background image

Image Kiosk 8560 User’s Guide- Pre-
liminary CP4 Draft

Rev (a)

6/27/06

5 - 13

Configuring Client Authentication

Each user account needs to define the protocol and the credentials used to authenticate a user. When you start and stop on a 
port, you are enabling and disabling the authentication established here.

Note: Fields will be grayed out if not relevant to the selected protocol.

On the main screen, tap Client > Configure. Complete the User (see page 

5-13

), System (see page 

5-15

), and Server (see page 

5-16

) tabs.

The configuration screens are in portrait orientation, which means that a portion of the screen is below the command bar 
at the bottom. To access the rest of the screen, tap and hold on a point on the right side of the window that is not an active 
part of the screen (e.g., a button or a field) and drag the screen up. After you complete your tasks on the lower portion of 
the window, you must drag the window back down so that you can tap OK to save changes.

!

User Tab

Enter the credentials used to authenticate a user.

Field

Description

Profile

Multiple user credential profiles can be created for use when the user roams from one network to 
another. The drop-down list contains existing authentication credential profiles. Select a profile from the 
list to edit it in the fields that follow.

•           Tapping Add permits new profiles to be added to the list. A screen appears where you can enter a 

name for the new profile. 

•           Enter a Profile name and tap OK. The name entered appears in the Profile drop-down list.
•           Tapping Delete deletes authentication profiles. To be deleted, a profile cannot be assigned to a 

configured network.

Identity 

This is the 802.1X identity supplied to the authenticator. The identity value can be up to 63 ASCII 
characters and is case-sensitive. 

For tunneled authentication protocols such as TTLS and PEAP, this identity (called the Phase 1 identity) 
is sent outside the protection of the encrypted tunnel. Therefore, it is recommended that this field not 
contain a true identity, but instead the identity “anonymous” and any desired realm (e.g. 
anonymous@myrealm.com). For TTLS and PEAP, true user credentials (Phase 2 identity) are entered 
in the Tunneled authentication section.

When used with PEAP and the .NET Enterprise Server Version 5.2, this field must contain the identity 
used in both Phase I and Phase II. The Phase II identity field is ignored.

Password 

This is the password used for MD5-Challenge or LEAP authentication. It may contain up to 63 ASCII 
characters and is case-sensitive. Asterisks appear instead of characters for enhanced security.

Authentication 
type

This is the authentication method to be used - MD5-Challenge, LEAP, PEAP, TLS, or TTLS. 

Your network administrator should let you know the protocols supported by the RADIUS server. The 
RADIUS server sits on the network and acts as a central credential repository for Access Servers that 
receive the radio signals and ultimately block or allow users to attach to the network. 

Summary of Contents for Image Kiosk 8560

Page 1: ...User s Guide Preliminary CP4 Draft Image Kiosk 8560 with Microsoft Windows CE ...

Page 2: ...performance or use of this material This document contains proprietary information that is protected by copyright All rights are reserved No part of this document may be photocopied reproduced or translated into another language without the prior written consent of Hand Held Products 2006 Hand Held Products Inc All rights reserved Web Address www handheld com Trademarks Microsoft Windows Windows C...

Page 3: ...st 2 4 Using Windows Explorer 2 4 Selecting Text 2 4 Selecting Programs 2 4 Chapter 3 Hardware Overview Front Panel 3 1 Back Panel 3 2 Connectors 3 3 Connecting the Power and Communication Cables 3 4 USB Cable 3 4 Standard RS 232 Cable 3 5 RS 232 Pass Through Cable 3 5 Rebooting the Device 3 6 Warm Boot 3 6 Cold Boot 3 6 Using the Reset Switch 3 6 Screen Protector Replacement 3 7 Maintenance 3 8 I...

Page 4: ...s 5 12 Saving Your Settings 5 12 Configuring Client Authentication 5 13 Configuring a Port 5 17 Configuring a Network 5 19 Installing Certificates 5 22 Chapter 6 Imaging Overview 6 1 Supported Bar Code Symbologies 6 1 Default Bar Code Symbologies 6 1 Scanning a Bar Code 6 2 Omni Directional Aiming 6 2 Sample Bar Codes 6 3 Depth of Focus DOF Specifications 6 3 Scan Demo 6 4 Auto Send 6 7 Chapter 7 ...

