diff -r 000000000000 -r 2e8eeb919028 configurationengine/source/plugins/common/ConeRulePlugin/ruleplugin/tests/ruleproject/rules/confml/commsdatcreator.confml --- /dev/null Thu Jan 01 00:00:00 1970 +0000 +++ b/configurationengine/source/plugins/common/ConeRulePlugin/ruleplugin/tests/ruleproject/rules/confml/commsdatcreator.confml Thu Mar 11 17:04:37 2010 +0200 @@ -0,0 +1,1935 @@ + + + Used to configure whether CommsDat generation from these settings is enabled. + + This is the master switch that determines whether CommsDat is created in the first boot + of the device based on Configuration Tool output. Set this to Yes if you are creating variant + and need to configure anything under Default CommsDat settings. + + + Read-only flag that indicates the CommsDatCreator start-up status in runtime. + + + + + Global networking related settings not tied to individual connection methods. + + + + GPRS attach mode (attach when needed/when available). + + + + + Default GPRS access point. Used when the phone is used as a modem for a PC. + The corresponding UI setting is Connection-Packet data-Access point. + + + + + Default icon for destination networks. + + + + + Default priority for LAN bearer type. + + + + + Default priority for WLAN bearer type. + + + + + Default priority for PAN bearer type. + + + + + Default priority for outgoing GPRS bearer type. + + + + + Default priority for incoming GPRS bearer type. + + + + + Default priority for CDMA 2000 bearer type. + + + + + Default priority for outgoing dial bearer type. + + + + + Default priority for incoming dial bearer type. + + + + + Default priority for VPN bearer type. + + + + + Default priority for MIP bearer type. + + + + + Default UI priority of LAN connection. + + + + + Default UI priority for WLAN bearer type. + + + + + Default UI priority for PAN bearer type. + + + + + Default UI priority for outgoing GPRS bearer type. + + + + + Default UI priority for incoming GPRS bearer type. + + + + + Default UI priority for CDMA 2000 bearer type. + + + + + Default UI priority for outgoing dial bearer type. + + + + + Default UI priority for incoming dial bearer type. + + + + + Default UI priority for VPN bearer type. + + + + + Default UI priority for MIP bearer type. + + + + + Specifies how the applications' default connection is specified. + + + + + The name of the default connection (connection method or destination network). + Default connection type parameter needs to be set accordingly. + + + + + For GPRS the time (in seconds) to stay online when all socket activity has ceased. -1 for unlimited time. + Leave empty to use the product default value. + + + + + For GPRS the time (in seconds) to stay online when session has closed. -1 for unlimited time. + Leave empty to use the product default value. + + + + + For GPRS the time (in seconds) to stay online when socket has closed. -1 for unlimited time. + Leave empty to use the product default value. + + + + + For CSD the time (in seconds) to stay online when all socket activity has ceased. -1 for unlimited time. + Leave empty to use the product default value. + + + + + For CSD the time (in seconds) to stay online when all socket activity has ceased. -1 for unlimited time. + Leave empty to use the product default value. + + + + + For CSD the time (in seconds) to stay online when all socket activity has ceased. -1 for unlimited time. + Leave empty to use the product default value. + + + + + For WLAN the time (in seconds) to stay online when all socket activity has ceased. -1 for unlimited time. + Leave empty to use the product default value. + + + + + For WLAN the time (in seconds) to stay online when all socket activity has ceased. -1 for unlimited time. + Leave empty to use the product default value. + + + + + For WLAN the time (in seconds) to stay online when all socket activity has ceased. -1 for unlimited time. + Leave empty to use the product default value. + + + + + How often WLAN networks are scanned when idle. + + + + Defines whether default values are being used for the advanced WLAN settings (recommended). + + + Defines how many times packets bigger than RTS Threshold are been resent. + + + Defines how many times packets smaller than RTS Threshold are been resent. + + + Minimum size of a packet for which CTS/RTS handshake has been used. + + + Transmission power level in use. In mWs. 