lautstärke an. 3 Ändern Sie mit dem Click Wheel die für die Lautstärke angegebene Obergrenze. 4 Drücken Sie die Taste „Start/Pause“ (’), um die Änderung zu bestätigen. Gehen Sie wie folgt vor, um die Obergrenze für die Lautstärke zu löschen: 1 Wenn Sie gerade Inhalte mit dem iPod nano anhören, drücken Sie die Taste „Start/ Pause“ (’). 2 Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Max. Lautstärke“. 3 Wenn Sie eine Zahlenkombination festgelegt haben, geben Sie diese ein. Verwenden Sie das Click Wheel, um die Ziffern auszuwählen, und drücken Sie zur Bestätigung jeder Ziffer die Mitteltaste. 4 Verwenden Sie das Click Wheel, um die Obergrenze für die Lautstärke auf den höchsten Wert festzulegen. Hierdurch werden alle für die Lautstärke angegebenen Einschränkungen gelöscht. 5 Drücken Sie die Taste „Start/Pause“ (’), um die Änderung zu bestätigen. Wenn Sie die Zahlenkombination vergessen haben, können Sie Ihren iPod nano zurücksetzen. Beachten Sie hierzu den Abschnitt „Aktualisieren und Wiederherstellen der iPod-Software“ auf Seite 110.Kapitel 3 Anhören von Musik 55 Einstellen einer konstanten Lautstärke für alle Musiktitel iTunes kann die Lautstärke der Titel automatisch anpassen, sodass sie alle mit derselben relativen Lautstärke abgespielt werden. Sie können den iPod nano für die Übernahme der iTunes-Lautstärkeeinstellungen konfigurieren. Gehen Sie wie folgt vor, um iTunes so einzustellen, dass Musiktitel mit der gleichen Lautstärke wiedergegeben werden: 1 Öffnen Sie iTunes und wählen Sie „iTunes“ > „Einstellungen“, wenn Sie einen Mac verwenden, oder „Bearbeiten“ > „Einstellungen“, wenn Sie mit einem Windows-PC arbeiten. 2 Klicken Sie auf „Wiedergabe“ und wählen Sie „Lautstärke anpassen“. Klicken Sie dann auf „OK“ Gehen Sie wie folgt vor, um für den iPod nano die Lautstärkeeinstellungen aus iTunes zu übernehmen: m Wählen Sie „Einstellungen“ > „Wiedergabe“ und aktivieren Sie die Option „Lautstärke anpassen“. Wenn Sie die Option „Lautstärke anpassen“ in iTunes nicht aktiviert haben, hat das Einstellen dieser Option auf dem iPod nano keine Auswirkung. Verwenden des Equalizers Sie können die Voreinstellungen des Equalizers anpassen, um den Klang des iPod nano so zu ändern, dass dieser einer bestimmten Musikrichtung entspricht. Wenn Sie beispielsweise den Klang von Rockmusik verbessern möchten, verwenden Sie die Equalizer-Einstellung „Rock“. Gehen Sie wie folgt vor, um mit dem Equalizer den Klang des iPod nano zu ändern: m Wählen Sie „Einstellungen“ > „Wiedergabe“ > „EQ“ und wählen Sie dann eine EqualizerVoreinstellung aus. Wenn Sie in iTunes einem Musiktitel eine Equalizer-Einstellung zugewiesen haben und der iPod nano Equalizer deaktiviert ist, wird für die Wiedergabe des Titels die iTunesEinstellung verwendet. Weitere Informationen hierzu finden Sie in der iTunes-Hilfe. Überblenden zwischen Musiktiteln Sie können festlegen, dass der iPod nano das Ende jedes Titels ausblendet und den Anfang des jeweils folgenden Titels einblendet. Gehen Sie wie folgt vor, um die Überblendung zu aktivieren: m Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Audioüberblendung“ und wählen Sie „Ein“. Hinweis: Titel, die für eine Wiedergabe ohne Pause zwischen den Titeln gruppiert sind, werden auch bei aktivierter Überblendung ohne Pause abgespielt.56 Kapitel 3 Anhören von Musik Abspielen von Podcasts Bei Podcasts handelt es sich um kostenlose, ladbare Sendungen, die im iTunes Store verfügbar sind. Podcasts sind unterteilt nach Sendungen, Folgen innerhalb der Sendungen und Kapiteln innerhalb der Folgen. Wenn Sie die Wiedergabe eines Podcasts stoppen und später fortsetzen, wird die Wiedergabe an der Stelle fortgesetzt, an der Sie unterbrochen haben. Gehen Sie wie folgt vor, um einen Podcast abzuspielen: 1 Wählen Sie aus dem Hauptmenü „Einstellungen“ > „Podcasts“ und wählen Sie eine Podcast-Sendung aus. Podcast-Sendungen werden in umgekehrter chronologischer Reihenfolge angezeigt, sodass Sie die neuste Sendung zuerst abspielen können. Neben den Sendungen und Folgen, die Sie noch nicht abgespielt haben, wird ein blauer Punkt angezeigt. 2 Wählen Sie eine Folge aus, die abgespielt werden soll. Im Bildschirm „Sie hören“ werden jetzt die Sendung, die Folgen, Datumsangaben sowie die bereits abgelaufene Zeit und die Restzeit angezeigt. Drücken Sie die Mitteltaste, um weitere Informationen über den Podcast anzuzeigen. Ist der Podcast in Kapitel eingeteilt, können Sie durch Drücken der Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]) zum nächsten Kapitel oder zum Anfang des aktuellen Kapitels im Podcast springen. Wenn ein Podcast Folgenbilder enthält, sehen Sie außerdem ein Bild. Podcast-Cover können sich im Laufe einer Folge ändern. Weitere Informationen zu Podcasts erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen. Suchen Sie dann nach „Podcasts“. Abspielen von iTunes U-Inhalten iTunes U gehört zum iTunes Store und bietet kostenlose Vorlesungen, Sprachkurse, Hörbücher und mehr, die Sie laden und mit dem iPod nano abspielen können. Die iTunes U-Inhalte sind nach Sammlungen, Objekten innerhalb von Sammlungen, Autoren und Anbietern sortiert. Wenn Sie die Wiedergabe von iTunes U-Inhalten unterbrechen und später fortsetzen, beginnt die Wiedergabe genau an dieser Stelle. Gehen Sie wie folgt vor, um iTunes U-Inhalt abzuspielen: 1 Wählen Sie aus dem Hauptmenü „iTunes U“ und dann eine Sammlung aus.Kapitel 3 Anhören von Musik 57 Die Objekte in einer Sammlung werden in umgekehrter chronologischer Reihenfolge angezeigt, sodass Sie die jeweils neuste Sendung zuerst hören können. Neben Sammlungen und Objekten, die Sie noch nicht angehört oder angesehen haben, wird ein blauer Punkt angezeigt. 2 Wählen Sie ein Objekt aus, das abgespielt werden soll. Weitere Informationen zu iTunes U erhalten Sie, indem Sie iTunes öffnen und „Hilfe“ > „iTunes-Hilfe“ wählen. Suchen Sie dann nach „iTunes U“. Anhören von Hörbüchern Wenn Sie Hörbücher auf dem iPod nano anhören möchten, wählen Sie „Hörbücher“ aus dem Menü „Musik“. Wählen Sie ein Hörbuch aus und drücken Sie dann die Taste „Start/ Pause“ (’). Wenn Sie die Wiedergabe eines Hörbuchs auf Ihrem iPod nano unterbrechen, können Sie sie später genau an dieser Stelle fortsetzen. Der iPod nano überspringt Hörbücher, wenn die Zufallswiedergabe aktiviert ist. Ist das gerade wiedergegebene Hörbuch in Kapitel eingeteilt, können Sie durch Drücken der Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]) zum nächsten Kapitel oder zum Anfang des aktuellen Kapitels springen. Sie können das Hörbuch auch aus dem Menü „Hörbücher“ auswählen und dann ein Kapitel auswählen. Oder Sie wählen „Fortsetzen“, um die Wiedergabe nahtlos fortzusetzen. Sie können Hörbücher schneller oder langsamer als mit der Normalgeschwindigkeit abspielen. Das Festlegen der Wiedergabegeschwindigkeit wirkt sich nur auf Hörbücher aus, die im iTunes Store oder bei audible.de erworben wurden. Gehen Sie wie folgt vor, um die Wiedergabegeschwindigkeit für ein Hörbuch festzulegen: m Wählen Sie „Einstellungen“ > „Wiedergabe“ > „Hörbücher“ und wählen Sie eine Geschwindigkeit aus. Alternativ können Sie im Bildschirm „Sie hören“ die Mitteltaste drücken und gedrückt halten und dann eine Geschwindigkeit auswählen.4 58 4 Ansehen von Videos Sie können mit dem iPod nano Fernsehsendungen, Filme, Video-Podcasts und mehr ansehen. In diesem Kapitel erfahren Sie, wie Sie Videos mit dem iPod nano und Ihrem Fernsehgerät ansehen. Sie können Videos auf dem iPod nano ansehen und anhören. Mit einem kompatiblen AV-Kabel (separat erhältlich unter: www.apple.com/de/ipodstore) können Sie Videos, die sich auf dem iPod nano befinden, auf Ihrem Fernsehgerät ansehen. Ansehen von Videos auf dem iPod nano Auf den iPod nano geladene Videos sind in den Videomenüs verfügbar. Musikvideos erscheinen außerdem in Musikmenüs. Videos, die mit der integrierten Videokamera des iPod nano aufgenommen wurden, werden im Menü „Videos“ unter „Filme“ angezeigt. Gehen Sie wie folgt vor, um ein Video auf dem iPod nano anzusehen: 1 Wählen Sie „Videos“ und suchen Sie nach einem Video. Wählen Sie „Filme“, um nach einem Video zu suchen, das mit der integrierten Videokamera des iPod nano aufgenommen wurde. 2 Wählen Sie ein Video aus und drücken Sie dann die Taste „Start/Pause“ (’).Kapitel 4 Ansehen von Videos 59 Drehen Sie den iPod nano um 90 Grad, um das Video anzusehen. Sie können den iPod nano nach links oder nach rechts drehen. Möchten Sie Videos ansehen, die mit der integrierten Videokamera im Hochformat (vertikal) aufgenommen wurden, halten Sie den iPod nano vertikal. Ansehen von Video-Podcasts Gehen Sie wie folgt vor, um ein Video-Podcast anzusehen: m Wählen Sie aus dem Hauptmenü „Podcasts“ und wählen Sie dann einen Video-Podcast aus. Weitere Informationen hierzu finden Sie im Abschnitt „Abspielen von Podcasts“ auf Seite 56. Ansehen von aus iTunes U geladenen Videos Gehen Sie wie folgt vor, um ein iTunes U-Video anzusehen: m Wählen Sie aus dem Hauptmenü „iTunes U“ und dann ein Video aus. Weitere Informationen hierzu finden Sie im Abschnitt „Abspielen von iTunes U-Inhalten“ auf Seite 56. Ansehen von Videos auf einem an den iPod nano angeschlossenen Fernsehgerät Mit einem iPod-AV-Kabel können Sie Videos auf einem an Ihren iPod nano angeschlossenen Fernsehgerät anzeigen. Konfigurieren Sie den iPod nano zunächst so, dass er Videos auf einem Fernsehgerät anzeigen kann. Schließen Sie dann den iPod nano an Ihr Fernsehgerät an und spielen Sie das Video ab. Verwenden Sie das Apple Component AV-Kabel, das Apple Composite AV-Kabel oder das Apple AV Connection Kit. Andere ähnliche Kabel mit Cinch-Stecker funktionieren u. U. nicht. Sie können die Kabel unter der Adresse www.apple.com/de/ipodstore oder in Ihrem Apple Store vor Ort kaufen.60 Kapitel 4 Ansehen von Videos Gehen Sie wie folgt vor, um den iPod nano für das Anzeigen von Videos auf einem Fernsehgerät zu konfigurieren: m Wählen Sie „Videos“ > „Video-Einstellungen“ und setzen Sie „TV-Ausgang“ auf „Fragen“ oder „Ein“. Wenn Sie für „TV-Ausgang“ die Option „Fragen“ festlegen, können Sie bei jedem Starten eines Videos auf dem iPod nano entscheiden, ob Sie das Video auf einem Fernsehgerät oder auf dem iPod nano ansehen möchten. Wenn Sie für „TV-Ausgang“ die Option „Ein“ festlegen, zeigt der iPod nano Videos nur auf dem Fernsehgerät an. Möchten Sie ein Video abspielen, während der iPod nano nicht mit einem Fernsehgerät verbunden ist, zeigt der iPod nano eine Meldung an, in der Sie aufgefordert werden, die Verbindung zu einem Fernsehgerät herzustellen. Sie können außerdem festlegen, ob ein Video bildschirmfüllend im Vollbildmodus oder im Breitbildformat und ob es auf einem PAL- oder NTSC-Fernsehgerät angezeigt werden soll. Gehen Sie wie folgt vor, um die Einstellungen für das Fernsehgerät festzulegen: m Wählen Sie „Videos“ > „Video-Einstellungen“ und befolgen Sie die unten stehenden Anweisungen. Einstellung Aktion Video auf einem Fernsehgerät anzeigen Setzen Sie „TV-Ausgang“ auf „Fragen“ oder „Ein“. Video auf einem PAL- oder NTSC-Fernsehgerät anzeigen Setzen Sie das TV-Signal auf PAL oder NTSC. PAL und NTSC beziehen sich auf die Standards zur Fernsehübertragung. Welchen Standard Ihr Fernsehgerät verwendet, hängt davon ab, in welchem Land Sie Ihr das Gerät erworben haben. Sehen Sie ggf. in der Dokumentation zu Ihrem Fernsehgerät nach, welchen Standard das Gerät verwendet. Das Format Ihres Fernsehgeräts Wählen Sie für „TV-Bildschirm“ die Option „Widescreen (Breitbild)“ für das 16:9-Format oder „Standard“ für das 4:3-Format. Video im Vollbildmodus anzeigen Wählen Sie für die Option „Bildschirmfüllend“ die Einstellung „Ein“. Wenn Sie für diese Option „Aus“ wählen, werden Breitformatfilme auf dem iPod nano oder auf standardmäßigen (4:3) Fernsehbildschirmen im Letterbox-Format mit schwarzen Balken angezeigt. Alternatives Audiomaterial abspielen Setzen Sie „Alternatives Audio“ auf „Ein“. Erweiterte Untertitel anzeigen Legen Sie für „Erweiterte Untertitel“ die Option „Ein“ fest. Untertitel anzeigen Legen Sie für „Untertitel“ die Option „Ein“ fest.Kapitel 4 Ansehen von Videos 61 Gehen Sie wie folgt vor, um das Apple Component AV-Kabel mit dem iPod nano und Ihrem Fernsehgerät zu verbinden: 1 Verbinden Sie den grünen, blauen und roten Videostecker mit den Component-Videoeingängen (Y, Pb und Pr) des Fernsehgeräts. Wenn Sie das Apple Composite AV-Kabel verwenden, verbinden Sie den gelben Videostecker mit dem Videoeingang des Fernsehgeräts. Ihr Fernsehgerät muss über CinchVideo- und Audioanschlüsse verfügen. 2 Verbinden Sie den weißen und den roten Audiostecker mit dem linken und rechten analogen Audioeingang Ihres Fernsehgeräts. 3 Verbinden Sie 30-poligen Stecker mit Ihrem iPod nano oder Universal Dock. 4 Verbinden Sie den USB-Stecker mit dem Apple USB Power Adapter oder dem Computer, damit die Batterie des iPod nano nicht entladen wird. 5 Schalten Sie den iPod nano und Ihr Fernsehgerät oder den Empfänger ein, um die Wiedergabe zu starten. Stellen Sie sicher, dass auf dem iPod nano die Option „TV-Ausgang“ auf „Ein“ oder „Fragen“ gesetzt ist. Die Anschlüsse an Ihrem Fernsehgerät oder Empfänger unterscheiden sich möglicherweise etwas von den hier abgebildeten. Gehen Sie wie folgt vor, um ein Video auf Ihrem Fernsehgerät anzusehen: 1 Verbinden Sie den iPod nano mit dem Fernsehgerät (vgl. oben). 2 Schalten Sie Ihr Fernsehgerät ein und stellen Sie es so ein, dass die Anzeige über die Eingänge erfolgt, an denen der iPod nano angeschlossen ist. Weitere Informationen hierzu finden Sie in der Dokumentation zu Ihrem Fernsehgerät. 3 Wählen Sie auf dem iPod nano „Videos“ und suchen Sie nach einem Video. USB Power Adapter (Netzteil) iPod Audioeingang links (weiß) 30-poliger Stecker Fernsehgerät Videoeingang (Y, Pb, Pr) Audioeingang rechts (rot) USB-Stecker5 62 5 Verwenden der Videokamera Mit der integrierten Videokamera des iPod nano können Sie hochwertige Videos mit Ton aufnehmen, egal, wo Sie gerade sind. Sogar die Aufnahme von Videos mit Spezialeffekten ist möglich. Sie können Ihre aufgenommenen Videos auf dem iPod nano ansehen und auf Ihren Computer übertragen, um sie zu bearbeiten und weiterzugeben. Möchten Sie den iPod nano als Videokamera verwenden, wählen Sie „Videokamera“ aus dem Hauptmenü. Der Bildschirm wird zum Bildsucher. Sie können Videos im Quer- oder Hochformat aufnehmen. In beiden Modi wird Ihre aktuelle Aufnahmedauer oben rechts auf dem Bildschirm angezeigt.Kapitel 5 Verwenden der Videokamera 63 Linse und Mikrofon befinden sich auf der Rückseite des iPod nano, sodass Sie auf dem Bildschirm Ihr aufgenommenes Video sehen können. Achten Sie darauf, Linse oder Mikrofon nicht zu verdecken. Aufnehmen von Video Gehen Sie wie folgt vor, um Video aufzunehmen: 1 Wählen Sie „Videokamera“ aus dem Hauptmenü. 2 Wenn Sie mit der Aufnahme beginnen möchten, drücken Sie die Mitteltaste. Drücken Sie erneut die Mitteltaste, um die Aufnahme zu stoppen. Während der Aufnahme ist oben rechts auf dem Bildschirm neben der Aufnahmedauer ein rotes blinkendes Licht zu sehen. Die Aufnahmedauer wird durch den verfügbaren Speicherplatz und den Ladestand der Batterie begrenzt. Ein aufgenommenes Video kann bis zu 2 GB groß sein. Wird die Größe von 2 GB erreicht, wird die Videoaufnahme gestoppt. Drücken Sie die Mitteltaste, um die Aufnahme fortzusetzen. Aufnehmen von Videos mit Spezialeffekten Sie können Videos mit einer Vielzahl an Spezialeffekten mit dem iPod nano aufnehmen. Hinweis: Videoeffekte können nur vor der Aufnahme ausgewählt werden. Der iPod nano kann keine Effekte zu aufgenommenen Videos hinzufügen bzw. davon entfernen. Das Ändern von Einstellungen für Videoeffekte während der Aufnahme ist nicht möglich.64 Kapitel 5 Verwenden der Videokamera Gehen Sie wie folgt vor, um Videos mit Spezialeffekten aufzunehmen: 1 Wählen Sie „Videokamera“ aus dem Hauptmenü. 2 Drücken und halten Sie die Mitteltaste, um die Palette der Videoeffekte anzuzeigen. 3 Blättern Sie mit dem Click Wheel durch die Effekte und drücken Sie die Mitteltaste, um einen Effekt auszuwählen. Der Sucherbildschirm mit dem ausgewählten Effekt wird angezeigt. 4 Drücken Sie erneut die Mitteltaste, um mit der Aufnahme mit Videoeffekten zu beginnen. 5 Drücken Sie die Mitteltaste, um die Aufnahme zu stoppen. Wenn Sie den Bildschirm „Videokamera“ schließen, um Ihr Video abzuspielen, werden die Videoeffekte deaktiviert. Wiederholen Sie die Schritte 2 bis 4, um die Aufnahme mit einem Videoeffekt fortzusetzen. Abspielen aufgenommener Videos Der iPod nano sichert Ihre aufgenommenen Videos unter „Film“. Sie zeigen den Bildschirm „Film“ an, indem Sie im Sucherbildschirm „Videokamera“ die Taste „Menu“ drücken. Mit dem iPod nano können Sie im Bildschirm „Film“ auf Ihre aufgenommenen Videos zugreifen, sodass Sie gerade aufgenommenes Material ansehen können, ohne die Videokamera zu deaktivieren. Ihre aufgenommenen Videos lassen sich auch über das Menü „Videos“ abspielen. Gehen Sie wie folgt vor, um ein gerade aufgenommenes Video abzuspielen: 1 Drücken Sie die Mitteltaste, um die Aufnahme zu stoppen. 2 Drücken Sie die Taste „Menu“, um den Bildschirm „Film“ zu öffnen. 3 Wählen Sie die Aufnahme aus und drücken Sie die Mitteltaste, um sie abzuspielen. Im Menü „Videos“ können Sie auch auf eine vollständige Liste der aufgenommenen Videos auf dem iPod nano zugreifen.Kapitel 5 Verwenden der Videokamera 65 Gehen Sie wie folgt vor, um ein aufgenommenes Video aus dem Menü „Videos“ abzuspielen: 1 Wählen Sie „Videos“ aus dem Hauptmenü. 2 Wählen Sie „Aufnahmen“, um eine Liste aufgenommener Videos anzuzeigen. 3 Blättern Sie mit dem Click Wheel zu dem Video, das Sie abspielen möchten. Drücken Sie dann die Taste „Start/Pause“ (’), um die Wiedergabe zu starten und zu stoppen. Am Ende des Videos wird die Wiedergabe automatisch gestoppt. Löschen aufgenommener Videos Durch das Entfernen nicht benötigter Videos geben Sie Speicherplatz für neue Inhalte frei. Aufgenommene Videos können nacheinander oder gleichzeitig gelöscht werden. Gehen Sie wie folgt vor, um ein aufgenommenes Video zu löschen: 1 Wählen Sie „Videos“ > „Aufnahmen“ und wählen Sie ein Video aus der Liste aus oder wählen Sie ein Video im Bildschirm „Film“ aus. 2 Drücken und halten Sie die Mitteltaste, bis ein Menü angezeigt wird. 3 Wählen Sie „Löschen“ oder „Alle löschen“. Importieren aufgenommener Videos auf Ihren Computer Sie können Ihre aufgenommenen Videos auf Ihren Computer importieren. Wenn Sie einen Mac mit iPhoto verwenden, können Sie die Videos ganz einfach für andere bereitstellen und Hintergrundmusik ergänzen. Der iPod nano formatiert aufgenommene Videos als H.264 w/AAC-VGA-Videodateien mit 30 fps. Damit die Videos auf Ihren Computer importiert werden können, muss der iPod nano für die Verwendung als Festplatte aktiviert sein. Gehen Sie wie folgt vor, um den iPod nano für die Verwendung als Festplatte zu aktivieren: 1 Verbinden Sie den iPod nano mit Ihrem Computer. 2 Klicken Sie in iTunes auf den iPod nano in der Geräteliste und klicken Sie dann auf den Titel „Übersicht“. 