Page 5: ... QWUDGD 9 P ODVVH HVW FRQIRUPH D OD QRUPH 10 GX DQDGD DQG HOG 3URGXFWV QF 6NDQHDWHOHV DOOV 1 86 Safety Label 802 11b Radio IK8560 RF devices are designed to comply with the most current applicable standards on safe levels of RF energy developed by the Institute of Electrical and Electronics Engineers IEEE and the American National Standards Institute ANSI and has been recommended for adoption by t...

Page 6: ...rt 15 of the FCC Rules These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment This equipment generates uses and can radiate radio frequency energy and if not installed and used in accordance with the instruction manual may cause harmful interference to radio frequencies Operation of this equipment in a resi...

Page 7: ...o in the IK8560 RF device operates on the same frequency band as a microwave oven Therefore if you use a microwave within range of the IK8560 RF device you may notice performance degradation in your wireless network However both your microwave and your wireless network will continue to function The IK8560 batch device does not contain a radio and therefore is not affected by microwave ovens Care a...

Page 8: ...inary CP4 Draft If you need more information on the collection reuse and recycling systems please contact your local or regional waste administration You may also contact your supplier for more information on the environmental performances of this product ...

Page 9: ...ect the Power and Communication Cables The IK8560 has a number of power and communication cables Use one to apply power to the device For more information see Connecting the Power and Communication Cables on page 3 4 Boot the IK8560 1 The IK8560 begins booting as soon as power is applied from the cable 2 The splash screen appears as the system cold boots see Cold Boot on page 3 6 The software vers...

Page 10: ...lays the cable type and connection status Wired ethernet cable is not connected 802 11b radio is not connected 802 11b radio is connected Displays the Soft Input Panel SIP see Using the Soft Input Panel SIP on page 2 3 Tapping this button enables you to return to the Desktop The pop up menu that appears will also show two programs or windows currently open Setting the Time and Date After the devic...

Page 11: ...op up menu On the soft keyboard that displays tap the character keys to enter them on the screen To close the SIP tap the Input Panel icon again and select Hide Input Panel SIP Settings You can adjust SIP panel settings by tapping Start Settings Control Panel Input Panel Allow applications to change the input panel state is selected by default and makes the SIP appear automatically in applications...

Page 12: ...the Contrast On the Backlight Options window use the Contrast slider to adjust the contrast Using Windows Explorer You can access Windows Explorer by Double tapping the My Device icon on the start screen OR Tapping Start Windows Explorer Windows Explorer opens to the root folder level Use Windows Explorer to find and move files Selecting Text To edit or format typed text select it by dragging your...

Page 13: ... the input panel and will void the warranty Screen Protectors Hand Held Products requires screen protectors to protect the touch screen especially when used with applications that require high volume interfacing with the touch screen Screen protectors help prevent damage to the touch screen display and are easily installed Screen protectors can be purchased at any major computer retail store or di...

Page 14: ...asy mounting either to a wall or stand Wire Slots These two slots are designed to hold the wires of the connecting cables Connectors There are three connectors in a slot inside the back panel see Connectors on page 3 3 Mount Slots Use these slots to mount the IK8560 to a flat surface or bracket For mounting specifications see Mounting on page 7 1 ...

Page 15: ... Port on page 4 9 DB15 Connector This is a single 15 pin D style high density female connector All power cables have a connector that matches this pin configuration This connector powers the device by receiving power from the cable and communicates with a host workstation using ActiveSync USB only For more information see Microsoft ActiveSync on page 4 2 RJ45 Jack IK8560E On the IK8560E unit this ...

Page 16: ...atible with USB 1 1 with this cable but data transfer will occur 1 1 speeds It features a single 15 pin male connector that plugs into the DB15 pin female port on the back panel The other end features a standard Type A USB 1 1 or higher connector designed to fit standard USB ports Note Make sure the power switch is turned off on the computer where you will be installing the IK8560 1 4 3 2 Host 1 P...

Page 17: ...560 powers on and auto configures to RS 232 You may now turn on your host device Note If your computer has a 25 pin serial port you will need to obtain a 25 pin to 9 pin adapter from your local computer store or other source RS 232 Pass Through Cable The RS 232 pass through cable uses a Y cable with AC power adapter 1 5 4 3 2 Host Note Make sure the power switch is turned off on the device where y...

Page 18: ...warm boot tap Start Programs Power Tools Reboot Warm Boot Cold Boot A cold boot reboots the device and re installs the cab files stored in the Autoinstall folder To launch a cold boot you can Power cycle Perform a hard reset with the reset switch Cold boots erase data and applications stored in RAM memory Using the Reset Switch Power can be cycled which performs a cold boot by using the end of a s...