4, 10 or 100 mW. + + + Defines whether the CCX radio measurements are allowed. + + + Defines whether power saving methods are active. Disabling WLAN + power save might increase interoperability but will dramatically shorten battery life. + + + + GPRS connection method (CM) definitions + + + The CM name that is visible to the user. + + + The CommsDat record id can be manually specified here. If left empty it is allocated automatically. + Note: It needs to be verified carefully that the IDs are globally unique if allocated manually! + So a good idea is to either specify all the IDs manually or none at all. + + + Defines whether connection method is protected (= cannot be edited by the user). + + + Defines whether connection method is hidden. + + + Connection method is hidden in CConnDlg or not (used to divide MMS and non-MMS CMs). + + + Connection method is highlighted or not. + + + Defines whether an IAP can be roamed to. + + + Addressing that the network uses. + + + The access point name for this GPRS connection + + + User name + + + Prompt password at connection time. + + + Password. + + + Password authentication method. + + + WAP gateway IP address. + + + Start page of the connection method. In URL format. + + + Attempts a secure WTLS connection to the gateway. + + + Indicates whether a connection-oriented or connectionless API should be used. + + + IP address of the interface. + Typically allocated automatically so this can be left empty. + + + Address of the primary DNS server that resolves host names. + Typically allocated automatically so this can be left empty. + + + Address of the secondary DNS server to connect if the primary DNS server is not available. + Typically allocated automatically so this can be left empty. + + + Address of the primary DNS server that resolves host names. + Typically allocated automatically so this can be left empty. + + + Address of the secondary DNS server to connect if the primary DNS server is not available. + Typically allocated automatically so this can be left empty. + + + Address of the HTTP/HTTPS proxy server. + + + Port number of the HTTP/HTTPS proxy server. + + + Name of the protocol for which this proxy can be used. + Typically http or https. + + + Allow EDGE usage. + + + Specifies the service provider type. Used when filtering connection methods for certain purpose. + + + + + WLAN connection method (CM) definitions + + + The CM name that is visible to the user. + + + The CommsDat record id can be manually specified here. If left empty it is allocated automatically. + Note: It needs to be verified carefully that the IDs are globally unique if allocated manually! + So a good idea is to either specify all the IDs manually or none at all. + + + Defines whether connection method is protected (= cannot be edited by the user). + + + Defines whether connection method is hidden. + + + Connection method is hidden in CConnDlg or not (used to divide MMS and non-MMS CMs). + + + Connection method is highlighted or not. + + + Defines whether an IAP can be roamed to. + + + Service set identifier (SSID) of the primary WLAN network. + + + Start page of the connection method. In URL format. + + + Determines the network infrastructure. + If there is a WLAN access point in the network then this should be Infrastructure. + + + Security mode of the WLAN network. + + + Address of the primary DNS server that resolves host names. + Typically allocated automatically in which case this should be empty. + + + Address of the secondary DNS server to connect if the primary DNS server is not available. + Typically allocated automatically in which case this should be empty. + + + Address of the primary DNS server that resolves host names. + Typically allocated automatically in which case this should be empty. + + + Address of the secondary DNS server to connect if the primary DNS server is not available. + Typically allocated automatically in which case this should be empty. + + + The gateway IP address. + Typically allocated automatically in which case this should be empty. + + + Network mask. Typically allocated automatically in which case this should be empty. + + + Address of the HTTP/HTTPS proxy server. + + + Port number of the HTTP/HTTPS proxy server. + + + Name of the protocol for which this proxy can be used. + Typically http or https. + + + Defines