3 Wählen Sie „Verwendung als Volume aktivieren“. Der iPod nano wird nicht nur in iTunes, sondern auch als externe Festplatte auf Ihrem Computer angezeigt, und zwar mit dem bei der Erstkonfiguration gewählten Namen. Auf einem Mac wird der iPod nano im Finder und auf dem Schreibtisch angezeigt. Auf einem PC wird der iPod nano im Windows Explorer und unter „Mein Computer“ angezeigt.66 Kapitel 5 Verwenden der Videokamera Ihre aufgenommenen Videos sind im Ordner „DCIM“ auf dem iPod nano gespeichert und können auf den Computer kopiert werden, wenn der iPod nano damit verbunden ist. Weitere Informationen zum Kopieren von Dateien finden Sie in der mit Ihrem Computer gelieferten Dokumentation. Nachdem Sie Ihr aufgenommenes Video auf Ihren Computer kopiert haben, können Sie es auf dem Mac mithilfe des QuickTime-Player ansehen. Auf einem PC verwenden Sie hierzu QuickTime oder den Windows Media Player. Möchten Sie Speicherplatz auf dem iPod nano freigeben, nachdem Sie Ihre Videos auf den Computer kopiert haben, löschen Sie sie aus dem Ordner „DCIM“. Importieren aufgenommener Videos auf einen Mac mit iPhoto Wenn Sie einen Mac verwenden, auf dem iPhoto 6.0.6 installiert ist, können Sie Ihre aufgenommenen Videos mit iPhoto vom iPod nano auf den Mac importieren und über MobileMe veröffentlichen. Außerdem können Sie Musik hinzufügen, indem Sie Ihre aufgenommenen Videos mit dem QuickTime-Player bearbeiten. Damit die Videos mit iPhoto importiert werden können, muss der iPod nano für die Verwendung als Festplatte aktiviert sein. Gehen Sie wie folgt vor, um Videos mithilfe von iPhoto auf einen Mac zu importieren: 1 Verbinden Sie den iPod nano mit Ihrem Computer. 2 Öffnen Sie iPhoto, sofern es nicht automatisch geöffnet wird. 3 Klicken Sie in der iPhoto-Geräteliste auf den iPod nano. 4 Wählen Sie die zu importierenden Videos aus und klicken Sie dann auf „Ausgewählt“ oder „Alle importieren“. 5 Wählen Sie „Fotos löschen“ oder „Fotos behalten“. Ihre aufgenommenen Videos werden in der iPhoto-Mediathek unter „Ereignisse“ und „Fotos“ sowie in der Liste der letzten Importe aufgeführt. Gehen Sie wie folgt vor, um aufgenommene Videos mithilfe von iPhoto bereitzustellen: 1 Befolgen Sie die Anleitungen zum Importieren Ihrer aufgenommenen Videos in iPhoto. 2 Wählen Sie in iPhoto ein Video aus. 3 Klicken Sie unten im iPhoto-Fenster auf „MobileMe“. 4 Befolgen Sie die angezeigten Anleitungen. Sie benötigen einen MobileMe-Account, um Ihre aufgenommenen Videos über MobileMe bereitzustellen. Außerdem müssen Sie iPhoto für die Veröffentlichung über Ihren Account konfigurieren. Weitere Informationen zur Online-Bereitstellung erhalten Sie, indem Sie iPhoto öffnen und „Hilfe“ > „iPhoto-Hilfe“ wählen.Kapitel 5 Verwenden der Videokamera 67 Bereitstellen aufgenommener Videos mit einem Mac oder PC Nachdem Sie Ihre aufgenommenen Videos auf Ihrem Computer importiert haben, können Sie sie vom Mac oder PC aus auf YouTube veröffentlichen. Gehen Sie wie folgt vor, um aufgenommene Videos auf Facebook zu veröffentlichen: 1 Besuchen Sie die Website www.facebook.com/de und melden Sie sich falls erforderlich an. 2 Klicken Sie auf das Videosymbol links neben der Taste für die Freigabe oben auf Ihrer Facebook-Startseite. Klicken Sie dann auf die Option zum Laden von Videos. 3 Befolgen Sie die angezeigten Anleitungen zum Auswählen und Laden Ihres Videos. Gehen Sie wie folgt vor, um aufgenommene Videos auf YouTube zu veröffentlichen: 1 Besuchen Sie die Website www.youtube.com/de und melden Sie sich falls erforderlich an. 2 Klicken Sie auf die Taste zum Laden oben rechts auf Ihrer YouTube-Startseite. 3 Befolgen Sie die angezeigten Anleitungen zum Auswählen und Laden Ihres Videos. Wenn Sie einen Mac mit iPhoto 8.1 (oder neuer) und Mac OS X 10.6.1 (oder neuer) besitzen, können Sie Ihre aufgenommenen Videos direkt an YouTube exportieren. Gehen Sie wie folgt vor, um aufgenommene Videos mithilfe von iPhoto 8.1 oder neuer und Mac OS X v10.6.1 oder neuer auf YouTube zu veröffentlichen: 1 Wählen Sie in iPhoto durch Doppelklicken das Video aus, das veröffentlicht werden soll. Das Video wird im QuickTime-Player geöffnet. 2 Wählen Sie im QuickTime-Player „Freigeben“ > „YouTube“. 3 Geben Sie Ihren YouTube-Namen und Ihr Kennwort ein und klicken Sie dann auf „Anmelden“. 4 Geben Sie eine Beschreibung und Tags ein. Wenn Sie den Zugriff auf Ihr Video einschränken wollen, wählen Sie „Film als privat festlegen“. 5 Klicken Sie auf „Weiter“ und dann auf „Freigeben“. Wenn der Export abgeschlossen ist, klicken Sie auf den angezeigten Link, um auf Ihre Videoseite in YouTube zu gelangen. Für das Laden von Video auf Facebook oder YouTube sind Accounts erforderlich. Besuchen Sie die entsprechenden Websites, wenn Sie weitere Informationen hierzu benötigen.68 Kapitel 5 Verwenden der Videokamera Hinzufügen von Musik zu Ihren aufgenommenen Videos Mit dem QuickTime-Player können Sie Musik zu Ihren aufgenommenen Videos hinzufü- gen. Wählen Sie ein aufgenommenes Video in iPhoto aus und klicken Sie dann unten im iPhoto-Fenster auf die Taste „Bearbeiten“. Das Video wird im QuickTime-Player geöffnet und Sie können eine Musikspur hinzufügen. Informationen zum Hinzufügen von Musik zu Ihren aufgenommenen Videos mit dem QuickTime-Player erhalten Sie, indem Sie „Hilfe“ > „QuickTime-Player-Hilfe“ wählen und die Anleitungen zum Extrahieren, Hinzufügen von Bewegen von Spuren lesen. Möchten Sie auf einem Windows-PC Musik zu Ihren Videos hinzufügen, lesen Sie die mit Ihrem Computer oder Fotoprogramm gelieferte Dokumentation.6 69 6 Anhören von FM-Radiosendungen Der iPod nano ist mit einem integrierten FM-Radio ausgestattet, das Informationen zum Radiosender und gespielten Titel anzeigt, eine Funktion zum Stoppen von Live-Radiosendungen bietet und Titel kennzeichnet, die Sie in iTunes vorab anhören und kaufen können. Wenn Sie FM-Radio hören möchten, verbinden Sie Ohr- oder Kopfhörer mit dem iPod nano und wählen Sie dann „Radio“ aus dem Hauptmenü. Das Kabel der Ohr- oder Kopfhörer des iPod nano dient als Radioantenne. Sie müssen Ohr- oder Kopfhörer an den iPod nano anschließen, um ein Funksignal empfangen zu können. Über den Lautsprecher des iPod nano werden Radiosendungen nicht ausgegeben. Nach der Auswahl von „Radio“ aus dem Hauptmenü wird der Radiobildschirm angezeigt. Wenn die Radiosenderauswahl angezeigt wird, können Sie mit dem Click Wheel oder durch Drücken der Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]) einen Radiosender wählen.70 Kapitel 6 Anhören von FM-Radiosendungen Wichtig: Die in diesem Kapitel angegebenen Funkfrequenzen dienen nur zur Veranschaulichung und sind nur in bestimmten Regionen verfügbar. Wenn Sie einen Sender mit Unterstützung für RDS (Radio Data System) einstellen, werden auf dem Bildschirm Informationen zu Titel, Interpret und Sender angezeigt. Nach der Einstellung eines Senders wird die Senderauswahl durch den Statusbalken ersetzt. Der Statusbalken bewegt sich entsprechend, wenn Sie den Sender weiterhin anhören. Angezeigtes Objekt Funktion RDS-Daten Zeigt aktuelle Informationen zu Sender, Titel und Interpret an. Radiosenderauswahl Wird zum Einstellen des Senders verwendet. Markierungen für Lieblingssender Weisen darauf hin, dass sich der aktuelle Sender in der Liste der Favoriten befindet. Symbol für das Funksignal Wird angezeigt, wenn das Radio eingeschaltet ist und ein Signal empfängt. Sendefrequenz Zeigt die Sendefrequenz des ausgewählten Radiosenders an. Symbol für Kennzeichnungen Wird angezeigt, wenn der aktuelle Titel die iTunes-Kennzeichnungsfunktion unterstützt. Statusbalken Zeigt die Länge des Radiopuffers an. Symbol für das Funksignal Statusbalken Radiosenderauswahl RDS-Daten Sendefrequenz Markierung für Lieblingssender Markierung für Lieblingssender RDS-Daten Symbol für KennzeichnungenKapitel 6 Anhören von FM-Radiosendungen 71 Einstellen des FM-Radios Sie können das FM-Radio einstellen, indem Sie durch Sender blättern, zwischen verfügbaren Sendern wechseln oder diese suchen oder Ihre Lieblingssender sichern und direkt auswählen. Gehen Sie wie folgt vor, um durch Radiosender zu blättern: 1 Wählen Sie „Radio“ aus dem Hauptmenü. Wird die Radiosenderauswahl nicht angezeigt, drücken Sie so lange die Mitteltaste, bis das Bedienelement verfügbar wird. 2 Verwenden Sie das Click Wheel, um den gewünschten Sender einzustellen. Gehen Sie wie folgt vor, um zwischen verfügbaren Sendern zu wechseln: 1 Wählen Sie „Radio“ aus dem Hauptmenü. Wird die Radiosenderauswahl nicht angezeigt, drücken Sie so lange die Mitteltaste, bis das Bedienelement verfügbar wird. 2 Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]), um zum nächsten oder vorherigen verfügbaren Sender zu wechseln. Wiederholen Sie diesen Schritt nach Belieben. Wurden Lieblingssender eingestellt, ist die Funktion für den Senderwechsel nicht verfügbar. In diesem Fall werden durch Drücken der Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]) die Lieblingssender eingestellt. Gehen Sie wie folgt vor, um nach verfügbaren Sendern zu suchen: 1 Wählen Sie „Radio“ aus dem Hauptmenü. Wird die Radiosenderauswahl nicht angezeigt, drücken Sie so lange die Mitteltaste, bis das Bedienelement verfügbar wird. 2 Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) bzw. „Zurück/Schneller Rücklauf“ (]), um nach verfügbaren Sendern zu suchen. Sie hören eine fünfsekündige Hörprobe jedes Senders, bevor zum nächsten Sender gewechselt wird. 3 Möchten Sie den Suchlauf beenden und den aktuellen Sender auswählen, drücken Sie die Mitteltaste. 103.5FM 100 106 102 10472 Kapitel 6 Anhören von FM-Radiosendungen Gehen Sie wie folgt vor, um Ihre Lieblingssender zu sichern: 1 Stellen Sie einen Sender ein, den Sie sichern möchten. 2 Drücken und halten Sie die Mitteltaste, bis ein Menü angezeigt wird. 3 Wählen Sie „Voreinstellung hinzufügen“ und drücken Sie dann die Mitteltaste. Gehen Sie wie folgt vor, um einen Lieblingssender einzustellen: 1 Wählen Sie „Radio“ aus dem Hauptmenü. Wird die Radiosenderauswahl nicht angezeigt, drücken Sie so lange die Mitteltaste, bis das Bedienelement verfügbar wird. 2 Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]), um den nächsten oder vorherigen Lieblingssender einzustellen. Wiederholen Sie diesen Schritt nach Belieben. Stoppen von Live-Radiosendungen Sie können eine Radiosendung stoppen und innerhalb von 15 Minuten nahtlos weiter abspielen. Gehen Sie wie folgt vor, um eine Live-Radiosendung zu stoppen: m Drücken Sie, während das Radio läuft, in einem beliebigen Bildschirm die Taste „Start/ Pause“ (’). 103.5FMKapitel 6 Anhören von FM-Radiosendungen 73 Das Symbol „Pause“ (1) wird angezeigt und die Uhrzeit, zu der Sie die Wiedergabe gestoppt haben, wird über dem Statusbalken eingeblendet. Während der Live-Pause gibt ein gelbes Dreieck die Stelle an, an der die Radiosendung gestoppt wurde. Der Statusbalken bewegt sich und zeigt an, wie viel Zeit seit dem Stopp vergangen ist.74 Kapitel 6 Anhören von FM-Radiosendungen Wenn Sie die Taste „Start/Pause“ (’) erneut drücken, wird die Sendung nahtlos fortgesetzt. Sie können entlang des Statusbalkens auch vor oder zurück navigieren. Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]) und halten Sie sie gedrückt oder verwenden Sie das Click Wheel, um schnell vor oder zurück zu navigieren. Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]), um in Intervallen von einer Minute vor oder zurück zu navigieren. Sie können nur dann durch eine gestoppte Radiosendung navigieren, wenn der Statusbalken zu sehen ist. Bei Anzeige der Radiosenderauswahl ist das nicht möglich. Gehen Sie wie folgt vor, um zwischen Statusbalken und Radiosenderauswahl zu wechseln: m Drücken Sie die Mitteltaste. Der Statusbalken ist vollständig ausgefüllt, wenn die maximale Pausendauer von 15 Minuten erreicht ist. Sofern Sie den Radiosender nicht löschen, können Sie durch die 15 letzten Minuten der Sendung navigieren, die Sie anhören. Inhalte, die älter als 15 Minuten sind, werden gelöscht, um Platz für die weitere Sendung zu schaffen. Wenn Sie die Sendung stoppen und nicht innerhalb von 15 Minuten fortsetzen, wird der Ruhezustand des iPod nano aktiviert und die gestoppte Radiosendung gelöscht. Eine gestoppte Radiosendung wird gelöscht, wenn eine der folgenden Situationen eintritt:  Sie wählen einen anderen Sender. Wenn Sie während einer gestoppten Radiosendung den Sender wechseln, wird eine Warnung angezeigt und Sie können den Vorgang abbrechen.  Sie schalten den iPod nano aus.  Sie schalten das Radio aus, um andere Inhalte abzuspielen, die Videokamera zu verwenden oder ein Sprachmemo aufzuzeichnen.  Die Batterieladung ist sehr niedrig und die Batterie muss geladen werden.Kapitel 6 Anhören von FM-Radiosendungen 75  Sie setzen die Wiedergabe der Sendung nach einer Pause von 15 Minuten nicht fort. Sie können die Funktion „Live-Pause“ im Menü „Radio“ deaktivieren, um Batteriestrom zu sparen. Gehen Sie wie folgt vor, um die Funktion „Live-Pause“ zu deaktivieren: 1 Drücken Sie im Bildschirm „Radio“ die Taste „Menu“. 2 Wählen Sie „Live-Pause“ und drücken Sie die Mitteltaste. Wählen Sie dann „Aus“. Wählen Sie „Ein“, um die Funktion „Live-Pause“ wieder zu aktivieren. Kennzeichnen von Titeln für die Synchronisierung mit iTunes Wenn Sie einen Radiosender mit Unterstützung für die iTunes-Kennzeichnungsfunktion eingestellt haben, können Sie eine Liste mit Titeln sichern, die Sie später im iTunes Store als Hörprobe anhören und anschließend kaufen können. Titel, die gekennzeichnet werden können, sind neben dem Namen mit einem entsprechenden Symbol für Kennzeichnungen versehen. Gehen Sie wie folgt vor, um einen Musiktitel zu kennzeichnen: 1 Drücken und halten Sie die Mitteltaste, bis ein Menü angezeigt wird. Symbol für Kennzeichnungen76 Kapitel 6 Anhören von FM-Radiosendungen 2 Wählen Sie „Kennzeichnen“ und drücken Sie dann die Mitteltaste. Ihre gekennzeichneten Musiktitel werden im Menü „Radio“ unter „Gekennzeichnete Titel“ angezeigt. Wenn Sie den iPod nano das nächste Mal mit iTunes synchronisieren, werden Ihre gekennzeichneten Titel synchronisiert und vom iPod nano gelöscht. Sie werden in iTunes angezeigt. Im iTunes Store können Sie dann eine Hörprobe davon abspielen und sie kaufen. Hinweis: Diese Funktion steht möglicherweise nicht für alle Radiosender zur Verfügung. Gehen Sie wie folgt vor, um gekennzeichnete Titel in iTunes vorab anzuhören und zu kaufen: 1 Klicken Sie links im iTunes-Fenster unter „Store“ auf „Gekennzeichnet“. 2 Klicken Sie für den gewünschten Titel auf die Taste „Darstellung“. 3 Möchten Sie die Hörprobe des Titels abspielen, wählen Sie ihn durch Doppelklicken aus oder klicken Sie auf die Taste „Hörprobe“. Möchten Sie den Titel kaufen, klicken Sie auf die Taste „Kaufen“. Verwenden des Menüs „Radio“ Drücken Sie im Radiobildschirm auf die Taste „Menu“, um zum Menü „Radio“ zu wechseln. Das Menü „Radio“ enthält die folgenden Objekte. Menüobjekt Funktion Radiowiedergabe Schaltet das Radio ein und zeigt wieder den Radiobildschirm an. Radio beenden Schaltet das Radio aus und löscht gestoppte Radiosendungen (wird nur angezeigt, wenn das Radio eingeschaltet ist).Kapitel 6 Anhören von FM-Radiosendungen 77 Radioregionen Mit dem iPod nano können in vielen Ländern FM-Funksignale empfangen werden. Fünf Signalregionen sind bereits definiert: Nord-, Mittel- und Südamerika, Asien, Australien, Europa und Japan. Gehen Sie wie folgt vor, um eine Radioregion auszuwählen: m Wählen Sie „Radio-Regionen“ aus dem Menü „Einstellungen“ und wählen Sie dann Ihre Region. Das Menü „Radio-Regionen“ wird auch im Menü „Radio“ angezeigt. Die definierten Regionen richten sich dabei nach internationalen Radiostandards und nicht nach tatsächlichen geografischen Regionen. Wenn Sie in einem Land leben, das im Menü „Radio-Regionen“ nicht aufgelistet wird, wählen Sie die Region, deren Angaben über die Funkfrequenz am ehesten mit denen Ihres Landes übereinstimmen. In der folgenden Tabelle wird der Funkfrequenzbereich jeder Region im Menü „RadioRegionen“ genannt, ergänzt durch die jeweiligen Unterschiede zwischen einzelnen Radiosendern (durch das Zeichen „±“ angegeben). Wichtig: Der iPod nano ist nur für den Empfang öffentlicher Radiosendungen konzipiert. Das Anhören von Übertragungen, die nicht für die Öffentlichkeit bestimmt sind, ist in einigen Ländern illegal und kann strafrechtliche Folgen nach sich ziehen. Informieren Sie sich über die regional geltenden Gesetze und Vorschriften und halten Sie diese bei Verwendung des iPod nano ein. Favoriten Zeigt eine Liste der Sender an, die Sie als Favoriten gesichert haben. Wählen Sie einen Sender aus und drücken Sie die Mitteltaste, um die Wiedergabe zu starten. Gekennzeichnete Titel Zeigt eine Liste mit Titeln an, die Sie seit der letzten Synchronisierung mit iTunes gekennzeichnet haben, um eine Hörprobe davon abzuspielen und sie zu kaufen. Letzte Titel Zeigt eine Liste der zuletzt abgespielten Titel an. Radio-Regionen Hiermit können Sie die Radiosender für Ihre aktuelle Region einstellen. Live-Pause Aktiviert oder deaktiviert die Funktion „Live-Pause“. Menüobjekt Funktion Radio-Region Angaben zur Funkfrequenz Nord-, Mittel- und Südamerika 87,5 – 107,9 MHz / ± 200 kHz Asien 87,5 – 108,0 MHz / ± 100 kHz Australien 87,5 – 107,9 MHz / ± 200 kHz Europa 87,5 – 108,0 MHz / ± 100 kHz Japan 76,0 – 90,0 MHz / ± 100 kHz7 78 7 Fotofunktionen Lesen Sie dieses Kapitel, um mehr über das Importieren und Anzeigen von Fotos zu erfahren. Sie können digitale Fotos auf Ihren Computer importieren und zum iPod nano hinzufügen. Sie können Ihre Fotos auf dem iPod nano oder in einer Diashow auf einem Fernsehgerät anzeigen. Importieren von Fotos Wenn Sie mit einem Mac arbeiten, können Sie Fotos mithilfe von iPhoto von einer Digitalkamera auf Ihren Computer importieren. Sie können auch andere digitale Bilder in iPhoto importieren, beispielsweise Bilder aus dem Internet. Weitere Informationen zum Importieren, Verwalten und Bearbeiten Ihrer Fotos erhalten Sie, indem Sie iPhoto öffnen und „Hilfe“ > „iPhoto-Hilfe“ wählen. iPhoto ist Bestandteil des iLife-Softwarepakets, das Sie unter www.apple.com/de/ilife oder in Ihrem Apple Store vor Ort erwerben können. Möglicherweise ist iPhoto auch bereits auf Ihrem Mac-Computer im Ordner „Programme“ installiert. Wenn Sie Fotos auf einen Windows-PC importieren möchten, befolgen Sie die Anleitungen, die Sie mit Ihrer Digitalkamera oder dem Fotoprogramm erhalten haben. Hinzufügen von Fotos von Ihrem Computer zum iPod nano Wenn Sie einen Mac und iPhoto 7.1.5 (oder neuer) verwenden, können Sie iPhoto-Alben automatisch synchronisieren (für Mac OS X 10.4.11, iPhoto 6.0.6 oder neuer ist erforderlich). Wenn Sie einen PC oder Mac verwenden, können Sie aus einem Ordner auf Ihrer Festplatte Fotos zum iPod nano hinzufügen. Das erste Hinzufügen von Fotos zum iPod nano dauert evtl. einige Zeit, je nachdem, wie viele Fotos in Ihrer Mediathek enthalten sind.Kapitel 7 Fotofunktionen 79 Gehen Sie wie folgt vor, um Fotos von einem Mac mithilfe von iPhoto zum iPod nano hinzuzufügen: 1 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel „Fotos“. 2 Wählen Sie „Fotos synchronisieren von“ und wählen Sie „iPhoto“ aus dem Einblendmenü aus. 3 Wählen Sie Ihre Synchronisierungsoptionen aus:  Möchten Sie alle Ihre Fotos hinzufügen, wählen Sie „Alle Fotos, Alben, Ereignisse und Gesichter“.  Möchten Sie ausgewählte Fotos hinzufügen, wählen Sie „Ausgewählte Alben, Ereignisse und Gesichter. Automatisch mit einbeziehen:“ und wählen Sie dann eine Option aus dem Einblendmenü aus. Wählen Sie anschließend die Alben, Ereignisse und Gesichter aus, die Sie hinzufügen möchten. (Die Funktion „Gesichter“ wird nur von iPhoto 8.1 oder neuer unterstützt.)  Möchten Sie Videos aus iPhoto hinzufügen, wählen Sie „Videos einbeziehen“. 4 Klicken Sie auf „Anwenden“. Ihre Fotos werden bei jedem Anschließen des iPod nano an Ihren Computer automatisch synchronisiert. Gehen Sie wie folgt vor, um Fotos aus einem Ordner auf Ihrer Festplatte zum iPod nano hinzuzufügen: 1 Bewegen Sie die Bilder in einen Ordner auf Ihrem Computer. Sollen Bilder in verschiedenen Fotoalben auf dem iPod nano abgelegt werden, erstellen Sie innerhalb des Hauptordners für Ihre Bilder weitere Ordner und bewegen Sie die Bilder in die neuen Ordner. 