Page 19: ...emove the old screen protector frame insert a straightened paper clip into the small hole in the front of the IK8560 This releases the protector frame which can now be lifted off 2 Clean any smudges or dirt from the IK8560 touch screen using glass cleaner or water Wipe the surface dry 3 Remove the protective film from the back of the new screen protector 4 Line up the holes in the protector with t...

Page 20: ... to wipe the front of the screen protector This makes the protector lie flat 6 Place the protector frame back in place and press down until it snaps shut Maintenance To clean your IK8560 use a soft cotton cloth lightly dampened with isopropyl alcohol This removes any ink fingerprint smudges or dirt ...

Page 21: ...DC power pass through support for USB 1 1 for up to 10 devices Ethernet 10 100 BaseT Optional port Cable not supplied Radio Frequency 802 11b optional AC power adapter and power supply required not included Memory Flash 32 MB non volatile synchronous Flash standard SDRAM 64MB Dimensions reference Width 7 3 in 18 5 cm Depth 7 6 in 19 2 cm Height 3 2 in 8 03 cm Weight 2 lb 9 kg Power Requirements Cu...

Page 22: ...oft Windows CE 5 0 Third Party Software Hand Held Products Mobile Systems Manager Graphics Supported BMP CGM DIB EPS MF PCL PCX PLS JPG and TIF RF Security WEP 64 and 128 bit EAP WPA Approvals and Certifications Agency Conformance FCC Class A CE LVD UL 1950 CSA 22 2 IK8560 Technical Specifications ...

Page 23: ...t Port on page 4 9 802 11b Radio IK8560C The IK8560C contains an on board 802 11b radio that establishes the device on a wireless network For information see IK8560C Wireless LAN with 802 11b on page 5 1 Installing Additional Software You can install additional programs on the IK8560 through most of the communication options However the following requirements must be met The program must be create...

Page 24: ...560 device IK8560 devices ship with ActiveSync already installed If ActiveSync is not already installed on the host workstation you can download the latest version of ActiveSync from Microsoft s web site and run the install wizard Installing the INF File on the Host Workstation To establish an ActiveSync connection you must install the IK8560 inf file on the host workstation Once this file is inst...

Page 25: ...minary CP4 Draft Rev a 6 27 06 4 3 4 Select Don t Search I will choose the driver to install 5 Click Next and select Computer as the hardware type 6 Click Next When the wizard tells you it can t find drivers for the device click Have Disk ...

Page 26: ... workstation and select it The host workstation reads the file as HandHeld Products TT8560 8 Click Next The hardware begins installing 9 You will see a brief flash on the IK8560 screen then the ActiveSync Wizard appears on the workstation 10 Complete the ActiveSync Setup Wizard ActiveSync will auto configure to USB communication ...

Page 27: ...Verify that ActiveSync on the workstation has selected the appropriate communication type by clicking File Connection Settings Select for USB Select to allow ethernet communication over ActiveSync Verify the communication type For USB select Allow USB connections Do not check the serial cable box below it To have ActiveSync work over the ethernet in the This computer is connected to drop down list...

Page 28: ...files or documentation that comes with the program Many programs provide special installation instructions 3 Connect the device to the workstation using a Hand Held Products communication cable If the File is an Installer An installer program is one that installs to the workstation and the device simultaneously one process installs to both devices 1 On the workstation double click the exe or setup...

Page 29: ...stall folder or perform a cold boot and the program will install as part of the Autoinstall process Remember A cold boot erases RAM data and applications 4 After installation on the device is complete tap Start Programs and the program appear on the menu Tap it to open the program Synchronizing By default ActiveSync does not automatically synchronize all types of information Use ActiveSync Options...

Page 30: ...wer cable DHCP is enabled by default a static IP must be configured manually if the network does not use DHCP To test the ethernet connection tap the Internet Explorer icon on the Desktop If the device connects to a network with internet or an intranet web server the home page should begin loading Adding Programs from a Network However you establish your network connection ethernet or wireless rad...

Page 31: ...e installation wizard begins 6 Follow the directions on the screen to install USB Host Port All IK8560 devices have a 4 pin USB 1 1 host port on the back panel that supports USB communication with USB 1 1 and backward compatible USB 2 0 devices All data communication occurs at USB 1 1 speeds Multiple USB devices can be accommodated by plugging a USB HUB into the USB Host port The IK8560 can suppor...