whether the SSID should be actively scanned. + This is needed if the SSID is hidden (not broadcasted by the AP) + + + + 802.11 Channel ID (1-14). Used only when connecting/setting up adhoc network. + + + + IP address of the interface. + Typically allocated automatically so this can be left empty. + + + Index of default WEP key. Used only when security mode is WEP. + + + WEP authentication mode. Only used when security mode is WEP. + + + WEP key length in bits. + + + WEP key format. + + + WEP key data (in format specified by corresponding WEP key format field). + + + WEP key length in bits. + + + WEP key format. + + + WEP key data (in format specified by corresponding WEP key format field). + + + WEP key length in bits. + + + WEP key format. + + + WEP key data (in format specified by corresponding WEP key format field). + + + WEP key length in bits. + + + WEP key format. + + + WEP key data (in format specified by corresponding WEP key format field). + + + WPA/WPA2 pre-shared key in plain text. ASCII character set values between 32-126 must be used. Minimum length is 8 characters and maximum 63. + You need to also define the WPA pre-shared key length field accordingly + + + Specifies that when the security mode is WPA or WPA2 if the PSK mode is enabled. + If this is off then EAP mode is used and the list of EAPs needs to be defined. + + + The length of the specified pre-shared key (in WPA pre-shared key field) + + + + A list of Extensible Authentication Protocols (EAPs) in use. The format is +xxx,+xxx,+xxx where xxx indicates the enabled EAP method ID as + specified in the IANA registry: http://www.iana.org/assignments/eap-numbers. For example to enable EAP-SIM the string needs to be "+018". + The list is in priority order, highest priority first. + + + + The username used with EAP-GTC. + + + Specifies how long single session is kept in memory (so no new password queries or similar appear). + + + Defines which EAP tunneling method is used with EAP-GTC. + + + The username used with EAP-TLS. + + + The realm used for device identification to the server. + + + Specifies whether the server's realm is compared with own realm. + This provides extra security but it depends on the network infrastructure and set-up whether this will work. + + + Specifies whether TLS requires that the server authenticates it (the client). + + + Specifies how long single session is kept in memory (so no new password queries or similar appear) + + + The list of allowed cipher suites. In the format +xxx,+xxx,+xxx... where xxx is the cipher suite identifier. + 004: TLS_RSA_WITH_RC4_128_MD5, 005: TLS_RSA_WITH_RC4_128_SHA, 010: TLS_RSA_WITH_3DES_EDE_CBC_SHA, + 019: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 022: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 047: TLS_RSA_WITH_AES_128_CBC_SHA + 050: TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 051: TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 052: TLS_DH_anon_WITH_AES_128_CBC_SHA + For example +004 enables only RSA with RC4 and MD5. + + + + The subject key id value of the user certificate. + Currently this field is the only one that can be used to identify the certificate. + + + The issuer of the user certificate. Ignored by the implementation currently! + + + The serial number of the user certificate. Ignored by the implementation currently! + + + The subject key id value of the CA certificate. + Currently this field is the only one that can be used to identify the certificate. + + + The issuer of the CA certificate. Ignored by the implementation currently! + + + The serial number of the CA certificate. Ignored by the implementation currently! + + + Defines which EAP tunneling method is used with EAP-TLS. + + + The username used with EAP-LEAP. + + + The password used with EAP-LEAP. + + + Specifies how long single session is kept in memory (so no new password queries or similar appear). + + + The username used with EAP-SIM. + + + The realm used for device identification to the server. + + + Specifies whether IMSI is sent always when authentication or is pseudonym usage allowed. + + + Specifies how long single session is kept in memory (so no new password queries or similar appear) + + + Defines which EAP tunneling method is used with EAP-SIM. + + + The username used with EAP-TTLS. + + + The realm used for device identification