2 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel „Fotos“. 3 Wählen Sie „Fotos synchronisieren von“. 4 Wählen Sie „Ordner auswählen“ aus dem Einblendmenü aus und wählen Sie dann den Ordner mit Ihren Bildern. 5 Klicken Sie auf „Anwenden“.80 Kapitel 7 Fotofunktionen Hinzufügen von Bilddateien mit voller Auflösung zum iPod nano Wenn Sie Fotos zum iPod nano hinzufügen, optimiert iTunes die Fotos für die Anzeige. Dabei werden die Bilddateien nicht standardmäßig mit der vollen Auflösung übertragen. Das Hinzufügen von Bilddateien mit voller Auflösung ist beispielsweise dann nützlich, wenn Sie Ihre Bilder von einem Computer auf einen anderen bewegen möchten. Zur Anzeige der Bilder in höchster Qualität auf dem iPod nano ist die volle Auflösung dagegen nicht erforderlich. Gehen Sie wie folgt vor, um Bilddateien in voller Auflösung zum iPod nano hinzuzufügen: 1 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel „Fotos“. 2 Wählen Sie „Inklusive Fotos mit voller Auflösung“. 3 Klicken Sie auf „Anwenden“. iTunes kopiert die Versionen der Fotos mit voller Auflösung in den Ordner „Photos“ auf Ihrem iPod nano. Gehen Sie wie folgt vor, um Fotos vom iPod nano zu löschen: 1 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel „Fotos“. 2 Wählen Sie „Fotos synchronisieren von“.  Wählen Sie auf einem Mac „iPhoto“ aus dem Einblendmenü aus.  Wählen Sie auf einem Windows-PC „Photoshop Album“ oder „Photoshop Elements“ aus dem Einblendmenü aus. 3 Wählen Sie „Ausgewählte Alben“ und deaktivieren Sie die Alben, die Sie auf dem iPod nano nicht mehr benötigen. 4 Klicken Sie auf „Anwenden“.Kapitel 7 Fotofunktionen 81 Anzeigen von Fotos Auf dem iPod nano können Sie Fotos entweder manuell oder in einer Diashow anzeigen. Wenn Sie ein optionales AV-Kabel von Apple (z. B. das Apple Component AV-Kabel) haben, können Sie den iPod nano mit Ihrem Fernsehgerät verbinden und Fotos zusammen mit passender Musikuntermalung als Diashow anzeigen. Anzeigen von Fotos auf dem iPod nano Gehen Sie wie folgt vor, um Fotos auf dem iPod nano anzuzeigen: 1 Wählen Sie auf dem iPod nano „Fotos“ > „Alle Fotos“. Sie können auch das Menü „Fotos“ und dann ein Fotoalbum auswählen, wenn Sie sich nur die Fotos aus diesem Album ansehen möchten. Bei Miniaturbildern dauert es u. U. einen Augenblick, bis sie angezeigt werden. 2 Wählen Sie das gewünschte Foto aus und drücken Sie die Mitteltaste. 3 Halten Sie den iPod nano beim Anzeigen von Fotos im Hochformat vertikal und beim Anzeigen von Fotos im Querformat horizontal. Blättern Sie in einer beliebigen Fotoanzeige mit dem Click Wheel durch Fotos (wenn Sie eine Diashow anzeigen, wird mit dem Click Wheel nur die Lautstärke der Musik gesteuert). Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]), um zur nächsten oder vorherigen Fotoanzeige zu wechseln. Drücken und halten Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]), um zum letzten oder ersten Foto in der Mediathek oder dem Album zu blättern.82 Kapitel 7 Fotofunktionen Anzeigen von Diashows Sie können eine Diashow – auf Wunsch mit Musik und Übergängen – auf dem iPod nano anzeigen. Mit einem optionalen AV-Kabel von Apple können Sie die Diashow auch auf Ihrem Fernsehgerät ansehen. Gehen Sie wie folgt vor, um die Einstellungen für die Diashow festzulegen: m Wählen Sie „Fotos“ > „Einstellungen“ und befolgen Sie diese Anweisungen: Gehen Sie wie folgt vor, um eine Diashow auf dem iPod nano anzuzeigen: m Wählen Sie ein Foto, ein Album oder einen Film aus und drücken Sie die Taste „Start/ Pause“ (’). Oder wählen Sie ein Foto im Vollbildmodus und drücken Sie Mitteltaste. Drücken Sie die Taste „Start/Pause“ (’), um die Diashow anzuhalten. Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]), um zum nächsten oder vorherigen Foto zu wechseln. Wenn Sie eine Diashow anzeigen, können Sie mit dem Click Wheel die Lautstärke der Begleitmusik steuern und die Helligkeit anpassen. Während einer Diashow ist es nicht möglich, mit dem Click Wheel durch Fotos zu blättern. Einstellung Aktion Anzeigedauer pro Bild Wählen Sie „Dauer pro Dia“ und wählen Sie eine Dauer aus. Die während der Diashows abgespielte Musik Wählen Sie „Musik“ und wählen Sie eine Wiedergabeliste oder „Sie hören“ aus. Wenn Sie iPhoto verwenden, können Sie „Von iPhoto“ auswählen, um die Musikeinstellungen von iPhoto zu kopieren. Es werden nur die Musiktitel abgespielt, die Sie zum iPod nano hinzugefügt haben. Zu wiederholende Dias Legen Sie für „Wiederholen“ die Einstellung „Ein“ fest. Zufällig anzuzeigende Dias Legen Sie für „Zufällige Fotos“ die Einstellung „Ein“ fest. Mit Übergängen anzuzeigende Dias Wählen Sie „Übergänge“ und wählen Sie einen Übergangstyp aus. „Zufall“ umfasst alle Übergangstypen abgesehen von „Ken Burns“. Auf dem iPod nano anzuzeigende Diashows Setzen Sie „TV-Ausgang“ auf „Fragen“ oder „Aus“. Auf einem Fernsehgerät anzuzeigende Diashows Setzen Sie „TV-Ausgang“ auf „Fragen“ oder „Ein“. Wenn Sie für „TV-Ausgang“ die Option „Fragen“ festlegen, können Sie bei jedem Starten einer Diashow entscheiden, ob Sie die Diashow auf einem Fernsehgerät oder auf dem iPod nano ansehen wollen. Auf PAL- oder NTSC-Fernsehgeräten anzuzeigende Dias Setzen Sie das TV-Signal auf PAL oder NTSC. PAL und NTSC beziehen sich auf die Standards zur Fernsehübertragung. Welchen Standard Ihr Fernsehgerät verwendet, hängt davon ab, in welchem Land Sie Ihr das Gerät erworben haben. Sehen Sie ggf. in der Dokumentation zu Ihrem Fernsehgerät nach, welchen Standard das Gerät verwendet.Kapitel 7 Fotofunktionen 83 Wenn Sie eine Diashow eines Albums anzeigen, das Videos enthält, wird die Diashow angehalten, wenn das nächste Element ein Video ist. Begleitmusik wird weiterhin wiedergegeben. Wenn Sie das Video abspielen, wird die Musik währenddessen angehalten und danach fortgesetzt. Drücken Sie die Taste „Start/Pause“ (’), um das Video abzuspielen. Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘), um die Diashow fortzusetzen. Gehen Sie wie folgt vor, um die Helligkeit während einer Diashow anzupassen: 1 Drücken Sie die Mitteltaste, bis die Helligkeitsanzeige zu sehen ist. 2 Verwenden Sie das Click Wheel, um die Helligkeit anzupassen. Gehen Sie wie folgt vor, um den iPod nano an Ihr Fernsehgerät anzuschließen: 1 Schließen Sie das optionale Apple Component bzw. Composite AV-Kabel an den iPod nano an. Verwenden Sie das Apple Component AV-Kabel, Apple Composite AV-Kabel oder Apple AV Connection Kit. Andere ähnliche Kabel mit Cinch-Stecker funktionieren u. U. nicht. Sie können die Kabel unter www.apple.com/de/ipodstore erwerben. 2 Verbinden Sie die Audiostecker mit den Anschlüssen am Fernsehgerät. Stellen Sie sicher, dass auf dem iPod nano die Option „TV-Ausgang“ auf „Fragen“ oder „Ein“ gesetzt ist. Ihr Fernsehgerät muss über Cinch-Video- und Audioanschlüsse verfügen. Die Anschlüsse an Ihrem Fernsehgerät oder Empfänger unterscheiden sich möglicherweise etwas von den hier abgebildeten. Gehen Sie wie folgt vor, um eine Diashow auf Ihrem Fernsehgerät anzuzeigen: 1 Verbinden Sie den iPod nano mit Ihrem Fernsehgerät (vgl. Seite 61). 2 Schalten Sie Ihr Fernsehgerät ein und stellen Sie es so ein, dass die Anzeige über die Eingänge erfolgt, an denen der iPod nano angeschlossen ist. Weitere Informationen hierzu finden Sie in der Dokumentation zu Ihrem Fernsehgerät. 3 Verwenden Sie den iPod nano, um die Diashow abzuspielen und zu steuern.84 Kapitel 7 Fotofunktionen Hinzufügen von Fotos vom iPod nano zu einem Computer Wenn Sie wie in den vorhergehenden Schritten beschrieben Fotos mit voller Auflö- sung von Ihrem Computer zum iPod nano hinzufügen, werden sie auf dem iPod nano im Ordner „Photos“ abgelegt. Sie können den iPod nano an einen Computer anschlie- ßen und diese Fotos auf dem Computer ablegen. Der iPod nano muss für die Verwendung als Festplatte aktiviert sein (vgl. „Verwenden des iPod nano als externes Volume“ auf Seite 99). Gehen Sie wie folgt vor, um Fotos vom iPod nano auf einen Computer zu übertragen: 1 Schließen Sie den iPod nano an Ihren Computer an. 2 Bewegen Sie die Bilddateien aus dem Ordner „Photos“ oder „DCIM“ Ihres iPod nano auf den Schreibtisch oder in ein Programm zur Fotobearbeitung auf Ihrem Computer. Sie können auch ein Fotobearbeitungsprogramm wie iPhoto verwenden, um die im Ordner „Photos“ abgelegten Fotos hinzuzufügen. Weitere Informationen hierzu finden Sie in der Dokumentation zum Programm. Gehen Sie wie folgt vor, um Fotos aus dem Ordner „Photos“ auf Ihrem iPod nano zu löschen: 1 Schließen Sie den iPod nano an Ihren Computer an. 2 Navigieren Sie im Finder zum Ordner „Photos“ auf dem iPod nano und löschen Sie die Fotos, die Sie nicht mehr benötigen.8 85 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör Der iPod nano kann nicht nur Musiktitel wiedergeben. Und Sie können ihn nicht nur zum Anhören von Musik verwenden. Lesen Sie dieses Kapitel, um Näheres über die weiteren Funktionen Ihres iPod nano zu erfahren, z. B. wie Sie ihn als Schrittzähler nutzen, Spachmemos damit aufzeichnen, als externes Volume oder als Wecker verwenden, wie Sie den Timer für den Ruhezustand einstellen, die Uhrzeit in anderen Ländern anzeigen, wie Sie den iPod nano zum Spielen verwenden und Notizen anzeigen und wie Sie Kontakte, Kalender und Aufgabenlisten synchronisieren. Hier erfahren Sie außerdem, wie Sie den iPod nano als Stoppuhr verwenden und die Bildschirmanzeige sperren können. Zudem erhalten Sie Informationen dazu, welches Zubehör für den iPod nano angeboten wird. Verwenden des iPod nano als Schrittzähler Sie können den iPod nano als Schrittzähler (Pedometer) verwenden, der Ihre Schritte und Trainingsleistungen erfasst. Damit Sie möglichst genaue Ergebnisse erhalten, tragen Sie den iPod nano bei Verwendung des Schrittzähler in der Hosentasche oder verwenden Sie das iPod nano Armband.86 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör Gehen Sie wie folgt vor, um den iPod nano als Schrittzähler (Pedometer) zu verwenden: 1 Wählen Sie aus dem Menü „Extras“ die Option „Fitness“ und anschließend „Pedometer“. 2 Wenn Sie den Schrittzähler das erste Mal verwenden, geben Sie mit dem Click Wheel Ihr Gewicht ein und drücken Sie dann die Mitteltaste, um die Erfassung zu starten. 3 Drücken Sie erneut die Mitteltaste, wenn Sie die Erfassung beenden möchten. Gehen Sie wie folgt vor, um die Einstellungen des Schrittzählers anzupassen: 1 Wählen Sie aus dem Menü „Extras“ die Option „Fitness“ und anschließend „Einstellungen“. 2 Wählen Sie eine der folgenden Optionen aus: Gehen Sie wie folgt vor, um Ihre Trainingsübersicht anzuzeigen: 1 Wählen Sie aus dem Menü „Extras“ die Option „Fitness“ und anschließend „Übersicht“. 2 Wählen Sie ein Datum aus dem Kalender aus. Wählen Sie mit dem Click Wheel einen Tag aus. Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘) oder „Zurück/Schneller Rücklauf“ (]), um durch die Monate zu blättern. 3 Drücken Sie die Mitteltaste, um Ihre Trainingsübersicht für das gewählte Datum anzuzeigen. Wenn Sie am gewählten Tag mehrere Trainingseinheiten absolviert haben, wählen Sie die gewünschte aus. Der iPod nano zeigt Ihr Schrittziel, die Trainingsdauer, Start- und Endzeiten, verbrannte Kalorien und Gesamtwerte für die jeweilige Woche und den Monat an. Möchten Sie ein Balkendiagramm für eine Ihrer Trainingseinheiten anzeigen, wählen Sie eine Trainingseinheit aus und drehen Sie den iPod nano dann ins Querformat. Ist der Schrittzähler aktiviert, wird im Hauptmenü der Eintrag „Pedometer“ angezeigt, über den Sie die Erfassung schnell beenden können. Der Vorschaubereich unter dem Hauptmenü zeigt Ihre Schrittzahl an, wenn Sie zum Menüobjekt „Pedometer“ blättern. Funktion Aktion Schrittzählermodus auswählen Wählen Sie „Pedometer“ und drücken Sie dann die Mitteltaste, um zwischen „Manuell“ und „Immer eingeschaltet“ zu wechseln. Trainingsziel festlegen Wählen Sie „Tägliches Schrittziel“ und wählen Sie dann ein Ziel aus der Liste aus. Wählen Sie alternativ „Anpassen“ und legen Sie dann mit dem Click Wheel ein Ziel fest. Gewicht angeben Wählen Sie „Gewicht“, stellen Sie mit dem Click Wheel Ihr Gewicht ein und drücken Sie dann die Mitteltaste. Ausrichtung des Schrittzählers angeben Wählen Sie „Bildschirmausrichtung“ und wählen Sie dann „Vertikal“, „Links“ oder „Rechts“.Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 87 Soll der iPod nano Ihre Schritte im Laufe eines Tages zählen, wählen Sie „Pedometer“ aus dem Menü „Einstellungen“ und dann „Immer eingeschaltet“. Der Schrittzähler speichert Ihre Gesamtschrittzahl pro Tag, sodass Sie einen Überblick erhalten können, ohne den Schrittzähler am Tagesende auszuschalten. In diesem Fall wird das Menüobjekt „Pedometer“ fortlaufend im Hauptmenü angezeigt. Sie können das Menüobjekt „Pedometer“ auch manuell zum Hauptmenü hinzufügen, um die Schritterfassung schnell starten zu können. Beachten Sie hierzu den Abschnitt „Hinzufügen oder Löschen von Menüoptionen im Hauptmenü“ auf Seite 11. Mithilfe des Nike + iPod Sport Kit (separat erhältlich) kann der iPod nano auch Ihre Geschwindigkeit, die zurückgelegte Strecke und vergangene Zeit sowie die verbrannten Kalorien erfassen und Ihre Trainingseinheiten an Nike + iPod-kompatiblen Studiogeräten speichern. Wenn Sie den iPod nano mit iTunes synchronisieren, können Sie Ihre Schrittzähler- und andere Trainingsdaten auf die Nike+-Website laden, über die Sie Ihre Trainingserfolge anzeigen und mit denen von Freunden vergleichen können und mehr. Sie benötigen einen Nike+-Account, den Sie bei der Synchronisierung einrichten können. Gehen Sie wie folgt vor, um Ihre Trainingsinformationen auf die Nike+-Website zu laden: 1 Verbinden Sie den iPod nano mit Ihrem Computer und öffnen Sie iTunes (sofern es nicht automatisch geöffnet wird). Wenn Sie Ihre Trainingsdaten das erste Mal synchronisieren, wird folgende Meldung angezeigt: 2 Klicken Sie auf „Senden“ und befolgen Sie die angezeigten Anleitungen, um Ihren Nike+-Account einzurichten. Nachdem Sie Ihren Account eingerichtet haben, wird ein neuer Titel im iTunes-Fenster angezeigt: 3 Klicken Sie auf den Titel „Nike + iPod“ und wählen Sie „Trainingsdaten automatisch an Nike+ senden“, sofern diese Option nicht bereits ausgewählt ist. 4 Klicken Sie auf „Anwenden“.88 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör Möchten Sie Ihre Informationen auf der Nike+-Website anzeigen und bereitstellen, klikken Sie im Bereich „Nike + iPod“ auf „Nike+ besuchen“, wenn der iPod nano mit Ihrem Computer verbunden ist, oder öffnen Sie die Seite www.nike.com und melden Sie sich dann bei Ihrem Account an. Aufzeichnen von Sprachmemos Mit dem integrierten Mikrofon des iPod nano oder einem optionalen iPod nano-kompatiblen Mikrofon (erhältlich unter www.apple.com/de/ipodstore) können Sie Sprachmemos aufzeichnen. Sie haben die Möglichkeit, während der Aufnahme Kapitelmarkierungen zu setzen, Sprachmemos auf dem iPod nano zu speichern und mit Ihrem Computer zu synchronisieren und sie mit Bezeichnungen zu versehen. Sprachmemos können bis zu zwei Stunden lang sein. Wenn Sie Material mit einer Länge von über zwei Stunden aufnehmen, beginnt der iPod nano automatisch ein neues Sprachmemo, um die Aufnahme fortzusetzen. Gehen Sie wie folgt vor, um ein Sprachmemo aufzuzeichnen: 1 Wählen Sie aus dem Menüs „Extras“ die Option „Sprachmemos“. Der Bildschirm für die Sprachaufzeichnung wird angezeigt. 2 Drücken Sie die Taste „Start/Pause“ (’) oder die Mitteltaste, um mit der Aufnahme zu beginnen. Achten Sie darauf, das Mikrofon an der Rückseite des iPod nano nicht zu verdecken. 3 Drücken Sie die Taste „Start/Pause“ (’), um die Aufnahme anzuhalten. Wählen Sie „Weiter“, um die Aufnahme fortzusetzen, oder drücken Sie erneut die Taste „Start/Pause“ (’). 4 Wenn Sie fertig sind, drücken Sie die Taste „Menu“ und wählen Sie dann „Stoppen und sichern“. Ihre gesicherte Aufnahme wird mit Datum und Uhrzeit aufgelistet.Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 89 Gehen Sie wie folgt vor, um Kapitelmarkierungen zu sichern: m Drücken Sie während der Aufnahme die Mitteltaste, um eine Kapitelmarkierung zu setzen. Beim Abspielen der Aufnahme können Sie durch Drücken der Taste „Vor/Schneller Vorlauf“ direkt zum nächsten Kapitel wechseln. Drücken Sie einmal die Taste „Zurück/ Schneller Rücklauf“ (]), um zum Anfang des aktuellen Kapitels zu wechseln. Drücken Sie die Taste zweimal, um zum Anfang des vorherigen Kapitels zu gelangen. Gehen Sie wie folgt vor, um eine Aufnahme mit einer Bezeichnung zu versehen: 1 Wählen Sie aus dem Menü „Extras“ die Option „Sprachmemos“ und drücken Sie dann die Taste „Menu“. 2 Wählen Sie „Aufnahmen“ und wählen Sie dann eine Aufnahme. 3 Wählen Sie „Bezeichnung“ und wählen Sie dann eine Bezeichnung für die Aufnahme aus. Zur Auswahl stehen „Podcast“, „Interview“, „Vortrag“, „Idee“, „Meeting“ oder „Memo“. Wählen Sie „Ohne“, um eine Bezeichnung von einer Aufnahme zu entfernen. Gehen Sie wie folgt vor, um eine Aufnahme abzuspielen: 1 Wählen Sie aus dem Menü „Extras“ die Option „Sprachmemos“ und drücken Sie dann die Taste „Menu“. 2 Wählen Sie „Aufnahmen“ und wählen Sie dann eine Aufnahme. 3 Wählen Sie „Wiedergabe“ und drücken Sie dann die Mitteltaste. Gehen Sie wie folgt vor, um eine Aufnahme zu löschen: 1 Wählen Sie aus dem Menü „Extras“ die Option „Sprachmemos“ und drücken Sie dann die Taste „Menu“. 2 Wählen Sie „Aufnahmen“ und wählen Sie dann eine Aufnahme. 3 Wählen Sie „Löschen“ und drücken Sie dann die Mitteltaste. Gehen Sie wie folgt vor, um Sprachmemos auf Ihren Computer zu synchronisieren: Die Aufnahmen werden im WAV-Dateiformat im Ordner „Recordings“ auf dem iPod gesichert. Wenn Sie den iPod nano für die Verwendung als Festplatte aktivieren, können Sie Sprachmemos aus dem Ordner bewegen, um sie auf Ihren Computer zu übertragen. Wenn der iPod nano für die automatische Synchronisierung von Musiktiteln eingestellt ist (vgl. „Automatisches Synchronisieren von Musik“ auf Seite 29), werden die Sprachmemos auf dem iPod nano automatisch mit einer Wiedergabeliste mit der Bezeichnung „Sprachmemos“ in iTunes synchronisiert (und vom iPod nano entfernt), wenn Sie den iPod nano anschließen. Die Wiedergabeliste „Sprachmemos“ wird unter „Wiedergabelisten“ links im iTunes-Fenster angezeigt.90 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör Spielen von iPod-Spielen Der iPod nano wird mit drei Spielen geliefert: Klondike, Maze und Vortex. Gehen Sie wie folgt vor, um ein Spiel zu spielen: m Wählen Sie „Extras“ > „Spiele“ und dann das gewünschte Spiel. Wenn Sie ein für ältere iPod nano-Versionen entwickeltes Spiel spielen, erhalten Sie zuerst Informationen zu den Funktionen der iPod nano-Bedienelemente im ausgewählten Spiel. Im iTunes Store (nur in bestimmten Ländern) können Sie weitere Spiele für den iPod nano kaufen. Nach dem Kauf von Spielen in iTunes fügen Sie diese durch eine automatische Synchronisierung oder manuell zum iPod nano hinzu. Viele Spiele können im Hoch- und im Querformat gespielt werden. Gehen Sie wie folgt vor, um ein Spiel zu kaufen: 1 Wählen Sie in iTunes „iTunes Store“ unter „Store“ links im iTunes-Fenster aus. 2 Wählen Sie „iPod Spiele“ im iTunes Store aus. 3 Wählen Sie das gewünschte Spiel aus und klicken Sie dann auf „Spiel kaufen“. Gehen Sie wie folgt vor, um Spiele automatisch mit dem iPod nano zu synchronisieren: 1 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel „Spiele“. 2 Wählen Sie „Spiele synchronisieren“. 