Page 32: ...eliminary CP4 Draft Connecting the IK8560 To connect the IK8560 to other devices via USB simply use a standard USB cable to plug one end into the USB host port and the other end into the USB device The IK8560 auto configures to USB when power is applied ...

Page 33: ... panel however IK8560C devices do not support wired ethernet communication Only IK8560E devices contain a functional ethernet controller that allows ethernet communication Cable Options There is a six inch L connector power cable that you can use to power the IK8560C Configuring the 802 11b Radio On IK8560C devices the 802 11b driver is enabled during the boot process which means that the radio is...

Page 34: ... connection Preferred networks are those networks that the device connects to as part of the wireless LAN The device attempts to connect to the SSID automatically and displays the connection Status and Signal Strength Disabling Encryption To disable encryption you must first select Open or Shared as the Authentication then go back up to Encryption and select Disabled You can disable encryption for...

Page 35: ...he device Scanning Displays when the device is attempting to connect to a selected network Associating Displays when the device is connecting to a selected network Failed to connect Displays when the device fails to connect to a selected network After failing the device attempts to connect to the next preferred network Connected to Network Name The device is connected to the network name listed Si...

Page 36: ...vice cold boots automatically when power is removed and then re applied To Edit a Preferred Network Double tap the network name in the list and the Wireless Properties window opens Make your edits and tap OK to save To Delete a Preferred Network Tap Advanced select the network name in the Preferred Networks list and tap Delete Deleting in this way does not delete the network connection Instead it ...

Page 37: ...tion access point Routing from one node to another on such a network requires an on demand routing protocol which generates routing information only when a station initiates a transmission Encryption Select the encryption method from the following options Disabled Select this option to disable encryption for Open or Shared authentications This information is often read from the selected network TK...

Page 38: ...nnot connect to Tap Up to move a selected network up one place Tap Down to move a selected network down one place The network at the top will be the default network If the device fails to connect it will try to connect with the next preferred network in the list Select a network in the list and tap Delete to delete it Networks to access The item selected in this drop down list determines which typ...

Page 39: ...g the current IP settings for the 802 11b radio By default the 802 11b radio uses Dynamic Host Configuration Protocol DHCP which automatically assigns temporary IP addresses to client stations logging onto an IP network It eliminates having to manually assign permanent static IP addresses If you want to use a static IP address select Specify an IP address and enter the parameters in the fields tha...

Page 40: ...es Supported Protocols The Client supports the Extensible Authentication Protocol EAP RFC 2284 Supported authentication methods CHAP MD5 RFC 1994 EAP TLS Authentication Protocol RFC 2716 EAP Tunneled TLS TTLS Internet Draft February 2002 Cisco LEAP and PEAP Microsoft PEAP Tested against the following servers Funk Odyssey 3 2 using TLS LEAP and TTLS AEGIS Server 1 1 4 using MD5 TLS TTLS LEAP and PE...

Page 41: ...is not an 802 1X aware device Gray The port is not in use or is disabled Either the Client isn t running or the port is not bound to the 802 1X protocol Orange The port is associated but there is no response to 802 11b packets If using WEP without 802 1x authentication this will be the final state when the connection is complete If using 802 1x authentication it is either a transient condition or ...

Page 42: ... while leaving the client running Start Stop Starts or stops 802 1X authentication After you finish the initial configuration tap the network interface and tap Start If the port is already active tap Stop first then Start to force the program to read the new configuration file Restart Same as a Stop followed by Start Select this menu item when you receive a message that a restart is necessary Conf...

Page 43: ...of the following Not Associated AP AP s SSID MAC AP s BSSID Event Log Displays the event log in a custom viewer The Event Log is a text file that contains system information each entry is listed sequentially with a time date stamp and text message Tap Refresh to query the system again and update the log file while you are reading it If the file gets too large old entries are automatically deleted ...

Page 44: ...p Screens Use the following navigation aid to examine the configuration options for each set of screens Configuring Client Authentication see page 5 13 User Tab see page 5 13 System Tab see page 5 15 Server Tab see page 5 16 Configuring a Port see page 5 17 Wireless Networks Tab see page 5 17 Protocol Tab see page 5 18 Configuring a Network see page 5 19 Profile Info Tab see page 5 19 WEP Mgmt Tab...

Page 45: ...ou can enter a name for the new profile Enter a Profile name and tap OK The name entered appears in the Profile drop down list Tapping Delete deletes authentication profiles To be deleted a profile cannot be assigned to a configured network Identity This is the 802 1X identity supplied to the authenticator The identity value can be up to 63 ASCII characters and is case sensitive For tunneled authe...