to the server. + + + Specifies whether the server's realm is compared with own realm. + This provides extra security but it depends on the network infrastructure and set-up whether this will work. + + + Specifies whether TTLS requires that the server authenticates it (the client). + + + Specifies how long single session is kept in memory (so no new password queries or similar appear). + + + The list of allowed cipher suites. In the format +xxx,+xxx,+xxx... where xxx is the cipher suite identifier. + 004: TLS_RSA_WITH_RC4_128_MD5, 005: TLS_RSA_WITH_RC4_128_SHA, 010: TLS_RSA_WITH_3DES_EDE_CBC_SHA, + 019: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 022: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 047: TLS_RSA_WITH_AES_128_CBC_SHA + 050: TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 051: TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 052: TLS_DH_anon_WITH_AES_128_CBC_SHA + For example +004 enables only RSA with RC4 and MD5. + + + + A list of Extensible Authentication Protocols (EAPs) in tunneled by EAP-TTLS. The format is +xxx,+xxx,+xxx where xxx indicates the enabled EAP method ID as + specified in the IANA registry: http://www.iana.org/assignments/eap-numbers. For example to enable EAP-SIM encapsulation the string needs to be "+018". + The list is in priority order, highest priority first. Note that the encapsulate type's encapsulation parameter needs to be configured accordingly. + + + The subject key id value of the user certificate. + Currently this field is the only one that can be used to identify the certificate. + + + The issuer of the user certificate. Ignored by the implementation currently! + + + The serial number of the user certificate. Ignored by the implementation currently! + + + The subject key id value of the CA certificate. + Currently this field is the only one that can be used to identify the certificate. + + + The issuer of the CA certificate. Ignored by the implementation currently! + + + The serial number of the CA certificate. Ignored by the implementation currently! + + + The username used with EAP-AKA. + + + The realm used for device identification to the server. + + + Specifies whether IMSI is sent always when authentication or is pseudonym usage allowed. + + + Specifies how long single session is kept in memory (so no new password queries or similar appear). + + + Defines which EAP tunneling method is used with EAP-AKA. + + + The username used with EAP-PEAP. + + + The realm used for device identification to the server. + + + Specifies whether the server's realm is compared with own realm. + This provides extra security but it depends on the network infrastructure and set-up whether this will work. + + + Specifies whether PEAP requires that the server authenticates it (the client). + + + Specifies how long single session is kept in memory (so no new password queries or similar appear) + + + The list of allowed cipher suites. In the format +xxx,+xxx,+xxx... where xxx is the cipher suite identifier. + 004: TLS_RSA_WITH_RC4_128_MD5, 005: TLS_RSA_WITH_RC4_128_SHA, 010: TLS_RSA_WITH_3DES_EDE_CBC_SHA, + 019: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 022: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 047: TLS_RSA_WITH_AES_128_CBC_SHA + 050: TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 051: TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 052: TLS_DH_anon_WITH_AES_128_CBC_SHA + For example +004 enables only RSA with RC4 and MD5. + + + + Is PEAP version 0 allowed. If in doubt enable only this one. + + + Is PEAP version 1 allowed. + + + Is PEAP version 2 allowed. + + + A list of Extensible Authentication Protocols (EAPs) in tunneled by EAP-PEAP. The format is +xxx,+xxx,+xxx where xxx indicates the enabled EAP method ID as + specified in the IANA registry: http://www.iana.org/assignments/eap-numbers. For example to enable EAP-SIM encapsulation the string needs to be "+018". + The list is in priority order, highest priority first. Note that the encapsulate type's encapsulation parameter needs to be configured accordingly. + + + The subject key id value of the user certificate. + Currently this field is the only one that can be used to identify the certificate. + + + The issuer of the user certificate. Ignored by the implementation currently! + + + The serial number of the user certificate. Ignored