3 Klicken Sie auf „Alle Spiele“ oder „Ausgewählte Spiele“. Wählen Sie bei Auswahl von „Ausgewählte Spiele“ auch die Spiele aus, die synchronisiert werden sollen. 4 Klicken Sie auf „Anwenden“.Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 91 Verwenden zusätzlicher Einstellungen Auf Ihrem iPod nano können Sie Datum und Uhrzeit, Uhren für verschiedene Zeitzonen sowie Funktionen für den Wecker und den Ruhezustand einstellen. Sie können den iPod nano als Stoppuhr verwenden und damit Spiele spielen und Sie können die Bildschirmanzeige des iPod nano sperren. Einstellen und Anzeigen von Datum und Uhrzeit Datum und Uhrzeit werden automatisch eingestellt, sobald Sie den iPod nano an Ihren Computer anschließen. Sie können diese Einstellungen aber auch manuell ändern. Gehen Sie wie folgt vor, um die Optionen für Datum und Uhrzeit einzustellen: 1 Wählen Sie „Einstellungen“ > „Datum & Uhrzeit“. 2 Wählen Sie eine oder mehrere der folgenden Optionen: Hinzufügen von Uhren für andere Zeitzonen Gehen Sie wie folgt vor, um Uhren für andere Zeitzonen hinzuzufügen: 1 Wählen Sie „Extras“ > „Weltuhr“. 2 Drücken Sie im Bildschirm „Weltuhr“ die Mitteltaste und wählen Sie „Hinzufügen“. 3 Wählen Sie ein Land und dann eine Stadt. Die Uhren, die Sie hinzufügen, werden in einer Liste angezeigt. Die zuletzt hinzugefügte Uhr erscheint an letzter Stelle. Gehen Sie wie folgt vor, um eine Uhr zu entfernen: 1 Wählen Sie „Extras“ > „Weltuhr“. 2 Wählen Sie die gewünschte Uhr aus. 3 Drücken Sie die Mitteltaste. 4 Wählen Sie „Löschen“. Funktion Aktion Festlegen des Datums Wählen Sie „Datum“. Verwenden Sie das Click Wheel, um den ausgewählten Wert zu ändern. Drücken Sie die Taste „Auswählen“, um zum nächsten Wert zu wechseln. Festlegen der Uhrzeit Wählen Sie „Uhrzeit“. Verwenden Sie das Click Wheel, um den ausgewählten Wert zu ändern. Drücken Sie die Taste „Auswählen“, um zum nächsten Wert zu wechseln. Bestimmen der Zeitzone Wählen Sie „Zeitzone“ und wählen Sie mit dem Click Wheel eine Stadt in einer anderen Zeitzone aus. Anzeigen der Uhrzeit im 24-Stunden-Format Wählen Sie „24-Stunden-Uhr“ und drücken Sie die Mitteltaste, um das 24-Stunden-Format zu aktivieren oder zu deaktivieren. Anzeigen der Uhrzeit in der Titelleiste Wählen Sie „Uhr im Titel“ und drücken Sie die Mitteltaste, die Option zu aktivieren oder zu deaktivieren. 92 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör Einstellen einer Weckzeit Sie können für jede Uhr auf dem iPod nano eine Weckzeit einstellen. Gehen Sie wie folgt vor, um den iPod nano als Wecker zu verwenden: 1 Wählen Sie „Extras“ > „Wecker“. 2 Wählen Sie „Wecker stellen“ und legen Sie eine oder mehrere der folgenden Optionen fest: Wenn Sie Kalenderereignisse mit Signaltönen mit dem iPod nano synchronisieren, werden die Ereignisse im Menü „Wecker“ angezeigt. Gehen Sie wie folgt vor, um ein Wecksignal zu löschen: 1 Wählen Sie „Extras“ > „Wecker“. 2 Wählen Sie das Wecksignal aus und wählen Sie dann „Löschen“. Einstellen des Timers für den Ruhezustand Sie können den iPod nano so einstellen, dass er nach dem Abspielen von Musik oder anderen Inhalten nach einer gewissen Zeitspanne automatisch ausgeschaltet wird. Gehen Sie wie folgt vor, um den Timer für den Ruhezustand einzustellen: 1 Wählen Sie „Extras“ > „Wecker“. 2 Wählen Sie „Ruhezustand“ und wählen Sie aus, wie lange der iPod nano Musik abspielen soll. Funktion Aktion Aktivieren der Weckfunktion Wählen Sie „Wecker“ und setzen Sie den Regler auf „Ein“. Festlegen des Datums Wählen Sie „Datum“. Verwenden Sie das Click Wheel, um den ausgewählten Wert zu ändern. Drücken Sie die Taste „Auswählen“, um zum nächsten Wert zu wechseln. Festlegen der Uhrzeit Wählen Sie „Uhrzeit“. Verwenden Sie das Click Wheel, um den ausgewählten Wert zu ändern. Drücken Sie die Taste „Auswählen“, um zum nächsten Wert zu wechseln. Festlegen einer Wiederholoption Wählen Sie „Wiederholen“ und wählen Sie eine Option (z. B. „An Werktagen“). Auswählen eines Signaltons Wählen Sie „Warnhinweise“ oder eine Wiedergabeliste aus. Wenn Sie „Warnhinweise“ wählen, wählen Sie anschließend „Signalton“, damit das Wecksignal über den internen Lautsprecher ausgegeben wird. Wenn Sie eine Wiedergabeliste wählen, verbinden Sie den iPod nano mit Lautsprechern, Ohr- oder Kopfhörern, damit Sie das Wecksignal hören können. Benennen des Wecksignals Wählen Sie „Bezeichnung“ und wählen Sie eine Option (z. B. „Aufstehen“).Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 93 Verwenden der Stoppuhr Sie können die Stoppuhr beim Sport verwenden, um Ihre Trainingszeiten zu protokollieren oder um Teilabschnitte zu messen, wenn Sie Strecken laufen. Während Sie die Stoppuhr verwenden, können Sie Musik hören. Gehen Sie wie folgt vor, um die Stoppuhr zu verwenden: 1 Wählen Sie „Extras“ > „Stoppuhr“. 2 Drücken Sie die Taste „Start/Pause“ (’), um die Stoppuhr zu starten. 3 Drücken Sie die Mitteltaste, um Streckenzeiten festzuhalten. Die zwei aktuellsten Streckenzeiten werden über der Gesamtzeit angezeigt. Alle Streckenzeiten werden im Protokoll aufgezeichnet. 4 Drücken Sie die Taste „Start/Pause“ (’), um die Stoppuhr anzuhalten. Drücken Sie nochmals die Taste „Start/Pause“ (’), um die Stoppuhr wieder zu starten. Drücken Sie die Taste „Menu“ und wählen Sie dann „Neue Stoppuhr“, um die Zeiterfassung mit der Stoppuhr erneut zu starten. Gehen Sie wie folgt vor, um die Übersicht einer mit der Stoppuhr vorgenommenen Zeitmessung anzusehen oder zu löschen: 1 Wählen Sie „Extras“ > „Stoppuhr“. Die aktuelle Übersicht und eine Liste gesicherter Zeitmessungen wird angezeigt. 2 Wählen Sie eine Übersicht aus, um die Informationen der Zeitmessung anzuzeigen. Der iPod nano speichert die Zeitmessungen mit Datum, Uhrzeit und Rundenstatistik. Sie sehen Startdatum und -uhrzeit der Zeitmessung, die kürzeste, längste und durchschnittliche Rundenzeit und die letzten Rundenzeiten. 3 Drücken Sie die Mitteltaste und wählen Sie „Übersicht löschen“, um die gewählte Übersicht zu löschen. Wählen Sie alternativ „Alle Übersichten löschen“, um alle aktuellen Übersichten zu löschen.94 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör Sperren des iPod nano-Bildschirms Sie können eine Zahlenkombination festlegen, die verhindert, dass Ihr iPod nano von Unbefugten verwendet wird. Wenn Sie den iPod nano sperren, während er nicht an einen Computer angeschlossen ist, müssen Sie eine Zahlenkombination zum Deaktivieren der Sperre eingeben, um ihn wieder verwenden zu können. Diese Kombination ist nicht mit der Taste „Hold“ identisch, die einfach dazu dient, ein versehentliches Drücken der Tasten des iPod nano zu verhindern. Die Zahlenkombination verhindert dagegen, dass Unbefugte den iPod nano verwenden. Gehen Sie wie folgt vor, um eine Zahlenkombination für Ihren iPod nano inzustellen: 1 Wählen Sie „Extras“ > „Anzeigensperre“. 2 Geben Sie im Bildschirm „Neuer Code“ eine Zahlenkombination ein:  Wählen Sie mit dem Click Wheel die erste Zahl für Ihre Zahlenkombination aus. Drücken Sie zur Bestätigung die Mitteltaste und wählen Sie dann die nächste Zahl aus.  Wiederholen Sie diesen Vorgang, um die anderen Ziffern der Zahlenkombination anzugeben. Drücken Sie die Taste „Vor/Schneller Vorlauf“ (‘), um zur nächsten Ziffer zu gelangen, oder die Taste „Zurück/Schneller Rücklauf“ (]), um zur vorherigen Ziffer zu wechseln. Drücken Sie die Mitteltaste nach Eingabe der letzten Zahl. 3 Geben Sie im Bildschirm „Code bestätigen“ die Zahlenkombination ein oder drücken Sie die Taste „Menu“, um die Sperre der Bildschirmanzeige nicht zu aktivieren. Kehren Sie anschließend zum Bildschirm „Anzeigensperre“ zurück. Hier können Sie den Bildschirm sperren oder die Zahlenkombination zurücksetzen. Drücken Sie die Taste „Menu“, um zum vorherigen Bildschirm zurückzukehren, ohne die Sperre zu aktivieren.Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 95 Gehen Sie wie folgt vor, um den Bildschirm des iPod nano zu sperren: m Wählen Sie „Extras“ > „Anzeigensperre“ > „Sperren“. Wenn Sie soeben die Zahlenkombination eingegeben haben, ist „Sperren“ bereits ausgewählt. Drücken Sie einfach die Mitteltaste, um den iPod zu sperren. Wenn die Bildschirmanzeige gesperrt ist, wird das Symbol eines Schlosses angezeigt. Es empfiehlt sich, die Menüoption „Anzeigensperre“ zum Hauptmenü hinzuzufügen, damit Sie den Bildschirm Ihres iPod nano schneller sperren können. Beachten Sie hierzu den Abschnitt „Hinzufügen oder Löschen von Menüoptionen im Hauptmenü“ auf Seite 11. Wird das Schlosssymbol angezeigt, haben Sie zwei Möglichkeiten, die Sperre der iPod nano-Bildschirmanzeige aufzuheben:  Drücken Sie die Mitteltaste, um die Zahlenkombination auf dem iPod nano einzugeben. Wählen Sie mit dem Click Wheel die Zahlen aus und drücken Sie dann die Mitteltaste, um sie zu bestätigen. Wenn Sie die falsche Kombination eingegeben haben, bleibt der Bildschirm gesperrt. Versuchen Sie es erneut.  Schließen Sie Ihren iPod nano an den Computer an, den Sie hauptsächlich damit benutzen, und der Bildschirm des iPod nano wird automatisch wieder freigegeben. Wenn Sie diese Vorgehensweisen ausprobieren, aber der Bildschirm des iPod nano dennoch weiterhin gesperrt bleibt, besteht die Möglichkeit, den Originalzustand des iPod nano wiederherzustellen. Beachten Sie hierzu den Abschnitt „Aktualisieren und Wiederherstellen der iPod-Software“ auf Seite 110. Gehen Sie wie folgt vor, um eine bereits festgelegten Zahlenkombination zu ändern: 1 Wählen Sie „Extras“ > „Anzeigensperre“ > „Kombination zurücksetzen“. 2 Geben Sie im Bildschirm „Code eingeben“ die aktuelle Zahlenkombination ein. 3 Geben Sie im Bildschirm „Neuer Code“ eine neue Zahlenkombination ein und bestätigen Sie diese. Wenn Sie sich nicht an die aktuelle Zahlenkombination erinnern können, haben Sie nur die Möglichkeit, die Software des iPod nano wiederherzustellen, um die Kombination zu löschen und eine neue einzugeben. Beachten Sie hierzu den Abschnitt „Aktualisieren und Wiederherstellen der iPod-Software“ auf Seite 110.96 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör Synchronisieren von Kontakten, Kalendern und Aufgabenlisten Der iPod nano kann Kontaktinformationen, Kalenderereignisse und Aufgabenlisten sichern, sodass Sie diese jederzeit abrufen können. Mithilfe von iTunes können Sie die Kontakt- und Kalenderinformationen auf dem iPod nano mit dem Adressbuch und iCal synchronisieren. Wenn Sie mit Windows XP arbeiten und das Windows-Adressbuch oder Microsoft Outlook 2003 (oder neuer) zum Speichern Ihrer Kontaktdaten verwenden, können Sie mit iTunes die Kontaktinformationen auf dem iPod nano synchronisieren. Falls Sie die Kalenderfunktion von Microsoft Outlook 2003 (oder neuer) verwenden, können Sie auch Kalenderinformationen synchronisieren. Gehen Sie wie folgt vor, um Kontakte oder Kalenderinformationen mit Mac OS X zu synchronisieren: 1 Schließen Sie den iPod nano an Ihren Computer an. 2 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel „Kontakte“. 3 Führen Sie einen der folgenden Schritte aus:  Wenn Sie Kontakte synchronisieren möchten, wählen Sie „Adressbuchkontakte synchronisieren“ im Bereich „Kontakte“ und anschließend eine Option aus:  Zum automatischen Synchronisieren aller Kontakte wählen Sie „Alle Kontakte“.  Zum automatischen Synchronisieren ausgewählter Kontaktgruppen wählen Sie „Ausgewählte Gruppen“ und wählen die zu synchronisierenden Gruppen aus.  Zum Kopieren der Fotos von Kontakten (falls verfügbar) auf den iPod nano wählen Sie „Fotos der Kontakte einbeziehen“. Nach Klicken auf „Anwenden“ aktualisiert iTunes den iPod nano mit den Kontaktinformationen des von Ihnen angegebenen Adressbuchs.  Wenn Sie Kalender synchronisieren möchten, wählen Sie „iCal-Kalender synchronisieren“ im Bereich „Kalender“ und anschließend eine Option aus:  Zum automatischen Synchronisieren aller Kalender wählen Sie „Alle Kalender“.  Zum automatischen Synchronisieren ausgewählter Kalender wählen Sie „Ausgewählte Kalender“ und wählen die zu synchronisierenden Kalender aus. Wenn Sie auf „Anwenden“ klicken, aktualisiert iTunes den iPod nano mit den ausgewählten Kalenderinformationen. Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 97 Gehen Sie wie folgt vor, um Kontakt- und Kalenderinformationen zu synchronisieren (mit dem Windows-Adressbuch oder Microsoft Outlook für Windows): 1 Schließen Sie den iPod nano an Ihren Computer an. 2 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel „Kontakte“. 3 Führen Sie einen der folgenden Schritte aus:  Zum Synchronisieren von Kontaktinformationen wählen Sie „Kontakte synchronisieren“ im Bereich „Kontakte“ und anschließend „Windows-Adressbuch“ oder „Microsoft Outlook“ aus dem Einblendmenü aus. Wählen Sie dann aus, welche Kontaktinformationen Sie synchronisieren möchten.  Zum Synchronisieren von Kalenderinformationen von Microsoft Outlook wählen Sie „Kalender synchronisieren von Microsoft Outlook“ im Bereich „Kalender“ aus. 4 Klicken Sie auf „Anwenden“. Sie können Kontakt- und Kalenderinformationen auch manuell zum iPod nano hinzufü- gen. Hierfür muss der iPod nano als externes Volume aktiviert sein (vgl. „Verwenden des iPod nano als externes Volume“ auf Seite 99). Gehen Sie wie folgt vor, um Kontaktinformationen manuell hinzuzufügen: 1 Schließen Sie den iPod nano an Ihren Computer an und öffnen Sie das von Ihnen verwendete Programm für E-Mail oder Kontaktverwaltung. Sie können Kontaktinformationen mit Programmen wie Palm Desktop, Microsoft Outlook, Microsoft Entourage, Eudora u. a. hinzufügen. 2 Bewegen Sie Kontakte aus dem Adressbuch des von Ihnen verwendeten Programms in den Ordner „Contacts“ auf dem iPod nano. In einigen Fällen müssen Sie die Kontakte exportieren und dann die exportierte Datei bzw. die exportierten Dateien in den Ordner „Contacts“ bewegen. Weitere Informationen hierzu finden Sie in der Dokumentation zu Ihrem E-Mail- oder Kontaktverwaltungsprogramm. Gehen Sie wie folgt vor, um Termine und andere Kalenderereignisse manuell hinzuzufügen: 1 Exportieren Sie Kalenderereignisse aus jedem beliebigen Kalenderprogramm, das mit dem standardmäßigen iCal-Format (Dateinamen mit der Endung .ics) oder vCal-Format (Dateinamen mit der Endung .vcs) arbeitet. 2 Bewegen Sie die Dateien in den Ordner „Calendars“ auf dem iPod nano. Wenn Sie Aufgabenlisten manuell zum iPod nano hinzufügen möchten, sichern Sie sie in einer Kalenderdatei mit der Erweiterung „.ics“ oder „.vcs“. Gehen Sie wie folgt vor, um Kontaktinformationen auf dem iPod nano anzuzeigen: m Wählen Sie „Extras“ > „Kontakte“.98 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör Gehen Sie wie folgt vor, um Kontakte nach Vor- oder Nachnamen zu sortieren: m Wählen Sie „Einstellungen“ > „Allgemein“, wählen Sie die Option zum Sortieren von Kontakten und anschließend „Vornamen“ oder „Nachnamen“. Gehen Sie wie folgt vor, um Kalenderereignisse anzuzeigen: m Wählen Sie „Extras“ > „Kalender“ > „Alle Kalender“ und wählen Sie dann einen Kalender aus. Gehen Sie wie folgt vor, um Aufgabenlisten anzuzeigen: m Wählen Sie „Extras“ > „Kalender“ > „Aufgaben“. Mono Audio Die Funktion „Mono Audio“ kombiniert den Ton des linken und rechten Kanals zu einem monoauralen Signal, das über beide Kanäle wiedergegeben wird. Hierdurch können Benutzer mit einer Hörbehinderung auf einem Ohr beide Kanäle mit dem anderen Ohr hören. Gehen Sie wie folgt vor, um die Funktion „Mono Audio“ zu aktivieren bzw. zu deaktivieren: m Wählen Sie „Einstellungen“ > „Wiedergabe“> „Mono Audio“ und dann „Ein“ oder „Aus“. Verwenden der Sprachausgabe für Menüs als Bedienungshilfe Der iPod nano bietet optional eine Sprachausgabe für Menüs, mit deren Hilfe Benutzer mit Sehbehinderungen einfacher durch den Inhalt ihres iPod nano blättern können. iTunes generiert die Sprachausgabe mit Stimmen, die im Lieferumfang des Betriebssystems Ihres Computers enthalten sind oder die Sie ggf. von Drittanbietern erworben haben. Nicht alle Stimmen von Betriebssystemen oder Drittanbietern sind mit der Sprachausgabe für Menüs kompatibel und nicht alle Sprachen werden unterstützt. Damit Sie die Sprachausgabe für Menüs nutzen können, muss VoiceOver auf dem iPod nano aktiviert sein. Weitere Informationen hierzu finden Sie im Abschnitt „Einrichten von VoiceOver“ auf Seite 37. Sie müssen die Sprachausgabe für Menüs in iTunes aktivieren, damit Sie sie auf dem iPod nano aktivieren können.Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 99 Gehen Sie wie folgt vor, um die Sprachausgabe für Menüs in iTunes zu aktivieren: 1 Verbinden Sie den iPod nano mit Ihrem Computer. 2 Wählen Sie in iTunes den iPod nano in der Geräteliste aus und klicken Sie dann auf den Titel „Übersicht“. 3 Wählen Sie „Gesprochene Menüs aktivieren“. Unter Mac OS X ist diese Option standardmäßig ausgewählt, wenn VoiceOver in der Systemeinstellung „Bedienungshilfen“ aktiviert ist. 4 Klicken Sie auf „Anwenden“. Nachdem der iPod nano mit iTunes synchronisiert wurde, wird die Sprachausgabe für Menüs auf Ihrem iPod nano aktiviert. Die Synchronisierung des iPod nano dauert länger, wenn die Sprachausgabe aktiviert ist. Gehen Sie wie folgt vor, um die Sprachausgabe für Menüs auf dem iPod nano zu deaktivieren: m Wählen Sie „Einstellungen“ > „Allgemein“ > „Gesprochene Menüs“ und wählen Sie dann „Aus“. Möchten Sie die Sprachausgabe für Menüs wieder aktivieren, wählen Sie „Einstellungen“ > „Allgemein“ und setzen Sie dann die Option für die Sprachausgabe auf „Ein“. Ist VoiceOver aktiviert, wird es durch die Deaktivierung der Sprachausgabe für Menüs nicht deaktiviert. Hinweis: Die Option für die Sprachausgabe für Menüs wird im Menü „Einstellungen“ des iPod nano nur angezeigt, wenn die entsprechende Option in iTunes aktiviert wurde. Verwenden des iPod nano als externes Volume Der iPod nano kann auch als externes Volume zum Ablegen von Datendateien verwendet werden. Musiktitel, die Sie mit iTunes hinzufügen, werden nicht im Mac-Finder oder Windows Explorer angezeigt. Wenn Sie Musikdateien im Mac-Finder oder Windows Explorer auf den iPod nano kopieren, können Sie die Musiktitel auf dem iPod nano nicht abspielen. Wichtig: Damit Fotos und aufgenommene Videos vom iPod nano auf Ihren Computer importiert werden können, muss der iPod nano für die Verwendung als externe Festplatte aktiviert sein.100 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör Gehen Sie wie folgt vor, um den iPod nano als externes Volume zu aktivieren: 1 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel „Übersicht“. 2 Wählen Sie „Verwendung als Volume aktivieren“ im Abschnitt „Optionen“ aus. 3 Klicken Sie auf „Anwenden“. Wenn Sie den iPod nano als externes Volume verwenden, wird das iPod nano-Volumesymbol auf dem Schreibtisch des Mac angezeigt. Bei einem Windows-PC wird er unter dem nächsten verfügbaren Laufwerksbuchstaben im Windows Explorer angezeigt. Wenn Sie Dateien kopieren wollen, bewegen Sie diese auf den oder vom iPod nano. Sie können auch auf „Übersicht“ und dann auf „Musik und Videos manuell verwalten“ im Abschnitt „Optionen“ klicken, um den iPod nano als externes Volume zu verwenden. Wenn Sie den iPod nano vornehmlich als externes Volume verwenden, empfiehlt es sich festzulegen, dass iTunes nicht automatisch geöffnet wird, wenn Sie den iPod nano an Ihren Computer anschließen. Gehen Sie wie folgt vor, um zu verhindern, dass iTunes beim Anschließen des iPod nano an Ihren Computer automatisch geöffnet wird: 1 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel „Übersicht“. 2 Deaktivieren Sie die Option „iTunes öffnen, wenn dieser iPod angeschlossen wird“ im Abschnitt „Optionen“. 