Page 46: ...certificate each time this certificate is used Tunneled authentication area Tunneled authentication parameters are used by only by TLS TTLS and PEAP protocols in Phase 2 of authentication and after the secure tunnel has been established The fields in this section are active only if the TLS TTLS or PEAP is selected as the Authentication type Identity The user identity used in Phase 2 authentication...

Page 47: ...gs Scan List Timeout The time interval at which the Client polls the ports This value should not be changed from the 10 second default unless technical support advises you to do so Save Credentials for min The amount of time the Client saves credentials Disable Wireless Zero Config Use this option only as directed by technical support Selecting this option disables other wireless utilities whether...

Page 48: ...store are available for selection in the drop down list Allow intermediate certificates This option is selected by default and enables unspecified certificates to be in the server certificate chain between the server certificate and the certificate authority selected in the Certificate issuer must be field When selected this option allows the server certificate received during negotiation to be is...

Page 49: ...es to the same network the default profile may be sufficient without requiring the selection of a specific network or networks If default is last in the list it can act as a wildcard if the device is out of range of the primary networks listed first Do NOT place default at the top or middle of the list if you are connecting to other networks If default is any place other than last connection to th...

Page 50: ... of times the Client restarts before giving up At that point the Client then defaults to the authenticated state but there will be no network connectivity because the protocol exchange was never completed Display EAP notifications Specifies that the EAPOL notification message will be displayed to the user An authenticator may use such notification to inform you for example about a near password ex...

Page 51: ...Networks list and this field is completed automatically If the SSID does not broadcast then the field will be active and you must manually enter the value here Peer to Peer Group Select this option to have two or more client workstations communicate with each other without the benefit of an AP otherwise known as ad hoc mode You should also select Do Active Scan and on the WEP Mgmt tab select Use k...

Page 52: ...WEP key entered in the Key field is used when clients authenticate with the AP via a challenge response mechanism Shared When not selected the only authentication performed is to check that a client s SSID setting matches the SSID of the AP Open Key In this field enter the WEP key to use for data encryption or authentication to the AP ASCII 5 or 13 characters Hexadecimal 10 or 26 characters When t...

Page 53: ...formation entered in the field below This mode is used if the 802 1x protocol is not being used for authentication Encryption Select the desired encryption WEP The least secure of the encryption methods WEP uses a single encryption key of either 40 or 104 bits WPA uses a 256 bit Pre shared key TKIP Uses the standard WEP format but changes the key with every frame for improved security and includes...

Page 54: ... the authentication server must know the issuer of your certificate as a trusted Certificate Authority CA If the selected certificate does require a password or pass phrase to decode the private key enter this value in the Certificate Pass Phrase field This value will be encrypted when the configuration is saved However on some systems there may not be a certificate Installing Certificates Note Cl...

Page 55: ...ing PEAP or TTLS the username and password are entered in the Tunneled authentication section My AP does not broadcast its SSID Even though I have manually configured an AP with that name the Client won t associate with it Make sure that the Network Name field contains the AP s SSID Verify that Do Active Scan is selected on the Profile Info tab see Do active scan on page 5 19 Otherwise the Client ...

Page 56: ... On the Profile Info tab give each side the same network name SSID Select Peer to Peer Group ad hoc mode and Do active scan On the WEP management section select Use key for data encryption and enter an identical key for both clients Verify that this network profile is the first or only one in the Configured Network list and try to restart both clients at roughly the same time Advice and Workaround...

Page 57: ...enables the image engine for use in the Scan Demo only Supported Bar Code Symbologies The 5100SR image engine in the IK8560 supports the following bar code symbologies Australian Post Aztec Code Aztec Mesas British Post Canadian Post Codabar Codablock F Code 11 Code 39 Code 49 Code 93 and 93i Code 128 Data Matrix EAN 8 EAN 13 EAN UCC Composite Interleaved 2 of 5 ISBT 128 Japanese Post KIX Netherla...

Page 58: ...s bar code information simply slide a bar code underneath the illumination cone The IK8560 beeps on successful decoding Illumination Cone Omni Directional Aiming The IK8560 supports omni directional aiming in two of the three optimal imaging modes Omni directional aiming means the bar codes label can be read if placed under the illumination cone in any orientation ...