by the implementation currently! + + + The subject key id value of the CA certificate. + Currently this field is the only one that can be used to identify the certificate. + + + The issuer of the CA certificate. Ignored by the implementation currently! + + + The serial number of the CA certificate. Ignored by the implementation currently! + + + The username used with EAP-MSCHAPv2. + + + The password used with EAP-MSCHAPv2. + + + Specifies how long single session is kept in memory (so no new password queries or similar appear) + + + Defines which EAP tunneling method is used with EAP-MSCHAPv2. + + + The username used with EAP-FAST. + + + The realm used for device identification to the server. + + + Specifies whether the server's realm is compared with own realm. + This provides extra security but it depends on the network infrastructure and set-up whether this will work. + + + Specifies whether TTLS requires that the server authenticates it (the client). + + + Specifies how long single session is kept in memory (so no new password queries or similar appear) + + + The list of allowed cipher suites. In the format +xxx,+xxx,+xxx... where xxx is the cipher suite identifier. + 004: TLS_RSA_WITH_RC4_128_MD5, 005: TLS_RSA_WITH_RC4_128_SHA, 010: TLS_RSA_WITH_3DES_EDE_CBC_SHA, + 019: TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA, 022: TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA, 047: TLS_RSA_WITH_AES_128_CBC_SHA + 050: TLS_DHE_DSS_WITH_AES_128_CBC_SHA, 051: TLS_DHE_RSA_WITH_AES_128_CBC_SHA, 052: TLS_DH_anon_WITH_AES_128_CBC_SHA + For example +004 enables only RSA with RC4 and MD5. + + + + A list of Extensible Authentication Protocols (EAPs) in tunneled by EAP-FAST. The format is +xxx,+xxx,+xxx where xxx indicates the enabled EAP method ID as + specified in the IANA registry: http://www.iana.org/assignments/eap-numbers. For example to enable EAP-SIM encapsulation the string needs to be "+018". + The list is in priority order, highest priority first. Note that the encapsulate type's encapsulation parameter needs to be configured accordingly. + + + EAP-FAST authenticated provisioning mode allowed + + + EAP-FAST unauthenticated provisioning mode allowed + + + EAP-FAST warn ADHP no PAC + + + EAP-FAST warn ADHP no matching PAC + + + EAP-FAST warn not default server + + + The subject key id value of the user certificate. + Currently this field is the only one that can be used to identify the certificate. + + + The issuer of the user certificate. Ignored by the implementation currently! + + + The serial number of the user certificate. Ignored by the implementation currently! + + + The subject key id value of the CA certificate. + Currently this field is the only one that can be used to identify the certificate. + + + The issuer of the CA certificate. Ignored by the implementation currently! + + + The serial number of the CA certificate. Ignored by the implementation currently! + + + The username used with MSCHAPv2. + + + The password used with MSCHAPv2. + + + Specifies how long single session is kept in memory (so no new password queries or similar appear). + + + Defines which EAP tunneling method is used with MSCHAPv2. Needs to be EAP-TTLS. + + + + + Circuit-Switched Data connection methods + + + The CM name that is visible to the user. + + + The CommsDat record id can be manually specified here. If left empty it is allocated automatically. + Note: It needs to be verified carefully that the IDs are globally unique if allocated manually! + So a good idea is to either specify all the IDs manually or none at all. + + + Defines whether connection method is protected (= cannot be edited by the user). + + + Defines whether connection method is hidden. + + + Connection method is hidden in CConnDlg or not (used to divide MMS and non-MMS CMs). + + + Connection method is highlighted or not. + + + Defines whether an IAP can be roamed to. + + + Username for the connection. + + + Prompt password on connection set-up time. + + + Password. + + + Password authentication type. + + + WAP gateway IP. + + + Starting page. + + + WTLS security. + + + Connection type. + + + IP address of the interface. + Typically allocated automatically so this can be left empty. + + + Address of the primary DNS server that resolves host names. + Typically allocated automatically so this can be left empty. + + + Address of the secondary DNS server to connect if the primary DNS server is not available. + Typically allocated automatically so this can be left empty. + + + Address of the primary DNS server that resolves host names. + Typically allocated automatically so this can be left empty. + + + Address of the secondary DNS server to connect if the primary DNS server is not available. + Typically allocated automatically so this can be left empty. + + + Address of the HTTP/HTTPS proxy server. + + + Port number of the HTTP/HTTPS proxy server. + + + Name of the protocol for which this proxy can be used. + Typically http or https. + + + Default telephone number. + + + Bearer speed + + + Bearer Call Type Isdn + + + Is callback enabled. + + + Callback type. + + + Callback number. + + + Enable compression + + + Use login script + + + Login script + + + Modem init string + + + + + High-speed Circuit-Switched Data connection methods + + + The CM name that is visible to the user. + + + The CommsDat record id can be manually specified here. If left empty it is allocated automatically. + Note: It needs to be verified carefully that the IDs are globally unique if allocated manually! + So a good idea is to either specify all the IDs manually or none at all. + + + Defines whether connection method is protected (= cannot be edited by the user). + + + Defines whether connection method is hidden. + + + Connection method is hidden in CConnDlg or not (used to divide MMS and non-MMS CMs). + + + Connection method is highlighted or not. + + + Defines whether an IAP can be roamed to. + + + User name + + + Prompt password at connection time. + + + Password. + + + Password authentication method. + + + WAP gateway IP address. + + + Start page of the connection method. + + + Attempts a secure WTLS connection to the gateway. + + + Indicates whether a connection-oriented or connectionless API should be used. + + + IP address of the interface. + Typically allocated automatically so this can be left empty. + + + Address of the primary DNS server that resolves host names. + Typically allocated automatically so this can be left empty. + + + Address of the secondary DNS server to connect if the primary DNS server is not available. + Typically allocated automatically so this can be left empty. + + + Address of the primary DNS server that resolves host names. + Typically allocated automatically so this can be left empty. + + + Address of the secondary DNS server to connect if the primary DNS server is not available. + Typically allocated automatically so this can be left empty. + + + Address of the HTTP/HTTPS proxy server. + + + Port number of the HTTP/HTTPS proxy server. + + + Name of the protocol for which this proxy can be used. + Typically http or https. + + + Default telephone number. + + + Bearer speed + + + Bearer Call Type Isdn + + + Is callback enabled. + + + Callback type. + + + Callback number. + + + Enable compression + + + Use login script + + + Login script + + + Modem init string + + + + + LAN connection methods + + + The CM name that is visible to the user. + + + The CommsDat record id can be manually specified here. If left empty it is allocated automatically. + Note: It needs to be verified carefully that the IDs are globally unique if allocated manually! + So a good idea is to either specify all the IDs manually or none at all. + + + Defines whether connection method is protected (= cannot be edited by the user). + + + Defines whether connection method is hidden. + + + Connection method is hidden in CConnDlg or not (used to divide MMS and non-MMS CMs). + + + Connection method is highlighted or not. + + + Defines whether an IAP can be roamed to. + + + WAP gateway IP address. + + + Start page of the connection method. + + + Attempts a secure WTLS connection to the gateway. + + + Indicates whether a connection-oriented or connectionless API should be used. + + + Address of the HTTP/HTTPS proxy server. + + + Port number of the HTTP/HTTPS proxy server. + + + Name of the protocol for which this proxy can be used. + Typically http or https. + + + LAN interface networks. + + + LAN interface netmask. + + + LAN IP Gateway. + + + IP address of the interface. + Typically allocated automatically so this can be left empty. + + + Address of the primary DNS server that resolves host names. + Typically allocated automatically so this can be left empty. + + + Address of the secondary DNS server to connect if the primary DNS server is not available. + Typically allocated automatically so this can be left empty. + + + Address of the primary DNS server that resolves host names. + Typically allocated automatically so this can be left empty. + + + Address of the secondary DNS server to connect if the primary DNS server is not available. + Typically allocated automatically so this can be left empty. + + + + + Virtual Private Network connection methods + + + The CM name that is visible to the user. + + + The CommsDat record id can be manually specified here. If left empty it is allocated automatically. + Note: It needs to be verified carefully that the IDs are globally unique if allocated manually! + So a good idea is to either specify all the IDs manually or none at all. + + + Defines whether connection method is protected (= cannot be edited by the user). + + + Defines whether connection method is hidden. + + + Connection method is hidden in CConnDlg or not (used to divide MMS and non-MMS CMs). + + + Connection method is highlighted or not. + + + Defines whether an IAP can be roamed to. + + + Address of the HTTP/HTTPS proxy server. + + + Port number of the HTTP/HTTPS proxy server. + + + Name of the protocol for which this proxy can be used. + Typically http or https. + + + The network connection provider IAP name. + + + Service policy. + + + + + Destination network (SNAP) definitions. + + + The name that is visible to the user + + + The CommsDat record id can be manually specified here. If left empty it is allocated automatically. + Note: It needs to be verified carefully that the IDs are globally unique if allocated manually! + So a good idea is to either specify all the IDs manually or none at all. + + + Metadata that specifies a few default destination networks that applications can use + + + DN protection level. Destination contents mean the connection methods inside the destination and their priorities. + + + Is DN hidden or not. + + + Is DN hidden in CConnDlg or not + + + Is DN highlighted or not. + + + Icon to be assigned to DN. + + + + Name of an embedded DN that is bound to DN. + + + + + Name of the Connection Method that is bound to DN. + + + + + Name of the Connection Method that is bound to DN. + + + + + Name of the Connection Method that is bound to DN. + + + + + Name of the Connection Method that is bound to DN. + + + + + Name of the Connection Method that is bound to DN. + + + + + Name of the Connection Method that is bound to DN. + + + + + Name of the Connection Method that is bound to DN. + + + + + Name of the Connection Method that is bound to DN. + + + + + Name of the Connection Method that is bound to DN. + + + + + Name of the Connection Method that is bound to DN. + + + + + + + + No + No + No + No + ConfirmFirst + Normal + On + Continuous + Autodetect + Analogue + Yes + Server Number + No + No + + + + + + + + + + + + + + + + + + + + + + + + User Defined + 0 + No + No + No + 11 + + + + + + + + + + + + + + + + Internet + 1 + Internet + 2 + No + No + Yes + 0 + + + + + + + + + + + + + + MMS + 2 + MMS + 2 + No + Yes + No + 2 + + + + + + + + + + + + + + Operator + 3 + Operator + 2 + No + No + No + 4 + + + + + + + + + + + + + + + whenavailable + 11 + Ask once + + + 1 + 0 + 100 + 1 + 1 + 0 + 1 + 2 + 3 + 4 + 5 + 6 + 7 + 253 + 254 + 9 + 0 + 8 + 1 + 2 + 3 + 4 + 5 + 6 + 7 + 4 + 7 + 2347 + 300 + 1 + 300 + -1 + 1 + -1 + -1 + 1 + -1 + + + + No + No + No + No + ConfirmFirst + IPv4 + No + Normal + On + Continuous + Yes + + + + + + + + + + + + + + + + + + + No + No + No + No + ConfirmFirst + IPv4 + No + Normal + On + Continuous + Yes + + + + + + + + + + + + + + + + + + + + + No + No + No + No + ConfirmFirst + No + Normal + On + Continuous + Autodetect + Analogue + Yes + Server Number + No + No + + + + + + + + + + + + + + + + + + + + + + + No + No + No + No + Confirm first + On + Continuous + + + + + + + + + + + + + + + + + + + + No + No + No + No + ConfirmFirst + Infrastructure + Open + No + key1 + Shared + 64 + ASCII + 64 + ASCII + 64 + ASCII + 64 + ASCII + No + 0 + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + No + No + No + No + ConfirmFirst + + + + + + + + + + No + No + No + No + ConfirmFirst + + + + + + + + + + + 0 + + + + + false + false + + + \ No newline at end of file