3 Klicken Sie auf „Anwenden“. Sichern und Lesen von Textnotizen Sie können Textnotizen auf dem iPod sichern und lesen, sofern der iPod nano für die Nutzung als externes Volume aktiviert ist (vgl. „Verwenden des iPod nano als externes Volume“ auf Seite 99). 1 Sichern Sie ein Dokument in einem beliebigen Textverarbeitungsprogramm als Textdatei (.txt). 2 Bewegen Sie die Datei in den Ordner „Notes“ auf dem iPod nano. Gehen Sie wie folgt vor, um Notizen anzuzeigen: m Wählen Sie „Extras“ > „Notizen“.Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör 101 iPod nano-Zubehör Im Lieferumfang des iPod nano sind bereits verschiedene Zubehörprodukte enthalten. Zahlreiches weiteres Zubehör kann separat erworben werden. Wenn Sie weiteres Zubehör zum iPod nano kaufen möchten, öffnen Sie die Website www.apple.com/de/ipodstore. Zu den verfügbaren Zubehöroptionen gehören:  iPod nano Armband  Apple Earphones mit Fernbedienung und Mikrofon  Apple In-Ear Headphones mit Fernbedienung und Mikrofon  Apple USB Power Adapter (Netzteil)  Apple Component AV-Kabel  Apple Composite AV-Kabel  Apple Universal Dock  Nike + iPod Sport Kit  iPod-Socken102 Kapitel 8 Weitere Einstellungen, zusätzliche Funktionen und Zubehör Gehen Sie wie folgt vor, um die mit Ihrem iPod nano gelieferten Ohrhörer zu verwenden: m Schließen Sie Ihre Ohrhörer an den Kopfhöreranschluss an. Setzen Sie dann die Ohrhörer wie abgebildet in Ihre Ohren. ACHTUNG: Das Verwenden von Ohrhörern oder Kopfhörern bei hoher Lautstärke kann eine dauerhafte Schädigung des Gehörs zur Folge haben. Sie gewöhnen sich mit der Zeit zwar an höhere Lautstärken, sodass diese für Sie normal erscheinen mögen, Ihre Hörfähigkeit kann jedoch beeinträchtigt werden. Falls Sie in Ihren Ohren ein Klingeln wahrnehmen oder Gesprochenes gedämpft hören, sollten Sie nicht weiter Musik hören und ggf. einen Ohrenarzt aufsuchen. Je höher Sie die Lautstärke einstellen, desto schneller kann Ihr Gehör geschädigt werden. Experten empfehlen, das Gehör wie folgt zu schützen:  Benutzen Sie Ohrhörer und Kopfhörer bei hohen Lautstärken nur für eine begrenzte Dauer.  Vermeiden Sie es, die Lautstärke hochzustellen, um Umgebungsgeräusche zu übertönen.  Reduzieren Sie die Lautstärke, wenn Sie nicht hören können, was Personen in Ihrer Nähe sprechen. Informationen zum Einstellen einer maximalen Lautstärke auf dem iPod finden Sie im Abschnitt „Einstellen der Obergrenze für die Lautstärke“ auf Seite 53. Das Kabel der Ohrhörer lässt sich verstellen.9 103 9 Tipps und Fehlerbeseitigung Die meisten Probleme mit dem iPod nano können Sie anhand der Informationen in diesem Kapitel im Regelfall schnell selbst lösen. Allgemeine Vorschläge Die meisten Probleme mit dem iPod nano lassen sich durch Zurücksetzen des Geräts beheben. Vergewissern Sie sich zuerst, dass der iPod nano aufgeladen ist. Gehen Sie wie folgt vor, um den iPod nano zurückzusetzen: 1 Schieben Sie den Schalter „Hold“ hin und her (schieben Sie ihn auf „Hold“ und dann wieder zurück). 2 Drücken Sie die Taste „Menu“ und die Mitteltaste und halten Sie diese mindestens 6 Sekunden lang gedrückt, bis das Apple-Logo angezeigt wird. Schritte zur Selbsthilfe Sollten Sie ein Problem mit Ihrem iPod nano haben, beachten Sie bitte die folgenden fünf einfachen Schritte zur Selbsthilfe. Führen Sie diese Schritte nacheinander aus, bis Ihr Problem gelöst ist. Sollten diese Maßnahmen nicht den gewünschte Erfolg bringen, finden Sie im Folgenden Lösungsvorschläge für spezifische Probleme.  Zurücksetzen des iPod nano. Vgl. „Allgemeine Vorschläge“ weiter unten.  Noch einmal versuchen und einen anderen USB-Anschluss verwenden, wenn Sie den iPod nano nicht in iTunes sehen.  Neustarten Ihres Computers und sicherstellen, dass Sie die neusten Softwareaktualisierungen installiert haben.  Neuinstallieren der iTunes-Software. Laden Sie hierzu die neuste Version aus dem Internet.  Wiederherstellen des iPod nano. Beachten Sie hierzu den Abschnitt „Aktualisieren und Wiederherstellen der iPod-Software“ auf Seite 110.104 Kapitel 9 Tipps und Fehlerbeseitigung Ihr iPod nano lässt sich nicht einschalten bzw. reagiert nicht  Stellen Sie sicher, dass der Schalter „Hold“ nicht auf „Hold“ gesetzt ist.  Möglicherweise muss die Batterie des iPod nano aufgeladen werden. Verbinden Sie den iPod nano mit Ihrem Computer oder einem Apple USB Power Adapter (Netzteil) und laden Sie die Batterie. Überprüfen Sie, ob auf dem Bildschirm des iPod nano das Blitzsymbol zu sehen ist, das anzeigt, dass die iPod nano-Batterie aufgeladen wird. Verbinden Sie den iPod nano zum Aufladen der Batterie mit einem USB 2.0-Anschluss Ihres Computers.  Führen Sie die oben genannten fünf Schritte nacheinander aus, bis Ihr iPod nano reagiert. Sie möchten die Verbindung zum iPod nano trennen, es wird jedoch die Meldung „Verbunden“ oder „Synchronisieren“ angezeigt.  Wenn der iPod nano gerade Musik synchronisiert, warten Sie, bis der Ladevorgang beendet ist.  Wählen Sie den iPod nano in der iTunes-Geräteliste aus und klicken Sie auf die Taste „Auswerfen“ (C).  Wenn der iPod nano in der Geräteliste in iTunes nicht mehr angezeigt wird, auf dem Bildschirm des iPod nano aber immer noch die Meldung „Verbunden“ oder „Synchronisieren“ zu sehen ist, können Sie den iPod nano vom Computer trennen.  Wenn der iPod nano weiterhin in der Geräteliste in iTunes angezeigt wird, bewegen Sie das iPod nano-Symbol vom Schreibtisch in den Papierkorb (wenn Sie mit einem Mac arbeiten). Wenn Sie einen Windows-PC verwenden, werfen Sie das Gerät über „Arbeitsplatz“ aus oder klicken Sie auf das Symbol zum sicheren Entfernen von Hardware in der Systemsteuerung und wählen Sie den iPod nano aus. Wird die Meldung „Verbunden“ oder „Synchronisieren“ weiterhin angezeigt, starten Sie Ihren Computer neu und werfen Sie dann den iPod nano nochmals aus. Der iPod nano spielt keine Musik ab  Stellen Sie sicher, dass der Schalter „Hold“ nicht auf „Hold“ gesetzt ist.  Vergewissern Sie sich, dass der Stecker der Ohrhörer fest im Anschluss sitzt.  Stellen Sie sicher, dass die Lautstärke korrekt eingestellt ist. Möglicherweise wurde eine Obergrenze für die maximale Lautstärke festgelegt. Sie können diese Einstellung ändern oder löschen, wenn Sie „Einstellungen“ > „Maximale Lautstärke“ wählen. Beachten Sie hierzu den Abschnitt „Einstellen der Obergrenze für die Lautstärke“ auf Seite 53.  Möglicherweise wurde die Wiedergabe des iPod nano angehalten. Drücken Sie die Taste „Start/Pause“ (’).  Vergewissern Sie sich, dass Sie iTunes 9.0 (oder neuer) verwenden (verfügbar unter www.apple.com/de/downloads). Musiktitel, die im iTunes Store mit früheren Versionen von iTunes erworben wurden, können auf dem iPod nano erst nach der Aktualisierung von iTunes wiedergegeben werden.Kapitel 9 Tipps und Fehlerbeseitigung 105  Wenn Sie das Apple Universal Dock verwenden, vergewissern Sie sich, dass der iPod nano fest im Dock eingesetzt ist und dass alle Kabel korrekt angeschlossen sind. Der interne Lautsprecher spielt weiterhin Audiomaterial ab, nachdem Sie Ohr- oder Kopfhörer mit dem iPod nano verbunden haben  Trennen und verbinden Sie dann die Ohr- oder Kopfhörer erneut. Der interne Lautsprecher gibt kein Audiomaterial aus, nachdem Sie die Ohr- oder Kopfhörer vom iPod nano getrennt haben  Die Wiedergabe von Audiomaterial wird automatisch angehalten, wenn Sie Ohr- oder Kopfhörer vom iPod nano trennen. Drücken Sie die Taste „Start/Pause“ (’), um die Wiedergabe fortzusetzen.  FM-Radiosendungen werden nicht über den internen Lautsprecher wiedergegeben, da der iPod nano das Ohr- oder Kopfhörerkabel als Radioantenne nutzt. Der iPod nano reagiert nicht, wenn Sie ihn an Ihren Computer anschließen  Stellen Sie sicher, dass die aktuelle iTunes-Software installiert ist, die auf der Seite www.apple.com/de/downloads verfügbar ist.  Schließen Sie den iPod an einen anderen USB-Anschluss Ihres Computers an. Hinweis: Es wird empfohlen, einen USB 2.0-Anschluss zu verwenden, um den iPod nano anzuschließen. USB 1.1 ist deutlich langsamer als USB 2.0. Wenn Ihr Windows-PC keinen USB 2.0-Anschluss besitzt, können Sie möglicherweise eine USB 2.0-Karte erwerben und installieren. Weitere Informationen hierzu finden Sie auf der Website: www.apple.com/de/ipod.  Ihr iPod nano muss unter Umständen zurückgesetzt werden (vgl. Seite 103).  Wenn Sie den iPod nano mit dem Apple Dock Connector-auf-USB 2.0-Kabel an einen Mobilcomputer anschließen, achten Sie darauf, zuerst den Computer mit einer Steckdose zu verbinden, bevor Sie den iPod nano anschließen.  Vergewissern Sie sich, dass Sie den erforderlichen Computer und die erforderliche Software verwenden. Beachten Sie hierzu den Abschnitt „Sie möchten die Systemvoraussetzungen nochmals überprüfen“ auf Seite 108.  Überprüfen Sie die Kabelverbindungen. Ziehen Sie das Kabel aus beiden Anschlüssen heraus. Stellen Sie sicher, dass sich in den USB-Anschlüssen keine Fremdkörper befinden. Schließen Sie dann das Kabel erneut an und achten Sie darauf, dass es fest in den Anschlüssen sitzt. Achten Sie darauf, dass die Kabelstecker korrekt ausgerichtet sind. Die Stecker können nur in einer bestimmten Ausrichtung eingesetzt werden.  Starten Sie Ihren Computer neu.  Können die Probleme mit keiner der genannten Maßnahmen behoben werden, müssen Sie die iPod nano-Software möglicherweise wiederherstellen. Beachten Sie hierzu den Abschnitt „Aktualisieren und Wiederherstellen der iPod-Software“ auf Seite 110.106 Kapitel 9 Tipps und Fehlerbeseitigung Auf dem iPod nano wird die Meldung „Bitte laden Sie die Batterie auf“ angezeigt Diese Meldung wird ggf. angezeigt, wenn der Ladestand der Batterie des iPod nano sehr niedrig ist und die Batterie geladen werden muss, bevor der iPod nano Daten mit dem Computer austauschen kann. Verbinden Sie den iPod nano zum Aufladen der Batterie mit einem USB 2.0-Anschluss Ihres Computers. Lassen Sie den iPod nano am Computer angeschlossen, bis die Meldung nicht mehr angezeigt wird und der iPod nano in iTunes oder dem Finder zu sehen ist. Abhängig davon, wie stark die Batterie entladen ist, müssen Sie den iPod nano bis zu 30 Minuten aufladen, bevor er wieder startet. Verwenden Sie den optionalen Apple USB Power Adapter, um den iPod nano schneller aufzuladen. Der iPod nano zeigt die Meldung an, dass iTunes zur Wiederherstellung verwendet werden soll  Vergewissern Sie sich, dass auf Ihrem Computer die aktuellste iTunes-Version installiert ist. (Sie können diese von der Seite www.apple.com/de/downloads laden.)  Schließen Sie den iPod nano an Ihren Computer an. Befolgen Sie nach dem Öffnen von iTunes die Aufforderungen auf dem Bildschirm, um den iPod nano wiederherzustellen.  Wenn der Fehler durch eine Wiederherstellung des iPod nano nicht beseitigt wird, muss der iPod nano u. U. repariert werden. Auf der iPod Service & Support-Website können Sie eine Reparatur in die Wege leiten: www.apple.com/de/support/ipod Musiktitel oder Daten werden über eine USB 2.0-Verbindung langsamer geladen  Wenn Sie über eine USB 2.0-Verbindung eine große Anzahl von Musiktiteln oder große Dateien laden und der Batterieladezustand des iPod nano niedrig ist, synchronisiert der iPod nano die Daten mit verringerter Geschwindigkeit, um Batteriestrom zu sparen.  Wenn Sie mit höheren Übertragungsgeschwindigkeiten arbeiten möchten, können Sie die Synchronisierung abbrechen und den iPod nano angeschlossen lassen, damit er wieder aufgeladen wird. Oder Sie schließen ihn an den optionalen iPod USB 2.0 Power Adapter an. Laden Sie den iPod nano ca. eine Stunde lang auf und setzen Sie dann die Synchronisierung von Musik oder Daten fort. Musiktitel oder andere Dateien können nicht zum iPod nano hinzugefügt werden Der Musiktitel liegt möglicherweise in einem Format vor, das der iPod nano nicht unterstützt. Die folgenden Audiodatei-Formate werden vom iPod nano unterstützt. Diese beinhalten Formate für Hörbücher und Podcasts:  AAC (M4A, M4B, M4P, bis zu 320 KBit/Sek.)  Apple Lossless (komprimiertes Format von hoher Qualität)  MP3 (bis zu 320 KBit/Sek.)  MP3 Variable Bit-Rate (VBR)Kapitel 9 Tipps und Fehlerbeseitigung 107  WAV  AA (audible.com-Formate 2, 3 und 4 für gesprochenen Text)  AIFF Ein im Apple Lossless-Format codierter Musiktitel weist CD-Audioqualität auf, belegt auf dem iPod aber nur halb so viel Speicherplatz wie ein im AIFF- oder WAV-Format codierter Musiktitel. Derselbe Titel im AAC- oder MP3-Format benötigt sogar noch weniger Speicherplatz. Wenn Sie mit iTunes Musik von einer CD importieren, wird diese standardmäßig in das AAC-Format konvertiert. Wenn Sie iTunes für Windows verwenden, können Sie nicht geschützte WMA-Dateien in das AAC- oder MP3-Format konvertieren. Dies ist besonders dann von Vorteil, wenn Sie eine Bibliothek mit Musik im WMA-Format haben. Der iPod nano unterstützt weder Audiodateien im Format WMA, MPEG Layer 1, MPEG Layer 2 noch das audible.com Format 1. Wenn sich in Ihrer iTunes-Mediathek ein Musiktitel befindet, der vom iPod nano nicht unterstützt wird, können Sie ihn in ein unterstütztes Format umwandeln. Informationen hierzu finden Sie in der iTunes-Hilfe. Auf dem iPod nano wird die Meldung „Stellen Sie die Verbindung mit iTunes her, um Genius zu aktivieren“ angezeigt Sie haben die Funktion „Genius“ noch nicht in iTunes aktiviert oder Ihren iPod nano seit der Aktivierung der Funktion in iTunes noch nicht synchronisiert. Beachten Sie hierzu den Abschnitt „Aktivieren der Funktion „Genius“ in iTunes“ auf Seite 25. Der iPod nano meldet „Genius ist für den ausgewählten Musiktitel nicht verfügbar“ Die Funktion „Genius“ ist aktiviert, mit dem gewählten Musiktitel kann aber keine Genius-Wiedergabeliste erstellt werden. Zur iTunes Store Genius-Datenbank werden ständig neue Musiktitel hinzugefügt. Versuchen Sie es daher zu einem späteren Zeitpunkt nochmals. Der iPod nano kann kein Funksignal empfangen Sie haben keine Ohr- oder Kopfhörer angeschlossen. Vergewissern Sie sich, dass der Stecker korrekt angeschlossen ist und bewegen Sie das Kabel der Ohr- oder Kopfhörer. Sie haben den iPod nano versehentlich für eine Sprache konfiguriert, die Sie nicht verstehen Sie können die Spracheinstellung zurücksetzen. 1 Drücken und halten Sie die Taste „Menu“ gedrückt, bis das Hauptmenü angezeigt wird. 2 Verwenden Sie das Click Wheel, um das Menüobjekt anzuzeigen, mit dem der Gerätename des iPod nano im Vorschaubereich eingeblendet wird, und wählen Sie dieses aus. Hierbei handelt es sich um das Menü „Einstellungen“. 3 Wählen Sie die letzte Menüoption (Einstellungen zurücksetzen).108 Kapitel 9 Tipps und Fehlerbeseitigung 4 Wählen Sie das erste Objekt (Zurücksetzen) und eine Sprache aus. Andere Einstellungen des iPod nano, wie z. B. das Wiederholen von Musiktiteln, werden ebenfalls zurückgesetzt. Ihr synchronisierter Inhalt wird weder gelöscht noch geändert. Wenn Sie die Menüoption „Einstellungen zurücksetzen“ nicht finden können, ist es möglich, den Originalzustand Ihres iPod nano wiederherzustellen und dann eine Sprache auszuwählen. Beachten Sie hierzu den Abschnitt „Aktualisieren und Wiederherstellen der iPod-Software“ auf Seite 110. Videos und Fotos können nicht auf Ihrem Fernsehgerät angezeigt werden  Verwenden Sie Kabel mit Cinch-Stecker, die speziell für den iPod nano angefertigt wurden, z. B. das Apple Component oder Apple Composite AV-Kabel, um den iPod nano an Ihr Fernsehgerät anzuschließen. Andere ähnliche Kabel mit CinchStecker funktionieren nicht.  Stellen Sie sicher, dass Ihr Fernsehgerät so eingestellt ist, dass die korrekte Eingabequelle für die Wiedergabe von Bildern verwendet wird. (Informationen hierzu finden Sie in der Dokumentation zu Ihrem Fernsehgerät.)  Vergewissern Sie sich, dass alle Kabel korrekt angeschlossen sind (vgl. „Ansehen von Videos auf einem an den iPod nano angeschlossenen Fernsehgerät“ auf Seite 59).  Vergewissern Sie sich, dass das gelbe Ende des Apple Composite AV-Kabel am Videoanschluss Ihres Fernsehgeräts angeschlossen ist.  Wenn Sie ein Video ansehen möchten, wählen Sie „Videos“ > „Einstellungen“, legen Sie für „TV-Ausgang“ die Option „Ein“ fest und versuchen Sie es dann erneut. Wenn Sie eine Diashow ansehen möchten, wählen Sie „Fotos“ > „Einstellungen“ (für Diashows), legen Sie für „TV-Ausgang“ die Option „Ein“ fest und versuchen Sie es dann erneut.  Sollte es weiterhin nicht funktionieren, wählen Sie „Videos“ > „Einstellungen“ (für Video) oder „Fotos“ > „Einstellungen“ (für Diashows) und setzen Sie die Option „TVSignal“ auf „PAL“ oder „NTSC“, je nachdem, welchen Standard Ihr Fernsehgerät unterstützt. Probieren Sie beide Einstellungen aus. Sie möchten die Systemvoraussetzungen nochmals überprüfen Für die Verwendung des iPod nano sind folgende Komponenten erforderlich:  Eine der folgenden Computerkonfigurationen:  Ein Mac mit einem USB 2.0-Anschluss  Ein Windows-PC mit einem USB 2.0-Anschluss oder einer installierten USB 2.0- Karte  Eines der folgenden Betriebssysteme:  Mac OS X 10.4.11 (oder neuer)  Windows Vista  Windows XP Home oder Professional mit Service Pack 3 (oder neuer)Kapitel 9 Tipps und Fehlerbeseitigung 109  iTunes 9 (oder neuer) (iTunes kann von der Website www.apple.com/de/downloads geladen werden) Wenn Ihr Windows-PC nicht mit einem USB 2.0-Anschluss ausgestattet ist, können Sie eine USB 2.0-Karte kaufen und installieren. Weitere Informationen über Kabel und kompatible USB-Karten finden Sie auf folgender Website: www.apple.com/de/ipod. Für einen Mac wird iPhoto 7.1.5 (oder neuer) empfohlen, um Fotos und Alben zum iPod nano hinzuzufügen. iPhoto 8.1 (oder neuer) ist erforderlich, um alle Fotofunktionen des iPod nano nutzen zu können. Diese Software ist optional. iPhoto ist möglicherweise bereits auf Ihrem Mac installiert. Überprüfen Sie dies durch Öffnen des Ordners „Programme“. Der iPod nano kann digitale Fotos aus Ordnern sowohl auf Mac- als auch Windows PCFestplatten synchronisieren. Sie wollen den iPod nano mit einem Mac-Computer und einem Windows-PC verwenden Wenn Sie den iPod nano bislang mit einem Mac verwenden und ihn nun mit einem Windows PC nutzen wollen, müssen Sie die iPod-Software wiederherstellen, damit Sie den iPod nano mit dem PC verwenden können (vgl. „Aktualisieren und Wiederherstellen der iPod-Software“ auf Seite 110). Durch das Wiederherstellen der iPod-Software werden alle Daten einschließlich aller Musiktitel von Ihrem iPod nano gelöscht. Es ist nicht möglich, den iPod nano mit einem Mac und dann mit einem Windows-PC zu verwenden, ohne dass alle Daten vom iPod nano gelöscht werden. Der Bildschirm Ihres iPod nano ist gesperrt und kann nicht wieder freigegeben werden Wenn Sie Ihren iPod nano an den Computer anschließen können, der für diesen iPod aktiviert wurde, wird die Sperre der Bildschirmanzeige des iPod nano normalerweise automatisch deaktiviert. Falls der Computer, der für den iPod nano aktiviert wurde, gerade nicht verfügbar ist, können Sie den iPod nano an einen anderen Computer anschließen und die iPod-Software mithilfe von iTunes wiederherstellen. Weitere Informationen finden Sie im nächsten Abschnitt. Wenn Sie die Zahlenkombination für die Sperre der Bildschirmanzeige ändern wollen und sich nicht an die aktuelle Kombination erinnern können, müssen Sie die iPodSoftware wiederherstellen und eine neue Zahlenkombination festlegen.110 Kapitel 9 Tipps und Fehlerbeseitigung Aktualisieren und Wiederherstellen der iPod-Software Mithilfe von iTunes können Sie die iPod-Software aktualisieren oder wiederherstellen. Es wird empfohlen, den iPod nano immer mit der neusten Software zu aktualisieren. Sie können die Software auch wiederherstellen und den iPod nano in den Originalzustand zurücksetzen.  Wenn Sie die Software aktualisieren, hat dies keine Auswirkungen auf Ihre Einstellungen und Musiktitel.  Wenn Sie die Software wiederherstellen, werden alle Daten auf dem iPod nano gelöscht, einschließlich Musiktitel, Videos, Dateien, Fotos, Kontakt- und Kalenderinformationen sowie alle weiteren vorhandenen Daten. Alle Einstellungen des iPod nano werden in den Originalzustand zurückgesetzt. Gehen Sie wie folgt vor, um den iPod nano zu aktualisieren oder wiederherzustellen: 1 Vergewissern Sie sich, dass eine Internetverbindung besteht und die aktuellste iTunesVersion installiert ist (Sie können diese von der Seite www.apple.com/de/downloads laden). 2 Schließen Sie den iPod nano an Ihren Computer an. 3 Wählen Sie in der iTunes-Geräteliste den iPod nano aus und klicken Sie auf den Titel „Übersicht“. Im Bereich „Version“ werden Sie darüber informiert, ob der iPod nano auf dem neusten Stand ist oder ob eine neuere Version der Software installiert werden muss. 4 Klicken Sie auf „Aktualisieren“, um die aktuellste Version der Software zu installieren. 5 Klicken Sie falls erforderlich auf „Wiederherstellen“, um die Originaleinstellungen des iPod nano wiederherzustellen (damit werden alle Daten vom iPod nano gelöscht). Befolgen Sie die Anweisungen auf dem Bildschirm, um den Wiederherstellungsprozess abzuschließen.10 111 10 Sicherheit und Pflege Lesen Sie vor der Verwendung des iPod nano die folgenden Informationen zu Sicherheit und Umgang mit dem Gerät, um Verletzungen zu vermeiden. Bewahren Sie diese Sicherheitsinformationen und das iPod nano-Benutzerhandbuch stets griffbereit auf. Ladbare Versionen des iPod nano-Benutzerhandbuchs und der aktuellen Sicherheitsinformationen finden Sie unter folgender Adresse: support.apple.com/manuals/ipod. Wichtige Sicherheitsinformationen Umgang mit dem iPod nano Lassen Sie den iPod nano nicht fallen, bauen Sie ihn nicht auseinander, öffnen, zerbrechen, verbiegen, verformen, durchbohren, zerkleinern, verbrennen oder bemalen Sie ihn nicht, erwärmen Sie ihn nicht in der Mikrowelle und führen Sie keine Fremdkörper in das Gerät ein. ± Lesen Sie die unten genannten Sicherheitsinformationen und Anweisungen zur Inbetriebnahme, bevor Sie den iPod verwenden, um Verletzungen zu vermeiden. ACHTUNG: Bei Nichtbeachtung dieser Sicherheitsinformationen kann es zu einem Brand, zu elektrischen Schlägen oder anderen Verletzungen oder zur Beschädigung von Systemkomponenten kommen.112 Kapitel 10 Sicherheit und Pflege Keine Verwendung bei Regen oder in der Nähe von Flüssigkeitsbehältern Schützen Sie den iPod nano vor Witterungseinflüssen wie Regen und verwenden Sie ihn nicht in der Nähe von Waschbecken oder anderen Behältern mit Flüssigkeit. Achten Sie darauf, dass keine Flüssigkeit in Ihren iPod nano gelangt. Sollte Flüssigkeit in den iPod nano gelangen, ziehen Sie alle Kabel ab, schalten Sie den iPod nano aus und schieben Sie den Schalter „Hold“ auf „Hold“, bevor Sie den iPod reinigen. Warten Sie, bis er vollständig getrocknet ist, bevor Sie ihn wieder einschalten. Versuchen Sie nicht, den iPod nano mit einer externen Wärmequelle wie einem Mikrowellengerät oder einem Haarföhn zu trocknen. Ein iPod nano, der durch den Kontakt mit Flüssigkeit beschädigt wurde, kann nicht gewartet werden. Reparieren des iPod nano Versuchen Sie niemals, den iPod nano selbst zu reparieren. Der iPod nano enthält keine vom Benutzer zu wartenden Komponenten. Wurde der iPod nano in Flüssigkeit getaucht, durchbohrt oder aus großer Höhe fallen gelassen, bringen Sie ihn vor der nächsten Verwendung zu einem Apple Autorisierten ServicePartner. Wenn Sie Informationen zur Wartung benötigen, wählen Sie in iTunes „Hilfe“ > „iPod-Hilfe“ oder besuchen Sie die Seite www.apple.com/de/support/ipod. Die wiederaufladbare Batterie des iPod nano sollte nur von einem Apple Autorisierten ServicePartner ersetzt werden. Weitere Informationen zu Batterien finden Sie auf dieser Website: www.apple.com/de/batteries. Aufladen des iPod nano Verwenden Sie zum Aufladen des iPod nano nur das mitgelieferte Apple Dock Connector-auf-USB-Kabel mit einem Apple USB Power Adapter (Netzteil) oder einen High-Power-USB-Anschluss eines anderen Geräts, der mit dem USB 2.0- Standard kompatibel ist. Ebenfalls verwendet werden kann ein anderes Apple-Produkt oder -Zubehörteil, das für den iPod konzipiert wurde, bzw. Zubehörprodukte von Drittanbietern, die mit dem Logo „Made for iPod“ gekennzeichnet sind. Lesen Sie vor der Verwendung anderer Produkte und Zubehörteile mit dem iPod nano alle Sicherheitshinweise. Apple übernimmt keine Verantwortung für die Verwendung von Zubehörprodukten von Drittanbietern oder deren Kompatibilität mit den geltenden Sicherheitsstandards. Wenn Sie den Apple USB Power Adapter (Netzteil, erhältlich unter www.apple.com/de/ ipodstore) zum Laden des iPod nano verwenden, vergewissern Sie sich, dass das Netzteil vollständig zusammengesetzt ist, bevor Sie es mit einer Steckdose verbinden. Stecken Sie den Apple USB Power Adapter dann so in die Steckdose ein, dass er fest sitzt. Fassen Sie den Apple USB Power Adapter nicht mit nassen Händen, um ihn ans Stromnetz anzuschließen oder die Verbindung zu trennen. Verwenden Sie zum Laden Ihres iPod nur ein Apple iPod-Netzteil und keine sonstigen Netzteile. Der Apple USB Power Adapter wird möglicherweise während des normalen Gebrauchs warm. Achten Sie stets auf eine ausreichende Luftzufuhr um den Apple USB Power Adapter und gehen Sie vorsichtig damit um.Kapitel 10 Sicherheit und Pflege 113 Trennen Sie den Apple USB Power Adapter in folgenden Fällen von Stromnetz und iPod:  Am Netzkabel oder Netzstecker sind Drähte zu sehen oder Kabel bzw. Stecker wurden beschädigt.  Das Netzteil war Regen, Flüssigkeit oder starker Feuchtigkeit ausgesetzt.  Das Gehäuse des Netzteils wurde beschädigt.  Sie sind der Meinung, dass das Netzteil gewartet oder repariert werden muss.  Sie möchten den Adapter reinigen. Vermeiden von Hörschäden Das Verwenden der Lautsprecher, Ohrhörer oder Kopfhörern mit hoher Lautstärke kann eine dauerhafte Schädigung des Gehörs zur Folge haben. Stellen Sie die Lautstärke nicht zu hoch ein. Sie gewöhnen sich mit der Zeit zwar an höhere Lautstärken, sodass diese für Sie normal erscheinen mögen, Ihre Hörfähigkeit kann jedoch beeinträchtigt werden. Falls Sie in Ihren Ohren ein Klingeln wahrnehmen oder Gesprochenes gedämpft hören, sollten Sie nicht weiter Musik hören und ggf. einen Ohrenarzt aufsuchen. Je höher Sie die Lautstärke einstellen, desto schneller kann Ihr Gehör geschädigt werden. Experten empfehlen, das Gehör wie folgt zu schützen:  Benutzen Sie Ohrhörer und Kopfhörer bei hohen Lautstärken nur für eine begrenzte Dauer.  Vermeiden Sie es, die Lautstärke hochzustellen, um Umgebungsgeräusche zu übertönen.  Reduzieren Sie die Lautstärke, wenn Sie nicht hören können, was Personen in Ihrer Nähe sprechen. Informationen zum Einstellungen einer maximalen Lautstärke auf dem iPod nano finden Sie unter „Einstellen der Obergrenze für die Lautstärke“ auf Seite 53. Sicherheit im Straßenverkehr Die Verwendung des iPod nano mit oder ohne Kopfhörer (auch nur für ein Ohr) beim Steuern eines Kraftfahrzeugs wird nicht empfohlen und ist in einigen Ländern verboten. Informieren Sie sich über die lokal geltenden Gesetze und Vorschriften zur Verwendung mobiler Geräte wie dem iPod nano im Straßenverkehr. Fahren Sie stets vorsichtig und konzentriert. Beenden Sie die Verwendung Ihres iPod nano, wenn Sie hierdurch beim Steuern eines Fahrzeugs oder bei anderen Tätigkeiten, die Ihre volle Aufmerksamkeit erfordern, abgelenkt oder gestört werden.114 Kapitel 10 Sicherheit und Pflege Anfälle, Ohnmacht und Augenreizungen Manche Menschen erleiden Ohnmachtsanfälle oder sonstigen Anfälle, wenn sie blinkendes Licht oder Lichtmuster wahrnehmen, die bei Spielen oder Videos auftreten. (Diese Symptome können unvermittelt auch bei Menschen auftreten, die bislang noch nie solche Anfälle hatten.) Wenn Sie gelegentlich unter Ohnmachtsanfällen oder sonstigen Anfällen leiden oder dies in Ihrer Familie häufiger auftritt, wenden Sie sich bitte an einen Arzt, bevor Sie mit dem iPod nano Spiele spielen (sofern diese Funktion verfügbar ist) oder Videos ansehen. Beenden Sie die Verwendung und wenden Sie sich an einen Arzt, wenn Sie Folgendes feststellen: Kopfschmerzen, Ohnmacht, Anfälle, Krämpfe, Augen- oder Muskelzuckungen, Wahrnehmungsstörungen, unkontrollierbare Bewegungen oder Orientierungslosigkeit. Das Risiko für Kopfschmerzen, Ohnmacht, Anfälle und Augenreizungen lässt sich verringern, indem Sie darauf achten, den iPod nano nicht zu lange zu verwenden, ausreichend Abstand zu den Augen einzuhalten, für eine gute Umgebungsbeleuchtung zu sorgen und regelmäßig Pausen einzulegen. Teile aus Glas Die äußere Bildschirmabdeckung des iPod nano besteht aus Glas. Dieses Glas kann brechen, wenn der iPod nano auf eine harte Oberfläche fallen gelassen oder starken Stößen ausgesetzt wird. Splittert oder bricht das Glas, berühren Sie es nicht und versuchen Sie nicht, das beschädigte Glas zu entfernen. Verwenden Sie den iPod nano erst wieder, nachdem die Glasabdeckung von einem Apple Autorisierten Service-Partner ausgetauscht wurde. Glasschäden, die aufgrund einer falschen oder unsachgemäßen Verwendung entstehen, sind nicht durch die Garantie abgedeckt. Sich wiederholende Bewegungen Wenn Sie sich wiederholende Aktivitäten ausführen, etwa beim Spielen mit dem iPod nano, treten möglicherweise gelegentlich Beschwerden in Händen, Armen, Schulter, Nachen oder anderen Körperteilen auf. Legen Sie regelmäßig Pausen ein und wenden Sie sich an einen Arzt, wenn Sie währen oder nach solchen Aktivitäten Beschwerden wahrnehmen. Training Lassen Sie sich vor dem Start eines Trainingsprogramms vollständig von Ihrem Arzt untersuchen. Machen Sie zu Beginn Aufwärm- oder Dehnübungen. Trainieren Sie vorsichtig und achten Sie auf die Signale Ihres Körpers. Verlangsamen Sie ggf. Ihr Tempo, wenn Sie beim Laufen Einstellungen des Geräts anpassen möchten. Beenden Sie das Training sofort, wenn Sie Schmerzen haben, sich schwach, benommen oder erschöpft fühlen oder außer Atem sind. Beim Trainieren tragen Sie alle Risiken, die mit körperlicher Betätigung einhergehen, u. a. dabei entstehende Verletzungen.Kapitel 10 Sicherheit und Pflege 115 Wichtige Informationen zur Handhabung Tragen des iPod nano Der iPod nano enthält empfindliche Komponenten, u. a. eine Festplatte (je nach Modell). Verbiegen oder zerbrechen Sie den iPod nano nicht und lassen Sie ihn nicht fallen. Wenn Sie ein Verkratzen des Gehäuses des iPod nano vermeiden möchten, empfiehlt es sich, eine der separat erhältlichen Taschen zu verwenden. Verwenden von Steckern und Anschlüssen Versuchen Sie niemals, einen Stecker mit Gewalt in einen Anschluss zu stecken. Überprüfen Sie, ob der Anschluss blockiert ist. Lässt sich der Stecker nicht problemlos anschließen, passt er vermutlich nicht in den Anschluss. Vergewissern Sie sich, dass Stecker und Anschluss zueinander passen und dass Sie den Stecker korrekt mit dem Anschluss ausgerichtet haben. Verwenden des iPod nano bei angemessenen Temperaturen Verwenden Sie den iPod nano nur in einem Temperaturbereich zwischen 0 ºC und 35 ºC. Bei niedrigen Temperaturen kann die Spieldauer des iPod nano vorübergehend verkürzt und die Aufladedauer der Batterie verlängert werden. Lagern Sie den iPod nano in einem Temperaturbereich zwischen -20 ºC und 45 ºC. Lassen Sie Ihren iPod nano nicht im Auto liegen, denn in parkenden Autos kann dieser Temperaturbereich leicht überschritten werden. Wenn Sie den iPod nano verwenden oder die Batterie aufladen, erwärmt sich der iPod nano. Das ist ein normaler Vorgang Die Außenseite des iPod nano fungiert als Wärmeableiter, der die Wärme aus dem Inneren des Gehäuses nach außen in die kühlere Luft ableitet. Reinigen des Gehäuses des iPod nano Ziehen Sie zum Reinigen des iPod nano alle Kabel ab, schalten Sie den iPod nano aus und schieben Sie den Schalter „Hold“ auf „Hold“. Verwenden Sie dann ein weiches, angefeuchtetes und fusselfreies Tuch. Achten Sie darauf, dass keine Feuchtigkeit in das Gehäuse eindringt. Verwenden Sie keine Fensterreiniger, Haushaltsreiniger, Sprays, Lösungsmittel, alkoholhaltige Reiniger, Ammoniaklösungen oder Scheuermittel für die Reinigung des iPod nano. Umweltgerechtes Entsorgen des iPod nano Informationen zur umweltgerechten Entsorgung des iPod nano sowie weitere wichtige Informationen zu FCC-Richtlinien und Prüfsiegeln finden Sie weiter hinten in diesem Handbuch im Abschnitt „Regulatory Compliance Information“ auf Seite 117. BITTE BEACHTEN: Bei Nichtbeachtung dieser Informationen zur Handhabung des iPod nano kann es zu Schäden am iPod oder anderen Gegenständen kommen.11 116 11 Weitere Informationen, Service und Support Weitere Informationen über die Verwendung des iPod nano finden Sie in der Online-Hilfe sowie im Internet. In der nachfolgenden Tabelle erfahren Sie, wo Sie zusätzliche Software und ServiceInformationen für den iPod erhalten. Näheres über Aktion Service und Support, Diskussionsforen, Online-Einführungen und Apple-Software zum Laden Besuchen Sie die folgende Seite: www.apple.com/de/support/ipodnano Verwenden von iTunes Öffnen Sie iTunes und wählen Sie „Hilfe“ > „iTunes-Hilfe“. Eine Online-Einführung zu iTunes (nur in bestimmten Regionen verfügbar) finden Sie unter: www.apple.com/de/support/itunes Verwenden von iPhoto (mit Mac OS X) Öffnen Sie iPhoto und wählen Sie „Hilfe“ > „iPhoto-Hilfe“. Verwenden von iCal (mit Mac OS X) Öffnen Sie iCal und wählen Sie „Hilfe“ > „iCal-Hilfe“. Die neusten Informationen zum iPod nano Besuchen Sie die folgende Seite: www.apple.com/de/ipodnano Registrieren des iPod nano Wenn Sie den iPod nano registrieren möchten, installieren Sie iTunes auf Ihrem Computer und verbinden Sie den iPod nano dann mit dem Computer. Auffinden der iPod nanoSeriennummer Sehen Sie auf der Rückseite des iPod nano nach oder wählen Sie „Einstellungen“ > „Über“ und drücken Sie dann die Mitteltaste. Wählen Sie in iTunes (während der iPod nano an Ihrem Computer angeschlossen ist) deniPod nano in der Liste der Geräte aus und klicken Sie auf „Einstellungen“. Garantieleistungen Befolgen Sie zuerst die Tipps in diesem Handbuch, in der OnlineHilfe und in den Online-Ressourcen. Besuchen Sie dann falls erforderlich folgende Seite: www.apple.com/de/support/ipodnano 117 Regulatory Compliance Information FCC Compliance Statement This device complies with part 15 of the FCC rules. Operation is subject to the following two conditions: (1) This device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. See instructions if interference to radio or TV reception is suspected. Radio and TV Interference This computer equipment generates, uses, and can radiate radio-frequency energy. If it is not installed and used properly—that is, in strict accordance with Apple’s instructions—it may cause interference with radio and TV reception. This equipment has been tested and found to comply with the limits for a Class B digital device in accordance with the specifications in Part 15 of FCC rules. These specifications are designed to provide reasonable protection against such interference in a residential installation. However, there is no guarantee that interference will not occur in a particular installation. You can determine whether your computer system is causing interference by turning it off. If the interference stops, it was probably caused by the computer or one of the peripheral devices. If your computer system does cause interference to radio or TV reception, try to correct the interference by using one or more of the following measures:  Turn the TV or radio antenna until the interference stops.  Move the computer to one side or the other of the TV or radio.  Move the computer farther away from the TV or radio.  Plug the computer in to an outlet that is on a different circuit from the TV or radio. (That is, make certain the computer and the TV or radio are on circuits controlled by different circuit breakers or fuses.) If necessary, consult an Apple Authorized Service Provider or Apple. See the service and support information that came with your Apple product. Or, consult an experienced radio/TV technician for additional suggestions. Important: Changes or modifications to this product not authorized by Apple Inc. could void the EMC compliance and negate your authority to operate the product. This product was tested for EMC compliance under conditions that included the use of Apple peripheral devices and Apple shielded cables and connectors between system components. It is important that you use Apple peripheral devices and shielded cables and connectors between system components to reduce the possibility of causing interference to radios, TV sets, and other electronic devices. You can obtain Apple peripheral devices and the proper shielded cables and connectors through an Apple Authorized Reseller. For non-Apple peripheral devices, contact the manufacturer or dealer for assistance. Responsible party (contact for FCC matters only): Apple Inc. Corporate Compliance 1 Infinite Loop, MS 26-A Cupertino, CA 95014 Industry Canada Statement This Class B device meets all requirements of the Canadian interference-causing equipment regulations. Cet appareil numérique de la classe B respecte toutes les exigences du Règlement sur le matériel brouilleur du Canada. VCCI Class B Statement Korea Class B Statement Russia (૶ ૺૺဧ ઠધබ118 Europäische Gemeinschaft Austausch der Batterie Die wiederaufladbare Batterie des iPod nano darf nur von einem Apple Autorisierten ServicePartner ersetzt werden. Näheres hierzu finden Sie auf folgender Website: www.apple.com/de/support/ipod/service/battery Informationen zur Entsorgung und zum Recycling Entsorgen Sie Ihren iPod gemäß den geltenden umweltrechtlichen Bestimmungen. Da dieses Produkt eine Batterie enthält, muss es separat vom Hausmüll entsorgt werden. Wenden Sie sich bitte an Apple oder Ihr Ordnungsamt und erkundigen Sie sich nach Möglichkeiten zum Recyceln. Informationen zum Recycling-Programm von Apple finden Sie im Internet unter: www.apple.com/de/environment/recycling Deutschland: Dieses Gerät enthält Batterien. Bitte nicht in den Hausmüll werfen. Entsorgen Sie dieses Gerät am Ende seines Lebenszyklus entsprechend den maßgeblichen gesetzlichen Regelungen. Nederlands: Gebruikte batterijen kunnen worden ingeleverd bij de chemokar of in een speciale batterijcontainer voor klein chemisch afval (kca) worden gedeponeerd. China: Taiwan: Europäische Union – Informationen zur Entsorgung Dieses Symbol weist darauf hin, dass dieses Produkt entsprechend den geltenden gesetzlichen Vorschriften und getrennt vom Hausmüll entsorgt werden muss. Geben Sie dieses Produkt zur Entsorgung bei einer offiziellen Sammelstelle ab. Bei einigen Sammelstellen können Produkte zur Entsorgung unentgeltlich abgegeben werden. Durch getrenntes Sammeln und Recycling werden die Rohstoff-Reserven geschont, und es ist sichergestellt, dass beim Recycling des Produkts alle Bestimmungen zum Schutz von Gesundheit und Umwelt eingehalten werden. Apple und der Umweltschutz Apple Inc. ist ständig darum bemüht, die Belastungen, die sich aus der Verwendung von Apple-Systemen und -Produkten für die Umwelt ergeben können, auf einem möglichst niedrigen Niveau zu halten. Weitere Informationen hierzu finden Sie unter: www.apple.com/de/environment © 2009 Apple Inc. Alle Rechte vorbehalten. Apple, das Apple-Logo, iCal, iLife, iPhoto, iPod, iPod nano, iPod Socks, iTunes, Mac, Macintosh und Mac OS sind Marken der Apple Inc., die in den USA und weiteren Ländern eingetragen sind. Finder, das FireWire-Logo und Shuffle sind Marken der Apple Inc. iTunes Store ist eine Dienstleistungsmarke der Apple Inc., die in den USA und weiteren Ländern eingetragen ist. NIKE ist eine Marke der NIKE, Inc. und ihrer Tochterunternehmen und wird in Lizenz verwendet. Namen anderer hier genannter Firmen und Produkte sind Marken ihrer jeweiligen Rechtsinhaber. Die Nennung von Produkten, die nicht von Apple sind, dient ausschließlich Informationszwecken und stellt keine Werbung dar. Apple übernimmt hinsichtlich der Auswahl, Leistung oder Verwendbarkeit dieser Produkte keine Gewähr. Alle Vereinbarungen, Verträge oder Garantieansprüche, so vorhanden, gelten direkt zwischen dem jeweiligen Hersteller und den jeweiligen Benutzern. Es wurden alle Anstrengungen unternommen, um sicherzustellen, dass die in diesem Handbuch aufgeführten Informationen korrekt sind. Apple übernimmt jedoch keine Gewähr für die Richtigkeit des Inhalts dieses Handbuchs. D019-1716 / November2009 iPhone et iPad en entreprise Scénarios de déploiement Octobre 2011 Découvrez comment iPhone et iPad s’intègrent naturellement aux environnements d’entreprise grâce à ces scénarios de déploiement. • Microsoft Exchange ActiveSync • Services fondés sur des normes • Réseaux privés virtuels • Wi-Fi • Certificats numériques • Aperçu des fonctions de sécurité • Gestion d’appareils mobilesDéploiement d’iPhone et d’iPad Exchange ActiveSync iPhone et iPad peuvent communiquer directement avec votre serveur Microsoft Exchange par l’intermédiaire de Microsoft Exchange ActiveSync (EAS), permettant ainsi l’utilisation du courriel, du calendrier, des contacts et des tâches en temps réel. En outre, Exchange ActiveSync permet aux utilisateurs d’accéder à la liste de contacts globale (GAL) et donne aux administrateurs la possibilité d’imposer l’utilisation d’un code de sécurité et d’effectuer l’effacement à distance. iOS prend en charge l’authentification de base et l’authentification par certificat pour Exchange ActiveSync. Si votre entreprise utilise actuellement Exchange ActiveSync, vous disposez déjà des services nécessaires à l’utilisation d’iPhone et d’iPad; aucune autre configuration n’est requise. Si votre entreprise utilise Exchange Server 2003, 2007 ou 2010, mais n’a jamais utilisé Exchange ActiveSync, consultez les étapes qui suivent. Configuration d’Exchange ActiveSync Aperçu de la configuration du réseau • Assurez-vous que le port 443 est ouvert dans les réglages du coupe-feu. Si votre entreprise permet l’utilisation d’Outlook Web Access, le port 443 est probablement déjà ouvert. • Sur le serveur frontal, assurez-vous qu’un certificat de serveur est installé et activez le protocole SSL pour le répertoire virtuel d’Exchange ActiveSync dans IIS. • Si vous utilisez un serveur Microsoft Internet Security and Acceleration (ISA), assurez-vous qu’un certificat de serveur est installé et mettez à jour le DNS public de manière à résoudre les connexions entrantes. • Assurez-vous que le DNS de votre réseau renvoie une adresse unique routable à l’externe au serveur Exchange ActiveSync pour les clients intranet et Internet. Ce réglage est nécessaire pour permettre à l’appareil d’utiliser la même adresse IP lors des communications avec le serveur lorsque les deux types de connexions sont actives. • Si vous utilisez un serveur Microsoft ISA, créez un port d’écoute Web ainsi qu’une règle de publication d’accès de client Web Exchange. Pour de plus amples détails, consultez la documentation de Microsoft. • Pour tous les coupe-feu et les appareils réseau, réglez le délai d’expiration de la session inactive à 30 minutes. Pour obtenir des renseignements sur les intervalles d’interrogation et de délai d’expiration, reportez-vous à la documentation concernant Microsoft Exchange à l’adresse suivante : http://technet.microsoft.com/en-us/library/cc182270.aspx (en anglais). • Configurez les fonctionnalités mobiles, les politiques et les réglages de sécurité des appareils au moyen du Gestionnaire système Exchange. Pour Exchange Server 2007 et 2010, cette configuration s’effectue grâce à la Console de gestion Exchange. • Téléchargez et installez l’outil Web Microsoft Exchange ActiveSync Mobile Administration, qui est nécessaire à l’exécution d’un effacement à distance. Pour Exchange Server 2007 et 2010, l’effacement à distance peut également être exécuté par l’intermédiaire d’Outlook Web Access ou de la Console de gestion Exchange. Politiques de sécurité Exchange ActiveSync prises en charge • Effacement à distance • Mot de passe obligatoire sur l’appareil • Longueur minimale de mot de passe • Nombre maximal de tentatives de saisie du mot de passe (avant l’effacement local) • Utilisation obligatoire de chiffres et de lettres • Délai d’inactivité en minutes (de 1 à 60 minutes) Autres politiques Exchange ActiveSync (pour Exchange 2007 et 2010 seulement) • Autorisation ou interdiction des mots de passe simples • Expiration des mots de passe • Historique des mots de passe • Intervalle d’actualisation de la politique • Nombre minimal de caractères complexes dans le mot de passe • Synchronisation manuelle obligatoire en itinérance • Utilisation de l’appareil photo permise • Navigation sur le Web permiseCahier de spécifications 3 Produit Authentification de base (nom d’utilisateur et mot de passe) • Activez Exchange ActiveSync pour certains utilisateurs ou groupes en particulier au moyen du service Active Directory. La fonctionnalité est activée par défaut pour tous les appareils mobiles de l’ensemble de l’organisation dans Exchange Server 2003, 2007 et 2010. Dans le cas d’Exchange Server 2007 et 2010, reportez-vous à la Configuration du destinataire dans la Console de gestion Exchange. • Par défaut, le protocole Exchange ActiveSync est configuré de manière à employer l’authentification de base des utilisateurs. Nous vous recommandons d’activer le protocole SSL pour l’authentification de base de manière à assurer que les données de connexion soient chiffrées pendant l’authentification. Authentification par certificat • Installez des services de certificat d’entreprise sur un serveur membre ou un contrôleur de domaine dans votre domaine (celui-ci deviendra votre serveur d’autorité de certification). • Configurez le logiciel IIS sur votre serveur frontal Exchange ou sur le serveur d’accès client de manière à accepter l’authentification par certificat pour le répertoire virtuel d’Exchange ActiveSync. • Pour autoriser ou exiger le certificat pour tous les utilisateurs, désactivez la fonction « Authentification de base » et sélectionnez « Accepter les certificats clients » ou « Exiger les certificats clients ». • Générez des certificats clients au moyen de votre serveur d’autorité de certification. Exportez la clé publique et configurez le logiciel IIS afin qu’il utilise cette clé. Exportez la clé privée et utilisez un profil de configuration pour transmettre cette clé à iPhone et iPad. L’authentification par certificat ne peut être configurée qu’au moyen d’un profil de configuration. Pour de plus amples renseignements sur les services de certificats, consultez les ressources offertes par Microsoft. Autres services Exchange ActiveSync • Recherche dans la liste de contacts globale • Possibilité d’accepter et de créer des invitations dans le calendrier • Synchronisation des tâches • Ajout d’indicateurs aux courriels • Synchronisation des indicateurs de réponse et de transfert avec Exchange Server 2010 • Recherche de courriels sur serveurs Exchange 2007 et 2010 • Gestion de plusieurs comptes Exchange ActiveSync • Authentification par certificat • Courriels poussés vers les dossiers sélectionnés • Découverte automatiqueiPhone et iPad demandent l’accès aux services Exchange ActiveSync par l’intermédiaire du port 443 (HTTPS). (Il s’agit du même port employé pour Outlook Web Access et d’autres services Web sécurisés; par conséquent, dans bon nombre de déploiements, ce port est déjà ouvert et configuré pour permettre le trafic HTTPS chiffré selon le protocole SSL.) La solution ISA donne accès au serveur frontal ou au serveur d’accès client Exchange. La solution ISA est configurée comme un serveur mandataire ou, dans bien des cas, un serveur mandataire inverse, afin d’acheminer le trafic vers le serveur Exchange. Le serveur Exchange procède à l’authentification de l’utilisateur entrant par l’intermédiaire du service Active Directory et du serveur de certificats (si l’authentification par certificat est utilisée). Si l’utilisateur fournit les données de connexion correctes et a accès aux services Exchange ActiveSync, le serveur frontal établit une connexion à la boîte aux lettres appropriée sur le serveur principal (par l’intermédiaire du catalogue global Active Directory). La connexion Exchange ActiveSync est établie. Les mises à jour et les modifications sont poussées par connexion sans fil et toutes les modifications apportées sur iPhone ou iPad sont reflétées sur le serveur Exchange. Les courriels envoyés sont également synchronisés avec le serveur Exchange par l’intermédiaire d’Exchange ActiveSync (étape 5). L’acheminement des courriels sortants aux destinataires externes s’effectue habituellement d’un serveur Bridgehead (ou serveur de transport Hub) vers une passerelle de messagerie externe (ou serveur de transport Edge) par SMTP. Selon la configuration du réseau, la passerelle de messagerie externe ou le serveur de transport Edge peuvent se trouver à l’intérieur des limites du réseau ou à l’extérieur du coupe-feu. © 2011 Apple Inc. Tous droits réservés. Apple, le logo Apple, iPhone, iPad et Mac OS sont des marques de commerce d’Apple Inc., enregistrées aux États-Unis et dans d’autres pays. Les autres produits et dénominations sociales mentionnés ici peuvent être des marques de commerce de leurs sociétés respectives. Les caractéristiques des produits peuvent changer sans préavis. Le présent document n’est fourni qu’à titre d’information; Apple se dégage de toute responsabilité quant à son utilisation. Octobre 2011 L419822B Scénario de déploiement de Microsoft Exchange ActiveSync Cet exemple illustre comment iPhone et iPad se connectent à la plupart des déploiements de serveurs Microsoft Exchange 2003, 2007 ou 2010. 4 Coupe-feu Coupe-feu Serveur mandataire Internet Serveur frontal ou serveur d’accès client Exchange Serveur de certificats Active Directory Clé privée (certificat) Clé publique (certificat) *Selon la configuration du réseau, la passerelle de messagerie ou le serveur de transport Edge peuvent se trouver à l’intérieur des limites du réseau (DMZ). Serveur de boîte aux lettres Exchange ou serveur principal Passerelle de messagerie ou serveur de transport Edge* Profil de configuration Serveur Bridgehead ou serveur de transport Hub 443 1 4 6 5 2 3 4 5 6 1 3 2Déploiement d’iPhone et d’iPad Services fondés sur des normes Grâce à la prise en charge du protocole de messagerie IMAP, des services de répertoire LDAP et des protocoles de calendriers CalDAV et de contacts CardDAV, iOS peut s’intégrer à pratiquement tous les environnements de messagerie, de calendriers et de contacts fondés sur des normes. Et si votre environnement réseau est configuré de manière à exiger l’authentification de l’utilisateur et l’utilisation du protocole SSL, iPhone et iPad offrent une approche sécurisée en matière d’accès au courriel, au calendrier, aux tâches et aux contacts d’entreprise. Lors de la plupart des déploiements, iPhone et iPad établissent un accès direct aux serveurs de messagerie IMAP et SMTP afin de recevoir et d’envoyer les courriels à distance, et ils peuvent également effectuer la synchronisation sans fil de notes avec les serveurs IMAP. Les appareils iOS peuvent se connecter aux répertoires d’entreprise LDAPv3 de votre société, permettant aux utilisateurs d’accéder aux contacts d’entreprise dans les applications Mail, Contacts et Messages. La synchronisation avec votre serveur CalDAV permet aux utilisateurs de créer et d’accepter à distance des invitations dans leur calendrier, de recevoir des mises à jour de calendrier et de synchroniser des tâches avec l’application Rappels. Par ailleurs, la prise en charge du protocole CardDAV permet à vos utilisateurs de conserver un ensemble de contacts synchronisés avec votre serveur CardDAV suivant le format vCard. Tous les serveurs du réseau peuvent se trouver à l’intérieur d’un sous-réseau DMZ, derrière un coupe-feu d’entreprise, ou les deux. Avec le protocole SSL, iOS prend en charge le chiffrement à 128 bits et les certificats racine X.509 émis par les principales autorités de certification. Configuration du réseau Votre administrateur des TI ou du réseau devra exécuter les étapes clés suivantes pour permettre l’accès aux services IMAP, LDAP, CalDAV et CardDAV à partir d’iPhone et d’iPad : • Ouvrez les ports appropriés dans les réglages du coupe-feu. Les ports les plus courants comprennent le port 993 pour la messagerie IMAP, 587 pour la messagerie SMTP, 636 pour les services de répertoire LDAP, 8443 pour les services de calendrier CalDAV et 8843 pour les contacts CardDAV. Il est également recommandé que la communication entre le serveur mandataire et les serveurs principaux IMAP, LDAP, CalDAV et CardDAV soit configurée de manière à utiliser le protocole SSL et que les certificats numériques, sur les serveurs du réseau, soient signés par une autorité de certification de confiance telle que VeriSign. Cette étape importante fait en sorte qu’iPhone et iPad reconnaissent votre serveur mandataire en tant qu’entité de confiance au sein de votre infrastructure d’entreprise. • Pour la messagerie SMTP sortante, les ports 587, 465 ou 25 doivent être ouverts pour permettre l’envoi des courriels. iOS recherche automatiquement le port 587, puis le port 465 et enfin le port 25. Le port 587 est le port le plus fiable et le mieux sécurisé, car il requiert l’authentification de l’utilisateur. Le port 25 ne requiert pas l’authentification de l’utilisateur et certains fournisseurs de services Internet bloquent ce port par défaut afin d’éliminer les pourriels. Ports courants • IMAP/SSL : 993 • SMTP/SSL : 587 • LDAP/SSL : 636 • CalDAV/SSL : 8443, 443 • CardDAV/SSL : 8843, 443 Solutions de messagerie IMAP ou POP iOS prend en charge les protocoles standard des serveurs IMAP4 et POP3 sur toute une gamme de plateformes serveur, y compris Windows, UNIX, Linux et Mac OS X. Standards CalDAV et CardDAV iOS prend en charge les protocoles de calendrier CalDAV et de contacts CardDAV. Les deux protocoles ont été standardisés par l’IETF. Pour de plus amples renseignements à ce sujet, reportez-vous au consortium CalConnect, aux adresses (en anglais) http://caldav.calconnect.org/ et http://carddav.calconnect.org/.Scénario de déploiement Cet exemple illustre comment iPhone et iPad se connectent à la plupart des déploiements de serveurs IMAP, LDAP, CalDAV et CardDAV. © 2011 Apple Inc. Tous droits réservés. Apple, le logo Apple, iPhone, iPad et Mac OS sont des marques de commerce d’Apple Inc., enregistrées aux États-Unis et dans d’autres pays. UNIX est une marque déposée de The Open Group. Les autres produits et dénominations sociales mentionnés ici peuvent être des marques de commerce de leurs sociétés respectives. Les caractéristiques des produits peuvent changer sans préavis. Le présent document n’est fourni qu’à titre d’information; Apple se dégage de toute responsabilité quant à son utilisation. Octobre 2011 L419827B iPhone et iPad demandent l’accès aux services réseau par l’intermédiaire des ports indiqués. En fonction du service, les utilisateurs doivent être authentifiés par le serveur mandataire inverse ou par le serveur directement afin d’obtenir l’accès aux données d’entreprise. Dans tous les cas, les connexions sont acheminées par le serveur mandataire inverse, qui remplit le rôle d’une passerelle sécurisée, habituellement à l’abri du coupe-feu Internet de l’entreprise. Une fois authentifiés, les utilisateurs peuvent accéder à leurs données d’entreprise sur les serveurs principaux. iPhone et iPad offrent des services de recherche dans les répertoires LDAP, permettant aux utilisateurs de rechercher des contacts et d’autres données du carnet d’adresses sur le serveur LDAP. Dans le cas des calendriers CalDAV, les utilisateurs peuvent accéder aux calendriers et les mettre à jour. Les contacts CardDAV sont stockés sur le serveur, et il est également possible d’y accéder localement sur iPhone et iPad. Les modifications apportées aux champs dans les contacts CardDAV sont synchronisés avec le serveur CardDAV. Dans le cas des services de messagerie IMAP, les messages existants et les nouveaux messages peuvent être lus sur iPhone et iPad grâce à la connexion au serveur mandataire de messagerie. Les messages sortants sont envoyés au serveur SMTP, et des copies sont conservées dans le dossier Éléments envoyés de l’utilisateur. 1 2 3 4 5 6 Coupe-feu Coupe-feu Serveur mandataire inverse Internet Serveur de messagerie Serveur de répertoire LDAP 3 6 Serveur CalDAV Serveur CardDAV 2 4 5 1 636 (LDAP) 8843 (CardDAV) 993 (IMAP) 587 (SMTP) 8443 (CalDAV) 6Déploiement d’iPhone et d’iPad Réseaux privés virtuels L’accès sécurisé aux réseaux d’entreprise privés est possible sur iPhone et iPad grâce aux protocoles standard établis en matière de réseaux privés virtuels (RPV). Les utilisateurs peuvent facilement se connecter aux systèmes d’entreprise par l’intermédiaire du client de RPV d’iOS ou au moyen d’une application tierce fournie par Juniper, Cisco et F5 Networks. Dès le départ, iOS prend en charge Cisco IPSec, L2TP sur IPSec et PPTP. Si votre entreprise utilise l’un de ces protocoles, aucune autre configuration réseau ni aucune autre application tierce ne sont nécessaires pour relier iPhone et iPad à votre réseau privé virtuel. En outre, iOS prend en charge les RPV SSL, permettant l’accès aux serveurs de réseaux privés virtuels SSL Juniper série SA, Cisco ASA et F5 BIG-IP Edge Gateway. Il suffit aux utilisateurs de télécharger une application client de RPV développée par Juniper, Cisco ou F5 à partir de l’App Store pour commencer. Comme les autres protocoles de RPV pris en charge par iOS, les RPV SSL peuvent être configurés manuellement sur l’appareil ou par l’intermédiaire du Profil de configuration. iOS prend en charge les technologies standard telles que IPv6, les serveurs mandataires et la tunnellisation fractionnée, permettant d’obtenir une expérience de RPV riche lors de la connexion aux réseaux d’entreprise. De plus, iOS est compatible avec différentes méthodes d’authentification, y compris les mots de passe, les jetons à deux facteurs et les certificats numériques. Afin de simplifier la connexion dans les environnements où l’authentification par certificat est utilisée, iOS est doté de la technologie VPN On Demand, qui démarre une session de RPV de façon dynamique lors de la connexion aux domaines indiqués. Méthodes d’authentification et protocoles pris en charge RPV SSL Prend en charge l’authentification de l’utilisateur par mot de passe, par jeton à deux facteurs et par certificat. Cisco IPSec Prend en charge l’authentification de l’utilisateur par mot de passe et par jeton à deux facteurs ainsi que l’authentification de l’ordinateur par secret partagé et certificat. L2TP sur IPSec Prend en charge l’authentification de l’utilisateur par mot de passe MS-CHAP v2 et par jeton à deux facteurs ainsi que l’authentification de l’ordinateur par secret partagé et certificat. PPTP Prend en charge l’authentification de l’utilisateur par mot de passe MS-CHAP v2 et par jeton à deux facteurs.Cahier de spécifications 8 Produit VPN On Demand Dans le cas des configurations utilisant l’authentification par certificat, iOS prend en charge la technologie VPN On Demand. VPN On Demand établit automatiquement une connexion lors de l’accès aux domaines prédéfinis, permettant aux utilisateurs de se connecter aux RPV de façon transparente. Cette fonctionnalité d’iOS ne nécessite aucune autre configuration du serveur. La configuration de la technologie VPN On Demand s’effectue par l’intermédiaire d’un profil de configuration ou peut être effectuée manuellement sur l’appareil. Options de VPN On Demand : Toujours Établit une connexion à un RPV pour toute adresse correspondant au domaine indiqué. Jamais N’établit pas de connexion à un RPV pour les adresses qui correspondent au domaine indiqué, mais si le RPV est déjà actif, il peut être utilisé. Au besoin Établit une connexion à un RPV pour les adresses correspondant au domaine indiqué uniquement si la recherche d’un DNS n’a donné aucun résultat. Configuration du RPV • Une configuration minimale permet à iOS de s’intégrer à de nombreux réseaux RPV existants. Le meilleur moyen de préparer le déploiement consiste à vérifier si iOS prend en charge les protocoles et les méthodes d’authentification du RPV actuel de votre entreprise. • Nous vous recommandons de passer en revue le chemin d’authentification menant à votre serveur d’authentification afin de vérifier que les standards pris en charge par iOS sont activés au sein de votre déploiement. • Si vous avez l’intention d’utiliser l’authentification par certificat, assurez-vous que votre infrastructure de clé publique est configurée de manière à prendre en charge les certificats appareil et utilisateur avec le processus de distribution de clé correspondant. • Pour configurer des réglages de serveur mandataire en fonction d’une URL en particulier, placez un fichier PAC sur un serveur Web auquel il est possible d’accéder en utilisant les réglages de RPV de base et assurez-vous qu’il est hébergé avec le type MIME application/x-ns-proxy-autoconfig. Configuration du serveur mandataire Pour toutes les configurations, vous pouvez également définir un serveur mandataire de RPV. Pour configurer un serveur mandataire unique pour toutes les connexions, utilisez le réglage manuel et indiquez l’adresse, le port et l’authentification si nécessaire. Pour fournir un fichier de configuration automatique du serveur mandataire à l’appareil en utilisant un protocole PAC ou WPAD, utilisez la configuration automatique. Dans le cas des éléments PAC, indiquez l’URL du fichier PAC. Si le protocole WPAD est employé, iPhone et iPad recherchent les réglages appropriés dans le DHCP et le DNS.9 1 2 3 4 5 6 Coupe-feu Coupe-feu Serveur de RPV-concentrateur Internet public Réseau privé Authentification certificat ou jeton Serveur mandataire Serveur d’authentification du RPV Génération de jeton ou authentification par certificat 1 4 3a 3b 2 5 Service de répertoire © 2011 Apple Inc. Tous droits réservés. Apple, le logo Apple, iPhone, iPad et Mac OS sont des marques de commerce d’Apple Inc., enregistrées aux États-Unis et dans d’autres pays. App Store est une marque de service d’Apple Inc. Les autres produits et dénominations sociales mentionnés ici peuvent être des marques de commerce de leurs sociétés respectives. Les caractéristiques des produits peuvent changer sans préavis. Le présent document n’est fourni qu’à titre d’information; Apple se dégage de toute responsabilité quant à son utilisation. Octobre 2011 L419828B Scénario de déploiement Cet exemple décrit un déploiement classique avec serveur de RPV-concentrateur et serveur d’authentification contrôlant l’accès aux services réseau de l’entreprise. iPhone et iPad demandent l’accès aux services réseau. Le serveur de RPV-concentrateur reçoit la demande et la transmet au serveur d’authentification. Dans un environnement à deux facteurs, le serveur d’authentification gère alors la génération synchronisée d’un jeton clé avec le serveur de clés. Si une méthode d’authentification par certificat est déployée, un certificat de clé publique doit être distribué avant l’authentification. Si une méthode d’authentification par mot de passe est déployée, l’authentification passe à la validation de l’utilisateur. Une fois l’utilisateur authentifié, le serveur d’authentification valide les politiques d’utilisateur et de groupe. Une fois les politiques d’utilisateur et de groupe validées, le serveur de RPV établit l’accès par tunnel chiffré aux services réseau. Si un serveur mandataire est actif, iPhone et iPad se connectent par l’intermédiaire du serveur mandataire pour accéder aux données à l’extérieur du coupe-feu.Déploiement d’iPhone et d’iPad Wi-Fi Protocoles de sécurité sans fil • WEP • WPA personnel • WPA entreprise • WPA2 personnel • WPA2 entreprise Méthodes d’authentification 802.1X • EAP-TLS • EAP-TTLS • EAP-FAST • EAP-SIM • PEAPv0 (EAP-MS-CHAP v2) • PEAPv1 (EAP-GTC) • LEAP Dès leur première utilisation, iPhone et iPad peuvent se connecter de façon sécurisée aux réseaux Wi-Fi d’entreprise ou d’invité, de sorte que la connexion aux réseaux sans fil disponibles s’effectue rapidement et facilement, que vous soyez sur le campus ou en déplacement. iOS prend en charge les protocoles de réseau sans fil standard, y compris WPA2 entreprise, de sorte qu’il est possible de configurer rapidement les réseaux sans fil d’entreprise et d’y accéder de façon sécurisée. Le protocole WPA2 entreprise emploie le chiffrement AES à 128 bits, une méthode de chiffrement par blocs éprouvée, donnant aux utilisateurs l’assurance que leurs données sont protégées. Grâce à la prise en charge du standard 802.1X, iOS peut être intégré à une vaste gamme d’environnements à authentification RADIUS. Les méthodes d’authentification sans fil 802.1X prises en charge sur iPhone et iPad comprennent EAP-TLS, EAP-TTLS, EAP-FAST, EAP-SIM, PEAPv0, PEAPv1 et LEAP. Les utilisateurs peuvent configurer iPhone et iPad de manière à établir automatiquement la connexion aux réseaux Wi-Fi disponibles. Il est possible d’accéder aux réseaux Wi-Fi nécessitant des données de connexion ou d’autres renseignements rapidement et sans ouvrir une autre session de navigateur, à partir des réglages Wi-Fi ou par l’intermédiaire d’applications telles que Mail. Et la connectivité Wi-Fi permanente à faible puissance permet aux applications d’utiliser les réseaux Wi-Fi pour acheminer des notifications en mode Push. Les réglages de réseau sans fil, de sécurité, de serveur mandataire et d’authentification peuvent être configurés grâce aux profils de configuration, de manière à effectuer rapidement la configuration et le déploiement. Configuration du protocole WPA2 entreprise • Vérifiez la compatibilité des appareils réseau et sélectionnez un type d’authentification (type EAP) pris en charge par iOS. • Assurez-vous que la prise en charge du standard 802.1X est activée sur le serveur d’authentification et, s’il y a lieu, installez un certificat de serveur et attribuez des autorisations d’accès aux utilisateurs et aux groupes. • Configurez les points d’accès pour l’authentification 802.1X et entrez les données correspondantes concernant le serveur RADIUS. • Si vous avez l’intention d’utiliser l’authentification par certificat, configurez votre infrastructure de clé publique de manière à prendre en charge les certificats appareil et utilisateur avec le processus de distribution de clé correspondant. • Vérifiez la compatibilité du format du certificat et du serveur d’authentification. iOS prend en charge les systèmes cryptographiques à clé publique 1 (.cer, .crt, .der) et 12. • Pour de plus amples renseignements concernant les standards en matière de réseaux sans fil et l’accès Wi-Fi protégé (WPA), consultez le site www.wi-fi.org (en anglais).Scénario de déploiement WPA2 entreprise/802.1X Cet exemple décrit un déploiement de réseau sans fil sécurisé classique tirant parti de l’authentification RADIUS. iPhone et iPad demandent l’accès au réseau. La tentative de connexion est effectuée en réponse à la sélection d’un réseau sans fil disponible par l’utilisateur ou est effectuée automatiquement lorsqu’un réseau préalablement configuré est détecté. Une fois que le point d’accès a reçu la demande, celle-ci est transmise au serveur RADIUS pour l’authentification. Le serveur RADIUS valide le compte utilisateur au moyen du service de répertoire. Une fois l’utilisateur authentifié, le point d’accès donne accès au réseau selon les politiques et les autorisations définies par les instructions du serveur RADIUS. © 2011 Apple Inc. Tous droits réservés. Apple, le logo Apple, iPhone, iPad et Mac OS sont des marques de commerce d’Apple Inc., enregistrées aux États-Unis et dans d’autres pays. Les autres produits et dénominations sociales mentionnés ici peuvent être des marques de commerce de leurs sociétés respectives. Les caractéristiques des produits peuvent changer sans préavis. Le présent document n’est fourni qu’à titre d’information; Apple se dégage de toute responsabilité quant à son utilisation. Octobre 2011 L419830B 11 1 2 3 4 Point d’accès sans fil avec prise en charge du standard 802.1X Services de répertoire Services réseau Serveur d’authentification avec prise en charge du standard 802.1X (RADIUS) Type EAP, par certificat ou mot de passe 1 2 3 4 Coupe-feuiOS prend en charge les certificats numériques, permettant aux utilisateurs d’entreprise d’accéder de façon sécurisée et simplifiée aux services d’entreprise. Un certificat numérique est formé des éléments suivants : une clé publique, des données au sujet de l’utilisateur et l’autorité de certification ayant émis le certificat. Les certificats numériques sont une forme d’identification permettant la simplification de l’authentification, l’intégrité des données et le chiffrement. Sur iPhone et iPad, les certificats peuvent être utilisés de différentes façons. Apposer une signature sur des données au moyen d’un certificat numérique contribue à assurer que les données ne puissent être altérées. Les certificats peuvent également être utilisés pour garantir l’identité de l’auteur ou de la personne apposant sa signature. En outre, ils peuvent être utilisés pour chiffrer les profils de configuration et les communications réseau afin de protéger encore davantage les données privées ou confidentielles. Utilisation des certificats dans iOS Certificats numériques Les certificats numériques peuvent être utilisés pour authentifier de façon sécurisée les utilisateurs des services d’entreprise sans qu’il soit nécessaire d’employer un nom d’utilisateur, un mot de passe ou un jeton logiciel. Dans iOS, l’authentification par certificat est prise en charge pour l’accès à Microsoft Exchange ActiveSync, aux RPV et aux réseaux Wi-Fi. Services d’entreprise intranet, courriel, RPV, Wi-Fi Autorité de certification Service de répertoire Demande d’authentification Certificats de serveur Les certificats numériques peuvent également être utilisés pour valider et chiffrer les communications réseau. Il est ainsi possible de communiquer de façon sécurisée avec les sites Web internes et externes. Le navigateur Safari peut vérifier la validité d’un certificat numérique X.509 et configurer une session sécurisée avec chiffrement AES atteignant 256 bits. L’identité du site est ainsi vérifiée et la communication avec le site est protégée de manière à empêcher l’interception des données personnelles ou confidentielles. Demande de Services réseau connexion HTTPS Autorité de certification Déploiement d’iPhone et d’iPad Certificats numériques Formats de certificat et d’authentification pris en charge : • iOS prend en charge les certificats X.509 avec clés RSA. • Les extensions de fichier .cer, .crt, .der, .p12 et .pfx sont reconnues. Certificats racine Un certain nombre de certificats racine sont préinstallés dans iOS. Pour consulter la liste des racines du système préinstallées, reportezvous à l’article d’assistance Apple à l’adresse suivante : http://support.apple.com/kb/HT4415 (en anglais). Si vous utilisez un certificat racine qui n’est pas préinstallé, par exemple un certificat racine autosigné créé par votre entreprise, vous pouvez le distribuer en utilisant l’une des méthodes décrites dans la section « Distribution et installation des certificats » du présent document.© 2011 Apple Inc. Tous droits réservés. Apple, le logo Apple, iPhone, iPad et Mac OS sont des marques de commerce d’Apple Inc., enregistrées aux États-Unis et dans d’autres pays. Les autres produits et dénominations sociales mentionnés ici peuvent être des marques de commerce de leurs sociétés respectives. Les caractéristiques des produits peuvent changer sans préavis. Le présent document n’est fourni qu’à titre d’information; Apple se dégage de toute responsabilité quant à son utilisation. Octobre 2011 L419821B Distribution et installation des certificats La distribution et l’installation des certificats sur iPhone et iPad s’effectue simplement. Lorsqu’ils reçoivent un certificat, les utilisateurs peuvent passer en revue son contenu et l’ajouter à leur appareil en deux touchers. Lorsqu’un certificat de clé publique est installé, les utilisateurs doivent entrer le mot de passe qui sert à le protéger. Si l’authenticité d’un certificat ne peut être vérifiée, un avertissement s’affiche avant l’ajout du certificat à l’appareil. Installation de certificats par l’intermédiaire des profils de configuration Si les profils de configuration sont utilisés pour distribuer les réglages des services d’entreprise tels que Exchange, les RPV ou un réseau Wi-Fi, les certificats peuvent être ajoutés au profil afin de simplifier le déploiement. Installation de certificats par l’intermédiaire de Mail ou de Safari Si un certificat est envoyé par courriel, il s’affiche comme pièce jointe. Safari peut être utilisé pour télécharger des certificats à partir d’une page Web. Vous pouvez héberger un certificat sur un site Web sécurisé et fournir aux utilisateurs l’URL à partir de laquelle ils peuvent télécharger le certificat sur leur appareil. Installation de certificats au moyen du protocole d’inscription du certificat simple (SCEP) Le protocole SCEP vise à simplifier la distribution des certificats dans le cas des déploiements à grande échelle. Il permet l’inscription sans fil, sur iPhone et iPad, de certificats numériques qui peuvent ensuite être utilisés pour l’authentification requise par les services d’entreprise et pour l’inscription auprès d’un serveur de gestion d’appareils mobiles. Pour de plus amples renseignements sur le protocole SCEP et l’inscription sans fil, consultez le site www.apple.com/ca/fr/iphone/business/resources. Retrait et révocation de certificats Pour retirer manuellement un certificat qui a été installé, sélectionnez Réglages > Général > Profils. Si vous retirez un certificat nécessaire à l’accès à un compte ou à un réseau, l’appareil ne pourra plus établir la connexion à ces services. Pour retirer les certificats au moyen d’une connexion sans fil, vous pouvez vous servir d’un serveur de gestion d’appareils mobiles. Ce serveur peut afficher tous les certificats d’un appareil et retirer ceux qu’il a installés. En outre, le protocole OCSP est pris en charge afin de permettre la vérification de l’état des certificats. Lorsqu’un certificat respectant le protocole OSCP est utilisé, iOS valide le certificat pour vérifier que celui-ci n’a pas été révoqué avant d’exécuter la tâche demandée. 13Cahier de spécifications 14 Produit Déploiement d’iPhone et d’iPad Aperçu des fonctions de sécurité iOS, le système d’exploitation d’iPhone et d’iPad, comporte plusieurs niveaux de sécurité. iPhone et iPad peuvent ainsi accéder aux services d’entreprise de façon sécurisée et protéger les données importantes. iOS offre un puissant chiffrement pour la transmission de données, des méthodes d’authentification éprouvées pour l’accès aux services d’entreprise et le chiffrement matériel pour toutes les données au repos. iOS permet également de sécuriser et de protéger les données grâce à l’utilisation de politiques de code de sécurité pouvant être transmises et appliquées par connexion sans fil. Et si l’appareil se retrouve entre de mauvaises mains, les utilisateurs et les administrateurs des TI peuvent exécuter une commande d’effacement à distance pour supprimer les données privées. Lorsque vous évaluez la sécurité du système d’exploitation iOS pour l’utilisation en entreprise, il importe de comprendre les éléments suivants : • Sécurité de l’appareil : les méthodes qui servent à prévenir l’utilisation non autorisée de l’appareil • Sécurité des données : la protection des données au repos, même si l’appareil est perdu ou volé • Sécurité du réseau : les protocoles de réseau et le chiffrement des données lors de la transmission • Sécurité des applications : la plateforme sécurisée sur laquelle repose iOS Ces caractéristiques fonctionnent de concert pour créer une plateforme informatique mobile sécurisée. Sécurité de l’appareil L’établissement de politiques d’accès à iPhone et iPad rigoureuses est une étape essentielle en matière de protection des données de l’entreprise. Les codes de sécurité des appareils forment la première ligne de défense contre l’accès non autorisé; ils peuvent être configurés sans fil et leur utilisation peut être imposée de la même façon. Les appareils exécutant iOS utilisent le code de sécurité unique établi par chaque utilisateur pour générer une clé de chiffrement puissante afin de protéger encore davantage les courriels et les données d’application confidentielles sur l’appareil. En outre, iOS offre des méthodes de configuration de l’appareil en environnement d’entreprise sécurisées et rendant obligatoire la mise en place de réglages, de politiques et de restrictions précises. Ces méthodes permettent de bénéficier d’options flexibles en matière d’établissement d’un niveau de protection standard pour les utilisateurs autorisés. Politiques concernant les codes de sécurité Le code de sécurité d’un appareil empêche les utilisateurs non autorisés d’accéder aux données ou à l’appareil de quelque façon que ce soit. iOS vous permet de faire une sélection parmi un ensemble complet d’exigences relatives au code de sécurité afin de répondre à vos besoins en matière de sécurité, y compris des délais d’inactivité, la complexité du code de sécurité et la fréquence de modification du code de sécurité. Les politiques de code de sécurité suivantes sont prises en charge : • Code de sécurité requis sur l’appareil • Valeur simple permise • Valeur alphanumérique requise • Longueur minimale du code de sécurité • Nombre minimal de caractères complexes • Période de validité maximale du code de sécurité • Délai précédant le verrouillage automatique • Historique des codes de sécurité • Délai de verrouillage de l’appareil • Nombre maximal de tentatives infructueuses Sécurité de l’appareil • Codes de sécurité forts • Expiration du code de sécurité • Historique de réutilisation des codes de sécurité • Nombre maximal de tentatives infructueuses • Application à distance de la contrainte d’utilisation du code de sécurité • Temporisation progressive de la saisie du code de sécuritéApplication des politiques