Page 59: ...he point of reference for the IK8560 DOF specifications is from the outermost edge of the illumination cone Ambient light level at 535 Lux Code Near Far MaxiCode 35 mil Contact 9 95 Data Matrix 15 mil ECC 200 0 65 3 45 PDF417 ECL4 10 mil 0 05 5 95 PDF417 ECL4 8 mil 0 25 4 95 PDF417 ECL4 6 6 mil 1 45 3 2 Code 39 15 mil Contact 9 75 Code 39 10 mil 0 15 6 15 Code 39 8 mil 0 45 4 55 UPC A 13 mil 100 C...

Page 60: ...on Cone 3 The device beeps and the bar code data appears on the screen Scanning Options You can always manually scan the bar code inserted under the illumination cone by tapping the Scan button The Scan menu offers you two additional scan options Automatic and Continuous Automatic Scan Automatic scan activates the image engine at regular one second intervals To set the device to automatic scan tap...

Page 61: ... activate a scan session tap Setup View Statistics The Scan Demo begins recording scan statistics beginning with the next bar code scanned The scan statistics will appear underneath the bar code readout Field Description Symbology The symbology type Length The length of the bar code Count The number of scans completed since scan statistics were enabled If you complete one scan this field displays ...

Page 62: ...e list You can select and de select more than one symbology at a time Whe you are done enabling and disabling tap Close and then Yes on the confirmation dialog In addition to individual manual selection the Scan Demo offers you three selection options All Selects all the symbologies in the list None De selects all the symbologies in the list this button de selects even the default symbologies Defa...

Page 63: ...The 5100SR SF engine contains a green aiming beam that is disabled by default in the Scan Demo To enable the aiming beam tap Setup Enable Aimer A checkmark appears on the menu to indicate that the aiming beam is enabled To see the aiming beam see Omni Directional Aiming on page 6 2 Auto Send ...

Page 64: ...6 8 Rev a 6 27 06 Image Kiosk 8560 User s Guide Preliminary CP4 Draft ...

Page 65: ...ment you can use a mounting bracket or simply fasten screws directly to the vertical surface and hang the IK8560 on the screws Make sure to use screws appropriate to the material of the vertical surface such as wood or drywall Back Panel Mounting Dimensions Use the following dimensions to mount your IK8560 devices 7 29 in 185 1 mm 1 48 in 37 6 mm 3 96 in 100 6 mm 54 in 13 7 mm 2 36 in 59 9 mm 7 56...

Page 66: ...r Slots Connectors Wire Slots If you want the IK8560 to lay flat against the mounting surface make sure that the wires from the connectors are secured in the wire slots Side Panel Dimensions The following graphic shows the depth of the IK8560 at its widest point 3 16 in 80 26 mm ...

Page 67: ...04 998 3998 opción 8 opción 4 Fax 239 263 9689 E mail laservice handheld com Brasil Hand Held Products São Paulo Teléfono Int 55 11 2178 0500 Fax Int 55 11 2178 0502 Hand Held Products Rio de Janeiro Teléfono Int 55 21 2178 0500 Fax Int 55 21 2178 0505 São Paulo and Rio de Janeiro E mail brservice handheld com México Hand Held Products México Teléfono Intl 52 55 5203 2100 Fax Intl 52 55 5531 3672 ...

Page 68: ...atechsupport handheld com Brasil São Paulo Teléfono Int 55 11 2178 0500 Fax Int 55 11 2178 0502 Rio de Janeiro Teléfono Int 55 21 2178 0500 Fax Int 55 21 2178 0505 São Paulo and Rio de Janeiro E mail brtechsupport handheld com México Teléfono 800 782 4263 opción 8 opción 3 Teléfono 704 998 3998 opción 8 opción 3 E mail latechsupport handheld com Europe Middle East and Africa Telephone European Ofc...

Page 69: ... shipping to Hand Held Products EXCEPT AS MAY BE OTHERWISE PROVIDED BY APPLICABLE LAW THE FOREGOING WARRANTY IS IN LIEU OF ALL OTHER COVENANTS OR WARRANTIES EITHER EXPRESSED OR IMPLIED ORAL OR WRITTEN INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE HAND HELD PRODUCTS RESPONSIBILITY AND PURCHASER S EXCLUSIVE REMEDY UNDER THIS WARRANTY IS LI...

Page 70: ...8 4 Rev a 6 27 06 Image Kiosk 8560 User s Guide Preliminary CP4 Draft ...

Page 71: ......

Page 72: ... Hand Held Products Inc 700 Visions Drive P O Box 208 Skaneateles Falls NY 13153 0208 IK8560 UG Rev a 6 27 06 ...

Reviews: